On 06/10/17 08:58, Илья Шипицин wrote:
> Hello,
> 
> I used to run openvpn in login/password mode for years.
> now, I'm getting working certificate setup.
> 
> 
> what I found strange about revoked certificates ... from client point of
> view it looks like any other "tls key negotiation timeout"
> 
> is there a way to signal user "hey, you key is revoked" ?

Nope, not in the current implementation and design.  To be able to
signal that, you need to have some established a connection.  And that
cannot be done unless the client provides a valid certificate.  If the
certificate is invalid (issued by wrong CA, expired, revoked), the
server just drops the ball.

Perhaps we could look into adding a new OPCODE which could signal
connection errors.  But that needs to be very carefully implemented so
we don't open up for various DoS attacks or more effective bruteforce
attacks.  Such a message would also need to be verifiable too, otherwise
it would be too easy for a filtering firewall or gateway to just respond
back with such a rejection message instead of passing the packet
further; effectively shutting down clients with the wrong presumptions.
Plus it needs to be implemented in the OpenVPN 3 Core library as well
(which OpenVPN Connect clients uses).  So this isn't even a quick-fix.

But I would also be very cautious about providing reasons back to
clients though.  For all these various invalid certificate scenarios we
definitely should not give a too fine grained explanation.  IMO, only a
"Invalid certificate" message should be considered.


-- 
kind regards,

David Sommerseth
OpenVPN, Inc


Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to