The interesting lines are these:
2024-11-18T20:53:01+1100 [stdout#info] [OVPN 0]
OUT: '2024-11-18 09:53:01 152.32.247.23:55730
Non-OpenVPN client protocol detected'
These lines indicates the server seems to be configured with
--port-share. And those packets are forwarded to the service behind
OpenVPN. In this case OpenVPN behaves like a proxy.
2024-11-19T01:13:00+1100 [stdout#info] [OVPN 1]
OUT: '2024-11-18 14:13:00 TLS Error:
tls-crypt unwrapping failed from [AF_INET]195.28.180.102:36515
(via [AF_INET]103.6.170.21%eth0)'
2024-11-19T01:13:35+1100 [stdout#info] [OVPN 1]
OUT: '2024-11-18 14:13:35 tls-crypt unwrap error: packet too short'
That just means someone is trying to connect to the server not using
--tls-crypt or --tls-crypt-v2. In this case, your client configuration
uses --tls-auth, which will result in this kind of error and not being
able to connect.
I believe --mute will reduce the number of duplicated log lines in these
cases on the server side.
I am not able to see anything extraordinary in these log lines. This is
just plain misconfiguration.
Since you seem to run OpenVPN Access Server, just log into the web
portal and download a new configuration profile.
This has certainly nothing to do with any kind of security issues.
--
kind regards,
David Sommerseth
OpenVPN Inc
On 18/11/2024 15:17, נתי שטרן wrote:
*_
_*
*_server logs:_*
[...snip...]
בתאריך יום ב׳, 18 בנוב׳ 2024 ב-13:58 מאת Илья Шипицин
<chipits...@gmail.com <mailto:chipits...@gmail.com>>:
I initially thought it was not your server, because you told us that
you do not have server logs.
do you have at least any client packet that reaches server ?
(I know you may ask how to check that. I'd choose tcpdump. in case
if you wish to ask how to use tcpdump - sorry, no answer. Please use
the tool of your choice, whatever you are comfortable with)
if no packet reaches server, most probably you did not open firewall
(either on vm itself or in cloud level).
(if you are going to ask how to manage firewall on vm or cloud
level, sorry, no idea here, please consult cloud guides or contact
cloud support).
пн, 18 нояб. 2024 г. в 12:43, נתי שטרן <nsh...@gmail.com
<mailto:nsh...@gmail.com>>:
How to solve this problem?
because both the client and server are my own
בתאריך יום ב׳, 18 בנוב׳ 2024 ב-12:04 מאת David Sommerseth
<dazo+open...@eurephia.org
<mailto:dazo%2bopen...@eurephia.org>>:
Please stop now.
A client which cannot reach a server because the client side
has
connectivity issues towards the server is not a DoS, it is
not a CVE and
will never be considered a security issue.
First of all, a DoS attack is commonly related to a SERVER
becoming
unresponsive due to traffic to the server causing it to stop
responding.
Or that one VPN clients misbehaviour (not due to
misconfiguration,
though) results in no other clients being able to connect.
What you have described so far is that you cannot reach the
server. And
OpenVPN tries to reconnect regularly. This is the expected
behaviour of
most VPN clients - they try to keep the tunnel running with
as little
user interaction as possible. The back-off timer is there
to also
needlessly keep trying if there seems to be longer persisting
connectivity issues.
