Just wondering...
This bleeding isn't only about openvpn, but all that uses an unpatch
openssl-lib.
On the heartbleed-bug-live-blog, they advice to regenerate private-key, and
request/replace ssl-certificate. Just in case.
That is all very well for people using self-signed certs and file based-keys,
but how about keys stored on smartcards?
Those keys cannot be replaced :(
Hw
From: Joe Patterson [mailto:j.m.patter...@gmail.com]
Sent: dinsdag 8 april 2014 15:55
To: Jakob Curdes
Cc: openvpn users list (openvpn-users@lists.sourceforge.net)
Subject: Re: [Openvpn-users] Does OpenVPN use the TLS heartbeat extension?
(OpenSSL Security Advisory CVE-2014-0160)
Very true. I mean, a malicious server could compromise clients, but I was
thinking more along the lines of malicious clients compromising servers, which
would require the server to be un-patched. If you run a server, definitely
patch. If you're a client, patch anyway, for reasons beyond openvpn. But the
frustrating thing here is that, as a client, it's hard to be certain that the
server you are connecting to has been patched, or even if it has been, that its
key was not compromised before it was patched.
On Tue, Apr 8, 2014 at 9:48 AM, Jakob Curdes
<j...@info-systems.de<mailto:j...@info-systems.de>> wrote:
Am 08.04.2014 15:13, schrieb Joe Patterson:
I think that what's being referred to here is that a VPN service with multiple
independent clients could have one nefarious client who used a valid client
key/cert to establish a session, then used that session plus this vulnerability
to compromise the server's private key, plus usernames, passwords, and session
keys of other clients of that VPN service.
But I think this only holds if the ***Server*** openssl library is still
vulnerable. The client never gets the server's private key, so it cannot be
proliferated in this way. Naturally we all need to update the servers ASAP, but
can we continue to use clients with old openssl DLL's?
JC
______________________________________________________________________
Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet
de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt u
verzocht dat aan de afzender te melden en het bericht te verwijderen. De Staat
aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die verband
houdt met risico's verbonden aan het electronisch verzenden van berichten.
This message may contain information that is not intended for you. If you are
not the addressee or if this message was sent to you by mistake, you are
requested to inform the sender and delete the message. The State accepts no
liability for damage of any kind resulting from the risks inherent in the
electronic transmission of messages.
------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users