For "a", one could limit it to the current openvpn version in the script and print a warning about the script being out of date and possibly dangerous if the openvpn version is higher?

On 08/16/2017 03:10 AM, open...@keemail.me wrote:

Thank you for the feedback!

a)
You're absolutely right, once the tool is not maintained anymore, it could give a false sense of security and therefore do more harm than good. I'll do my best to keep it up-to-date. I'm also to open-source it on github, therefore any user suggestions will be taken into consideration.

It will not be an online tool for now, although I've considered the option. I've planned to release the tool via github, for anyone to download and use it anywhere they want - as some servers may not be publicly accessible. Depending on the usage of the tool, an online service would also make sense. However, with the online service, I want the user data to be handled with in a privacy respecting manner, so that will require some more work.

b)
Precisely. The tool can not decide such situation depending options. Many of which, I've implemented as an informative text, with an explanation what the option does exactly (e.g. --client-to-client, which may be a threat or may be very much intended). Other cryptography based options (e.g. --cipher or --tls-cipher) may also be deliberately configured in a less secure manner, to achieve a better compatibility with older devices. The user will be informed about the less secure options (with an information about the compatibility trade-off), but in the end the user has to decide what is right for their specific setup.

Kind regards


16. Aug 2017 08:43 by a...@unstable.cc <mailto:a...@unstable.cc>:

    Hello,

    On 16/08/17 14:21, open...@keemail.me <mailto:open...@keemail.me>
    wrote:

        Hello,

        I've developed a Python script to grade OpenVPN server
        configurations considering the security.
        The tool mainly focuses on: auth, cipher, tls-cipher, prng,
        tls-auth, tls-version-min/max, no-replay, no-iv, key-method,
        ncp-ciphers, ncp-disable, tls-crypt and key-direction.

        The result is a grade between F and A+ and suggestions on how
        to enhance the security of the OpenVPN setup.

        I've tested it with various OpenVPN server configurations, I
        found online, but I would like to gather some feedback from
        the community and update the tool accordingly, before
        releasing it.

        This tool is intended for server operators, but I'm about to
        complete a second tool, intended for OpenVPN users.

        The goal is to help operators to enhance the security of their
        OpenVPN servers and to help users determine the security of
        the server they're using.

        If you're interested in testing the tool and would like to
        provide some valuable feedback, or have any other questions
        about the project, please contact me.



    I am no expert here, but my personal opinion is that such a tool
    can be
    a bit dangerous. Here are some thought that just came to my mind:

    a) you have to be sure you keep it up to date, because a good option X
    today, might become a bad option tomorrow (i.e. due to a bug being
    found). Is the tool an online tool? otherwise this means that people
    having different versions might get different results (due to the
    previous point). Without talking about when the tool won't be
    maintained
    anymore (like what happens to today with thousands of openvpn outdated
    resources online)

    b) certain options can be good or bad depending on the situation/setup
    and I doubt the tool can take that into account, although I guess you
    can lean towards a "safer" or "stricter" ranking approach...


    Anyway, this is just my opinion :) I might be wrong here, therefore
    don't be torn down by my statements.
    For sure it's nice to see effort being put in improving the average
    server configuration out there.

    Cheers,


        Thank you and kind regards.



        
------------------------------------------------------------------------------
        Check out the vibrant tech community on one of the world's most
        engaging tech sites, Slashdot.org! http://sdm.link/slashdot



        _______________________________________________
        Openvpn-users mailing list
        Openvpn-users@lists.sourceforge.net
        <mailto:Openvpn-users@lists.sourceforge.net>
        https://lists.sourceforge.net/lists/listinfo/openvpn-users


-- Antonio Quartulli



------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to