Took me a bit to find a setup where this made a difference, but with
CA / fingerprint validation errors on the client, I saw

  tlsv1 alert unknown ca

on the server, and with a "tls-version-min/max" mismatch (server requiring
1.1, client capped to 1.0) I saw a proper error on the client

2024-06-01 22:18:57 Received fatal SSL alert: protocol version
2024-06-01 22:18:57 OpenSSL: error:0A00042E:SSL routines::tlsv1 alert protocol 
version:SSL alert number 70
2024-06-01 22:18:57 TLS_ERROR: BIO read tls_read_plaintext error

.. while "without the patch" (older server) it would just sit there
and timeout, never hearing anything back from the server.  Haven't tried
variants more likely to occur in practice (especially "client cert expired")
but expect this to be a useful addition to troubleshooting.

An older client connecting to a patched server will receive the alerts
perfectly fine (as expected, no code changes in those paths), but obviously
won't send them *out* - even though visible in the client log.

   2024-06-01 22:25:25 Sent fatal SSL alert: unknown CA


For completeness, sent through the server side threadmill (testing
with the full set of 2.2 to master clients), and also through GHA -
all works.  Great :-)

Your patch has been applied to the master branch.

commit fbe3b49b373ea8e81aaa31a383258403a3bfcd07
Author: Arne Schwabe
Date:   Mon Apr 8 14:49:33 2024 +0200

     Allow the TLS session to send out TLS alerts

     Signed-off-by: Arne Schwabe <a...@rfc2549.org>
     Acked-by: Frank Lichtenheld <fr...@lichtenheld.com>
     Message-Id: <20240408124933.243991-1-fr...@lichtenheld.com>
     URL: 
https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg28540.html
     Signed-off-by: Gert Doering <g...@greenie.muc.de>


--
kind regards,

Gert Doering



_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to