Hi, Here's the summary of the previous IRC meeting.
--- COMMUNITY MEETING Place: #openvpn-devel on irc.freenode.net List-Post: openvpn-devel@lists.sourceforge.net Date: Monday 30th Mar 2015 Time: 20:00 CEST (18:00 UTC) Planned meeting topics for this meeting were on this page: <https://community.openvpn.net/openvpn/wiki/Topics-2015-03-30> The next meeting has been scheduled for Monday 13th April 20:00 CEST (18:00 UTC): <https://community.openvpn.net/openvpn/wiki/Topics-2015-04-13> Your local meeting time is easy to check from services such as <http://www.timeanddate.com/worldclock> SUMMARY cron2, dazo, m-a, mattock and syzzer participated in this meeting --- Discussed OpenVPN 2.3.7 release which should be released within a reasonable timeframe (a few weeks). The "Openvpn with crytpodev on FreeBSD does not work" bug will be tested and a fix applied in 2.3.7: <https://community.openvpn.net/openvpn/ticket/480> A fix to the "FreeBSD topo subnet self-route not via loopback interface <https://community.openvpn.net/openvpn/ticket/481>" will go in unless some unexpected issues are encountered: <https://community.openvpn.net/openvpn/ticket/481> The "Man-page contains useless dash escapes" will be fixed: <https://community.openvpn.net/openvpn/ticket/512> The "LZO compression initialized message displays based on build, not config" ticket turned out the be invalid: <https://community.openvpn.net/openvpn/ticket/367> The "mktun in freebsd" ticket will be fixed, as it's just a documentation patch: <https://community.openvpn.net/openvpn/ticket/85> The "ifconfig syntax change insufficiently documented" issue will be fixed: <https://community.openvpn.net/openvpn/ticket/370> Discussed TLS version negotiation, which was originally enabled in 2.3.3, then turned off in 2.3.4 due to unforeseen problems outside our control. Since 2.3.3 the underlying problems in OpenVPN have been fixed. In addition it's now possible to disable version negotiation in case there are problems. For these reasons it was agreed that turning on TLS version negotiation again in 2.3.7 makes sense. M-a reviewed the enablement patch and sent a conditional ACK plus a man-page update proposal to openvpn-devel mailing list. --- Discussed topics related to the OpenVPN 2.4 release. It was decided to give NSSM a shot as an option for openvpnserv.exe: <http://www.nssm.cc> The Interactive Service makes use of the original openvpnserv.exe, which is thus not going to disappear overnight. Discussed the "The MacOS X keychain patch". A resolution for a .gitignore issue was found earlier today on #openvpn-devel. The patch can go in once somebody (such as plaisthos) ACKs the changes between versions v3 and v4 of the patch. Discussed the "openvpn-gui.exe is not signed" issue. This is not a problem in released OpenVPN installers as they include a (signed) openvpn-gui.exe as-is. In upcoming 2.4 -based installer this will be a problem as (unsigned) openvpn-gui.exe is hidden inside (signed) openvpn-gui-installer.exe. Mattock will modify openvpn-build so that it signs openvpn-gui.exe before packaging it into openvpn-gui-installer.exe. Attempts to talk about the "Interactive Service" failed as d12fk was not present. Discussed the AEAD patchset from syzzer: <https://github.com/syzzer/openvpn/tree/aead-cipher-modes8> The patches have been tested for interoperability with James' ovpn3 codebase, but they need proper review. Decided to do this review in the next meeting (13th Apr). --- Discussed the "Inline CRL" ticket: <https://community.openvpn.net/openvpn/ticket/421> Agreed to close it as "wontfix". --- Full chatlog is attached. -- Samuli Seppänen Community Manager OpenVPN Technologies, Inc irc freenode net: mattock
(20.59.04) mattock: anyways, it's nearly meeting time (20.59.12) mattock: https://community.openvpn.net/openvpn/wiki/Topics-2015-03-30 (20.59.14) vpnHelper: Title: Topics-2015-03-30 – OpenVPN Community (at community.openvpn.net) (21.00.42) mattock: who do we have here today? (21.00.46) mattock: me, m-a, cron2 (21.00.51) mattock: anyone else? (21.01.05) cron2_: dazo was around just a few minutes ago... (21.01.52) ***cron2_ looks around for syzzer and plaisthos... (21.02.18) ***syzzer present! (21.02.40) mattock: hi syzzer! (21.02.54) mattock: now if we only had d12fk! (21.03.08) Sullitaz: dazo, I have to go, thanks for your help (21.03.09) syzzer: wow, lots of scrollback (21.03.24) Sullitaz: I will get back to you later probably (21.03.40) ***cron2_ reads through the open ticket list for "milestone 2.3.7" and reports that this cron2 is a lazy bastard... on (fixed) bug owned by syzzer, 5 by me... (21.04.02) Sullitaz: bye everybody (21.04.15) Sullitaz ha abbandonato la stanza (quit: Quit: ChatZilla 0.9.91.1 [Firefox 36.0.3/20150319201009]). (21.04.46) mattock: https://community.openvpn.net/openvpn/report/3?asc=1&page=2 (21.04.48) vpnHelper: Title: {3} Active Tickets by Milestone – OpenVPN Community (at community.openvpn.net) (21.04.48) cron2_: syzzer: isn't 410 done? (21.05.15) syzzer: cron2_: ah, yes, that one can be closed! (21.05.32) cron2_: syzzer: you or I? (21.05.39) syzzer: loggin in... (21.06.04) cron2_: mattock: is your trac account samuli or mattock? I see tickets assigned to both of you... (21.06.12) mattock: please use samuli (21.07.47) cron2_: actually only one (21.08.42) mattock: I couldn't find any active tickets assigned to "mattock" (21.08.50) mattock: https://community.openvpn.net/openvpn/report/4 (21.08.52) vpnHelper: Title: {4} Accepted, Active Tickets by Owner – OpenVPN Community (at community.openvpn.net) (21.09.01) mattock: oh, "Accepted" (21.09.09) mattock: that narrows down the selection a bit (21.09.23) cron2_: I already reassigned the only one I foudn (21.09.47) cron2_: anyway - shall we start? I think m-a is only interested in the 2.3.7 bits, so maybe start there? (21.09.59) m-a: thanks (21.10.40) mattock: yeah, let's move forward (21.10.55) mattock: two tickets: https://community.openvpn.net/openvpn/ticket/480 (21.10.57) vpnHelper: Title: #480 ([PATCH] Openvpn with crytpodev on FreeBSD does not work) – OpenVPN Community (at community.openvpn.net) (21.11.03) mattock: and the second one later :) (21.11.16) cron2_: well, I'd like to get out 2.3.7 "reasonably soonish", say in ~2 weeks time or so, but the bugs you've mentioned (481 and 480) should definitely go in (21.11.49) mattock: #480 needs to wait for the test results, right? (21.11.53) m-a: so from the FreeBSD end of things, https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=195004#c4 is the status - awaiting feedback. Ermal happens to also be the original reporter against pfsense (URL in comment #1 on the same bug) (21.11.55) mattock: or is there anything we can do to expedite things? (21.11.56) vpnHelper: Title: Bug 195004 [PATCH] security/openvpn: Fix openvpn with aesni.ko loaded (at bugs.freebsd.org) (21.12.25) cron2_: yes. Not tagged milestone 2.3.7, but the new patch sounds like it should not have side effects (the first one was strictly no-go, because it changed user-visible behaviour) (21.12.54) m-a: someone would need a FreeBSD box with aesni support, OpenVPN + OpenSSL + aesni engine, reproduce the problem and then we might want to see. (21.13.49) cron2_: technically the patch looks reasonable to me, but I can't test it either (21.13.59) m-a: should we make ecrist test drive the thing? Should I test drive it in the official port as an option, to check for regressions? (21.14.19) m-a: ecrist maintains the FreeBSD openvpn-* development ports (21.14.22) mattock: yep (21.14.55) syzzer: yeah, I expect this to fix it, but I need someone to test it (21.14.57) cron2_: I'm not sure this will really give exposure, as it will only make a