Send connman mailing list submissions to
        [email protected]

To subscribe or unsubscribe via email, send a message with subject or
body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of connman digest..."

Today's Topics:

   1. [PATCH 7/7] doc: Add new OpenConnect configuration options to VPN config 
format
      (Jussi Laakkonen)
   2. Re: [PATCH 6/7] doc: Add new OpenConnect PKCS#12 parameters to VPN agent 
API
      (David Woodhouse)


----------------------------------------------------------------------

Date: Wed,  2 Oct 2019 17:16:49 +0300
From: Jussi Laakkonen <[email protected]>
Subject: [PATCH 7/7] doc: Add new OpenConnect configuration options to
        VPN config format
To: [email protected]
Message-ID: <[email protected]>

Document the new options implemented for OpenConnect and the possible
choices for authentication.
---
 doc/vpn-config-format.txt | 77 +++++++++++++++++++++++++++++++++++++--
 1 file changed, 73 insertions(+), 4 deletions(-)

diff --git a/doc/vpn-config-format.txt b/doc/vpn-config-format.txt
index b9d37fa4..5c7524c9 100644
--- a/doc/vpn-config-format.txt
+++ b/doc/vpn-config-format.txt
@@ -54,8 +54,9 @@ OpenConnect VPN supports following options (see 
openconnect(8) for details):
  OpenConnect.CACert     --cafile           File containing other Certificate
                                            Authorities in addition to the ones
                                            in the system trust database (O)
- OpenConnect.ClientCert --certificate      Client certificate file, if needed
-                                           by web authentication (O)
+ OpenConnect.ClientCert --certificate      Client certificate file, needed
+                                           by web authentication when AuthType
+                                           is set as "publickey" (O)
  VPN.MTU                --mtu              Request MTU from server as the MTU
                                            of the tunnel (O)
  OpenConnect.Cookie     --cookie-on-stdin  Cookie received as a result of the
@@ -68,8 +69,75 @@ OpenConnect VPN supports following options (see 
openconnect(8) for details):
                                            Only usable for extremely simple VPN
                                            configurations and should normally
                                            be set only via the VPN Agent API.
-If OpenConnect.Cookie or OpenConnect.ServerCert are missing, the VPN Agent will
-be contacted to supply the information.
+ OpenConnect.AllowSelfSignedCert none      Additional option to define if self
+                                           signed server certificates are
+                                           allowed. Boolean string and defaults
+                                           to false, value "true" enables the
+                                           option. Affects to the OpenConnect
+                                           internal function only: --servercert
+                                           is not added to startup parameters
+                                           and receiving self signed cert from
+                                           server terminates the connection if
+                                           set as false (or omitted) (O)
+ OpenConnect.AuthType                      Type of authentication used with
+                                           OpenConnect. Applicable values are
+                                           "cookie", "cookie_with_userpass",
+                                           "userpass", "publickey" and
+                                           "pkcs12". Value "cookie" is basic
+                                           cookie based authentication. Value
+                                           "cookie_with_userpass" means that
+                                           credentials are used to retrieve the
+                                           connection cookie, which hides the
+                                           username from commandline. With
+                                           value "userpass" username and
+                                           password are used. Value "publickey"
+                                           requires CACert and UserPrivateKey
+                                           to be set. Value "pkcs12" uses the
+                                           PKCS12ClientCert and requests
+                                           password input. Defaults to "cookie"
+                                           (O)
+    cookie              --cookie-on-stdin  Default cookie based authentication
+    cookie_with_userpass                   Two phased connection, first
+        authentication: --cookieonly       authenticate with credentials then
+                        --passwd-on-stdin  use cookie for connection. Username
+                        --user             is hidden from commandline during
+        connection:     --cookie-on-stdin  connection.
+    userpass            --passwd-on-stdin  Credential based authentication,
+                        --user             username is visible on commandline.
+    publickey           --clientcert       Non-encrypted client certificate and
+                        --sslkey           private key file is used for auth.
+    pkcs12              --cliencert        Authenticat with PKCS#12 client
+                                           certificate.
+ OpenConnect.DisableIPv6 --disable-ipv6    Do not ask for IPv6 connectivity.
+                                           Boolean string and defaults to
+                                           false, value "true" enables the
+                                           option (O)
+ OpenConnect.NoDTLS      --no-dtls         Disable DTLS and ESP (O)
+ OpenConnect.NoHTTPKeepalive --no-http-keepalive    Disable HTTP connection
+                                           re-use to workaround issues with
+                                           some servers. Boolean string and
+                                           defaults to false, value "true"
+                                           enables the option (O)
+ OpenConnect.PKCS12ClientCert --certificate    Certificate and private key in
+                                           a PKCS#12 structure, protected with
+                                           a password. Needed when AuthType is
+                                           "pkcs12" (O)
+ OpenConnect.Usergroup  --usergroup        Set login usergroup on remote server
+                                           (O)
+ OpenConnect.UserPrivateKey --sslkey       SSL private key file needed by web
+                                           authentication when AuthType is set
+                                           as "publickey" (O)
+
+The VPN agent will be contacted to supply the information based on the
+authentication type as follows:
+ Authentication type    Information requested       Saved with name
+ cookie                 OpenConnect.Cookie          OpenConnect.Cookie
+ cookie_with_userpass   Username                    OpenConnect.Username
+                        Password                    OpenConnect.Password
+ userpass               Username                    OpenConnect.Username
+                        Password                    OpenConnect.Password
+ publickey              <none>
+ pkcs12                 OpenConnect.PKCS12Password  OpenConnect.PKCS12Password
 
 OpenVPN VPN supports following options (see openvpn(8) for details):
  Option name            OpenVPN option   Description
@@ -235,6 +303,7 @@ L2TP.User = username
 
 [provider_openconnect]
 Type = OpenConnect
+AuthType = pkcs12
 Name = Connection to corporate network using Cisco VPN
 Host = 7.6.5.4
 Domain = corporate.com
-- 
2.20.1

------------------------------

Date: Wed, 02 Oct 2019 20:49:08 +0100
From: David Woodhouse <[email protected]>
Subject: Re: [PATCH 6/7] doc: Add new OpenConnect PKCS#12 parameters
        to VPN agent API
To: [email protected],Jussi Laakkonen <[email protected]>
Message-ID: <[email protected]>
Content-Type: multipart/alternative;
        boundary="----AYXBOYRSICU77CL6S4LMCHCOASLFVE"

------AYXBOYRSICU77CL6S4LMCHCOASLFVE
Content-Type: text/plain;
 charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hm, this seems very wrong=2E Files which happen to be PKCS#12 should be tre=
ated absolutely identically to files which happen to be PKCS#1 or PKCS#8=2E

See http://david=2Ewoodhou=2Ese/draft-woodhouse-cert-best-practice=2Ehtml

On 2 October 2019 15:16:48 BST, Jussi Laakkonen <jussi=2Elaakkonen@jolla=
=2Ecom> wrote:
>Add new OpenConnect VPN agent parameters to the API documentation=2E
>Following are added:
> Name                          Requirement     OC authentication type
> OpenConnect=2EPKCS12ClientCert        informational   pkcs12
> OpenConnect=2EPKCS12Password  mandatory       pkcs12
>---
> doc/vpn-agent-api=2Etxt | 9 +++++++++
> 1 file changed, 9 insertions(+)
>
>diff --git a/doc/vpn-agent-api=2Etxt b/doc/vpn-agent-api=2Etxt
>index 26c732d1=2E=2Efcb0e9e1 100644
>--- a/doc/vpn-agent-api=2Etxt
>+++ b/doc/vpn-agent-api=2Etxt
>@@ -85,6 +85,15 @@ Fields              string Username
>                       Return the OpenConnect cookie value that is used for
>                       authenticating the VPN session=2E
>=20
>+              string OpenConnect=2EPKCS12ClientCert
>+
>+                      Informational field containing a PKCS#12 URL or a path
>+                      name for the PKCS#12 client certificate=2E
>+
>+              string OpenConnect=2EPKCS12Password
>+
>+                      Password for decrypting PKCS#12 client certificate=2E
>+
>               string OpenConnect=2EServerCert
>=20
>                       Return the OpenConnect server hash used to identify
>--=20
>2=2E20=2E1
>_______________________________________________
>connman mailing list -- connman@lists=2E01=2Eorg
>To unsubscribe send an email to connman-leave@lists=2E01=2Eorg

--=20
Sent from my Android device with K-9 Mail=2E Please excuse my brevity=2E
------AYXBOYRSICU77CL6S4LMCHCOASLFVE
Content-Type: text/html;
 charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head></head><body>Hm, this seems very wrong=2E Files which happen to=
 be PKCS#12 should be treated absolutely identically to files which happen =
to be PKCS#1 or PKCS#8=2E<br><br>See <a href=3D"http://david=2Ewoodhou=2Ese=
/draft-woodhouse-cert-best-practice=2Ehtml">http://david=2Ewoodhou=2Ese/dra=
ft-woodhouse-cert-best-practice=2Ehtml</a><br><br><div class=3D"gmail_quote=
">On 2 October 2019 15:16:48 BST, Jussi Laakkonen &lt;jussi=2Elaakkonen@jol=
la=2Ecom&gt; wrote:<blockquote class=3D"gmail_quote" style=3D"margin: 0pt 0=
pt 0pt 0=2E8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1e=
x;">
<pre class=3D"k9mail">Add new OpenConnect VPN agent parameters to the API =
documentation=2E<br>Following are added:<br> Name                               
Requirement     OC authent=
ication type<br> OpenConnect=2EPKCS12ClientCert informational   pkcs12<br> Op=
enConnect=2EPKCS12Password      mandatory       pkcs12<hr> 
doc/vpn-agent-api=2Etxt | 9=
 +++++++++<br> 1 file changed, 9 insertions(+)<br><br>diff --git a/doc/vpn-=
agent-api=2Etxt b/doc/vpn-agent-api=2Etxt<br>index 26c732d1=2E=2Efcb0e9e1 1=
00644<br>--- a/doc/vpn-agent-api=2Etxt<br>+++ b/doc/vpn-agent-api=2Etxt<br>=
@@ -85,6 +85,15 @@ Fields               string Username<br>                     
Return the OpenConnect co=
okie value that is used for<br>                         authenticating the VPN 
session=2E<br> <b=
r>+             string OpenConnect=2EPKCS12ClientCert<br>+<br>+                 
Informational field =
containing a PKCS#12 URL or a path<br>+                 name for the PKCS#12 
client certi=
ficate=2E<br>+<br>+             string OpenConnect=2EPKCS12Password<br>+<br>+   
                Passwo=
rd for decrypting PKCS#12 client certificate=2E<br>+<br>                string 
OpenConne=
ct=2EServerCert<br> <br>                        Return the OpenConnect server 
hash used to iden=
tify</pre></blockquote></div><br>-- <br>Sent from my Android device with K-=
9 Mail=2E Please excuse my brevity=2E</body></html>
------AYXBOYRSICU77CL6S4LMCHCOASLFVE--

------------------------------

Subject: Digest Footer

_______________________________________________
connman mailing list -- [email protected]
To unsubscribe send an email to [email protected]


------------------------------

End of connman Digest, Vol 48, Issue 4
**************************************

Reply via email to