Browse code

White-list pull-filter and script-security in interactive service

This allows the Windows GUI to use these options on the command
line without triggering user authorization errors.

Useful for
(i) ignoring certain pushed options such as "route-method" which
could otherwise bypass the interactive service
(ii) enforcing a safer script-security setting from the GUI

See also:
https://github.com/OpenVPN/openvpn-gui/issues/235#issuecomment-456142928

Signed-off-by: Selva Nair <selva.nair@gmail.com>
Acked-by: Gert Doering <gert@greenie.muc.de>
Message-Id: <1548172232-11268-1-git-send-email-selva.nair@gmail.com>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg18154.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>

Selva Nair authored on 2019/01/23 00:50:32
Showing 1 changed files
... ...
@@ -44,6 +44,8 @@ static const WCHAR *white_list[] =
44 44
     L"setenv",
45 45
     L"service",
46 46
     L"verb",
47
+    L"pull-filter",
48
+    L"script-security",
47 49
 
48 50
     NULL                                /* last value */
49 51
 };