Two OpenVPN problems: 2FA support and Perfect Forward Security disabled

Hello @cfusco,
try to step by step through your questions.

Understand that, it might also be an idea if the know how comes up to update the wiki ?

You can find in here → wiki.ipfire.org - Multi-factor authentication (2FA) clients which do support TOTP for 2FA for every platform (not sure if this list is complete).
The ‘–auth-user-pass-verify’ directive in server.conf requires all clients to authenticate therefor, ‘–auth-user-pass-optional’ was used in server.conf since you can use OTP in IPFire client specific and not global.
We did it longer time ago in the OpenSense way in a longer testing period but therefor you would need a specific user database for authentication like PAM and in that case users from passwd (useradd). IPFire does not provide a user authentication database but uses the certificate common name as ‘username’ and TOTP as password instead.

If you click on the OTP symbol for enabled 2FA clients in “Client Status and -Control” you get the oathtool secret and the QR-Code which delivers the password(s)

in iOS i have heard about an already build in app for TOTP which scans the QR code via camera and adds it to you password manager.

Since Oathtool works under the hood you can use the secret from WUI (which is in base32 format) with a

oathtool --base32 {Secret: From WUI}

or in HEX format which appears in /var/ipfire/ovpn/ovpnconfig

oathtool {HEX code}

where you can generate your password. An example is also located in here

or/and e.g. → oathtool(1) — oathtool — Debian bullseye — Debian Manpages .

Where are the problems for the users ? Most of the authentication logic does openvpn-authenticator where i have read about some processing problems but also about some patches/fixes.

:+1:

Hope this helps a little further ?

Best,

Erik