From patchwork Wed Aug 16 12:35:30 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 7104 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4RQnfg4jCpz3wk0 for ; Wed, 16 Aug 2023 12:35:39 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4RQnff0s32z8Y; Wed, 16 Aug 2023 12:35:38 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4RQnff09H6z2yT5; Wed, 16 Aug 2023 12:35:38 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4RQnfc3cD2z2xGk for ; Wed, 16 Aug 2023 12:35:36 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4RQnfb4Ydwz8Y; Wed, 16 Aug 2023 12:35:35 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1692189335; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=nlfIwZ39QXMEp6zpbTVqvavuR8YVjkRE8kjC84NdPF4=; b=ikcvnRrQi2PkS3BIQ0X7Xk54Mmz7x0bJyfkSgK+mM+ILSY/VY8YSSSDQ0p4jN9J1QZVaqB lzrtekrFLVWj2ECw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1692189335; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=nlfIwZ39QXMEp6zpbTVqvavuR8YVjkRE8kjC84NdPF4=; b=j9OYQPdYDa/ovhDY2x6dlhyDORO3fM5FYGnl3s+0wNoVhECz3sT9YENnrjhjj7GHiXIHOC dkn5eFBAv0tgmLCxvEIN+0zdS3NpVRf3heKEStcDl8j7VOzS3MwTvecqqQG/xhIOklC6aV +dHwhLIpT9GfxXQXSgU2Li6jPEZtxduLVVyJrr6a2u93/GGRw27dvgulow3hpnthLqBWwJ vftV6+kx6lCn9E1nK+tVveJ1k8Gbrd4Age4DrYHT/BDw68WaogvKKzzeNjmMbjigK8Avn6 l6zwyKZz/zCjM6mBtJ9mEqNMeUW6Haj7Ie4H4CQgDocfDI9fsBNKSVt7eqN05A== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] openvpn: Update to version 2.5.9 Date: Wed, 16 Aug 2023 14:35:30 +0200 Message-ID: <20230816123530.4031-1-adolf.belka@ipfire.org> MIME-Version: 1.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" - Update from version 2.5.8 to 2.5.9 which is the last version in the 2.5 series - Update of rootfile not required - Tested openvpn-2.5.9 in my vm testbed. OpenVPN RW connection worked fine. Also tested OpenVPN N2N connection with CU179 & OpenVPN version 2.5.9 at one end and CU177 & OpenVPN version 2.5.8 at the other end. N2N connection worked with no problemns. - Changelog 2.5.9 Implement optional cipher in --data-ciphers prefixed with ? Fix handling an optional invalid cipher at the end of data-ciphers Ensure that argument to parse_line has always space for final sentinel Improve documentation on user/password requirement and unicodize function Remove unused gc_arena Fix corner case that might lead to leaked file descriptor msvc: always call git-version.py git-version.py: proper support for tags Check if pkcs11_cert is NULL before freeing it Do not add leading space to pushed options pull-filter: ignore leading "spaces" in option names Do not include auth-token in pulled option digest Tested-by: Adolf Belka Signed-off-by: Adolf Belka --- lfs/openvpn | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lfs/openvpn b/lfs/openvpn index db2246206..b71b4ccc9 100644 --- a/lfs/openvpn +++ b/lfs/openvpn @@ -1,7 +1,7 @@ ############################################################################### # # # IPFire.org - A linux based firewall # -# Copyright (C) 2007-2021 IPFire Team # +# Copyright (C) 2007-2023 IPFire Team # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # @@ -24,7 +24,7 @@ include Config -VER = 2.5.8 +VER = 2.5.9 THISAPP = openvpn-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = d029f6facd94a82aa28765cab340130dd4e5a4ffc2e0ccf3bf4888aee52d337126c21fdd7304dbaad5fe67d0a1f8d44e5a3c44801dcfa935aef200675ac5167f +$(DL_FILE)_BLAKE2 = e5110ebb9149121c11de45f085f66d30a89fb674ad96c5792d83b16dc29c95215a91e682adb3c800b91ed4d88d6d24b5bcae0799cdb855a284832f0668ffcb82 install : $(TARGET)