Re: [Openvpn-devel] [PATCH] Make OPENVPN_PLUGIN_ENABLE_PF failures FATAL

2021-01-21 Thread tincanteksup
feed back: On 22/01/2021 07:02, Arne Schwabe wrote: Am 21.01.21 um 14:39 schrieb Gert Doering: Without this patch, if openpn is using a plugin that provides OPENVPN_PLUGIN_ENABLE_PF but then fails (returns OPENVPN_PLUGIN_FUNC_ERROR), OpenVPN will crash on a NULL pointer reference. The

Re: [Openvpn-devel] [PATCH] Make OPENVPN_PLUGIN_ENABLE_PF failures FATAL

2021-01-21 Thread Arne Schwabe
Am 21.01.21 um 14:39 schrieb Gert Doering: > Without this patch, if openpn is using a plugin that provides > OPENVPN_PLUGIN_ENABLE_PF but then fails (returns OPENVPN_PLUGIN_FUNC_ERROR), > OpenVPN will crash on a NULL pointer reference. > > The underlying cause is (likely) the refactoring work

Re: [Openvpn-devel] [PATCH 3/5] Allow running a default configuration with TLS libraries without BF-CBC

2021-01-21 Thread Antonio Quartulli
Hi, On 07/09/2020 18:22, Arne Schwabe wrote: > Modern TLS libraries might drop Blowfish by default or distributions > might disable Blowfish in OpenSSL/mbed TLS. We still signal OCC > options with BF-CBC compatible strings. To avoid requiring BF-CBC > for this, special case this one usage of

Re: [Openvpn-devel] [PATCH 09/11] Implement deferred auth for scripts

2021-01-21 Thread David Sommerseth
On 30/09/2020 15:13, Arne Schwabe wrote: Signed-off-by: Arne Schwabe --- Changes.rst | 9 + doc/man-sections/script-options.rst | 14 +++- src/openvpn/ssl_verify.c| 56 - 3 files changed, 70 insertions(+), 9

Re: [Openvpn-devel] [PATCH 08/11] Allow pending auth to be send from a auth plugin

2021-01-21 Thread David Sommerseth
On 30/09/2020 15:13, Arne Schwabe wrote: Signed-off-by: Arne Schwabe --- doc/man-sections/generic-options.rst | 3 +- include/openvpn-plugin.h.in | 8 ++ src/openvpn/ssl.c| 2 +- src/openvpn/ssl_common.h | 1 + src/openvpn/ssl_verify.c

Re: [Openvpn-devel] [PATCH] clean up / rewrite sample-plugins/defer/simple.c

2021-01-21 Thread Arne Schwabe
Am 21.01.21 um 18:25 schrieb Gert Doering: > If we ship something that we consider a form of documentation > "this is how to write an OpenVPN plugin" it should meet our standards > for secure and modern code. This plugin did neither. > > - get rid of system() calls, especially those that

Re: [Openvpn-devel] [PATCH 10/11] Implement --client-crresponse script options and plugin interface

2021-01-21 Thread David Sommerseth
On 30/09/2020 15:13, Arne Schwabe wrote: This is allows scripts and pluginsto parse/react to a CR_RESPONSE message Signed-off-by: Arne Schwabe --- Changes.rst | 7 doc/man-sections/script-options.rst | 28 - include/openvpn-plugin.h.in | 7

[Openvpn-devel] [PATCH] clean up / rewrite sample-plugins/defer/simple.c

2021-01-21 Thread Gert Doering
If we ship something that we consider a form of documentation "this is how to write an OpenVPN plugin" it should meet our standards for secure and modern code. This plugin did neither. - get rid of system() calls, especially those that enabled a remote-root exploit if this code was used

Re: [Openvpn-devel] [PATCH 07/11] Refactor extract_var_peer_info into standalone function and add ssl_util.c

2021-01-21 Thread Lev Stipakov
Hi, Both new files have > +} > \ No newline at end of file Can probably be fixed by the committer. Stared at the come, compiled with MSVC. No "brand new" code added, just existing one factored out into a separate function and generalized. Acked-by: Lev Stipakov Acked with distinction for

[Openvpn-devel] [PATCH] Make OPENVPN_PLUGIN_ENABLE_PF failures FATAL

2021-01-21 Thread Gert Doering
Without this patch, if openpn is using a plugin that provides OPENVPN_PLUGIN_ENABLE_PF but then fails (returns OPENVPN_PLUGIN_FUNC_ERROR), OpenVPN will crash on a NULL pointer reference. The underlying cause is (likely) the refactoring work regarding CAS_SUCCEEDED etc., and that nobody adjusted

Re: [Openvpn-devel] [PATCH 06/11] Add S_EXITCODE flag for openvpn_run_script to report exit code

2021-01-21 Thread Lev Stipakov
Hi, > +platform_ret_code(int stat) > +{ > + > +if (stat >= 0 && stat < 255) Unneeded line break. > -/* interpret the status code returned by execve() */ > +/** interpret the status code returned by execve() */ > bool platform_system_ok(int stat); > > +/** Return a return code if valid and

Re: [Openvpn-devel] [PATCH 05/11] Change parameter of send_auth_pending_messages from context to tls_multi

2021-01-21 Thread Lev Stipakov
Hi, > +/** > + * Reschedule tls_multi_process. > + * NOTE: in multi-client mode, usually the below two statements are I realize that this comment is copied from existing code, but "below two statements" is bit misleading here in the context of function definition. Maybe just "this function" ?

Re: [Openvpn-devel] [PATCH 04/11] Introduce management client state for AUTH_PENDING notifications

2021-01-21 Thread Lev Stipakov
Stared at the code, compiled with MSVC. Acked-by: Lev Stipakov ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH 03/11] Implement server side of AUTH_PENDING with extending timeout

2021-01-21 Thread Lev Stipakov
Hi, Note that I didn't manage to apply this patch on the latest master so I had to apply commit from https://github.com/schwabe/openvpn/commit/42ae41d812668c4c00badaf592825684fa387d9d > +static bool > +parse_kid(const char *str, unsigned int *kid) > +&& parse_uint(timeout_str,

[Openvpn-devel] HEADS UP: fate of the built-in packet filter (PF)

2021-01-21 Thread Gert Doering
Hi, OpenVPN has a built-in packet filter, which has a couple of issues - it is IPv4 only (though IPv6 patches existed at some point, but nobody reviewed them, so they did not get merged) - it can only be configured by a plugin or the management interface (so actually *using* it is not