Am 16.11.2024 um 17:22 schrieb נתי שטרן:
Hi,
it's same on 2.6 version:

Subject: Possible DoS Vulnerability - OpenVPN Server Showing Repeated TLS Handshake Failures

Dear OpenVPN Security Team,

I am writing to report a potential vulnerability to Denial-of-Service (DoS) attacks that I have observed in an OpenVPN server's logs. The server is exhibiting consistent TLS handshake failures, resulting in repeated process restarts. While the exact cause isn't immediately apparent, the symptoms strongly suggest a vulnerability to an attack vector that overwhelms the server with unsuccessful connection attempts.

This is too vague to on.

The logs demonstrate repeated errors of the form: "TLS key negotiation failed to occur within 5 seconds (check your network connectivity)" and "TLS handshake failed," followed by automatic server restarts. The server appears to be attempting to mitigate by increasing the restart delay with each failure, but this is only a temporary workaround, and the underlying issue persists.

Are they really server restarts are did you got confused by the logging message and the internal message and naming of signals that looks similar to a server restart? Also if you are claiming something like this, please have the log lines in your mail and not only your interpretation of them.

The observed behavior is highly suggestive of a DoS attack, where an attacker is attempting to exhaust server resources by triggering multiple failed TLS handshakes. This, along with the server automatically restarting in response, suggests a DoS mitigation procedure is in place that can only temporarily avoid service outages.

The earlier mails you sent to secur...@openvpn.net mentioned a OpenVPN 2.4.x version, which is vulnerable to a similar attack. But this has been fixed and new versions feature a handshake cookie mechansim. See the https://github.com/OpenVPN/openvpn/blob/master/Changes.rst and the section "Cookie based handshake for UDP server".

While I do not have direct access to the server configuration or the full scope of logs, I believe the behavior described poses a significant security risk. I have attached the partial log file demonstrating the repeated errors.

Without full scope of logs or server configuration, this is again very circumstancial and vague.

I would greatly appreciate it if you could investigate this potential vulnerability and provide any guidance or recommendations for strengthening the server's resilience against this type of attack. If further information is needed, please do not hesitate to ask.

You have not given anything that looks like a vulnerability and I currently I dispute that you found a vulnerability. You have been given already advise that you need to test/upgrade the OpenVPN version to 2.6.x instead of 2.4.x. Repeating your statements without providing the details and extra information we asked from you does not make them more true or gives us an extra incentive to look into them. In the opposite, you will more annoy the developers and maintains like me and this is also why this mail is already being written in a less friendly tone. The statement that you would provide more infomration when asked but not did not provide any of the extra information we asked that sentence and promise sound extra hallow.

Arne
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to