This commit is contained in:
commit
37b5e500dd
23
.gitattributes
vendored
Normal file
23
.gitattributes
vendored
Normal file
@ -0,0 +1,23 @@
|
||||
## Default LFS
|
||||
*.7z filter=lfs diff=lfs merge=lfs -text
|
||||
*.bsp filter=lfs diff=lfs merge=lfs -text
|
||||
*.bz2 filter=lfs diff=lfs merge=lfs -text
|
||||
*.gem filter=lfs diff=lfs merge=lfs -text
|
||||
*.gz filter=lfs diff=lfs merge=lfs -text
|
||||
*.jar filter=lfs diff=lfs merge=lfs -text
|
||||
*.lz filter=lfs diff=lfs merge=lfs -text
|
||||
*.lzma filter=lfs diff=lfs merge=lfs -text
|
||||
*.obscpio filter=lfs diff=lfs merge=lfs -text
|
||||
*.oxt filter=lfs diff=lfs merge=lfs -text
|
||||
*.pdf filter=lfs diff=lfs merge=lfs -text
|
||||
*.png filter=lfs diff=lfs merge=lfs -text
|
||||
*.rpm filter=lfs diff=lfs merge=lfs -text
|
||||
*.tbz filter=lfs diff=lfs merge=lfs -text
|
||||
*.tbz2 filter=lfs diff=lfs merge=lfs -text
|
||||
*.tgz filter=lfs diff=lfs merge=lfs -text
|
||||
*.ttf filter=lfs diff=lfs merge=lfs -text
|
||||
*.txz filter=lfs diff=lfs merge=lfs -text
|
||||
*.whl filter=lfs diff=lfs merge=lfs -text
|
||||
*.xz filter=lfs diff=lfs merge=lfs -text
|
||||
*.zip filter=lfs diff=lfs merge=lfs -text
|
||||
*.zst filter=lfs diff=lfs merge=lfs -text
|
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@ -0,0 +1 @@
|
||||
.osc
|
3
openvpn-2.0.9.tar.gz
Normal file
3
openvpn-2.0.9.tar.gz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:347c551e7c88affc1f4b7a4b715080253c9298dcc512ed29fe8ca5cd26d015d9
|
||||
size 669076
|
7
openvpn-2.0.9.tar.gz.asc
Normal file
7
openvpn-2.0.9.tar.gz.asc
Normal file
@ -0,0 +1,7 @@
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v1.2.4 (GNU/Linux)
|
||||
|
||||
iD8DBQBFH7kKHQtJlh+/UfMRAsIdAJ41usSP8OGmeaW+/7osfXhjiRCKIACfSzex
|
||||
ilPdxBhlGGL833OuyqRUgLY=
|
||||
=fiJg
|
||||
-----END PGP SIGNATURE-----
|
7
openvpn.README.SUSE
Normal file
7
openvpn.README.SUSE
Normal file
@ -0,0 +1,7 @@
|
||||
|
||||
Notes about the OpenVPN package
|
||||
|
||||
In a fresh installation, you will find an empty directory /etc/openvpn.
|
||||
The directory is meant to contain *.conf files -- the openvpn init script
|
||||
will automatically look for them there, so you can start/stop all tunnels with
|
||||
"rcopenvpn (start|stop)", as well as start tham at boot time.
|
259
openvpn.changes
Normal file
259
openvpn.changes
Normal file
@ -0,0 +1,259 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Oct 27 10:40:59 CEST 2006 - mt@suse.de
|
||||
|
||||
- upstream 2.0.9, Windows related fixes only
|
||||
* Windows installer updated with OpenSSL 0.9.7l DLLs to fix
|
||||
published vulnerabilities.
|
||||
* Fixed TAP-Win32 bug that caused BSOD on Windows Vista
|
||||
(Henry Nestler). The TAP-Win32 driver has now been
|
||||
upgraded to version 8.4.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Sep 27 14:34:48 CEST 2006 - poeml@suse.de
|
||||
|
||||
- upstream 2.0.8
|
||||
* Windows installer updated with OpenSSL 0.9.7k DLLs to fix
|
||||
RSA Signature Forgery (CVE-2006-4339).
|
||||
* No changes to OpenVPN source code between 2.0.7 and 2.0.8.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Jun 23 11:55:10 CEST 2006 - poeml@suse.de
|
||||
|
||||
- upstream 2.0.7, with bug fixes:
|
||||
* When deleting routes under Linux, use the route metric
|
||||
as a differentiator to ensure that the route teardown
|
||||
process only deletes the identical route which was originally
|
||||
added via the "route" directive (Roy Marples).
|
||||
* Fixed bug where --server directive in --dev tap mode
|
||||
claimed that it would support subnets of /30 or less
|
||||
but actually would only accept /29 or less.
|
||||
* Extend byte counters to 64 bits (M. van Cuijk).
|
||||
* Better sanity checking of --server and --server-bridge
|
||||
IP pool ranges, so as not to hit the assertion at
|
||||
pool.c:119 (2.0.5).
|
||||
* Fixed bug where --daemon and --management-query-passwords
|
||||
used together would cause OpenVPN to block prior to
|
||||
daemonization.
|
||||
* Fixed client/server race condition which could occur
|
||||
when --auth-retry interact is set and the initially
|
||||
provided auth-user-pass credentials are incorrect,
|
||||
forcing a username/password re-query.
|
||||
* Fixed bug where if --daemon and --management-hold are
|
||||
used together, --user or --group options would be ignored.
|
||||
* fix for CVE-2006-1629 integrated (disallow "setenv" to be pushed
|
||||
to clients from the server)
|
||||
- build with fPIE/pie on SUSE 10.0 or newer, or on any other platform
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Apr 19 13:10:56 CEST 2006 - poeml@suse.de
|
||||
|
||||
- security fix (CVE-2006-1629): disallow "setenv" to be pushed to
|
||||
clients from the server [#165123]
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Jan 25 21:39:08 CET 2006 - mls@suse.de
|
||||
|
||||
- converted neededforbuild to BuildRequires
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Nov 3 15:25:01 CET 2005 - poeml@suse.de
|
||||
|
||||
- update to 2.0.5, with two security fixes -- see below. [#132003]
|
||||
2005.11.02 -- Version 2.0.5
|
||||
* Fixed bug in Linux get_default_gateway function
|
||||
introduced in 2.0.4, which would cause redirect-gateway
|
||||
on Linux clients to fail.
|
||||
* Restored easy-rsa/2.0 tree (backported from 2.1 beta
|
||||
series) which accidentally disappeared in
|
||||
2.0.2 -> 2.0.4 transition.
|
||||
2005.11.01 -- Version 2.0.4
|
||||
* Security fix -- Affects non-Windows OpenVPN clients of
|
||||
version 2.0 or higher which connect to a malicious or
|
||||
compromised server. A format string vulnerability
|
||||
in the foreign_option function in options.c could
|
||||
potentially allow a malicious or compromised server
|
||||
to execute arbitrary code on the client. Only
|
||||
non-Windows clients are affected. The vulnerability
|
||||
only exists if (a) the client's TLS negotiation with
|
||||
the server succeeds, (b) the server is malicious or
|
||||
has been compromised such that it is configured to
|
||||
push a maliciously crafted options string to the client,
|
||||
and (c) the client indicates its willingness to accept
|
||||
pushed options from the server by having "pull" or
|
||||
"client" in its configuration file (Credit: Vade79).
|
||||
CVE-2005-3393
|
||||
* Security fix -- Potential DoS vulnerability on the
|
||||
server in TCP mode. If the TCP server accept() call
|
||||
returns an error status, the resulting exception handler
|
||||
may attempt to indirect through a NULL pointer, causing
|
||||
a segfault. Affects all OpenVPN 2.0 versions.
|
||||
CVE-2005-3409
|
||||
* Fix attempt of assertion at multi.c:1586 (note that
|
||||
this precise line number will vary across different
|
||||
versions of OpenVPN).
|
||||
* Added ".PHONY: plugin" to Makefile.am to work around
|
||||
"make dist" issue.
|
||||
* Fixed double fork issue that occurs when --management-hold
|
||||
is used.
|
||||
* Moved TUN/TAP read/write log messages from --verb 8 to 6.
|
||||
* Warn when multiple clients having the same common name or
|
||||
username usurp each other when --duplicate-cn is not used.
|
||||
* Modified Windows and Linux versions of get_default_gateway
|
||||
to return the route with the smallest metric
|
||||
if multiple 0.0.0.0/0.0.0.0 entries are present.
|
||||
2005.09.25 -- Version 2.0.3-rc1
|
||||
* openvpn_plugin_abort_v1 function wasn't being properly
|
||||
registered on Windows.
|
||||
* Fixed a bug where --mode server --proto tcp-server --cipher none
|
||||
operation could cause tunnel packet truncation.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Aug 30 15:05:08 CEST 2005 - poeml@suse.de
|
||||
|
||||
- update to 2.0.2 [#106258] relevant changes:
|
||||
* Fixed bug where "--proto tcp-server --mode p2p --management
|
||||
host port" would cause the management port to not respond until
|
||||
the OpenVPN peer connects.
|
||||
* Modified pkitool script to be /bin/sh compatible (Johnny Lam).
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Aug 23 13:56:27 CEST 2005 - poeml@suse.de
|
||||
|
||||
- update to 2.0.1 [#106258]
|
||||
* Security Fix -- DoS attack against server when run with "verb 0" and
|
||||
without "tls-auth". If a client connection to the server fails
|
||||
certificate verification, the OpenSSL error queue is not properly
|
||||
flushed, which can result in another unrelated client instance on the
|
||||
server seeing the error and responding to it, resulting in disconnection
|
||||
of the unrelated client (CAN-2005-2531).
|
||||
* Security Fix -- DoS attack against server by authenticated client.
|
||||
This bug presents a potential DoS attack vector against the server
|
||||
which can only be initiated by a connected and authenticated client.
|
||||
If the client sends a packet which fails to decrypt on the server,
|
||||
the OpenSSL error queue is not properly flushed, which can result in
|
||||
another unrelated client instance on the server seeing the error and
|
||||
responding to it, resulting in disconnection of the unrelated client
|
||||
(CAN-2005-2532).
|
||||
* Security Fix -- DoS attack against server by authenticated client.
|
||||
A malicious client in "dev tap" ethernet bridging mode could
|
||||
theoretically flood the server with packets appearing to come from
|
||||
hundreds of thousands of different MAC addresses, causing the OpenVPN
|
||||
process to deplete system virtual memory as it expands its internal
|
||||
routing table. A --max-routes-per-client directive has been added
|
||||
(default=256) to limit the maximum number of routes in OpenVPN's
|
||||
internal routing table which can be associated with a given client
|
||||
(CAN-2005-2533).
|
||||
* Security Fix -- DoS attack against server by authenticated client.
|
||||
If two or more client machines try to connect to the server at the
|
||||
same time via TCP, using the same client certificate, and when
|
||||
--duplicate-cn is not enabled on the server, a race condition can
|
||||
crash the server with "Assertion failed at mtcp.c:411"
|
||||
(CAN-2005-2534).
|
||||
* Fixed server bug where under certain circumstances, the client instance
|
||||
object deletion function would try to delete iroutes which had never been
|
||||
added in the first place, triggering "Assertion failed at mroute.c:349".
|
||||
* Added --auth-retry option to prevent auth errors from being fatal
|
||||
on the client side, and to permit username/password requeries in case
|
||||
of error. Also controllable via new "auth-retry" management interface
|
||||
command. See man page for more info.
|
||||
* Added easy-rsa 2.0 scripts to the tarball in easy-rsa/2.0
|
||||
* Fixed bug in openvpn.spec where rpmbuild --define 'without_pam 1'
|
||||
would fail to build.
|
||||
* Implement "make check" to perform loopback tests (Matthias Andree).
|
||||
- drop obsolete patch which fixed finding lzo libraries
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jun 28 14:27:17 CEST 2005 - mrueckert@suse.de
|
||||
|
||||
- The previous patch didnt work with lzo1 based distros. Fixed.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jun 28 11:25:32 CEST 2005 - cthiel@suse.de
|
||||
|
||||
- fixed build with lzo2 (added lzo2.diff)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jun 23 01:48:38 CEST 2005 - ro@suse.de
|
||||
|
||||
- build with fPIE/pie
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jun 2 18:01:18 CEST 2005 - hvogel@suse.de
|
||||
|
||||
- lzo headers are in a subdirectory now
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Apr 19 10:28:32 CEST 2005 - cthiel@suse.de
|
||||
|
||||
- update to 2.0
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 17 21:57:20 CET 2005 - poeml@suse.de
|
||||
|
||||
- update to 2.0_rc14
|
||||
- add README.SUSE
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Jan 28 10:52:55 CET 2005 - poeml@suse.de
|
||||
|
||||
- update to 2.0_rc10
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Dec 29 14:10:20 CET 2004 - poeml@suse.de
|
||||
|
||||
- update to 2.0_rc6
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Dec 29 10:35:28 CET 2004 - poeml@suse.de
|
||||
|
||||
- update to 2.0_rc1 (closing #45979)
|
||||
IMPORTANT: OpenVPN's default port number is now 1194, based on an
|
||||
official port number assignment by IANA. OpenVPN 2.0-beta16 and
|
||||
earlier used 5000 as the default port.
