summaryrefslogtreecommitdiffstats
path: root/TODO.ipv6
diff options
context:
space:
mode:
authorJuanJo Ciarlante <jjo@google.com>2009-09-28 12:16:26 +0200
committerJuanJo Ciarlante <juanjosec@gmail.com>2011-03-25 13:30:29 +0100
commitbf006408d08253f1b86c491e44e75ef8ca2e3e9b (patch)
tree38cb23e4bb64d021d337827770060b7c6c1893aa /TODO.ipv6
parentd7627b1a5197a8634e011bb100849c45a612602d (diff)
downloadopenvpn-bf006408d08253f1b86c491e44e75ef8ca2e3e9b.tar.gz
openvpn-bf006408d08253f1b86c491e44e75ef8ca2e3e9b.tar.xz
openvpn-bf006408d08253f1b86c491e44e75ef8ca2e3e9b.zip
* updated {README,TODO}.ipv6 from feedback at openvpn-devel mlist
Diffstat (limited to 'TODO.ipv6')
-rw-r--r--TODO.ipv630
1 files changed, 19 insertions, 11 deletions
diff --git a/TODO.ipv6 b/TODO.ipv6
index c19e42c..55602f9 100644
--- a/TODO.ipv6
+++ b/TODO.ipv6
@@ -1,11 +1,19 @@
-* make possible to get AF from getaddrinfo() answer, ie allow openvpn to
- use ipv4/6 if DNS returns A/AAAA without specifying protocol.
- Hard: requires deep changes in initialization/calling logic
-* the getaddr()/getaddr6() interface is not prepared for handling socktype
- "tagging", currently I abuse the sockflags bits for getting the ai_socktype
- downstream.
-* win32: find out about mapped addresses, as I can't make it work
- with bound at ::1 and connect to 127.0.0.1
-* implement comparison for mapped addesses: server in dual stack
- listening IPv6 must permit incoming streams from allowed IPv4 peer,
- currently you need to pass eg: --remote ffff::1.2.3.4
+* All platforms:
+ o mgmt console: as currently passes straight in_addr_t bits around
+
+ o make possible to get AF from getaddrinfo() answer, ie allow openvpn to
+ use ipv4/6 if DNS returns A/AAAA without specifying protocol.
+ Hard: requires deep changes in initialization/calling logic
+
+ o the getaddr()/getaddr6() interface is not prepared for handling socktype
+ "tagging", currently I abuse the sockflags bits for getting the ai_socktype
+ downstream.
+
+ o implement comparison for mapped addesses: server in dual stack
+ listening IPv6 must permit incoming streams from allowed IPv4 peer,
+ currently you need to pass eg: --remote ffff::1.2.3.4
+
+* win32:
+ o find out about mapped addresses, as I can't make it work
+ with bound at ::1 and connect to 127.0.0.1
+