From patchwork Thu Jan 18 07:58:36 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Selva Nair X-Patchwork-Id: 198 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director5.mail.ord1d.rsapps.net ([172.30.191.6]) by backend31.mail.ord1d.rsapps.net (Dovecot) with LMTP id O2DjH/bvYFrnXgAAgoeIoA for ; Thu, 18 Jan 2018 14:05:26 -0500 Received: from proxy1.mail.ord1d.rsapps.net ([172.30.191.6]) by director5.mail.ord1d.rsapps.net (Dovecot) with LMTP id g9m4H/bvYFpsewAAsdCWiw ; Thu, 18 Jan 2018 14:05:26 -0500 Received: from smtp5.gate.ord1c ([172.30.191.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy1.mail.ord1d.rsapps.net (Dovecot) with LMTP id e7bqBPbvYFqkXAAAasrz9Q ; Thu, 18 Jan 2018 14:05:26 -0500 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.34.181.88] Authentication-Results: smtp5.gate.ord1c.rsapps.net; iprev=pass policy.iprev="216.34.181.88"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dkim=fail (signature verification failed) header.d=gmail.com; dmarc=fail (p=none; dis=none) header.from=gmail.com X-Classification-ID: 8a6b6d66-fc82-11e7-9ab2-a4badb0b200d-1-1 Received: from [216.34.181.88] ([216.34.181.88:13644] helo=lists.sourceforge.net) by smtp5.gate.ord1c.rsapps.net (envelope-from ) (ecelerity 4.2.1.56364 r(Core:4.2.1.14)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id A4/00-19419-5FFE06A5; Thu, 18 Jan 2018 14:05:25 -0500 Received: from localhost ([127.0.0.1] helo=sfs-ml-1.v29.ch3.sourceforge.com) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.89) (envelope-from ) id 1ecFOo-0004iU-H9; Thu, 18 Jan 2018 18:58:54 +0000 Received: from sfi-mx-4.v28.ch3.sourceforge.com ([172.29.28.194] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from ) id 1ecFOn-0004iN-B8 for openvpn-devel@lists.sourceforge.net; Thu, 18 Jan 2018 18:58:53 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=References:In-Reply-To:Message-Id:Date:Subject:Cc: To:From:Sender:Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=WVRpC4zw5hchXDdJcL7X9JtzHcXYcDdaF9x1ERby0Io=; b=PQbvQQSe4S3P2izgEBtXyU3u2T VfLo+Iu6PauynXjk/sWB4vc0pv66uO0WIbbdtomOQRX/sIR9i76/wRZ+0JPuMOtq6Qd5h9Wdwp4he CJPwffkceyJImZtm6oRAuaEV+eAklzmeDuj2hecrJVYIOvCcVKHblE0WZtO3W0QT7kyY=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To :MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=WVRpC4zw5hchXDdJcL7X9JtzHcXYcDdaF9x1ERby0Io=; b=UJA2JCUZzNmhHwGou9h64kNgPN 8hEVOUBef1tl5+VBcwn6W/nnOBPB5UAEtTYYarrottzwDCR5khn3+v7/M+0xYd3PunlcMxZaNRAXs tomA9OZBlCfACk2qc1TqMqfdXKpmaIkoBcGyb6ZTlkcEZ59O+j7jyhMHLGlkNg8r9TSk=; Received: from mail-io0-f195.google.com ([209.85.223.195]) by sfi-mx-4.v28.ch3.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.89) id 1ecFOm-0000Fi-GL for openvpn-devel@lists.sourceforge.net; Thu, 18 Jan 2018 18:58:53 +0000 Received: by mail-io0-f195.google.com with SMTP id c17so25972349iod.1 for ; Thu, 18 Jan 2018 10:58:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=WVRpC4zw5hchXDdJcL7X9JtzHcXYcDdaF9x1ERby0Io=; b=BXzzfhiRoBv7XjGiE++uCPiAbMCIUwIlXfkeY0+8oryxSYHNZAwibN0q8JrY/JWKhu +FNpiVDPcxn6YAtB5J+nCe9inti736KjIvi4ssIurrS9/Dk7D9lyWpzwNqtDduvWKEHd L1zYv/3aOwdWpnTkpLT0SJgN1zjUKEcxV3Q0uncxAr1puXP/Dzl66yFmhzyljI+jVC2e Oo9boekK3inz+4jRCzXBOelc5kR2cWM/Bhg2kTqfZk4BqaHlocibcVOal1iQzpjNlqHg ufrMD9mQcjHB58knGS6yV0f/0490pk3cLZqguKuSGeADWDAV8O/mW7cIXB9Qg6Ps6BsG rExw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=WVRpC4zw5hchXDdJcL7X9JtzHcXYcDdaF9x1ERby0Io=; b=mgiN6utX70uY+a3KX5Dlka1Y1iPO45YVlaPtpL5DuLKA+wbrwRcEj82wchGBvAzBYr kgGZ1QK11oMd1CWHyyzVPkU7yaCjsy6Vi/pc4031TnutZT5EuFBFVtIq4pbuMf7erCYZ 53sgYtESmLhRKmnzxayrVUJhu2/G5sI7+z3KDnMjuVmeuxSfwLb8WlCVn+ovwP+cy20O /MjaD19AZ18cdaDdQgNwrWeNkYedLQUyNNgMYTV5eRIfc4291MLBvVA2Km0/pOHb9DTB