From owner-freebsd-ports-bugs@FreeBSD.ORG Sun Apr 24 11:40:19 2005 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2185016A4CE for ; Sun, 24 Apr 2005 11:40:19 +0000 (GMT) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id D06C643D1D for ; Sun, 24 Apr 2005 11:40:18 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.3/8.13.3) with ESMTP id j3OBeIPY055818 for ; Sun, 24 Apr 2005 11:40:18 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.3/8.13.1/Submit) id j3OBeIpp055814; Sun, 24 Apr 2005 11:40:18 GMT (envelope-from gnats) Resent-Date: Sun, 24 Apr 2005 11:40:18 GMT Resent-Message-Id: <200504241140.j3OBeIpp055814@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Matthias Andree Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id D0D6A16A58D for ; Sun, 24 Apr 2005 11:33:26 +0000 (GMT) Received: from unimail.uni-dortmund.de (mx1.HRZ.Uni-Dortmund.DE [129.217.128.51]) by mx1.FreeBSD.org (Postfix) with ESMTP id 8D3C243D2D for ; Sun, 24 Apr 2005 11:33:25 +0000 (GMT) (envelope-from matthias.andree@gmx.de) Received: from m2a2.myip.org (yy011e29f0wfv668@p50915B5C.dip.t-dialin.net [80.145.91.92]) (authenticated bits=0)j3OBXARw028491; Sun, 24 Apr 2005 13:33:15 +0200 (CEST) Received: by merlin.emma.line.org (Postfix, from userid 1001) id 2CB2D1B24C; Sun, 24 Apr 2005 13:33:09 +0200 (CEST) Message-Id: <20050424113309.2CB2D1B24C@merlin.emma.line.org> Date: Sun, 24 Apr 2005 13:33:09 +0200 (CEST) From: Matthias Andree To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Subject: ports/80300: [MAINTAINER] security/openvpn: revise pkg-message X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Apr 2005 11:40:19 -0000 >Number: 80300 >Category: ports >Synopsis: [MAINTAINER] security/openvpn: revise pkg-message >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Sun Apr 24 11:40:18 GMT 2005 >Closed-Date: >Last-Modified: >Originator: Matthias Andree >Release: FreeBSD 5.4-STABLE i386 >Organization: >Environment: System: FreeBSD merlin.emma.line.org 5.4-STABLE FreeBSD 5.4-STABLE #27: Sat Apr 23 11:36:13 CEST 2005 >Description: revise pkg-message to mark more prominently that the default port is now 1194 rather than 5000, and refer users to the online release notes if looking for information WRT older versions. Generated with FreeBSD Port Tools 0.63 >How-To-Repeat: >Fix: --- openvpn-2.0.patch begins here --- diff -ruN --exclude=CVS /usr/ports/security/openvpn/pkg-message /root/ports/security/openvpn/pkg-message --- /usr/ports/security/openvpn/pkg-message Sat Apr 23 11:29:38 2005 +++ /root/ports/security/openvpn/pkg-message Sun Apr 24 13:30:52 2005 @@ -11,17 +11,10 @@ ### mssfix 1450 ### ### ### ### key-method 2 <- this key-method line only for TLS setups ### +### - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ### +### WARNING: THE DEFAULT PORT HAS CHANGED AND IS NOW 1194! ### +### OpenVPN 1.6 and older used 5000 rather than 1194 as their default ### +### port, so add the proper port options to your configuration file! ### ### ---------------------------------------------------------------------- ### -### When connecting to 1.4.X or older peers with a TAP-style tunnel, set ### -### --tun-mtu 1500 --tun-mtu-extra 32 on the peer. ### -### ### -### To retain backwards compatibility of OpenVPN 1.3.0 with OpenVPN peers ### -### that run older versions (back to 1.1.0), you will have to set the MTU ### -### explicitly by command line options since OpenVPN 1.3.0. ### -### ### -### When using TLS security and your peer runs OpenVPN 1.3.X, the PEER ### -### must use --disable-occ. This version of OpenVPN cannot use TLS mode ### -### to peers running OpenVPN 1.2.x or older. ### -### ### -### Note: use at most --verb 4 for regular use, --verb 5 is for debugging ### +### For further compatibility, see ### ### ---------------------------------------------------------------------- ### --- openvpn-2.0.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted: