Hi,

On Sun, May 04, 2014 at 08:08:54PM +0100, Jonathan Tripathy wrote:
> I still think the OP has asked a very good question.
>
> Whilst the traffic won't physically go to C (at least for TUN 
> networks), an answer would be great regarding whether C could de-crypt 
> the traffic using the keys he/she has.

Of course not.  The session key is negotiated between each client and
the server as part of the TLS handshake, and that is unique for each
client.

> Another thing to remember is that for TAP network, C could potentially 
> get some of the traffic if ARP goes funny etc...

ARP spoofing might indeed work.  So don't use TAP.  Don't use TAP anyway,
unless you have a very strong reason to do so, and this is usually along
the lines of "I need dynamic routing protocols to work across OpenVPN".

gert

-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: pgpAMkzWT8kng.pgp
Description: PGP signature

------------------------------------------------------------------------------
"Accelerate Dev Cycles with Automated Cross-Browser Testing - For FREE
Instantly run your Selenium tests across 300+ browser/OS combos.  Get 
unparalleled scalability from the best Selenium testing platform available.
Simple to use. Nothing to install. Get started now for free."
http://p.sf.net/sfu/SauceLabs
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to