>>> Hi,
>>>
>>> Am 08.04.2014 15:42, schrieb Steffan Karger:
>>>>> Perhaps a dumb question, but if the server instance is linked
>>>>> against an older version of openssl (9.8.x), but the client is
>>>>> compiled and linked against the vulnerable version, is it still an
>>>>> issue for both sides, or is the client going to leak private
>>>>> information ?
>>>> The client can then leak keys (both private master key and session
>>>> keys), which completely breaks your secure connection, for that
>>>> client.
>>>>
>>>> So when the server is not vulnerable, each client has to be attacked
>>>> individually, and not-vulnerable clients have a secure connection to
>>>> the server. As long as there are vulnerable clients, you should
>>>> consider those as potentially malicious, and thus you should consider
>>>> the network as insecure.
>>> Then OpenVPN should release new Windows Versions.
>>> The current binaries are linked against OpenSSL (ssleay32.dll, 
>>> libeay32.dll) 1.0.1.5 (-> 1.0.1e).
>>>
>>>
>> Hi all,
>>
>> We'll try to push OpenVPN 2.3.3 out today. The Windows installer will
>> contain OpenSSL 1.0.1g which fixes this particular problem. In addition
>> several other small changes and enhancements will be included.
>>
> Minor correction: I will build and publish OpenVPN 2.3.2 Windows
> installers with OpenSSL 1.0.1g today; this will fix the security problem
> at hand. OpenVPN 2.3.3 will follow on Thursday, if I encounter no big
> problems with the changes it contains.
>
An updated installer (I004) with OpenSSL 1.0.1g is now out:

<http://openvpn.net/index.php/download/community-downloads.html>

I smoketested the installers on Windows 7 64-bit and WinXP 32-bit.

-- 
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc

irc freenode net: mattock


Reply via email to