[Openvpn-devel] [PATCH applied] Re: Ensure only CBC, CFB, OFB and AEAD ciphers are considered valid data ciphers

2022-10-10 Thread Gert Doering
Just basic compile + t_client tested (which will excercise --ncp-ciphers a bit, but not add any "unsupported optionals" today). Your patch has been applied to the master branch. commit 6bbd89c5c82e7a2366ecac969b35f88797a73763 Author: Arne Schwabe Date: Mon Oct 10 17:55:15 2022 +0200 Ensur

Re: [Openvpn-devel] [PATCH v2] Ensure only CBC, CFB, OFB and AEAD ciphers are considered valid data ciphers

2022-10-10 Thread Frank Lichtenheld
On Mon, Oct 10, 2022 at 05:55:15PM +0200, Arne Schwabe wrote: > Make sure cipher_valid only considered these four operations as valid. "considers" > This fixes that somjething like --data-ciphers AES-256-GCM:AES-128-CCM "something" > will start but later fail when trying to use the CCM cipher.

[Openvpn-devel] [PATCH v2] Ensure only CBC, CFB, OFB and AEAD ciphers are considered valid data ciphers

2022-10-10 Thread Arne Schwabe
Make sure cipher_valid only considered these four operations as valid. This fixes that somjething like --data-ciphers AES-256-GCM:AES-128-CCM will start but later fail when trying to use the CCM cipher. We say "a supported AEAD" mode in our error since CCM is also an AEAD mode but one we support

[Openvpn-devel] [PATCH] Ensure only CBC, CFB, OFB and AEAD ciphers are considered valid data ciphers

2022-10-10 Thread Arne Schwabe
Make sure cipher_valid only considered these four operations as valid. This fixes that somjething like --data-ciphers AES-256-GCM:AES-128-CCM will start but later fail when trying to use the CCM cipher. We say "a supported AEAD" mode in our error since CCM is also an AEAD mode but one we support

[Openvpn-devel] [PATCH applied] Re: Insert client connection data into PAM environment

2022-10-10 Thread Gert Doering
Acked-by: Gert Doering Thanks for providing a v3, and following our sometimes difficult rules for patch submission. I have tested this with v4 and v6 connections, and it looks good: PLUGIN AUTH-PAM: BACKGROUND: REMOTE: 2001:608:0:814::f000:21 PLUGIN AUTH-PAM: BACKGROUND: REMOTE: 194.97.14

Re: [Openvpn-devel] [PATCH v3 3/5] Push server mtu to client when support and support occ mtu

2022-10-10 Thread Heiko Hund
On Sonntag, 26. Juni 2022 01:41:48 CEST Arne Schwabe wrote: > To maximise compatibility allow to lie our MTU in the default OCC > message. > > Patch v2: improve documentation > Patch v3: split changing default MTU into its own patch Doesn't apply to master anymore. From what I have seen, besides

[Openvpn-devel] [PATCH v3] Insert client connection data into PAM environment

2022-10-10 Thread Paolo Cerrito
From: paolo - styled code as openvpn - added check for remote, if NULL after all get_env, put to point to empy string Signed-off-by: Paolo Cerrito --- src/plugins/auth-pam/auth-pam.c | 28 1 file changed, 24 insertions(+), 4 deletions(-) diff --git a/src/plugins/

Re: [Openvpn-devel] [PATCH] TLS: do not lock empty usernames

2022-10-10 Thread Gert Doering
Hi, On Mon, Oct 10, 2022 at 10:00:37AM +0200, Antonio Quartulli wrote: > > -if (username) > > +if (username && *username) > > super uber nitpick (bike shadding level): > > I think in other places we perform the very same check using the format: > username[0] instead of *username

Re: [Openvpn-devel] [PATCH] TLS: do not lock empty usernames

2022-10-10 Thread Antonio Quartulli
Hi, On 10/10/2022 09:12, Gert Doering wrote: We do not permit username changes on renegotiation (= username is "locked" after successful initial authentication). Unfortunately the way this is written this gets in the way of using auth-user-pass-optional + pushing "auth-token-user" from client-c

Re: [Openvpn-devel] [PATCH applied] Re: Fix OpenVPN querying user/password if auth-token with user expires

2022-10-10 Thread Gert Doering
Hi, On Sun, Oct 09, 2022 at 03:51:36PM +0200, Gert Doering wrote: > Recording David's and Heiko's ACK, they have done the stare-at-code > and actual testing (I have run t_client tests, but they do not excercise > this problem with my current test servers - need to add more variants). Just for the

[Openvpn-devel] [PATCH] TLS: do not lock empty usernames

2022-10-10 Thread Gert Doering
We do not permit username changes on renegotiation (= username is "locked" after successful initial authentication). Unfortunately the way this is written this gets in the way of using auth-user-pass-optional + pushing "auth-token-user" from client-connect (and most likely also "from management")