-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hi nsh...@gmail.com
It is common procedure to keep security concerns to the security@ mailing list. To have your concerns expertly reviewed, it is advisable to follow standard security and disclosure procedures. While this thread is, no doubt, amusing .. it is unnecessary noise on this list. Please ensure that you know who you are sending your emails to, in future. Peace and light tct Sent with Proton Mail secure email. On Sunday, 17 November 2024 at 03:48, נתי שטרן <nsh...@gmail.com> wrote: > Hi' i sent fully logs : > > > בתאריך יום א׳, 17 בנוב׳ 2024 ב-3:03 מאת Johan Draaisma > <jo...@openvpn.com>: > > > Hello Natanel/Netanel, > > > > We still don't see the issue, exponential backoff is how this type of > > situation is handled in other common protocols too, it is a not a security > > vulnerability. And just in case someone messes with the client side and > > tries endlessly reconnecting much faster in an attempt to stress the > > server, we also have other defenses in place. > > > > You also appear to be confusing server-side behavior with client-side > > behavior. What you are writing is that when the client is having a problem > > with the TLS handshake, that the server automatically restarts, as in, the > > process stops and is restarted. That is simply not true. If it were true it > > would mean failed TLS handshakes from one client would affect all other > > connected clients too, and that's something we don't see happening. But if > > you have proof that says otherwise, show it to us with verbatim log lines, > > and a way to reproduce it that includes version of client and server > > software used (and please, supported versions only, not versions from 8 > > years ago), client and server configurations, and the steps to reach this > > supposedly problematic state. My guess however is that you are > > misinterpreting the message that the client is going to do a restart of the > > connection, which would likely be visible in the server logs, and would be > > expected and normal. > > > > Yes, there is theoretical potential to exhaust server resources from > > repeatedly hammering the server with failing connections, as is the case > > with many network programs. But we have various defenses in place for that. > > Currently with the description given I don't believe you have found > > something that broke through those defenses. But I could be wrong. But if > > so, I want to see proof, not just a story. You write that the server is > > automatically restarting in response to multiple failed TLS handshakes. > > Show us the evidence please. > > > > Until then, we don't have anything to go on, sorry. > > > > Kind regards, > > Johan Draaisma > > > > On 16-11-2024 17:22, נתי שטרן wrote: > > > > > Hi, > > > it's same on 2.6 version: > > > > > > Subject: Possible DoS Vulnerability - OpenVPN Server Showing Repeated TLS > > > Handshake Failures > > > > > > Dear OpenVPN Security Team, > > > > > > I am writing to report a potential vulnerability to Denial-of-Service > > > (DoS) attacks that I have observed in an OpenVPN server's logs. The > > > server is exhibiting consistent TLS handshake failures, resulting in > > > repeated process restarts. While the exact cause isn't immediately > > > apparent, the symptoms strongly suggest a vulnerability to an attack > > > vector that overwhelms the server with unsuccessful connection attempts. > > > > > > The logs demonstrate repeated errors of the form: "TLS key negotiation > > > failed to occur within 5 seconds (check your network connectivity)" and > > > "TLS handshake failed," followed by automatic server restarts. The server > > > appears to be attempting to mitigate by increasing the restart delay with > > > each failure, but this is only a temporary workaround, and the underlying > > > issue persists. > > > > > > The observed behavior is highly suggestive of a DoS attack, where an > > > attacker is attempting to exhaust server resources by triggering multiple > > > failed TLS handshakes. This, along with the server automatically > > > restarting in response, suggests a DoS mitigation procedure is in place > > > that can only temporarily avoid service outages. > > > > > > While I do not have direct access to the server configuration or the full > > > scope of logs, I believe the behavior described poses a significant > > > security risk. I have attached the partial log file demonstrating the > > > repeated errors. > > > > > > I would greatly appreciate it if you could investigate this potential > > > vulnerability and provide any guidance or recommendations for > > > strengthening the server's resilience against this type of attack. If > > > further information is needed, please do not hesitate to ask. > > > > > > Sincerely, > > > > > > Netanel > > > > > > > > > > > > > > > בתאריך יום ו׳, 15 בנוב׳ 2024 ב-17:30 מאת Arne Schwabe > > > <a...@rfc2549.org>: > > > > > > > Am 15.11.24 um 13:56 schrieb נתי שטרן: > > > > > I pentested openvpn 2.4 on client and I need to write cve on TLS Key > > > > > Negotiation Timeout Leading to DoS on 2.4 version > > > > > > > > > > > > You are free to publish your finding but they do not qualify for a CVE > > > > for two reasons > > > > > > > > - currently only proven that an EOL version affected > > > > - the reported behaviour is expected behaviour and we do not see any > > > > security problems/implication in that behaviour, so no security problem, > > > > no CVE. > > > > > > > > > > > > -- > > > > -- -----BEGIN PGP SIGNATURE----- Version: ProtonMail wsBzBAEBCAAnBYJnOW/aCZBPl5z2a5C4nRYhBAm8PURno41yecVVVU+XnPZr kLidAADJqgf/fP+US1O0sV88Ui7MjEiaOUPyneyB5A1REmGnON+8Wr1rYngi EZ+fN/t+ro1F5oVN3r+Y+DrrxQY6sy3C1p62CjcVcu3ogeHtPvpzprcpq6QV GNl0hp5jg58T7yUyKFD4XPQJoiRBRr4TPnjP8Xa6O3D1KvcU0n22Xa3R/FxC pCIjeFgcSkqnjrCCmVqQ7cyS4WZ42Sfq1a/ijsq/RWoUX04Afuatyr0qB3fE EdVUZuzPic0HTA/zrxbnj2Bnv3J05euWROPzVmqpMGqVokKXboN8/N/AyPQb NZGlV8tierETQvnt/5x6fCM87psCF0K73S8YTbQ/dLfS+7wL2PLlGg== =c6Lz -----END PGP SIGNATURE-----
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel