Hi,
Hi,

On 02-05-18 20:40, Selva Nair wrote:
> On Wed, May 2, 2018 at 2:30 PM, Steffan Karger <stef...@karger.me> wrote:
>> On 26-03-18 18:36, Ning Wei via Openvpn-devel wrote:
>>> Both of key_method_2_write and key_method_2_read take
>>> TLS_Channel_Bug_Size as buffer size.  The current size, 2048 is not
>>> enough to read/write a long password response.  I have notice the
>>> management interface has a much smaller than 2048 buffer size to
>>> read/write.  Currently, if the management interface is not used,
>>> increasing tls channel buffer size will serve the need.
>>>
>>> As token provider, the size of token can be bigger or smaller.
>>> Sometime, it has more than 1600 as a token.  To accommodate that, a
>>> bigger buffer size will be needed.
>>
>> I don't think this is achieving what you want.  The username/password
>> size on the OpenVPN protocol are fixed at 128 bytes max, and can not be
>> changes without introducing a new protocol version or interoperability
>> problems.  See the USER_PASS_LEN variable used in key_method_2_read.
> 
> USER_PASS_LEN is 4096 (not 128) for builds with ENABLE_PKCS11 and that was
> the assumption behind this patch.
> 
> I'm not endorsing this patch but we do need changes to management interface 
> and
> option parsing to allow long user/pass strings to support newer
> challenge-response
> protocols. Those changes are not hard but this patch falls short as I
> had pointed
> out earlier.

You're of course absolutely right.  USER_PASS_LEN is not actually an
interop issue here, the user/pass strings are not fixed length.  Too
quick with the answer, apologies.

But I think changing TLS_CHANNEL_BUF_SIZE will result in tricky
behaviour; when reading from the TLS channel, current implementations
read upto 2048 bytes, and pass that to key_method_2_read() as if it was
the whole message.  If the user/pass exceeds the old max, that will
result in truncated username/passwords, and finally password
verification errors.  It's not fatal, but sounds like really annoying to
debug...

-Steffan

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to