hi, I send logs:
greetings, Netanel בתאריך יום א׳, 17 בנוב׳ 2024 ב-1:50 מאת Arne Schwabe <a...@rfc2549.org >: > > Am 16.11.2024 um 20:22 schrieb נתי שטרן: > > > > Dear OpenVPN Security Team, > > > > This report describes a potential vulnerability impacting OpenVPN, > > version 2.6, exhibiting behavior indicative of denial-of-service (DoS) > > conditions. The observed behavior strongly suggests a susceptibility > > to attacks that exhaust server resources through repeated failed TLS > > handshakes, causing frequent process restarts. > > > This is statement is not true. There is no indication of a server > exhaustion in what you writing. > > > > Observed Behavior: Consistent TLS handshake failures, resulting in > > automatic server restarts, are observed. Log entries indicate > > escalating restart delays (initially 80 seconds, then consistently 300 > > seconds), demonstrating the server's attempt to mitigate this pattern > > but without success. > > > As already explained to you, that is called exponentional backoff, it is > documented in the documentation under the --connect-retry option. > > Evidence: The attached log file (openvpn_log.txt - replace this with > > the actual filename if you're sending it as an attachment) details > > these repeated failures. Key entries include: > > > Attachment missing but doesn't matter because the behaviour is intended > and expected behaviour. > > > > Repeated "TLS key negotiation failed to occur within 5 seconds > > (check your network connectivity)" errors. > > > You have a quite tight connect timeout. Normal timeout is 60s and not 5s. > > > > Corresponding "TLS handshake failed" errors. > > > > SIGUSR1[soft,tls-error] signals, triggering server restarts. > > > > Reproducibility: While we can't definitively prove reproducibility > > without controlled testing, the consistent pattern, occurring even > > over extended periods with incrementally increasing retry timeouts > > strongly suggest either network unreliability combined with server > > inadequacies to handle such errors gracefully, or a clear, repeatable > > exploitation approach capable of inducing sustained stress on OpenVPN > > instances without actual service outage > > Your argumentation makes no sense to make. A client doing exponential > backoff is not an indication that the server is overloaded. Hint: Look > what happens if TCP makes a connection attempt, SYN packets will show a > similar pattern of exponential backoff. > > > . > > > > Suspected Vulnerabilities: The observed behaviour suggests at least > > one of the following: > YOu are doing a wild guess and that wild guess is wrong. Please stop > trying to hallucinate a vulnerability where none exists. > > . > > > > Mitigating Factors: The self-mitigation measures already apparent in > > the server configuration include automatic restart after timeout. > > These automatic retries, combined with increasingly long durations for > > the forced pauses before restarting (80, then repeatedly 300 seconds) > > suggest attempts to alleviate this behaviour. They fail consistently. > > > This conclusion is wrong as said before. > > > > Analysis: The consistent failure rate combined with increased server > > pause intervals indicates that a self-mitigation measure implemented > > by the OpenVPN server processes appears not fully effective at > > recovering this. The frequency, and repetition, is far more aligned > > with possible DoS exploit capabilities and repeated attack attempts, > > far more than what could be considered a networking error of sorts > > only, regardless of network configuration changes attempted. > > > > Client Configuration: The attached OpenVPN client configuration file > > (openvpn_config.txt - again, use the correct filename) is provided for > > context > You are confusing a client behaviour with a server behaviour. > > . > > > > Additional Notes: The frequent WARNING: normally if you use --mssfix > > and/or --fragment, you should also set --tun-mtu 1500 (currently it is > > 1450) messages suggest potential MTU/MSS issues, which may be > > unrelated to this main security risk issue or be an intrinsic cause > > instead. This would require extensive and highly targeted tests to > > validate the implication. Further investigation will be required. > > > > We request your attention and an evaluation of this matter to > > establish if it constitutes a vulnerability eligible for CVE assignment. > > THE ANWSER IS STILL NO. You don't even describing a bug or anything > else. You are reporting the indented and desired behaviour. That is not > CVE or even bug worthy in the slightest. > > Please have a proper evaluation and stop some throwing some random > nonsense over and over again at our mailing list when you already been > told that this is INDENTED behaviour. > > Arne > > -- <https://netanel.ml>
Sun Nov 17 05:42:23 2024 OpenVPN 2.4.12 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 27 2024 Sun Nov 17 05:42:23 2024 library versions: OpenSSL 1.1.1f 31 Mar 2020, LZO 2.10 Sun Nov 17 05:42:23 2024 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Nov 17 05:42:23 2024 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Nov 17 05:42:23 2024 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1450) Sun Nov 17 05:42:23 2024 TCP/UDP: Preserving recently used remote address: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:42:23 2024 Socket Buffers: R=[212992->212992] S=[212992->212992] Sun Nov 17 05:42:23 2024 UDP link local: (not bound) Sun Nov 17 05:42:23 2024 UDP link remote: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:42:28 2024 TLS Error: TLS key negotiation failed to occur within 5 seconds (check your network connectivity) Sun Nov 17 05:42:28 2024 TLS Error: TLS handshake failed Sun Nov 17 05:42:28 2024 SIGUSR1[soft,tls-error] received, process restarting Sun Nov 17 05:42:28 2024 Restart pause, 5 second(s) Sun Nov 17 05:42:33 2024 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1450) Sun Nov 17 05:42:33 2024 TCP/UDP: Preserving recently used remote address: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:42:33 2024 Socket Buffers: R=[212992->212992] S=[212992->212992] Sun Nov 17 05:42:33 2024 UDP link local: (not bound) Sun Nov 17 05:42:33 2024 UDP link remote: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:42:38 2024 TLS Error: TLS key negotiation failed to occur within 5 seconds (check your network connectivity) Sun Nov 17 05:42:38 2024 TLS Error: TLS handshake failed Sun Nov 17 05:42:38 2024 SIGUSR1[soft,tls-error] received, process restarting Sun Nov 17 05:42:38 2024 Restart pause, 5 second(s) Sun Nov 17 05:42:43 2024 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1450) Sun Nov 17 05:42:43 2024 TCP/UDP: Preserving recently used remote address: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:42:43 2024 Socket Buffers: R=[212992->212992] S=[212992->212992] Sun Nov 17 05:42:43 2024 UDP link local: (not bound) Sun Nov 17 05:42:43 2024 UDP link remote: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:42:48 2024 TLS Error: TLS key negotiation failed to occur within 5 seconds (check your network connectivity) Sun Nov 17 05:42:48 2024 TLS Error: TLS handshake failed Sun Nov 17 05:42:48 2024 SIGUSR1[soft,tls-error] received, process restarting Sun Nov 17 05:42:48 2024 Restart pause, 5 second(s) Sun Nov 17 05:42:53 2024 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1450) Sun Nov 17 05:42:53 2024 TCP/UDP: Preserving recently used remote address: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:42:53 2024 Socket Buffers: R=[212992->212992] S=[212992->212992] Sun Nov 17 05:42:53 2024 UDP link local: (not bound) Sun Nov 17 05:42:53 2024 UDP link remote: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:42:58 2024 TLS Error: TLS key negotiation failed to occur within 5 seconds (check your network connectivity) Sun Nov 17 05:42:58 2024 TLS Error: TLS handshake failed Sun Nov 17 05:42:58 2024 SIGUSR1[soft,tls-error] received, process restarting Sun Nov 17 05:42:58 2024 Restart pause, 5 second(s) Sun Nov 17 05:43:03 2024 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1450) Sun Nov 17 05:43:03 2024 TCP/UDP: Preserving recently used remote address: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:43:03 2024 Socket Buffers: R=[212992->212992] S=[212992->212992] Sun Nov 17 05:43:03 2024 UDP link local: (not bound) Sun Nov 17 05:43:03 2024 UDP link remote: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:43:08 2024 TLS Error: TLS key negotiation failed to occur within 5 seconds (check your network connectivity) Sun Nov 17 05:43:08 2024 TLS Error: TLS handshake failed Sun Nov 17 05:43:08 2024 SIGUSR1[soft,tls-error] received, process restarting Sun Nov 17 05:43:08 2024 Restart pause, 10 second(s) Sun Nov 17 05:43:18 2024 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1450) Sun Nov 17 05:43:18 2024 TCP/UDP: Preserving recently used remote address: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:43:18 2024 Socket Buffers: R=[212992->212992] S=[212992->212992] Sun Nov 17 05:43:18 2024 UDP link local: (not bound) Sun Nov 17 05:43:18 2024 UDP link remote: [AF_INET]103.6.170.21:1194 Sun Nov 17 05:43:23 2024 TLS Error: TLS key negotiation failed to occur within 5 seconds (check your network connectivity) Sun Nov 17 05:43:23 2024 TLS Error: TLS handshake failed Sun Nov 17 05:43:23 2024 SIGUSR1[soft,tls-error] received, process restarting Sun Nov 17 05:43:23 2024 Restart pause, 20 second(s)
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel