‪вс, 17 нояб. 2024 г. в 04:46, ‫נתי שטרן‬‎ <nsh...@gmail.com>:‬

> hi,
> I send logs:
>

it is hard to say what is wrong in the logs sent. from my point of view -
those logs do not indicate any security issue.

please try to explain in details why do you think it is security issue.


>
>
> greetings,
> Netanel
>
> ‫בתאריך יום א׳, 17 בנוב׳ 2024 ב-1:50 מאת ‪Arne Schwabe‬‏ <‪
> a...@rfc2549.org‬‏>:‬
>
>>
>> Am 16.11.2024 um 20:22 schrieb נתי שטרן:
>> >
>> > Dear OpenVPN Security Team,
>> >
>> > This report describes a potential vulnerability impacting OpenVPN,
>> > version 2.6, exhibiting behavior indicative of denial-of-service (DoS)
>> > conditions. The observed behavior strongly suggests a susceptibility
>> > to attacks that exhaust server resources through repeated failed TLS
>> > handshakes, causing frequent process restarts.
>> >
>> This is statement is not true. There is no indication of a server
>> exhaustion in what you writing.
>>
>>
>> > Observed Behavior: Consistent TLS handshake failures, resulting in
>> > automatic server restarts, are observed. Log entries indicate
>> > escalating restart delays (initially 80 seconds, then consistently 300
>> > seconds), demonstrating the server's attempt to mitigate this pattern
>> > but without success.
>> >
>> As already explained to you, that is called exponentional backoff, it is
>> documented in the documentation under the --connect-retry option.
>> > Evidence: The attached log file (openvpn_log.txt - replace this with
>> > the actual filename if you're sending it as an attachment) details
>> > these repeated failures. Key entries include:
>> >
>> Attachment missing but doesn't matter because the behaviour is intended
>> and expected behaviour.
>>
>>
>> >     Repeated "TLS key negotiation failed to occur within 5 seconds
>> > (check your network connectivity)" errors.
>> >
>> You have a quite tight connect timeout. Normal timeout is 60s and not 5s.
>>
>>
>> >     Corresponding "TLS handshake failed" errors.
>> >
>> >     SIGUSR1[soft,tls-error] signals, triggering server restarts.
>> >
>> > Reproducibility: While we can't definitively prove reproducibility
>> > without controlled testing, the consistent pattern, occurring even
>> > over extended periods with incrementally increasing retry timeouts
>> > strongly suggest either network unreliability combined with server
>> > inadequacies to handle such errors gracefully, or a clear, repeatable
>> > exploitation approach capable of inducing sustained stress on OpenVPN
>> > instances without actual service outage
>>
>> Your argumentation makes no sense to make. A client doing exponential
>> backoff is not an indication that the server is overloaded. Hint: Look
>> what happens if TCP makes a connection attempt, SYN packets will show a
>> similar pattern of exponential backoff.
>>
>> > .
>> >
>> > Suspected Vulnerabilities: The observed behaviour suggests at least
>> > one of the following:
>> YOu are doing a wild guess and that wild guess is wrong. Please stop
>> trying to hallucinate a vulnerability where none exists.
>> > .
>> >
>> > Mitigating Factors: The self-mitigation measures already apparent in
>> > the server configuration include automatic restart after timeout.
>> > These automatic retries, combined with increasingly long durations for
>> > the forced pauses before restarting (80, then repeatedly 300 seconds)
>> > suggest attempts to alleviate this behaviour. They fail consistently.
>> >
>> This conclusion is wrong as said before.
>>
>>
>> > Analysis: The consistent failure rate combined with increased server
>> > pause intervals indicates that a self-mitigation measure implemented
>> > by the OpenVPN server processes appears not fully effective at
>> > recovering this. The frequency, and repetition, is far more aligned
>> > with possible DoS exploit capabilities and repeated attack attempts,
>> > far more than what could be considered a networking error of sorts
>> > only, regardless of network configuration changes attempted.
>> >
>> > Client Configuration: The attached OpenVPN client configuration file
>> > (openvpn_config.txt - again, use the correct filename) is provided for
>> > context
>> You are confusing a client behaviour with a server behaviour.
>> > .
>> >
>> > Additional Notes: The frequent WARNING: normally if you use --mssfix
>> > and/or --fragment, you should also set --tun-mtu 1500 (currently it is
>> > 1450) messages suggest potential MTU/MSS issues, which may be
>> > unrelated to this main security risk issue or be an intrinsic cause
>> > instead. This would require extensive and highly targeted tests to
>> > validate the implication. Further investigation will be required.
>> >
>> > We request your attention and an evaluation of this matter to
>> > establish if it constitutes a vulnerability eligible for CVE assignment.
>>
>> THE ANWSER IS STILL NO. You don't even describing a bug or anything
>> else. You are reporting the indented and desired behaviour. That is not
>> CVE or even bug worthy in the slightest.
>>
>> Please have a proper evaluation and stop some throwing some random
>> nonsense over and over again at our mailing list when you already been
>> told that this is INDENTED behaviour.
>>
>> Arne
>>
>>
>
> --
> <https://netanel.ml>
> _______________________________________________
> Openvpn-devel mailing list
> Openvpn-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openvpn-devel
>
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to