public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: ummeegge <ummeegge@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH 2/2] ovpn: Add ta.key check to main settings
Date: Thu, 19 Sep 2019 16:37:59 +0200	[thread overview]
Message-ID: <1ed44a65100069c82b92e48e882c9a248e0c4114.camel@ipfire.org> (raw)
In-Reply-To: <20190918050334.10792-2-ummeegge@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 2211 bytes --]

Sorry for sending in this patches so late but i thought it makes sense
to solve some open bugs in this topic.

Should i send it in again after Core 136 release ?

Best,

Erik

On Mi, 2019-09-18 at 07:03 +0200, Erik Kapfer wrote:
> Since Core 132 the 'TLS Channel Protection' is part of the global
> settings,
> the ta.key generation check should also be in the main section
> otherwise it
> won´t be created if not present.
> 
> Signed-off-by: Erik Kapfer <ummeegge(a)ipfire.org>
> ---
>  html/cgi-bin/ovpnmain.cgi | 22 +++++++++++-----------
>  1 file changed, 11 insertions(+), 11 deletions(-)
> 
> diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi
> index 5de80b269..5b8ca9731 100644
> --- a/html/cgi-bin/ovpnmain.cgi
> +++ b/html/cgi-bin/ovpnmain.cgi
> @@ -898,17 +898,6 @@ if ($cgiparams{'ACTION'} eq $Lang::tr{'save-adv-
> options'}) {
>          $errormessage = $Lang::tr{'invalid input for keepalive
> 1:2'};
>          goto ADV_ERROR;	
>      }
> -    # Create ta.key for tls-auth if not presant
> -    if ($cgiparams{'TLSAUTH'} eq 'on') {
> -	if ( ! -e "${General::swroot}/ovpn/certs/ta.key") {
> -		system('/usr/sbin/openvpn', '--genkey', '--secret',
> "${General::swroot}/ovpn/certs/ta.key");
> -		if ($?) {
> -		$errormessage = "$Lang::tr{'openssl produced an
> error'}: $?";
> -        goto ADV_ERROR;
> -		}
> -	}
> -    }
> -    
>      &General::writehash("${General::swroot}/ovpn/settings",
> \%vpnsettings);
>      &writeserverconf();#hier ok
>  }
> @@ -1189,6 +1178,17 @@ if ($cgiparams{'ACTION'} eq $Lang::tr{'save'}
> && $cgiparams{'TYPE'} eq '' && $cg
>  	goto SETTINGS_ERROR;
>      }
>  
> +	# Create ta.key for tls-auth if not presant
> +	if ($cgiparams{'TLSAUTH'} eq 'on') {
> +		if ( ! -e "${General::swroot}/ovpn/certs/ta.key") {
> +			system('/usr/sbin/openvpn', '--genkey', '
> --secret', "${General::swroot}/ovpn/certs/ta.key");
> +			if ($?) {
> +				$errormessage = "$Lang::tr{'openssl
> produced an error'}: $?";
> +				goto SETTINGS_ERROR;
> +			}
> +		}
> +	}
> +
>      $vpnsettings{'ENABLED_BLUE'} = $cgiparams{'ENABLED_BLUE'};
>      $vpnsettings{'ENABLED_ORANGE'} =$cgiparams{'ENABLED_ORANGE'};
>      $vpnsettings{'ENABLED'} = $cgiparams{'ENABLED'};


      reply	other threads:[~2019-09-19 14:37 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-09-18  5:03 [PATCH 1/2] ovpn: Generate ta.key before dh-parameter Erik Kapfer
2019-09-18  5:03 ` [PATCH 2/2] ovpn: Add ta.key check to main settings Erik Kapfer
2019-09-19 14:37   ` ummeegge [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1ed44a65100069c82b92e48e882c9a248e0c4114.camel@ipfire.org \
    --to=ummeegge@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox