Re: [Openvpn-devel] Questions related to the SSL renegotiation vulnerability

2009-11-12 Thread Matt Wilks
Yes indeed. Much appreciated James. Matt. Dunc wrote: I see, Thanks very much for clearing that up James. Cheers, Dunc James Yonan wrote: Well the problem is that even though OpenVPN doesn't rely on OpenSSL renegotiations, it does not explicitly disable them. So to be safe, it's better

Re: [Openvpn-devel] Questions related to the SSL renegotiation vulnerability

2009-11-12 Thread Dunc
I see, Thanks very much for clearing that up James. Cheers, Dunc James Yonan wrote: > Well the problem is that even though OpenVPN doesn't rely on OpenSSL > renegotiations, it does not explicitly disable them. So to be safe, > it's better to upgrade to the fixed version of OpenSSL (0.9.8l).

Re: [Openvpn-devel] Questions related to the SSL renegotiation vulnerability

2009-11-12 Thread James Yonan
Well the problem is that even though OpenVPN doesn't rely on OpenSSL renegotiations, it does not explicitly disable them. So to be safe, it's better to upgrade to the fixed version of OpenSSL (0.9.8l). Also note that using tls-auth prevents the cited MITM attack (CVE-2009-3555) even when usin

Re: [Openvpn-devel] Questions related to the SSL renegotiation vulnerability

2009-11-12 Thread Dunc
Hi James, Thanks for getting back to me. I was starting to wonder the same myself, but when I found this thread http://article.gmane.org/gmane.network.openvpn.user/28105 I thought I must be missing something. So if OpenVPN always uses a new session, what would be the point of adding an option

Re: [Openvpn-devel] Questions related to the SSL renegotiation vulnerability

2009-11-12 Thread James Yonan
OpenVPN uses a fresh SSL/TLS session for each of its mid-session renegotiations. This means that when you see: TLS: soft reset sec=0 bytes=314/0 pkts=6/0 OpenVPN is actually creating a brand new SSL/TLS session. So the important point here is that OpenVPN does not rely on the session rene