On 24/10/14 08:54, Michael Deynet wrote:
> Hello,
> last week I had a trip to china and I used OpenVPN. OpenVPN worked
> well but looking into the server logs I'm a little bit confused.
> After the VPN connection was established from the hotel IP
> (116.6.x.yy) another IP tried to connect to the VPN, too (every time a
> used vpn, not only once). Can anyone tell me what exactly happend? Is
> there a security problem with the VPN server?

Looks to me like something is trying to check out the servers that
hotel's customers connect to. I can't tell if this is UDP or TCP or even
the port, but if you were running openvpn on tcp port 443, this could be
a SSL intercept proxy trying to get your HTTPS public key so it can do
man-in-the-middle against your "HTTPS" connections

Obviously that wouldn't work. As long as you've got tls-auth in use, I
think you're good to go :-)

SSL intercept I could understand as almost "normal" behaviour these days
(ie ignorable). However, if your clients use UDP, this would smell like
a  pretty serious effort to gather information about what that hotel's
customers connect to (or you in particular...). The complete
non-relationship between the two IPs also means it could be the Great
Firewall of China is doing this - it doesn't necessarily have anything
to do with the hotel. Certainly interesting :-)

PS: of course it could also be a coincidence. Our openvpn routers get
hit by bots all the time - precisely because we have it running on HTTPS
port. So a bit of luck in the timing could end with logs implying a
correlation between a client connect and a bot that really doesn't exist

-- 
Cheers

Jason Haar
Corporate Information Security Manager, Trimble Navigation Ltd.
Phone: +1 408 481 8171
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1

------------------------------------------------------------------------------
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to