Quick question for folks on this list.

During our security review of OpenConnect server, a couple of the question were 
raised:
1) Can we drop privileges from the ocserv-main process after forking the 
ocserv-sm? 
        a. Looking through the code, I don't see any obvious reason why not, 
but I might be missing something.

2) Assuming the use of Docker, would it make sense to split ocserv-sm into its 
own process chain so that it can run in separate docker container (i.e. not 
have it fork from ocserv-main)?
        a. Goal is to avoid having to grant NET_ADMIN cap to a service that is 
internet facing (i.e. ocserv-main and ocserv-worker would not have NET_ADMIN 
cap).

3) Has there been any work done to fuzz the IPC, especially from ocserv-worker 
-> ocserv-sm? 
        a. My team has a task to do this, but if we already have data on this 
that would be a great place to start.

4) What is the recommended best practice for protecting the X509 cert private 
key? 
        a. TPM + password? Encrypted disk partition?




_______________________________________________
openconnect-devel mailing list
[email protected]
http://lists.infradead.org/mailman/listinfo/openconnect-devel

Reply via email to