I'd like to note that running OpenVPN client in a separate Linux network
namespace (together with applications that need to use it) disables this attack,
but this is not as simple to setup as would be if OpenVPN supported it: see
https://github.com/OpenVPN/openvpn/pull/60 . (The resulting network structure is
the same as in https://www.wireguard.com/netns/ )

* Pippin via Openvpn-users <openvpn-users@lists.sourceforge.net> [2019-12-06]
> Hi,
>
> please see here:
> https://openvpn.net/no-flaws-found-in-openvpn-software/
>
>
>
>
> Sent with ProtonMail Secure Email.
>
> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> On Friday 6 December 2019 11:52, Kenneth Porter <sh...@sewingwitch.com> wrote:
>
> > https://www.bleepingcomputer.com/news/security/new-linux-vulnerability-lets-attackers-hijack-vpn-connections/
> >
> > It seems to be related to the rp_filter setting in some distros, and the
> > lack of an iptables rule to prevent spoofing against the virtual interface
> > using a physical interface.


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to