Hi,

Here's the summary of the previous IRC meeting / sprint.

---

COMMUNITY MEETING

Place: #openvpn-devel on irc.freenode.net
List-Post: openvpn-devel@lists.sourceforge.net
Date: Thursday 21st Jun 2012
Time: 18:00 UTC

Planned meeting topics for this meeting were on this page:

<https://community.openvpn.net/openvpn/wiki/Topics-2012-06-21>

Next meeting will be announced in advance, but will probably be on the same
weekday and at the same time. Your local meeting time is easy to check
from services such as

<http://www.timeanddate.com/worldclock>

or with

$ date -u


SUMMARY

Cron2, dazo, habets, jamesyonan, krzee and mattock participated in this
meeting.

--

Discussed the "management: Don't require DAF_INITIAL_AUTH to send
ADDRESS/DISCONNECT messages" patch:

<http://thread.gmane.org/gmane.network.openvpn.devel/6456/focus=6457>

Decided to ask verification from author before merging this patch.

--

Discussed the "OCC ping" patch:

<http://thread.gmane.org/gmane.network.openvpn.devel/6619>

A few concerns were raised regarding the purpose of this patch and
possible security implications. Decided to ask the author about the
purpose of this patch and then reconsider the implementation.

--

Discussed the "Remove ENABLE_INLINE_FILES conditionals" patch:

<http://thread.gmane.org/gmane.network.openvpn.devel/6740/focus=6746>

Jamesyonan gave this patch an ACK.

--

Discussed the "Remove ENABLE_CONNECTIONS ifdefs" patch:

<http://thread.gmane.org/gmane.network.openvpn.devel/6740/focus=6744>

Jamesyonan gave this patch an ACK.

--

Discussed the "Fix clang warnings for conversion from unsigned<->signed"
patch:

<http://thread.gmane.org/gmane.network.openvpn.devel/6740/focus=6745>

No consensus was reached, but there were many points and counterpoints.
See full chatlog at 22:41 - 23:04.

--

Discussed the "SSL engine support" patch:

<http://thread.gmane.org/gmane.network.openvpn.devel/6730>
<http://thread.gmane.org/gmane.network.openvpn.devel/6734>
<https://github.com/alonbl/openvpn/tree/engine>
<http://blog.habets.pp.se/tmp/blah.patch>

Jamesyonan gave this patch an ACK, but decided to run it by Adriaan just
in case.

--

Discussed the OpenVPN 2.3-alpha2 release briefly. Mattock now has the
Windows code-signing certificates, so it should be possible to make the
release next week.

---

Full chatlog as an attachment

-- 
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc

irc freenode net: mattock


 20:57 <@mattock> topic list here:
                 https://community.openvpn.net/openvpn/wiki/Topics-2012-06-21
20:57 <@vpnHelper> Title: Topics-2012-06-21 – OpenVPN Community (at
                   community.openvpn.net)
21:00 < ecrist> cron2: just 32-bit stuff, still
21:01 < ecrist> I can have the 128-bit stuff thanks to openvpn
21:01 < ecrist> :)
21:01 <@cron2> heh :)
21:02 <@mattock> ok, everybody set
21:06 <@cron2> james around?
21:07 <@mattock> jamesyonan?
21:08 <@mattock> what about dazo?
21:08 <@cron2> yup... half of the patch review is waiting for the master's voice
21:08 <@dazo> I'm here
21:10 <@jamesyonan_> hi, I'm here -- for some reason my IRC client isn't using
                     my usual name
21:10 <@mattock> ok, let's begin
21:11 <@cron2> great
21:11 <@mattock> maybe start with this one?
http://thread.gmane.org/gmane.network.openvpn.devel/6456/focus=6457
21:11 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
21:12 <@dazo> jamesyonan_: I believe you might give a better verdict on that one
21:13 <@jamesyonan_> patch seems like it might break stuff
21:16 <@jamesyonan_> this changes the management interface semantics
21:16 <@dazo> I personally don't understand what the benefit of this patch is,
              tbh ... It claims to "solve" something, but I don't understand
              why this change is needed
21:17 <@cron2> as far as I understand, these two messages are not sent for
               *all* client connects, but only for password-authenticated logins
21:17 <@cron2> (and thus, missing otherwise)
21:17 <@cron2> but I won't claim to understand management interface semantics
21:17 <@jamesyonan_> well it looks like the author wants >CLIENT messages for
                     all connections, even those that don't require auth
21:17 <@cron2> that's how I read it
21:19 <@dazo> Can we imagine any reasons why that's an advantage?
21:19 <@jamesyonan_> does his comment "DAF_INITIAL_AUTH will only be set …"
                     refer to behavior before or after the patch is applied?
21:20 <@dazo> It seems to be related to this discussion:
http://thread.gmane.org/gmane.network.openvpn.devel/6442/focus=6444
21:20 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
21:21 <@jamesyonan_> I would want to hold off on this one until we get more
                     clarification on how this will affect existing managment
                     interface clients
21:21 <@mattock> sounds good
21:22 <@mattock> anything else, or shall we move on to this:
                 http://thread.gmane.org/gmane.network.openvpn.devel/6619
21:22 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
21:22 <@dazo> agreed ... Let's provide a feedback, where we need far more
              testing info ... and a better explanation why this is needed in
              Adrien's eyes
21:23 <@cron2> well, the explanation is obvious "I want to see my clients
               connect, even if they are not using password auth" :-)
21:24 <@mattock> then we still have the "does this affect existing management
                 interface clients"
21:24 <@cron2> yeah, that's the big one
21:25 <@mattock> more testing/reading of code later?
21:25 <@dazo> I'm not sure I still see the purpose ... and the relation to
              password auth ... but I don't know the management interface well
              enough to really understand these details well enough
21:28 <@mattock> next patch?
21:30 <@cron2> which one?
21:30 <@dazo> OCC ping?
21:30 <@mattock> http://thread.gmane.org/gmane.network.openvpn.devel/6619
21:30 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
21:32 <@cron2> I'm not sure I fully understand that one - well, it sends occ
               pings and occ ping-replies, but then just discard the reply -
               shouldn't it check somewhere that replies are coming in?
21:35 <@mattock> jamesyonan: what do you think?
21:35 <@jamesyonan_> in general, I do like the idea of changing ping to be more
                     conservative on mobile devices
21:36 <@jamesyonan_> not sure, off hand, if this is the right way to do it
21:36 <@jamesyonan_> also, keep in mind that there's a known DTLS vulnerability
                     with ping response that we don't want to repeat here
21:37 <@jamesyonan_> OpenVPN protocol is pre-DTLS but shares many of the same
                     characteristics
21:40 <@jamesyonan_> the bigger problem to solve is this -- how can we retain
                     reasonable keepalive functionality on UDP connections
                     without forcing a mobile device to xmit pings when no
                     traffic would otherwise be sent/received
21:41 <@mattock> so currently a reasonable keepalive is not possible? or does
                 this patch affect that aspect?
21:42 <@jamesyonan_> well it seems like the patch author is thinking about the
                     problem of power management on mobile, but I don't see the
                     details of how adding a ping reply will help to solve this
                     problem
21:43 <@cron2> I think the key aspect is that this is purely client-controlled,
               so the client can decide how often it wants to send/receive ping
               stuff
21:43 <@cron2> while the normal ping stuff needs to be symmetric between client
               and server to work - so you can't unilateraly change it on the
               client, without adapting the server as well
21:44 <@jamesyonan_> but how does the server know the client is still there in
                     the case that the client controls the ping initiation?
21:45 <@jamesyonan_> if the server is forced to retain client instance objects,
                     that can be a DoS vector
21:45 <@cron2> no idea...  maybe run occ-ping itself, in the opposite direction
21:46 <@jamesyonan_> but that seems to defeat the power-management purpose if
                     both client and server are initiating pings
21:47 <@mattock> yeah
21:47 <@mattock> maybe we should ask the author what the core reason for this
                 patch is?
21:47 <@jamesyonan_> I think for mobile power management, it might be better to
                     just have the client do a disconnect when it notices that
                     the connection isn't being used
21:48 <@jamesyonan_> and then have it bring back the connection dynamically
                     when there is usage
21:48 <@jamesyonan_> this way the server can also free the client instance
                     object for the client, during the inactive state
21:49 <@mattock> yep, sounds right
21:50 <@mattock> ah yes, the author says it about saving battery
21:51 <@jamesyonan_> I also have a bit of concern because one of the OpenSSL
                     DTLS security vulnerabilities I read about recently was
                     facilitated by the fact that DTLS also has an internal
                     ping that is echoed by the receiver
21:51 <@mattock> I
21:51 <@mattock> oops
21:51 <@jamesyonan_> we need to understand the details of this vulnerability
                     before we attempt to implement an echoing ping
21:52 <@mattock> I'd say NACK for now and ask the author if there's any hidden
                 benefits (besides
21:52 <@mattock> theoretical power savings)
21:52 <@cron2> ... and it should be checked that this actually works... :)
21:52 <@mattock> if not, NACK, if yes, look into the implementation details
21:52 <@mattock> cron2: yes, that too :D
21:53 <@mattock> next patch?
21:53 <@mattock> http://thread.gmane.org/gmane.network.openvpn.devel/6619
21:53 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
21:53 <@cron2> that was occ ping?
21:54 <@mattock> yes, sorry
21:54 <@mattock> this one:
http://thread.gmane.org/gmane.network.openvpn.devel/6740/focus=6746
21:54 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
21:55 <@dazo> jamesyonan_: any concerns about removing all these #ifdef's? ...
              mainly to improve the code readability
21:55 <@cron2> 3/6, yes.  I think it's making the code more easy to read, not
               changing any functionality, so is OK.  What I don't now, and why
               I was asking for James' opinion on this is whether there is a
               use case for not having ENABLE_INLINE_FILES turned on
21:55 <@cron2> what dazo said
21:56 <@jamesyonan_> I'm generally fine with this
21:57 <@jamesyonan_> at one time we sort of fell over ourselves making sure
                     that every added feature had an ifdef so code would
                     continue to run on highly memory-constrained platforms
