-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 25/08/16 16:32, Selva Nair wrote: > > On Thu, Aug 25, 2016 at 10:15 AM, David Sommerseth > <open...@sf.lists.topphemmelig.net > <mailto:open...@sf.lists.topphemmelig.net>> wrote: > > On 25/08/16 15:58, David Woodhouse wrote: >> On Thu, 2016-08-25 at 15:45 +0200, David Sommerseth wrote: >>> >>> >>> I've been working a bit on a new patch-set which enables >>> third-party user/password authentication mechanisms using two >>> factor authentications [2FA] (such as OTP) and not needing to >>> disable the renegotiation features of OpenVPN. >> >> Hm, you handle the server side of OTP through PAM alone? > > This change does not change the initial authentication at all. > You still need an authentication plug-in or > --auth-user-pass-verify script. But once this first authentication > passes successfully, the OpenVPN server takes over the coming > authentications required due to re-negotiations. > > > Why not let the auth-user-pass-verify script do this verification > bypass? The server knows whether its an initial CONNECT or REAUTH > and can pass that info to the verify script. Then the script can > bypass verification if appropriate. Currently > management-client-auth is already capable of doing this as "REAUTH" > versus "CONNECT" info is passed to it. Adding that to the env and > passing to scripts should be easy.
This is to avoid needing to modify any third-party authentication mechanisms. But passing information that it is a re-auth is might be a good idea, that isn't too hard to add. However, it would need to be a flag to --auth-gen-token in addition - otherwise third party authentication mechanisms which have not been updated will fail. On the other hand, if anyone is willing to update an auth-plugin or script to support this, they could just as well implement the auth-token generation themselves independently and not require --auth-gen-token at all; which speaks against such a flag. Also remember that this implementation covers both --plugin and - --auth-user-pass-verify. For many it will be quite hard to modify a plug-in compared to updating a script. I'll grant that the 'auth-token' feature is a well hidden and not documented. But the issue with 2FA and --reneg-* options have been a long standing issue, which have not been fixed in most of the authentication plug-ins used by the community. In regards to documentation, I'll try to improve that as well - regardless of this patch-set. And there's another benefit if making use of this auth-token feature itself, as the client doesn't need to cache the users password any more. (I do need to verify that though, but there is no reason why it would be needed.) Also, this patch becomes even more important now when it is recommended to enable --reneg-bytes 64MB if using ciphers using 64 bit cipher blocks. - -- kind regards, David Sommerseth -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJXvxCbAAoJEIbPlEyWcf3yWvAQALnZ4QiwJlUPbPz52aq5tf87 786pgA/m0hUbpHbv969M7RIEDvRW2UnDxrlmtlAHSxIU9NeEReZX1Ux8uQ4OGCKA J0y4qMF3jxAnxop00CKWCMxht/S4kCzSNNIro4ibIGTMWidELIPWvkfG2EXoUsZV U0mQrjBTi07T27g3nov+6VLFIp7gh/F1oN7GsdyjhdqVzK/TsP2WEbvWc2gDkOmk RgS50zWOta7kDU6v2maRPvlxFzN+f4QFbJGWlC4F29wthwt4wSQhi05Yd2nFLUbo HSKjR+KqPrPi9B66acFWABW3y4BpMN4B9CqQPPixA5oMVkpQKtt6tg0O2OUNKHjZ /hdUzYa2lK5iX6MxGVBCp9V0jYZIEfZPGXVrhXzKpyHU1OU3X8oYaVG9fvIr1ORF idRA5EUhdDL6S0aifBJeWxiKsk4RUvgiS4qn7uE0mwBU0AW1i7vAGQTXUYmVP5cU YzEU28ZS2wkfE9r137UuwyIDnfeDq2ZYclXRXd85F3GUZt3+qrQiwxA4YIMB1X6H DAMelsZ7JfnIzIFY/WsyI9eLp/MR2GZkW4gSjV9SFb5jBu5+Sj9D46AQJOA8xiI4 hfnxC7EMqJRC91PVC3uxuEHqH1jpzFmiM2nOLkZPiOioYR3yqhVwIg49swZHd5Qo 2rVcB9smEkQdknLwCibI =1kcX -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel