Re: [Openvpn-users] CRL and --CApath usage

2015-09-25 Thread Rui Santos

  
  
Hi Jan,

Thank you for your time spent on this matter.
If you need any help on the matter, please do not hesitate to ask.

Regards,
Rui

On 24-09-2015 19:31, Jan Just Keijser
  wrote:

Hi
  Rui,
  
  
  On 21/08/15 17:22, Rui Santos wrote:
  
  
  [...]

  
  sorry for taking so long to get back to you on this.
  
  I've been playing with the --capath option and revoking
  certificates and indeed I see the behaviour that you describe:
  
  
  1. the server starts, and a CRL is in the capath directory
  
  2. client1 connects and is allowed access; later on , client1
  disconnects
  
  3. certificate client1 is revoked and a new CRL (.r0) file is
  copied to the --capath dir. the server is NOT restarted
  
  4. client1 can still connect to the server until the server is
  restarted.
  
  
  this happens for OpenVPN 2.1 - 2.3 with OpenSSL 0.9.8 and 1.0.x .
  I've always been under the impression that .r0 files were
  (periodically) re-read by the OpenSSL routines but apparently they
  are not.
  
  This can be considered a bug in OpenVPN (not OpenSSL) , as it is
  not stated anywhere that OpenSSL should re-read the .r0 files.
  I've played with .r1 files as well (delta CRLs) but that does not
  solve all issues.
  
  
  I will investigate further (as this also affects my "other" job)
  and once I have a proper solution I will post a patch.
  
  
  thanks for reporting this,
  
  
  JJK
  
  
  On 21-08-2015 13:45, David Sommerseth
wrote:

-BEGIN PGP SIGNED MESSAGE-
  
  Hash: SHA1
  
  
  On 21/08/15 11:55, Rui Santos wrote:
  
  On 20-08-2015 18:40, David Sommerseth
wrote: On 20/08/15 19:11,

debbie...@gmail.com wrote:


  
- Original Message -
  From: "Rui Santos"
  
  <rsan...@grupopie.com> To:
  
  <openvpn-users@lists.sourceforge.net> Sent:
  Thursday, August
  
      20, 2015 3:10 PM Subject: Re: [Openvpn-users] CRL and
      
  --CApath usage
  
  
  
  On 20-08-2015 15:01,
debbie...@gmail.com wrote:

- Original Message -
  From: "Rui Santos"
  
  <rsan...@grupopie.com> To:
  
  <openvpn-users@lists.sourceforge.net> Sent:
  Thursday,
  
  August 20, 2015 12:33 PM Subject: [Openvpn-users]
  CRL and
  
  --CApath usage
  
  
  
  I'm using --CApath option
for CA and CRL

approving/checking


I just revoked a certificate, copied the new CRL
to

CApath, overwriting the old one, and the OpenVPN

allowed > the connection with that
certificate.


The openssl command for this: ~# openssl verify

-crl_check -CApath   cert.crt
error 23 at 0

depth lookup:certificate revoked


I tried to connect several times, with success,
which

I shouldn't be able to.


However, if I restart the OpenVPN service, it
works as

expected, with the error: :42410
VERIFY ERROR:

depth=0, error=certificate revoked: C=

Directories leading to CApath and files are
accessible

to all user: 0755/0644


   

Re: [Openvpn-users] CRL and --CApath usage

2015-09-24 Thread Jan Just Keijser
Hi Rui,

On 21/08/15 17:22, Rui Santos wrote:

> [...]
sorry for taking so long to get back to you on this.
I've been playing with the --capath option and revoking certificates and 
indeed I see the behaviour that you describe:

1. the server starts, and a CRL is in the capath directory
2. client1 connects and is allowed access; later on , client1 disconnects
3. certificate client1 is revoked and a new CRL (.r0) file is copied to 
the --capath dir. the server is NOT restarted
4. client1 can still connect to the server until the server is restarted.

this happens for OpenVPN 2.1 - 2.3 with OpenSSL 0.9.8 and 1.0.x . I've 
always been under the impression that .r0 files were (periodically) 
re-read by the OpenSSL routines but apparently they are not.
This can be considered a bug in OpenVPN (not OpenSSL) , as it is not 
stated anywhere that OpenSSL should re-read the .r0 files. I've played 
with .r1 files as well (delta CRLs) but that does not solve all issues.

I will investigate further (as this also affects my "other" job) and 
once I have a proper solution I will post a patch.

thanks for reporting this,

JJK

> On 21-08-2015 13:45, David Sommerseth wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> On 21/08/15 11:55, Rui Santos wrote:
>>> On 20-08-2015 18:40, David Sommerseth wrote: On 20/08/15 19:11,
>>> debbie...@gmail.com wrote:
>>>>>> - Original Message - From: "Rui Santos"
>>>>>> <rsan...@grupopie.com> To:
>>>>>> <openvpn-users@lists.sourceforge.net> Sent: Thursday, August
>>>>>> 20, 2015 3:10 PM Subject: Re: [Openvpn-users] CRL and
>>>>>> --CApath usage
>>>>>>
>>>>>>
>>>>>>> On 20-08-2015 15:01, debbie...@gmail.com wrote:
>>>>>>>> - Original Message - From: "Rui Santos"
>>>>>>>> <rsan...@grupopie.com> To:
>>>>>>>> <openvpn-users@lists.sourceforge.net> Sent: Thursday,
>>>>>>>> August 20, 2015 12:33 PM Subject: [Openvpn-users] CRL and
>>>>>>>> --CApath usage
>>>>>>>>
>>>>>>>>
>>>>>>>>> I'm using --CApath option for CA and CRL
>>>>>>>>> approving/checking
>>>>>>>>>
>>>>>>>>> I just revoked a certificate, copied the new CRL to
>>>>>>>>> CApath, overwriting the old one, and the OpenVPN
>>>>>>>>> allowed > the connection with that certificate.
>>>>>>>>>
>>>>>>>>> The openssl command for this: ~# openssl verify
>>>>>>>>> -crl_check -CApath   cert.crt error 23 at 0
>>>>>>>>> depth lookup:certificate revoked
>>>>>>>>>
>>>>>>>>> I tried to connect several times, with success, which
>>>>>>>>> I shouldn't be able to.
>>>>>>>>>
>>>>>>>>> However, if I restart the OpenVPN service, it works as
>>>>>>>>> expected, with the error: :42410 VERIFY ERROR:
>>>>>>>>> depth=0, error=certificate revoked: C=
>>>>>>>>> Directories leading to CApath and files are accessible
>>>>>>>>> to all user: 0755/0644
>>>>>>>>>
>>>>>>>>> I wonder if there is any kind of bug on this. Is this
>>>>>>>>> an expected behavior ? One should not need to restart
>>>>>>>>> the OpenVPN instance, just to reread the CRL.
>>>>>>>>>
>>>>>>>>> Am I missing something ?
>>>>>>>> The manual has this to say:
>>>>>>>>
>>>>>>>> Note: As the crl file (or directory) is read every time a
>>>>>>>> peer connects, if you are dropping root privileges with
>>>>>>>> --user, make sure that this user has sufficient
>>>>>>>> privileges to read the file.
>>>>>>> Hi Debbie,
>>>>>>>
>>>>>>> I'm aware of that. OpenVPN is indeed running as user
>>>>>>> nobody. But the accesses 0755/0644 for directories and
>>>>>>> files, respectively, should take care of that issue,
>>>>>>> shouldn’t it ?
>>>>>> Did you try *without* dropping root orivileges ?
>>> Nonsense.  If files and 

Re: [Openvpn-users] CRL and --CApath usage

2015-08-21 Thread David Sommerseth
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 21/08/15 11:55, Rui Santos wrote:
 
 On 20-08-2015 18:40, David Sommerseth wrote: On 20/08/15 19:11,
 debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos 
 rsan...@grupopie.com To:
 openvpn-users@lists.sourceforge.net Sent: Thursday, August
 20, 2015 3:10 PM Subject: Re: [Openvpn-users] CRL and
 --CApath usage
 
 
 On 20-08-2015 15:01, debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos 
 rsan...@grupopie.com To: 
 openvpn-users@lists.sourceforge.net Sent: Thursday,
 August 20, 2015 12:33 PM Subject: [Openvpn-users] CRL and
 --CApath usage
 
 
 I'm using --CApath option for CA and CRL
 approving/checking
 
 I just revoked a certificate, copied the new CRL to
 CApath, overwriting the old one, and the OpenVPN
 allowed  the connection with that certificate.
 
 The openssl command for this: ~# openssl verify
 -crl_check -CApath cadir  cert.crt error 23 at 0
 depth lookup:certificate revoked
 
 I tried to connect several times, with success, which
 I shouldn't be able to.
 
 However, if I restart the OpenVPN service, it works as 
 expected, with the error: IP:42410 VERIFY ERROR:
 depth=0, error=certificate revoked: C=
 Directories leading to CApath and files are accessible
 to all user: 0755/0644
 
 I wonder if there is any kind of bug on this. Is this
 an expected behavior ? One should not need to restart
 the OpenVPN instance, just to reread the CRL.
 
