-
-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Client-connect: High level security could allow TLS-Auth/Crypt keys by configuration #229
Labels
undecided
This issue may be nothing
Comments
Review this:
Possibly, have a new flag to allow TLS-Auth/Crypt at level |
TinCanTech
referenced
this issue
Dec 2, 2021
| [0] Lowest - Allow all valid TLS-AUTH/Crypt/V2 keys to connect. | ALL TLS-Crypt-V2 key extended tests are NOT peformed. *New* | [1] Low - Functionally equivalent to [0] Low - Allow all.. | Except, ALL TLS-Crypt-V2 key extended tests are peformed. | Same as default [2], except hwaddr-mismatches are IGNORED. *Bumped* from [1] | [2] Default - Do not require clients to push a hwaddr. | TLS-Crypt-V2 keys with a hwaddr mismatch will be disconnected. | TLS-Crypt-V2 keys without a hwaddr can connect. | TLS Auth and Crypt-v1 keys can connect. Bumps all higher levels up by one. Signed-off-by: Richard T Bonhomme <[email protected]>
TinCanTech
changed the title
Client-connect: High level security should allow TLS-Auth/Crypt keys by configuration
Client-connect: High level security could allow TLS-Auth/Crypt keys by configuration
Jan 25, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Example:
#key_hwaddr_required=1
could still allow TLS-Auth/Crypt only key access ..A slightly finer balance with
#crypt_v2_required=1
The text was updated successfully, but these errors were encountered: