Am 28.03.22 um 13:52 schrieb Arne Schwabe:
Am 27.03.22 um 17:52 schrieb Michael Baentsch:
Thanks again for your explanations: I finally figured out to correct my git send-email configuration `smtpencryption` to be set to "ssl" (instead of "tls": The latter caused a hang that I debugged for way too long :-(. Maybe worth while adding to some FAQ for newbies? The guidance at https://github.com/git/git/blob/master/Documentation/git-send-email.txt was clearly wrong.

Please let me know if that submission now arrived and meets your requirements.

The commit message is still not great. Something I would have used instead:
Well....

Allow non-standard EC groups with OpenSSL3
This statement just is not correct: This has not a lot to do with EC. What about "Enable setting any TLS1.3 group [provided by the underlying crypto libraries]. "?

OpenSSL3 no longer uses the NID to identify TLS groups, instead it uses
names. This allows also to use groups from external provider. It also recognises secp256r1 as the same group as prime256v1.
This statement also is not quite right: OpenSSL3 still uses NIDs to identify some groups, notably those not implemented by a provider, i.e., legacy/"classic" crypto. I would agree with the statement that "OpenSSL3 prefers the use of names over NIDs for the identification of TLS1.3 groups, including EC groups." Lastly, the "it" in your statement above is unclear (at least to me as a non-native speaker): What about explicitly stating "OpenSSL3 also recognises secp256r1 as the same group as prime256v1"? This fact of course has nothing to do with this patch.




One further question: Is there interest on your side to add more/better support for quantum-safe crypto to OpenVPN?

Depends on what changes you are proposing. There is certainly some interest but depends on what exactly we are talking about.
I'll flesh that out. It mostly has to do with modifications to "easyrsa" - see below.

easyrsa isn't geared for that right now (let alone suitably named :-), but openssl3 (with our oqsprovider) can generate quantum-safe PKI (CA and client certs) without problems.

Easyrsa has become also separate project. Development and maintainance of easyrsa have become quite slow in the last years.
That statement is very helpful, thanks. It might then be sensible (for me) to start a script from scratch that does not have such strong dependency on legacy crypto. Will report back when I have something of interest.

Quantum-safe key exchange works in OpenVPN just fine when the PR lands.

Thanks in advance for any guidance how to proceed with the PR now.



_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to