You can subscribe to this list here.
| 2002 | Jan | Feb | Mar | Apr (24) | May (14) | Jun (29) | Jul (33) | Aug (3) | Sep (8) | Oct (18) | Nov (1) | Dec (10) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 | Jan (3) | Feb (33) | Mar (7) | Apr (28) | May (30) | Jun (5) | Jul (10) | Aug (7) | Sep (32) | Oct (41) | Nov (20) | Dec (10) |
| 2004 | Jan (24) | Feb (18) | Mar (57) | Apr (40) | May (55) | Jun (48) | Jul (77) | Aug (15) | Sep (56) | Oct (80) | Nov (74) | Dec (52) |
| 2005 | Jan (38) | Feb (42) | Mar (39) | Apr (56) | May (79) | Jun (73) | Jul (16) | Aug (23) | Sep (68) | Oct (77) | Nov (52) | Dec (27) |
| 2006 | Jan (27) | Feb (18) | Mar (51) | Apr (62) | May (28) | Jun (50) | Jul (36) | Aug (33) | Sep (47) | Oct (50) | Nov (77) | Dec (13) |
| 2007 | Jan (15) | Feb (8) | Mar (14) | Apr (18) | May (25) | Jun (16) | Jul (16) | Aug (19) | Sep (32) | Oct (17) | Nov (5) | Dec (5) |
| 2008 | Jan (64) | Feb (25) | Mar (25) | Apr (6) | May (28) | Jun (20) | Jul (10) | Aug (27) | Sep (28) | Oct (59) | Nov (37) | Dec (43) |
| 2009 | Jan (40) | Feb (25) | Mar (12) | Apr (57) | May (46) | Jun (29) | Jul (39) | Aug (10) | Sep (20) | Oct (42) | Nov (50) | Dec (57) |
| 2010 | Jan (82) | Feb (165) | Mar (256) | Apr (260) | May (36) | Jun (87) | Jul (53) | Aug (89) | Sep (107) | Oct (51) | Nov (88) | Dec (117) |
| 2011 | Jan (69) | Feb (60) | Mar (113) | Apr (71) | May (67) | Jun (90) | Jul (88) | Aug (90) | Sep (48) | Oct (64) | Nov (69) | Dec (118) |
| 2012 | Jan (49) | Feb (528) | Mar (351) | Apr (190) | May (238) | Jun (193) | Jul (104) | Aug (100) | Sep (57) | Oct (41) | Nov (47) | Dec (51) |
| 2013 | Jan (94) | Feb (57) | Mar (96) | Apr (105) | May (77) | Jun (102) | Jul (27) | Aug (81) | Sep (32) | Oct (53) | Nov (127) | Dec (65) |
| 2014 | Jan (113) | Feb (59) | Mar (104) | Apr (259) | May (70) | Jun (70) | Jul (146) | Aug (45) | Sep (58) | Oct (149) | Nov (77) | Dec (83) |
| 2015 | Jan (53) | Feb (66) | Mar (86) | Apr (50) | May (135) | Jun (76) | Jul (151) | Aug (83) | Sep (97) | Oct (262) | Nov (245) | Dec (231) |
| 2016 | Jan (131) | Feb (233) | Mar (97) | Apr (138) | May (221) | Jun (254) | Jul (92) | Aug (248) | Sep (168) | Oct (275) | Nov (477) | Dec (445) |
| 2017 | Jan (218) | Feb (217) | Mar (146) | Apr (172) | May (216) | Jun (252) | Jul (164) | Aug (192) | Sep (190) | Oct (143) | Nov (255) | Dec (182) |
| 2018 | Jan (295) | Feb (164) | Mar (113) | Apr (147) | May (64) | Jun (262) | Jul (184) | Aug (90) | Sep (69) | Oct (364) | Nov (102) | Dec (101) |
| 2019 | Jan (119) | Feb (64) | Mar (64) | Apr (102) | May (57) | Jun (154) | Jul (84) | Aug (81) | Sep (76) | Oct (102) | Nov (233) | Dec (89) |
| 2020 | Jan (38) | Feb (170) | Mar (155) | Apr (172) | May (120) | Jun (223) | Jul (461) | Aug (227) | Sep (268) | Oct (113) | Nov (56) | Dec (124) |
| 2021 | Jan (121) | Feb (48) | Mar (334) | Apr (345) | May (207) | Jun (136) | Jul (71) | Aug (112) | Sep (122) | Oct (173) | Nov (184) | Dec (223) |
| 2022 | Jan (197) | Feb (206) | Mar (156) | Apr (212) | May (192) | Jun (170) | Jul (143) | Aug (380) | Sep (182) | Oct (148) | Nov (128) | Dec (269) |
| 2023 | Jan (248) | Feb (196) | Mar (264) | Apr (36) | May (123) | Jun (66) | Jul (120) | Aug (48) | Sep (157) | Oct (198) | Nov (300) | Dec (273) |
| 2024 | Jan (271) | Feb (147) | Mar (207) | Apr (78) | May (107) | Jun (168) | Jul (151) | Aug (51) | Sep (438) | Oct (221) | Nov (302) | Dec (357) |
| 2025 | Jan (451) | Feb (219) | Mar (326) | Apr (232) | May (306) | Jun (181) | Jul (452) | Aug (282) | Sep (620) | Oct (793) | Nov (682) | Dec |
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
| | | | 1 | 2 | 3 (4) | 4 (8) |
| 5 (11) | 6 (5) | 7 (12) | 8 (14) | 9 (6) | 10 (5) | 11 (1) |
| 12 (1) | 13 (15) | 14 (10) | 15 | 16 (20) | 17 (18) | 18 (9) |
| 19 (2) | 20 (27) | 21 (74) | 22 (32) | 23 (9) | 24 (15) | 25 (8) |
