Hi,

On 05/07/2021 15:34, Arne Schwabe wrote:
> Since generating data channel keys does not happen when we have reach the
> S_ACTIVE/S_GOT_KEY state anymore like it used to be before NCP, the
> state that data channel keys deserves its own state in the TLS session
> state machine.
> 
> The changes done by this commit are rather intrusive since they
> move the key generation to a completely different place and also
> rely on the state machine to decide if keys should be
> generated rather than on the complicated conditions that were
> implemented in the key_method_2_write/read methods.
> 
> A (intended) side effect of this change is that sessions that
> are still in deferred state (ks->authenticated == KS_DEFERRED)
> will not have data channel keys generated. This avoids corner
> cases where a not fully authenticated sessions might leak data.
> 
> Signed-off-by: Arne Schwabe <a...@rfc2549.org>
> 
> Patch v2: rebased
> 
> Patch v3: fix crash in non TLS mode
> 
> Signed-off-by: Arne Schwabe <a...@rfc2549.org>

Thanks for fixing the crash. I added the basic --secret test to my suite
and I could indeed see the crash when using v2 of this patch.

I can confirm that v3 is indeed fixing the crash.
Classic client/server and p2p with TLS still works as expected.

Deferred auth works too.


Regards,



-- 
Antonio Quartulli


_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to