On 15/01/17 14:52, Pavel Raiskup wrote:
> On Sunday, January 15, 2017 11:08:38 AM CET David Sommerseth wrote:
>> On 15/01/17 07:17, Pavel Raiskup wrote:
>>> Adding a new --with-ca-bundle configure option.  It's argument is
>>> used as default CA file when no --ca option is specified at
>>> runtime.
>>>
>>> This option is primarily designed for systems where users are
>>> allowed to manage trusted authorities for whole system (in one
>>> consolidated file; usually implemented in 'ca-certificates'
>>> package).
>>>
>>> Signed-off-by: Pavel Raiskup <prais...@redhat.com>
>>> ---
>>>  configure.ac          | 5 +++++
>>>  src/openvpn/options.c | 9 +++++++++
>>>  2 files changed, 14 insertions(+)
>>
>> As this was mentioned on a Red Hat Bugzilla (bz #1413343 [1]) as well,
>> I'm reiterating my argument here for closing that bugzilla as notabug.
>>
>> I completely agree with Steffan, this is a NAK.  Such a feature would be
>> a dreamscenario for The Great Firewall of China and similar national
>> routing instances which implements complete network surveillance.  It
>> would make it extremely trivial for them to implement a MITM OpenVPN
>> server which would affect users not being aware of this issue.
>>
>> This feature would elude users configuring OpenVPN it is no problem
>> using certificates from public CA issuers.  This is a VERY BAD idea!  We
>> should help users configure OpenVPN in a secure way by default.  Not the
>> opposite.
> 
> Ack, I originally thought about this as tool to solve "packaging issue".
> We have corporate-wide authority, and people usually have it stored in
> bundle.  But I got the point, and such a shame mistake -- there's too many
> trusted CAs.

I would recommend seeing the CA file being part of the configuration
instead of a packaging detail.  And you can embedd the CA inside the
configuration file ... just do this in the config:

  <ca>
  -----BEGIN CERTIFICATE-----
  ....
  ....
  ....
  -----END CERTIFICATE-----
  </ca>

This replaces the 'ca /path/to/ca.pem' line in the configuration file.

Otherwise, for enterprises doing their own packaging ... it is also
possible to install the OpenVPN CA file in /etc/pki/.... which is easily
done with RPM files which again can be pushed out through internal
repositories or Satellite.  The distributed configurations would then
just need to use 'ca /etc/pki/tls/cert/openvpn-ca.pem'.

It all depends on how often it is expected to distribute configuration
files vs how often the CA certificate is renewed.


-- 
kind regards,

David Sommerseth
OpenVPN Technologies, Inc


Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today. http://sdm.link/xeonphi
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to