how to write a patch to fix it? בתאריך יום א׳, 17 בנוב׳ 2024 ב-6:24 מאת tincantech < tincant...@protonmail.com>:
> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > Hi nsh...@gmail.com > > It is common procedure to keep security concerns to the security@ mailing > list. > > To have your concerns expertly reviewed, it is advisable to follow standard > security and disclosure procedures. > > While this thread is, no doubt, amusing .. it is unnecessary noise on this > list. > > Please ensure that you know who you are sending your emails to, in future. > > Peace and light > tct > > Sent with Proton Mail secure email. > > On Sunday, 17 November 2024 at 03:48, נתי שטרן <nsh...@gmail.com> wrote: > > > Hi' i sent fully logs : > > > > > > בתאריך יום א׳, 17 בנוב׳ 2024 ב-3:03 מאת Johan Draaisma < > jo...@openvpn.com>: > > > > > Hello Natanel/Netanel, > > > > > > We still don't see the issue, exponential backoff is how this type of > situation is handled in other common protocols too, it is a not a security > vulnerability. And just in case someone messes with the client side and > tries endlessly reconnecting much faster in an attempt to stress the > server, we also have other defenses in place. > > > > > > You also appear to be confusing server-side behavior with client-side > behavior. What you are writing is that when the client is having a problem > with the TLS handshake, that the server automatically restarts, as in, the > process stops and is restarted. That is simply not true. If it were true it > would mean failed TLS handshakes from one client would affect all other > connected clients too, and that's something we don't see happening. But if > you have proof that says otherwise, show it to us with verbatim log lines, > and a way to reproduce it that includes version of client and server > software used (and please, supported versions only, not versions from 8 > years ago), client and server configurations, and the steps to reach this > supposedly problematic state. My guess however is that you are > misinterpreting the message that the client is going to do a restart of the > connection, which would likely be visible in the server logs, and would be > expected and normal. > > > > > > Yes, there is theoretical potential to exhaust server resources from > repeatedly hammering the server with failing connections, as is the case > with many network programs. But we have various defenses in place for that. > Currently with the description given I don't believe you have found > something that broke through those defenses. But I could be wrong. But if > so, I want to see proof, not just a story. You write that the server is > automatically restarting in response to multiple failed TLS handshakes. > Show us the evidence please. > > > > > > Until then, we don't have anything to go on, sorry. > > > > > > Kind regards, > > > Johan Draaisma > > > > > > On 16-11-2024 17:22, נתי שטרן wrote: > > > > > > > Hi, > > > > it's same on 2.6 version: > > > > > > > > Subject: Possible DoS Vulnerability - OpenVPN Server Showing > Repeated TLS Handshake Failures > > > > > > > > Dear OpenVPN Security Team, > > > > > > > > I am writing to report a potential vulnerability to > Denial-of-Service (DoS) attacks that I have observed in an OpenVPN server's > logs. The server is exhibiting consistent TLS handshake failures, resulting > in repeated process restarts. While the exact cause isn't immediately > apparent, the symptoms strongly suggest a vulnerability to an attack vector > that overwhelms the server with unsuccessful connection attempts. > > > > > > > > The logs demonstrate repeated errors of the form: "TLS key > negotiation failed to occur within 5 seconds (check your network > connectivity)" and "TLS handshake failed," followed by automatic server > restarts. The server appears to be attempting to mitigate by increasing the > restart delay with each failure, but this is only a temporary workaround, > and the underlying issue persists. > > > > > > > > The observed behavior is highly suggestive of a DoS attack, where an > attacker is attempting to exhaust server resources by triggering multiple > failed TLS handshakes. This, along with the server automatically restarting > in response, suggests a DoS mitigation procedure is in place that can only > temporarily avoid service outages. > > > > > > > > While I do not have direct access to the server configuration or the > full scope of logs, I believe the behavior described poses a significant > security risk. I have attached the partial log file demonstrating the > repeated errors. > > > > > > > > I would greatly appreciate it if you could investigate this > potential vulnerability and provide any guidance or recommendations for > strengthening the server's resilience against this type of attack. If > further information is needed, please do not hesitate to ask. > > > > > > > > Sincerely, > > > > > > > > Netanel > > > > > > > > > > > > > > > > > > > > בתאריך יום ו׳, 15 בנוב׳ 2024 ב-17:30 מאת Arne Schwabe < > a...@rfc2549.org>: > > > > > > > > > Am 15.11.24 um 13:56 schrieb נתי שטרן: > > > > > > I pentested openvpn 2.4 on client and I need to write cve on TLS > Key > > > > > > Negotiation Timeout Leading to DoS on 2.4 version > > > > > > > > > > > > > > > You are free to publish your finding but they do not qualify for a > CVE > > > > > for two reasons > > > > > > > > > > - currently only proven that an EOL version affected > > > > > - the reported behaviour is expected behaviour and we do not see > any > > > > > security problems/implication in that behaviour, so no security > problem, > > > > > no CVE. > > > > > > > > > > > > > > > > -- > > > > > > > > -- > -----BEGIN PGP SIGNATURE----- > Version: ProtonMail > > wsBzBAEBCAAnBYJnOW/aCZBPl5z2a5C4nRYhBAm8PURno41yecVVVU+XnPZr > kLidAADJqgf/fP+US1O0sV88Ui7MjEiaOUPyneyB5A1REmGnON+8Wr1rYngi > EZ+fN/t+ro1F5oVN3r+Y+DrrxQY6sy3C1p62CjcVcu3ogeHtPvpzprcpq6QV > GNl0hp5jg58T7yUyKFD4XPQJoiRBRr4TPnjP8Xa6O3D1KvcU0n22Xa3R/FxC > pCIjeFgcSkqnjrCCmVqQ7cyS4WZ42Sfq1a/ijsq/RWoUX04Afuatyr0qB3fE > EdVUZuzPic0HTA/zrxbnj2Bnv3J05euWROPzVmqpMGqVokKXboN8/N/AyPQb > NZGlV8tierETQvnt/5x6fCM87psCF0K73S8YTbQ/dLfS+7wL2PLlGg== > =c6Lz > -----END PGP SIGNATURE----- > -- <https://netanel.ml>
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel