From patchwork Mon Jan 10 03:40:13 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Antonio Quartulli X-Patchwork-Id: 2211 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director14.mail.ord1d.rsapps.net ([172.30.191.6]) by backend41.mail.ord1d.rsapps.net with LMTP id yPeCEqBF3GFrDgAAqwncew (envelope-from ) for ; Mon, 10 Jan 2022 09:41:36 -0500 Received: from proxy10.mail.ord1d.rsapps.net ([172.30.191.6]) by director14.mail.ord1d.rsapps.net with LMTP id eDH1M6BF3GHqJgAAeJ7fFg (envelope-from ) for ; Mon, 10 Jan 2022 09:41:36 -0500 Received: from smtp5.gate.ord1d ([172.30.191.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy10.mail.ord1d.rsapps.net with LMTPS id 0NK1M6BF3GEhTAAAfSg8FQ (envelope-from ) for ; Mon, 10 Jan 2022 09:41:36 -0500 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.105.38.7] Authentication-Results: smtp5.gate.ord1d.rsapps.net; iprev=pass policy.iprev="216.105.38.7"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dmarc=none (p=nil; dis=none) header.from=unstable.cc X-Suspicious-Flag: YES X-Classification-ID: 69314312-7223-11ec-8dd6-525400d73c44-1-1 Received: from [216.105.38.7] ([216.105.38.7:46992] helo=lists.sourceforge.net) by smtp5.gate.ord1d.rsapps.net (envelope-from ) (ecelerity 4.2.38.62370 r(:)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id 77/A9-31357-0A54CD16; Mon, 10 Jan 2022 09:41:36 -0500 Received: from [127.0.0.1] (helo=sfs-ml-2.v29.lw.sourceforge.com) by sfs-ml-2.v29.lw.sourceforge.com with esmtp (Exim 4.94.2) (envelope-from ) id 1n6vqV-0005Pq-7c; Mon, 10 Jan 2022 14:40:26 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-2.v29.lw.sourceforge.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1n6vqT-0005Pj-Ln for openvpn-devel@lists.sourceforge.net; Mon, 10 Jan 2022 14:40:24 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=Content-Transfer-Encoding:MIME-Version:Message-Id: Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=dypC06DZjn1BgfrSGsTQUuZlo8/6LIHCx2nGvsKwNBw=; b=WeM0iPPfKcd14vJjLRWCTMfBKf aDnCJB0g1tZCShTUj3UXVlEGnNGzhsohsJK8VYIWcw6CMjHlfyhl4FIvND4Ktf5CHRQceNVpHn/3t 2dXBJV/MVo+UP106f+N3by9xHahVlflymjVI84+r/JrrTRvkDK6hWsG9WGpD4w/P/8pQ=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=Content-Transfer-Encoding:MIME-Version:Message-Id:Date:Subject:Cc:To:From :Sender:Reply-To:Content-Type:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post: List-Owner:List-Archive; bh=dypC06DZjn1BgfrSGsTQUuZlo8/6LIHCx2nGvsKwNBw=; b=b Ld9sH4KRDuXMldKhqe2GSHQiyp8RrUjWlEt0rYWDY0jouHlU42n0L/1CdlQ39BCDC9lXF/rDoGCfl UQvj5ryobWZFccwtPFCs3Fee1P6+8CDTYMEy35PP/iFM/RPPGCkPQcNS6AcXXR+G1jq4FoDEmzT3+ t3zuHuydxLDE+VGg=; Received: from s2.neomailbox.net ([5.148.176.60]) by sfi-mx-1.v28.lw.sourceforge.com with esmtps (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92.3) id 1n6vqR-00AXmW-Hw for openvpn-devel@lists.sourceforge.net; Mon, 10 Jan 2022 14:40:24 +0000 From: Antonio Quartulli To: openvpn-devel@lists.sourceforge.net Date: Mon, 10 Jan 2022 15:40:13 +0100 Message-Id: <20220110144013.7233-1-a@unstable.cc> MIME-Version: 1.0 X-Spam-Report: Spam detection software, running on the system "util-spamd-1.v13.lw.sourceforge.com", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Indentation is wrong and triggers the following: rst2man.py openvpn.8.rst > openvpn.8 man-sections/cipher-negotiation.rst:20: (WARNING/2) Definition list ends without a blank line; unexpected unindent. rst2man.py openvpn-examples.5.rst > openvpn-exa [...] Content analysis details: (0.0 points, 6.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.0 SPF_PASS SPF: sender matches SPF record X-Headers-End: 1n6vqR-00AXmW-Hw Subject: [Openvpn-devel] [PATCH] doc/ciper-negotiation.rst: avoid warning by fixing indentation X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Antonio Quartulli Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox Indentation is wrong and triggers the following: rst2man.py openvpn.8.rst > openvpn.8 man-sections/cipher-negotiation.rst:20: (WARNING/2) Definition list ends without a blank line; unexpected unindent. rst2man.py openvpn-examples.5.rst > openvpn-examples.5 rst2html.py openvpn.8.rst > openvpn.8.html man-sections/cipher-negotiation.rst:20: (WARNING/2) Definition list ends without a blank line; unexpected unindent. Get rid of it. Signed-off-by: Antonio Quartulli Acked-By: Arne Schwabe --- doc/man-sections/cipher-negotiation.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/man-sections/cipher-negotiation.rst b/doc/man-sections/cipher-negotiation.rst index efa4c6c9..9bcaed0a 100644 --- a/doc/man-sections/cipher-negotiation.rst +++ b/doc/man-sections/cipher-negotiation.rst @@ -16,7 +16,7 @@ with a AUTH_FAILED message (as seen in client log): AUTH: Received control message: AUTH_FAILED,Data channel cipher negotiation failed (no shared cipher) OpenVPN 2.5 and later will only allow the ciphers specified in ``--data-ciphers``. - If ``--data-ciphers`` is not set the default is :code:`AES-256-GCM:AES-128-GCM`. +If ``--data-ciphers`` is not set the default is :code:`AES-256-GCM:AES-128-GCM`. In 2.6 and later the default is changed to :code:`AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305` when Chacha20-Poly1305 is available.