                     like OpenWRT
21:57 <@jamesyonan_> but this is a feature that doesn't add very much code and
                     is almost always turned on
21:57 <@dazo> I would argue that inline files makes quite a lot of sense in
              embedded environments
21:57 <@mattock> and even those platforms grow more powerful in time
21:58 <@jamesyonan_> agreed
21:58 <@mattock> so it makes sense... ACK?
21:59 <@cron2> it actually cannot easily be turned *off* right now, as it would
               need patching syshead.h
22:01 <+krzee> +1 dazo
22:02 <@mattock> krzee just got into the list of attendees
22:02  * krzee cheers
22:03 <@jamesyonan_> +1 for removing  ENABLE_INLINE_FILES
22:03 <@jamesyonan_> i.e. make it permanently enabled
22:03 <@mattock> ok, I'd interpret that as an ACK :P
22:03 <@jamesyonan_> yes
22:03 <@mattock> next patch?
22:03 <@mattock> 
http://thread.gmane.org/gmane.network.openvpn.devel/6740/focus=6744
22:03 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
22:04 <@dazo> Same arguments as the previous one
22:04 <@cron2> +1
22:05 <@mattock> jamesyonan: ok with you?
22:06 <@dazo> (this one is a bit messier to review)
22:08 <@jamesyonan_> any idea how much code size is saved if these are turned
                     off?
22:08 <@cron2> no idea, but I can go and find out
22:09 <@jamesyonan_> I think ifdefs are justified if the code size is large and
                     if the feature is arguably used by a small % of users
22:09 <@cron2> it's on-by-default via syshead.h
22:10 <@jamesyonan_> probably okay then -- presumaby if embedded folks needed
                     to cut it out, they would have added a configure option
22:10 <@cron2> still compiling...
22:11 <@cron2> haha
22:11 <@cron2> ../../../openvpn.git/src/openvpn/options.c: In Funktion
               »add_option«:
22:11 <@cron2> ../../../openvpn.git/src/openvpn/options.c:5001: Fehler: »struct
               options« hat kein Element namens »force_connection_list«
22:11 <@cron2> compiling with /* #undef ENABLE_CONNECTION */ fails
22:13 <@cron2> ok, add #ifdef (for testing), size with default options:
22:13 <@cron2>    text    data     bss     dec     hex filename
22:13 <@cron2>  545068    1632    1268  547968   85c80 src/openvpn/openvpn
22:13 <@cron2> size without ENABLE_CONNECTION
22:13 <@cron2>    text    data     bss     dec     hex filename
22:13 <@cron2>  537980    1632    1268  540880   840d0 src/openvpn/openvpn
22:13 <@dazo> ~7KB?
22:13 <@cron2> yeah, that's somewhat surprising
22:14 <@cron2> (that's code + static data)
22:14 <@dazo> try both with --enable-small?  as that would be typical for
              memory restrained systems ... a
22:15 <@dazo> and these two #ifdef's add some info to the --help screen and
              logging stuff and such
22:15 <@mattock> and while cron2's computer is working, perhaps review the next
                 one?
22:15 <@cron2> this will take a while
22:15 <@mattock> snack while we're waiting would be this:
http://thread.gmane.org/gmane.network.openvpn.devel/6740/focus=6745
22:16 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
22:16 < shuffle2> is there a way to programmatically do the equivalent of
                  telling windows to bridge your main nic and the openvpn tap
                  device?
22:16 <@cron2> shuffle2: not inside openvpn, surely inside windows API "somehow
               the gui must do it"
22:17 < shuffle2> or is there another way to do it? it's somewhat annoying
                  since it means the machine will request dhcp and etc again
                  for the new bridge device created by windows
22:18 < shuffle2> just need to route the traffic on openvpn device onto the
                  network somehow
22:19 <@dazo> if you insist on bridging, cron2 gave the answer
22:19 < shuffle2> no, that creates another device
22:19 < shuffle2> i mean with using only the real nic and the openvpn device
22:20 <@dazo> can we please take this discussion after the developers meeting?
22:20 <@mattock> cron2: how's the compile going?
22:21 <@dazo> that "Fix clang warnings for conversion from unsigned<->signed"
              ... I'm kind of sceptical to such fixes generally ... as it might
              be hiding other issues, instead of solving the root cause
22:21 <@cron2> --enable-small, #define ENABLE_CONNECTION
22:21 <@cron2>    text    data     bss     dec     hex filename
22:21 <@cron2>  499292    1616    1268  502176   7a9a0 src/openvpn/openvpn
22:21 <@cron2> --enable-small, #undef ENABLE_CONNECTION
22:21 <@cron2>    text    data     bss     dec     hex filename
22:21 <@cron2>  491932    1616    1268  494816   78ce0 src/openvpn/openvpn
22:21 <@cron2> (now I'll be kicked)
22:22 <@dazo> I'm wondering if it would be a better approach to rather look at
              the argument declarations of md_ctx_update() instead
22:23 <@dazo> hmm ... still ~7KB ... that's quite a lot
22:23  * dazo would have expected it to be much less
22:23 <@cron2> hard to estimate, in the patch set you have chunks that only
               have #ifdef and then another chunk "1000s of lines further down"
               with the #endif
22:25 <@dazo> yeah
22:25 <@dazo> and you also have the MANAGEMENT_QUERY_REMOTE  stuff too ... and
              that removals together with ENABLE_CONNECTION scares me a little
              bit
22:25 <@dazo> does that mean that you cannot disable management interface?
22:26 <@cron2> nah, that's a specific sub-option of management interface
22:27 <@dazo> oh true ... so if management is disabled, that should not add
              management_query_remote stuff anyway
22:27 <@cron2> building with --disable-management now :)
22:28 <@dazo> so the bottom line is ... is ~7KB enough to scare us away from
              this patch?  .... I would definitely expect the code to be
              smaller without management enabled
22:31 <@cron2>    text    data     bss     dec     hex filename
22:31 <@cron2>  446545    1584    1264  449393   6db71 src/openvpn/openvpn
22:33 <@dazo> now, that's about 50KB saved
22:34 <@mattock> so, what to do with this patch?
22:34 <@dazo> I'd guess most memory restrained environments would then opt for
              disabling management all in all ... otherwise, 7KB isn't
              necessarily that much
22:34 <@mattock> ACK?
22:35  * dazo lets jamesyonan_ take the final decision on this one
22:36 <@jamesyonan_> yeah I would say we should have some threshold maybe 10 or
                     20 KB where a feature should be ifdefable
22:37 <@jamesyonan_> probably if this is just a subfeature of management and
                     it's under 10 KB, it's not a big deal to remove ifdef
22:37 <@dazo> agreed
22:37 <@jamesyonan_> ack
22:38 <@mattock> two more two go:
                 http://thread.gmane.org/gmane.network.openvpn.devel/6730
22:38 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
22:39 < habets> I'm (Thomas Habets) here, btw
22:39 <@mattock> hi!
22:39 <@dazo> nice!
22:39  * habets waves to everone
22:39 <@mattock> jamesyonan: what do you think about this one?
22:40 <@cron2> mattock: did we come to an agreement about the (const uint8_t*)
               stuff?
22:40 <@mattock> which one?
22:40 <@cron2> 6/6
22:41 <@mattock> ah, we might have skipped it
22:41 <@jamesyonan_> personally, I've never had the signed <-> unsigned
                     warnings find an actual bug
22:41 <@jamesyonan_> so I usually turn off the warnings altogether
22:41 <@mattock> ok, so it was this one:
http://thread.gmane.org/gmane.network.openvpn.devel/6740/focus=6745
22:41 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
22:41 <@cron2> yep
22:42 <@jamesyonan_> but the other side of the coin is that some people want
                     maximum warning sensitivity and then they have to go off
                     and manually cast everything so they don't get flooded
                     with false positives
22:43 <@dazo> I looked quickly at the code ... and I think it's better to fix
              the data types of these callers ... or do this typecasting after
              all ... but typecasting like this might, as well, hide issues
              related to overflows ... depending on the caller situations
22:44 <@dazo> DigestCalcHA1(
22:44 <@dazo>               IN char * pszAlg,
22:44 <@dazo>               IN char * pszUserName,
22:44 <@dazo>               IN char * pszRealm,
22:44 <@dazo>               IN char * pszPassword,
22:45 <@dazo> (that's the variable declarations of the variables used with
              md_ctx_update())
22:45 <@jamesyonan_> yeah, I also notice that he is converting some data types
                     from char to unsigned char which could actually change
                     behavior
22:45 <@cron2> well, we'll always have warnings or typecast one way or the
               other, if we mix "stringy things" (that want to be "char") with
               "crypto things" that usually want uint8=unsigned char
22:47 <@jamesyonan_> well should we use explicit casts when converting between
                     crypto and string character sequences or just disable the
                     warnings?
22:48 <@dazo> it's just solving the same issue in two different ways
22:48 <@dazo> with basically the same impact
22:48 <@jamesyonan_> well one could argue that by using explicit casts, and
                     keeping the warning, when a real bug does surface, you
                     will see it
22:49 <@dazo> agreed
22:50 <@dazo> I'd probably like to see that those Digest*() functions in
              httpdigest.c becomes more "crypto like" (using unsigned char) and
              the callers of these Digest*() function can do the typecasting,
              where it is most easy to see if this gets right or not
22:50 <@dazo> (probably more easy to see, I meant)
22:51 <@jamesyonan_> I guess I'm in favor of patch as long as author tests that
                     changes don't break anything (it's not enough in these
                     cases to assume that adding casts or retyping vars doesn't
                     change functionality)
22:53 <@mattock> verify that and then ACK?
22:53 <@dazo> I'm just afraid of "hiding" such typecasts too long down in the
              call chain ... as that might change the behaviour more hidden ...
              if you have them higher up in the call chain, the coder have more
              control of what's happening
22:53 <@cron2> for style reasons I'd not cast to (const uint8_t*) but to
               (uint8_t*) - the "const" is not a function of the caller but of
               the callee
22:53 <@dazo> (after all, these Digest*() functions are quite generic)
22:53 <@cron2> ... and that
22:54 <@cron2> ah
22:54  * cron2 takes the const bit back
22:54 <@dazo> :)
22:54 <@cron2> it *is* a "const char*" already
22:55 <@dazo> it's a const char* in Digest*() and const uint_8* in md_ctx_*()
22:56 < ecrist> cron2: is iroute for ipv6 done yet?
22:56 <@cron2> ecrist: 27 years ago, why?
22:56 < ecrist> troubleshooting a vpn for someone
22:57 < ecrist> Options error: option 'route-ipv6' cannot be used in this
                context
22:57 <@jamesyonan_> part of the issue here is that OpenSSL was written before
                     uint8_t became a standard type for referencing binary
                     data, or before size_t came onto the scene
22:57 <@cron2> ecrist: spell it "iroute-ipv6", and then it will work
22:58 < ecrist> iroute-ipv6 2607:fc50:1001:3502::/64
22:58 <@mattock> ok, so what to do with
22:58 <@mattock> 
http://thread.gmane.org/gmane.network.openvpn.devel/6740/focus=6745
22:58 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
22:58 <@cron2> ecrist: your error message talks about "route-ipv6", so I
               assumed that an "i" got lost
22:58 < ecrist> hang on, I see it
22:58 < ecrist> thanks.
23:04 <@cron2> mattock: "postpone while we make up our minds" :)
23:04 <@mattock> yeah, I was just about to ask "where did everyone disappear" :P
23:05 <@mattock> http://thread.gmane.org/gmane.network.openvpn.devel/6730
23:05 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
23:05 <@mattock> and this:
                 http://thread.gmane.org/gmane.network.openvpn.devel/6734
23:05 <@vpnHelper> Title: Gmane Loom (at thread.gmane.org)
23:06 <@cron2> I've seen the discussion, Alon seems to be happy, but I don't
               understand any of this crypto stuff
23:09 <@mattock> jamesyonan?
23:11 <@jamesyonan_> for SSL engine support, where is the actual patch?
23:12 <@dazo> habets: ^^^
23:12 < habets> sorry
23:13 < habets> slow wireless connection. one sec
23:16 -!- dazo is now known as dazo_afk
23:18 < habets> https://github.com/alonbl/openvpn branch engine. It's Alons
                patch in the end. His way was better.
23:18 <@vpnHelper> Title: alonbl/openvpn · GitHub (at github.com)
23:19 <@mattock> https://github.com/alonbl/openvpn/tree/engine
23:19 <@vpnHelper> Title: alonbl/openvpn at engine · GitHub (at github.com)
23:19 -!- dazo_afk is now known as dazo
23:20 < habets> or blog.habets.pp.se/tmp/blah.patch all in all
