I see, Thanks very much for clearing that up James.
Cheers, Dunc James Yonan wrote: > Well the problem is that even though OpenVPN doesn't rely on OpenSSL > renegotiations, it does not explicitly disable them. So to be safe, > it's better to upgrade to the fixed version of OpenSSL (0.9.8l). > > Also note that using tls-auth prevents the cited MITM attack > (CVE-2009-3555) even when using a vulnerable version of OpenSSL, as long > as the MITM attacker doesn't possess the tls-auth key. > > James > > Dunc wrote: >> Hi James, >> >> Thanks for getting back to me. >> >> I was starting to wonder the same myself, but when I found this thread >> >> http://article.gmane.org/gmane.network.openvpn.user/28105 >> >> I thought I must be missing something. >> >> So if OpenVPN always uses a new session, what would be the point of >> adding an option to disable renegotiation at the server side? >> >> >> Cheers, >> >> Dunc >> >> >> James Yonan wrote: >>> OpenVPN uses a fresh SSL/TLS session for each of its mid-session >>> renegotiations. This means that when you see: >>> >>> TLS: soft reset sec=0 bytes=314/0 pkts=6/0 >>> >>> OpenVPN is actually creating a brand new SSL/TLS session. So the >>> important point here is that OpenVPN does not rely on the session >>> renegotiation capability that is built into SSL/TLS, and therefore if >>> OpenVPN is linked against an OpenSSL library that disables SSL/TLS >>> renegotiation, there should be no loss of functionality. >>> >>> James >>> >>> Dunc wrote: >>>> Hi all, >>>> >>>> Apologies in advance if I'm just not understanding something here. >>>> >>>> Following on from the recent SSL renegotiation problem, we're assessing >>>> what we should do with all our SSL services, and as we use OpenVPN in >>>> several places, this is on the list. >>>> >>>> I thought that OpenVPN does renegotiations when re-keying, so at >>>> first I >>>> thought I'd try and turn it off at the server end. From reading the >>>> docs >>>> and testing I now know that it's not good enough as by default clients >>>> will want to re-key after 1 hour unless it is turned off in the client >>>> config too. >>>> >>>> It might be hard to ensure that all our customers adjust their config >>>> properly, so I'd rather deal with this at the server end only, so my >>>> next thought was to install openssl-0.9.8l which bans renegotiation. I >>>> figured this would make the VPN drop once an hour, but figured that's >>>> not so bad in the grand scheme of things, and if it's really a problem >>>> for anyone we can fix it by having them adjust the client config. This >>>> was round seems more favourable as I can be sure renegotiations are >>>> disabled, and work around the fallout. >>>> >>>> So, I installed the latest openssl on a test box, and compiled openvpn. >>>> I set the reneg-sec option to 40s on my client and fired up the VPN, >>>> fully expecting it to bounce after 40s. Instead, what I see is this >>>> message in the logs:- >>>> >>>> Nov 11 14:13:51 2009 us=763149 TLS: soft reset sec=0 bytes=314/0 >>>> pkts=6/0 >>>> >>>> and then both ends seem to agree on some new crypto, and everything >>>> carries on. >>>> >>>> >>>> At first I thought maybe what OpenVPN does isn't the same as SSL >>>> renegotiation and I had no need to worry anyway, but then I found this >>>> thread... >>>> >>>> http://article.gmane.org/gmane.network.openvpn.user/28105 >>>> >>>> where there is discussion about adding an option to openvpn to disable >>>> it, so I now think I should indeed be concerned, but I must be missing >>>> something obvious, and wondered if anybody here can help me. >>>> >>>> I've checked with openssl s_server and s_client that my new openssl >>>> does >>>> indeed ban renegotiation, so I wonder exactly what OpenVPN is doing >>>> during rekeying. >>>> >>>> Thanks in advance if anyone can shed light on this for me, and once >>>> again sorry if I'm just misunderstanding, which is quite possible :-) >>>> >>>> Cheers, >>>> >>>> Dunc >>>> >>>> ------------------------------------------------------------------------------ >>>> >>>> >>>> Let Crystal Reports handle the reporting - Free Crystal Reports 2008 >>>> 30-Day trial. Simplify your report design, integration and deployment >>>> - and focus on what you do best, core application coding. Discover >>>> what's new with >>>> Crystal Reports now. http://p.sf.net/sfu/bobj-july >>>> _______________________________________________ >>>> Openvpn-devel mailing list >>>> Openvpn-devel@lists.sourceforge.net >>>> https://lists.sourceforge.net/lists/listinfo/openvpn-devel