From: ummeegge <ummeegge@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH 2/2] ovpn: Add ta.key check to main settings
Date: Thu, 19 Sep 2019 16:37:59 +0200 [thread overview]
Message-ID: <1ed44a65100069c82b92e48e882c9a248e0c4114.camel@ipfire.org> (raw)
In-Reply-To: <20190918050334.10792-2-ummeegge@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 2211 bytes --]
Sorry for sending in this patches so late but i thought it makes sense
to solve some open bugs in this topic.
Should i send it in again after Core 136 release ?
Best,
Erik
On Mi, 2019-09-18 at 07:03 +0200, Erik Kapfer wrote:
> Since Core 132 the 'TLS Channel Protection' is part of the global
> settings,
> the ta.key generation check should also be in the main section
> otherwise it
> won´t be created if not present.
>
> Signed-off-by: Erik Kapfer <ummeegge(a)ipfire.org>
> ---
> html/cgi-bin/ovpnmain.cgi | 22 +++++++++++-----------
> 1 file changed, 11 insertions(+), 11 deletions(-)
>
> diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi
> index 5de80b269..5b8ca9731 100644
> --- a/html/cgi-bin/ovpnmain.cgi
> +++ b/html/cgi-bin/ovpnmain.cgi
> @@ -898,17 +898,6 @@ if ($cgiparams{'ACTION'} eq $Lang::tr{'save-adv-
> options'}) {
> $errormessage = $Lang::tr{'invalid input for keepalive
> 1:2'};
> goto ADV_ERROR;
> }
> - # Create ta.key for tls-auth if not presant
> - if ($cgiparams{'TLSAUTH'} eq 'on') {
> - if ( ! -e "${General::swroot}/ovpn/certs/ta.key") {
> - system('/usr/sbin/openvpn', '--genkey', '--secret',
> "${General::swroot}/ovpn/certs/ta.key");
> - if ($?) {
> - $errormessage = "$Lang::tr{'openssl produced an
> error'}: $?";
> - goto ADV_ERROR;
> - }
> - }
> - }
> -
> &General::writehash("${General::swroot}/ovpn/settings",
> \%vpnsettings);
> &writeserverconf();#hier ok
> }
> @@ -1189,6 +1178,17 @@ if ($cgiparams{'ACTION'} eq $Lang::tr{'save'}
> && $cgiparams{'TYPE'} eq '' && $cg
> goto SETTINGS_ERROR;
> }
>
> + # Create ta.key for tls-auth if not presant
> + if ($cgiparams{'TLSAUTH'} eq 'on') {
> + if ( ! -e "${General::swroot}/ovpn/certs/ta.key") {
> + system('/usr/sbin/openvpn', '--genkey', '
> --secret', "${General::swroot}/ovpn/certs/ta.key");
> + if ($?) {
> + $errormessage = "$Lang::tr{'openssl
> produced an error'}: $?";
> + goto SETTINGS_ERROR;
> + }
> + }
> + }
> +
> $vpnsettings{'ENABLED_BLUE'} = $cgiparams{'ENABLED_BLUE'};
> $vpnsettings{'ENABLED_ORANGE'} =$cgiparams{'ENABLED_ORANGE'};
> $vpnsettings{'ENABLED'} = $cgiparams{'ENABLED'};
prev parent reply other threads:[~2019-09-19 14:37 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-09-18 5:03 [PATCH 1/2] ovpn: Generate ta.key before dh-parameter Erik Kapfer
2019-09-18 5:03 ` [PATCH 2/2] ovpn: Add ta.key check to main settings Erik Kapfer
2019-09-19 14:37 ` ummeegge [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1ed44a65100069c82b92e48e882c9a248e0c4114.camel@ipfire.org \
--to=ummeegge@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox