I think the cert issue was brought up before (8/17) and they were going to wait since a cert change would require everyone to download and import the .ovpn file. My guess is they will probably wait until the beta is over or implement it with other changes.
forest wrote:In addition to the problem described in my previous post, I found some problems in the .ovpn files that get generated for each user:
Potential Server Impersonation:
The openvpn client will happily connect to any server whose TLS certificate is signed by the CA in the user's .ovpn file. This apparently means that the client certificate in any other Sonic user's .ovpn file can be used to impersonate the server. In other words, it's a MITM attack just waiting to happen. The openvpn man page warns of this, and suggests using the "ns-cert-type server" option to guard against it. That option should probably be included when generating .ovpn files for users.
Misleading Comment Clutter:
This is not a direct security risk like the problem above, but it does add needless complexity and misinformation: The vast majority of the generated .ovpn file is comment clutter. It starts with nearly a hundred lines of X.509 certificate chain data, and ends with another hundred and thirty (or so) similar lines, all of which are commented out and therefore not used at all by openvpn. To make matters worse, those certificates do not match the ones presented by the VPN client or server. They look more like web server certificates, but their CA chains don't even match those on the VPN host's web server. I don't know why they are being inserted into the .ovpn file as comments, but they make it harder for users to understand and validate their own site security, so they probably ought to be removed.