Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

key direction should be specified in client config #224

Open
merlijn-sebrechts opened this issue Feb 3, 2017 · 2 comments
Open

key direction should be specified in client config #224

merlijn-sebrechts opened this issue Feb 3, 2017 · 2 comments
Labels
bug Something isn't working

Comments

@merlijn-sebrechts
Copy link

merlijn-sebrechts commented Feb 3, 2017

When I specify tls_auth in the client config, the key-direction isn't put in the client config.

openvpn::client { 'myclient':
 server        => 'myserver',
 remote_host   => '192.168.0.1',
 port          => '443',
 proto         => 'tcp',
 tls_auth      => 'true',
}

The resulting client config contains the PSK (tls-auth), but not the key-direction. Connecting a client with that config to the server results in an HMAC error. Putting key-direction 0 in the client config fixes this issue.

The following is a workaround:

openvpn::client { 'myclient':
 server        => 'myserver',
 remote_host   => '192.168.0.1',
 port          => '443',
 proto         => 'tcp',
 tls_auth      => 'true',
 custom_options => {
   "key-direction" => "1",
 },
}
@ghost
Copy link

ghost commented Feb 12, 2017

Support for tls-crypt, which does not require key-direction, could be added too.
tls-crypt is mutually exclusive with tls-auth and enciphers TLS packets with a shared key, making it
impossible to intercept certificate exchange without this shared key.
tls-crypt was added in OpenVPN 2.4.

@luxflux luxflux added bug Something isn't working workaround labels Feb 13, 2017
@caiohasouza
Copy link

+1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

4 participants