| 26 (12) | 27 (32) | 28 (47) | 29 (131) | | | |
| From: David S. <ope...@to...> - 2012-02-18 23:59:29 |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 18/02/12 16:05, Alon Bar-Lev wrote: > Hello, > > We have a go to rewrite the OpenvPN build system. I started to work at > core product [1]. > > As part of the re-write we split out the TAP-Win32 out of OpenVPN code > base. > > To make things go faster we may try to parallelize the effort. > > Here are the tasks to perform: 1. Create a GIT repository of the > master TAP-Win32 sources with all history, to ease our work, please > use github. 2. Detach the TAP-Win32 build from the OpenVPN build. It > should be a simpler build as it now only use the DDK. 3. Rename the > TAP-Win32 to TAP-Windows as we do not need the legacy "Win32" any > more. 4. Rename the TAP common.h into tap-windows.h. 5. Sync > tap-windows.h symbols per [2], I added prefix and removed the "32", > add another header for version information. 6. Create tap nsis > installation (based on current openvpn nsis), the msi must be silent > installation mode enabled. 7. Within installation, add a group "SDK" > or similar to nsis to install the tap-windows.h as well. 8. Create > build script to build and optionally sign the driver and the msi. 9. > Output of build system would be [at least] (msi, tarball) for (win32, > win64). Why tarball? To enable people to fetch files without hacking > the msi (example: cross compile). > > Anyone interested? Need someone experienced with courage! First of all, yes, we are doing some steps now to clean up the source tree and split out the pieces of the OpenVPN source tree which is not strictly purely OpenVPN. The Windows TUN/TAP driver is a generic driver, which OpenVPN needs. But it's not something other platforms than Windows need (they have their own TUN/TAP drivers) and the TUN/TAP driver is useful for other projects. Alon has stepped up and is willing to help with this job. He has on this mailing list shown knowledge about the autotools tool chain and Windows development. I personally am very much thankful that Alon has said himself willing to look into cleaning up these parts of OpenVPN. And I'm looking forward to start reviewing the changes he is suggesting. However, it might be a potential misunderstanding which I will now attempt to straighten up. The TUN/TAP driver *will not* be moved out of the OpenVPN project itself. It will stay in the OpenVPN project as a separate sub-project in its own git tree. The OpenVPN community which I dare to speak on behalf on now, will be in charge also for the Windows TUN/TAP driver. And Alon is right, the OpenVPN project needs more resources with the right knowledge and/or strong willingness to learn that. That/those person(s) will need to be involved with the OpenVPN community as everyone else. And it is the same expectations of anyone who wants to contribute, that all changes will be sent to the mailing list for review. The mailing list is where we share knowledge and learn each others new things. For more information, see the developer pages in the OpenVPN Community wiki [A]. I will make sure that during the next week the pieces Alon moves out gets into new official git trees. If there are any queries regarding to the OpenVPN project, please contact Samuli Seppänen <sa...@op...> or me (da...@us...) and we will answer as best as we can. Kind regards, David Sommerseth > [1] https://github.com/alonbl/openvpn branch build. [2] > https://github.com/alonbl/openvpn/blob/build/include/tap-windows.h [A] <https://community.openvpn.net/openvpn/wiki/DeveloperDocumentation> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk9AO1UACgkQDC186MBRfrpfFwCgp4ZXExr/cY3yUxdkJiTMR5XO Nb4AoKvmTAW7xnua6LW1qvnc0SFd0CUi =f74C -----END PGP SIGNATURE----- |
| From: Karl O. P. <ko...@me...> - 2012-02-18 23:06:35 |