|
||||
-> see http://openvpn.net/20notes.html
|
||||
- remove lzo sources, which come in a separate package since 9.2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jul 26 15:43:00 CEST 2004 - poeml@suse.de
|
||||
|
||||
- update to 1.6_rc4
|
||||
- bzip2 sources
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sun Jan 11 11:33:35 CET 2004 - adrian@suse.de
|
||||
|
||||
- build as user
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Dec 16 16:07:29 CET 2003 - wengel@suse.de
|
||||
|
||||
- update to version 1.5.0
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sun Sep 7 18:41:23 CEST 2003 - poeml@suse.de
|
||||
|
||||
- add an init script
|
||||
- use RPM_OPT_FLAGS
|
||||
- add /var/run/openvpn directory for pid files
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jul 31 14:24:14 CEST 2003 - wengel@suse.de
|
||||
|
||||
- update to new version -> 1.4.2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 27 10:45:35 CEST 2003 - coolo@suse.de
|
||||
|
||||
- use BuildRoot
|
||||
- package a bit more straightforward
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon May 19 08:41:42 CEST 2003 - wengel@suse.de
|
||||
|
||||
- update to version 1.4.1
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jan 20 17:05:53 CET 2003 - wengel@suse.de
|
||||
|
||||
- initial package
|
||||
|
157
openvpn.init
Normal file
157
openvpn.init
Normal file
@ -0,0 +1,157 @@
|
||||
#! /bin/sh
|
||||
# Copyright (c) 2003 SuSE Linux AG
|
||||
#
|
||||
# Author: Peter Poeml <poeml@suse.de>
|
||||
#
|
||||
# inspired by the init script contributed to the OpenVPN project by
|
||||
# Douglas Keller <doug@voidstar.dyndns.org>
|
||||
#
|
||||
# /etc/init.d/openvpn
|
||||
# and its symbolic link
|
||||
# /usr/sbin/rcopenvpn
|
||||
#
|
||||
### BEGIN INIT INFO
|
||||
# Provides: openvpn
|
||||
# Required-Start: $local_fs $remote_fs $network
|
||||
# X-UnitedLinux-Should-Start: $syslog
|
||||
# Required-Stop: $local_fs $remote_fs $network
|
||||
# X-UnitedLinux-Should-Stop: $syslog
|
||||
# Default-Start: 3 5
|
||||
# Default-Stop: 0 1 2 6
|
||||
# Short-Description: OpenVPN tunnel
|
||||
# Description: Start OpenVPN tunnel
|
||||
### END INIT INFO
|
||||
|
||||
|
||||
# test -s /etc/sysconfig/openvpn && \
|
||||
# . /etc/sysconfig/openvpn
|
||||
|
||||
DAEMON="OpenVPN"
|
||||
openvpn=/usr/sbin/openvpn
|
||||
confdir=/etc/openvpn
|
||||
piddir=/var/run/openvpn
|
||||
test -d $piddir || mkdir $piddir
|
||||
|
||||
test -x $openvpn || exit 5
|
||||
|
||||
# Shell functions sourced from /etc/rc.status:
|
||||
# rc_check check and set local and overall rc status
|
||||
# rc_status check and set local and overall rc status
|
||||
# rc_status -v ditto but be verbose in local rc status
|
||||
# rc_status -v -r ditto and clear the local rc status
|
||||
# rc_failed set local and overall rc status to failed
|
||||
# rc_failed <num> set local and overall rc status to <num><num>
|
||||
# rc_reset clear local rc status (overall remains)
|
||||
# rc_exit exit appropriate to overall rc status
|
||||
. /etc/rc.status
|
||||
|
||||
# First reset status of this service
|
||||
rc_reset
|
||||
|
||||
# Return values acc. to LSB for all commands but status:
|
||||
# 0 - success
|
||||
# 1 - generic or unspecified error
|
||||
# 2 - invalid or excess argument(s)
|
||||
# 3 - unimplemented feature (e.g. "reload")
|
||||
# 4 - insufficient privilege
|
||||
# 5 - program is not installed
|
||||
# 6 - program is not configured
|
||||
# 7 - program is not running
|
||||
#
|
||||
# Note that starting an already running service, stopping
|
||||
# or restarting a not-running service as well as the restart
|
||||
# with force-reload (in case signalling is not supported) are
|
||||
# considered a success.
|
||||
|
||||
shopt -s nullglob
|
||||
ret=true
|
||||
|
||||
case "$1" in
|
||||
start)
|
||||
echo -n "Starting $DAEMON "
|
||||
|
||||
/sbin/modprobe tun &>/dev/null
|
||||
|
||||
for conf in $confdir/*.conf; do
|
||||
pidfile=$(basename ${conf%%.conf}).pid
|
||||
$openvpn --daemon \
|
||||
--writepid $piddir/$pidfile \
|
||||
--config $conf \
|
||||
--cd $confdir \
|
||||
|| ret=false
|
||||
done
|
||||
|
||||
# Remember status and be verbose
|
||||
$ret
|
||||
rc_status -v
|
||||
;;
|
||||
stop)
|
||||
echo -n "Shutting down $DAEMON "
