[snip]
> > The user should not have the ability to logon to a machine with
> > OpenVPN installed if they are not allowed to use OpenVPN, or that user
> > should not have access to run the GUI (maybe the OpenVPN Service
> > should not even be running).
> 
> These are not the questions. The ability to access to openvpn is not a
> matter of openvpn, just one of the computer admin. And even if a user
> have openvpn installed, a good conf must need a USER certificate or a
> user/pass to allow him to connect to the vpn server. So it's not a
> matter of openvpn too, but one of the openvpn admin.
> 
> > The certificate is authenticating the computer.
> 
> It's the actual openvpn features. But much openvpn addicts would be very
> pleased to make openvpn works like other commercial vpn, with USER
> certificate.
> 
> Btw, MSDN cryptoapi docs don't talk about a way to get userspace certs
> from a SYSTEM rights. I think a way to solve this issue would be to make
>   openvpn deals with a userspace component which one could get the
> certificate and supply desired data to openvpn at tunnel startup. This
> userspace component could be openvpn-gui or another program. I really
> don't know if this kind of solution is technicaly possible. Only true
> openvpn hackers could ;-)
> 

All good points. I must add a couple of my own. 

1) OpenVPN is cross platform.
2) Apparently a MS design implementation. Could possible be rectified
my having the service use the user login instead of system.
3) At this stage I think changes of this magnitude, as you suggest,
would most likely be post 2.0.  James an the other brains behind this
would know better.

-- 
Leonard Isham, CISSP
Ostendo non ostento.

Reply via email to