Hi,

On Tue, May 06, 2014 at 02:04:05PM +0000, Andy Wang wrote:
> Thanks Gert for detail education. Follow Jason's advice I've done some simple 
> test using ettercap in my environment which is openvpn-2.1.1 and you were 
> right, the OpenVPN can't protect the client from arp spoofing which is really 
> bad. 
> 
> I will try the latest 2.3.4 to see if it is still broken and try to fix it.

Save yourself the effort.  As I told you, there is no code in OpenVPN
that would validate IP/MAC relationships for the inside IP address - and
that is *hard*.  If it were easy, normal switch vendors would all do this.

Basically you need a way to assign "this is the right mapping", which you
do not have authority over - the client could have a statically configured
IP address, and a random MAC on his TAP adapter that changes on every 
VPN connection.  So you need to sniff "initial ARP packets" and glean
from there the IP/ARP binding if and only if the address is not already 
locked elsewhere.

gert
-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: pgpTuA4x9Fij1.pgp
Description: PGP signature

------------------------------------------------------------------------------
Is your legacy SCM system holding you back? Join Perforce May 7 to find out:
• 3 signs your SCM is hindering your productivity
• Requirements for releasing software faster
• Expert tips and advice for migrating your SCM now
http://p.sf.net/sfu/perforce
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to