OpenVPN's current cryptoapicert implementation does not support TLS 1.2
(and newer).  Fixing this requires a rewrite of our cryptoapi code to use
Microsofts' "Cryptography API: Next Generation", and several hacks to work
around that API.  As long as we don't fix that, make openvpn automatically
cap the TLS version to 1.1 when using cryptoapi (and tell the user we're
doing so).  This enables the user to use cryptoapi + TLS version
negotiation (upto TLS 1.1) without having to change his configuration.

This patch has been tested on Windows 8.1 for both the master and
release/2.3 branches.

Signed-off-by: Steffan Karger <stef...@karger.me>
---
 src/openvpn/options.c | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)

diff --git a/src/openvpn/options.c b/src/openvpn/options.c
index 2909c89..4ea03d1 100644
--- a/src/openvpn/options.c
+++ b/src/openvpn/options.c
@@ -2508,6 +2508,24 @@ options_postprocess_mutate (struct options *o)
        options_postprocess_http_proxy_override(o);
 #endif

+#ifdef ENABLE_CRYPTOAPI
+  if (o->cryptoapi_cert)
+    {
+      const int tls_version_max =
+         (o->ssl_flags >> SSLF_TLS_VERSION_MAX_SHIFT) &
+         SSLF_TLS_VERSION_MAX_MASK;
+
+      if (tls_version_max == TLS_VER_UNSPEC || tls_version_max > TLS_VER_1_1)
+       {
+         msg(M_WARN, "Warning: cryptapicert used, setting maximum TLS "
+             "version to 1.1.");
+         o->ssl_flags &= ~(SSLF_TLS_VERSION_MAX_MASK <<
+             SSLF_TLS_VERSION_MAX_SHIFT);
+         o->ssl_flags |= (TLS_VER_1_1 << SSLF_TLS_VERSION_MAX_SHIFT);
+       }
+    }
+#endif /* ENABLE_CRYPTOAPI */
+
 #if P2MP
   /*
    * Save certain parms before modifying options via --pull
-- 
2.1.0


Reply via email to