difference if an engine is used (21.15.33) cron2_: whether it breaks anything or not can be tested on anything that uses openssl engine... now whether it *fixes* the FreeBSD case, we need to test there :) (21.15.40) mattock: It looks like the Ermal guy in the FreeBSD bug report has the necessary test setup (21.15.42) m-a: it would, however, simplify testing if all people need to do is flip the switch (21.15.59) m-a: actually the guy is in the pfsense bug report (21.16.07) mattock: is ecrist's testing port based on Git "master" or what? (21.16.14) cron2_: on systems without engine, it's a no-op... (21.16.24) m-a: The FreeBSD bug "reporter", garga (aka Renato Botelho) has only relayed the thing to me. The originator is Ermal Luçi. (21.16.28) cron2_: mattock: yes, ports/openvpn-devel is using weekly snapshots (21.16.30) mattock: ah, I see (21.17.20) cron2_: given the number of people that do (not) use engines, maybe ask for volunteers on the -devel and -users list to give it a quick test? (21.17.44) mattock: sounds like a good idea (21.17.50) mattock: in the worst case it does not help (21.17.53) syzzer: tbh, I still don't understand why on earth someone would want to do aes-ni through engines/cryptodev... (21.18.07) syzzer: but well, I *is* broken... (21.18.08) m-a: seems reasonable to me; my proposal for the FreeBSD port is that I add a ports option for users to apply the patch so they can report back. Not sure if it's BSD specific. (21.18.15) cron2_: syzzer: how is it done elsewhere? (21.18.30) syzzer: it's just an instruction set extention (21.18.40) cron2_: so openssl uses it directly? (21.18.51) syzzer: so you simply execute the instruction, no need for any transitions to kernel mode (21.18.55) syzzer: yes (21.19.48) syzzer: cryptodev makes sense for crypto-accelerators which require god-mode, like stuff that gets access to your entire system through dma, etc. (21.22.18) cron2_: m-a: let's try asking the users on the two lists, and if nobody is there who uses the engines, we'll just patch and ship... (it will also only fire in --daemon mode, so most client setups won't even see that code) (21.22.33) m-a: ok (21.22.40) mattock: who will ask? (21.23.03) cron2_: syzzer: are you on the users list? (21.23.12) syzzer: cron2_: yes (21.23.19) ***cron2_ volunteers syzzer (and runs) (21.23.26) mattock: +1 (21.23.41) syzzer: ok, will do (21.24.30) cron2_: thanks. So, #481 - I know what to do there, I just need to see whether it works out (use "route-gateway" as a next-hop here, instead of "my own ip"). (21.25.34) cron2_: with 4cc6a2595947a0e2f13b we should always *have* a route-gateway address - which might not be the "true" server address, but that does not matter, as long as it's "on the other side" (21.26.11) m-a: will it work through firewalls and martian address filtering if you pick the wrong one? (21.26.26) cron2_: yes (21.27.02) cron2_: we out a subnet route onto the interface anyway, so "all in the subnet" should be ok with martian (reverse path) filtering (21.28.04) cron2_: firewalls: the "remote end of ifconfig tun" address "should" not manifest itself outside openvpn - unless someone configures it from an --up script, and in this case, it's broken today (because in --topology subnet, no peer address exists, that field is overloaded with the netmask) (21.30.06) ***cron2_ is reasonably confident that it will work out, but, well, it needs testing -> my job ("I broke it, I'll get to fix it") (21.30.39) mattock: cron2_: so this will go into 2.3.7? (21.30.44) cron2_: anything else in the bug list that needs fixing before 2.3.7 but has no milestone? (21.30.57) cron2_: mattock: this is the plan, the fix is fairly localized, and it's a true bug fix (21.31.01) syzzer: tls version negotiation! (21.31.16) mattock: yep, forward (21.31.20) cron2_: mattock: it might turn out to be more difficult, in which case "we'll see" (21.32.14) m-a: #85 has been going for a while and is mostly documentation (21.32.41) m-a: mktun in FreeBSD - document that only Linux needs it and what the BSDs use instead. (21.33.24) cron2_: what I wanted to do here was to just print it (use "ifconfig tunX create" on this platform) (21.33.38) m-a: ok (21.34.16) cron2_: so, yes, no real functionality added, just documentation/help text. (21.34.24) m-a: similar thing for #370 (21.35.02) cron2_: still waiting for a doc patch, that one... (21.36.02) m-a: https://community.openvpn.net/openvpn/ticket/367 - just rename the message per comment #2 and move on? (21.36.03) vpnHelper: Title: #367 (LZO compression initialized message displays based on build, not config) – OpenVPN Community (at community.openvpn.net) (21.36.28) mattock: I can probably sneak https://community.openvpn.net/openvpn/ticket/512 into 2.3.7 too (21.36.30) vpnHelper: Title: #512 (Man-page contains useless dash escapes) – OpenVPN Community (at community.openvpn.net) (21.36.36) mattock: while we're at fixing the man-page (21.37.05) cron2_: m-a: 367 actually puzzled me, because I'm fairly sure this is not printed all the time, just when it is used. Let me test that. (21.38.35) m-a: So, the FreeBSD port just got the patch with an "experimental" port option. Dubbed version 2.3.6_3, differences at https://svnweb.freebsd.org/ports?view=revision&revision=382705 (21.38.37) vpnHelper: Title: [ports] Revision 382705 (at svnweb.freebsd.org) (21.40.26) mattock: that was quick (21.40.41) cron2_: well, I can confirm that it is *not* printing this if not called. Closing, bogus (21.40.43) ***dazo is here now (21.40.57) mattock: hi dazo! (21.41.16) dazo: sorry ... domestic issues delayed me (21.44.16) cron2_: #367 done! (21.44.20) mattock: great! (21.45.36) cron2_: mattock: #512 sounds good :) (21.45.42) cron2_: so, what about tls-version-min? (21.47.21) mattock: syzzer? (21.47.24) m-a: cron2_: what's the reference? (21.47.33) m-a: can't see it on the agenda nor the implied ticket list (21.47.58) syzzer: ah, yes, tls version negotiation (21.48.04) syzzer: I sent a patch a little while ago (21.48.20) cron2_: Message-Id: <1426015605-4068-1-git-send-email-stef...@karger.me> (21.48.35) syzzer: I think it is time to re-enable it by default (21.49.38) syzzer: but, in contrast with the previous time we attempted it, have a mechanism in place to revert to the old behaviour if users encounter issues (21.50.02) ***cron2_ tends to agree (21.50.44) syzzer: so, now I need someone to review the code (21.51.06) m-a: http://sourceforge.net/p/openvpn/mailman/openvpn-devel/thread/1426015605-4068-1-git-send-email-steffan%40karger.me/#msg33581243 (21.51.08) vpnHelper: Title: OpenVPN / Mailing Lists (at sourceforge.net) (21.52.01) m-a: I don't oversee everything (would have to check off-line) (21.52.16) m-a: I have recently written similar code for fetchmail, albeit with different user interface and thus semantics. (21.53.14) m-a: plausibility check, is "if (tls_version_max == TLS_VER_1_0)" in the bottom hunk sufficient, or do you also need to check tls_version_min (or is that nailed to 1.0 anyhow elsewhere?) (21.53.47) syzzer: tls-version min is by default nailed to 1.0 (21.53.58) m-a: and seeing the code is changed twice, for client and service, it may warrant refactoring. (21.54.01) dazo: syzzer: so there are openvpn installations who falls into the SSLv23_client_method() group of handshake methods? (21.54.22) m-a: s/service/server/ (21.54.45) syzzer: m-a: yes, I considered that, but did not do that for this patch on purpose - minimal patches only for 2.3 (21.55.17) m-a: fine (21.55.18) dazo: oh right ... I saw the last sentence in the commit log ... SSLv23_client_method() == enable negotiation (21.55.21) syzzer: dazo: I don't get what you mean, can you explain? (21.55.43) cron2_: syzzer: the totally logical OpenSSL API got him (21.55.55) syzzer: ah, good :p (21.56.01) cron2_: "SSLv23 enables TLS 1.1 and higher, while TLSv1 only does TLS 1.0" (21.56.13) dazo: I didn't understand instantly why whe needed SSLv23_{client,server}_method() (21.56.16) m-a: SSLv23 is the only method that negotiates version. (21.56.29) syzzer: awesome API, right? ;) (21.56.33) cron2_: totally (21.56.35) m-a: All other methods (SSLv2, SSLv3, TLSv1, TLSv1_1, TLSv1_2) nail the respective version. (21.56.58) dazo: right (21.57.02) dazo: now I see the point :) (21.57.02) m-a: So basically you use SSLv23_*_method() in the constructor, and limit the interval of negotiable versions. You do that by EXCLUDING versions you do not want. (21.57.39) m-a: The remaining range of versions must then be contiguous. (21.58.01) m-a: (the latter point isn't in the docs but is what Viktor Duchovni of Postfix fame explained to me) (21.58.14) m-a: JFTR (21.58.21) dazo: thx! (22.00.20) syzzer: ok, my workstation is dying on me so this all takes a little longer that it should, but tls-version-min defaults to '1.0', and we only accept '1.0', '1.1' and '1.2' as valid options currently (22.00.30) mattock: ok so what prevents version negotiation issues like we had with 2.3.3? (22.00.39) cron2_: tls-version-max 1.1 (22.00.57) cron2_: that option did not exist back then, plus "if cryptoapi is used, max is set to 1.1 automatically" (22.01.09) mattock: ok, good, I'll mention that in the summary (22.01.09) syzzer: it doesn't, but when you have issues, you can set --tls-version-max 1.1 or --tls-version-max 1.0 (22.01.10) m-a: is this in the manual page and will it be in the release-notes? (22.01.45) syzzer: where in this case --tls-verion-max 1.0 will revert the behaviour to the *exact* old default behaviour (calling TLSv1_{client,server}_method() ) (22.03.08) cron2_: this is an interesting point (22.03.19) syzzer: release notes at least. --tls-version-min is in the man page, but I'm not sure it makes sense to mention this too (22.03.19) cron2_: why does our 2.3 man page have --tls-version-max, while the code does not (22.03.37) syzzer: the code has --tls-version-max too, right? (22.03.43) cron2_: yeah (22.03.44) cron2_: it has (22.03.45) cron2_: I'm confused (22.04.11) cron2_: please ignore me while I reboot my memory (22.04.18) mattock: so what are we turning on in 2.3.7 again? :P (22.04.44) cron2_: *automatic* negotiation, unless manually disabled (22.04.48) syzzer: that by default OpenVPN will negotiate TLS versions, which will result in connections using tls 1.2, instead of tls 1.0 by default (22.05.53) mattock: ok, I think I've seen the light (22.07.29) mattock: I will mention that we will flip the switch again (22.07.35) mattock: are we done with this topic? (22.07.53) cron2_: someone needs to ACK the patch :) (22.08.01) syzzer: ^^ that (22.08.52) mattock: any takers? (22.09.13) m-a: reviewing (22.10.27) syzzer: m-a: thanks! (22.11.29) cron2_: mattock: jumping topics in the meantime a bit to the windows service wrapper - I think we should definitely bundle nssm.exe for the time being. If 2.4 ever sees the light, we'll have to give people an option what to install, as openvpnserv will also be the "Interative Service" part, if I understood d12fk right (so they can use nssm for non-interactive, and openvpnserv for iserv) (22.12.16) cron2_: the main issue with the service as it is seems to be "recovery after openvpn crash" or "suspend and resume" - with the iserv, the gui will do all this, so I expect it to "simply work" then (22.12.37) mattock: cron2: hmm, yes, that might be so (22.13.06) mattock: I can't recall whether the "Interactive Service" actually makes use of openvpnserv.exe or not (22.13.12) cron2_: I would even offer 2.3 based installers with nssm (22.13.23) cron2_: it does, the patch adds functionality to the openvpnserv.exe sources (22.13.42) mattock: ok, then nssm.exe would be complementary (22.13.51) mattock: as well as a better alternative for 2.3.x (22.14.08) cron2_: maybe offer "old service and old tap" bundles for conservative users, and "nssm and tap6" for more modern environments, or such... (22.14.16) mattock: I'll do a proof of concept and see how it works (22.14.34) mattock: I think we can kill tap-windows (NDIS 5) at the moment we drop XP support (22.14.50) mattock: NDIS 6 driver has been very stable after the last remaining issues were fixed (22.15.02) mattock: the question then becomes: when is XP dead in our eyes? (22.15.20) mattock: we've decided on 2.4, but what about 2.3.x? (22.15.27) cron2_: it seems to be in full zombie mode, hard to kill (22.15.34) cron2_: so we don't... (22.16.23) mattock: we'll see if it goes away before 2.4 is stable :) (22.16.30) mattock: at that point it does not really matter (22.16.31) cron2_: I suggest we support it as long as the pain level is bearable - if "things" happens (like, MinGW64 dropping XP support) we reconsider (22.16.38) mattock: yeah, makes sense (22.16.57) cron2_: nssm definitely looks non-suckish :) (22.17.07) m-a: syzzer: you'll need to patch the manual page doc/openvpn.8, too (22.17.24) m-a: I will detail this in a post to the list. (22.17.55) cron2_: mattock: on the agenda, the TLS version negotiation bit is actually for 2.3.7 only - 2.4 has it already (as had 2.3.3, but we un-enabled it only in 2.3) (22.18.01) dazo: or that a bug appears which requires too much work to debug and fix on XP ... if fixable present and fixable a more modern Windows, then we fix it ... but only trivial fixes for XP-only (22.18.02) syzzer: m-a: that sounds reasonable :) (22.18.36) cron2_: dazo: yeah, that's part of "pain level" :) (22.18.45) dazo: :) (22.19.56) mattock: cron2_: noted and fixed (22.20.52) mattock: I take it that a PoC of nssm integration has a general blessing (22.21.15) mattock: if something comes up in the PoC then we can reconsider, but otherwise we'll stick with it (22.21.24) cron2_: haven't seen anyone on the list speak against it... so, all for it :) (22.21.32) mattock: ok, good! (22.24.08) mattock: next topic? (22.24.22) cron2_: next topic: regarding MacOS X keychain patch - I went back and checked. Plaisthos ACKed v3 (and James implicitely so, based on "if it will not break Android"), but v4 changed the OpenVPN bits again. So I would actually ask plaisthos to ACK the differences v3->v4 (22.25.11) mattock: the .gitignore issue is now history, right? (22.25.26) mattock: so if plaisthos ACKs v3->v4 the patch can go in? (22.25.28) cron2_: yes (22.25.30) mattock: great! (22.25.42) cron2_: I will ignore the .gitignore part of the patch, but do not need a new patch for that (22.26.07) cron2_: so the "Makefile" bit was more a distraction, sorry for that (22.27.11) cron2_: remaining topics: iservice (d12fk not here, so hard to agree on the way forward - I have some ideas, but want his OK for that) and AEAD. Syzzer? (22.27.24) m-a: syzzer: where do I find the version-related bits in the polarssl code? (22.27.26) cron2_: oh, and openvpn-gui.nsi... (22.27.38) m-a: syzzer: seems missing. (22.27.57) mattock: well, openvpn-gui.nsi thing is quick (22.28.20) syzzer: m-a: polarssl has tls-version-min and tls-version-max, but already does version negotiation by default (22.28.55) mattock: the work is practically done, the only real issue being that the openvpn-gui.exe is unsigned... this is because openvpn-build signed openvpn-installer.exe, not openvpn-gui.exe inside it (22.28.55) m-a: syzzer: so we might bump into issues when a polarssl-based box negotiates against a fixed-TLS-version openssl based box? (22.29.17) mattock: while the "proper" fix would be to have a separate buildsystem for openvpn-gui, that would be a major undertaking (22.29.24) syzzer: m-a: no, the openssl box will just enforce the version it supports (22.29.29) mattock: so I'm inclined to just hack openvpn-build a bit and be done with it (22.29.35) syzzer: that interop has been tested and used quite extensively (22.29.45) ***m-a scratches head and asks, how would the 2.3.3 problem then have showed itself? (22.30.15) cron2_: mattock: hack openvpn-build and be done with it :) (22.30.37) cron2_: m-a: talking to 2.3.3, and failing, because in *some* setups 1.2 just does not work (22.30.41) mattock: cron2_: I will take the pragmatic approach this time and do as I suggested :D (22.31.57) cron2_: if used with cryptoapi (which polarssl doesn't support) tls 1.2 blows up right away, and someone else also had a failure case but we never found out why it failed for them (22.31.57) syzzer: m-a: the 2.3.3 problem occurred when both peers supported version negotiation, but some mitm (corporate firewall, China's GFW) did not recognize the protocol any more and blocked it (22.32.16) syzzer: also, it would break when 1.2 was negotiated, but then a smartcard would refuse to sign the (larger) 1.2 hashes (22.32.45) m-a: OK, the latter are outside our control and only the user can sidestep them in a deliberate decision to downgrade. (22.33.10) syzzer: yes, all problems were out of our control actually, but we did not have counter measures in place (22.33.12) syzzer: we do now :) (22.33.13) cron2_: we work around the cryptoapi issue now ("if cryptoapi enabled set version-max 1.1") (22.33.26) m-a: does polarssl have version pinning that needs to be implemented? The tls-version-max 1.0 workaround would otherwise not work with PolarSSL-based builds (or I don't see how) (22.34.15) m-a: oh sorry, different API (22.34.31) syzzer: well, I would actually expect setting 'min 1.0' and 'max 1.0' to result in exactly the same as calling TLSv1_method() (22.34.40) syzzer: same goes for polarssl (22.35.04) m-a: I think I've seen SOMETHING in the openssl docs on which versions it offers (22.35.27) syzzer: I kept the call to TLSv1_method() in there just to be 100% sure we can revert back to the old behaviour (22.38.20) syzzer: m-a: we are restricting what openssl offers, with the --tls-version-min and --tls-version-max (22.38.27) m-a: I know that. (22.38.39) m-a: perhaps I'm digging to deep here. (22.39.07) syzzer: hmm, then I don't get what you're looking for (22.41.23) mattock: once the TLS version patch is covered, we only have one topic left: AEAD (22.45.08) syzzer: m-a: can I help you in any way with your quest? (22.45.29) m-a: syzzer: I am currently writing a proposal for the manual page. (22.45.32) m-a: :-) (22.46.25) syzzer: okay, I'll just keep quiet than ;) (22.46.28) syzzer: *e (22.46.34) cron2_: AEAD in the meantime? (22.46.59) mattock: m-a: this is entirely off-topic, but this what I was referring to earlier: (22.46.59) mattock: $ apt-file -x search ".*/m-a$" (22.46.59) mattock: module-assistant: /etc/bash_completion.d/m-a (22.46.59) mattock: module-assistant: /usr/bin/m-a (22.46.59) dazo: mattock: looking at some old trac tickets .... #421 can probably be closed as "wontfix" ? (22.47.02) mattock: agreed (22.47.35) cron2_: +1 (22.47.48) mattock: yeah, +1 (22.49.20) ***m-a drowned in scrollback (22.49.36) cron2_: sorry (22.50.20) mattock: AEAD? (22.50.30) mattock: is this for/from syzzer primarily? (22.50.42) syzzer: yes (22.50.43) m-a: mattock: I don't get the point of the apt-file -x search (22.51.01) ***m-a wonders which hats were sneaked on his head without him noticing (22.51.02) mattock: there's no point expect that there's a tool called "m-a" in debian (22.51.06) cron2_: he found an obscure program called "m-a" (22.51.12) syzzer: sorry, trying to explain my girlfriend how to explain a friend of hers how to scp something to my home server... (22.51.13) mattock: I've actually used it (22.51.24) mattock: syzzer: good luck :P (22.51.38) syzzer: but, AEAD (22.52.02) syzzer: so, I have a series of patches, which have been interop-tested with james' ovpn3 code (22.52.22) syzzer: but we need to find a way to get them reviewed (22.52.33) cron2_: cool (22.52.49) syzzer: the most recent ones I've sent to the list are the polarssl logging improvement patches (22.52.58) mattock: syzzer: are all the patches available? (22.53.40) syzzer: mattock: https://github.com/syzzer/openvpn/tree/aead-cipher-modes8 (22.53.41) vpnHelper: Title: syzzer/openvpn at aead-cipher-modes8 · GitHub (at github.com) (22.54.08) mattock: would it make sense to arrange another meeting and have James participate? (22.54.26) cron2_: most definitely :) (22.54.36) cron2_: syzzer: how big is the change? (22.54.58) cron2_: like, "2 files, totally trivial" or "all the crypto modules fully revamped" (22.55.12) syzzer: yes, I think James is definitely needed for this (22.55.23) syzzer: cron2_: no, it introduces a new on-the-wire packet format (22.55.40) mattock: most definitely stuff which requires James (22.55.47) m-a: so, conditional ACK and relevant manual page update proposal (which needs to be ACKed by itself) sent to the openvpn-devel list. (22.55.54) syzzer: it doesn't change much on the existing code, but it is quite a bit of code (22.55.56) mattock: m-a: thanks! (22.56.06) syzzer: m-a: great! (22.56.15) m-a: nevermind. (22.56.44) syzzer: m-a: well, as you've noticed, any review efforts are more than welcome :) (22.56.53) m-a: my little compensation for getting the FreeBSD tickets moving :) (22.57.02) mattock: so when do we arrange the AEAD meeting? (22.57.13) mattock: next Monday is probably bad due to Easter and all (22.57.18) mattock: two weeks from now? (22.57.27) mattock: or non-monday? (22.57.36) syzzer: next week is bad for me indeed (22.57.51) m-a: Easter Monday is a public holiday in Germany (22.57.59) mattock: also here in Finland (22.58.06) syzzer: but 13/4 works for me (22.58.16) m-a: I'm out on the AEAD stuff anyhow. (22.58.44) ***m-a wondering where the manual page update patch got stuck. (22.58.47) mattock: any objections to a meeting on 13th Apr? (22.58.55) cron2_: syzzer: I'm fine to review the packet format, but we need James (22.59.03) m-a: I abstain from the vote. (22.59.04) mattock: m-a: I got the mail (22.59.04) cron2_: m-a: sourceforge greylisting... (22.59.09) cron2_: maybe (22.59.15) cron2_: april 13 is good (22.59.18) m-a: yeah but the conditional ACK has already made it (22.59.24) cron2_: weird (22.59.49) mattock: I received both emails from m-a (23.00.02) cron2_: ok, need to go and break other stuff now... *wave* (23.00.16) m-a: ok, then it's probably delayed in my inbound path section. Perhaps University spam filters or firewalls. (23.00.18) mattock: I'll add a tentative topic page for 13th Apr and inform James about it (23.00.30) cron2_: thanks (23.00.50) m-a: so final question (23.01.08) m-a: is there any detailed planning (target date) regarding a 2.3.7 release? (23.01.36) m-a: or is it flexible and just based on the trac milestones? (23.01.41) cron2_: "four weeks ago"... I really don't know, when I find time to work on these tickets. But hopefully soon (23.01.50) cron2_: it is flexible, but I do not want to drag too long (23.02.02) m-a: fair enough (23.03.59) m-a: ok, my patch hit the archives, http://sourceforge.net/p/openvpn/mailman/openvpn-devel/thread/1427745294-31041-1-git-send-email-matthias.andree%40gmx.de/#msg33676596 (23.04.00) vpnHelper: Title: OpenVPN / Mailing Lists (at sourceforge.net) (23.04.42) mattock: https://community.openvpn.net/openvpn/wiki/Topics-2015-04-13 (23.04.43) vpnHelper: Title: Topics-2015-04-13 – OpenVPN Community (at community.openvpn.net)
0x198D22A3.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature