You can subscribe to this list here.
| 2002 | Jan | Feb | Mar | Apr (24) | May (14) | Jun (29) | Jul (33) | Aug (3) | Sep (8) | Oct (18) | Nov (1) | Dec (10) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 | Jan (3) | Feb (33) | Mar (7) | Apr (28) | May (30) | Jun (5) | Jul (10) | Aug (7) | Sep (32) | Oct (41) | Nov (20) | Dec (10) |
| 2004 | Jan (24) | Feb (18) | Mar (57) | Apr (40) | May (55) | Jun (48) | Jul (77) | Aug (15) | Sep (56) | Oct (80) | Nov (74) | Dec (52) |
| 2005 | Jan (38) | Feb (42) | Mar (39) | Apr (56) | May (79) | Jun (73) | Jul (16) | Aug (23) | Sep (68) | Oct (77) | Nov (52) | Dec (27) |
| 2006 | Jan (27) | Feb (18) | Mar (51) | Apr (62) | May (28) | Jun (50) | Jul (36) | Aug (33) | Sep (47) | Oct (50) | Nov (77) | Dec (13) |
| 2007 | Jan (15) | Feb (8) | Mar (14) | Apr (18) | May (25) | Jun (16) | Jul (16) | Aug (19) | Sep (32) | Oct (17) | Nov (5) | Dec (5) |
| 2008 | Jan (64) | Feb (25) | Mar (25) | Apr (6) | May (28) | Jun (20) | Jul (10) | Aug (27) | Sep (28) | Oct (59) | Nov (37) | Dec (43) |
| 2009 | Jan (40) | Feb (25) | Mar (12) | Apr (57) | May (46) | Jun (29) | Jul (39) | Aug (10) | Sep (20) | Oct (42) | Nov (50) | Dec (57) |
| 2010 | Jan (82) | Feb (165) | Mar (256) | Apr (260) | May (36) | Jun (87) | Jul (53) | Aug (89) | Sep (107) | Oct (51) | Nov (88) | Dec (117) |
| 2011 | Jan (69) | Feb (60) | Mar (113) | Apr (71) | May (67) | Jun (90) | Jul (88) | Aug (90) | Sep (48) | Oct (64) | Nov (69) | Dec (118) |
| 2012 | Jan (49) | Feb (528) | Mar (351) | Apr (190) | May (238) | Jun (193) | Jul (104) | Aug (100) | Sep (57) | Oct (41) | Nov (47) | Dec (51) |
| 2013 | Jan (94) | Feb (57) | Mar (96) | Apr (105) | May (77) | Jun (102) | Jul (27) | Aug (81) | Sep (32) | Oct (53) | Nov (127) | Dec (65) |
| 2014 | Jan (113) | Feb (59) | Mar (104) | Apr (259) | May (70) | Jun (70) | Jul (146) | Aug (45) | Sep (58) | Oct (149) | Nov (77) | Dec (83) |
| 2015 | Jan (53) | Feb (66) | Mar (86) | Apr (50) | May (135) | Jun (76) | Jul (151) | Aug (83) | Sep (97) | Oct (262) | Nov (245) | Dec (231) |
| 2016 | Jan (131) | Feb (233) | Mar (97) | Apr (138) | May (221) | Jun (254) | Jul (92) | Aug (248) | Sep (168) | Oct (275) | Nov (477) | Dec (445) |
| 2017 | Jan (218) | Feb (217) | Mar (146) | Apr (172) | May (216) | Jun (252) | Jul (164) | Aug (192) | Sep (190) | Oct (143) | Nov (255) | Dec (182) |
| 2018 | Jan (295) | Feb (164) | Mar (113) | Apr (147) | May (64) | Jun (262) | Jul (184) | Aug (90) | Sep (69) | Oct (364) | Nov (102) | Dec (101) |
| 2019 | Jan (119) | Feb (64) | Mar (64) | Apr (102) | May (57) | Jun (154) | Jul (84) | Aug (81) | Sep (76) | Oct (102) | Nov (233) | Dec (89) |
| 2020 | Jan (38) | Feb (170) | Mar (155) | Apr (172) | May (120) | Jun (223) | Jul (461) | Aug (227) | Sep (268) | Oct (113) | Nov (56) | Dec (124) |
| 2021 | Jan (121) | Feb (48) | Mar (334) | Apr (345) | May (207) | Jun (136) | Jul (71) | Aug (112) | Sep (122) | Oct (173) | Nov (184) | Dec (223) |
| 2022 | Jan (197) | Feb (206) | Mar (156) | Apr (212) | May (192) | Jun (170) | Jul (143) | Aug (380) | Sep (182) | Oct (148) | Nov (128) | Dec (269) |
| 2023 | Jan (248) | Feb (196) | Mar (264) | Apr (36) | May (123) | Jun (66) | Jul (120) | Aug (48) | Sep (157) | Oct (198) | Nov (300) | Dec (273) |
| 2024 | Jan (271) | Feb (147) | Mar (207) | Apr (78) | May (107) | Jun (168) | Jul (151) | Aug (51) | Sep (438) | Oct (221) | Nov (302) | Dec (357) |
| 2025 | Jan (451) | Feb (219) | Mar (326) | Apr (232) | May (306) | Jun (181) | Jul (452) | Aug (282) | Sep (620) | Oct (793) | Nov (682) | Dec |
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
| | | | | | | 1 (4) |
| 2 (3) | 3 | 4 (4) | 5 (1) | 6 (1) | 7 | 8 (3) |
| 9 | 10 (5) | 11 (11) | 12 (7) | 13 | 14 | 15 (2) |
| 16 | 17 | 18 | 19 | 20 | 21 | 22 |
| 23 | 24 (8) | 25 (5) | 26 (8) | 27 (5) | 28 | 29 (2) |
| 30 (4) | 31 (10) | | | | | |
| From: Steffan K. <st...@ka...> - 2015-08-25 22:29:25 |
As reported by Bill Parker in trac #600, strdup() return values are not always correctly checked for failed allocations. This patch adds missing checks. Note that in misc.c and options.c, the check is after the dirname() or basename() call, because these can deal with NULL params and we need to keep MSVC happy with its ancient no-declaration-after-statement policy. Signed-off-by: Steffan Karger <st...@ka...> --- src/openvpn/cryptoapi.c | 1 + src/openvpn/init.c | 1 + src/openvpn/misc.c | 1 + src/openvpn/options.c | 1 + src/openvpn/ssl_polarssl.c | 1 + 5 files changed, 5 insertions(+) diff --git a/src/openvpn/cryptoapi.c b/src/openvpn/cryptoapi.c index b7fc11e..62f30be 100644 --- a/src/openvpn/cryptoapi.c +++ b/src/openvpn/cryptoapi.c @@ -127,6 +127,7 @@ static char *ms_error_text(DWORD ms_err) break; } } + check_malloc_return(rv); return rv; } diff --git a/src/openvpn/init.c b/src/openvpn/init.c index b7c153b..0809cc7 100644 --- a/src/openvpn/init.c +++ b/src/openvpn/init.c @@ -817,6 +817,7 @@ init_options_dev (struct options *options) { if (!options->dev && options->dev_node) { char *dev_node = strdup(options->dev_node); /* POSIX basename() implementaions may modify its arguments */ + check_malloc_return(dev_node); options->dev = basename (dev_node); } } diff --git a/src/openvpn/misc.c b/src/openvpn/misc.c index a5bad0d..b543b65 100644 --- a/src/openvpn/misc.c +++ b/src/openvpn/misc.c @@ -1608,6 +1608,7 @@ argv_extract_cmd_name (const char *path) { char *path_cp = strdup(path); /* POSIX basename() implementaions may modify its arguments */ const char *bn = basename (path_cp); + check_malloc_return(path_cp); if (bn) { char *ret = string_alloc (bn, NULL); diff --git a/src/openvpn/options.c b/src/openvpn/options.c index 2784580..dba7c9d 100644 --- a/src/openvpn/options.c +++ b/src/openvpn/options.c @@ -2588,6 +2588,7 @@ check_file_access(const int type, const char *file, const int mode, const char * { char *fullpath = strdup(file); /* POSIX dirname() implementaion may modify its arguments */ char *dirpath = dirname(fullpath); + check_malloc_return(fullpath); if (platform_access (dirpath, mode|X_OK) != 0) errcode = errno; diff --git a/src/openvpn/ssl_polarssl.c b/src/openvpn/ssl_polarssl.c index 3fc811e..673dbbe 100644 --- a/src/openvpn/ssl_polarssl.c +++ b/src/openvpn/ssl_polarssl.c @@ -198,6 +198,7 @@ tls_ctx_restrict_ciphers(struct tls_root_ctx *ctx, const char *ciphers) /* Parse allowed ciphers, getting IDs */ i = 0; tmp_ciphers_orig = tmp_ciphers = strdup(ciphers); + check_malloc_return(tmp_ciphers); token = strtok (tmp_ciphers, ":"); while(token) -- 2.1.4 |
| From: Gert D. <ge...@gr...> - 2015-08-25 12:05:02 |
Hi, On Tue, Aug 25, 2015 at 02:38:20AM -0400, grarpamp wrote: > Cert serial numbers found in the wild are hardly unique (witness They are not "in the wild" in this context, as the issueing CA in OpenVPN contexts is typically in-house - and serial numbers for certs issued by a single CA(!) *are* unique. If the cert cannot be verified at all (not revoked, but "issued by another CA" or "not signed at all"), I agree, the serial number does not carry meaningful information - but this is not the case this patch is about. gert -- USENET is *not* the non-clickable part of WWW! //www.muc.de/~gert/ Gert Doering - Munich, Germany ge...@gr... fax: +49-89-35655025 ge...@ne... |
| From: Boris L. <lyt...@ya...> - 2015-08-25 07:13:13 |
Hi. I disagree. And openssl crl disagrees with you too. There are no sha1 (or other) fingerprints there, serial numbers are stored there :) As far as I understand in most of the cases where X509 is used for OpenVPN, single (mostly probable self-signed) CA is used for authentication so serial number should be sane enough to understand which is which. Anyway, feel free to add sha1 (you name it) fingerprint additionally to my patch - more information on the cause of denial of connection the better. On 25.08.2015 9:38, grarpamp wrote: > On Mon, Aug 24, 2015 at 12:54 PM, Boris Lytochkin > <lyt...@ya...> wrote: >> Log serial number of revoked certificate >> In most of situations admin of OpenVPN server needs to know which particular >> certificate is used by client. > Cert serial numbers found in the wild are hardly unique (witness > the Mozilla CA bundle), thus no one with a sane mind refers to them > as identifiers, nor do libraries/apps use them for things like cert pinning, > nor should people be encouraged to think they are unique (even though > there may now be some spec for that, but history precedes). The only place > they'd have meaning is as text string for the local issuer, but it's really just > duplication of work. > The sha1 (or better) fingerprint of the cert should be used instead. > > ------------------------------------------------------------------------------ > _______________________________________________ > Openvpn-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/openvpn-devel -- Boris Lytochkin Yandex NOC +7 (495) 739 70 00 ext. 7671 |
| From: grarpamp <gra...@gm...> - 2015-08-25 06:38:47 |
On Mon, Aug 24, 2015 at 12:54 PM, Boris Lytochkin <lyt...@ya...> wrote: > Log serial number of revoked certificate > In most of situations admin of OpenVPN server needs to know which particular > certificate is used by client. Cert serial numbers found in the wild are hardly unique (witness the Mozilla CA bundle), thus no one with a sane mind refers to them as identifiers, nor do libraries/apps use them for things like cert pinning, nor should people be encouraged to think they are unique (even though there may now be some spec for that, but history precedes). The only place they'd have meaning is as text string for the local issuer, but it's really just duplication of work. The sha1 (or better) fingerprint of the cert should be used instead. |
| From: Jiri H. <jir...@gm...> - 2015-08-25 06:22:25 |
Hi Gert, thanks for clarifying this. Cheers Jirka H. On 08/24/2015 11:10 PM, Gert Doering wrote: > Hi, > > On Mon, Aug 24, 2015 at 09:17:44PM +0200, Jiri Horky wrote: >> thanks for the information. I see you effectively increased the size to >> 1.2k which, as far as I know, will not work for people with dial ups. > If that wouldn't work, openvpn data transfers would not work either - but > surprisingly, they do :-) - data packets are 1500+ bytes in size, unless > specifically told (--link-mtu) to be smaller. We do cap the control channel > MTU to a smaller value to give particularily broken setups (like, 1400 MTU > *and* broken fragments) the chance to push smaller --link-mtu from the > server. > > "Dial-Up", per se, does not imply a smaller-than-1500 MTU - some folks > do that, for "performance reasons" (reducing MTU actually reduces > performance, as it increases TCP overhead, but what do I know against > glossy computer magazine advice...), but even a 574 byte MTU will still > work *if* fragmentation works. > > Which it normally does in this combination - fragmentation tends to break > if stupid NAT routers are involved, but "dialup with modem links and > 574 mtu" is usually not connected to a NAT router but modem->PC... > > But as I said - I'm waiting for feedback. > > gert > |