> "Jonathan K. Bullard" <jkbull...@gmail.com> wrote:
>
> The openvpn_xorpatch which as introduced and discussed in this thread does 
> have some vulnerabilities.
>
> Most of the vulnerabilities are null pointer dereferences or other errors 
> when parsing the "scramble" option or are triggered by unlikely values for 
> its parameters. However, one is a potential buffer overflow
> which can occur while the VPN is active and could potentially be triggered by 
> carefully constructed traffic.

Thanks Jonathan for your feedback.

I've a different question for you. What about using stunnel4 with OpenVPN?

I've seen a situation in which a user opens a stunnel4 connection in Linux 
(without root) as in the following:

stunnel filename.ssl

In a new terminal window, the user, as root, types the following command to 
connect to an OpenVPN server:

sudo openvpn filename.ovpn

I was told the above method achieves the same goal as using the 
OpenVPN_XOR-patch method, i.e. preventing deep packet inspection carried out by 
the Great Firewall.

But does the stunnel4+openvpn combo method have security vulnerabilities? (Last 
I checked, stunnel4 is available in many Linux distros.)

Regards.

Lisa
-----------------------------------------------------
Mail.be, WebMail and Virtual Office
http://www.mail.be

Reply via email to