Project

General

Profile

Actions

Bug #10539

closed

OpenVPN incorrect validation of common name with external case-insensitive directory

Added by DRago_Angel [InV@DER] almost 4 years ago. Updated almost 4 years ago.

Status:
Not a Bug
Priority:
Low
Assignee:
-
Category:
OpenVPN
Target version:
-
Start date:
05/08/2020
Due date:
% Done:

0%

Estimated time:
Plus Target Version:
Release Notes:
Affected Version:
2.4.x
Affected Architecture:
All

Description

Now Common Name is case-sensetive validation field.
With Local Authorization it works fine as Unix local users are case-sensitive as well.

But for LDAP (and maybe some RADIUS servers):
  • common names are case-insensitive
  • user can provide full username@domain or only username
    It produce situation when user can bypass server restrictions or user client specific overrides.
    This can be security issue in situation when system administrator:
  • see that Duplicate Connection is disabled and think that his users can't connect twice which gives false positive security
  • configure static IP for user inside VPN with restriction rules on firewall tab for this specific IP. User provide another username and get random IP from Pool without restrictions which system admistrator was set.
    User can use endless variants of username, as: user, USER, User, uSer, uSEr, , and so on.
    It impossible to restrict now all variant of user input.

Possible fix this issue:
1. Strip domain part from common names checks at Server Duplicate Connection
2. Strip domain part from common names checks on Client Specific Overrides in case User common name override not has explicitly set @domain part
3. Add option (and maybe enable it by default for existing overrides) to check common-names in case-insensitive manner
4. As additional future add option to allow user Common-Names validation by Regex on Client Specific Overrides
Note: 1 and 2 can be optional check-boxes or be mandatory, need to think about usecases.

Actions

Also available in: Atom PDF