Am 16.11.2024 um 20:22 schrieb נתי שטרן:
Dear OpenVPN Security Team,
This report describes a potential vulnerability impacting OpenVPN,
version 2.6, exhibiting behavior indicative of denial-of-service (DoS)
conditions. The observed behavior strongly suggests a susceptibility
to attacks that exhaust server resources through repeated failed TLS
handshakes, causing frequent process restarts.
This is statement is not true. There is no indication of a server
exhaustion in what you writing.
Observed Behavior: Consistent TLS handshake failures, resulting in
automatic server restarts, are observed. Log entries indicate
escalating restart delays (initially 80 seconds, then consistently 300
seconds), demonstrating the server's attempt to mitigate this pattern
but without success.
As already explained to you, that is called exponentional backoff, it is
documented in the documentation under the --connect-retry option.
Evidence: The attached log file (openvpn_log.txt - replace this with
the actual filename if you're sending it as an attachment) details
these repeated failures. Key entries include:
Attachment missing but doesn't matter because the behaviour is intended
and expected behaviour.
Repeated "TLS key negotiation failed to occur within 5 seconds
(check your network connectivity)" errors.
You have a quite tight connect timeout. Normal timeout is 60s and not 5s.
Corresponding "TLS handshake failed" errors.
SIGUSR1[soft,tls-error] signals, triggering server restarts.
Reproducibility: While we can't definitively prove reproducibility
without controlled testing, the consistent pattern, occurring even
over extended periods with incrementally increasing retry timeouts
strongly suggest either network unreliability combined with server
inadequacies to handle such errors gracefully, or a clear, repeatable
exploitation approach capable of inducing sustained stress on OpenVPN
instances without actual service outage
Your argumentation makes no sense to make. A client doing exponential
backoff is not an indication that the server is overloaded. Hint: Look
what happens if TCP makes a connection attempt, SYN packets will show a
similar pattern of exponential backoff.
.
Suspected Vulnerabilities: The observed behaviour suggests at least
one of the following:
YOu are doing a wild guess and that wild guess is wrong. Please stop
trying to hallucinate a vulnerability where none exists.
.
Mitigating Factors: The self-mitigation measures already apparent in
the server configuration include automatic restart after timeout.
These automatic retries, combined with increasingly long durations for
the forced pauses before restarting (80, then repeatedly 300 seconds)
suggest attempts to alleviate this behaviour. They fail consistently.
This conclusion is wrong as said before.
Analysis: The consistent failure rate combined with increased server
pause intervals indicates that a self-mitigation measure implemented
by the OpenVPN server processes appears not fully effective at
recovering this. The frequency, and repetition, is far more aligned
with possible DoS exploit capabilities and repeated attack attempts,
far more than what could be considered a networking error of sorts
only, regardless of network configuration changes attempted.
Client Configuration: The attached OpenVPN client configuration file
(openvpn_config.txt - again, use the correct filename) is provided for
context
You are confusing a client behaviour with a server behaviour.
.
Additional Notes: The frequent WARNING: normally if you use --mssfix
and/or --fragment, you should also set --tun-mtu 1500 (currently it is
1450) messages suggest potential MTU/MSS issues, which may be
unrelated to this main security risk issue or be an intrinsic cause
instead. This would require extensive and highly targeted tests to
validate the implication. Further investigation will be required.
We request your attention and an evaluation of this matter to
establish if it constitutes a vulnerability eligible for CVE assignment.
THE ANWSER IS STILL NO. You don't even describing a bug or anything
else. You are reporting the indented and desired behaviour. That is not
CVE or even bug worthy in the slightest.
Please have a proper evaluation and stop some throwing some random
nonsense over and over again at our mailing list when you already been
told that this is INDENTED behaviour.
Arne
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel