Hi,

On Wed, Jan 03, 2024 at 01:37:54PM -0500, Joe Patterson wrote:
> On Wed, Jan 3, 2024 at 11:24???AM Gert Doering <g...@greenie.muc.de> wrote:
> > Ideally, you wouldn't create the keys "on the server" anyway - in a
> > secure world, the CA key never leaves a *secure* machine for key generation,
> > and you'd create server key(s) and client keys on this machine, copying
> > to the target machines as are needed.
> 
> I'd argue that in the *idealest* world, the server and client keys are
> created on the server and client, and csr's and certificates get
> copied to and from a secure CA. But that's pure nitpicking, and your
> point absolutely stands.

I know that this is best practice if the CA itself cannot be trusted
beyond "attest that this key belongs to someone identified by <string>"
(like, a DNS domain).  Not sure I can come up with a good attack scenario
in an OpenVPN PKI scenario where the CA would be stopped from doing 
something nasty by doing the full .csr dance (because it could still just
create arbitrary .key/.crt on its own, thus getting access to the VPN
server).

So, in an (Open)VPN context, I would assume that trust level for the CA
needs to be "as high as for the VPN server itself, preferrably higher",
not just "a random outside party that signs whatever you give it money
for" :-)

Maybe things are different if intermediate CAs get involved, but I haven't
spent too much thought on such scenarios yet - they tend to make my head
hurt...

gert
-- 
"If was one thing all people took for granted, was conviction that if you 
 feed honest figures into a computer, honest figures come out. Never doubted 
 it myself till I met a computer with a sense of humor."
                             Robert A. Heinlein, The Moon is a Harsh Mistress

Gert Doering - Munich, Germany                             g...@greenie.muc.de

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to