On 13/04/17 14:39, Steffan Karger wrote:
> On 12-04-17 13:35, Steffan Karger wrote:
>>  Version 2.4.1
>>  =============
>> - - ``--remote-cert-ku`` now only requires the certificate to have at least 
>> the
>> -   bits set of one of the values in the supplied list, instead of requiring 
>> an
>> -   exact match to one of the values in the list.
>> - - ``--remote-cert-tls`` now only requires that a keyUsage is present in the
>> -   certificate, and leaves the verification of the value up to the crypto
>> -   library, which has more information (i.e. the key exchange method in use)
>> -   to verify that the keyUsage is correct.
>> - - ``--ns-cert-type`` is deprecated.  Use ``--remote-cert-tls`` instead.
>> -   The nsCertType x509 extension is very old, and barely used.
>> -   ``--remote-cert-tls`` uses the far more common keyUsage and 
>> extendedKeyUsage
>> -   extension instead.  Make sure your certificates carry these to be able to
>> -   use ``--remote-cert-tls``.
>> +- ``--remote-cert-ku`` now only requires the certificate to have at least 
>> the
>> +  bits set of one of the values in the supplied list, instead of requiring 
>> an
>> +  exact match to one of the values in the list.
>> +- ``--remote-cert-tls`` now only requires that a keyUsage is present in the
>> +  certificate, and leaves the verification of the value up to the crypto
>> +  library, which has more information (i.e. the key exchange method in use)
>> +  to verify that the keyUsage is correct.
>> +- ``--ns-cert-type`` is deprecated.  Use ``--remote-cert-tls`` instead.
>> +  The nsCertType x509 extension is very old, and barely used.
>> +  ``--remote-cert-tls`` uses the far more common keyUsage and 
>> extendedKeyUsage
>> +  extension instead.  Make sure your certificates carry these to be able to
>> +  use ``--remote-cert-tls``.
>> +- The new option ``--tls-cert-profile`` can be used to restrict the set of
>> +  allowed crypto algorithms in TLS certificates in mbed TLS builds.  The
>> +  'legacy' profile can be used to re-enable support for SHA1 and 1024-bit 
>> RSA
>> +  keys.
> 
> Hrmpf, this should of course get a new section '2.4.2'...  Let me know
> if you want a v3, or whether this can be fixed on-the-fly.  Apologies!

No problem.  I don't mind moving things to a 2.4.2 section.

I'm however a bit puzzled of the "non-changes" (well, the indenting is
changing, unless I'm blind to other changes) to --remote-cert-cu,
--remote-cert-tls and --ns-cert-type.  If we want to change the
indenting, I think that should be kept in a separate patch, and keep
--tls-cert-profile as a patch of its own.

Otherwise, Changes.rst tools fine to me.

On a more generic note to this patch.  I wonder if we should keep
"legacy" the default in the v2.4 branch.  In the Fedora 26 (and
Rawhide/27) builds I had to do something similar [1] to keep users
happy.  As OpenVPN isn't ready for OpenSSL v1.1, I had to switch to mbed
TLS.  Unfortunately that haven't been as successful as I really hoped it
would be, but that's an entirely different story (and mail thread).  As
long as the Fedora builds need to be built with mbed TLS, I will need to
ensure 'legacy' is the default there for a while.  For the coming Fedora
Rawhide (which will be F28), I can make some announcements preparing
users to move to stricter defaults.

[1]
<http://pkgs.fedoraproject.org/cgit/rpms/openvpn.git/tree/0001-workaround-Allow-weaker-RSA-keys-and-MD-algorithms-i.patch?h=f26>


-- 
kind regards,

David Sommerseth
OpenVPN Technologies, Inc


Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to