Re: possible user lockout with a hypothetical openconnect wrapper

2018-06-25 Thread Basin Ilya
25.06.2018 22:49, David Woodhouse пишет: > On Mon, 2018-06-25 at 20:35 +0300, Basin Ilya wrote: >> >> Yeah, but in this case the the exit code of the second stage is >> useless. What really important is to know the reason why `openconnect >> --authenticate` failed. > > The second stage should

Re: possible user lockout with a hypothetical openconnect wrapper

2018-06-25 Thread David Woodhouse
On Mon, 2018-06-25 at 20:35 +0300, Basin Ilya wrote: > > Yeah, but in this case the the exit code of the second stage is > useless. What really important is to know the reason why `openconnect > --authenticate` failed. The second stage should exit with code 2 if the cookie was invalid. In which

Re: possible user lockout with a hypothetical openconnect wrapper

2018-06-25 Thread Basin Ilya
25.06.2018 13:18, David Woodhouse пишет: > On Mon, 2018-06-25 at 12:32 +0300, Basin Ilya wrote: >> Hi. >> I'm trying to make a wrapper for Openconnect that uses its own >> password manager. The wrapper should relaunch Openconnect infinitely, >> when it fails to connect (possibly due to a temporary

Re: --dtls-ciphers=LIST option not working

2018-06-25 Thread Jeroen Balduyck
On 25 June 2018 at 15:15, Daniel Lenski wrote: > On Mon, Jun 25, 2018 at 12:12 PM, Jeroen Balduyck > wrote: >> Hi Dan, >> >> I *think* I figured it out. Hopefully this post will make it to the >> list (my other one for this topic is under moderation). I'm using the >> info from this document: >>

Re: --dtls-ciphers=LIST option not working

2018-06-25 Thread Daniel Lenski
On Mon, Jun 25, 2018 at 12:12 PM, Jeroen Balduyck wrote: > Hi Dan, > > I *think* I figured it out. Hopefully this post will make it to the > list (my other one for this topic is under moderation). I'm using the > info from this document: >

Re: possible user lockout with a hypothetical openconnect wrapper

2018-06-25 Thread David Woodhouse
On Mon, 2018-06-25 at 12:32 +0300, Basin Ilya wrote: > Hi. > I'm trying to make a wrapper for Openconnect that uses its own > password manager. The wrapper should relaunch Openconnect infinitely, > when it fails to connect (possibly due to a temporary network > problem), but it shouldn't when the

possible user lockout with a hypothetical openconnect wrapper

2018-06-25 Thread Basin Ilya
Hi. I'm trying to make a wrapper for Openconnect that uses its own password manager. The wrapper should relaunch Openconnect infinitely, when it fails to connect (possibly due to a temporary network problem), but it shouldn't when the password is bad to avoid a user lockout. How can the

Re: --dtls-ciphers=LIST option not working

2018-06-25 Thread Jeroen Balduyck
On 25 June 2018 at 10:34, Daniel Lenski wrote: > On Sat, Jun 23, 2018 at 12:22 PM, Jeroen Balduyck > wrote: >> Hi >> >> I've been struggling to get this option to work. Wireshark reports >> this cipher in the server hello: >> Cipher Suite: TLS_PSK_WITH_AES_256_GCM_SHA384 (0x00a9) > > Are you

Re: --dtls-ciphers=LIST option not working

2018-06-25 Thread Daniel Lenski
On Sat, Jun 23, 2018 at 12:22 PM, Jeroen Balduyck wrote: > Hi > > I've been struggling to get this option to work. Wireshark reports > this cipher in the server hello: > Cipher Suite: TLS_PSK_WITH_AES_256_GCM_SHA384 (0x00a9) Are you sure that the server supports this ciphersuite for *DTLS*, as