Re: [nfsv4] openssl s_client patch for RPC starttls

Benjamin Coddington <bcodding@redhat.com> Fri, 15 October 2021 13:36 UTC

Return-Path: <bcodding@redhat.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 833F23A0816 for <nfsv4@ietfa.amsl.com>; Fri, 15 Oct 2021 06:36:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gbCR2tNNVi8c for <nfsv4@ietfa.amsl.com>; Fri, 15 Oct 2021 06:36:03 -0700 (PDT)
Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 09B6D3A080B for <nfsv4@ietf.org>; Fri, 15 Oct 2021 06:36:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1634304961; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=tNs8NgSlW27le6UhH5kRSE+NJsTXgCgDKTL3AoqxM7g=; b=UBQ0i11sNYBSngdlgb2ChZ7ZUZj9Lx5a9aC2vaOa0p2XvspJnSxZDOGUKen9lbsFkd1UgD Q+U4EGfgjKtzPLzV/fGD1xpvJg9vd3DKK7y5H3AXBLtdnsEJi/OUu/WH0oiUrdhL8a0jZ4 zTxrtcX6l2y4ODw/owpdfi6TPIqx/+k=
Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-46-v5-YS_b_OwuMF2rzy-nIGw-1; Fri, 15 Oct 2021 09:35:57 -0400
X-MC-Unique: v5-YS_b_OwuMF2rzy-nIGw-1
Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 5FC13801ADA; Fri, 15 Oct 2021 13:35:56 +0000 (UTC)
Received: from [172.16.176.1] (ovpn-64-2.rdu2.redhat.com [10.10.64.2]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0ED4FB8547; Fri, 15 Oct 2021 13:35:55 +0000 (UTC)
From: Benjamin Coddington <bcodding@redhat.com>
To: Rick Macklem <rmacklem@uoguelph.ca>
Cc: NFSv4 <nfsv4@ietf.org>
Date: Fri, 15 Oct 2021 09:35:54 -0400
Message-ID: <B0DD57D1-66A1-47F5-9B84-F1748F1A650C@redhat.com>
In-Reply-To: <YQXPR0101MB0968D20819190D7790540B7CDDB99@YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM>
References: <FC2C59AC-2B78-4F4D-A44D-BB8CBED56990@redhat.com> <D2A4A5C5-BC45-422A-963E-99C89A7DC49A@redhat.com> <YQXPR0101MB0968D20819190D7790540B7CDDB99@YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16
Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=bcodding@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/x0gd2n_9nf4WMXx5tytj2U1seCA>
Subject: Re: [nfsv4] openssl s_client patch for RPC starttls
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Oct 2021 13:36:09 -0000

On 14 Oct 2021, at 20:05, Rick Macklem wrote:

> Benjamin Coddington wrote:
>> On 13 Oct 2021, at 16:15, Benjamin Coddington wrote:
> [stuff snipped]
>>
>> Rick pointed out that I had the request wired up incorrectly.  This
>> version
>> of the patch has the correction in it:
>>
>> https://github.com/bcodding/openssl/commit/9bf2c4d66eac
>>
>> Thanks Rick!
> You are welcome. And thanks Ben for supporting the Bat VPN. It
> comes in handy. (Just email if/when you want to do more testing.)
> Btw, it might be nice to add a few things to the Bat VPN doc.
> - Needs GNU make (gmake) and bash.
> - Registration can be done from any system using local.hostname.
> - Although the VPN is IP6 only, you can use IP4 to access the VPN
>   concentratot, so you only need an IP4 Internet connection.

I've added your suggestions to the documentation.  Thanks again for the
quick test.

Ben