Hi,
On Wed, 07 Mar 2012 09:00:04 +1300, Jason Haar wrote:
Your comments on rogue servers is certainly worth discussing too.
What can a rogue openvpn server push back to a client? Routes
obviously - but
other than screwing the client, is there any new risk?
if you expect the server to be roug
I'm the developer for Tunnelblick (open source GUI for OS X), having taken
over from Angelo Laub a couple of years ago. I'd like to make a beta of
Tunnelblick with OpenVPN 2.3alpha1 available for testing, but the alpha has
a bug that makes it useless for most users of Tunnelblick. Lots of people
us
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/03/12 13:48, Jonathan K. Bullard wrote:
[...skip...]
>
> *Details *
>
> OpenVPN 2.3alpha1 fails when the argument to "--up" contains more
> than an execution path. The problem also occurs for the "--down"
> option and the new "--route-pre-down"
Hello.
I did not set any mtu* options and get that:
Control Channel MTU parms [ L:1589 D:166 EF:66 EB:0 ET:0 EL:0 ]
Data Channel MTU parms [ L:1589 D:1450 EF:57 EB:4 ET:32 EL:0 ]
Local Options String: 'V4,dev-type tap,link-mtu 1589,tun-mtu 1532,proto
UDPv4,cipher AES-128-CBC,auth SHA1,keysize 12