Folks,

I understand clearly enough that determining your vulnerability to 
Heartbleed is actually pretty straight forward, i.e. do you have and did 
you compile with the affect OpenSSL lib's.

However I have a few circumstances where I'd like to be able to 
specifically confirm or deny the bleed.

I've tried taking some of the openssl s_connect variations on a theme to 
check a running instance of ovpn (with tls-auth disabled - just for 
test) but all of these tools are based upon the interaction with a TCP 
sockets on a WWW/Proxy server.

For example I've taken this article.

https://blog.ipredator.se/2014/04/how-to-test-if-your-openssl-heartbleeds.html

which let's you very visibly verify if you have the issue. However I've 
tried this technique against OVPN running both TCP and UDP (using the 
-dtls1 switch on s_connect) however the negotiation of the connections 
never seem to reveal the same amount of SSL / TLS information that these 
techniques do when pointed to a web server.

Any idea's on how one might be able to test specifically against a 
running openvpn binary.

Thanks

Colin

------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to