62 Commits

Author SHA1 Message Date
jca
8f171b722a Update to openvpn-2.5.8
ChangeLog:
https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn25
2022-11-06 17:18:01 +00:00
jca
8852f15025 Update to openvpn-2.5.7
Build tested on amd64, arm64 (thx tb@) and riscv64.
Runtime tested on amd64.
2022-06-09 12:31:13 +00:00
jca
12f2d9061f SECURITY update to openvpn-2.5.6
Fix for CVE-2022-0547 "Disallow multiple deferred authentication plug-ins."
https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn25
2022-03-19 22:21:58 +00:00
jca
cd0fba1ff1 Drop RCS Ids in the ports I maintain 2022-03-10 00:04:05 +00:00
jca
189c8b8612 Update to openvpn-2.5.5 2021-12-16 13:06:44 +00:00
jca
ea16b07a9c Update to openvpn-2.5.4
ChangeLog:
https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn25
2021-10-09 15:36:06 +00:00
jca
f07623d8aa Update to openvpn-2.5.1 2021-03-02 10:39:38 +00:00
jca
473ea931dc Update to openvpn-2.5.0
This update drops the default fallback to BF-CBC with older clients.
See https://openvpn.net/community-downloads/ for a list of details.

2.5.0-rcN test reports from gonzalo@
2020-11-02 22:49:17 +00:00
jca
19867e48cf SECURITY update to openvpn-2.4.9
Fix for CVE-2020-11810

Changes:
https://github.com/OpenVPN/openvpn/blob/release/2.4/Changes.rst#version-249
https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24#OpenVPN2.4.9
2020-04-21 23:43:55 +00:00
jca
27ba9cabc4 Update to openvpn-2.4.8
Release notes:
https://openvpn.net/download/openvpn-2-4-8-released-on-2019-10-31/

Successful test report from gonzalo@ aside from my own testing.
2019-11-05 17:53:17 +00:00
sthen
49adee401a OpenVPN announced that it was sending three addresses in the route socket
messages to lookup the default gateway (RTA_DST | RTA_NETMASK | RTA_IFP),
but did not actually send RTA_IFP. This is caught by the recently added
check in sys/net/rtsock.c r1.284 causing a failure. Remove RTA_IFP from
rtm_addrs to unbreak. Help/ok bluhm@, ok jca@.
2019-04-05 06:56:00 +00:00
jca
c35744bdca Fix memory leak, unused variable pointed out by the compiler 2019-02-21 23:41:12 +00:00
jca
b1ebcec12a Update to openvpn-2.4.7
Adds TLSv1.3 support, not supported by LibreSSL yet.
#ifdef OPENSSL_DEFINES_MAZE proofread by and ok tb@
2019-02-21 23:32:23 +00:00
jca
29fb757b18 Update to openvpn-2.4.6
ok gonzalo@
2018-04-24 17:32:43 +00:00
jca
2fd0de64d8 Add a temporary workaround, snaps don't ship the latest ssl.h yet. 2018-03-05 22:45:24 +00:00
jca
5dba73d084 Update to openvpn-2.4.5
Tested by Jiri B. and myself.

NB: this needs a recent ssl.h
2018-03-04 19:03:00 +00:00
jca
9b9ee90826 Pushed upstream 2017-11-05 01:09:28 +00:00
jca
18a679f3df Correctly print time_t, fixes a crash on arm (and probably i386) 2017-10-18 18:41:45 +00:00
jca
9ba97f6bee SECURITY update to openvpn-2.4.4
Among other changes, fix for

o CVE-2017-12166: out of bounds write in key-method 1
  https://community.openvpn.net/openvpn/wiki/CVE-2017-12166

ok sthen@
2017-09-29 16:36:23 +00:00
jca
a2403ca8e7 SECURITY update to openvpn-2.4.3
Fixes for:
- CVE-2017-7508 Remotely-triggerable ASSERT() on malformed IPv6 packet
- CVE-2017-7520 Pre-authentication remote crash/information disclosure
  for clients
- CVE-2017-7521 Potential double-free in --x509-alt-username
- CVE-2017-7512 Remote-triggerable memory leaks
- CVE-2017-7522 Post-authentication remote DoS when using
  the --x509-track option
- Null-pointer dereference in establish_http_proxy_passthru()

Full description at
https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243

This update kills some of our patches that were committed upstream.
Similar diff proposed by pirofti@, ok pirofti@ stsp@
2017-06-21 12:51:08 +00:00
jca
acedfd1692 Pushed upstream. 2017-06-11 12:15:50 +00:00
jca
d372ba1d90 Add support for non-0 routing tables
Patch from Steven McDonald, already committed upstream.
2017-05-21 16:12:43 +00:00
jca
c750a780c9 openvpn-plugin.h now makes use of size_t, so include stddef.h
Unbreaks openvpn-auth-ldap.  Reported by naddy@
2017-05-15 14:30:56 +00:00
danj
8528c2492a Security update to openvpn-2.4.2
OK gonzalo@ jca@ (maitainer)
2017-05-14 16:43:33 +00:00
stsp
63ba77727a Fix unaligned access in openvpn to unbreak it on sparc64 and such platforms.
ok jca@ uwe@
2017-04-16 20:14:17 +00:00
jca
db7b1ffac3 Update to openvpn-2.4.1
ok danj@
2017-03-28 22:16:37 +00:00
kurt
ff1a692232 Add missing header to fix this message in the log:
NOTE: setsockopt TCP_NODELAY=1 failed (No kernel support)
okay jca@
2017-02-16 21:16:55 +00:00
jca
0720b0eab1 Update to openvpn-2.4.0
Lots of new features and changes, see

  https://github.com/OpenVPN/openvpn/blob/master/Changes.rst

Tests by danj@ and Bryan Linton, ok danj@
2017-02-06 10:22:35 +00:00
jca
458f27b328 Update to openvpn-2.3.14
Kill most of our tun patches go away in the process.
2016-12-18 18:58:01 +00:00
jca
5acccec629 Update to openvpn-2.3.13
ChangeLog at https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23

ok sthen@ (maintainer)
2016-11-29 09:22:02 +00:00
jca
147a8db288 Add a hack for topology subnet setups and bump REVISION.
Previously route insertion failed with ELOOP because the gateway wasn't
directly connected.

ok sthen@
2016-11-18 16:21:44 +00:00
jca
6da368ecef Add support for on-link routes.
ok sthen@
2016-11-18 16:18:52 +00:00
jca
090e506629 We have gcc >= 3 on all platforms now. 2016-11-18 16:17:58 +00:00
sthen
402475cd62 update to openvpn-2.3.11 2016-05-14 13:14:46 +00:00
sthen
3bd9321a86 update to openvpn-2.3.10
patch for OPENSSL_VERSION_NUMBER check
2016-01-06 11:03:21 +00:00
sthen
6d6b942d3e update to openvpn-2.3.9 2015-12-18 02:17:45 +00:00
sthen
24848258fb Adjust OpenVPN following the split of tun(4)'s "link0" mode into tap(4). 2015-10-23 15:10:36 +00:00
sthen
748fa28250 fix mis-merge in previous, had a link0 which should have been -link0 2015-09-16 09:07:30 +00:00
sthen
a489604d37 Consolidate OpenVPN's ifconfig tun handling for NetBSD/OpenBSD. noop for now,
makes it easier to understand tun/tap handling. Thanks Ralf Hortsmann and
Johan Huldtgren for testing.
2015-09-16 08:45:15 +00:00
sthen
a14f2f481a update to openvpn-2.3.8 2015-09-08 19:10:55 +00:00
sthen
94101c9c79 update to openvpn-2.3.7
https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23
2015-06-25 08:46:49 +00:00
sthen
f2c79a6724 update to OpenVPN 2.3.6, fixing some assertion crashes (DoS)
new version pointed out by dhill
2014-12-01 21:43:39 +00:00
sthen
36f9ce8fc1 update to openvpn 2.3.5, also tested by Mattieu Baptiste, thanks! 2014-11-18 16:18:56 +00:00
sthen
2d15118f43 Fix mis-merge in last commit, restoring some route operations which got broken.
Thanks to Mattieu Baptiste for reporting the problem and testing the fix.
2014-10-21 17:55:11 +00:00
sthen
429633c786 update to openvpn-2.3.4 2014-10-10 21:07:07 +00:00
bluhm
ecc8a9c2f8 OpenVPN copies part of the net/route.h header file into their route.c
source file.  They cannot include it, because the kernel route
structure has a name conflict with the openvpn route structure.
The obvious solution is to rename the openvpn route.  According to
the sources, NetBSD and FreeBSD and Dragonfly also suffer from that.

This change is needed for an upcoming routing message change.  We
do not want to patch the port each time when we change the system
header file.

Test and OK sthen@
2013-10-21 09:15:06 +00:00
sthen
5d78d4f161 Reinstate route.c patch, lost in the update to 2.3.1 where upstream rearranged
files. Found the hard way by, and diff from, Yoshihisa Matsushita.
2013-05-01 15:40:33 +00:00
sthen
2058adb213 remove the (minimal) rtable support; shortly after it was added to the
OpenVPN port, "exec" was added to route(8) which provides the same support
in a more general way. use a command like this instead:

"route -T <table#> exec openvpn -daemon ..."
2013-04-23 09:31:33 +00:00
sthen
1ce4070bea update to OpenVPN 2.31, from Bjorn Ketelaars, maintainer timeout 2013-04-20 16:22:55 +00:00
sthen
61fe1a9218 Teach OpenVPN to use a specific ifconfig command for "topology subnet"
rather than defaulting to a bogus one which enables link0. From Mitja Muzenic.
2012-01-23 18:07:21 +00:00