[Openvpn-devel] scared optic

2006-11-30 Thread max
As Bennett is quick to point out, The History Boys is not a realist play. That is no surprise since people just want a basic way to get their finances. Should I even bother pulling a quote out here? Wired Magazine talks to him, and learns that he wrote the bulk of The Echo Makers on a tablet PC r

[Openvpn-devel] Bug Handling

2013-06-30 Thread Max Muster
Hi all, please forgive me if I'm wrong, but there seems quite "little activity" on bug tracking page from the developers. E.g. one month ago I opened a bug report for a (suspected) bug present in file checking (bug #299) which is still "new" and even not commented. I don't want to be rude, but I

Re: [Openvpn-devel] Bug Handling

2013-06-30 Thread Max Muster
Hi Gert, schrieb Gert Doering: > Hi, > > On Sun, Jun 30, 2013 at 08:00:39PM +0200, Max Muster wrote: >> please forgive me if I'm wrong, but there seems quite "little activity" >> on bug tracking page from the developers. >> E.g. one month ago I opened

[Openvpn-devel] File checking error with "chroot"

2013-09-01 Thread Max . Muster
Dear list, may I ask for your attention or feedback on the faulty file checking if "chroot" option is enabled? The "check_file_access" in src/openvpn/options.c will check for the existence of the "client-config-dir". This fails if used in conjunction with the "chroot" option, because the path in

Re: [Openvpn-devel] [PATCH] Fix file access checks when using --chroot

2013-09-16 Thread Max . Muster
Did not look into the patch in detail, but it should fix bug #299, too.   Hopfully this will get some more response than my approach there ;-)   Regards   Joerg         Gesendet: Sonntag, 15. September 2013 um 11:42 Uhr Von: "Josh Cepek" An: openvpn-devel@lists.sourceforge.net Betreff:

Re: [Openvpn-devel] [PATCH] Fix file access checks when using --chroot

2013-09-16 Thread Max . Muster
  Sorry, my fault, didn't realize bug reports were already "merged".   Joerg Gesendet: Montag, 16. September 2013 um 11:29 Uhr Von: max.mus...@kaffeeschluerfer.com An: "Josh Cepek" Cc: openvpn-devel@lists.sourceforge.net Betreff: Re: [Openvpn-devel] [PATCH] Fix file access checks when using --

Re: [Openvpn-devel] [PATCH] Allow inlining of --auth-user-pass

2013-10-05 Thread Max . Muster
Hi Davide,   nice idea. But I think I found two small bugs: First, it won't compile in a config w/o ENABLE_CLIENT_CR defined (there is no "sc_info"). Second, if I'm not mistaken, name and password are not copied correctly: If # of charachters is (pos - prev), the last charakter is at [pos - pre

Re: [Openvpn-devel] [PATCH] Allow inlining of --auth-user-pass

2013-10-05 Thread Max Muster
oops, just took my "debug" version of src/openvpn/ssl.c ... Of course output of string length and especially password in log file is not intended ;-) Joerg Original-Nachricht Betreff: Re: [Openvpn-devel] [PATCH] Allow inlining of --auth-user-pass Von: max.mus...@kaffeeschluerfe

Re: [Openvpn-devel] [PATCH] Allow inlining of --auth-user-pass

2013-10-05 Thread Max . Muster
cannot be in a file if using --static-challenge"); +#endif [...] A quick test did work with and without user authentication (only tested inline settzing, not with a file).   Joerg Original-Nachricht Gesendet: Samstag, 05. Oktober 2013 um 15:57 Uhr Von: "Max Muster"

Re: [Openvpn-devel] [PATCH] Allow inlining of --auth-user-pass

2013-10-07 Thread Max Muster
Hi Davide, I had some time today, so I did some changes ("improvements", I hope ;-)) to your code: First thing you do in add_option() if inline is used: auth_pass_file is set (to "stdin"). So there is no need to check for both (options->auth_user_pass_file || options->auth_user_pass_file_inline),

Re: [Openvpn-devel] [PATCH] Allow inlining of --auth-user-pass

2013-10-12 Thread Max Muster
Yes, your right, there is this one "debugging" line left (it was just to be sure, the setting of auth_user_pass_file to "stdin" is the first thing done). Original-Nachricht Betreff: Re: [Openvpn-devel] [PATCH] Allow inlining of --auth-user-pass Von: D

[Openvpn-devel] [PATCH] Don't "undo" ifconfig on exit if it wasn't done

2022-05-30 Thread Max Fillinger
--ifconfig-noexec isn't set. This is symmetric to how open_tun() and do_ifconfig() are used. This change also allows us to drop the second argument from close_tun(). Signed-off-by: Max Fillinger --- src/openvpn/init.c | 5 - src/openvpn/tun.c | 37 +--

[Openvpn-devel] [PATCH v2] Don't "undo" ifconfig on exit if it wasn't done

2022-05-30 Thread Max Fillinger
--ifconfig-noexec isn't set. This is symmetric to how open_tun() and do_ifconfig() are used. This change also allows us to drop the second argument from close_tun(). v2: Fix tabs-vs-spaces. Signed-off-by: Max Fillinger --- src/openvpn/init.c | 5 - src/open

[Openvpn-devel] [PATCH v3] Don't "undo" ifconfig on exit if it wasn't done

2022-05-30 Thread Max Fillinger
--ifconfig-noexec isn't set. This is symmetric to how open_tun() and do_ifconfig() are used. This change also allows us to drop the second argument from close_tun(). v2: Fix tabs-vs-spaces. v3: Fix another style mistake. Signed-off-by: Max Fillinger --- src/openvpn/init.c | 6 +- sr

[Openvpn-devel] [PATCH v4] Don't "undo" ifconfig on exit if it wasn't done

2022-05-31 Thread Max Fillinger
--ifconfig-noexec isn't set. This is symmetric to how open_tun() and do_ifconfig() are used. This change also allows us to drop the second argument from close_tun(). v2: Fix tabs-vs-spaces. v3: Fix another style mistake. v4: Move undo_ifconfig{4,6}() out of #ifdef TARGET_LINUX. Signed-off-by

[Openvpn-devel] [Patch v5] Don't "undo" ifconfig on exit if it wasn't done

2022-06-29 Thread Max Fillinger
--ifconfig-noexec isn't set. This is symmetric to how open_tun() and do_ifconfig() are used. v2: Fix tabs-vs-spaces. v3: Fix another style mistake. v4: Move undo_ifconfig{4,6}() out of #ifdef TARGET_LINUX. v5: Keep ctx argument in close_tun(). Signed-off-by: Max Fillinger --- src/openv

[Openvpn-devel] [PATCH v6] Don't "undo" ifconfig on exit if it wasn't done

2022-08-10 Thread Max Fillinger
dows version of undo_ifconfig_ipv6 Signed-off-by: Max Fillinger --- src/openvpn/init.c | 4 ++ src/openvpn/tun.c | 159 +++-- src/openvpn/tun.h | 8 +++ 3 files changed, 95 insertions(+), 76 deletions(-) diff --git a/src/openvpn/init.c b/src/openvpn/init.c index b67

[Openvpn-devel] [PATCH 1/2] Update openssl_compat.h for newer LibreSSL

2022-08-11 Thread Max Fillinger
LibreSSL has added some of the functions that are defined here. However, we still need RSA_F_RSA_OSSL_PRIVATE_ENCRYPT. Signed-off-by: Max Fillinger --- src/openvpn/openssl_compat.h | 8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/src/openvpn/openssl_compat.h b/src

[Openvpn-devel] [PATCH 2/2] Handle EVP_MD_CTX as an opaque struct

2022-08-11 Thread Max Fillinger
ed to call EVP_MD_CTX_free() instead of cleanup. Signed-off-by: Max Fillinger --- src/openvpn/crypto_openssl.c | 38 ++-- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/src/openvpn/crypto_openssl.c b/src/openvpn/crypto_openssl.c index 5cd09e33..5c86268d 10

[Openvpn-devel] [PATCH v2 1/2] Update openssl_compat.h for newer LibreSSL

2022-08-11 Thread Max Fillinger
LibreSSL has added some of the functions that are defined here. However, we still need RSA_F_RSA_OSSL_PRIVATE_ENCRYPT. v2: Change ifdef condition for RSA_F_RSA_OSSL_PRIVATE_ENCRYPT. Signed-off-by: Max Fillinger --- src/openvpn/openssl_compat.h | 8 +--- 1 file changed, 5 insertions(+), 3

[Openvpn-devel] [Patch v2 1/2] Update openssl_compat.h for newer LibreSSL

2022-08-22 Thread Max Fillinger
LibreSSL has added some of the functions that are defined here. However, we still need RSA_F_RSA_OSSL_PRIVATE_ENCRYPT. v2: Change ifdef condition for RSA_F_RSA_OSSL_PRIVATE_ENCRYPT. v3: Don't break WolfSSL. Signed-off-by: Max Fillinger --- src/openvpn/openssl_compat.h | 8 +--- 1

[Openvpn-devel] [PATCH] Check if pkcs11_cert is NULL before freeing it

2022-11-23 Thread Max Fillinger
When running openvpn --show-tls with mbedtls, it showed a null pointer error at the end because of this. Signed-off-by: Max Fillinger --- src/openvpn/ssl_mbedtls.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/src/openvpn/ssl_mbedtls.c b/src/openvpn/ssl_mbedtls.c index

[Openvpn-devel] [PATCH 1/2] Correct tls-crypt-v2 metadata length in man page

2022-11-26 Thread Max Fillinger
The manual page claims that the client metadata can be up to 735 bytes (encoded as upt to 980 characters base64), but the actual maximum length is 733 bytes which is also encoded as 980 characters in base64. Signed-off-by: Max Fillinger --- doc/man-sections/encryption-options.rst | 3 ++- 1

[Openvpn-devel] [PATCH 2/2] Fix message for too long tls-crypt-v2 metadata

2022-11-26 Thread Max Fillinger
patch checks the decoded length to show an accurate error message. Signed-off-by: Max Fillinger --- src/openvpn/base64.h| 4 src/openvpn/tls_crypt.c | 18 +++--- 2 files changed, 15 insertions(+), 7 deletions(-) diff --git a/src/openvpn/base64.h b/src/openvpn/base64.h index

[Openvpn-devel] [Patch v2] Fix message for too long tls-crypt-v2 metadata

2022-12-14 Thread Max Fillinger
patch checks the decoded length to show an accurate error message. v2: Remove now-unused macro and fix an off-by-one error. Signed-off-by: Max Fillinger --- src/openvpn/base64.h| 4 src/openvpn/tls_crypt.c | 18 +++--- src/openvpn/tls_crypt.h | 2 -- 3 files changed, 15

[Openvpn-devel] [PATCH] Wipe Socks5 credentials after use

2021-03-19 Thread Max Fillinger
Plaintext authentication is not exactly high security, but we might as well memzero the credentials before leaving the function. --- src/openvpn/socks.c | 23 ++- 1 file changed, 14 insertions(+), 9 deletions(-) diff --git a/src/openvpn/socks.c b/src/openvpn/socks.c index 36df

[Openvpn-devel] [PATCH 0/1] reliable: retransmit if 3 follow-up ACKs are received

2021-03-31 Thread Max Fillinger
This is my second attempt at sending this patch, this time without mixing up commit message and cover letter, and from an account that (I hope) doesn't hate mailing lists. This patch changes reliable_send() to resend a packet if at least three later packets have been ACKed. This improves performan

[Openvpn-devel] [PATCH 1/1] reliable: retransmit if 3 follow-up ACKs are received

2021-03-31 Thread Max Fillinger
From: Steffan Karger To improve the control channel performance under packet loss conditions, add a more aggressive retransmit policy similar to what many TCP implementations do: retransmit a packet if the ACK timeout expires (like we already do), *or* if three ACKs for follow-up packets are rece

[Openvpn-devel] [PATCH 0/1] CRL reloading issue with mbedTLS and chroot

2021-04-02 Thread Max Fillinger
There is an issue with the mbedTLS version of OpenVPN where a CRL file wouldn't be used when running in a chroot. This is due to a combination of two bugs found by Adam Lukosek at Compumatica. 1) With mbedTLS, if the CRL file can't be opened during initialization, OpenVPN will read the file whe

[Openvpn-devel] [PATCH 1/1] Let mbedtls_ssl_configs find reloaded CRLs

2021-04-02 Thread Max Fillinger
From: Maximilian Fillinger If the CRL file cannot be read during initialization, a NULL pointer is passed to the mbedtls_ssl_config in key_state_ssl_init(). Then, if the CRL file is successfully read later, the config won't have a pointer to it. Therefore, the CRL won't actually take effect. Thi

[Openvpn-devel] [PATCH] Change CTR DRBG update function call to new mbedtls 2.16.0 API

