On Fri, May 26, 2017 at 7:56 PM, Gert Doering <g...@greenie.muc.de> wrote: > Hi, > > On Fri, May 26, 2017 at 04:30:53PM +0200, Jeremie Courreges-Anglas wrote: >> I am the maintainer of openvpn in the OpenBSD ports tree. Here's >> a report from Stefan Sperling (Cc'ed). >> >> > An openvpn server running on OpenBSD/sparc64 6.1 crashes when a client >> > connects and starts doing traffic. Is anyone else seeing this? > > Thanks for the report. I'll look into it. > > Copying around the IP header doesn't feel like the proper solution, > though - it's basically replacing an unaligned access somewhere with > a larger (unaligned!) mem copy, where most likely changing a word > access to 2x byte access (etc) might achieve the same thing without > copying. > >> To work around this, the patch below (also written by Stefan) was >> committed in our ports tree. TARGET_FREEBSD and TARGET_DRAGONFLY seem >> to be affected too. > > FreeBSD/Sparc64 traps unaligned memory accesses and handles them > kernel-side. So you'll see a slowdown, but no signal. > > Linux/Sparc64 has the same restrictions (unaligned access causing a > signal), but nobody has reported that yet, so maybe the underlying > memory alignment of the allocated buffer happens to be good enough > there.
Using mostly with linux sparc64, but I have openbsd sparc64 installed and I can't reproduce it here.... we are using openvpn (2.4.0-6) on sparc64 linux (debian sid/unstable) as clients to x86_64 server (openvpn-2.3.14-137.4.x86_64) - works without errors. I made a few tests yesterday with openvpn static key: 1. server openvpn (2.4.0-6) on sparc64 linux, client is linux openvpn-2.3.14-1.fc25.x86_64 - works 2. server openvpn (2.4.0-6) on sparc64 linux, client openvpn 2.3.11 openbsd 6.1 sparc64 - works 3. server 2.3.11 (old 6.0 version) openbsd 6.1 sparc64, client openvpn (2.4.0-6) on sparc64 linux - works 4. server 2.4.1 (6.1 version) openbsd 6.1 sparc64, client openvpn (2.4.0-6) on sparc64 linux - works checked all 4 with copying back and forth 100Mbyte test file over vpn connection... bash-4.3# openvpn l1.conf Tue Jun 6 13:12:13 2017 disabling NCP mode (--ncp-disable) because not in P2MP client or server mode Tue Jun 6 13:12:13 2017 OpenVPN 2.4.1 sparc64-unknown-openbsd6.1 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on May 19 2017 Tue Jun 6 13:12:13 2017 library versions: LibreSSL 2.6.0, LZO 2.09 Tue Jun 6 13:12:13 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Tue Jun 6 13:12:13 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Tue Jun 6 13:12:13 2017 TUN/TAP device /dev/tun0 opened Tue Jun 6 13:12:13 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Tue Jun 6 13:12:13 2017 /sbin/ifconfig tun0 10.9.0.2 10.9.0.1 mtu 1500 netmask 255.255.255.255 up Tue Jun 6 13:12:13 2017 Could not determine IPv4/IPv6 protocol. Using AF_INET Tue Jun 6 13:12:13 2017 UDPv4 link local (bound): [AF_INET][undef]:1194 Tue Jun 6 13:12:13 2017 UDPv4 link remote: [AF_UNSPEC] Tue Jun 6 13:12:14 2017 Peer Connection Initiated with [AF_INET]192.168.158.92:1194 Tue Jun 6 13:12:14 2017 Initialization Sequence Completed ... -bash-4.3$ ls -lh /tmp/test-file.bin -rw-r--r-- 1 mator wheel 100M Jun 6 13:03 /tmp/test-file.bin -bash-4.3$ scp /tmp/test-file.bin 10.9.0.1:/tmp/1.bin mator@10.9.0.1's password: test-file.bin 100% 100MB 6.4MB/s 00:15 -bash-4.3$ cat l1.conf dev tun ifconfig 10.9.0.2 10.9.0.1 comp-lzo mute-replay-warnings <secret> ... </secret> PS: if someone needs a sparc64 shell for more tests or build (CI) machine, just email me. Thanks. ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel