Just wondering if anyone has looked at implementing x509-track for PolarSSL?
James
On 27/02/2014 12:40, steffan.kar...@fox-it.com wrote:
Hi,
The attached patches add support for PolarSSL 1.3. These patches are for
master only, as they drop support for PolarSSL 1.2. Supporting both versions
would require a lot of #ifdef's, so I opted for dropping 1.2.
Along with PolarSSL 1.3
> Hi,
>
> On Thu, Apr 17, 2014 at 03:07:29PM +0300, Lev Stipakov wrote:
>> Are there any plans to support ipv6 env vars in
>> client-connect/disconnect scripts?
>>
>> There are at least 2 tickes on that feature:
>>
>> https://community.openvpn.net/openvpn/ticket/230
>>
Hi,
On Thu, Apr 17, 2014 at 03:07:29PM +0300, Lev Stipakov wrote:
> Are there any plans to support ipv6 env vars in
> client-connect/disconnect scripts?
>
> There are at least 2 tickes on that feature:
>
> https://community.openvpn.net/openvpn/ticket/230
>
Hello,
Are there any plans to support ipv6 env vars in
client-connect/disconnect scripts?
There are at least 2 tickes on that feature:
https://community.openvpn.net/openvpn/ticket/230
https://community.openvpn.net/openvpn/ticket/369
Is there anything that prevents merging any of suggested
On 30/03/2014 07:46, Gert Doering wrote:
Hi,
On Sun, Mar 30, 2014 at 12:48:37AM +0100, Steffan Karger wrote:
3 - Change OpenSSL builds to use hax representation
I tend toward this one - user visible behaviour shouldn't change (unless
unavoidable) depending on SSL library used.
So for me
Hi,
On Wed, Apr 16, 2014 at 05:37:16PM -0600, James Yonan wrote:
> Someone on the Tor lists is claiming that OpenVPN isn't implementing
> SOCKSv5 authentication correctly:
>
> https://lists.torproject.org/pipermail/tor-dev/2014-March/006427.html
>
> Any ideas?
commit
There are recent patches on the devel list.
> On Apr 16, 2014, at 6:37 PM, James Yonan wrote:
>
> Someone on the Tor lists is claiming that OpenVPN isn't implementing
> SOCKSv5 authentication correctly:
>
>
Channel Binding Key based on TLS Keying Material Exporters [RFC 5705 ] allow
additional keying material to be derived from existing TLS channel. This
exported keying material can then be used for a variety of purposes.
TLS allows client and server to establish keying material for use in the
upper
Someone on the Tor lists is claiming that OpenVPN isn't implementing
SOCKSv5 authentication correctly:
https://lists.torproject.org/pipermail/tor-dev/2014-March/006427.html
Any ideas?
James
10 matches
Mail list logo