Hi,

On Mon, May 05, 2014 at 07:51:23PM +0200, David Sommerseth wrote:
> > ARP spoofing might indeed work.  So don't use TAP.  Don't use TAP
> > anyway, unless you have a very strong reason to do so, and this is
> > usually along the lines of "I need dynamic routing protocols to
> > work across OpenVPN".
> 
> Just thinking aloud, and haven't dug into the code on this.  Doesn't
> OpenVPN have a map of remote clients, MAC addresses and VPN IP
> addresses?  (Thinking of the learn-address-phase which kicks off when
> traffic begins to pass over the TAP tunnel).  Changing your MAC
> address to become a different client would definitely confuse OpenVPN,
> but would it really work?  Wouldn't it just result in a DoS for the
> targeted client until the attack stops?

Since you can have bridged client setups, the OpenVPN server will just
learn additional MAC addresses.

I'm not sure what would happen if client A starts using the mac address
of client B.  Either the server will ignore that ("I already know!") or
kick out client B from the forwarding table, and send the packets to A.

Either way "what a normal switch does".  Don't use TAP.

gert


-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: pgp77pbJ5f1qL.pgp
Description: PGP signature

------------------------------------------------------------------------------
Is your legacy SCM system holding you back? Join Perforce May 7 to find out:
• 3 signs your SCM is hindering your productivity
• Requirements for releasing software faster
• Expert tips and advice for migrating your SCM now
http://p.sf.net/sfu/perforce
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to