| Message ID | 20251209070218.4467-1-gert@greenie.muc.de |
|---|---|
| State | New |
| Headers | show |
| Series | [Openvpn-devel,v3] pull-filter: improve documentation | expand |
Thanks :-)
For the other readers: this is a documentation-only update, intending to
emphasize that "pull-filter" is not a secure solution (in the sense of
"a malicious server can not find ways around it") to filter options sent
by a, well, untrusted server. "Connecting to a server you do not fully
trust" is not unheard-of - consulting customers passing on a VPN config
to access to-be-consulted systems, but you do not want to send them any
other traffic. Usually those are not actively malicious, though...
Your patch has been applied to the master and release/2.6 branch.
commit d3e03b9a97177f62d31697f2b4b453295ee30e60 (master)
commit f8f1e1afac1a30ef7311bf75716421e08466780e (release/2.6)
Author: Selva Nair
Date: Tue Dec 9 08:02:11 2025 +0100
pull-filter: improve documentation
Signed-off-by: Selva Nair <selva.nair@gmail.com>
Acked-by: Gert Doering <gert@greenie.muc.de>
Gerrit URL: https://gerrit.openvpn.net/c/openvpn/+/1415
Message-Id: <20251209070218.4467-1-gert@greenie.muc.de>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg34930.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
--
kind regards,
Gert Doering
diff --git a/doc/man-sections/client-options.rst b/doc/man-sections/client-options.rst index e8523d9..4841756 100644 --- a/doc/man-sections/client-options.rst +++ b/doc/man-sections/client-options.rst @@ -345,6 +345,11 @@ next remote succeeds. To silently ignore an option pushed by the server, use :code:`ignore`. + *Warning:* ``pull-filter`` cannot be relied upon as a security measure to + protect against offending options pushed by a server. For example, the + filter could be defeated by pushing options with extra spaces between + tokens or other formatting variations. + --push-peer-info Push additional information about the client to server. The following data is always pushed to the server: