Project

General

Profile

Actions

Feature #9005

closed

Allow to define allowed x509 client certs by having CN in openvpn server (tls-verify)

Added by Stefan Bauer over 6 years ago. Updated over 6 years ago.

Status:
Rejected
Priority:
Normal
Assignee:
-
Category:
OpenVPN
Target version:
-
Start date:
10/04/2018
Due date:
% Done:

0%

Estimated time:
2.00 h
Plus Target Version:
Release Notes:

Description

We're having enterprise internal CA and imported CA into pfsense. Having a single CA allows all certs that are not revoked from this CA to be used as login mechanism on openvpn server.

Revoking a cert to block it from be used in openvpn is no solution as this renders the cert itself unusable for other things when CRL is published (802.1x and, https auth...)

Please create an extra field in openvpn server config to allow specifying allowed cert common names (CN).

this can be done manually with openvpn but i do not want to fiddle with with files on console in following form:

openvpn server.conf:

+tls_verify "./verify-cn allowed-certs.txt"

verify-cn is a script shipped with openvpn.

allowed-certs.txt contains just the common names from x509 CA.

Actions

Also available in: Atom PDF