Browse code

OpenVPN Release 2.7_beta3

version.m4, ChangeLog, Changes.rst

Changes.rst has not received an "2.7_beta3" section - it has the
"highlevel" overview of what is new in 2.7, but for alpha/beta releases
it's better to look at git log to see what has been added/fixed.

Notable changes beta2 -> beta3 are:
- even more of signed/unsigned related warnings have been fixed
- document that PUSH_UPDATE is (as of now) not compatible with DCO,
and add adequate checks
- improvements on PUSH_UPDATE handling on the server side
- bugfixes reconnect and PUSH_UPDATE handling on the client side
(notably handling of ifconfig/ifconfig-ipv6/redirect-gateway ipv6
if the server is not always pushing the same address families)
- improve "recursive routing checks", prepare the way for a
policy-based setup where "packets to VPN server" could end up
in the tunnel without interfering with OpenVPN operations
- improve unit testing, add more unit tests, fix unit test bugs
- add support for "eoch" data format to DCO on Windows
(needs dco-win driver 2.8.0+)
- clean up and remove outdated stuff from COPYING

Signed-off-by: Gert Doering <gert@greenie.muc.de>

Gert Doering authored on 2025/10/13 01:59:36
Showing 3 changed files
... ...
@@ -1,6 +1,66 @@
1 1
 OpenVPN ChangeLog
2 2
 Copyright (C) 2002-2025 OpenVPN Inc <sales@openvpn.net>
3 3
 
4
+2025.10.13 -- Version 2.7_beta3
5
+
6
+Arne Schwabe (2):
7
+      Allowing installing FreeBSD routes with interface instead of next-hop
8
+      Allow route_ipv6_match_host to be used outside of route.c
9
+
10
+Frank Lichtenheld (33):
11
+      GHA: Dependency updates September 2025
12
+      comp-lz4: Fix types in call to LZ4_decompress_safe
13
+      dco_win: In dco_new_key, document size assumptions for the integer casts
14
+      dco_linux: Fix -Wconversion warnings
15
+      ssl_openssl: Use uint16_t internally for TLS versions
16
+      dco: Change sd argument to dco_new_peer from int to socket_descriptor_t
17
+      crypto_epoch: Clean up type handling in ovpn_expand_label()
18
+      route: Fix a unused-but-set-variable warning on OpenBSD
19
+      platform: Do not assume uid_t/gid_t are signed
20
+      mtu: Trivial -Wconversion fix
21
+      Review CMocka assertion usage
22
+      dhcp: Fix conversion warnings
23
+      COPYING: Remove licenses for software bundled in the Windows client
24
+      sitnl: Clean up type handling
25
+      options: Factor out parsing code to separate options_parse.c
26
+      unit_tests: Remove useless wrapping for argv/buffer tests
27
+      crypto: Make some casts to int explicit
28
+      test_options_parse: Start new UT for options_parse.c
29
+      buffer: Fix buf_parse eating input
30
+      test_options_parse: Add test for read_config_string
31
+      vlan: Remove -Wconversion override
32
+      GHA: Run options_parse test for MinGW
33
+      test_options_parse: Do not use uintmax_t instead of LargestIntegralType
34
+      proto: Clean up conversion warnings related to checksum macros
35
+      test_options_parse: Remove --wrap
36
+      lzo: Fix conversion warning
37
+      options_util: Fix conversion warning in atoi_constrained
38
+      options: Review use of positive_atoi vs atoi_constrained
39
+      console: Simplify query_user_add interface
40
+      socks: Fix conversion warnings with MinGW
41
+      Move build_dhcp_options_string from tun to dhcp
42
+      dhcp: Replace DHCP Option types with defines
43
+      test_user_pass: Check fatal errors for empty username/password
44
+
45
+Lev Stipakov (4):
46
+      dco-win: fix broken ASSERT in dco_new_key
47
+      dco-win: support for epoch data channel
48
+      Preserve ifconfig(_ipv6)_local across reconnect
49
+      Make recursive routing check more fine-grained
50
+
51
+Marco Baffo (4):
52
+      PUSH_UPDATE: disabling PUSH_UPDATE server and client if DCO is enabled
53
+      PUSH_UPDATE server: bug-fix, reset buffer after processing
54
+      PUSH_UPDATE server: check IV_PROTO before sending the message to the client
55
+      redirect-gateway: only redirect traffic through TUN if address families match
56
+
57
+Selva Nair (1):
58
+      Fix PIN cache time in test_pkcs11.c
59
+
60
+Steffan Karger (1):
61
+      Document that tls-crypt-v2 can be used in connection profile
62
+
63
+
4 64
 2025.09.25 -- Version 2.7_beta2
5 65
 
