Am 16.11.19 um 11:57 schrieb Gert Doering:
> Hi,
> 
> On Sat, Nov 16, 2019 at 11:01:24AM +0100, Boris wrote:
>> on a friends linux router I found a running openvpn 2.0. We are in
>> trouble with this router because of repeatedly connection requests that
>> are unsuccessful but kill the openvpn server after some time.
> 
> So the "openvpn 2.0" on the router is killed after some time (due to
> back packets coming from the Internet), or is *this* process killing 
> another server?
> 
> Generally speaking: use tls-auth.  This will stop all packets from
> unauthorized sources from generating state and eating memory in the
> openvpn server process (it will still eat up some CPU, but if that is
> enough to crash the server, you need a faster CPU - or move the openvpn
> service to another port).

Hej Gert,

thanks a lot for your statement.

Yes, the openvpn daemon is dying from all those requests.

Is it that section,that you suggest to be enabled?
:

# For extra security beyond that provided
# by SSL/TLS, create an "HMAC firewall"
# to help block DoS attacks and UDP port flooding.
#
# Generate with:
#   openvpn --genkey --secret ta.key
#
# The server and each client must have
# a copy of this key.
# The second parameter should be '0'
# on the server and '1' on the clients.
;tls-auth ta.key 0 # This file is secret

Thanks,

Boris


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to