In 2019 Robur started working on a OpenVPN™-compatible implementation in OCaml.
The project was funded for 6 months in 2019 by prototypefund.
In late 2022 we applied again for funding this time to the NGI Assure open call, and our application was eventually accepted.
In this blog post I will explain why reimplementing the OpenVPN™ protocol in OCaml is a worthwhile effort, and describe the Miragevpn implementation and in particular the tls-crypt-v2 mechanism.
@@ -47,22 +45,21 @@ You may ask yourself: why not just use the existing tried and tested implementat
It heavily uses the OpenSSL library[^mbedtls] which is as well written in C and has in the past had some notable security vulnerabilities.
Many vulnerabilities and bugs in C can be easily avoided in other languages due to bounds checking and stricter and more expressive type systems.
The state machine of the protocol can be more easily be expressed in OCaml, and some properties of the protocol can be encoded in the type system.
-
[^mbedtls]: It is possible to compile OpenVPN™ community edition with Mbed TLS instead of OpenSSL which is written in C as well.
Another reason is Mirage OS, a library operating system implemented in OCaml.
We work on the Mirage project and write applications (unikernels) using Mirage.
In many cases it would be desirable to be able to connect to an existing VPN network[^vpn-network],
or be able to offer a VPN network to clients using OpenVPN™.
-
-
One very interesting example is a unikernel for Qubes OS that we have planned.
+
Consider a VPN provider:
+The VPN provider runs many machines that run an operating system in order to run the user-space OpenVPN™ service.
+There are no real users on the system, and a lot of unrelated processes and legacy layers are around that are not needed.
+With a Mirage OS unikernel, which is basically a statically linked binary and operating system such a setup becomes simpler with fewer layers.
+With reproducible builds deployment and updates will be straightforward.
+
Another very interesting example is a unikernel for Qubes OS that we have planned.
Qubes OS is an operating system with a high focus on security.
It offers an almost seamless experience of running applications in different virtual machines on the same machine.
The networking provided to a application (virtual machine) can be restricted to only go through the VPN.
It is possible to use OpenVPN™ for such a setup, but that requires running OpenVPN™ in a full Linux virtual machine.
With Mirage OS the resource footprint is typically much smaller than an equivalent application running in a Linux virtual machine; often the memory footprint is smaller by an order.
-
[^vpn-network]: I use the term "VPN network" to mean the virtual private network itself. It is a bit odd because the 'N' in 'VPN' is 'Network', but without disambiguation 'VPN' could refer to the network itself, the software or the service.
Finally, while it's not an explicit goal of ours, reimplementing a protocol without an explicit specification can help uncover bugs and things that need better documentation in the original implementation.
TLS mode
There are different variants of TLS mode, but what they share is separate "control" channel and "data" channel.
@@ -101,9 +98,16 @@ The server responds in a similar manner with a sequence number of 0x0f0000
At the moment only one tag and one value is defined which signifies the server supports HMAC cookies - this seems unnecessarily complex, but is done to allow future extensibility.
Finally, if the server supports HMAC cookies, the client sends a packet where the wrapped key is appended in cleartext.
The server is now able to decrypt the third packet without having to keep the key from the first packet around and can verify the session id.
-
+
Cool! Let's deploy it!
+
Great!
+We build on a daily basis unikernels in our reproducible builds setup.
+At the time of writing we have published a Miragevpn router unikernel acting as a client.
+For general instructions on running Mirage unikernels see our reproducible builds blog post.
+The unikernel will need a block device containing the OpenVPN™ configuration and a network device.
+More detailed instructions Will Follow Soon™!
+Don't hesitate to reach out to us on GitHub, by mail or me personally on Mastodon if you're stuck.
+
[^mbedtls]: It is possible to compile OpenVPN™ community edition with Mbed TLS instead of OpenSSL which is written in C as well.
+
[^vpn-network]: I use the term "VPN network" to mean the virtual private network itself. It is a bit odd because the 'N' in 'VPN' is 'Network', but without disambiguation 'VPN' could refer to the network itself, the software or the service.
diff --git a/feed.xml b/feed.xml
index b022901..038784f 100644
--- a/feed.xml
+++ b/feed.xml
@@ -1 +1 @@
-Robur's bloghttps://blog.robur.coopThe Robur cooperative blogyocamlteam@robur.coopMirageVPN & tls-crypt-v2https://blog.robur.coop/articles/miragevpn.htmlMon, 13 Nov 2023 10:00:00 GMTHow we implementated tls-crypt-v2 for miragevpnhttps://blog.robur.coop/articles/miragevpn.html
\ No newline at end of file
+Robur's bloghttps://blog.robur.coopThe Robur cooperative blogyocamlteam@robur.coopMirageVPN & tls-crypt-v2https://blog.robur.coop/articles/miragevpn.htmlTue, 14 Nov 2023 10:00:00 GMTHow we implementated tls-crypt-v2 for miragevpnhttps://blog.robur.coop/articles/miragevpn.html
\ No newline at end of file
diff --git a/index.html b/index.html
index 09c7b68..c5b6b97 100644
--- a/index.html
+++ b/index.html
@@ -21,7 +21,9 @@
The Robur cooperative blog.
- RSS