On 23-04-15 08:58, Gert Doering wrote:
> On Wed, Apr 22, 2015 at 05:25:54PM -0700, blz wrote:
>>> The server will just update its "what IP/port is the client on?" table
>>> entry, without restarting anything.
>>
>> What I'm wondering is how secure that is, such as how easily one could
>> fake such a reconnect to get in on someone else's session, where they
>> wouldn't even need a key? I hope this is just good ol' fashion paranoia
>> on my part, but it would be nice to know. Thanks.
>
> The server updates its table entry only if the packet's HMAC validates,
> read "the client knows the key material for that particular session".

It is even better: the server checks both the HMAC /and/ replay 
protection before updating its table entry. This means that an attacker 
also can't use older, previously valid, packets to mount a 
denial-of-service attack.

-Steffan

------------------------------------------------------------------------------
BPM Camp - Free Virtual Workshop May 6th at 10am PDT/1PM EDT
Develop your own process in accordance with the BPMN 2 standard
Learn Process modeling best practices with Bonita BPM through live exercises
http://www.bonitasoft.com/be-part-of-it/events/bpm-camp-virtual- event?utm_
source=Sourceforge_BPM_Camp_5_6_15&utm_medium=email&utm_campaign=VA_SF
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to