Hi,

On Wed, May 2, 2018 at 2:30 PM, Steffan Karger <stef...@karger.me> wrote:
> Hi,
>
> On 26-03-18 18:36, Ning Wei via Openvpn-devel wrote:
>> Both of key_method_2_write and key_method_2_read take
>> TLS_Channel_Bug_Size as buffer size.  The current size, 2048 is not
>> enough to read/write a long password response.  I have notice the
>> management interface has a much smaller than 2048 buffer size to
>> read/write.  Currently, if the management interface is not used,
>> increasing tls channel buffer size will serve the need.
>>
>> As token provider, the size of token can be bigger or smaller.
>> Sometime, it has more than 1600 as a token.  To accommodate that, a
>> bigger buffer size will be needed.
>
> I don't think this is achieving what you want.  The username/password
> size on the OpenVPN protocol are fixed at 128 bytes max, and can not be
> changes without introducing a new protocol version or interoperability
> problems.  See the USER_PASS_LEN variable used in key_method_2_read.

USER_PASS_LEN is 4096 (not 128) for builds with ENABLE_PKCS11 and that was
the assumption behind this patch.

I'm not endorsing this patch but we do need changes to management interface and
option parsing to allow long user/pass strings to support newer
challenge-response
protocols. Those changes are not hard but this patch falls short as I
had pointed
out earlier.

Selva

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to