Hi Jason,

On 07-10-14 21:59, Jason Haar wrote:
> One thing we're doing is allowing "duplicate-cn", but using our NAC test
> to reject clients using the same cert (get better logging of the
> offenders that way). Anyway, I have a Mac and Windows box set up to use
> the same cert to test this, and it causes an interesting situation...
> 
> First client connects, second client connects, NAC script notices the
> same cert in use and kills the first connection. Second client later
> hangs up. If I then look at the first client hours later, it still
> thinks it's logged in! There is no error, it still has the tun interface
> up, but no traffic flows. The server shows no connection via either
> client (I use the management api to confirm that)
> 
> We use "--ping", and tcpdump confirms the  first client and server are
> still exchanging packets - but the server does not classify the client
> as being connected. But as the openvpn pings are still working, the
> client doesn't know it's actually disconnected. A simple "kill -HUP" on
> the client fixes everything as it forces a full restart
> 
> So I have two questions:
> 
> 1. The client uses "explicit-exit-notify" - but it looks like using the
> kill management command on the server does not tell the client it is
> hanging up? Wouldn't that be a good idea?

Sounds like a reasonable plan to me, yes. Then again, I'm not very
familiar the networking bits of openvpn.

> 2. The fact that ping is still working makes me think that means ping
> must be *separate* from session management? Isn't that a bad idea?

In OpenVPN each connection actually consists of two. One 'control' and
one 'data' channel. The control channel is actually the TLS connection,
which is set up by the TLS/SSL library. The ping packets are sent over
the control channel, indicating that the TLS connection is still fully
functional. Seems like OpenVPN is shutting down the data channel, but
not (successfully) shutting down the control channel. Sounds like a bug
to me.

-Steffan

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to