Closed bruceleerabbit closed 2 years ago
ncp-disable
was a debug option to diagnose ncp problems. The options has been removed now.
ncp-disable
has nothing to do with all the other option that you are writing about. You have a massive misunderstanding what the option actually did.
It seems like you trying to use a p2p openvpn config without any crypto. My app does not really allow you to configure that.
It seems like you trying to use a p2p openvpn config without any crypto. My app does not really allow you to configure that.
Indeed I also added these options:
auth none
cipher none
and same problem. Is there an expectation that the openvpn app be 100% compatible the desktop app? I think users naturally expect this, so “Limitations and known interoperability bugs” should ideally be documented somewhere.
This kind of config is extremely rare that I never came around adding proper support/fixes for it. It isi just a so rare corner case that it is extremely low on the priority list and will probably also removed in the future from OpenVPN.
This kind of config is extremely rare that I never came around adding proper support/fixes for it. It isi just a so rare corner case that it is extremely low on the priority list and will probably also removed in the future from OpenVPN.
Three use-cases come to mind:
Use-case 3 is important enough for development and troubleshooting (both by users and devs) that in-the-clear sessions will unlikely ever be depricated. The reason I attempted to disable crypto was a consequence of a real-world scenario: blowfish was being rejected sometimes, and sometimes not, without pattern, & it wasn’t even needed for the task at hand anyway (use case 1). Even if it were needed, it's still useful to divide & conquer — to fix each problem in isolation one at a time with the simplest configuration.
Use-case 1 should be a lot more popular than it is. I think it’s a matter of time before the general public becomes aware of all the privacy abuses inherent in the huge attack surface that wi-fi brings, in light of iOS and non-hardened AOS devices feeding all to Google Inc.
There’s also an ecological CO₂ component to use-case 1, whereby wifi radios generate waste heat next to batteries, which consume more energy to power the radio & while the heat also lessens the charging efficiency. All that radio energy waste, ineffecient charging as well as the energy waste of needless encryption-decryption can be spared with use-case 1 w/out crypto. I also suspect batteries have a longer lifetime in that scenario too, which also has an ecological benefit.
@bruceleerabbit We plan to remove the whole non-TLS mode in OpenVPN eventually since it is not used very much but requires a lot of maintanance. The reality is just that it is not really used and not the focus of OpenVPN.
General information
Description of the issue
Imported a configuration file that included the
ncp-disable
option. The GUI defaults “TLS Security Profile” tolegacy (default)
. Since no crypto is needed (hence thencp-disable
option), I overrode TLS sec. prof. withinsecure
. The GUI should have noticed thencp-disable
& should have defaulted to insecure in that case.The GUI also defaults to ticking a box “Import PKCS12 from configuration into Android Keystore”. Again because
ncp-disable
is specified, that box should be unticked automatically. I manually unticked it.The GUI demands a key even when the user explicitly directs the app to not use encryption.
After importing, an error is displayed below the new profile: “You must select a User certificate, legacy Pro”. Not sure what the trailing “legacy Pro” is about, but this error is unexpected for an in-the-clear config. In the
basic
tab, I had to untick “Load OpenSSL legacy provider” because that’s irrelevant to an unencrypted configuration. There is also aType
pulldown which defaults toAndroid Certificate
. That must change because it leads to the instant error msg on the profile. But none of the other options are appropriate for an unencrypted configuration. I choseexternal auth provider
figuring it would be the least demanding of irrelevent info.bug #1419 may be related.
Log (if applicable)
Configuration file