vpn-documentation/ROADMAP.md -rw-r--r-- 3.4 KiB
9d424f25François Kooman golang from backports on Debian 10 3 days ago

#What to expect in eduVPN / Let's Connect! 3.x?

We expect to release eduVPN / Let's Connect! 3.x in Q4 of 2021. This will also depend on the eduVPN / Let's Connect! client application that will need to implement the new API.

If you'd like to have something added, removed, changed: please contact us on eduvpn-support@lists.geant.org and make your case!

For our current progress see our issue tracker.

#High Level Changes

  • WireGuard Support
  • HA/Redundancy for the portal;
  • MySQL/MariaDB/PostgreSQL database support for data storage
  • Removal of all internal 2FA, 2FA only supported when using external authentication sources, e.g. in IdP
  • Guest Usage is gone for now (see below)
  • Much simpler configuration, especially for "multi node" setups
  • Allow limits on number of active OAuth clients and VPN configuration downloads per user

#Ops Changes

  • Runs on Debian >= 11, Fedora >= 34, Possibly Ubuntu 22.04 and CentOS/RHEL/Rocky 9

#Implementation Changes

  • Require at least OpenVPN 2.5
  • OAuth 2.1 draft implementation for API
  • OpenVPN requires now TLS >= 1.3
  • OpenVPN supports now both AES-256-GCM and CHACHA-POLY1305 data cipher. If the server (node) supports hardware accelerated AES, AES is used, otherwise CHACHA-POLY1305.
  • EdDSA (Ed25519) X.509 certificates for OpenVPN
  • New API_V3 for use by eduVPN / Let's Connect! Applications
  • Merge of vpn-user-portal, vpn-server-api and vpn-lib-common in 1 component
  • Switch VPN Daemon to use HTTP(S) instead of TCP socket, implement WireGuard management
  • Support PostgreSQL, MySQL/MariaDB for portal data storage instead of only SQLite
  • New OAuth Token format
  • Implement memcached support for fkooman/secookie
  • Keep the WireGuard private key only on the node(s), not on the portal...
  • Removed "conditional 2FA" with the PhpSamlSpAuthentication module, it is 2FA for all, or for none

#Work in Progress / Under Consideration

  • VPN Usage stats need to be completely redone, currently only "VPN client use" is available because that was easy
  • Add public CA and public WireGuard key(s) to the discovery files to have an additional trust channel between app and server in addition to Web TLS, or perhaps sign the API responses with a public key mentioned in the discovery files...
  • Keep aggregate logs longer than 30 days, i.e. usage statistics
  • Work on implementing hardware signing of discovery files
  • Browser generated WireGuard private key (in portal so server never knows it)
  • Generate QR code in browser instead of on the server

#For Future Consideration (>= 3.1)

  • Reimplement 2FA, but only for local user accounts
  • Implement Admin API. e.g. for bulk-configuration downloads for managed clients
  • Guest Usage has been completely removed for now, need to think how and whether to get this back in a clean way with pseudonyms, don't leak local user identity to guest servers! We MAY keep it out of 3.x and require servers to keep running 2.x until we come up with a better approach...