2017-10-06 14:42 GMT+05:00 David Sommerseth <
open...@sf.lists.topphemmelig.net>:

> On 06/10/17 11:37, Илья Шипицин wrote:
> >
> >
> > 2017-10-06 14:11 GMT+05:00 David Sommerseth
> > <open...@sf.lists.topphemmelig.net
> > <mailto:open...@sf.lists.topphemmelig.net>>:
> >
> >     On 06/10/17 11:02, Илья Шипицин wrote:
> >     >
> >     >
> >     > 2017-10-06 13:43 GMT+05:00 David Sommerseth
> >     > <open...@sf.lists.topphemmelig.net
> >     <mailto:open...@sf.lists.topphemmelig.net>
> >     > <mailto:open...@sf.lists.topphemmelig.net
> >     <mailto:open...@sf.lists.topphemmelig.net>>>:
> >     >
> >     >     On 06/10/17 08:58, Илья Шипицин wrote:
> >     >     > Hello,
> >     >     >
> >     >     > I used to run openvpn in login/password mode for years.
> >     >     > now, I'm getting working certificate setup.
> >     >     >
> >     >     >
> >     >     > what I found strange about revoked certificates ... from
> >     client point of
> >     >     > view it looks like any other "tls key negotiation timeout"
> >     >     >
> >     >     > is there a way to signal user "hey, you key is revoked" ?
> >     >
> >     >     Nope, not in the current implementation and design.  To be
> able to
> >     >     signal that, you need to have some established a connection.
> >     And that
> >     >     cannot be done unless the client provides a valid
> >     certificate.  If the
> >     >     certificate is invalid (issued by wrong CA, expired, revoked),
> the
> >     >     server just drops the ball.
> >     >
> >     >     Perhaps we could look into adding a new OPCODE which could
> signal
> >     >     connection errors.  But that needs to be very carefully
> >     implemented so
> >     >     we don't open up for various DoS attacks or more effective
> >     bruteforce
> >     >     attacks.  Such a message would also need to be verifiable too,
> >     otherwise
> >     >     it would be too easy for a filtering firewall or gateway to
> >     just respond
> >     >     back with such a rejection message instead of passing the
> packet
> >     >     further; effectively shutting down clients with the wrong
> >     presumptions.
> >     >     Plus it needs to be implemented in the OpenVPN 3 Core library
> >     as well
> >     >     (which OpenVPN Connect clients uses).  So this isn't even a
> >     quick-fix.
> >     >
> >     >     But I would also be very cautious about providing reasons back
> to
> >     >     clients though.  For all these various invalid certificate
> >     scenarios we
> >     >     definitely should not give a too fine grained explanation.
> >     IMO, only a
> >     >     "Invalid certificate" message should be considered.
> >     >
> >     >
> >     > taking all the above into account, I would compare things in
> >     "https" world.
> >     > both "server cert error" and "client cert error" are handled in
> >     somewhat
> >     > friendly way (without considering such additional information as a
> >     > security breach)
> >
> >     But the OpenVPN wire protocol is anything similar to standard SSL/TLS
> >     protocols.  The SSL/TLS protocol is wrapped into an OpenVPN
> container,
> >     where the SSL/TLS specifics packets happens in a limited set of of
> the
> >     OpenVPN wire protocol, most commonly referred to as the control
> channel.
> >
> >     In addition, what happens when you try to use a revoked *client*
> >     certificate when connecting to an HTTPS server demanding client
> >     certificates to be present?
> >
> >
> > 403
> >
> > (with customizable error message)
> Really?  That shouldn't be possible, as you don't have an established
> TLS connection to provide the HTTP 403 response.  Because the server
> should reject the connection as the *client* certificate is invalid.
>


I did test on IIS with "certificate required", when you connect without
cert, you can see 403.
ok, I'll test with revoked cert as well


>
>
> --
> kind regards,
>
> David Sommerseth
> OpenVPN, Inc
>
>
>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to