|
||||
|
||||
## Stop daemon with killproc(8) and if this fails
|
||||
## set echo the echo return value.
|
||||
|
||||
for i in $piddir/*.pid; do
|
||||
killproc -p $i -TERM $openvpn || ret=false
|
||||
done
|
||||
|
||||
# Remember status and be verbose
|
||||
$ret
|
||||
rc_status -v
|
||||
;;
|
||||
try-restart)
|
||||
## Do a restart only if the service was active before.
|
||||
## Note: try-restart is now part of LSB (as of 1.9).
|
||||
## RH has a similar command named condrestart.
|
||||
$0 status
|
||||
if test $? = 0; then
|
||||
$0 restart
|
||||
else
|
||||
rc_reset # Not running is not a failure.
|
||||
fi
|
||||
# Remember status and be quiet
|
||||
rc_status
|
||||
;;
|
||||
restart)
|
||||
## Stop the service and regardless of whether it was
|
||||
## running or not, start it again.
|
||||
$0 stop
|
||||
sleep 3
|
||||
$0 start
|
||||
|
||||
# Remember status and be quiet
|
||||
rc_status
|
||||
;;
|
||||
reload)
|
||||
for i in $piddir/*.pid; do
|
||||
killproc -p $i -HUP $openvpn || ret=false
|
||||
done
|
||||
rc_status -v
|
||||
;;
|
||||
reopen)
|
||||
for i in $piddir/*.pid; do
|
||||
killproc -p $i -USR1 $openvpn || ret=false
|
||||
done
|
||||
rc_status -v
|
||||
;;
|
||||
status)
|
||||
echo -n "Checking for $DAEMON: "
|
||||
running=false
|
||||
for i in $piddir/*.pid; do
|
||||
running=true
|
||||
killproc -p $i -USR2 $openvpn || { rv=$?; ret=false; }
|
||||
done
|
||||
if $running; then
|
||||
$ret
|
||||
rc_status -v
|
||||
echo Status written to /var/log/messages
|
||||
else
|
||||
rc_failed 3
|
||||
rc_status -v
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
echo "Usage: $0 {start|stop|status|try-restart|restart|reload|reopen}"
|
||||
exit 1
|
||||
esac
|
||||
rc_exit
|
285
openvpn.spec
Normal file
285
openvpn.spec
Normal file
@ -0,0 +1,285 @@
|
||||
#
|
||||
# spec file for package openvpn (Version 2.0.9)
|
||||
#
|
||||
# Copyright (c) 2006 SUSE LINUX Products GmbH, Nuernberg, Germany.
|
||||
# This file and all modifications and additions to the pristine
|
||||
# package are under the same license as the package itself.
|
||||
#
|
||||
# Please submit bugfixes or comments via http://bugs.opensuse.org/
|
||||
#
|
||||
|
||||
# norootforbuild
|
||||
|
||||
Name: openvpn
|
||||
BuildRequires: lzo-devel openssl-devel
|
||||
URL: http://openvpn.sourceforge.net/
|
||||
License: GNU General Public License (GPL), GNU Library General Public License v. 2.0 and 2.1 (LGPL)
|
||||
Group: Productivity/Networking/Security
|
||||
Autoreqprov: on
|
||||
%if 0%{?suse_version}
|
||||
PreReq: %insserv_prereq %fillup_prereq
|
||||
%endif
|
||||
Version: 2.0.9
|
||||
Release: 1
|
||||
Summary: Create VPN over Wireless and Ethernet Networks using a Tun Device
|
||||
Source: http://openvpn.net/release/openvpn-%{version}.tar.gz
|
||||
Source1: http://openvpn.net/signatures/openvpn-%{version}.tar.gz.asc
|
||||
Source2: openvpn.init
|
||||
Source3: openvpn.README.SUSE
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
|
||||
%description
|
||||
Create VPN over wireless and ethernet networks using a tun device.
|
||||
|
||||
|
||||
|
||||
Authors:
|
||||
--------
|
||||
James Yonan <jim@yonan.net>
|
||||
|
||||
%prep
|
||||
%setup
|
||||
|
||||
%build
|
||||
autoreconf -fi
|
||||
export CFLAGS="$RPM_OPT_FLAGS -Wall"
|
||||
export LDFLAGS=
|
||||
# build with fPIE/pie on SUSE 10.0 or newer, or on any other platform
|
||||
%if %{?suse_version:%suse_version}%{?!suse_version:99999} > 930
|
||||
CFLAGS="$CFLAGS -fPIE"
|
||||
LDFLAGS="$LDFLAGS -pie"
|
||||
%endif
|
||||
./configure --prefix=/usr --enable-pthread \
|
||||
--mandir=%_mandir --with-lzo-headers=%_includedir/lzo
|
||||
make
|
||||
|
||||
%install
|
||||
rm -rf $RPM_BUILD_ROOT
|
||||
make DESTDIR=$RPM_BUILD_ROOT install
|
||||
mkdir -p $RPM_BUILD_ROOT/etc/openvpn
|
||||
mkdir -p $RPM_BUILD_ROOT/var/run/openvpn
|
||||
install -D -m 755 $RPM_SOURCE_DIR/openvpn.init $RPM_BUILD_ROOT/etc/init.d/openvpn
|
||||
ln -sv ../../etc/init.d/openvpn $RPM_BUILD_ROOT/usr/sbin/rcopenvpn
|
||||
cp -p $RPM_SOURCE_DIR/openvpn.README.SUSE README.SUSE
|
||||
rm -f easy-rsa/build-key-server.orig
|
||||
|
||||
%clean
|
||||
if ! test -f /.buildenv; then rm -rf $RPM_BUILD_ROOT; fi
|
||||
|
||||
%post
|
||||
%{fillup_and_insserv -f}
|
||||
%if %{?suse_version:%suse_version}%{?!suse_version:0} > 820
|
||||
|
||||
%preun
|
||||
%stop_on_removal openvpn
|
||||
%endif
|
||||
|
||||
%postun
|
||||
%if %{?suse_version:%suse_version}%{?!suse_version:0} > 820
|
||||
%restart_on_update openvpn
|
||||
%endif
|
||||
%insserv_cleanup
|
||||
|
||||
%files
|
||||
%defattr(-,root,root)
|
||||
%doc AUTHORS COPYING COPYRIGHT.GPL ChangeLog INSTALL NEWS PORTS README
|
||||
%doc README.SUSE
|
||||
%doc contrib
|
||||
%doc easy-rsa
|
||||
%doc management
|
||||
%doc sample-config-files
|
||||
%doc sample-keys
|
||||
%doc sample-scripts
|
||||
%doc suse
|
||||
/usr/sbin/openvpn
|
||||
%doc %{_mandir}/man8/openvpn.8.gz
|
||||
%config(noreplace) /etc/openvpn/
|
||||
%config /etc/init.d/openvpn
|
||||
/usr/sbin/rcopenvpn
|
||||
%dir /var/run/openvpn
|
||||
|
||||
%changelog -n openvpn
|
||||
* Fri Oct 27 2006 - mt@suse.de
|
||||
- upstream 2.0.9, Windows related fixes only
|
||||
* Windows installer updated with OpenSSL 0.9.7l DLLs to fix
|
||||
published vulnerabilities.
|
||||
* Fixed TAP-Win32 bug that caused BSOD on Windows Vista
|
||||
(Henry Nestler). The TAP-Win32 driver has now been
|
||||
upgraded to version 8.4.
|
||||
* Wed Sep 27 2006 - poeml@suse.de
|
||||
- upstream 2.0.8
|
||||
* Windows installer updated with OpenSSL 0.9.7k DLLs to fix
|
||||
RSA Signature Forgery (CVE-2006-4339).
|
||||
* No changes to OpenVPN source code between 2.0.7 and 2.0.8.
|
||||
* Fri Jun 23 2006 - poeml@suse.de
|
||||
- upstream 2.0.7, with bug fixes:
|
||||
* When deleting routes under Linux, use the route metric
|
||||
as a differentiator to ensure that the route teardown
|
||||
process only deletes the identical route which was originally
|
||||
added via the "route" directive (Roy Marples).
|
||||
* Fixed bug where --server directive in --dev tap mode
|
||||
claimed that it would support subnets of /30 or less
|
||||
but actually would only accept /29 or less.
|
||||
* Extend byte counters to 64 bits (M. van Cuijk).
|
||||
* Better sanity checking of --server and --server-bridge
|
||||
IP pool ranges, so as not to hit the assertion at
|
||||
pool.c:119 (2.0.5).
|
||||
* Fixed bug where --daemon and --management-query-passwords
|
||||
used together would cause OpenVPN to block prior to
|
||||
daemonization.
|
||||
* Fixed client/server race condition which could occur
|
||||
when --auth-retry interact is set and the initially
|
||||
provided auth-user-pass credentials are incorrect,
|
||||
forcing a username/password re-query.
|
||||
* Fixed bug where if --daemon and --management-hold are
|
||||
used together, --user or --group options would be ignored.
|
||||
* fix for CVE-2006-1629 integrated (disallow "setenv" to be pushed
|
||||
to clients from the server)
|
||||
- build with fPIE/pie on SUSE 10.0 or newer, or on any other platform
|
||||
* Wed Apr 19 2006 - poeml@suse.de
|
||||
- security fix (CVE-2006-1629): disallow "setenv" to be pushed to
|
||||
clients from the server [#165123]
|
||||
* Wed Jan 25 2006 - mls@suse.de
|
||||
- converted neededforbuild to BuildRequires
|
||||
* Thu Nov 03 2005 - poeml@suse.de
|
||||
- update to 2.0.5, with two security fixes -- see below. [#132003]
|
||||
2005.11.02 -- Version 2.0.5
|
||||
* Fixed bug in Linux get_default_gateway function
|
||||
introduced in 2.0.4, which would cause redirect-gateway
|
||||
on Linux clients to fail.
|
||||
* Restored easy-rsa/2.0 tree (backported from 2.1 beta
|
||||
series) which accidentally disappeared in
|
||||
2.0.2 -> 2.0.4 transition.
|
||||
2005.11.01 -- Version 2.0.4
|
||||
* Security fix -- Affects non-Windows OpenVPN clients of
|
||||
version 2.0 or higher which connect to a malicious or
|
||||
compromised server. A format string vulnerability
|
||||
in the foreign_option function in options.c could
|
||||
potentially allow a malicious or compromised server
|
||||
to execute arbitrary code on the client. Only
|
||||
non-Windows clients are affected. The vulnerability
|
||||
only exists if (a) the client's TLS negotiation with
|
||||
the server succeeds, (b) the server is malicious or
|
||||
has been compromised such that it is configured to
|
||||
push a maliciously crafted options string to the client,
|
||||
and (c) the client indicates its willingness to accept
|
||||
pushed options from the server by having "pull" or
|
||||
"client" in its configuration file (Credit: Vade79).
|
||||
CVE-2005-3393
|
||||
* Security fix -- Potential DoS vulnerability on the
|
||||
server in TCP mode. If the TCP server accept() call
|
||||
returns an error status, the resulting exception handler
|
||||
may attempt to indirect through a NULL pointer, causing
|
||||
a segfault. Affects all OpenVPN 2.0 versions.
|
||||
CVE-2005-3409
|
||||
* Fix attempt of assertion at multi.c:1586 (note that
|
||||
this precise line number will vary across different
|
||||
versions of OpenVPN).
|
||||
* Added ".PHONY: plugin" to Makefile.am to work around
|
||||
"make dist" issue.
|
||||
* Fixed double fork issue that occurs when --management-hold
|
||||
is used.
|
||||
* Moved TUN/TAP read/write log messages from --verb 8 to 6.
|
||||
* Warn when multiple clients having the same common name or
|
||||
username usurp each other when --duplicate-cn is not used.
|
||||
* Modified Windows and Linux versions of get_default_gateway
|
||||
to return the route with the smallest metric
|
||||
if multiple 0.0.0.0/0.0.0.0 entries are present.
|
||||
2005.09.25 -- Version 2.0.3-rc1
|
||||
* openvpn_plugin_abort_v1 function wasn't being properly
|
||||
registered on Windows.
|
||||
* Fixed a bug where --mode server --proto tcp-server --cipher none
|
||||
operation could cause tunnel packet truncation.
|
||||
* Tue Aug 30 2005 - poeml@suse.de
|
||||
- update to 2.0.2 [#106258] relevant changes:
|
||||
* Fixed bug where "--proto tcp-server --mode p2p --management
|
||||
host port" would cause the management port to not respond until
|
||||
the OpenVPN peer connects.
|
||||
* Modified pkitool script to be /bin/sh compatible (Johnny Lam).
|
||||
* Tue Aug 23 2005 - poeml@suse.de
|
||||
- update to 2.0.1 [#106258]
|
||||
* Security Fix -- DoS attack against server when run with "verb 0" and
|
||||
without "tls-auth". If a client connection to the server fails
|
||||
certificate verification, the OpenSSL error queue is not properly
|
||||
flushed, which can result in another unrelated client instance on the
|
||||
server seeing the error and responding to it, resulting in disconnection
|
||||
of the unrelated client (CAN-2005-2531).
|
||||
* Security Fix -- DoS attack against server by authenticated client.
|
||||
This bug presents a potential DoS attack vector against the server
|
||||
which can only be initiated by a connected and authenticated client.