And just to entertain you a bit more. This is the logs when
using
OpenVPN 3 Linux:
----------------------------------------------------------------------------
Press CTRL-C to stop the connection
2024-11-18 09:59:19.854568 [STATUS] (StatusMajor.CONNECTION,
StatusMinor.CFG_OK)
config_path=/net/openvpn/v3/configuration/4c2bba36x2151x4291xb7acx360000375d2a
2024-11-18 09:59:19.854636 [LOG] Starting connection
2024-11-18 09:59:19.854694 [LOG] Using DNS resolver scope:
global
2024-11-18 09:59:19.862369 [LOG] [Connect] DCO flag: disabled
2024-11-18 09:59:19.862479 [STATUS] (StatusMajor.CONNECTION,
StatusMinor.CONN_CONNECTING)
2024-11-18 09:59:19.862548 [LOG] [Core] OpenVPN core v3.10.1
linux
x86_64 64-bit OVPN-DCO
2024-11-18 09:59:19.862596 [LOG] [Core] Frame=512/2112/512
mssfix-ctrl=1250
2024-11-18 09:59:19.862636 [LOG] Resolving
2024-11-18 09:59:19.866525 [LOG] [Core] Contacting
103.6.170.21:1194 <http://103.6.170.21:1194> via UDP
2024-11-18 09:59:19.866638 [LOG] Waiting for server response
2024-11-18 09:59:19.878505 [LOG] [Core] Connecting to
[103.6.170.21]:1194 (103.6.170.21) via UDP
2024-11-18 09:59:29.861733 [LOG] [Core] Server poll timeout,
trying next
remote entry...
2024-11-18 09:59:29.861875 [LOG] Resolving
2024-11-18 09:59:29.865648 [LOG] [Core] Contacting
103.6.170.21:1194 <http://103.6.170.21:1194> via UDP
2024-11-18 09:59:29.865769 [LOG] Waiting for server response
2024-11-18 09:59:29.876299 [LOG] [Core] Connecting to
[103.6.170.21]:1194 (103.6.170.21) via UDP
2024-11-18 09:59:39.862254 [LOG] [Core] Server poll timeout,
trying next
remote entry...
2024-11-18 09:59:39.862347 [LOG] Resolving
2024-11-18 09:59:39.866157 [LOG] [Core] Contacting
103.6.170.21:1194 <http://103.6.170.21:1194> via UDP
2024-11-18 09:59:39.866262 [LOG] Waiting for server response
2024-11-18 09:59:39.877288 [LOG] [Core] Connecting to
[103.6.170.21]:1194 (103.6.170.21) via UDP
2024-11-18 09:59:49.862757 [LOG] [Core] Server poll timeout,
trying next
remote entry...
2024-11-18 09:59:49.862852 [LOG] Resolving
2024-11-18 09:59:49.866514 [LOG] [Core] Contacting
103.6.170.21:1194 <http://103.6.170.21:1194> via UDP
2024-11-18 09:59:49.866614 [LOG] Waiting for server response
2024-11-18 09:59:49.875998 [LOG] [Core] Connecting to
[103.6.170.21]:1194 (103.6.170.21) via UDP
2024-11-18 09:59:59.863047 [LOG] [Core] Server poll timeout,
trying next
remote entry...
2024-11-18 09:59:59.863179 [LOG] Resolving
2024-11-18 09:59:59.866699 [LOG] [Core] Contacting
103.6.170.21:1194 <http://103.6.170.21:1194> via UDP
2024-11-18 09:59:59.866798 [LOG] Waiting for server response
2024-11-18 09:59:59.876724 [LOG] [Core] Connecting to
[103.6.170.21]:1194 (103.6.170.21) via UDP
2024-11-18 10:00:09.863146 [LOG] [Core] Server poll timeout,
trying next
remote entry...
2024-11-18 10:00:09.863242 [LOG] Resolving
2024-11-18 10:00:09.867305 [LOG] [Core] Contacting
103.6.170.21:1194 <http://103.6.170.21:1194> via UDP
2024-11-18 10:00:09.867406 [LOG] Waiting for server response
2024-11-18 10:00:09.879292 [LOG] [Core] Connecting to
[103.6.170.21]:1194 (103.6.170.21) via UDP
2024-11-18 10:00:19.863499 [LOG] [Core] Server poll timeout,
trying next
remote entry...
2024-11-18 10:00:19.863623 [LOG] Resolving
2024-11-18 10:00:19.867758 [LOG] [Core] Contacting
103.6.170.21:1194 <http://103.6.170.21:1194> via UDP
2024-11-18 10:00:19.867845 [LOG] Waiting for server response
2024-11-18 10:00:19.879066 [LOG] [Core] Connecting to
[103.6.170.21]:1194 (103.6.170.21) via UDP
^C
Disconnecting...
Connection statistics:
BYTES_OUT: 2814
PACKETS_OUT: 67
N_RECONNECT: 6
----------------------------------------------------------------------------
This needs to stop. This is not a CVE. This is an OpenVPN
server which
doesn't respond on port 1194/udp.
If you want to keep some kind of credibility with any
security teams,
you need to back down and spend time looking for real issues
and
document it far better. And you will need to provide the
server side
perspective as well, not just the client side.
Once again: Clients not being able to connect to the server
because of
network connectivity issues is not a CVE.
This case is closed.
--
kind regards,
David Sommerseth
OpenVPN Inc
On 18/11/2024 08:37, נתי שטרן wrote:
> What can I do to assign a CVE?
> I attached the CVE team of ISRAEL CERT to conversation
>
> tnx
>
> בתאריך יום ב׳, 18 בנוב׳ 2024 ב-9:29 מאת Илья Шипицин
> <chipits...@gmail.com <mailto:chipits...@gmail.com>
<mailto:chipits...@gmail.com <mailto:chipits...@gmail.com>>>:
>
> As many details as possible. Configuration file
usually helps.
>
> Other than that also server side logs are nice to
have. As well as
> the detailed repro steps
>
> On Mon, Nov 18, 2024, 08:27 נתי שטרן
<nsh...@gmail.com <mailto:nsh...@gmail.com>
> <mailto:nsh...@gmail.com <mailto:nsh...@gmail.com>>>
wrote:
>
> Do you want the configuration file?
>
> בתאריך יום ב׳, 18 בנוב׳ 2024 ב-9:14 מאת Gert
Doering
> <g...@greenie.muc.de
<mailto:g...@greenie.muc.de> <mailto:g...@greenie.muc.de
<mailto:g...@greenie.muc.de>>>:
>
> Hi,
>
> On Mon, Nov 18, 2024 at 09:09:57AM +0200,
?????? ???????? wrote:
> > I don't have access to server logs, I sent
you the client
> logs as well as
> > the line pointing to the DoS:
> > TLS Error: TLS key negotiation failed to
occur within 5
> seconds
> > SIGUSR1[soft,tls-error] received, process
restarting
>
> What makes you think it's a DoS that can be
fixed by a code
> change?
>
> If you break the network, programs will not
be able to
> connect - and there
> is nothing "a patch to the software" will be
able to fix.
>
> gert
> --
> "If was one thing all people took for
granted, was
> conviction that if you
> feed honest figures into a computer, honest
figures come
> out. Never doubted
> it myself till I met a computer with a
sense of humor."
> Robert A.
Heinlein, The Moon
> is a Harsh Mistress
>
> Gert Doering - Munich, Germany
g...@greenie.muc.de <mailto:g...@greenie.muc.de>
> <mailto:g...@greenie.muc.de
<mailto:g...@greenie.muc.de>>
>
>
>
> --
> <https://netanel.ml <https://netanel.ml>>
> _______________________________________________
> Openvpn-devel mailing list
> Openvpn-devel@lists.sourceforge.net
<mailto:Openvpn-devel@lists.sourceforge.net>
> <mailto:Openvpn-devel@lists.sourceforge.net
<mailto:Openvpn-devel@lists.sourceforge.net>>
>
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
<https://lists.sourceforge.net/lists/listinfo/openvpn-devel>
>
<https://lists.sourceforge.net/lists/listinfo/openvpn-devel <https://lists.sourceforge.net/lists/listinfo/openvpn-devel>>
>
>
>
> --
> <https://netanel.ml <https://netanel.ml>>
--
<https://netanel.ml>
--
<https://netanel.ml>
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel