Path to this page:
./
net/openvpn,
Easy-to-use SSL VPN daemon
Branch: CURRENT,
Version: 2.6.12nb3,
Package name: openvpn-2.6.12nb3,
Maintainer: pkgsrc-usersOpenVPN is a robust and highly flexible tunneling application
that uses all of the encryption, authentication, and certification
features of the OpenSSL library to securely tunnel IP networks over
a single TCP/UDP port.
Required to run:[
archivers/lzo] [
security/openssl] [
archivers/lz4]
Required to build:[
pkgtools/cwrappers]
Master sites:
Filesize: 1867.578 KB
Version history: (Expand)
- (2024-11-15) Updated to version: openvpn-2.6.12nb3
- (2024-11-01) Updated to version: openvpn-2.6.12nb2
- (2024-11-01) Updated to version: openvpn-2.6.12nb1
- (2024-07-18) Updated to version: openvpn-2.6.12
- (2024-06-21) Updated to version: openvpn-2.6.11
- (2024-05-29) Updated to version: openvpn-2.6.10nb2
CVS history: (Expand)
2024-03-20 20:24:02 by Adam Ciarcinski | Files touched by this commit (5) | |
Log message:
openvpn: updated to 2.6.10
Version 2.6.10
Christoph Schug (1):
Update documentation references in systemd unit files
Frank Lichtenheld (6):
Fix typo --data-cipher-fallback
samples: Remove tls-*.conf
check_compression_settings_valid: Do not test for LZ4 in LZO check
t_client.sh: Allow to skip tests
Update Copyright statements to 2024
GHA: general update March 2024
Lev Stipakov (4):
win32: Enforce loading of plugins from a trusted directory
interactive.c: disable remote access to the service pipe
interactive.c: Fix potential stack overflow issue
Disable DCO if proxy is set via management
Martin Rys (1):
openvpn-[client|server].service: Remove syslog.target
Max Fillinger (1):
Remove license warning from README.mbedtls
Selva Nair (1):
Document that auth-user-pass may be inlined
wellweek (1):
remove repetitive words in documentation and comments
|
2024-02-13 20:33:29 by Greg Troxel | Files touched by this commit (2) |
Log message:
net/openvpn: Update to 2.6.9
Upstream NEWS: bug fixes
|
2023-11-18 13:51:20 by Greg Troxel | Files touched by this commit (6) |
Log message:
net/openvpn: Update to 2.6.8
upstream NEWS: bugfixes
|
2023-11-10 01:17:47 by Greg Troxel | Files touched by this commit (8) |
Log message:
net/openvpn: Update to 2.6.7
Upstream NEWS:
Security Fixes:
* CVE-2023-46850 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly use a send \
buffer after
it has been free()d in some circumstances, causing some free()d memory to be \
sent to the peer.
All configurations using TLS (e.g. not using --secret) are affected by this issue.
(found while tracking down CVE-2023-46849 / Github #400, #417)
* CVE-2023-46849 OpenVPN versions between 2.6.0 and 2.6.6 incorrectly restore \
--fragment configuration
in some circumstances, leading to a division by zero when --fragment is used. \
On platforms where
division by zero is fatal, this will cause an OpenVPN crash.(Github #400, #417).
User visible changes:
* DCO: warn if DATA_V1 packets are sent by the other side - this a hard \
incompatibility between
a 2.6.x client connecting to a 2.4.0-2.4.4 server, and the only fix is to use \
--disable-dco.
* Remove OpenSSL Engine method for loading a key. This had to be removed because \
the original author
did not agree to relicensing the code with the new linking exception added. \
This was a somewhat
obsolete feature anyway as it only worked with OpenSSL 1.x, which is end-of-support.
* add warning if p2p NCP client connects to a p2mp server - this is a \
combination that used to work
without cipher negotiation (pre 2.6 on both ends), but would fail in \
non-obvious ways with 2.6 to 2.6.
* add warning to --show-groups that not all supported groups are listed (this is
due the internal enumeration in OpenSSL being a bit weird, omitting X448 and \
X25519 curves).
* --dns: remove support for exclude-domains argument (this was a new 2.6 option,
with no backend support implemented yet on any platform, and it turns out that
no platform supported it at all - so remove option again)
* warn user if INFO control message too long, do not forward to management client
(safeguard against protocol-violating server implementations)
New features:
* DCO-WIN: get and log driver version (for easier debugging).
* print "peer temporary key details" in TLS handshake
* log OpenSSL errors on failure to set certificate, for example if the \
algorithms used
are in acceptable to OpenSSL (misleading message would be printed in cryptoapi \
/ pkcs11 scenarios)
* add CMake build system for MinGW and MSVC builds
* remove old MSVC build system
* improve cmocka unit test building for Windows
|
2023-11-08 14:21:43 by Thomas Klausner | Files touched by this commit (2377) |
Log message:
*: recursive bump for icu 74.1
|
2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298) |
Log message:
*: bump for openssl 3
|
2023-08-26 16:21:42 by Greg Troxel | Files touched by this commit (2) |
Log message:
net/openvpn: Update to 2.6.6
upstream change summary:
New features
------------
- set WINS server via interactive service - this adds support for
"dhcp-option WINS 192.0.2.1" for DCO + wintun interfaces where no
DHCP server is used (Github #373).
|
2023-06-17 11:57:07 by Greg Troxel | Files touched by this commit (2) |
Log message:
net/openvpn: Update to 2.6.5
Upstream changes are bugfixes and minor improvements
|