-
-
Notifications
You must be signed in to change notification settings - Fork 20
X509 checks which can be performed during TLS verification phase
Easy-TLS can perform X509 certificate checks during the TLS verification phase by using one of these options:
-
--v1|--via-crl
- This performsopenssl
certificate validity checks using theopenssl
binary. -
--v2|--via-ca
- This is disabled due to a bug inopenssl
-
--v3|--via-index
- This does not useopenssl
to perform any checks. Instead it searches your current CRL for certificate status usinggrep
(This is my preferred method)
-
EasyTLS saves the Identity to a text file which
easytls-cryptv2-verify.sh
reads, instead of loadingopenssl
to extract the CA fingerprint andsed
to format it. -
Use:
easytls save-id
andeasytls-cryptv2-verify.sh
option--cache-id
. See respectivehelp
for usage details.My test showed an almost 1 second improvement running the unit test a lot.
-
Load the Identity as a command line parameter when OpenVPN calls
easytls-cryptv2-verify.sh
. This eliminates the need to repeatedlycat
the Identity file. -
Use:
easytls-cryptv2-verify.sh
option--preload-cache-id=<ID>
. Seehelp
for usage details.
-
Identity is the CA certificate fingerprint formatted to one contiguous string.
EG:
OpenSSL fingerprint output:
SHA1 Fingerprint=95:DC:<..snipped..>:03:DA
EasyTLS Identity format:
95DC<..snipped..>03DA