> Thank you James. I reached the same conclusion myself. I've been
> working on it since early this morning.
>
> This means that most consumer VPN services are at least vulnerable to
> getting their private TLS key stolen, and also usernames, passwords,
> session keys and so on. As you pointed out, tls-auth is irrelevant if
> the attacker knows the key, which is the case for consumer VPNs.
Wait, I do not think that this is true. The Attacker has the key for 
TLS-Auth only if he previously gained access to the client system in 
another way [which probably means he has access to the unencrypted 
network traffic anyway]. If he just has the network stream he will not 
be able to decipher the TLS communication without the key which is never 
transferred via the network (unless it has been transferred via network 
when installing it... ).

Another interesting question: everybody is talking about Perfect Forward 
Secercy to avoid deciphering past communications; are we sure OpenVPN 
implements this?
I do not think this is a configurable item !?

Best regards,
Jakob Curdes


------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to