Tested this on the local t_server installation, sending overlong usernames from a client with --enable-pkcs11 - without the patch, there's no crashes or anything (= not a security relevant bug), but the server gets confused and does not send a proper TLS FAIL back. With the patch, the server will send a proper AUTH FAIL
2024-10-27 10:34:48 AUTH: Received control message: AUTH_FAILED,Username or password is too long. Maximum length is 128 bytes We have a bit more work to do (the client is not properly rejecting overlong usernames either, at least if reading an "--auth-user-pass up.txt" file) - but at least the server side is behaving more nicely now. Your patch has been applied to the master and release/2.6 branch (bugfix). commit a7f80d402fb95df3c58a8fc5d12cdb8f39c37d3e (master) commit b98ff0e7c60c6592a2e8d2c80dfd5999e5d2e65b (release/2.6) Author: Arne Schwabe Date: Mon Oct 28 14:55:04 2024 +0100 Refuse clients if username or password is longer than USER_PASS_LEN Signed-off-by: Arne Schwabe <a...@rfc2549.org> Acked-by: Gert Doering <g...@greenie.muc.de> Message-Id: <20241028135505.28651-1-g...@greenie.muc.de> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg29675.html Signed-off-by: Gert Doering <g...@greenie.muc.de> -- kind regards, Gert Doering _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel