Re: [Openvpn-users] Openvpn -- unable to generate keys

2014-01-21 Thread Jakob Curdes

> To find out what went wrong, you need to have some understanding of 
> certificates and the openssl application and scripts. There are other 
> tools that will allow you to create and maintain a CA depending on 
> your requirements, one thing holds true however: The CA must not be on 
> your production system nor on any other vulnerable system, best is a 
> completely offline systems behind thick concrete walls. That said, I 
> am using a portable version of XCA on a memory stick.
And another very important point: write down the CA password in a place 
where you can find it again. I am speaking with experience :-)) .
JC


--
CenturyLink Cloud: The Leader in Enterprise Cloud Services.
Learn Why More Businesses Are Choosing CenturyLink Cloud For
Critical Workloads, Development Environments & Everything In Between.
Get a Quote or Start a Free Trial Today. 
http://pubads.g.doubleclick.net/gampad/clk?id=119420431&iu=/4140/ostg.clktrk
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] Does OpenVPN use the TLS heartbeat extension? (OpenSSL Security Advisory CVE-2014-0160)

2014-04-08 Thread Jakob Curdes


> Thank you James. I reached the same conclusion myself. I've been
> working on it since early this morning.
>
> This means that most consumer VPN services are at least vulnerable to
> getting their private TLS key stolen, and also usernames, passwords,
> session keys and so on. As you pointed out, tls-auth is irrelevant if
> the attacker knows the key, which is the case for consumer VPNs.
Wait, I do not think that this is true. The Attacker has the key for 
TLS-Auth only if he previously gained access to the client system in 
another way [which probably means he has access to the unencrypted 
network traffic anyway]. If he just has the network stream he will not 
be able to decipher the TLS communication without the key which is never 
transferred via the network (unless it has been transferred via network 
when installing it... ).

Another interesting question: everybody is talking about Perfect Forward 
Secercy to avoid deciphering past communications; are we sure OpenVPN 
implements this?
I do not think this is a configurable item !?

Best regards,
Jakob Curdes


--
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] Does OpenVPN use the TLS heartbeat extension? (OpenSSL Security Advisory CVE-2014-0160)

2014-04-08 Thread Jakob Curdes

Am 08.04.2014 15:13, schrieb Joe Patterson:
> I think that what's being referred to here is that a VPN service with 
> multiple independent clients could have one nefarious client who used 
> a valid client key/cert to establish a session, then used that session 
> plus this vulnerability to compromise the server's private key, plus 
> usernames, passwords, and session keys of other clients of that VPN 
> service.
But I think this only holds if the ***Server*** openssl library is still 
vulnerable. The client never gets the server's private key, so it cannot 
be proliferated in this way. Naturally we all need to update the servers 
ASAP, but can we continue to use clients with old openssl DLL's?

JC


--
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] Successful private key extraction from OpenVPN using Heartbleed

2014-04-16 Thread Jakob Curdes
Actually, I think for most installations it is worse than your sentence 
"we believe it may severely impact those who have not already upgraded" 
may sound like.
The problem is that even for installations that were upgraded 
immediately after the disclosure of the openssl bug we cannot be sure 
that private keys etc. might not have been stolen BEFORE the hole was 
publicly known. There are strong hints that knowledge of the problem was 
present long before last tuesday.
So it probably means that any OpenVPN installation that was not 
protected by a TA key (or where the TA key is distributed to lots of 
users)  needs to recreate the certificates used for the server and the 
clients.

Perhaps you or the openvpn developers can elaborate a bit on what can be 
found in the respective memory area; I understand you managed to get a 
private key or parts of it; what about password hashes used by plugins 
e.g.? Because this could mean that these passwords, which might be used 
in very different contexts if e.g. we talk about a PAM plugin, need to 
be changed too. And this would open attack vectors that are nor related 
to OpenVPN anymore.

Regards,
Jakob Curdes


> Hi openvpn-users,
>
> We have successfully extracted private key material multiple times
> from an OpenVPN server by exploiting the Heartbleed Bug. The material
> we found was sufficient for us to recreate the private key and
> impersonate the server.
>
> As you may know, OpenVPN has an SSL/TLS mode where certificates are
> used for authentication. OpenVPN multiplexes the SSL/TLS session used
> for authentication and key exchange with the actual encrypted tunnel
> data stream. The default TLS library for OpenVPN is OpenSSL. Since
> OpenVPN uses the OpenSSL library but merely passes through the TLS
> traffic to OpenSSL, this means that OpenVPN is exploitable using
> Heartbleed, in theory. However, until now there hasn't been any solid
> evidence that private key material can be extracted from OpenVPN just
> like it has from some web servers.
>
> This was the server setup we used:
> Ubuntu 12.04 (VM using KVM)
> OpenVPN 2.2.1
> OpenSSL 1.0.1-4ubuntu5.11
>
> Our exploit is decently weaponized, and while the code is an
> abomination that even Eris would be embarrassed to present, we believe
> it may severely impact those who have not already upgraded. Therefore,
> we will not be publishing the code. Nevertheless, you should assume
> that other teams with more nefarious purposes have already created
> weaponized exploits for OpenVPN. Just to be clear, we don't intend to
> use this exploit ourselves. We merely developed it to examine the
> practical impact on OpenVPN as part of our incident investigation.
>
> To our knowledge there is currently one published proof of concept
> script that checks an OpenVPN server's vulnerability to Heartbleed.
>
> It should be noted that OpenVPN provides a feature called tls-auth
> where a HMAC key is used to authenticate the packets that are
> themselves part of the TLS handshake sequence. This protects against
> Heartbleed to the extent that the HMAC key is kept secret. This means
> that while a small business may benefit from using tls-auth because
> only the employees have access to the key, a public VPN service such
> as ours does not, because anyone who is a customer has access to the
> key.
>
> Private questions that are not requests for the exploit can be emailed
> to stromb...@insto.org or ad...@mullvad.net (PGP: 0x2C62E8AE).
>
> Best regards,
> Fredrik Strömberg
> Co-founder of Mullvad
>
> --
> Learn Graph Databases - Download FREE O'Reilly Book
> "Graph Databases" is the definitive new guide to graph databases and their
> applications. Written by three acclaimed leaders in the field,
> this first edition is now available. Download your free book today!
> http://p.sf.net/sfu/NeoTech
> ___
> Openvpn-users mailing list
> Openvpn-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openvpn-users


--
Learn Graph Databases - Download FREE O'Reilly Book
"Graph Databases" is the definitive new guide to graph databases and their
applications. Written by three acclaimed leaders in the field,
this first edition is now available. Download your free book today!
http://p.sf.net/sfu/NeoTech
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] heartbleed and openvpn

2014-04-21 Thread Jakob Curdes

Am 21.04.2014 06:07, schrieb fausto milinazzo:
> In using the heartbleed exploit to obtain the root certificate and 
> personal keys from an openvpn server was it necessary to have use a 
> valid certificate?  I would guess that to determine whether a 
> particular server is vulnerable does not require a valid certificate 
> so it may be possible to carry out such an attack without a valid 
> certificate.
As far as I understand it, the exploit happens during the negotiation of 
parameters for the connection and thus does not require a valid 
certificate, i.e. any system trying to establish a connection was able 
to look into the exposed part of the process memory. Anyway the problem 
is not the certificate but the fact that the server host key and/or 
other credentials may have been stolen. If you have a small installation 
and TLS auth in place, you may get away with leaving things as they are, 
but the general recommendation in this case is to replace host keys, 
certificates, and other credentials used in the process.

