August 17, 2007 | ||
---|---|---|
View 70f4f82
AUTO_USERID feature -- if the auth-user-pass option is used with some argument ARG, then -ARG will be appended to the username string that is sent to the server.james authored on 2007/08/17 17:22:42 |
November 24, 2006 | ||
---|---|---|
View 2a64816
Fixed issue where struct env_set methods that change the value of an existing name=value pair would delay the freeing of the memory held by the previous name=value pair until the underlying client instance object is closed.james authored on 2006/11/24 07:05:14 |
November 13, 2006 | ||
---|---|---|
View 5f31881
New try at AUTO_USERID.james authored on 2006/11/13 18:44:10 |
November 10, 2006 | ||
---|---|---|
View 1f99578
Backed out AUTO_USERID feature introduced in r1436.james authored on 2006/11/10 19:22:48 |
November 8, 2006 | ||
---|---|---|
View a783c40
Added time_ascii, time_duration, and time_unix environmental variables for plugins and callback scripts.james authored on 2006/11/08 15:54:20 |
||
View 2270775
Added #ifdefed out AUTO_USERID feature.james authored on 2006/11/08 13:02:56 |
November 1, 2006 | ||
---|---|---|
View 1d89886
Merged Alon's branch:james authored on 2006/11/01 09:07:21 |
April 5, 2006 | ||
---|---|---|
View 07d19ba
Security Vulnerability -- An OpenVPN client connecting to a malicious or compromised server could potentially receive "setenv" configuration directives from the server which could cause arbitrary code execution on the client via a LD_PRELOAD attack. A successful attack appears to require that (a) the client has agreed to allow the server to push configuration directives to it by including "pull" or the macro "client" in its configuration file, (b) the client configuration file uses a scripting directive such as "up" or "down", (c) the client succesfully authenticates the server, (d) the server is malicious or has been compromised and is under the control of the attacker, and (e) the attacker has at least some level of pre-existing control over files on the client (this might be accomplished by having the server respond to a client web request with a specially crafted file).james authored on 2006/04/05 15:01:08 |
December 18, 2005 | ||
---|---|---|
View a67724c
Fixed bug in automatic Win32 PATH setting code.james authored on 2005/12/18 07:23:28 |
December 9, 2005 | ||
---|---|---|
View c959fc7
Inline file capability now works for --secret and --tls-auth. For example:james authored on 2005/12/09 03:29:38 |
||
View e1447ac
Fixed some gcc 4 warnings in misc.c.james authored on 2005/12/09 00:36:27 |
November 9, 2005 | ||
---|---|---|
View eadf16a
Removed annoying 'i' variable from add_option.james authored on 2005/11/09 16:30:14 |
November 5, 2005 | ||
---|---|---|
View e8c1720
svn merge -r 771:780 $SO/trunk/openvpnjames authored on 2005/11/05 16:42:33 |
October 31, 2005 | ||
---|---|---|
View c67d59c
Windows reliability changes: * Added code to make sure that the local PATH environmental variable points to the Windows system32 directory. * Added new --ip-win32 adaptive mode which tries 'dynamic' and then fails over to 'netsh' if the DHCP negotiation fails. * Made --ip-win32 adaptive the default.james authored on 2005/10/31 12:01:17 |
October 20, 2005 | ||
---|---|---|
View dd1047f
Some changes to GET_USER_PASS_NEED_OK flag to get_user_pass. (1) Allow an additional longer prompt string to be passed to the management interface client, in addition to the request type string. (2) Allow the management interface client to return a string, usually "ok" or "cancel" as the third argument to "needok" command. (3) Renamed "ok" command in management interface to "needok". (4) Edited management-notes.txt to reflect new needok feature. (5) See init.c:125 for new code example.james authored on 2005/10/20 19:16:41 |