mirror of
https://github.com/OpenVPN/openvpn.git
synced 2025-05-09 05:31:05 +08:00

OpenVPN 2.6 already warned about this feature being removed. OpenVPN 2.7 will with this change no longer accept these configurations without having a --allow-deprecated-insecure-static-crypto added to the command line or the configuration itself. This will serve as a last and final warning for people who missed the warning message in OpenVPN 2.6. This commit also removes the documentation for --secret and the static key mode. Change-Id: I4f29953b91cf8e8daf2c9503da44073ad96d0ff5 Signed-off-by: Arne Schwabe <arne@rfc2549.org> Acked-by: Frank Lichtenheld <frank@lichtenheld.com> Message-Id: <20231009105832.34762-1-frank@lichtenheld.com> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg27194.html Signed-off-by: Gert Doering <gert@greenie.muc.de>
134 lines
4.2 KiB
Bash
Executable File
134 lines
4.2 KiB
Bash
Executable File
#! /bin/sh
|
|
#
|
|
# t_lpback.sh - script to test OpenVPN's crypto loopback
|
|
# Copyright (C) 2005 Matthias Andree
|
|
# Copyright (C) 2014 Steffan Karger
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
|
# 02110-1301, USA.
|
|
|
|
set -eu
|
|
top_builddir="${top_builddir:-..}"
|
|
openvpn="${openvpn:-${top_builddir}/src/openvpn/openvpn}"
|
|
trap "rm -f key.$$ tc-server-key.$$ tc-client-key.$$ log.$$ ; trap 0 ; exit 77" 1 2 15
|
|
trap "rm -f key.$$ tc-server-key.$$ tc-client-key.$$ log.$$ ; exit 1" 0 3
|
|
|
|
# verbosity, defaults to "1"
|
|
V="${V:-1}"
|
|
tests_passed=0
|
|
tests_failed=0
|
|
|
|
# ----------------------------------------------------------
|
|
# helper functions
|
|
# ----------------------------------------------------------
|
|
|
|
# output progress information
|
|
# depending on verbosity level, collect & print only on failure
|
|
test_start()
|
|
{
|
|
case $V in
|
|
0) outbuf="" ;; # no per-test output at all
|
|
1) outbuf="$@" ;; # compact, details only on failure
|
|
*) printf "$@" ;; # print all
|
|
esac
|
|
}
|
|
test_end()
|
|
{
|
|
RC=$1 ; LOG=$2
|
|
if [ $RC != 0 ]
|
|
then
|
|
case $V in
|
|
0) ;; # no per-test output
|
|
1) echo "$outbuf" "FAIL (RC=$RC)"; cat $LOG ;;
|
|
*) echo "FAIL (RC=$RC)"; cat $LOG ;;
|
|
esac
|
|
e=1
|
|
tests_failed=$(( $tests_failed + 1 ))
|
|
else
|
|
case $V in
|
|
0|1) ;; # no per-test output for 'OK'
|
|
*) echo "OK" # print all
|
|
esac
|
|
tests_passed=$(( $tests_passed + 1 ))
|
|
fi
|
|
}
|
|
|
|
# if running with V=1, give an indication what test runs now
|
|
if [ "$V" = 1 ] ; then
|
|
echo "$0: running with V=$V, only printing test fails"
|
|
fi
|
|
|
|
|
|
# Get list of supported ciphers from openvpn --show-ciphers output
|
|
CIPHERS=$(${openvpn} --show-ciphers | \
|
|
sed -e '/The following/,/^$/d' -e s'/ .*//' -e '/^[[:space:]]*$/d')
|
|
|
|
# SK, 2014-06-04: currently the DES-EDE3-CFB1 implementation of OpenSSL is
|
|
# broken (see http://rt.openssl.org/Ticket/Display.html?id=2867), so exclude
|
|
# that cipher from this test.
|
|
# GD, 2014-07-06 so is DES-CFB1
|
|
# GD, 2014-07-06 do not test RC5-* either (fails on NetBSD w/o libcrypto_rc5)
|
|
CIPHERS=$(echo "$CIPHERS" | egrep -v '^(DES-EDE3-CFB1|DES-CFB1|RC5-)' )
|
|
|
|
e=0
|
|
if [ -z "$CIPHERS" ] ; then
|
|
echo "'openvpn --show-ciphers' FAILED (empty list)"
|
|
e=1
|
|
fi
|
|
|
|
# Also test cipher 'none'
|
|
CIPHERS=${CIPHERS}$(printf "\nnone")
|
|
|
|
"${openvpn}" --genkey secret key.$$
|
|
set +e
|
|
|
|
for cipher in ${CIPHERS}
|
|
do
|
|
test_start "Testing cipher ${cipher}... "
|
|
( "${openvpn}" --test-crypto --secret key.$$ --allow-deprecated-insecure-static-crypto --cipher ${cipher} ) >log.$$ 2>&1
|
|
test_end $? log.$$
|
|
done
|
|
|
|
test_start "Testing tls-crypt-v2 server key generation... "
|
|
"${openvpn}" \
|
|
--genkey tls-crypt-v2-server tc-server-key.$$ >log.$$ 2>&1
|
|
test_end $? log.$$
|
|
|
|
test_start "Testing tls-crypt-v2 key generation (no metadata)... "
|
|
"${openvpn}" --tls-crypt-v2 tc-server-key.$$ \
|
|
--genkey tls-crypt-v2-client tc-client-key.$$ >log.$$ 2>&1
|
|
test_end $? log.$$
|
|
|
|
# Generate max-length base64 metadata ('A' is 0b000000 in base64)
|
|
METADATA=""
|
|
i=0
|
|
while [ $i -lt 732 ]; do
|
|
METADATA="${METADATA}A"
|
|
i=$(expr $i + 1)
|
|
done
|
|
test_start "Testing tls-crypt-v2 key generation (max length metadata)... "
|
|
"${openvpn}" --tls-crypt-v2 tc-server-key.$$ \
|
|
--genkey tls-crypt-v2-client tc-client-key.$$ "${METADATA}" \
|
|
>log.$$ 2>&1
|
|
test_end $? log.$$
|
|
|
|
if [ "$V" -ge 1 ] ; then
|
|
echo "$0: tests passed: $tests_passed failed: $tests_failed"
|
|
fi
|
|
|
|
rm key.$$ tc-server-key.$$ tc-client-key.$$ log.$$
|
|
trap 0
|
|
exit $e
|