On Thursday, 15 June 2017 12:05:49 AM AEST David Sommerseth wrote:
> On 14/06/17 15:32, Steven Haigh wrote:
> > Hi all,
> > 
> > No further comments or requests on the openvpn-users lists.
> > Reposting here for further criticism / comments :)
> > 
> > I did have one thought though, do I need to put any kind of banner
> > at the top of the script as a 'maintainer' or such?
> 
> I have actually quickly tested this script, and it works fine with my
> yubikey test token.
> 
> One remark which needs to be highlighted is that this implementation
> uses single-factor OTP authentication.  But the OTP code used in this
> mode is fairly long, so it is reasonably secure (and still far better
> than static human passwords).  The token codes are generated using
> keying material which is pre-loaded to a Yubikco server - which
> essentially provides the authentication via a HTTPS request.
> 
> I think this is a reasonably good starting point.
> 
> What is needed is to have some kind of copyright header in the top of
> the file (as a "larger" comment block).  This copyright needs to carry
> a license which is compatible to GPLv2.  You can put yourself as the
> copyright holder, which implicitly puts you as a maintainer and
> contact person if there are issues.
> 
> What would be good in addition is to either inside this Perl script or
> as a README file describing what you need to do to get this working.
> Reasonable "talking points" could be:
> 
>    - Configuring your Yubikey token  (at least point at Yubikey docs)
>    - Emphasize that the token must be registered at YubiCloud (or the
>      validation server being used)
>    - Highlight what needs to be changed in the Perl script
>      to enable new users.
> 
> For more advanced topics ... using your own Yubikey validation server,
> like using this one: <https://developers.yubico.com/yubikey-val/>

I've taken this onboard. I've added the following text to the top of the 
script:

# Copyright (c) 2017 Steven Haigh <net...@crc.id.au>
# https://www.crc.id.au
# Licensed under the GPL version 2

# PURPOSE: This script automatically can be used to handle authentication
# of Yubikey enabled accounts for One Time Password (OTP) use.

# INSTALL NOTES:
# Place this script in /etc/openvpn and use the following in your server
# configuration file:

# script-security 2
# client-connect          /etc/openvpn/yubikey-auth-tokens
# auth-user-pass-verify   /etc/openvpn/yubikey-auth-tokens via-file
# client-cert-not-required

# If you wish to use Client Certificate + username + OTP for authentication
# exclude the 'client-cert-not-required' option and use any other guide on
# how to manage the certificate side of authentication.

# USAGE NOTES:
# To set up your Yubikey in Yubico OTP mode, use the personalisation tool
# in "Yubico OTP mode", and choose 'Quick' setup. Be sure to generate new
# values and then use the 'Upload to Yubico' to activate your key within
# the Yubico Validation Server.

# Edit the %yubikeys definition below to include your chosen username and
# the first 12 digits of one of your Yubico OTP passwords.

# If you have a Yubico API ID, you may substitute the $yubico_id value
# for your own, or use the default '16'.

# ------------------ CODE BEGINS HERE -----------------

-- 
Steven Haigh

📧 net...@crc.id.au      💻 http://www.crc.id.au
📞 +61 (3) 9001 6090     📱 0412 935 897

Attachment: signature.asc
Description: This is a digitally signed message part.

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to