Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread ValdikSS
I have good news and bad news: Good news: * OpenVPN sends all certificates from the server supplied for --server directive (although with a small bug that a certificate which you have private key for must be supplied on the top) * OpenVPN Connect for Android can successfully connect to

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread ValdikSS
On 03/04/2016 11:08 PM, Jan Just Keijser wrote: > Hi, > > On 04/03/16 14:24, Arne Schwabe wrote: > the more I think about it, the more I think that what you are trying to > achieve ought not to work: > > your current situation is this: > - clients are equipped with a 1024bit CA cert; the server ce

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread Jan Just Keijser
Hi, On 04/03/16 14:24, Arne Schwabe wrote: Am 04.03.16 um 14:18 schrieb ValdikSS: On 03/04/2016 04:12 PM, Arne Schwabe wrote: Am 03.03.16 um 22:04 schrieb ValdikSS: Shouldn't sending the new CA chain only be enough? Since it is (cross)signed by the old CA, the client will accept it. For the o

Re: [Openvpn-devel] [PATCH 02/10] Added PIP_OPT_MASK for process_ip_header fast exit path.

2016-03-04 Thread James Yonan
On 04/03/2016 02:49, Arne Schwabe wrote: Am 04.03.16 um 08:29 schrieb James Yonan: On 03/03/2016 16:48, Arne Schwabe wrote: Am 03.03.16 um 09:18 schrieb James Yonan: Define PIP_OPT_MASK to represent all flags of interest to process_ip_header, so that it can have a fast exit path if no flags

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread ValdikSS
On 03/04/2016 03:26 PM, Jan Just Keijser wrote: > Hi, > > On 03/03/16 22:04, ValdikSS wrote: > it's possible to send a stacked CA certificate (i.e. server certificate > and intermediate CA cert) from server to the client. We use this in > production, and it is done by simply stacking (cat'ing) th

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread Arne Schwabe
Am 04.03.16 um 14:18 schrieb ValdikSS: > On 03/04/2016 04:12 PM, Arne Schwabe wrote: >> Am 03.03.16 um 22:04 schrieb ValdikSS: >> Shouldn't sending the new CA chain only be enough? Since it is >> (cross)signed by the old CA, the client will accept it. For the old >> clients the new CA will look l

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread ValdikSS
On 03/04/2016 04:12 PM, Arne Schwabe wrote: > > Am 03.03.16 um 22:04 schrieb ValdikSS: > Shouldn't sending the new CA chain only be enough? Since it is > (cross)signed by the old CA, the client will accept it. For the old > clients the new CA will look like an intermediate certificate. Please clar

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread ValdikSS
On 03/04/2016 03:57 PM, David Woodhouse wrote: > On Fri, 2016-03-04 at 15:37 +0300, ValdikSS wrote: > What you described *was* chained certificates, wasn't it? > > From the point of view of a client which only trusts the old CA, the > server is presenting a chain — its own cert, followed by the > "

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread Arne Schwabe
Am 03.03.16 um 22:04 schrieb ValdikSS: > Hello everyone, > > I'm trying to leisurely move from an old existing 1024 bit CA to a new 4096 > bit one without a hassle for a clients. > From a X.509 perspective it shouldn't be a problem, and I already have new CA > self-signed and cross-signed with

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread David Woodhouse
On Fri, 2016-03-04 at 15:37 +0300, ValdikSS wrote: > Thanks for the information. It definitely doesn't work for any > certificate, probably only for chained certificates. What you described *was* chained certificates, wasn't it? From the point of view of a client which only trusts the old CA, the

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread ValdikSS
Thanks for the information. It definitely doesn't work for any certificate, probably only for chained certificates. That's a good news that there's no protocol limitation for this. I'll check the code to see what's going on. On 03/04/2016 03:26 PM, Jan Just Keijser wrote: > Hi, > > On 03/03/16 2

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread Jan Just Keijser
Hi, On 03/03/16 22:04, ValdikSS wrote: Hello everyone, I'm trying to leisurely move from an old existing 1024 bit CA to a new 4096 bit one without a hassle for a clients. From a X.509 perspective it shouldn't be a problem, and I already have new CA self-signed and cross-signed with old CA, i

Re: [Openvpn-devel] [PATCH 02/10] Added PIP_OPT_MASK for process_ip_header fast exit path.

2016-03-04 Thread Arne Schwabe
Am 04.03.16 um 08:29 schrieb James Yonan: > On 03/03/2016 16:48, Arne Schwabe wrote: >> Am 03.03.16 um 09:18 schrieb James Yonan: >>> Define PIP_OPT_MASK to represent all flags of interest to >>> process_ip_header, so that it can have a fast exit path >>> if no flags are set. >> Basically what th

Re: [Openvpn-devel] [PATCH 09/10] Added directive to specify HTTP proxy credentials in config.

2016-03-04 Thread Arne Schwabe
Am 03.03.16 um 09:19 schrieb James Yonan: > The inline directive http-proxy-user-pass can be used to > specify proxy credentials in config, e.g.: > > http-proxy proxy.tld 3128 auto-nct > > foo > bar > > > This usage is already supported by OpenVPN 3. > ACK. But it really should come with manpag

Re: [Openvpn-devel] [PATCH 02/10] Added PIP_OPT_MASK for process_ip_header fast exit path.

2016-03-04 Thread James Yonan
On 03/03/2016 16:48, Arne Schwabe wrote: Am 03.03.16 um 09:18 schrieb James Yonan: Define PIP_OPT_MASK to represent all flags of interest to process_ip_header, so that it can have a fast exit path if no flags are set. Basically what this patch does is to change the condition to if (flags) and

Re: [Openvpn-devel] [PATCH 03/10] tls_serial_{n} value should be distinguishable as hex or decimal.

2016-03-04 Thread Gert Doering
Hi, On Thu, Mar 03, 2016 at 01:18:59AM -0700, James Yonan wrote: > To accomplish this, prepend 'x' before hex serial numbers, so they > can be distinguished from decimal serial numbers. For example: > > tls_serial_1 = "x4D:9B:7C:94" > > is equivalent to: > > tls_serial_1 = "1302035604" >

Re: [Openvpn-devel] Pushing multiple certificates from server

2016-03-04 Thread ValdikSS
Currently I did the same, but it would be much easier to just push 2 certificates from server. On 03/04/2016 06:40 AM, Илья Шипицин wrote: > we are running openvpn for ~ 1000 users, in similar case we deployed new ca > on separate udp port and re-deployed installer to our users (we put installer