On 01/09/15 16:45, Ryan Whelan wrote:
> Is it possible to use TLS mode without having to maintain a CA?  The
> system I'm working with is automated and distributed and coding the
> signing of keys means the CA would have to be online at all times.
> Something I'd rather not code to protect.
the CA does not have to be online all of the time - you just need to 
hand out certificates at some point.
It is just as safe as automatically handing out static keys.

> So, again, can static keys be updated without service interruption?
no this is not possible; in order to use new keys (or a new certificate) 
the connection needs to be reinitiated. This will always cause some 
service disruption, although it can be very short (~ 4 seconds).

Note that in order to use a new server-side certificate you also need to 
restart a connection, again, with a few seconds disruption.

JJK

> On Tue, Sep 1, 2015 at 10:37 AM, Steffan Karger <stef...@karger.me> wrote:
>> On 1 Sep 2015 07:33, "Ryan Whelan" <rcwhe...@gmail.com> wrote:
>>> Is there a way to rekey a static key connection without interrupting
>>> traffic?
>>>
>>> If I can generate and securely distribute new static keys (out of
>>> band) on regular intervals, is there a way to make openvpn start using
>>> the new keys without dropping traffic?
>> Yes, just use TLS mode. That is exactly what is was created for.
>>
>> -Steffan
> ------------------------------------------------------------------------------
> _______________________________________________
> Openvpn-users mailing list
> Openvpn-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openvpn-users


------------------------------------------------------------------------------
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to