6 66
 Antonio Quartulli (1):
... ...
@@ -87,6 +87,8 @@ Epoch data keys and packet format
87 87
     - IV constructed with XOR instead of concatenation to not have (parts) of
88 88
       the real IV on the wire
89 89
 
90
+Support for Epoch data channel on Windows, using the win-dco driver (2.8.0+)
91
+
90 92
 Default ciphers in ``--data-ciphers``
91 93
     Ciphers in ``--data-ciphers`` can contain the string DEFAULT that is
92 94
     replaced by the default ciphers used by OpenVPN, making it easier to
... ...
@@ -133,6 +135,8 @@ PUSH_UPDATE client support
133 133
     currently only supported by OpenVPN Inc commercial offerings, the
134 134
     implementation for OpenVPN 2.x is still under development.
135 135
     See also: https://openvpn.github.io/openvpn-rfc/openvpn-wire-protocol.html
136
+    NOTE: PUSH_UPDATE client support is currently disabled if DCO
137
+    is active (on all platforms).
136 138
 
137 139
 PUSH_UPDATE server support (minimal)
138 140
     new management interface commands ``push-update-broad`` and
... ...
@@ -140,6 +144,8 @@ PUSH_UPDATE server support (minimal)
140 140
     clients ("there is a new DNS server") or only a specific client ID
141 141
     ("privileges have changed, here's a new IP address").  See
142 142
     doc/management-notes.txt
143
+    NOTE: PUSH_UPDATE server support is currently disabled if DCO
144
+    is active (on all platforms).
143 145
 
144 146
 Support for user-defined routing tables on Linux
145 147
     see the ``--route-table`` option in the manpage
... ...
@@ -153,6 +159,17 @@ Two new environment variables have been introduced to communicate desired
153 153
 
154 154
 Improved logging of service events/errors to event log on Windows.
155 155
 
156
+"Recursive Routing" check is now more granular, and will only drop
157
+   packets-in-tunnel if destination IP, protocol and port matches with
158
+   those needed to reach the VPN server.  With that change, you can now
159
+   use policies that direct "everything that is not OpenVPN" into the
160
+   tunnel, and have IP packets to the VPN server address arrive as
161
+   expected (no such policies are currently installed by OpenVPN)
162
+   (github #669).
163
+
164
+COPYING: license details only relevant to our Windows installers have
165
+   been updated and moved to the openvpn-build repo
166
+
156 167
 
157 168
 Deprecated features
158 169
 -------------------
... ...
@@ -278,6 +295,13 @@ User-visible Changes
278 278
   use from "ifconfig", this change repairs functionality (this has
279 279
   been backported to 2.6.15, but is not in earlier 2.6 versions).
280 280
 
281
+- `max-routes-per-client 0` used to be silently upgraded to `1`.  This
282
+  now produces an error.
283
+
284
+- `ifconfig` and `ifconfig-ipv6` values are now stored in pre-connect
285
+  options cache, and will be restored to pre-connect values on reconnects
286
+  if the server stops pushing the respective option.
287
+
281 288
 
282 289
 Overview of changes in 2.6
283 290
 ==========================
... ...
@@ -3,7 +3,7 @@ define([PRODUCT_NAME], [OpenVPN])
3 3
 define([PRODUCT_TARNAME], [openvpn])
4 4
 define([PRODUCT_VERSION_MAJOR], [2])
5 5
 define([PRODUCT_VERSION_MINOR], [7])
6
-define([PRODUCT_VERSION_PATCH], [_beta2])
6
+define([PRODUCT_VERSION_PATCH], [_beta3])
7 7
 m4_append([PRODUCT_VERSION], [PRODUCT_VERSION_MAJOR])
8 8
 m4_append([PRODUCT_VERSION], [PRODUCT_VERSION_MINOR], [[.]])
9 9
 m4_append([PRODUCT_VERSION], [PRODUCT_VERSION_PATCH], [[]])