2021-04-02 Thread Max Fillinger
From: Uipko Berghuis In mbedtls 2.16.0 mbedtls_ctr_drbg_update() changed to mbedtls_ctr_drbg_update_ret(). Change the function name and handle the new return value error code. --- src/openvpn/ssl_mbedtls.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/src/openvpn/ssl_mb

[Openvpn-devel] [PATCH 1/1] Rework mbedtls CRL handling

2021-04-07 Thread Max Fillinger
This commit fixes the following two issues: The config belonging to a mbedtls_ssl_ctx struct is not supposed to be changed after mbedtls_ssl_setup() has been called. Previously, we modified the CRL structure in place when a new CRL was loaded, but a pointer to this struct appears in configs that a

[Openvpn-devel] [PATCH 0/1] CRL issues with mbedtls

2021-04-07 Thread Max Fillinger
d, I could fix the CRL reloading bug in a less hacky manner and also make sure that we don't modify the configs of active mbedtls_ssl_contexts. [0] https://sourceforge.net/p/openvpn/mailman/message/37254045/ [1] https://sourceforge.net/p/openvpn/mailman/message/37254048/ Max Fillinger (1):

[Openvpn-devel] [PATCH v2 0/2] CRL reloading and chroot with mbedtls

2021-04-12 Thread Max Fillinger
RL file cannot be accessed. Now that the path is handled correctly pre- and post-chroot, there is no good reason why accessing it should fail. This fixes bug 1). Max Fillinger (2): In init_ssl, open the correct CRL path pre-chroot Abort if CRL file can't be stat-ed in init_ssl src/open

[Openvpn-devel] [PATCH v2 1/2] In init_ssl, open the correct CRL path pre-chroot

2021-04-12 Thread Max Fillinger
files. For these, the --persist-key option should be used. Signed-off-by: Max Fillinger --- src/openvpn/init.c| 3 ++- src/openvpn/misc.c| 11 +++ src/openvpn/misc.h| 7 +++ src/openvpn/options.c | 8 +--- src/openvpn/ssl.c | 20 ++-- src/openvpn

[Openvpn-devel] [PATCH v2 2/2] Abort if CRL file can't be stat-ed in init_ssl

2021-04-12 Thread Max Fillinger
27;t use a reloaded CRL if it initially failed to access the file. In tls_process(), we stick with the previous behavior of logging a warning and keeping the old CRL to ensure that the CRL file can be updated on-the-fly. Signed-off-by: Max Fillinger --- src/openvpn/ssl.c | 21 ---

[Openvpn-devel] [PATCH] Fix build with mbedtls w/o SSL renegotiation support

2021-04-12 Thread Max Fillinger
r SSL renegotiation. This commit fixes the build by ifdef'ing out the function call when mbedtls was built without support for SSL renegotiation. Signed-off-by: Max Fillinger --- src/openvpn/ssl_mbedtls.c | 9 ++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/src/openvpn/ssl_m

[Openvpn-devel] [PATCH v3 1/2] In init_ssl, open the correct CRL path pre-chroot

2021-04-15 Thread Max Fillinger
. For these, the --persist-key option should be used. Signed-off-by: Max Fillinger --- src/openvpn/init.c| 2 +- src/openvpn/misc.c| 11 +++ src/openvpn/misc.h| 6 ++ src/openvpn/options.c | 8 +--- src/openvpn/ssl.c | 21 +++-- src/openvpn/ssl.h

[Openvpn-devel] [PATCH v3 2/2] Abort if CRL file can't be stat-ed in ssl_init

2021-04-15 Thread Max Fillinger
27;t use a reloaded CRL if it initially failed to access the file. Signed-off-by: Max Fillinger --- src/openvpn/ssl.c | 10 +- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/src/openvpn/ssl.c b/src/openvpn/ssl.c index 1e0e6170..6ce1d079 100644 --- a/src/openvpn/ssl.c +++ b/s

[Openvpn-devel] [PATCH] Update Fox e-mail address in copyright notices

2021-07-01 Thread Max Fillinger
Replace open...@fox-it.com with open...@foxcrypto.com. Signed-off-by: Max Fillinger --- doc/doxygen/Makefile.am| 2 +- doc/doxygen/doc_compression.h | 2 +- doc/doxygen/doc_control_processor.h| 2 +- doc/doxygen/doc_control_tls.h | 2 +- doc

[Openvpn-devel] [PATCH] Replace deprecated mbedtls DRBG update function

2021-08-09 Thread Max Fillinger
add a compatibility function that runs mbedtls_ctr_drbg_update and returns 0. Signed-off-by: Max Fillinger --- src/openvpn/ssl_mbedtls.c | 20 +++- 1 file changed, 19 insertions(+), 1 deletion(-) diff --git a/src/openvpn/ssl_mbedtls.c b/src/openvpn/ssl_mbedtls.c index 265ea36f

Re: [Openvpn-devel] [PATCH v2] mbedtls: do not define mbedtls_ctr_drbg_update_ret when not needed

2021-08-12 Thread Max Fillinger
will use our compat code. Cc: Max Fillinger Signed-off-by: Antonio Quartulli Thanks again for cleaning up my mess! Compile-tested with mbedtls versions 2.27.0 2.26.0 2.25.0 2.16.11 2.15.1 2.14.1 2.14.0 2.12.0 2.7.19 2.7.0 All good! (Typo: "aqvoid" in the commit message, but th

Re: [Openvpn-devel] [PATCH v3 03/21] [OSSL 3.0] Implement DES ECB encrypt via EVP_CIPHER api

2021-10-20 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: +if (!EVP_EncryptInit_ex(ctx, EVP_bf_ecb(), NULL, key, 0)) EVP_bf_ecb() is the Blowfish cipher, not DES. ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/li

Re: [Openvpn-devel] [PATCH v3 01/21] [OSSL 3.0] Use new EVP_MAC API for HMAC implementation

2021-10-20 Thread Max Fillinger
new API does not have an easy to reset an HMAC, so we need to keep the key around to emulate a reset functionality. Signed-off-by: Arne Schwabe Acked-by: Max Fillinger Looked at the code, compiled with OpenSSL 3.1.0 and 1.1.1, and ran --test-crypto for both. Small typo in commit message

Re: [Openvpn-devel] [PATCH v3 02/21] [OSSL 3.0] Add --with-openssl-engine autoconf option (auto|yes|no)

2021-10-20 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: This allows to select engine support at configure time. For OpenSSL 1.1 the default is not changed and we detect if engine support is available. Engine support is deprecated in OpenSSL 3.0 and for OpenSSL 3.0 the default is to disable engine support as en

Re: [Openvpn-devel] [PATCH v3 04/21] [OSSL 3.0] Remove DES check with OpenSSL 3.0

2021-10-21 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: DES is very deprecated and accidently getting on the of the 16 insecure keys that OpenSSL checks is extremely unlikely so we no longer use the deprecated functions without replacement in OpenSSL 3.0. Signed-off-by: Arne Schwabe --- src/openvpn/crypto_o

Re: [Openvpn-devel] [PATCH v3 05/21] [OSSL 3.0] Use EVP_PKEY based API for loading DH keys

2021-10-21 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: OpenSSL 3.0 replaces the DH API with a generic EVP_KEY based API to load DH parameters. Signed-off-by: Arne Schwabe Acked-by: Max Fillinger Looked at the patch, compiled with OpenSSL 3.1.0, tested that I can get a server and client to talk to each

Re: [Openvpn-devel] [PATCH v3 06/21] [OSSL 3.0] Deprecate --ecdh-curve with OpenSSL 3.0 and adjust mbed TLS message

2021-10-21 Thread Max Fillinger
. Signed-off-by: Arne Schwabe Acked-by: Max Fillinger Not much to say here. It compiles and I can see the warning when I use the option. ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists

Re: [Openvpn-devel] [PATCH v3 07/21] [OSSL 3.0] Remove DES key fixup code

2021-10-22 Thread Max Fillinger
Acked-by: Max Fillinger Makes sense, why should we care about the parity bits when no-one else does? Compiled and ran --test-crypto for DES/DES3 with OpenSSL 3.1.0, 1.1.1 and mbedtls 2.26. ___ Openvpn-devel mailing list Openvpn-devel

Re: [Openvpn-devel] [PATCH v3 08/21] [OSSL 3.0] Use EVP_PKEY_get_group_name to query group name

2021-10-25 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: EC_Key methods are deprecated in OpenSSL 3.0. Use EVP_PKEY_get_group_name instead to query the EC group name from an EVP_PKEY and add a compatibility function for older OpenSSL versions. Signed-off-by: Arne Schwabe --- src/openvpn/openssl_compat.h | 42

Re: [Openvpn-devel] [PATCH v3 09/21] Refactor early initialisation and uninitialisation into methods

2021-10-25 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: This put the early initialisation and uninitialisation that needs to happen between option parsing and post processing into small methods. Signed-off-by: Arne Schwabe Acked-by: Max Fillinger It's easy to see that this does not change the beh

[Openvpn-devel] [PATCH] Don't manually free DH params in OpenSSL 3

2021-10-25 Thread Max Fillinger
When the EVP_PKEY object with the Diffie-Hellman parameters is passed to SSL_CTX_set0_tmp_dh_pkey, it does not create a copy but stores the pointer in the SSL_CTX. Therefore, we should not free it. The EVP_PKEY will be freed automatically when we free the SSL_CTX. Signed-off-by: Max Fillinger

Re: [Openvpn-devel] [PATCH v3 10/21] [OSSL 3.0] Replace EVP_get_cipherbyname with EVP_CIPHER_fetch

2021-10-25 Thread Max Fillinger
is actually currently supported. Signed-off-by: Arne Schwabe Acked-by: Max Fillinger Looks good to me! Some small errors in the commit message: "return a non Null algorithm": Should be "may return", I think. second "EVP_get_cipherbyname&quo

Re: [Openvpn-devel] [PATCH v3 11/21] [OSSL 3.0] USe EVP_MD_get0_name instead EV_MD_name

2021-10-26 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: Use the new name for the function as it indicates with get0 the ownership of the returned value Signed-off-by: Arne Schwabe Acked-by: Max Fillinger Looks good to me. Typo: "USe" ___ Ope

Re: [Openvpn-devel] [PATCH v3 13/21] [OSSL 3.0] Remove dependency on BF-CBC existance from test_ncp

2021-10-26 Thread Max Fillinger
chacha, &gc), aes_chacha); +} Add space before ( Acked-by: Max Fillinger ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH v3 15/21] [OSSL 3.0] Do not allow CTS ciphers

2021-10-26 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: We do not support CTS algorithms (cipher text stealing) algorithms. Signed-off-by: Arne Schwabe --- src/openvpn/crypto_openssl.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/src/openvpn/crypto_openssl.c b/src/openvpn/crypto_openssl.c index a

Re: [Openvpn-devel] [PATCH v3 15/21] [OSSL 3.0] Do not allow CTS ciphers

2021-10-26 Thread Max Fillinger
On 26/10/2021 17:27, Max Fillinger wrote: On 19/10/2021 20:31, Arne Schwabe wrote: We do not support CTS algorithms (cipher text stealing) algorithms. Signed-off-by: Arne Schwabe ---   src/openvpn/crypto_openssl.c | 3 +++   1 file changed, 3 insertions(+) diff --git a/src/openvpn

Re: [Openvpn-devel] [PATCH v3 14/21] [OSSL 3.0] Use TYPE_do_all_provided function for listing cipher/digest

2021-10-26 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: With OpenSSL 3.0 the use of nid values is deprecated and new algorithms do not even have NID values anymore. This also works nicely with providers now: openvpn --provider legacy:default --show-ciphers shows more ciphers (e.g. BF-CBC) than just

Re: [Openvpn-devel] [PATCH v3 18/21] Fix error when BF-CBC is not available

2021-10-26 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: Through the multiple iteration of allowing OpenVPN to run without BF-CBC we accidentially made a regression and still required BF-CBC. This patch fixes the code path and restores its intended function. Signed-off-by: Arne Schwabe Acked-by: Max

Re: [Openvpn-devel] [PATCH v3 19/21] Add insecure tls-cert-profile options

2021-10-27 Thread Max Fillinger
On 19/10/2021 20:31, Arne Schwabe wrote: The recent deprecation of SHA1 certificates in OpenSSL 3.0 makes it necessary to reallow them in certain deployments. Currently this works by using the hack of using tls-cipher "DEFAULT:@SECLEVEL=0". Add insecure as option to tls-cert-profile to allow sett

Re: [Openvpn-devel] [PATCH v4] Add insecure tls-cert-profile options

2021-10-29 Thread Max Fillinger
e to allow setting a seclevel of 0. Patch v4: fix default accidentially changed to insecure Signed-off-by: Arne Schwabe Acked-by: Max Fillinger With OpenSSL 3, OpenVPN accepts certs signed with SHA1 if and only if "--tls-cert-profile in

Re: [Openvpn-devel] [PATCH v4] [OSSL 3.0] Implement DES ECB encrypt via EVP_CIPHER api

