Dear OpenVPN Security Team, This report describes a potential vulnerability impacting OpenVPN, version 2.6, exhibiting behavior indicative of denial-of-service (DoS) conditions. The observed behavior strongly suggests a susceptibility to attacks that exhaust server resources through repeated failed TLS handshakes, causing frequent process restarts.
Observed Behavior: Consistent TLS handshake failures, resulting in automatic server restarts, are observed. Log entries indicate escalating restart delays (initially 80 seconds, then consistently 300 seconds), demonstrating the server's attempt to mitigate this pattern but without success. Evidence: The attached log file (openvpn_log.txt - replace this with the actual filename if you're sending it as an attachment) details these repeated failures. Key entries include: Repeated "TLS key negotiation failed to occur within 5 seconds (check your network connectivity)" errors. Corresponding "TLS handshake failed" errors. SIGUSR1[soft,tls-error] signals, triggering server restarts. Reproducibility: While we can't definitively prove reproducibility without controlled testing, the consistent pattern, occurring even over extended periods with incrementally increasing retry timeouts strongly suggest either network unreliability combined with server inadequacies to handle such errors gracefully, or a clear, repeatable exploitation approach capable of inducing sustained stress on OpenVPN instances without actual service outage. Suspected Vulnerabilities: The observed behaviour suggests at least one of the following: Inefficient TLS Handshake Handling: The server may not efficiently handle numerous failed handshake attempts, leading to resource exhaustion under sustained pressure. Vulnerability to a DoS Attack: The server might be susceptible to a DoS attack where a malicious actor triggers numerous connection attempts that consistently fail. Mitigating Factors: The self-mitigation measures already apparent in the server configuration include automatic restart after timeout. These automatic retries, combined with increasingly long durations for the forced pauses before restarting (80, then repeatedly 300 seconds) suggest attempts to alleviate this behaviour. They fail consistently. Analysis: The consistent failure rate combined with increased server pause intervals indicates that a self-mitigation measure implemented by the OpenVPN server processes appears not fully effective at recovering this. The frequency, and repetition, is far more aligned with possible DoS exploit capabilities and repeated attack attempts, far more than what could be considered a networking error of sorts only, regardless of network configuration changes attempted. Client Configuration: The attached OpenVPN client configuration file (openvpn_config.txt - again, use the correct filename) is provided for context. Additional Notes: The frequent WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1450) messages suggest potential MTU/MSS issues, which may be unrelated to this main security risk issue or be an intrinsic cause instead. This would require extensive and highly targeted tests to validate the implication. Further investigation will be required. We request your attention and an evaluation of this matter to establish if it constitutes a vulnerability eligible for CVE assignment. Sincerely, Netanel -- <https://netanel.ml>
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel