On 04/17/2018 06:50 PM, Jason A. Donenfeld wrote:
>    * Allow specifying 'none' to the --ca parameter, to specify that
>      certificates should not be checked against a CA. Note that 'none'
>      is already used in other similar options as a special placeholder.
> 
>    * When '--ca none' is in use, --verify-hash checks all depths instead
>      of just level 1.
> 
> With these very simple changes, fingerprint authentication is easily achieved
> via the --tls-verify script on the server and via --verify-hash on the client.

This is a great idea! I already played around with it, and it works as
advertised :)

I recently thought about how to integrate this properly. The thing that
is still missing is using fingerprints as CNs. The --status command, and
management interface (--management) use CNs to identify clients when
certificates are used. This would then also need to be modified to use
'fingerprints' as identifiers so you would see the fingerprints when you
use --status and can use fingerprints when you do "kill" through the
management interface.

An option similar to --username-as-common-name, e.g.
--fingerprint-as-common-name could be introduced to accomplish this in
an easy way, although it is a bit "hacky".

Cheers,
François

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to