[Openvpn-devel,0/2] Two small fixes for auth via tokens

Message ID 20260315184337.1541272-1-luca.boccassi@gmail.com
Headers show
Series Two small fixes for auth via tokens | expand

Message

luca.boccassi@gmail.com March 15, 2026, 6:39 p.m. UTC
From: Luca Boccassi <luca.boccassi@gmail.com>

When JWT (json web tokens) are used by a server to authenticate
the client, the default TLS channel buffer size and password length
are too small.
In my local case connecting to an Azure VPN server, the Entra ID
token is ~2100 bytes.

With these two small changes, it is possible to successfully
connect to an Azure VPN endpoint using the OpenVPN 2.7 client,
using a dummy username, an Entra token as password and the
server-secret from the azvpn XML config that users get as tls-auth
key.

Luca Boccassi (2):
  Increase TLS_CHANNEL_BUF_SIZE from 2048 to 8192
  Unconditionally set USER_PASS_LEN to 4096

 src/openvpn/common.h | 2 +-
 src/openvpn/misc.h   | 4 ----
 2 files changed, 1 insertion(+), 5 deletions(-)