lp:ubuntu/hardy-proposed/openvpn

Created by James Westby and last modified
Get this branch:
bzr branch lp:ubuntu/hardy-proposed/openvpn
Members of Ubuntu branches can upload to this branch. Log in for directions.

Branch merges

Related bugs

Related blueprints

Branch information

Owner:
Ubuntu branches
Review team:
Ubuntu Development Team
Status:
Development

Recent revisions

23. By Imre Gergely

ssl.c: re-applied fix from upstream to fix extract_x509_field_ssl
where the extraction would fail on the first field of the subject
name (LP: #265058)

22. By Thierry Carrez

* Revert changes from 2.1~rc7-1ubuntu3.4 since verification could never be
  done on that bug and it is blocking another much-needed SRU.
* debian/openvpn.init.d: Fix initscript exit status 127 when starting
  openvpn while it's already started (LP: #271777)

21. By Stefan Lesicnik

ssl.c: applied fix from upstream to fix extract_x509_field_ssl
where the extraction would fail on the first field of
the subject name (LP: #265058)

20. By Jamie Strandboge

* init.c: send modulus to openssl-vulnkey rather than calling
  openssl-vulnkey on the file. This allows for password protected ssl keys
  (LP: #230197)
* debian/control: Depends on openssl-blacklist > 0.3.2

19. By Martin Pitt

init.c: Do not attempt to verify the key file with openvpn-vulnkey if it
is not accessible (any more). This happens when using the 'user', 'group',
or 'chroot' options in multi-client mode, and the SSL key file thus
becomes unreadable from the second time on. If the key file is not
accessible at the very start, this is already handled anyway, so we can
safely ignore this condition. (LP: #230208)
Note that this is not an issue when using pre-shared keys
(do_init_crypto_static(), since multi-client mode only works with TLS.
However, we also check it here just to be on the safe side.

18. By Jamie Strandboge

* SECURITY UPDATE: don't allow use of known vulnerable weak SSL/TLS and
  shared secret keys caused by Debian openssl bug
* init.c: patch do_init_crypto_static() to use openvpn-vulnkey and
  do_init_crypto_tls() to use openssl-vulnkey
* debian/control: Depends on libssl0.9.8 (>= 0.9.8g-4ubuntu3.1),
  openssl-blacklist and openvpn-blacklist
* add critical debconf note
* References
  CVE-2008-0166
  http://www.ubuntu.com/usn/usn-612-1

17. By Chuck Short

* More init script LSB compliance. (LP: #134210)
* Added warning about max-locked-memory-limit to Readme.Debian. (LP: #154696)

16. By Chuck Short

Made init script more lsb compliant.

15. By Chuck Short

* New upstream version (LP: #157144).
* Disable creation of tun, let udev handle it.

14. By Alberto Gonzalez Iniesta <email address hidden>

* Upload to unstable. New upstream fixes:
   - Bug with: Assertion failed at multi.c. (Closes: #411633)
   - Hangs with tcp clients goin down with new option:
     --connect-timeout. (Closes: #296834)
* Use rm -f to remove PIDFILE, in case rm wants to ask.
  (Closes: #429932)
* Updated Vietnamese debconf templates. (Closes: #427048)
  Thanks Clytie Siddall.
* Added note on resolvconf use with openvpn. (Closes: #451319)

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
Stacked on:
lp:ubuntu/karmic/openvpn
This branch contains Public information 
Everyone can see this information.

Subscribers