Hi,

On Mon, Mar 12, 2018 at 10:37:53AM -0400, Selva Nair wrote:
> Agree, this could qualify for 2.4. Anyway, the context is the same and
> it applies/cherry-picks to 2.4 without issues.

OK, thanks.

> Elsewhere in the code we only warn about expired certs (like those
> read from a file) and continue with the connection to eventually end
> up with the unhelpful "TLS key negotiation failed to complete. Check
> your network..." error [*].  In that sense this is a regression. IMO, the 
> client
> should error out on invalid certs from other sources as well.

Well.  In other cases, we do not have anything else to try, and when
Steffan added the "oh, this might have expired!" warning, it was much
better than the "mysterious TLS handshake failure" we had before.

The reason it's only a warning was a conscious decision: our clock might
be wrong, or sufficiently different from the server's clock that it
actually *could* be valid on his side.  So we print a warning so it's
more obvious why it fails, but try anyway.

But I do not have strong feelings either way, so if "you" (for an 
unspecified value of "you") want to change this to error out, fine with 
me :-) - I just wanted to provide background.

gert
-- 
now what should I write here...

Gert Doering - Munich, Germany                             g...@greenie.muc.de

Attachment: signature.asc
Description: PGP signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to