On 02/18/2012 04:53:50 PM, Scott Zeid wrote: > On Feb 18, 2012 9:05 AM, "Alon Bar-Lev" <alo...@gm...> > wrote: > > 9. Output of build system would be [at least] (msi, tarball) for > > (win32, win64). Why tarball? To enable people to fetch files > without > > hacking the msi (example: cross compile). > > It should probably be a zip file since Windows doesn't support > tarballs out > of the box. I'm not a MS guy, but that argument does not carry a whole lot of weight since MS Windows does not support NSIS, or any other sort of installer-crafter, out of the box either; and people should be using an installer to install, not archived binaries in whatever format. It almost makes sense to make it harder for the casual MS user to try to install using the raw binaries. Bikeshed argument flag! In the end, it does not matter. Karl <ko...@me...> Free Software: "You don't pay back, you pay forward." -- Robert A. Heinlein |
| From: Scott Z. <s...@sr...> - 2012-02-18 22:53:56 |
On Feb 18, 2012 9:05 AM, "Alon Bar-Lev" <alo...@gm...> wrote: > 9. Output of build system would be [at least] (msi, tarball) for > (win32, win64). Why tarball? To enable people to fetch files without > hacking the msi (example: cross compile). It should probably be a zip file since Windows doesn't support tarballs out of the box. |
| From: Karl O. P. <ko...@me...> - 2012-02-18 22:42:28 |
On 02/18/2012 09:05:16 AM, Alon Bar-Lev wrote: > Hello, > > We have a go to rewrite the OpenvPN build system. > 9. Output of build system would be [at least] (msi, tarball) for > (win32, win64). Why tarball? To enable people to fetch files without > hacking the msi (example: cross compile). I'd like to second the motion to produce a MS tarball. People who want only to produce a custom OpenVPN installer, such as the recent thread here regarding packaging OpenVPN in conjunction with an SSL obfuscation proxy, should not also have to go to the trouble to produce OpenVPN binaries. People should instead be able to rely on the OpenVPN project for high-quality prebuilt binaries suitable for repackaging into a customized installer. Karl <ko...@me...> Free Software: "You don't pay back, you pay forward." -- Robert A. Heinlein |
| From: Heiko H. <hei...@so...> - 2012-02-18 20:00:24 |
The _access and _waccess functions in Windows don't know about X_OK (1). If you pass an uneven mode flag the C runtime's default invalid parameter handler ends execution of openvpn. Signed-off-by: Heiko Hund <hei...@so...> --- win/config.h.in | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/win/config.h.in b/win/config.h.in index b5c31b8..fcb8d6c 100644 --- a/win/config.h.in +++ b/win/config.h.in @@ -243,7 +243,7 @@ typedef unsigned long in_addr_t; #endif #ifndef X_OK -#define X_OK 1 +#define X_OK 0 #endif #ifndef F_OK -- 1.7.5.4 |
| From: Alon Bar-L. <alo...@gm...> - 2012-02-18 15:05:27 |
Hello, We have a go to rewrite the OpenvPN build system. I started to work at core product [1]. As part of the re-write we split out the TAP-Win32 out of OpenVPN code base. To make things go faster we may try to parallelize the effort. Here are the tasks to perform: 1. Create a GIT repository of the master TAP-Win32 sources with all history, to ease our work, please use github. 2. Detach the TAP-Win32 build from the OpenVPN build. It should be a simpler build as it now only use the DDK. 3. Rename the TAP-Win32 to TAP-Windows as we do not need the legacy "Win32" any more. 4. Rename the TAP common.h into tap-windows.h. 5. Sync tap-windows.h symbols per [2], I added prefix and removed the "32", add another header for version information. 6. Create tap nsis installation (based on current openvpn nsis), the msi must be silent installation mode enabled. 7. Within installation, add a group "SDK" or similar to nsis to install the tap-windows.h as well. 8. Create build script to build and optionally sign the driver and the msi. 9. Output of build system would be [at least] (msi, tarball) for (win32, win64). Why tarball? To enable people to fetch files without hacking the msi (example: cross compile). Anyone interested? Need someone experienced with courage! Alon. [1] https://github.com/alonbl/openvpn branch build. [2] https://github.com/alonbl/openvpn/blob/build/include/tap-windows.h |
| From: Frank de B. <deb...@gm...> - 2012-02-18 06:37:26 |
I totally agree on not ACKing the patch and your solution description ;-) I tried to start a discussion on IRC about the preferred solution before sending this patch, but that didn't get very far. Op 17 februari 2012 22:58 heeft Gert Doering <ge...@gr...> het volgende geschreven: > Hi, > > On Fri, Feb 17, 2012 at 10:04:50PM +0100, Frank de Brabander wrote: >> This causes compiler warnings when using Clang instead of default GCC. > > I'm not particularily interested in source code fixes "just to silence > a compiler warning" - but Clang is right, of course, that this variable > cannot ever be negative, and thus it should be cleaned up :-) > > I'm not ACKing this patch anyway, because I think the issue is bigger - I > want to look at the IPv4 code paths and see whether the IPv4 "netbits" > structure element can ever be negative - and if yes, figure out whether > this should be possible for IPv6, and if not, convert the IPv4 netbits > to "unsigned int" as well, and get rid of the if() statement there as > well. > > Thanks for reporting this. I'll look into it. > > gert > > -- > USENET is *not* the non-clickable part of WWW! > //www.muc.de/~gert/ > Gert Doering - Munich, Germany ge...@gr... > fax: +49-89-35655025 ge...@ne... |
| From: awgh <aw...@aw...> - 2012-02-18 01:19:14 |
Hello Jun! I have spent the last couple of days preparing a bundled installer for the Tor Obfuscation Proxy combined with OpenVPN. The installer currently works on 32-bit and 64-bit Windows. It simply installs obfsproxy in SOCKS proxy mode and sets it up as a Windows service, so it starts at boot. The goal is to make this an automatic install for both clients and servers. To convert an existing OpenVPN profile to use the obfsproxy, you simply change the destination port of your remote line to point at the obfuscated server port instead of the regular OpenVPN server port: BEFORE: remote my.server.com 443 AFTER: remote my.server.com 80 (assuming obfsproxy server is listening on 80) Then, you just set OpenVPN to use a socks proxy by adding these lines to you config file: socks-proxy-retry socks-proxy 127.0.0.1 1050 After this, when you initiate the OpenVPN connection, it will use obfsproxy as a SOCKS proxy. Just remember to connect to the obfsproxy port on the server, not the OpenVPN port, in your client config and it works great! A couple of important notes: 1) I have only tested this with TCP mode. I don't expect UDP to work through Socks proxy, but haven't yet tried it. 2) Once, obfsproxy died on me and I had to go to Control Panel->Administrative Tools->Services and restart the obfsproxy service. This seems to be a one-time crash, though. The Windows Installer is available here: http://awgh.org/files/obfsvpn-installer-0_0_1.exe You can build it yourself by checking out the project on bitbucket here: https://bitbucket.org/awgh/obfsproxy-windows-installer I am also working on init scripts and packages for Linux distros, which can be used for both the client side and server side of an obfsproxy connection. So far, I just have CentOS RPMs and init scripts, which are available in this project: https://bitbucket.org/awgh/obfsproxy-rpm-build I am planning on adding some additional features to the installer bundle, to allow the configuration of shared secrets and the importation of existing config files. Please feel free to either email me with bugs/feature requests or to use the issue tracking on bitbucket! Hope this will be useful to some of you. Best Regards, - Ben > -------- Original Message -------- > Subject: Re: [Openvpn-devel] Obfuscation for Iran SSL blocking > Date: Thu, 16 Feb 2012 15:01:45 +0200 > From: Samuli Seppänen< sa...@op...> > Organization: OpenVPN Technologies, Inc > To: Jun Matsushita< ju...@gm...> > CC: David Sommerseth< ope...@to...>, > " ope...@li..." > < ope...@li...> > > > > > Hi Jun, > > I would try David's obfsproxy + OpenVPN suggestion first and reconsider > if that fails. > If we would add obfuscation into OpenVPN itself, we'd soon be in the > same cat and mouse game as Tor, with the exception we don't have the > same amount of developer interest to follow it through. So, I think > keeping the obfuscation functionality would be challenging in the long > run. > > * Unknown Key > * 0xA036E792(L) > > |
| From: awgh <aw...@aw...> - 2012-02-18 01:18:36 |
Hello Jun! I have spent the last couple of days preparing a bundled installer for the Tor Obfuscation Proxy combined with OpenVPN. The installer currently works on 32-bit and 64-bit Windows. It simply installs obfsproxy in SOCKS proxy mode and sets it up as a Windows service, so it starts at boot. The goal is to make this an automatic install for both clients and servers. To convert an existing OpenVPN profile to use the obfsproxy, you simply change the destination port of your remote line to point at the obfuscated server port instead of the regular OpenVPN server port: BEFORE: remote my.server.com 443 AFTER: remote my.server.com 80 (assuming obfsproxy server is listening on 80) Then, you just set OpenVPN to use a socks proxy by adding these lines to you config file: socks-proxy-retry socks-proxy 127.0.0.1 1050 After this, when you initiate the OpenVPN connection, it will use obfsproxy as a SOCKS proxy. Just remember to connect to the obfsproxy port on the server, not the OpenVPN port, in your client config and it works great! A couple of important notes: 1) I have only tested this with TCP mode. I don't expect UDP to work through Socks proxy, but haven't yet tried it. 2) Once, obfsproxy died on me and I had to go to Control Panel->Administrative Tools->Services and restart the obfsproxy service. This seems to be a one-time crash, though. The Windows Installer is available here: http://awgh.org/files/obfsvpn-installer-0_0_1.exe You can build it yourself by checking out the project on bitbucket here: https://bitbucket.org/awgh/obfsproxy-windows-installer I am also working on init scripts and packages for Linux distros, which can be used for both the client side and server side of an obfsproxy connection. So far, I just have CentOS RPMs and init scripts, which are available in this project: https://bitbucket.org/awgh/obfsproxy-rpm-build I am planning on adding some additional features to the installer bundle, to allow the configuration of shared secrets and the importation of existing config files. Please feel free to either email me with bugs/feature requests or to use the issue tracking on bitbucket! Hope this will be useful to some of you. Best Regards, - Ben > -------- Original Message -------- > Subject: Re: [Openvpn-devel] Obfuscation for Iran SSL blocking > Date: Thu, 16 Feb 2012 15:01:45 +0200 > From: Samuli Seppänen< sa...@op...> > Organization: OpenVPN Technologies, Inc > To: Jun Matsushita< ju...@gm...> > CC: David Sommerseth< ope...@to...>, > " ope...@li..." > < ope...@li...> > > > > > Hi Jun, > > I would try David's obfsproxy + OpenVPN suggestion first and reconsider > if that fails. > If we would add obfuscation into OpenVPN itself, we'd soon be in the > same cat and mouse game as Tor, with the exception we don't have the > same amount of developer interest to follow it through. So, I think > keeping the obfuscation functionality would be challenging in the long > run. > > * Unknown Key > * 0xA036E792(L) > > |