> Jan Just Keijser wrote:
>> ouch:
>>  http://www.openssl.org/news/secadv_20120419.txt
>>
>> we need to investigate whether and how openvpn is affected.
>>
>>
> did somebody end up writing an 'authoritative' answer to the question if 
> and how openvpn is affected by this bug?
>
> cheers,
>
> JJK
>
Hi all,

Got a response from James:

---

My reading on this is that OpenVPN is probably not vulnerable.

Scanning the OpenVPN source for usage of the vulnerable methods 
(d2i_*_bio or d2i_*_fp), I'm seeing several calls of the methods in 
ssl.c, however the data passed to these methods is coming from local 
sources.

$ grep -Er '\bd2i_.*_(bio|fp)\b' .
./ssl.c:          p12 = d2i_PKCS12_bio(b64, NULL);
./ssl.c:          p12 = d2i_PKCS12_fp(fp, NULL);

For example, above, we are passing the PKCS12 file to OpenSSL methods 
that have been cited as vulnerable, however the PKCS12 file is locally 
obtained so there's no capability for a malicious client or server to 
try to push a malformed file to its peer as a part of the OpenVPN or 
SSL/TLS protocols.

Aside from this, the vulnerability text says that "In particular the 
SSL/TLS code of OpenSSL is *not* affected." so the core SSL/TLS 
implementation in OpenVPN should be immune.

And in general, using the "tls-auth" option gives you another level of 
protection against any OpenSSL issues that would involve a direct attack 
on the SSL/TLS protocol.

James

---

Reply via email to