Best regards,
Jakob Curdes

--
Start Your Social Network Today - Download eXo Platform
Build your Enterprise Intranet with eXo Platform Software
Java Based Open Source Intranet - Social, Extensible, Cloud Ready
Get Started Now And Turn Your Intranet Into A Collaboration Platform
http://p.sf.net/sfu/ExoPlatform
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] OpenVPN client log file filling up hard drives on random computers

2015-11-20 Thread Jakob Curdes

> Would the server config file affect the log level on the client side?
No. Some server side configuration items might do, though, in 
conjunction with a non-matching client side configuration.

JC

--
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] OpenVPN over ssh tunnel

2017-01-02 Thread Jakob Curdes


Am 02.01.2017 um 11:21 schrieb Tibin Geo k k:
> How to connect OpenVPN through ssh tunnel, I have configured OpenVPN 
> server on a ubuntu machine, and it is working fine, recently my 
> network admin blocked connection to external vpn.
I think if your network admin blocked connections to external VPN'S you 
should not try to circumvent that; it could have severe personal and 
legal consequences. Typically companies do not encourage their staff to 
remote-control private external servers from their office and during 
worktime
JC

--
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


[Openvpn-users] OpenVPN Client 2FA problem with Backslash

2022-03-10 Thread Jakob Curdes

Hello all,

we are trying to implement 2FA for several existing Firebox SSL VPNs 
(which essentially uses OpenVPN on server and client side). The remote 
users all use the Windows OpenVPN client. This works perfectly without 
2FA, and it works also if you do not need to specify the authentication 
domain on user logon. But for the migration it is necessary to do that 
as I cannot convert all users at once - the domain you enter in the 
username field is then "authpoint" instead of something like 
"company.private". In the 2FA process, the OpenVPN client then opens a 
text window where you can enter a TOTP token or a "p" for a push 
request. This all works with the default domain set, but not when 
specifying a domain with a backslash:


Thu Mar 10 10:35:31 2022 VERIFY OK: depth=0, O=WatchGuard_Technologies, 
OU=Fireware, CN=Fireware SSLVPN Server
Thu Mar 10 10:35:31 2022 Control Channel: TLSv1.2, cipher TLSv1.2 
ECDHE-RSA-CHACHA20-POLY1305, peer certificate: 2048 bit RSA, signature: 
RSA-SHA256
Thu Mar 10 10:35:31 2022 [Fireware SSLVPN Server] Peer Connection 
Initiated with [AF_INET]1.2.3.4:443

Thu Mar 10 10:35:32 2022 MANAGEMENT: >STATE:1646904932,GET_CONFIG,,
Thu Mar 10 10:35:32 2022 SENT CONTROL [Fireware SSLVPN Server]: 
'PUSH_REQUEST' (status=1)
Thu Mar 10 10:35:32 2022 AUTH: Received control message: 
AUTH_FAILED,CRV1:R,E:1796:Yoirtuqeprtiqrew4==:*Type "p" to receive a 
push notification or type your one-time password*
Thu Mar 10 10:35:32 2022 SIGUSR1[soft,auth-failure] received, process 
restarting
Thu Mar 10 10:35:32 2022 MANAGEMENT: 
>STATE:1646904932,RECONNECTING,auth-failure,

Thu Mar 10 10:35:32 2022 Restart pause, 5 second(s)
*Thu Mar 10 10:35:40 2022 Previous command sent to management failed: 
ERROR: Options warning: Bad backslash ('\') usage in TCP:0: remember 
that backslashes are treated as shell-escapes and if you need to pass 
backslash characters as part of a Windows filename, you sho*
Thu Mar 10 10:35:40 2022 MANAGEMENT: CMD 'username "Auth" 
"*authpoint\UserName*"'

Thu Mar 10 10:35:40 2022 MANAGEMENT: CMD 'password [...]'

This sounds like I need to escape the backslash, but if I do this the 
Auth fails completely before the 2FA part comes into the picture. I fear 
that the normal user authentication part and the 2FA code treat 
backslashes differently... how can I get this going, if at all? Should I 
contact the openvpn-devel list for this?


