Hi! While running my patched openvpn in gdb, I had this error multiple times now: ------------------------------------------------------------------------------- Fri Oct 25 16:41:19 2013 84.139.3.24:40797 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Fri Oct 25 16:41:19 2013 84.139.3.24:40797 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Oct 25 16:41:19 2013 84.139.3.24:40797 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Fri Oct 25 16:41:19 2013 84.139.3.24:40797 [avalentin] Peer Connection Initiated with [AF_INET]84.139.3.24:40797
Program received signal SIGSEGV, Segmentation fault. 0x0000000000462881 in tls_common_name (multi=0x789b80, null=null@entry=true) at ssl_verify.c:133 133 if (ret && strlen (ret)) (gdb) bt #0 0x0000000000462881 in tls_common_name (multi=0x789b80, null=null@entry=true) at ssl_verify.c:133 #1 0x00000000004302dc in multi_delete_dup (new_mi=<optimized out>, m=<optimized out>) at multi.c:1207 #2 multi_connection_established (m=m@entry=0x7fffffffcaf0, mi=mi@entry=0x71b550) at multi.c:1620 #3 0x0000000000431196 in multi_process_post (m=m@entry=0x7fffffffcaf0, mi=0x71b550, flags=flags@entry=5) at multi.c:2054 #4 0x00000000004316e0 in multi_process_incoming_link (m=m@entry=0x7fffffffcaf0, instance=instance@entry=0x0, mpp_flags=mpp_flags@entry=5) at multi.c:2278 #5 0x000000000042c476 in multi_process_io_udp (m=0x7fffffffcaf0) at mudp.c:285 #6 tunnel_server_udp_single_threaded (top=0x7fffffffd890) at mudp.c:378 #7 0x000000000042cd95 in tunnel_server_udp (top=<optimized out>) at mudp.c:400 #8 0x0000000000432086 in tunnel_server (top=top@entry=0x7fffffffd890) at multi.c:2860 #9 0x0000000000433be8 in openvpn_main (argc=7, argv=0x7fffffffe628) at openvpn.c:253 #10 0x00007ffff6bdcead in __libc_start_main () from /lib/x86_64-linux-gnu/libc.so.6 #11 0x0000000000408441 in _start () ------------------------------------------------------------------------------- This happens always after some days. Usually there is only one client, which floats around. I do not see any reason why my code should produce this. Any ideas? I do not have any... André On 23.10.2013 09:54, André Valentin wrote:
Add support for floating in tls mode using the HMAC of a packet. It costs a roundtrip through the clients. Its security comes from a secret key, both peers have. This key and the data form the signature used, which is then checked againts existing peer connections. Therefore a good auth algo is recommended.