>>> Any comments?
> Some ideas about keychain implementation out of OpenVPN core.
>
> I see 4 possible alternatives here:
> 1) implement keychain rsa offloading in Tunnelblick
> 2) make my patch use plugin interface
> 3) implement external daemon that communicated with openvpn process via
> management interface
> 4) the same as 3) but make openvpn able to handle more than 1
> management client
>
> There are problems with all these alternatives:
> (1) is limited to Tunnelblick users and doesn't work for users who start
> openvpn from the terminal or use any other GUI
> (2) implies plugin interface is expanded to handle two new actions: 'user
> certificate request' and 'rsa-sign request'
> (3) implies management interface is expanded to handle 'user certificate
> request'; also it doesn't work with Tunnelblick or any other tool that
> communicates with openvpn via management interface as MI currently
> supports only a single client
> (4) needs 'user certificate request' addition and expanding management
> interface to support more than a single client
>
> So, (1) is a no-go as it works only with Tunnelblick (3) is a no-go as
> it breaks Tunnelblick and probably someone else.  We stay with only two
> interface expantions: plugin interface or management interface.  Either
> (a) add 'user certificate request' to plugin interface or (b) add 'user
> certificate request' to management interface and support more than a
> single client.
But if you encapsulate that stuff in a library or something similar you
could use that library from TunnelBlick and from a small standalone
tool/OpenVPN plugin.

For (4) Implementing a request for managament ca/cert is relatively
easy. At the moment this has not been implemented because nobody needed
it so far. All current users managment-query-key (or what the option is
called) generate the configuration with the right <ca>, <cert> options
instead of querying for these values at startup.

I disagress that (3) is inheritly incompatible with Tunnelblick.
Tunnelblick could spawn an openvpn process and the external daemon. On
the rsa-sign request, Tunnelblick would just connect to the external
daemon ask that daemon to process the rsa-sign request.

Arne


Reply via email to