Hi Jason,

On 01/09/14 00:55, Jason Haar wrote:
> Hi there
>
> I've seen a few people claim it's "more secure" to force the clients to
> use stronger ciphers via the "tls-cipher" option: it's stops MiTM
> attacks from spoofing lower-quality connections.
>
> However, surely that depends on when the negotiation occurs? If it
> occurs after the TLS auth section, surely that would have picked up the
> MiTM and ditched the connection anyway? And what about "tls-auth"? We
> use that, so wouldn't that have break MiTM anyway?
>
> What I'd rather do is keep the clients as "open" as possible and make as
> many cipher/etc decisions as possible on the server, so I'd rather not
> define tls-cipher on the clients, only the server. So am I correct in
> saying that an openvpn network using tls-auth plus client certs should
> be effectively immune to MiTM attacks, thereby making it OK to leave as
> much decision making as possible to the server?
the 'tls-cipher' negotiation is the first part of any OpenVPN 
connection. It is used to initialize the contol channel authentication. 
The control channel init phase can be strengthened with the 'tls-auth' 
option, which causes openvpn to drop any packets that are not signed 
with the right key.

In my opinion the *clients* do not need to specify a stronger list of 
tls-ciphers, but the server should. If the openvpn server only offers 
strong ciphers for negotiating the control channel setup then any 
clients that want to use weak ciphers are automatically excluded.

If a weak tls-cipher is chosen then a MitM attack is theoretically 
possible , or at least someone might be able to decipher the control 
channel part too quickly.  The data channel part is not affected by this.

Hope this clarifies things,

JJK

PS I'll get back to you on the udp fragment stuff later this week - I 
need to run some tests to validate my claims


------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to