-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 25/08/16 15:58, David Woodhouse wrote:
> On Thu, 2016-08-25 at 15:45 +0200, David Sommerseth wrote:
>> 
>> 
>> I've been working a bit on a new patch-set which enables
>> third-party user/password authentication mechanisms using two
>> factor authentications [2FA] (such as OTP) and not needing to
>> disable the renegotiation features of OpenVPN.
> 
> Hm, you handle the server side of OTP through PAM alone?

This change does not change the initial authentication at all.  You
still need an authentication plug-in or --auth-user-pass-verify
script.  But once this first authentication passes successfully, the
OpenVPN server takes over the coming authentications required due to
re-negotiations.

A very simplistic diagram over the process

   Client                            Server           --plugin or
                                                 --auth-user-pass-verify
   =====================================================================
   connects and sends
   username + password  ----------> passes
                                    username +
                                    password  ------>   authenticates
                                                         user

                                 On SUCCESS   <------ sends SUCCESS/FAIL
                                 generate auth token
   replaces password  <--------- push auth-token
   with auth-token               to client

   ~~~~ rengotiation happens ~~~~

   sends username +
   password (auth-token) ------->  checks if
                                   clients auth-token
                                   matches token stored
                                   in session object
   =====================================================================


> Any chance of client-side OTP working automatically using 
> liboath/libstoken and/or being able to use OATH support on
> hardware like Yubikeys?

That is probably doable, but would require extending the plug-in API
and a plug-in to actually acquire a new OTP code.  For this patch-set
this is out of scope, as this change needs to happen inside the
authentication plug-in.


- -- 
kind regards,

David Sommerseth

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iQIcBAEBAgAGBQJXvv1kAAoJEIbPlEyWcf3yRpwP/0WFggjQUDdCHLpL5R0mh/Bp
YJbWlu89oy8sVoOn6dB/o6D5p+rKqYDsNu0ME3TE6z0tl4bY+k7N1eiYY96EZqlN
+N7HAuQGkb38Mpc+/hNUPrNhtt0Xl5NbMFgHCEPGdNrkO38HM1s5Z+sAba2lR04Q
aM5RlRlyUOBXIdr+m3k4WcFA6G/KzgcgDNZuztQQ8w7mFNoglVllWybdL+nNIbIL
emczNgEpH0/T95UdAvD8rg7rUBquSCYmhkEcWa1VgqcwniLuYShG10FW6DyuglpA
ZUMPqlNOoqYNgWzYFgIQe5EerHAGZt06VEBbMjZDcE91sOEp10mUrnnsELhTG9P0
kn4cK43zxtfrTez+J91P3T7ccGiutE4F3y+m/5iaRShuBdFechf+JWA6j3+KLyct
MWGIUhlc1wmBhgDToDL/5WaxiS64U78SZXCsBP6mXUbzJGGrUXdfXbdMn0gI5cfk
PzsMjKv7r2kEl2Pol/shzHcbRnNiSiqlDadwTA+Cgnlt6oJQn8SbsnKGIExbNWwj
1ldCLSToJHM8mWf63e0hl4RGKBGFIfVt7XMNsVDFy6J01JqWPDG1ggGQ5IhgpGmX
xIZv3nXELcE7vWaJLrORiXAfJ9j9K67H1KBH6JK6OueL7DStUXVzypVltlGdg0Ko
yit+GYTFBI1mW+d9adKs
=j5fd
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to