From patchwork Wed Jan 11 12:52:42 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Frank Lichtenheld X-Patchwork-Id: 2994 Return-Path: Delivered-To: patchwork@openvpn.net Received: by 2002:a05:7300:c95:b0:82:e4b3:40a0 with SMTP id p21csp4363780dyk; Wed, 11 Jan 2023 04:53:45 -0800 (PST) X-Google-Smtp-Source: AMrXdXtmvMcbsqMw/Xs5gdvrMlMFW7PAZFYJO2z5XsizaJSv535mli6iXP1F2SBdtUQ7/0TtabvF X-Received: by 2002:a05:6a20:93a7:b0:b0:42a5:fe24 with SMTP id x39-20020a056a2093a700b000b042a5fe24mr93290727pzh.4.1673441625297; Wed, 11 Jan 2023 04:53:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673441625; cv=none; d=google.com; s=arc-20160816; b=RfoBj/Gkmo0UpcDxEKFnw2ZLhtm/gn5qo8t7oYx/4eiEqLKhKEPq73jgATTsvOfyjE 0UIurAaIRITx7CFRmrMFDvEz6P/678mAk8Vbiyh/tYb8gxfUpi6XVoWU66d3eWirdQPn chv/TVNzwjH3qsC7bgbyYoppnvII5iEAUi5/2SNSJg4e8L0N+GytDOeDL+dZ+4mGupzZ d+c3HQ7Z1ZnrKCN4YunW77XRLPRSD4Jk21qNe/YnlNy1bFn9YU4bMyIPjQkRgfuPC8J/ bOLqW5X9/214JQP8gu0/M4w0SbA8Po4mKNeP5Mcxv6UwgyG6S5euItPRgcLQDmrCUDie c08g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=errors-to:content-transfer-encoding:list-subscribe:list-help :list-post:list-archive:list-unsubscribe:list-id:precedence:subject :mime-version:message-id:date:to:from:dkim-signature:dkim-signature; bh=PFvVCFJYx4wrrks+IUdvVllrdYM4SwIVIr9JYlwvQqk=; b=Ef9tdMNdEUAdchlTAsnfKsTsmlYFulIp+o/lmbKEbsw4qlKK/MagJ2E636sTeW0DJr 5/Xrn1adJBjpqVGgtt9UXWIaYke2JOkK8Z+egMBB8cHPI9zP7coTHoVRwgiYQgj5bPpQ ocC/plT+3EekbY+TTMcmK/2QYxtdJMc2aGOEV1V6S36OdnHBV63iPYBjdmGgZAUjFxDW Bt0gBgN4rBDQ9UNrlgHVatd+/9V7pHtL9veIf5kbD3IgRdl5/bJgCbUYzoyLu8Heq2U6 3kJiAcvBpUltlaCQPWDisKPqUWsFYgFkNchgvE4yL3VZiMbCjxtC31KUurFJXeg3N14/ 2Ocw== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@sourceforge.net header.s=x header.b=G9h563d4; dkim=neutral (body hash did not verify) header.i=@sf.net header.s=x header.b=P7XfJ6Zc; spf=pass (google.com: domain of openvpn-devel-bounces@lists.sourceforge.net designates 216.105.38.7 as permitted sender) smtp.mailfrom=openvpn-devel-bounces@lists.sourceforge.net Received: from lists.sourceforge.net (lists.sourceforge.net. [216.105.38.7]) by mx.google.com with ESMTPS id z15-20020a63e54f000000b0047780dc6a58si14397839pgj.500.2023.01.11.04.53.44 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 11 Jan 2023 04:53:45 -0800 (PST) Received-SPF: pass (google.com: domain of openvpn-devel-bounces@lists.sourceforge.net designates 216.105.38.7 as permitted sender) client-ip=216.105.38.7; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@sourceforge.net header.s=x header.b=G9h563d4; dkim=neutral (body hash did not verify) header.i=@sf.net header.s=x header.b=P7XfJ6Zc; spf=pass (google.com: domain of openvpn-devel-bounces@lists.sourceforge.net designates 216.105.38.7 as permitted sender) smtp.mailfrom=openvpn-devel-bounces@lists.sourceforge.net Received: from [127.0.0.1] (helo=sfs-ml-1.v29.lw.sourceforge.com) by sfs-ml-1.v29.lw.sourceforge.com with esmtp (Exim 4.95) (envelope-from ) id 1pFabD-0001gU-Iz; Wed, 11 Jan 2023 12:52:58 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-1.v29.lw.sourceforge.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1pFab9-0001gM-1P for openvpn-devel@lists.sourceforge.net; Wed, 11 Jan 2023 12:52:54 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=Content-Transfer-Encoding:MIME-Version:Message-Id: Date:Subject:To:From:Sender:Reply-To:Cc:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=yvezXcrqwFBEt+zB412YTD96KaJNTGOQT10Wah/lDm0=; b=G9h563d4FcRDBII3QGl+ZX6tyd Ih+oaZItSfBkfrZNV34cCS/IxmmIHDuk4g4M//+dBUJH+MHOcCN0tLgRqI6qN5S/kMKieGQq1gEAN yn1LpmHWugHi73KsDi2gh6F+AMjnOQJSusgrZ8dQA9UGaq7T4QoLmXCfr6gjz4mdZXBI=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=Content-Transfer-Encoding:MIME-Version:Message-Id:Date:Subject:To:From: Sender:Reply-To:Cc:Content-Type:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post: List-Owner:List-Archive; bh=yvezXcrqwFBEt+zB412YTD96KaJNTGOQT10Wah/lDm0=; b=P 7XfJ6ZcpfHUIHc+NTaALuEoyDrxXMG8RxE7YU1c3szoRuNNQvFSA+Nb55TW3J2zN0Cpg+Lukzz05d +0khVIG0kJxCVBMJ2Eekq23ZZThF0AOMpuqgH/0vhurkz5ws4n7I67PbbLUQw46AIkGIIv/VJu6uw 6CJWTCsKn+qfTZ8k=; Received: from mout-p-202.mailbox.org ([80.241.56.172]) by sfi-mx-2.v28.lw.sourceforge.com with esmtps (TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.95) id 1pFab7-0001dI-CI for openvpn-devel@lists.sourceforge.net; Wed, 11 Jan 2023 12:52:54 +0000 Received: from smtp1.mailbox.org (smtp1.mailbox.org [10.196.197.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-202.mailbox.org (Postfix) with ESMTPS id 4NsSJW0vY1z9sQQ for ; Wed, 11 Jan 2023 13:52:43 +0100 (CET) From: Frank Lichtenheld To: openvpn-devel@lists.sourceforge.net Date: Wed, 11 Jan 2023 13:52:42 +0100 Message-Id: <20230111125242.21025-1-frank@lichtenheld.com> MIME-Version: 1.0 X-Spam-Score: -0.7 (/) X-Spam-Report: Spam detection software, running on the system "util-spamd-2.v13.lw.sourceforge.com", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: We listed those in Changes, but did not update the documentation. Signed-off-by: Frank Lichtenheld --- doc/man-sections/unsupported-options.rst | 11 +++++++++++ 1 file changed, 11 insertions(+) Content analysis details: (-0.7 points, 6.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at https://www.dnswl.org/, low trust [80.241.56.172 listed in list.dnswl.org] 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record 0.0 SPF_NONE SPF: sender does not publish an SPF Record X-Headers-End: 1pFab7-0001dI-CI Subject: [Openvpn-devel] [PATCH] documentation: update "unsupported options" section X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox X-GMAIL-THRID: =?utf-8?q?1754730725862157922?= X-GMAIL-MSGID: =?utf-8?q?1754730725862157922?= We listed those in Changes, but did not update the documentation. Signed-off-by: Frank Lichtenheld Acked-by: Gert Doering --- doc/man-sections/unsupported-options.rst | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/doc/man-sections/unsupported-options.rst b/doc/man-sections/unsupported-options.rst index 05ba3ca2..5c4e3a0e 100644 --- a/doc/man-sections/unsupported-options.rst +++ b/doc/man-sections/unsupported-options.rst @@ -17,6 +17,14 @@ longer supported ``key-method`` weakens the VPN tunnel security. The old ``key-method`` was also only needed when the remote side was older than OpenVPN 2.0. +--management-client-pf + Removed in OpenVPN 2.6. The built-in packet filtering (pf) functionality + has been removed. + +--ncp-disable + Removed in OpenVPN 2.6. This option mainly served a role as debug option + when NCP was first introduced. It should no longer be necessary. + --no-iv Removed in OpenVPN 2.5. This option should not be used as it weakens the VPN tunnel security. This has been a NOOP option since OpenVPN 2.4. @@ -30,3 +38,6 @@ longer supported in recent SSL/TLS libraries. If your certificates does not include *key usage* and *extended key usage* fields, they must be upgraded and the ``--remote-cert-tls`` option should be used instead. + +--prng + Removed in OpenVPN 2.6. We now always use the PRNG of the SSL library.