On Mon, 2012-04-23 at 07:44 -0700, Pstrang Rzekle wrote: > Openconnect doesn't seem to understand the option > enable_csd_trojan=yes. If you run 'openconnect --help' it'll show you the options that it supports. You need to specify a user to run the trojan as, and then it should work. Obviously, you can say '--csd-user=root' but then you're downloading their trojan from the server and running it as root. Not necessarily the most cunning plan... but then again, you're running their client right now so it can't get any worse. Perhaps make a dummy user with no privileges and run the trojan as *that* user? NetworkManager will be running it as your user, FWIW. Run with the '-v' option and show the output, and we'll see what's happening. -- dwmw2 -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/x-pkcs7-signature Size: 5818 bytes Desc: not available URL: <http://lists.infradead.org/pipermail/openconnect-devel/attachments/20120423/d77ef96c/attachment.bin>