On Thu, Jan 05, 2006 at 07:27:02PM +0100, Wild Karl-Heinz wrote:
> Hello all.
> 
> I've asked a month ago if it's possible to tag an incoming connection
> and keep the tag also after redirect to an other device with pf. The
> answer was no.
> 
> I thought about a way to restrict an openvpn connection based on the ip
> the connection was initiated.
> 
> Now I found a way I would like to show.
> I hope it's not wasted bandwidth.
> 
> OpenVPN produce a status file like the following
> ----------------------------------------------------
> 10.8.0.6,test.brandwand.domain,12.12.12.12:62140,Thu Jan  5 17:45:20 2006
> 10.8.0.14,world.brandwand.domain,11.11.11.11:60646,Thu Jan  5 17:05:48 2006
> ----------------------------------------------------
> 
> I read this file with a little script and set an anchor for every
> connection. After setting the active connections there should also
> be a step to reset or flush anchors they are no longer exists.
> The script isn't finish, it'll be the next time.
> 
> You need in pf.conf with an anchor like
> anchor "openvpn/*"
> 
> If there are any comments, they are welcome.

(Sorry for the long post. I tried to keep most irrelevant details out,
or at worst in the [footnotes], but it's still a rather long story for a
rather simple idea...)

This is a rather bad idea, even not considering the fact that the status
file may change formats without notice.

Let us postulate a priviliged user priv.example.com and an attacker
badguy.example.com.
Let us further postulate that the attacker has either managed to get
control of a lot of hosts and the certificates belonging to them, *or*
the --duplicate-cn option is enabled, *or* the OpenVPN server has a
somewhat larger number of users[1].

Now, suppose priv.example.com logs off, either of his/her own volition
or through some sort of attack[2].

Suppose badguy.example.com logs on shortly thereafter, and is assigned
the same address as priv.example.com held. Of course, access will
eventually be curtailed - but even five minutes is quite a bit of time.
Especially since it should be possible to get these five minutes several
times, especially when able to disconnect priv.example.com pretty much
at will, and faced with a typical (Windows) user who will just try again
when something unexpectedly fails.

This is not always possible, see the second assumption, but since the
OpenVPN manpage clearly states not to rely on --ifconfig-pool-persist
granting static IPs, I do not think this is a terribly good idea. And
please note that I do not say that it is not possible if the second
assumption has not been fulfilled.

The proper way to do this is to pick two subnets; reserve one for
dynamic allocation, and use the other for static addresses. You can
assign static addresses via --client-connect-script and
--client-config-dir; the latter is by far the easier in a chroot setup,
as you should be using (OpenVPN has had a few security problems[3]; not
that much, considering the complexity, but enough to merit running it
with as little priviliges as is at all possible).

I have this set up as:

/etc/openvpn.conf:
server 192.168.9.0 255.255.255.0
client-config-dir /var/openvpn-config
route 192.168.8.0 255.255.255.0
#route 192.168.7.0 255.255.255.0

/var/openvpn-config/priv.example.com:
ifconfig-push 192.168.8.1 255.255.255.0
#iroute 192.168.7.0 255.255.255.0

Be aware, however, that such a setup will cause strange-looking routing
tables. Especially if you uncomment the commented routing commands -
they will route 192.168.7.0 through priv.example.com.

Now, you can use pf to allow the hosts in 192.168.8.0/24 elevated
access, and those in 192.168.9.0/24 normal access. Works for me[4].

I did not check your implementation, so I cannot comment on that.

                Joachim

[1] If --ifconfig-pool-linear is not given, the maximum is no higher
than 256/4 = 64 hosts for a /24 subnet (as Windows hosts require four
IPs in this implementation); if it is, the maximum is no higher than
255, and you'll probably have an angry mob on your doorstep soon.
(The maximum may be lower, since the server itself consumes some IP
space; also, I hope the broadcast address is not given out; and .0 seems
not be given out, either.)

[2] Look up 'Fernando Gont' and some combination of 'full-disclosure',
'icmp' and 'dos' for one possible attack - OpenBSD is (no longer)
vulnerable, but priv.example.com need not be running OpenBSD.
Alternatively, skip all the discussions and go straight to
http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html.
(This is an attack against TCP, by the way, and OpenVPN uses UDP by
default, so this is not applicable in all/many cases.)

[3] See any vulnerability database, for instance
http://search.securityfocus.com/swsearch?sbm=%2F&metaname=alldoc&query=openvpn.
(URL may break in replies, it's one long line...)

[4] IPs and paths have been changed on account of sheer, rampaging
paranoia; 'works for me' gives no guarantee of actually working for me,
let alone for you; always read the man page before implementing.

Reply via email to