-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 04/05/14 21:51, Gert Doering wrote:
> Hi,
> 
> On Sun, May 04, 2014 at 08:08:54PM +0100, Jonathan Tripathy wrote:
>> I still think the OP has asked a very good question.
>> 
>> Whilst the traffic won't physically go to C (at least for TUN 
>> networks), an answer would be great regarding whether C could
>> de-crypt the traffic using the keys he/she has.
> 
> Of course not.  The session key is negotiated between each client
> and the server as part of the TLS handshake, and that is unique for
> each client.

That is correct, but I wanted to clarify a few minor details.

If you're using a PKI setup, which is required when you have multiplie
clients connected simultaneously, each client has a separate private
key and negotiates its own session key (which is also changed
regularly, according to --reneg-* options).

But if you are using a static key, only one client can connect to the
remote side.  If two clients have access to the same server using
static keys (which would be a really stupid setup!), both clients can
decrypt the tunnel traffic, just by sniffing the network.  This is
because static setups does not have any session key.

>> Another thing to remember is that for TAP network, C could
>> potentially get some of the traffic if ARP goes funny etc...
> 
> ARP spoofing might indeed work.  So don't use TAP.  Don't use TAP
> anyway, unless you have a very strong reason to do so, and this is
> usually along the lines of "I need dynamic routing protocols to
> work across OpenVPN".

Just thinking aloud, and haven't dug into the code on this.  Doesn't
OpenVPN have a map of remote clients, MAC addresses and VPN IP
addresses?  (Thinking of the learn-address-phase which kicks off when
traffic begins to pass over the TAP tunnel).  Changing your MAC
address to become a different client would definitely confuse OpenVPN,
but would it really work?  Wouldn't it just result in a DoS for the
targeted client until the attack stops?


- -- 
kind regards,

David Sommerseth
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlNnz5sACgkQDC186MBRfrqsOgCeMwcdVAlxnVA5lHUO5eL96++K
0OwAmgOEEzPJ/qIIFUuxyWF6nSWPPpfz
=YBW/
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Is your legacy SCM system holding you back? Join Perforce May 7 to find out:
• 3 signs your SCM is hindering your productivity
• Requirements for releasing software faster
• Expert tips and advice for migrating your SCM now
http://p.sf.net/sfu/perforce
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to