Best regards and thank you for hints,

Jakob Curdes

___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] OpenVPN Client 2FA problem with Backslash

2022-03-10 Thread Jakob Curdes


Am 10.03.2022 um 12:22 schrieb Jan Just Keijser:




Thu Mar 10 10:35:32 2022 Restart pause, 5 second(s)
*Thu Mar 10 10:35:40 2022 Previous command sent to management failed: 
ERROR: Options warning: Bad backslash ('\') usage in TCP:0: remember 
that backslashes are treated as shell-escapes and if you need to pass 
backslash characters as part of a Windows filename, you sho*
Thu Mar 10 10:35:40 2022 MANAGEMENT: CMD 'username "Auth" 
"*authpoint\UserName*"'

Thu Mar 10 10:35:40 2022 MANAGEMENT: CMD 'password [...]'

This sounds like I need to escape the backslash, but if I do this the 
Auth fails completely before the 2FA part comes into the picture. I 
fear that the normal user authentication part and the 2FA code treat 
backslashes differently... how can I get this going, if at all? 
Should I contact the openvpn-devel list for this?





before getting into whether this is a bug or not :   most 
Windows-based authentication systems also accept authpoint/Username 
(i.e. forward slash).


Other than that, this does seem to be one for the -devel list, as I 
suspect that in manage.c the "parse_line" call does not differentiate 
between file paths (for which \\ is needed) and a "domain\username" call.


Alternatively, you might be able to get away with specifying 
username@FQDN as well.



Hello Jan, hello all,

thank you for these ideas  - I had already tried the forward slash, 
without success. I now also tried "@", but this does not work either; I 
suspect the server side (i.e. the WatchGaurd auth module)  does not 
understand the login then. Ok, so I will ask on the -devel list. If I 
have a solution I will add it here. Thank you.


___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] OpenVPN Client 2FA problem with Backslash

2022-03-10 Thread Jakob Curdes

Hello Selva, hello all,




If you are using OpenVPN-GUI for Windows, looks like a bug. I guess, 
by text window, you mean the challenge-response dialog that the GUI 
pops up for 2FA.



Yes exactly.
Username is first input in the username/password dialog and that seems 
to succeed with the backslash in it. You should be able to see that 
the username is passed to management with the backslash replaced by 
"\\" (escaped). Then the challenge response dialog is shown when 
AUTH_FAILED with challenge is received where the user types the 
response. In that round the username is submitted again and that seems 
to be failing. Looks like a bug in the GUI -- we are not expanding the 
string when submitted from that dialog. generally we use 
ManagementCommandFromInput() to submit user input and that does the 
escaping, but for this username which is not input by user but passed 
in by the server, we send it directly without escaping. Will fix if 
that is indeed the case.
This sounds like a perfect description of what I am seeing. I can send 
you complete logs off-list.


As a quick fix, username@domain instead of domain\username may 
work with your server.


Sadly no, the authentication is passed back by the embedded openvpn 
server to the WatchGuard Auth engine, which seems to choke one verything 
but "\" .
This is no problem when you have just one authentication method, as then 
you just specify the username. But when using AD directly as well as the 
2FA servive "AuthPoint", in a transition period, you cannot do this with 
the OpenVPN client as you would prepend the AD domain or the "authpoint" 
domain to the username, which then leads to the error in the second auth 
round.


Best regards, Jakob Curdes

___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] Do most commercial firewall appliances and VPN routers have OpenVPN-powered SSL VPN?

2022-11-14 Thread Jakob Curdes
I know from personal hands-on that the WatchGuard SSL VPN is an Open VPN 
variant. You can even use the OpenVPN client to connect to it, or their 
own client.


Regards, Jakob


Am 14.11.2022 um 16:24 schrieb Gert Doering:

Hi,

On Mon, Nov 14, 2022 at 10:51:29PM +0800, Turritopsis Dohrnii Teo En Ming wrote:

Do most commercial firewall appliances and VPN routers have OpenVPN-powered
SSL VPN? Is there an official list?

