-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[PATCH] make client-side authentication methods optional #513
base: master
Are you sure you want to change the base?
Conversation
I am not sure this is a good way forward. I don't think truly having no client side authentication is not something that I can see has any value for a client connection. I think it would be better to instead introduce something like Users are often doing incredibly stupid things and allowing to configure a VPN connection without authentication is something that will backfire and then blaming us for their mistakes. And it is a very dangerous feature without safeguards like I describe in the paragraph before. |
Does enforcing that some form of authentication is required in client config really provide any safeguard? Its the server that authenticates and if there is I'm not convinced that the current client-side restriction serve any purpose at all. |
By default, OpenVPN requires server-side authentication. Users have to opt-out with A clients-side restriction still doesn't protect against an server-sided insecure configuration. Incredibly stupid users can still do incredibly stupid things. For example by just define
on the configuration, which is the current workaround for this issue. |
Yes, you can always find a way too shot them into the foot. And I think being able to disable client side without any warning or extra option is dangerous cause it could lead to accidentially insecure configuration. I think this needs to be explicitly requested to avoid these situations. |
Would an additional config directive "no-auth" sufficient? The config directive would only skip the if condition, which is remove here. No additional logic. |
If we have to go this route, |
I actually agree with Selva here - whether or not there is authentication is a server side decision. That said, I think I do understand where Arne is coming from - users put incredibly stupid stuff into their configs, then things fail, and we get bad press out of it. So I'd go with making it explicit, as Selva proposed, adding an (And then Arne gets the prize for making us introduce yet another option) |
Since, it's my first contribution and I would like to reduce the review cycle and make you more happy. Where I have to add the new option?
somewhere else? |
That seems to cover it all. Also, Gert wants a warning, which could be possibly added like this: Leave the definition of "sum" as is. If it's zero, and no indication of external auth, enter the if clause and exit. Else, if sum is zero, log a warning that this configuration assumes that the server will authenticate the user via external means such as webauth. Something like that. |
I do not need a warning in the actual code. Having a warning in the manpage is perfectly fine for me. But Selva's suggestion would also work, and I think would make Arne more happy ;-) |
4c70e70
to
53e363a
Compare
Tested locally on a linux system. It works fine. Tested with |
…tion methods optional
53e363a
to
ea545a0
Compare
Thanks for the review, I have adjust the text. I also really recommend the suggest feature to request changes more precisely. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
I would rather have a different name than |
What about an flag named Instead expecting something from server, declare that I don't have client credentials? |
…hentication methods optional
I pushed a new state based on my last proposal |
I this fine and ready to review through mailing list? |
Ref #501
I would like to start an discussion about this patch. If the discussion has a positive outcome, I will sent this patch to the via mail.