X509 checks which can be performed during TLS verification phase - TinCanTech/easy-tls GitHub Wiki
Easy-TLS can perform X509 certificate checks during the TLS verification phase by using one of these options:
--v1|--via-crl- This performsopensslcertificate validity checks using theopensslbinary.--v2|--via-ca- This is disabled due to a bug inopenssl--v3|--via-index- This does not useopensslto perform any checks. Instead it searches your current CRL for certificate status usinggrep(This is my preferred method)
Using "Cache ID"
-
EasyTLS saves the Identity to a text file which
easytls-cryptv2-verify.shreads, instead of loadingopensslto extract the CA fingerprint andsedto format it. -
Use:
easytls save-idandeasytls-cryptv2-verify.shoption--cache-id. See respectivehelpfor usage details.My test showed an almost 1 second improvement running the unit test a lot.
Using "Preload Cache ID"
-
Load the Identity as a command line parameter when OpenVPN calls
easytls-cryptv2-verify.sh. This eliminates the need to repeatedlycatthe Identity file. -
Use:
easytls-cryptv2-verify.shoption--preload-cache-id=<ID>. Seehelpfor usage details.
What is Identity ?
-
Identity is the CA certificate fingerprint formatted to one contiguous string.
EG:
OpenSSL fingerprint output:
SHA1 Fingerprint=95:DC:<..snipped..>:03:DAEasyTLS Identity format:
95DC<..snipped..>03DA