Re: using networkmanager nmcli with globalprotect

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, May 1, 2020 at 10:56 AM David Woodhouse <dwmw2@xxxxxxxxxxxxx> wrote:
>
> On Fri, 2020-05-01 at 18:39 +0100, Dave Love wrote:
> > David Woodhouse <dwmw2@xxxxxxxxxxxxx> writes:
> >
> > > The three secrets it's looking for there are the *result* of
> > > authentication. Whatever you have to do with certificates, passwords,
> > > SAML and 2FA aren't relevant; it just wants three things:
> > >
> > >  • The host you ended up authenticating to (after redirects, etc.).
> > >  • Hash of *its* SSL certificate.
> > >  • The 'cookie' that was the result of successful authentication.
> >
> > Thanks, rather late, for this.  Should that have been obvious from the
> > doc somewhere I didn't find?
>
> I don't think so. I try to be quite good at documenting OpenConnect
> itself, but documentation on the NetworkManager-openconnect interaction
> has been somewhat lacking. Users *mostly* shouldn't have to care about
> that.

I do think it would be a lot more helpful and intuitive if nmcli could
let you step through the *normal authentication forms* via the CLI,
just as OpenConnect itself does.

It's rather counterintuitive that the GUI forms NM presents are
completely different from the ones it presents from the CLI.

I'm the pot calling the kettle black here, though, because I have a
backlog of a whole bunch of things I've been wanting to add to the NM
plugin, though:

- Advanced configuration tab with settings for: pass TOS, disable
DTLS/ESP, disable IPv6, force DPD interval
- Option to save not just the passwords, but the actual
cookie/secrets, and retry *those* on reconnect before falling back
cleanly to doing a new authentication.
- Fix the longstanding issue with not being able to run Trojan (e.g.
HIP report, periodic TNCC) as an unprivileged user during connection
- Better connection status information: show what ciphers are being
used, TLS vs. UDP

> > I adapted that, using "--protocol gp -q --usergroup=gateway" in the
> > authN step and extracting the gateway from the named VPN config.  It
> > brings up the VPN, so I'm happy, but somewhat uncleanly.  First, the
> > authentication command produces
> >
> >   GlobalProtect login returned unexpected argument value arg[19]=4
> >   Please report 1 unexpected values above (of which 0 fatal) to <openconnect-devel@xxxxxxxxxxxxxxxxxxx>
>
> I think Dan's seen a few of those, and is on the verge of making not
> print that message for that particular argument.

Yeah. We should remove this one. I still don't understand what it
means (use IPv4 by default?) but it's common as dirt on newer GP
servers, and uninteresting.

Dan

_______________________________________________
openconnect-devel mailing list
openconnect-devel@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/openconnect-devel




[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux