-
Notifications
You must be signed in to change notification settings - Fork 326
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Flags --otp and --persistent don't play nice together #1244
Comments
Yes, I'm experiencing the same issue. |
I have made a very simple code change to fix this issue in #1258 All it does is clear the OTP from the configuration for subsequent connection attempts.
This already exists in a sense, by configuring |
I don't understand how that is supposed to be helpful.
That instruction is confusing and raises many questions, but I think the main issue with it is that it is probably not applicable to openfortivpn. |
@smktpd This article may clear things up about pinentry |
Thanks for your replies. I've read the article, some things are a bit clearer now, but only in general, without details. Now I feel like I'm bit of in a pickle, as... I don't want to manually provide neither password, nor OTP, I want it to get retrieved fully automatically. On MacOS there's a built-in CLI tool Since this keychain can't be used to store OTPs directly (in a sense that the new values should be generated based on time of access) - one indeed has to resort to the use of 3rd party password stores (like '1password' that you suggested or like KeePassXC that I use) for storing OTPs and may configure keychain to have password for said password stores to retrieve OTPs from there without prompts. This way I've successfully automated VPN connection without prompts, so the only issue here is the inability to re-connect. And it looks like Also, In other words, your solution might be more useful to others, who want to write-in OTP codes manually, but for people like me - it's better to add support of a |
Flag
--otp
is for specifying time-based one-time password, I make a sub-shell call$()
to retrieve it from keepassxc.Flag
--persistent
attempts to re-connect if tunnel failed. But it looks like the attempts to reconnect using old totp.Connection log looks like this
A possible solution would be to remake
--otp
flag (or introduce a new one) so that it would expect not the totp code itself, but a command that should yield one.I'm on ARM-based device with macos Sonoma 14.6 (23G80) running openfortivpn installed from brew, tried versions 1.20.5 and 1.22.1 (latest available).
The text was updated successfully, but these errors were encountered: