mts.spb.s...@mail.ru wrote:
Hello Alon,
Thank you, I got it working.
I am glad.
Is it possible not to keep the "ca.crt" on local disk and fetch it
from the token as well? I've put all the certs and keys into PKCS#12
file and imported it into the token - along with the "ca.crt".
Currently OpenVPN demands on having this certificate locally.
Putting the CA certificate on the smartcard is a potential
security issue. Each time you log into the token some one
can modify its contents. By putting a different trust on
your token, hence you can be venerable to man-in-the middle
attack. One should separate between the identity and the trust.
Identity should be stored on cryptographic token, trust
should be stored statically where application resides.
Is it possible to hide the "ta.key" (that is used for "tls-auth") in
the token as well?
Well.. Many providers do not support HMAC with key in-side
the token... I can store this key as a data object and
export it during initialization... But using smartcard as a
mass storage device is not a good idea... Especially when
this key is common for every users that uses a specific server.
I will be glad to receive further comments regarding this
issue... If it is important feature I will implement it.
Best Regards,
Alon Bar-Lev.