On 23/04/17 10:59, Steffan Karger wrote:
> Hi,
> 
> The change makes sense, so 'Feature-ACK', but one remark:
> 
> On 20-04-17 16:41, Hristo Venev wrote:
>> @@ -191,16 +191,23 @@ extract_x509_field_ssl(X509_NAME *x509, const char 
>> *field_name, char *out,
>>      X509_NAME_ENTRY *x509ne = 0;
>>      ASN1_STRING *asn1 = 0;
>>      unsigned char *buf = NULL;
>> -    int nid = OBJ_txt2nid(field_name);
>> +    ASN1_OBJECT *obj = OBJ_txt2obj(field_name, 0);
>> +
>> +    if (obj == NULL)
>> +    {
>> +        crypto_msg(M_FATAL, "Cannot get ASN1_OBJECT for %s", field_name);
>> +    }
> 
> M_FATAL is currently acceptable, because field_name always comes from
> the local config file, but I'd prefer to make this non-fatal, and return
> FAILURE.  That ensures that if someone decides to use this function in a
> way where field_name *is* attacker controlled, we do not introduce a
> remote DoS.
> 
> As for the log level of this message: I think D_TLS_DEBUG_LOW (--verb 3)
> or possibly D_TLS_ERRORS (--verb 1) are appropriate.

Agreed!  I'm leaning towards D_TLS_ERRORS over D_TLS_DEBUG_LOW.  This
field is normally configured via the configuration file, IIUC (
like --x509-username-field).  So if this fails, it should have a very
low threshold of warning the sys-admin.  Normally, this shouldn't happen
unless a client is truly miss-configured.


-- 
kind regards,

David Sommerseth
OpenVPN Technologies, Inc


Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to