23:20 < habets> I'll be on better connection in 5m
23:22 <@dazo> I'd say andj should probably also have a look at this patch as
              well
23:23 <@mattock> yep, probably makes sense
23:23 <@mattock> jamesyonan: any thoughts on this one?
23:24 <@dazo> habets: just to be sure that I understand the purpose of this
              patch ... it's so that you can interact with external SSL engines
              to retrieve SSL keys and certificates?
23:25 < habets> dazo: yes. It's not so much "retrieve" as "act as oracle". The
                private key never leaves the TPM chip in plaintext. It was
                generated inside it and never sees the light of day.
23:26 <@dazo> Ahh, I see
23:27 < habets> the .key file is an encrypted blob. You hand the blob and
                "please use this to help me complete this handshake".
23:28 <@dazo> I'm lacking the needed knowledge regarding SSL and TPM to see if
              this is a good way to solve it or not ... I put my trust in andj
              and jamesyonan_
23:29 <+krzee> "in james we trust"
23:29 <@dazo> krzee: at least when it's related to SSL stuff ;-)
23:29 <@jamesyonan_> sorry, what's the URL to quickly view the patch?
23:30 < habets> http://blog.habets.pp.se/tmp/blah.patch
23:32 <@dazo> (this might be the same?
              https://github.com/alonbl/openvpn/compare/master...engine )
23:32 <@vpnHelper> Title: Comparing master...engine · alonbl/openvpn · GitHub
                   (at github.com)
23:32 <@jamesyonan_> does this work on both OpenSSL and PolarSSL?
23:32 < habets> dazo: yes.
23:32 < habets> jamesyonan_: it's not an implementation for polarssl. If
                polarssl has the functionality I don't know.
23:33 <@jamesyonan_> so if I understand this correctly, it allows OpenVPN to
                     access a private key that resides on an external device
23:34 <@jamesyonan_> where the device has an OpenSSL engine implementation?
23:35 < habets> yup
23:35 < habets> well, in theory it can be more general. It allows for using an
                engine to load a key. It doesn't *have* to be on another device.
23:36 <@jamesyonan_> does this interoperate an any way with OS-level key stores
                     such as Windows cryptoapi, Mac keychain, etc.?
23:37 <@mattock> or could it be extended to do so?
23:37 < habets> There's nothing in the patch that goes outside of OpenSSL
                engine plugins. If there is a Windows cryptoapi engine (or one
                is made) then this would work with it.
23:39 < habets> probably as-is, since the patch allows for setting parameters
                in a standard way
23:40 <@mattock> jamesyonan: does this patch seem ok? we could run it by andj
                 also
23:40 <@jamesyonan_> I think OpenSSL engine stuff was interesting when it first
                     came out, but I think in recent years it's been supplanted
                     by OS-level keystores
23:40 <@jamesyonan_> I think the patch seems reasonable though
23:41 <@mattock> ok, let's have andj look at it later on
23:41 <@mattock> ok, I think that was all
23:41 <@cron2> 2.3alpha2?
23:41 <@mattock> ok, a brief update
23:42 <@mattock> got the digicert certs, did not work out of the box, got new
                 ones
23:42 <@jamesyonan_> since the OS needs to have drivers for the various crypto
                     devices, it seems to make more sense to handle at the OS
                     level, and then maybe have the OpenSSL engine just
                     interact with the OS-level crypto store
23:42 <@mattock> haven't tested the new ones, will test on Monday (no time
                 tomorrow/weekend)
23:42 <@mattock> besides that, I think we can release 2.3-alpha2 a.s.a.p.
                 (dazo?)
23:42 <@cron2> no objections from here
23:43 <@mattock> ugh
23:43 <@mattock> almost midnight here, got to hit the sack
23:44 <@cron2> g'night
23:44 <@dazo> okay, I'll try to get the last acked patches in ... and then I'll
              tag the tree ... I'll try to manage that tomorrow
23:44 <@cron2> cool
23:44 <@mattock> I'll summarize the meeting tomorrow
23:44 <@dazo> goodie :)
23:44 <@mattock> 2.3-alpha2 out next week, unless somebody objects
23:44 <@mattock> (or the digicert certificates object)
23:44 <@mattock> :P
23:44 <+krzee> you guys rock o/
23:45 <@mattock> thanks!

Reply via email to