 Am I missing something ?
 The manual has this to say:
 
 Note: As the crl file (or directory) is read every time a
 peer connects, if you are dropping root privileges with
 --user, make sure that this user has sufficient
 privileges to read the file.
 Hi Debbie,
 
 I'm aware of that. OpenVPN is indeed running as user
 nobody. But the accesses 0755/0644 for directories and
 files, respectively, should take care of that issue,
 shouldn’t it ?
 Did you try *without* dropping root orivileges ?
 Nonsense.  If files and directories have 0655/0744, even the
 'nobody' user should be able to read these files.  Also consider
 that *connecting* to the server DO work.
 @Debbie Nonetheless, thank you for your effort. I do appreciate
 you help.
 
 
 Perhaps the crl (in PEM format) is also effected by
 --persist-key ...
 This is just pure guesswork, debbie10t.  The CRL file is *NOT* 
 affected by --persist-key.
 
 
 Rui:  How have you configured --crl?  Did you add the 'dir' flag
 when pointing to the directory?  Or did you point directly to a CRL
 file?
 Hi David,
 
 I assume you mean the --crl-verify option, right? If so, the
 --crl-verify option is not specified at all. According to man
 page, on the --crl-verify section, the you can either specify a
 CRL PEM encoded file, which contains one or more CRLs 
 concatenated. This could be doable. With the dir flag, the
 directory you specify as second parameter, must contains files
 named after the serial numbers of the revoked certificates.
 Quoting from the man page: If  the optional dir flag is
 specified, enable a different mode where crl is a directory
 containing files named as revoked serial numbers (the files may
 be empty, the contents are never read).  If a client requests a
 connection, where the  client  certificate serial  number
 (decimal string) is the name of a file present in the directory,
 it will be rejected. According to my understanding, you cannot
 have multiple CRLs in one dir, by using --crl-verify dir dir
 approach. Do you agree ?

Yes, I meant the --crl-verify option, sorry about the misguiding here.
 And you're right, using the 'dir' option doesn't take CRL files but
empty files with the file names being certificate serial numbers of
revoked certificates.  The contents of these files in this 'dir' case
is never parsed.

 Nonetheless, IMHO, the use of capath is preferable, because use
 just need to place both CAs and CRLs files in one directory,
 c_rehash it, and that's all... all you need to do to manage it,
 is to copy the CRL across, whenever a certificate is revoked. In
 my case it would also be preferable, because there are multiple
 CAs and CRLs, thus I would not need it to concatenate all CRLs,
 every time a CRL is changed. That's why I would prefer the
 capath.

Jan Just Keijser is truly the authority when it comes to configuring
OpenVPN, which also responded to you.  I double checked a few details
with his OpenVPN 2 Cookbook, and I relearned some details about
- --capath I had forgotten.

So, you can use --capath for CA certificates and their corresponding
CRL.  But there are a few tweaks here, so if you can double check that
your CRL files inside the CApath directory have the same hash as the
CA hash they represent, but with an .r0 extension instead of .0.  That
should normally be the trick.

I hope JJK doesn't kill me for pulling out an extract of one example
of his book:

  $ cd /path/to/ca/directory
  $ openssl x509 -hash -noout -in ca.crt
  bcd54da9

This means that the CA file should

Re: [Openvpn-users] CRL and --CApath usage

2015-08-21 Thread Rui Santos

On 21-08-2015 13:45, David Sommerseth wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 21/08/15 11:55, Rui Santos wrote:
 On 20-08-2015 18:40, David Sommerseth wrote: On 20/08/15 19:11,
 debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To:
 openvpn-users@lists.sourceforge.net Sent: Thursday, August
 20, 2015 3:10 PM Subject: Re: [Openvpn-users] CRL and
 --CApath usage


 On 20-08-2015 15:01, debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To:
 openvpn-users@lists.sourceforge.net Sent: Thursday,
 August 20, 2015 12:33 PM Subject: [Openvpn-users] CRL and
 --CApath usage


 I'm using --CApath option for CA and CRL
 approving/checking

 I just revoked a certificate, copied the new CRL to
 CApath, overwriting the old one, and the OpenVPN
 allowed  the connection with that certificate.

 The openssl command for this: ~# openssl verify
 -crl_check -CApath cadir  cert.crt error 23 at 0
 depth lookup:certificate revoked

 I tried to connect several times, with success, which
 I shouldn't be able to.

