Am 14.02.16 um 21:59 schrieb Steffan Karger: > Hi Arne, > > Thanks for reviewing. Attached a v2, and below inline responses to > your remarks. >
ACK. I looked through the changes and it is now good to go. > On Wed, Feb 10, 2016 at 2:13 PM, Arne Schwabe <a...@rfc2549.org> wrote: >>> AC_ARG_ENABLE( >>> [aead-modes], >>> [AS_HELP_STRING([--disable-aead-modes], [disable AEAD crypto modes >>> @<:@default=yes@:>@])], >>> , >>> [enable_aead_modes="yes"] >>> ) >> >> I would not make this user configurable. If it wasn't for RHEL5 I even >> would throw out 0.9.8 support and always compile it in. > > I agree. I removed the configurability. > > Now that OpenSSL has officially stopped supporting 0.9.8 and 1.0.0 (as > of 31st Dec 2015), we might want to revisit our decision to support > those in 2.4/master, but let's not do that as a part of this patch set > :) >> { >> + /* Get the key we will use to encrypt the packet. */ >> tls_pre_encrypt (c->c2.tls_multi, &c->c2.buf, &co); >> + /* If using P_DATA_V2, prepend the 1-byte opcode and 3-byte peer-id >> to the >> + * packet before openvpn_encrypt(), so we can authenticate the opcode >> too. >> + */ >> + if (c->c2.buf.len > 0 && !c->c2.tls_multi->opt.server && >> c->c2.tls_multi->use_peer_id) >> >> The latter part of that if might be turned into a small inline fuction >> to make it clearer. Or alternatively a local boolean variable to be used >> in both if places. > > Hm, I tried that but don't really like it. I'd rather simplify this > by making server->client traffic use P_DATA_V2 too (but didn't want to > do that in this patch set). Yes. Also better alignment for those packets. > Good point. I took the opportunity to also explain a bit more about > the relation between --auth and --tls-auth. Good idea. And we may need another patch for the Changes.rst Arne