hi,
I send logs:

greetings,
Netanel

‫בתאריך יום א׳, 17 בנוב׳ 2024 ב-1:50 מאת ‪Arne Schwabe‬‏ <‪a...@rfc2549.org
‬‏>:‬

>
> Am 16.11.2024 um 20:22 schrieb נתי שטרן:
> >
> > Dear OpenVPN Security Team,
> >
> > This report describes a potential vulnerability impacting OpenVPN,
> > version 2.6, exhibiting behavior indicative of denial-of-service (DoS)
> > conditions. The observed behavior strongly suggests a susceptibility
> > to attacks that exhaust server resources through repeated failed TLS
> > handshakes, causing frequent process restarts.
> >
> This is statement is not true. There is no indication of a server
> exhaustion in what you writing.
>
>
> > Observed Behavior: Consistent TLS handshake failures, resulting in
> > automatic server restarts, are observed. Log entries indicate
> > escalating restart delays (initially 80 seconds, then consistently 300
> > seconds), demonstrating the server's attempt to mitigate this pattern
> > but without success.
> >
> As already explained to you, that is called exponentional backoff, it is
> documented in the documentation under the --connect-retry option.
> > Evidence: The attached log file (openvpn_log.txt - replace this with
> > the actual filename if you're sending it as an attachment) details
> > these repeated failures. Key entries include:
> >
> Attachment missing but doesn't matter because the behaviour is intended
> and expected behaviour.
>
>
> >     Repeated "TLS key negotiation failed to occur within 5 seconds
> > (check your network connectivity)" errors.
> >
> You have a quite tight connect timeout. Normal timeout is 60s and not 5s.
>
>
> >     Corresponding "TLS handshake failed" errors.
> >
> >     SIGUSR1[soft,tls-error] signals, triggering server restarts.
> >
> > Reproducibility: While we can't definitively prove reproducibility
> > without controlled testing, the consistent pattern, occurring even
> > over extended periods with incrementally increasing retry timeouts
> > strongly suggest either network unreliability combined with server
> > inadequacies to handle such errors gracefully, or a clear, repeatable
> > exploitation approach capable of inducing sustained stress on OpenVPN
> > instances without actual service outage
>
> Your argumentation makes no sense to make. A client doing exponential
> backoff is not an indication that the server is overloaded. Hint: Look
> what happens if TCP makes a connection attempt, SYN packets will show a
> similar pattern of exponential backoff.
>
> > .
> >
> > Suspected Vulnerabilities: The observed behaviour suggests at least
> > one of the following:
> YOu are doing a wild guess and that wild guess is wrong. Please stop
> trying to hallucinate a vulnerability where none exists.
> > .
> >
> > Mitigating Factors: The self-mitigation measures already apparent in
> > the server configuration include automatic restart after timeout.
> > These automatic retries, combined with increasingly long durations for
> > the forced pauses before restarting (80, then repeatedly 300 seconds)
> > suggest attempts to alleviate this behaviour. They fail consistently.
> >
> This conclusion is wrong as said before.
>
>
> > Analysis: The consistent failure rate combined with increased server
> > pause intervals indicates that a self-mitigation measure implemented
> > by the OpenVPN server processes appears not fully effective at
> > recovering this. The frequency, and repetition, is far more aligned
> > with possible DoS exploit capabilities and repeated attack attempts,
> > far more than what could be considered a networking error of sorts
> > only, regardless of network configuration changes attempted.
> >
> > Client Configuration: The attached OpenVPN client configuration file
> > (openvpn_config.txt - again, use the correct filename) is provided for
> > context
> You are confusing a client behaviour with a server behaviour.
> > .
> >
> > Additional Notes: The frequent WARNING: normally if you use --mssfix
> > and/or --fragment, you should also set --tun-mtu 1500 (currently it is
> > 1450) messages suggest potential MTU/MSS issues, which may be
> > unrelated to this main security risk issue or be an intrinsic cause
> > instead. This would require extensive and highly targeted tests to
> > validate the implication. Further investigation will be required.
> >
> > We request your attention and an evaluation of this matter to
> > establish if it constitutes a vulnerability eligible for CVE assignment.
>
> THE ANWSER IS STILL NO. You don't even describing a bug or anything
> else. You are reporting the indented and desired behaviour. That is not
> CVE or even bug worthy in the slightest.
>
> Please have a proper evaluation and stop some throwing some random
> nonsense over and over again at our mailing list when you already been
> told that this is INDENTED behaviour.
>
> Arne
>
>

-- 
<https://netanel.ml>
Sun Nov 17 05:42:23 2024 OpenVPN 2.4.12 x86_64-pc-linux-gnu [SSL (OpenSSL)] 
[LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 27 2024
Sun Nov 17 05:42:23 2024 library versions: OpenSSL 1.1.1f  31 Mar 2020, LZO 2.10
Sun Nov 17 05:42:23 2024 Outgoing Control Channel Authentication: Using 256 bit 
message hash 'SHA256' for HMAC authentication
Sun Nov 17 05:42:23 2024 Incoming Control Channel Authentication: Using 256 bit 
message hash 'SHA256' for HMAC authentication
Sun Nov 17 05:42:23 2024 WARNING: normally if you use --mssfix and/or 
--fragment, you should also set --tun-mtu 1500 (currently it is 1450)
Sun Nov 17 05:42:23 2024 TCP/UDP: Preserving recently used remote address: 
[AF_INET]103.6.170.21:1194
Sun Nov 17 05:42:23 2024 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Nov 17 05:42:23 2024 UDP link local: (not bound)
Sun Nov 17 05:42:23 2024 UDP link remote: [AF_INET]103.6.170.21:1194
Sun Nov 17 05:42:28 2024 TLS Error: TLS key negotiation failed to occur within 
5 seconds (check your network connectivity)
Sun Nov 17 05:42:28 2024 TLS Error: TLS handshake failed
Sun Nov 17 05:42:28 2024 SIGUSR1[soft,tls-error] received, process restarting
Sun Nov 17 05:42:28 2024 Restart pause, 5 second(s)
Sun Nov 17 05:42:33 2024 WARNING: normally if you use --mssfix and/or 
--fragment, you should also set --tun-mtu 1500 (currently it is 1450)
Sun Nov 17 05:42:33 2024 TCP/UDP: Preserving recently used remote address: 
[AF_INET]103.6.170.21:1194
Sun Nov 17 05:42:33 2024 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Nov 17 05:42:33 2024 UDP link local: (not bound)
Sun Nov 17 05:42:33 2024 UDP link remote: [AF_INET]103.6.170.21:1194
Sun Nov 17 05:42:38 2024 TLS Error: TLS key negotiation failed to occur within 
5 seconds (check your network connectivity)
Sun Nov 17 05:42:38 2024 TLS Error: TLS handshake failed
Sun Nov 17 05:42:38 2024 SIGUSR1[soft,tls-error] received, process restarting
Sun Nov 17 05:42:38 2024 Restart pause, 5 second(s)
Sun Nov 17 05:42:43 2024 WARNING: normally if you use --mssfix and/or 
--fragment, you should also set --tun-mtu 1500 (currently it is 1450)
Sun Nov 17 05:42:43 2024 TCP/UDP: Preserving recently used remote address: 
[AF_INET]103.6.170.21:1194
Sun Nov 17 05:42:43 2024 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Nov 17 05:42:43 2024 UDP link local: (not bound)
Sun Nov 17 05:42:43 2024 UDP link remote: [AF_INET]103.6.170.21:1194
Sun Nov 17 05:42:48 2024 TLS Error: TLS key negotiation failed to occur within 
5 seconds (check your network connectivity)
Sun Nov 17 05:42:48 2024 TLS Error: TLS handshake failed
Sun Nov 17 05:42:48 2024 SIGUSR1[soft,tls-error] received, process restarting
Sun Nov 17 05:42:48 2024 Restart pause, 5 second(s)
Sun Nov 17 05:42:53 2024 WARNING: normally if you use --mssfix and/or 
--fragment, you should also set --tun-mtu 1500 (currently it is 1450)
Sun Nov 17 05:42:53 2024 TCP/UDP: Preserving recently used remote address: 
[AF_INET]103.6.170.21:1194
Sun Nov 17 05:42:53 2024 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Nov 17 05:42:53 2024 UDP link local: (not bound)
Sun Nov 17 05:42:53 2024 UDP link remote: [AF_INET]103.6.170.21:1194
Sun Nov 17 05:42:58 2024 TLS Error: TLS key negotiation failed to occur within 
5 seconds (check your network connectivity)
Sun Nov 17 05:42:58 2024 TLS Error: TLS handshake failed
Sun Nov 17 05:42:58 2024 SIGUSR1[soft,tls-error] received, process restarting
Sun Nov 17 05:42:58 2024 Restart pause, 5 second(s)
Sun Nov 17 05:43:03 2024 WARNING: normally if you use --mssfix and/or 
--fragment, you should also set --tun-mtu 1500 (currently it is 1450)
Sun Nov 17 05:43:03 2024 TCP/UDP: Preserving recently used remote address: 
[AF_INET]103.6.170.21:1194
Sun Nov 17 05:43:03 2024 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Nov 17 05:43:03 2024 UDP link local: (not bound)
Sun Nov 17 05:43:03 2024 UDP link remote: [AF_INET]103.6.170.21:1194
Sun Nov 17 05:43:08 2024 TLS Error: TLS key negotiation failed to occur within 
5 seconds (check your network connectivity)
Sun Nov 17 05:43:08 2024 TLS Error: TLS handshake failed
Sun Nov 17 05:43:08 2024 SIGUSR1[soft,tls-error] received, process restarting
Sun Nov 17 05:43:08 2024 Restart pause, 10 second(s)
Sun Nov 17 05:43:18 2024 WARNING: normally if you use --mssfix and/or 
--fragment, you should also set --tun-mtu 1500 (currently it is 1450)
Sun Nov 17 05:43:18 2024 TCP/UDP: Preserving recently used remote address: 
[AF_INET]103.6.170.21:1194
Sun Nov 17 05:43:18 2024 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Nov 17 05:43:18 2024 UDP link local: (not bound)
Sun Nov 17 05:43:18 2024 UDP link remote: [AF_INET]103.6.170.21:1194
Sun Nov 17 05:43:23 2024 TLS Error: TLS key negotiation failed to occur within 
5 seconds (check your network connectivity)
Sun Nov 17 05:43:23 2024 TLS Error: TLS handshake failed
Sun Nov 17 05:43:23 2024 SIGUSR1[soft,tls-error] received, process restarting
Sun Nov 17 05:43:23 2024 Restart pause, 20 second(s)
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to