 However, if I restart the OpenVPN service, it works as
 expected, with the error: IP:42410 VERIFY ERROR:
 depth=0, error=certificate revoked: C=
 Directories leading to CApath and files are accessible
 to all user: 0755/0644

 I wonder if there is any kind of bug on this. Is this
 an expected behavior ? One should not need to restart
 the OpenVPN instance, just to reread the CRL.

 Am I missing something ?
 The manual has this to say:

 Note: As the crl file (or directory) is read every time a
 peer connects, if you are dropping root privileges with
 --user, make sure that this user has sufficient
 privileges to read the file.
 Hi Debbie,

 I'm aware of that. OpenVPN is indeed running as user
 nobody. But the accesses 0755/0644 for directories and
 files, respectively, should take care of that issue,
 shouldn’t it ?
 Did you try *without* dropping root orivileges ?
 Nonsense.  If files and directories have 0655/0744, even the
 'nobody' user should be able to read these files.  Also consider
 that *connecting* to the server DO work.
 @Debbie Nonetheless, thank you for your effort. I do appreciate
 you help.

 Perhaps the crl (in PEM format) is also effected by
 --persist-key ...
 This is just pure guesswork, debbie10t.  The CRL file is *NOT*
 affected by --persist-key.


 Rui:  How have you configured --crl?  Did you add the 'dir' flag
 when pointing to the directory?  Or did you point directly to a CRL
 file?
 Hi David,
 I assume you mean the --crl-verify option, right? If so, the
 --crl-verify option is not specified at all. According to man
 page, on the --crl-verify section, the you can either specify a
 CRL PEM encoded file, which contains one or more CRLs
 concatenated. This could be doable. With the dir flag, the
 directory you specify as second parameter, must contains files
 named after the serial numbers of the revoked certificates.
 Quoting from the man page: If  the optional dir flag is
 specified, enable a different mode where crl is a directory
 containing files named as revoked serial numbers (the files may
 be empty, the contents are never read).  If a client requests a
 connection, where the  client  certificate serial  number
 (decimal string) is the name of a file present in the directory,
 it will be rejected. According to my understanding, you cannot
 have multiple CRLs in one dir, by using --crl-verify dir dir
 approach. Do you agree ?
 Yes, I meant the --crl-verify option, sorry about the misguiding here.
   And you're right, using the 'dir' option doesn't take CRL files but
 empty files with the file names being certificate serial numbers of
 revoked certificates.  The contents of these files in this 'dir' case
 is never parsed.

 Nonetheless, IMHO, the use of capath is preferable, because use
 just need to place both CAs and CRLs files in one directory,
 c_rehash it, and that's all... all you need to do to manage it,
 is to copy the CRL across, whenever a certificate is revoked. In
 my case it would also be preferable, because there are multiple
 CAs and CRLs, thus I would not need it to concatenate all CRLs,
 every time a CRL is changed. That's why I would prefer the
 capath.
 Jan Just Keijser is truly the authority when it comes to configuring
 OpenVPN, which also responded to you.  I double checked a few details
 with his OpenVPN 2 Cookbook, and I relearned some details about
 - --capath I had forgotten.
Hi again David,

Thanks for the heads up :) I was unaware of that... I'm kind of new on 
this list.
My first reply on this list was actually his, 9 days ago... Thanks Jan.

 So, you can use --capath for CA certificates and their corresponding
 CRL.  But there are a few tweaks here, so if you can double check that
 your CRL files inside the CApath directory have the same hash as the
 CA hash they represent, but with an .r0 extension instead of .0.  That
 should normally

Re: [Openvpn-users] CRL and --CApath usage

2015-08-21 Thread Rui Santos

On 20-08-2015 18:40, David Sommerseth wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 20/08/15 19:11, debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To: openvpn-users@lists.sourceforge.net
 Sent: Thursday, August 20, 2015 3:10 PM Subject: Re:
 [Openvpn-users] CRL and --CApath usage


 On 20-08-2015 15:01, debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To:
 openvpn-users@lists.sourceforge.net Sent: Thursday, August
 20, 2015 12:33 PM Subject: [Openvpn-users] CRL and --CApath
 usage


 I'm using --CApath option for CA and CRL approving/checking

 I just revoked a certificate, copied the new CRL to CApath,
 overwriting the old one, and the OpenVPN allowed  the
 connection with that certificate.

 The openssl command for this: ~# openssl verify -crl_check
 -CApath cadir  cert.crt error 23 at 0 depth
 lookup:certificate revoked

 I tried to connect several times, with success, which I
 shouldn't be able to.

 However, if I restart the OpenVPN service, it works as
 expected, with the error: IP:42410 VERIFY ERROR: depth=0,
 error=certificate revoked: C= Directories leading to
 CApath and files are accessible to all user: 0755/0644

 I wonder if there is any kind of bug on this. Is this an
 expected behavior ? One should not need to restart the
 OpenVPN instance, just to reread the CRL.

 Am I missing something ?
 The manual has this to say:

 Note: As the crl file (or directory) is read every time a peer
 connects, if you are dropping root privileges with --user, make
 sure that this user has sufficient privileges to read the
 file.
 Hi Debbie,

 I'm aware of that. OpenVPN is indeed running as user nobody. But
 the accesses 0755/0644 for directories and files, respectively,
 should take care of that issue, shouldn’t it ?
 Did you try *without* dropping root orivileges ?
 Nonsense.  If files and directories have 0655/0744, even the 'nobody'
 user should be able to read these files.  Also consider that
 *connecting* to the server DO work.
@Debbie
Nonetheless, thank you for your effort. I do appreciate you help.


 Perhaps the crl (in PEM format) is also effected by --persist-key
 ...
 This is just pure guesswork, debbie10t.  The CRL file is *NOT*
 affected by --persist-key.


 Rui:  How have you configured --crl?  Did you add the 'dir' flag when
 pointing to the directory?  Or did you point directly to a CRL file?
Hi David,

I assume you mean the --crl-verify option, right?
If so, the --crl-verify option is not specified at all.
According to man page, on the --crl-verify section, the you can either 
specify a CRL PEM encoded file, which contains one or more CRLs 
concatenated. This could be doable.
With the dir flag, the directory you specify as second parameter, must 
contains files named after the serial numbers of the revoked 
certificates. Quoting from the man page:
If  the optional dir flag is specified, enable a different mode where 
crl is a directory containing files named as revoked serial numbers (the 
files may be empty, the contents are never read).  If a client requests 
a connection, where the  client  certificate serial  number (decimal 
string) is the name of a file present in the directory, it will be 
rejected.
According to my understanding, you cannot have multiple CRLs in one dir, 
by using --crl-verify dir dir approach. Do you agree ?

Nonetheless, IMHO, the use of capath is preferable, because use just 
need to place both CAs and CRLs files in one directory, c_rehash it, and 
that's all... all you need to do to manage it, is to copy the CRL 
across, whenever a certificate is revoked.
In my case it would also be preferable, because there are multiple CAs 
and CRLs, thus I would not need it to concatenate all CRLs, every time a 
CRL is changed.
That's why I would prefer the capath.

Regards,
Rui



 - -- 
 kind regards,

 David Sommerseth

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v2.0.22 (GNU/Linux)

 iEYEARECAAYFAlXWER4ACgkQDC186MBRfrrdeACgkQhk+slfqThKouQWaptshGU+
 XoMAnRoscAMFn5n2VLpBrMCNiNc+Of98
 =hx8r
 -END PGP SIGNATURE-




--
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] CRL and --CApath usage

2015-08-21 Thread Rui Santos

On 20-08-2015 22:14, Jan Just Keijser wrote:
 Hi Rui,
Hi Jan,

 On 20/08/15 21:19, David Sommerseth wrote:
 On 20/08/15 21:16, debbie...@gmail.com wrote:
 - Original Message - From: David Sommerseth
 openvpn.l...@topphemmelig.net
 To: debbie...@gmail.com; Rui Santos rsan...@grupopie.com
 Cc: openvpn-users@lists.sourceforge.net
 Sent: Thursday, August 20, 2015 6:40 PM
 Subject: Re: [Openvpn-users] CRL and --CApath usage


 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 20/08/15 19:11, debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To: openvpn-users@lists.sourceforge.net
 Sent: Thursday, August 20, 2015 3:10 PM Subject: Re:
 [Openvpn-users] CRL and --CApath usage


 On 20-08-2015 15:01, debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To:
 openvpn-users@lists.sourceforge.net Sent: Thursday, August
 20, 2015 12:33 PM Subject: [Openvpn-users] CRL and --CApath
 usage


 I'm using --CApath option for CA and CRL approving/checking

 I just revoked a certificate, copied the new CRL to CApath,
 overwriting the old one, and the OpenVPN allowed  the
 connection with that certificate.

 The openssl command for this: ~# openssl verify -crl_check
 -CApath cadir  cert.crt error 23 at 0 depth
 lookup:certificate revoked

 I tried to connect several times, with success, which I
 shouldn't be able to.