mOSUJCae9KnRS/Sd8g75gAiLypeRY2TVUn7W3KYX6NyfwN6zD/bvo4G439nqMpxJ6vCX nT0A== X-Gm-Message-State: AKwxyteJmJPoyrvqeb8gC4zlfJa8ujnJg4rG1qmx9K2JxsXHtazQSE1s 9IovzcEbeLEaU12CnWfHcY0HYGgC X-Google-Smtp-Source: AH8x224qCX/xQG+j0c7rBtgA195vir9AMiEhKKTLr/ONO8ACeTHzlOQsVXicgk66GNxJKujehNfkQA== X-Received: by 10.107.81.20 with SMTP id f20mr657337iob.174.1516301926966; Thu, 18 Jan 2018 10:58:46 -0800 (PST) Received: from saturn.home.sansel.ca (CPE40167ea0e1c2-CM788df74daaa0.cpe.net.cable.rogers.com. [99.228.215.92]) by smtp.gmail.com with ESMTPSA id c140sm1099719itc.1.2018.01.18.10.58.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 18 Jan 2018 10:58:46 -0800 (PST) From: selva.nair@gmail.com To: openvpn-devel@lists.sourceforge.net Date: Thu, 18 Jan 2018 13:58:36 -0500 Message-Id: <1516301916-11408-1-git-send-email-selva.nair@gmail.com> X-Mailer: git-send-email 2.1.4 In-Reply-To: <932660f8-ce6b-ab8f-f561-638f4443e2b0@rfc2549.org> References: <932660f8-ce6b-ab8f-f561-638f4443e2b0@rfc2549.org> X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (selva.nair[at]gmail.com) -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/, no trust [209.85.223.195 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1ecFOm-0000Fi-GL Subject: [Openvpn-devel] [PATCH v2 3/3] Document management request >PK_SIGN and response pk-sig X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox From: Selva Nair v2: Commands renamed to >PK_SIGN and pk-sig Signed-off-by: Selva Nair --- Well, the previous version has been acked, but obviously that patch is obsolete now. doc/management-notes.txt | 37 +++++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) diff --git a/doc/management-notes.txt b/doc/management-notes.txt index a9ba18a..064e335 100644 --- a/doc/management-notes.txt +++ b/doc/management-notes.txt @@ -795,6 +795,43 @@ Base64 encoded output of RSA_private_encrypt() (OpenSSL) or mbedtls_pk_sign() This capability is intended to allow the use of arbitrary cryptographic service providers with OpenVPN via the management interface. +COMMAND -- pk-sig (OpenVPN 2.5 or higher) +------------------------------------------ +Provides support for external storage of the private key. Requires the +--management-external-key option. This option can be used instead of "key" +in client mode, and allows the client to run without the need to load the +actual private key. When the SSL protocol needs to perform a sign +operation, the data to be signed will be sent to the management interface +via a notification as follows: + +>PK_SIGN:[BASE64_DATA] + +The management interface client should then create an appropriate signature of +the (decoded) BASE64_DATA using the private key and return the SSL signature as +follows: + +pk-sig +[BASE64_SIG_LINE] +. +. +. +END + +RSA signatures (for RSA keys) and and ECDSA signatures (for EC keys) are +supported. For EC keys openssl 1.1 or higher is required. + +Base64 encoded output of RSA_private_encrypt for RSA or ECDSA_sign() for EC +using OpenSSL or mbedtls_pk_sign() using mbed TLS will provide a correct +signature. + +This capability is intended to allow the use of arbitrary cryptographic service +providers with OpenVPN via the management interface. + +Currently RSA signature is challenged for by '>RSA_SIGN', but eventually +'>PK_SIGN' prompt will be used for all signature types. New management clients +should be prepared to respond to '>PK_SIGN' with 'pk-sig' followed by the +appropriate signature. + COMMAND -- certificate (OpenVPN 2.4 or higher) ---------------------------------------------- Provides support for external storage of the certificate. Requires the