Am 14.02.16 um 21:59 schrieb Steffan Karger:
> Hi Arne,
> 
> Thanks for reviewing.  Attached a v2, and below inline responses to
> your remarks.
> 

ACK. I looked through the changes and it is now good to go.

> On Wed, Feb 10, 2016 at 2:13 PM, Arne Schwabe <a...@rfc2549.org> wrote:
>>> AC_ARG_ENABLE(
>>>     [aead-modes],
>>>     [AS_HELP_STRING([--disable-aead-modes], [disable AEAD crypto modes
>>> @<:@default=yes@:>@])],
>>>     ,
>>>     [enable_aead_modes="yes"]
>>> )
>>
>> I would not make this user configurable. If it wasn't for RHEL5 I even
>> would throw out 0.9.8 support and always compile it in.
> 
> I agree.  I removed the configurability.
> 
> Now that OpenSSL has officially stopped supporting 0.9.8 and 1.0.0 (as
> of 31st Dec 2015), we might want to revisit our decision to support
> those in 2.4/master, but let's not do that as a part of this patch set
> :)

>>      {
>> +      /* Get the key we will use to encrypt the packet. */
>>        tls_pre_encrypt (c->c2.tls_multi, &c->c2.buf, &co);
>> +      /* If using P_DATA_V2, prepend the 1-byte opcode and 3-byte peer-id 
>> to the
>> +       * packet before openvpn_encrypt(), so we can authenticate the opcode 
>> too.
>> +       */
>> +      if (c->c2.buf.len > 0 && !c->c2.tls_multi->opt.server && 
>> c->c2.tls_multi->use_peer_id)
>>
>> The latter part of that if might be turned into a small inline fuction
>> to make it clearer. Or alternatively a local boolean variable to be used
>> in both if places.
> 
> Hm, I tried that but don't really like it.  I'd rather simplify this
> by making server->client traffic use P_DATA_V2 too (but didn't want to
> do that in this patch set).

Yes. Also better alignment for those packets.

> Good point.  I took the opportunity to also explain a bit more about
> the relation between --auth and --tls-auth.

Good idea.


And we may need another patch for the Changes.rst

Arne

Reply via email to