 However, if I restart the OpenVPN service, it works as
 expected, with the error: IP:42410 VERIFY ERROR: depth=0,
 error=certificate revoked: C= Directories leading to
 CApath and files are accessible to all user: 0755/0644

 I wonder if there is any kind of bug on this. Is this an
 expected behavior ? One should not need to restart the
 OpenVPN instance, just to reread the CRL.

 Am I missing something ?
 I know this worked in a previous release of OpenVPN - my setup relied 
 on it. I will check next week when I am back home to see if it still 
 works for v2.3+

Just enjoy the remaining of your vacations.
I will wait. Thanks for your help.

 stay tuned,

 JJK





-- 
Melhores Cumprimentos / Best Regards,
Rui


--
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] CRL and --CApath usage

2015-08-20 Thread debbie10t

- Original Message - 
From: Rui Santos rsan...@grupopie.com
To: openvpn-users@lists.sourceforge.net
Sent: Thursday, August 20, 2015 3:10 PM
Subject: Re: [Openvpn-users] CRL and --CApath usage



 On 20-08-2015 15:01, debbie...@gmail.com wrote:

 - Original Message - From: Rui Santos rsan...@grupopie.com
 To: openvpn-users@lists.sourceforge.net
 Sent: Thursday, August 20, 2015 12:33 PM
 Subject: [Openvpn-users] CRL and --CApath usage


 I'm using --CApath option for CA and CRL approving/checking

 I just revoked a certificate, copied the new CRL to CApath, overwriting
 the old one, and the OpenVPN allowed  the connection with that
 certificate.

 The openssl command for this:
 ~# openssl verify -crl_check -CApath cadir  cert.crt
 error 23 at 0 depth lookup:certificate revoked

 I tried to connect several times, with success, which I shouldn't be
 able
 to.

 However, if I restart the OpenVPN service, it works as expected, with
 the
 error:
 IP:42410 VERIFY ERROR: depth=0, error=certificate revoked: C=
 Directories leading to CApath and files are accessible to all user:
 0755/0644

 I wonder if there is any kind of bug on this. Is this an expected
 behavior
 ?
 One should not need to restart the OpenVPN instance, just to reread the
 CRL.

 Am I missing something ?

 The manual has this to say:

 Note: As the crl file (or directory) is read every time a peer
 connects, if
 you are dropping root privileges with --user, make sure that this user
 has
 sufficient privileges to read the file.

 Hi Debbie,

 I'm aware of that. OpenVPN is indeed running as user nobody.
 But the accesses 0755/0644 for directories and files, respectively,
 should take care of that issue, shouldn’t it ?

Did you try *without* dropping root orivileges ?

Perhaps the crl (in PEM format) is also effected by --persist-key ...

Regards


--
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] CRL and --CApath usage

2015-08-20 Thread David Sommerseth
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 20/08/15 19:11, debbie...@gmail.com wrote:
 
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To: openvpn-users@lists.sourceforge.net 
 Sent: Thursday, August 20, 2015 3:10 PM Subject: Re:
 [Openvpn-users] CRL and --CApath usage
 
 
 
 On 20-08-2015 15:01, debbie...@gmail.com wrote:
 
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To:
 openvpn-users@lists.sourceforge.net Sent: Thursday, August
 20, 2015 12:33 PM Subject: [Openvpn-users] CRL and --CApath
 usage
 
 
 I'm using --CApath option for CA and CRL approving/checking
 
 I just revoked a certificate, copied the new CRL to CApath,
 overwriting the old one, and the OpenVPN allowed  the
 connection with that certificate.
 
 The openssl command for this: ~# openssl verify -crl_check
 -CApath cadir  cert.crt error 23 at 0 depth
 lookup:certificate revoked
 
 I tried to connect several times, with success, which I
 shouldn't be able to.
 
 However, if I restart the OpenVPN service, it works as
 expected, with the error: IP:42410 VERIFY ERROR: depth=0,
 error=certificate revoked: C= Directories leading to
 CApath and files are accessible to all user: 0755/0644
 
 I wonder if there is any kind of bug on this. Is this an
 expected behavior ? One should not need to restart the
 OpenVPN instance, just to reread the CRL.
 
 Am I missing something ?
 
 The manual has this to say:
 
 Note: As the crl file (or directory) is read every time a peer 
 connects, if you are dropping root privileges with --user, make
 sure that this user has sufficient privileges to read the
 file.
 
 Hi Debbie,
 
 I'm aware of that. OpenVPN is indeed running as user nobody. But
 the accesses 0755/0644 for directories and files, respectively, 
 should take care of that issue, shouldn’t it ?
 
 Did you try *without* dropping root orivileges ?

Nonsense.  If files and directories have 0655/0744, even the 'nobody'
user should be able to read these files.  Also consider that
*connecting* to the server DO work.


 Perhaps the crl (in PEM format) is also effected by --persist-key
 ...

This is just pure guesswork, debbie10t.  The CRL file is *NOT*
affected by --persist-key.


Rui:  How have you configured --crl?  Did you add the 'dir' flag when
pointing to the directory?  Or did you point directly to a CRL file?


- -- 
kind regards,

David Sommerseth

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iEYEARECAAYFAlXWER4ACgkQDC186MBRfrrdeACgkQhk+slfqThKouQWaptshGU+
XoMAnRoscAMFn5n2VLpBrMCNiNc+Of98
=hx8r
-END PGP SIGNATURE-

--
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] CRL and --CApath usage

2015-08-20 Thread debbie10t

- Original Message - 
From: Rui Santos rsan...@grupopie.com
To: openvpn-users@lists.sourceforge.net
Sent: Thursday, August 20, 2015 12:33 PM
Subject: [Openvpn-users] CRL and --CApath usage


 I'm using --CApath option for CA and CRL approving/checking

 I just revoked a certificate, copied the new CRL to CApath, overwriting
 the old one, and the OpenVPN allowed  the connection with that
 certificate.

 The openssl command for this:
 ~# openssl verify -crl_check -CApath cadir  cert.crt
 error 23 at 0 depth lookup:certificate revoked

 I tried to connect several times, with success, which I shouldn't be able
 to.

 However, if I restart the OpenVPN service, it works as expected, with the
 error:
 IP:42410 VERIFY ERROR: depth=0, error=certificate revoked: C=
 Directories leading to CApath and files are accessible to all user:
 0755/0644

 I wonder if there is any kind of bug on this. Is this an expected behavior
 ?
 One should not need to restart the OpenVPN instance, just to reread the
 CRL.

 Am I missing something ?

The manual has this to say:

Note: As the crl file (or directory) is read every time a peer connects, if
you are dropping root privileges with --user, make sure that this user has
sufficient privileges to read the file.

Regards


--
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] CRL and --CApath usage

2015-08-20 Thread Rui Santos

On 20-08-2015 15:01, debbie...@gmail.com wrote:

 - Original Message - From: Rui Santos rsan...@grupopie.com
 To: openvpn-users@lists.sourceforge.net
 Sent: Thursday, August 20, 2015 12:33 PM
 Subject: [Openvpn-users] CRL and --CApath usage


 I'm using --CApath option for CA and CRL approving/checking

 I just revoked a certificate, copied the new CRL to CApath, overwriting
 the old one, and the OpenVPN allowed  the connection with that
 certificate.

 The openssl command for this:
 ~# openssl verify -crl_check -CApath cadir  cert.crt
 error 23 at 0 depth lookup:certificate revoked

 I tried to connect several times, with success, which I shouldn't be 
 able
 to.

 However, if I restart the OpenVPN service, it works as expected, with 
 the
 error:
 IP:42410 VERIFY ERROR: depth=0, error=certificate revoked: C=
 Directories leading to CApath and files are accessible to all user:
 0755/0644

 I wonder if there is any kind of bug on this. Is this an expected 
 behavior
 ?
 One should not need to restart the OpenVPN instance, just to reread the
 CRL.

 Am I missing something ?

 The manual has this to say:

 Note: As the crl file (or directory) is read every time a peer 
 connects, if
 you are dropping root privileges with --user, make sure that this user 
 has
 sufficient privileges to read the file.

Hi Debbie,

I'm aware of that. OpenVPN is indeed running as user nobody.
But the accesses 0755/0644 for directories and files, respectively, 
should take care of that issue, shouldn’t it ?

Regards,

 Regards






--
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] CRL and --CApath usage

2015-08-20 Thread Jan Just Keijser
Hi Rui,

On 20/08/15 21:19, David Sommerseth wrote:
 On 20/08/15 21:16, debbie...@gmail.com wrote:
 - Original Message - From: David Sommerseth
 openvpn.l...@topphemmelig.net
 To: debbie...@gmail.com; Rui Santos rsan...@grupopie.com
 Cc: openvpn-users@lists.sourceforge.net
 Sent: Thursday, August 20, 2015 6:40 PM
 Subject: Re: [Openvpn-users] CRL and --CApath usage


 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 20/08/15 19:11, debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To: openvpn-users@lists.sourceforge.net
 Sent: Thursday, August 20, 2015 3:10 PM Subject: Re:
 [Openvpn-users] CRL and --CApath usage


 On 20-08-2015 15:01, debbie...@gmail.com wrote:
 - Original Message - From: Rui Santos
 rsan...@grupopie.com To:
 openvpn-users@lists.sourceforge.net Sent: Thursday, August
 20, 2015 12:33 PM Subject: [Openvpn-users] CRL and --CApath
 usage


 I'm using --CApath option for CA and CRL approving/checking

 I just revoked a certificate, copied the new CRL to CApath,
 overwriting the old one, and the OpenVPN allowed  the
 connection with that certificate.

 The openssl command for this: ~# openssl verify -crl_check
 -CApath cadir  cert.crt error 23 at 0 depth
 lookup:certificate revoked

 I tried to connect several times, with success, which I
 shouldn't be able to.

 However, if I restart the OpenVPN service, it works as
 expected, with the error: IP:42410 VERIFY ERROR: depth=0,
 error=certificate revoked: C= Directories leading to
 CApath and files are accessible to all user: 0755/0644

 I wonder if there is any kind of bug on this. Is this an
 expected behavior ? One should not need to restart the
 OpenVPN instance, just to reread the CRL.

 Am I missing something ?
I know this worked in a previous release of OpenVPN - my setup relied on 
it. I will check next week when I am back home to see if it still works 
for v2.3+

stay tuned,

JJK



--
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] CRL and --CApath usage

2015-08-20 Thread debbie10t

- Original Message - 
From: David Sommerseth openvpn.l...@topphemmelig.net
To: debbie...@gmail.com; Rui Santos rsan...@grupopie.com
Cc: openvpn-users@lists.sourceforge.net
Sent: Thursday, August 20, 2015 6:40 PM
Subject: Re: [Openvpn-users] CRL and --CApath usage


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 20/08/15 19:11, debbie...@gmail.com wrote:

 - Original Message - From: Rui Santos
 rsan...@grupopie.com To: openvpn-users@lists.sourceforge.net
 Sent: Thursday, August 20, 2015 3:10 PM Subject: Re:
 [Openvpn-users] CRL and --CApath usage



 On 20-08-2015 15:01, debbie...@gmail.com wrote:

 - Original Message - From: Rui Santos
 rsan...@grupopie.com To:
 openvpn-users@lists.sourceforge.net Sent: Thursday, August
 20, 2015 12:33 PM Subject: [Openvpn-users] CRL and --CApath
 usage


 I'm using --CApath option for CA and CRL approving/checking

 I just revoked a certificate, copied the new CRL to CApath,
 overwriting the old one, and the OpenVPN allowed  the
 connection with that certificate.

 The openssl command for this: ~# openssl verify -crl_check
 -CApath cadir  cert.crt error 23 at 0 depth
 lookup:certificate revoked

 I tried to connect several times, with success, which I
 shouldn't be able to.

 However, if I restart the OpenVPN service, it works as
 expected, with the error: IP:42410 VERIFY ERROR: depth=0,
 error=certificate revoked: C= Directories leading to
 CApath and files are accessible to all user: 0755/0644

 I wonder if there is any kind of bug on this. Is this an
 expected behavior ? One should not need to restart the
 OpenVPN instance, just to reread the CRL.

 Am I missing something ?

 The manual has this to say:

 Note: As the crl file (or directory) is read every time a peer
 connects, if you are dropping root privileges with --user, make
 sure that this user has sufficient privileges to read the
 file.

 Hi Debbie,

 I'm aware of that. OpenVPN is indeed running as user nobody. But
 the accesses 0755/0644 for directories and files, respectively,
 should take care of that issue, shouldn’t it ?

 Did you try *without* dropping root orivileges ?

Nonsense.  If files and directories have 0655/0744, even the 'nobody'
user should be able to read these files.  Also consider that
*connecting* to the server DO work.


 Perhaps the crl (in PEM format) is also effected by --persist-key
 ...

This is just pure guesswork, debbie10t.  The CRL file is *NOT*
affected by --persist-key.


Rui:  How have you configured --crl?  Did you add the 'dir' flag when
pointing to the directory?  Or did you point directly to a CRL file?


- -- 

Due to a lack of config files and logs I was mearly offering suggestions.
Also, I now know that --persist-key does not effect the crl PEM file..
The manual is not clear:

--persist-key
Don't re-read key files across SIGUSR1 or --ping-restart

Could be construed as:
 fileS which are keyS or fileS which are key to operation.

Thankyou


--
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users