|
||||
If the client sends a packet which fails to decrypt on the server,
|
||||
the OpenSSL error queue is not properly flushed, which can result in
|
||||
another unrelated client instance on the server seeing the error and
|
||||
responding to it, resulting in disconnection of the unrelated client
|
||||
(CAN-2005-2532).
|
||||
* Security Fix -- DoS attack against server by authenticated client.
|
||||
A malicious client in "dev tap" ethernet bridging mode could
|
||||
theoretically flood the server with packets appearing to come from
|
||||
hundreds of thousands of different MAC addresses, causing the OpenVPN
|
||||
process to deplete system virtual memory as it expands its internal
|
||||
routing table. A --max-routes-per-client directive has been added
|
||||
(default=256) to limit the maximum number of routes in OpenVPN's
|
||||
internal routing table which can be associated with a given client
|
||||
(CAN-2005-2533).
|
||||
* Security Fix -- DoS attack against server by authenticated client.
|
||||
If two or more client machines try to connect to the server at the
|
||||
same time via TCP, using the same client certificate, and when
|
||||
--duplicate-cn is not enabled on the server, a race condition can
|
||||
crash the server with "Assertion failed at mtcp.c:411"
|
||||
(CAN-2005-2534).
|
||||
* Fixed server bug where under certain circumstances, the client instance
|
||||
object deletion function would try to delete iroutes which had never been
|
||||
added in the first place, triggering "Assertion failed at mroute.c:349".
|
||||
* Added --auth-retry option to prevent auth errors from being fatal
|
||||
on the client side, and to permit username/password requeries in case
|
||||
of error. Also controllable via new "auth-retry" management interface
|
||||
command. See man page for more info.
|
||||
* Added easy-rsa 2.0 scripts to the tarball in easy-rsa/2.0
|
||||
* Fixed bug in openvpn.spec where rpmbuild --define 'without_pam 1'
|
||||
would fail to build.
|
||||
* Implement "make check" to perform loopback tests (Matthias Andree).
|
||||
- drop obsolete patch which fixed finding lzo libraries
|
||||
* Tue Jun 28 2005 - mrueckert@suse.de
|
||||
- The previous patch didnt work with lzo1 based distros. Fixed.
|
||||
* Tue Jun 28 2005 - cthiel@suse.de
|
||||
- fixed build with lzo2 (added lzo2.diff)
|
||||
* Thu Jun 23 2005 - ro@suse.de
|
||||
- build with fPIE/pie
|
||||
* Thu Jun 02 2005 - hvogel@suse.de
|
||||
- lzo headers are in a subdirectory now
|
||||
* Tue Apr 19 2005 - cthiel@suse.de
|
||||
- update to 2.0
|
||||
* Thu Feb 17 2005 - poeml@suse.de
|
||||
- update to 2.0_rc14
|
||||
- add README.SUSE
|
||||
* Fri Jan 28 2005 - poeml@suse.de
|
||||
- update to 2.0_rc10
|
||||
* Wed Dec 29 2004 - poeml@suse.de
|
||||
- update to 2.0_rc6
|
||||
* Wed Dec 29 2004 - poeml@suse.de
|
||||
- update to 2.0_rc1 (closing #45979)
|
||||
IMPORTANT: OpenVPN's default port number is now 1194, based on an
|
||||
official port number assignment by IANA. OpenVPN 2.0-beta16 and
|
||||
earlier used 5000 as the default port.
|
||||
-> see http://openvpn.net/20notes.html
|
||||
- remove lzo sources, which come in a separate package since 9.2
|
||||
* Mon Jul 26 2004 - poeml@suse.de
|
||||
- update to 1.6_rc4
|
||||
- bzip2 sources
|
||||
* Sun Jan 11 2004 - adrian@suse.de
|
||||
- build as user
|
||||
* Tue Dec 16 2003 - wengel@suse.de
|
||||
- update to version 1.5.0
|
||||
* Sun Sep 07 2003 - poeml@suse.de
|
||||
- add an init script
|
||||
- use RPM_OPT_FLAGS
|
||||
- add /var/run/openvpn directory for pid files
|
||||
* Thu Jul 31 2003 - wengel@suse.de
|
||||
- update to new version -> 1.4.2
|
||||
* Tue May 27 2003 - coolo@suse.de
|
||||
- use BuildRoot
|
||||
- package a bit more straightforward
|
||||
* Mon May 19 2003 - wengel@suse.de
|
||||
- update to version 1.4.1
|
||||
* Mon Jan 20 2003 - wengel@suse.de
|
||||
- initial package
|
Loading…
Reference in New Issue
Block a user