On 06/10/17 11:02, Илья Шипицин wrote:
> 
> 
> 2017-10-06 13:43 GMT+05:00 David Sommerseth
> <open...@sf.lists.topphemmelig.net
> <mailto:open...@sf.lists.topphemmelig.net>>:
> 
>     On 06/10/17 08:58, Илья Шипицин wrote:
>     > Hello,
>     >
>     > I used to run openvpn in login/password mode for years.
>     > now, I'm getting working certificate setup.
>     >
>     >
>     > what I found strange about revoked certificates ... from client point of
>     > view it looks like any other "tls key negotiation timeout"
>     >
>     > is there a way to signal user "hey, you key is revoked" ?
> 
>     Nope, not in the current implementation and design.  To be able to
>     signal that, you need to have some established a connection.  And that
>     cannot be done unless the client provides a valid certificate.  If the
>     certificate is invalid (issued by wrong CA, expired, revoked), the
>     server just drops the ball.
> 
>     Perhaps we could look into adding a new OPCODE which could signal
>     connection errors.  But that needs to be very carefully implemented so
>     we don't open up for various DoS attacks or more effective bruteforce
>     attacks.  Such a message would also need to be verifiable too, otherwise
>     it would be too easy for a filtering firewall or gateway to just respond
>     back with such a rejection message instead of passing the packet
>     further; effectively shutting down clients with the wrong presumptions.
>     Plus it needs to be implemented in the OpenVPN 3 Core library as well
>     (which OpenVPN Connect clients uses).  So this isn't even a quick-fix.
> 
>     But I would also be very cautious about providing reasons back to
>     clients though.  For all these various invalid certificate scenarios we
>     definitely should not give a too fine grained explanation.  IMO, only a
>     "Invalid certificate" message should be considered.
> 
> 
> taking all the above into account, I would compare things in "https" world.
> both "server cert error" and "client cert error" are handled in somewhat
> friendly way (without considering such additional information as a
> security breach)

But the OpenVPN wire protocol is anything similar to standard SSL/TLS
protocols.  The SSL/TLS protocol is wrapped into an OpenVPN container,
where the SSL/TLS specifics packets happens in a limited set of of the
OpenVPN wire protocol, most commonly referred to as the control channel.

In addition, what happens when you try to use a revoked *client*
certificate when connecting to an HTTPS server demanding client
certificates to be present?


-- 
kind regards,

David Sommerseth
OpenVPN, Inc


Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to