Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Introduce global option --force-safe-ssl #935

Merged
merged 1 commit into from
Apr 13, 2023

Conversation

TinCanTech
Copy link
Collaborator

easyrsa_openssl() default behaviour is to re-use the generated safe SSL config file, after bieng called for the first time. NOTE: easyrsa_openssl() is a heavily nested function.

This option forces recreation of a safe SSL config file for each call to easyrsa_openssl().

Only effective when an SSL config fie is required.

easyrsa_openssl() default behaviour is to re-use the generated
safe SSL config file, after bieng called for the first time.
NOTE: easyrsa_openssl() is a heavily nested function.

This option forces recreation of a safe SSL config file for each
call to easyrsa_openssl().

Only effective when an SSL config fie is required.

Signed-off-by: Richard T Bonhomme <tincantech@protonmail.com>
@TinCanTech
Copy link
Collaborator Author

TinCanTech commented Apr 12, 2023

This is simply a debug option in the event that #931 goes wrong.

Regarding #931,
I have proved it works but cannot prove that it does not work,

SSL config file is static, as are the parameter expansions, it works.

@TinCanTech TinCanTech added Full-Approval Merge is imminent and removed development Possible changes labels Apr 13, 2023
@TinCanTech TinCanTech merged commit dd30507 into OpenVPN:master Apr 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant