program, that prints
to stdout and saves to a file.
Is there a way to have OpenVPN print to stdout and a log file?
Kind regards,
SaAtomic
--
Check out the vibrant tech community on one of the world's most
engaging tech sites
the `ncp-disable` in its configuration and then reconnects to the same
server,
would the connection succeed, due to the server having the cipher in the
`ncp-ciphers` default list, or would it fail due to a cipher mismatch?
Thank you for the help,
kind regards,
SaAtomic
?
Kind regards,
SaAtomic
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
Openvpn-users mailing list
Hello,
I do use --duplicate-cn on the server, but I'm not sure if the exit-notify is
correctly registered by the server. Thank you for the suggestion - I'll send
the logs as soon as possible.
Kind Regards,
SaAtomic
11. Apr 2017 18:15 by selva.n...@gmail.com:
>
> On Tue, Apr 11, 201
Hi!
Background information on why I can't use the --nobind option can be found on
the mailing list
https://sourceforge.net/p/openvpn/mailman/openvpn-users/thread/KgsKMZk--3-0%40keemail.me/#msg35767686
Basically I can not alter the server configuration.
I start and stop a large number of client
ly exhausts my IP pool on the server within minutes. This
topic was discussed earlier on the mailing list in case you missed it. Thank
you for the suggestion though, would be a perfect solution, if I didn't have
the issue with the IP pool exhaustion.
Kind regards,
SaAtomic
--
Hello!I'll have to look into the topology topic. But it seems reasonable to me,
to print a warning about the net30 topology.
The explicit-exit-notify is a very good point! I missed that in my client
configuration. It appears to be working, if I start one process after the
other. However, during
Hello!
I didn't realize there's a new release, thanks for the info! I'm really
tempted to order a copy now.I see you use OpenVPN 2.4 in the book, do you
discuss the new tls-crypt feature in the book?
Kind regards,SaAtomic
3. Apr 2017 10:14 by janj...@nikhef.nl:
> &
ow could I implement "sending data and checking the response"? I'd need to get
that working in an automated manner.
Kind regards,SaAtomic
30. Mar 2017 09:00 by g...@greenie.muc.de:
> Hi,
>
> On Wed, Mar 29, 2017 at 03:27:55PM +0200, > saato...@keemail.me> wrote:
>>
Hello!
I can not alter the configuration on the server, I can add options on the
client side, but that's it.Is there no other way?
Kind regards,SaAtomic
29. Mar 2017 17:54 by selva.n...@gmail.com:
> Hi,
> On Wed, Mar 29, 2017 at 5:26 AM, <> saato...@keemail.me> > wrote:
&
Is there a way to verify if an established tunnel is actually working properly
on the client side?
For instance, if I connect to an OpenVPN server (ncp-disable on server &
client) using a different cipher on the client than on the server, the client
will connect and print:
Initialization
I'm trying to get the tunnel server's IP address on the client, independent of
the configuration file. For instance, I don't want to rely on default routes to
identify the server's IP address for the tunnel.
I tried to use environmental variables with `--up`, but couldn't identify the
server's
hat causes this delay and how can it be reduced or completely avoided?
Kind regards,
SaAtomic--
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http:
TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
cipher AES-256-CBC
auth SHA512
verb 3
comp-lzo
duplicate-cn
Is there any way to establish multiple connections from a single client to a
single server?
Kind regards,
SaAtomic
to the `--cipher` option? Do I still configure that option and it
defines the preferred cipher?
In general, how do the options --ncp-ciphers, --ncp-disable and --cipher
cooperate?
Kind regards,
SaAtomic
--
Check out
exchange, is the PSK
used for the TLS encryption?
Kind regards,
SaAtomic
OpenVPN version 2.4.0 and mbedTLS version 2.4.0 (neat coincidence)
# openvpn --show-tls
TLS-DHE-PSK-WITH-AES-256-GCM-SHA384
TLS-DHE-PSK-WITH-AES-256-CCM
TLS-ECDHE-PSK-WITH-AES-256-CBC-SHA384
TLS-DHE-PSK-WITH-AES-256-CBC
16 matches
Mail list logo