Hi,

On 01/01/18 20:30, Steffan Karger wrote:

[CUT]

> 
> Note the '5 seconds' reconnect loop, which is the same as what current
> released openvpn would do in response to an alert.  So if we change our
> servers to send alerts, they will experience quite a bit more load from
> clients attempting to reconnect.  We can make newer clients use some
> exponential back-off, but older clients will be around for quite a while.
> 

If we really go this way, we could even have the client "understand" the
alert and stop retrying if the error is permanent (i.e. certificate
revoked).


However, are we sure we're not going to introduce surface for a DoS
attacks by opening this hole for unauthorized clients?
Basically anybody with a revoked certificate is now able to trigger some
kind of logic on the server side (this is how I understand it).

Consider that obtaining a revoked certificate is not that difficult
(i.e. VPN providers granting free periods normally do that by issuing
and revoking a new cert).



Cheers,


-- 
Antonio Quartulli

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to