On 03/03/17 14:04, saato...@keemail.me wrote:
> Hi!
> I'm working on a tool assessing my OpenVPN server and to speed up the
> process I'm trying to establish multiple OpenVPN connections between a
> single client and my OpenVPN server.
> 
> All established connections should share the configuration and client
> keys on the client.
> 
> Without any special adjustments or modification I get the following
> error (timestamps and IPs omitted/redacted):
> 
> 
>     OpenVPN 2.4.0 [git:master/f5bf296bacce76a8+] x86_64-pc-linux-gnu
> [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built
> on Dec 29 2016
>     library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.08
>     TCP/UDP: Preserving recently used remote address: [AF_INET]
> 127.0.0.2:443
>     TCP/UDP: Socket bind failed on local address [AF_INET][undef]:443:
> Address already in use
>     Exiting due to fatal error
> 
> 
> The server configuration looks as follows for the moment:
>      server 172.16.0.0 255.255.255.0
>      port 443
>      proto udp
>      dev tun
>      ca /etc/openvpn/server/ca.crt
>      cert /etc/openvpn/server/server.crt
>      key /etc/openvpn/server/server.key
>      dh /etc/openvpn/server/dh4096.pem
>      tls-crypt /etc/openvpn/server/tls-crypt.key
>      tls-version-min 1.2
>      tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
>      cipher AES-256-CBC
>      auth SHA512
>      verb 3
>      comp-lzo
>      duplicate-cn
> 
> Is there any way to establish multiple connections from a single client
> to a single server?

Not within the same client configuration (single process connecting to
multiple servers or more times to the same server).  But you can have
multiple OpenVPN client processes running against the same server.  But
it is advisable to add --nobind to the client configurations.


And a side-track ...

Just a detail, I see you use --auth SHA512.  I'd probably recommend you
it use SHA256 or SHA384, even though in HMAC context (which --auth is
all about) even SHA1 is safe.  SHA512 doesn't give that much extra
security compared SHA256/SHA384, but it requires more CPU cycles of work.

Also, if all your clients are going to be v2.4 based, you can even move
up to --cipher AES-256-GCM  (in this case --auth doesn't have any
effect, as GCM pulls in a different authentication scheme which can't be
changed).  If you have a few 2.3 clients, you can add --ncp-cipher
AES-256-GCM:AES-256-CBC which allows those client configurations to use
--cipher AES-256-CBC.

One of my 2.4 servers have --cipher AES-256-CBC
--ncp-cipher AES-256-GCM:AES-128-GCM:AES-256-CBC:AES-128-CBC.  There is
a variety of 2.3, 2.4 and git-master clients, which connects using
--cipher {AES-128-CBC, AES-256-CBC, AES-256-GCM}.  The 2.4/git master
clients not having --cipher AES-256-GCM in the client configurations are
automatically upgraded to that.

And just to mention it. You will also find people saying that AES-128 is
mostly more than safe enough today as AES-256 isn't considered that much
stronger [1], but it adds more CPU cycles for the outcome.  However, if
I have understood this correctly (I'm no cryptographer), if accounting
for a post-quantum world AES-256 increases the difficulty over AES-128.
But I do not know how this changes between the various
AES-*-{CBC,CFB,OFB} vs AES-*-GCM.

[1] <https://www.schneier.com/blog/archives/2011/08/new_attack_on_a_1.html>


--
kind regards,

David Sommerseth

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to