"most" is a very uncertain term :-)

I'd say there is quite a number of Linux- or FreeBSD-based VPN/Firewall
appliances on the market, and those that do SSL VPN are very often
OpenVPN based.

On the other side, Cisco ASA, Fortinet, and such brethen are usually
"we can make your own mistakes!!" proprietary implementations...

gert



___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

--
Jakob Curdes





Anschrift

iS information systems oHG

Donnerschweer Str. 89-91
D-26123 Oldenburg
Tel.: (0)441 - 92 31 99 0
Fax: (0)441 - 92 31 99 99










Web: www.info-systems.de <https://www.info-systems.de>


Firmierung und Handelsregisterangaben finden Sie unter diesem Link: 
Firmendaten <https://www.info-systems.de/legal/>
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] OpenVPN on port 443

2024-01-23 Thread Jakob Curdes



Am 23.01.2024 um 13:32 schrieb Peter Davis via Openvpn-users:

Hello,
I want to use OpenVPN and HTTPS. I found the following article:

(...)
 server 20.20.0.0 255.255.255.0   
First of all, from where did you take that IP network? This is not a 
private network range as far as I know.
When you use a public network range, many things will not work at all or 
not work reliably. You need to use a private IP network (192.168., 
172.17, 10.x) for your internal networks.


Hope this helps, JC




___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


Re: [Openvpn-users] Critical OpenVPN Zero-Day Flaws Affecting Millions of Endpoints Across the Globe

2024-05-13 Thread Jakob Curdes

Hi,

these vulnerabilities are already fixed in the current versions since 
March 2024, so if you keep your software up to date, there is no threat. 
Also they are limited to Windws environments and not easy to exploit. 
See: https://openvpn.net/security-advisories/


So the subject of your mail seems at least a bit exaggerated.

Regards, JC


Am 13.05.2024 um 14:59 schrieb Turritopsis Dohrnii Teo En Ming via 
Openvpn-users:

Subject: Critical OpenVPN Zero-Day Flaws Affecting Millions of Endpoints Across 
the Globe

Good day from Singapore,

I have just read this article and I would like to share it with all of you here.

Article: Critical OpenVPN Zero-Day Flaws Affecting Millions of Endpoints Across 
the Globe
Link: https://cybersecuritynews.com/openvpn-zero-day-flaws/

Thank you.

Regards,

Mr. Turritopsis Dohrnii Teo En Ming
Targeted Individual in Singapore
Blogs:
https://tdtemcerts.blogspot.com
https://tdtemcerts.wordpress.com
GIMP also stands for Government-Induced Medical Problems.







___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users




___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users


[Openvpn-users] OpenVPN and CWE-316?

2024-08-13 Thread Jakob Curdes

Hello all,

in Germany we are reading articles like this one:

https://www.heise.de/news/Schwere-Luecke-bei-kritischen-Anwendungen-Klartextpasswoerter-im-Prozessspeicher-9830774.html

https://www.secuvera.de/blog/studie-klartextpassworter-in-passwortspeichern/

which mentions CWE-316: "Cleartext Storage of Sensitive Information in 
Memory"



(I could not find an english discussion about openvpn, but reddit has 
this: 
https://www.reddit.com/r/1Password/comments/1eqdllw/cwe316_cleartext_storage_of_sensitive_information/?rdt=39150)



The original seccuvera article states that OpenVPN (I assume they mean 
the Windows client) is "vulnerable" to this weakness and leaves data 
like emails, passwords and 2FA codes in the main memory after the 
program is closed. I have not tested this myself so I canot say if that 
is true.


If it is true, is this already known and could it be addressed somehow?
Some password managers that have also been tested seem to clear all 
these data when the program is closed.



Regards, Jakob



___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users