2021-11-02 Thread Max Fillinger
for DES encryption for now. Patch v4: add unit test, use 3DES to avoid legacy provider for now Signed-off-by: Arne Schwabe Acked-by: Max Fillinger Looks good to me, and the unit tests succeed with OpenSSL 1.1.1 and 3. Small nitpick that can be fixed at compile time: +if

Re: [Openvpn-devel] [PATCH] Completely remove DES checks

2021-11-07 Thread Max Fillinger
On 07/11/2021 10:01, Arne Schwabe wrote: We already removed the check in d67658fee for OpenSSL 3.0. This removes the checks entirely for all crypto libraries. Signed-off-by: Arne Schwabe Acked-by: Max Fillinger Looks good to me! Compiled and ran --test-crypto for DES/DES3, with mbedtls

Re: [Openvpn-devel] [PATCH] Completely remove DES checks

2021-11-07 Thread Max Fillinger
On 07/11/2021 13:29, Arne Schwabe wrote: The patch removes checking for weak keys and making DES just like any other CBC cipher and not doing extra checks for this. It basically removes the special treatment of DES. After this, do we have any DES functionality left in OpenVPN? If so, we sho

[Openvpn-devel] [PATCH] Remove unused havege.h header

2021-11-07 Thread Max Fillinger
This header was removed in mbedtls 3. Luckily, we weren't actually using it, it seems. Signed-off-by: Max Fillinger --- src/openvpn/crypto_mbedtls.c | 1 - src/openvpn/ssl_mbedtls.c| 2 -- 2 files changed, 3 deletions(-) diff --git a/src/openvpn/crypto_mbedtls.c b/src/op

[Openvpn-devel] [PATCH] Don't "undo" ifconfig when given --ifconfig-noexec

2021-11-17 Thread Max Fillinger
done before trying to undo it. It's behind an #ifdef because it's only used on Linux, and that was the reason why it was removed before. Signed-off-by: Max Fillinger --- src/openvpn/tun.c | 6 +- src/openvpn/tun.h | 3 +++ 2 files changed, 8 insertions(+), 1 deletion(-) diff -

[Openvpn-devel] [PATCH] Don't use BF-CBC in unit tests if we don't have it

2021-12-08 Thread Max Fillinger
Signed-off-by: Max Fillinger --- tests/unit_tests/openvpn/test_ncp.c | 7 +-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/tests/unit_tests/openvpn/test_ncp.c b/tests/unit_tests/openvpn/test_ncp.c index 6702133a..f4c28ffd 100644 --- a/tests/unit_tests/openvpn/test_ncp.c

[Openvpn-devel] [PATCH 2.5] Define have_blowfish variable in ncp unit tests

2021-12-08 Thread Max Fillinger
The previous commit was backported from master and needs this variable to exist. Signed-off-by: Max Fillinger --- tests/unit_tests/openvpn/test_ncp.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/tests/unit_tests/openvpn/test_ncp.c b/tests/unit_tests/openvpn/test_ncp.c

[Openvpn-devel] [PATCH] Add warning about mbed TLS licensing problem

2022-02-16 Thread Max Fillinger
Signed-off-by: Max Fillinger --- README.mbedtls | 17 + 1 file changed, 17 insertions(+) diff --git a/README.mbedtls b/README.mbedtls index 4875822d..b5604bb8 100644 --- a/README.mbedtls +++ b/README.mbedtls @@ -11,6 +11,23 @@ This version depends on mbed TLS 2.0 (and requires

[Openvpn-devel] [Patch v2] Add warning about mbed TLS licensing problem

2022-02-16 Thread Max Fillinger
Signed-off-by: Max Fillinger --- README.mbedtls | 17 + 1 file changed, 17 insertions(+) diff --git a/README.mbedtls b/README.mbedtls index 4875822d..062ae470 100644 --- a/README.mbedtls +++ b/README.mbedtls @@ -11,6 +11,23 @@ This version depends on mbed TLS 2.0 (and requires

[Openvpn-devel] [PATCH v3] Add warning about mbed TLS licensing problem

2022-02-17 Thread Max Fillinger
Signed-off-by: Max Fillinger --- README.mbedtls | 18 ++ 1 file changed, 18 insertions(+) diff --git a/README.mbedtls b/README.mbedtls index 4875822d..d3466fa9 100644 --- a/README.mbedtls +++ b/README.mbedtls @@ -11,6 +11,24 @@ This version depends on mbed TLS 2.0 (and requires