Re: [Openvpn-users] doubts about possible sniffing

2014-05-06 Thread Gert Doering
Hi, On Tue, May 06, 2014 at 02:04:05PM +, Andy Wang wrote: > Thanks Gert for detail education. Follow Jason's advice I've done some simple > test using ettercap in my environment which is openvpn-2.1.1 and you were > right, the OpenVPN can't protect the client from arp spoofing which is real

Re: [Openvpn-users] doubts about possible sniffing

2014-05-06 Thread Andy Wang
Thanks Gert for detail education. Follow Jason's advice I've done some simple test using ettercap in my environment which is openvpn-2.1.1 and you were right, the OpenVPN can't protect the client from arp spoofing which is really bad. I will try the latest 2.3.4 to see if it is still broken a

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread Jason Haar
There's a lot of good chatter going on about this topic, but at the end of the day all that matters is whether any of this *conjecture* is real or not. Someone actually using TAP mode and interested in this subject should actually *test it* and see what happens In the immortal words of djb: "profi

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread Gert Doering
Hi, On Mon, May 05, 2014 at 07:10:42PM +, Andy Wang wrote: > *ARP* spoofing does not target the "switch" (OpenVPN) but the communication > endpoints. > > You tell A "the mac address for B is C". > > You tell B "the mac address for A is C". > > And both will happily send all their packets f

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread Andy Wang
-Original Message- From: Gert Doering [mailto:g...@greenie.muc.de] Sent: May-05-14 2:53 PM To: Andy Wang Cc: 'Gert Doering'; openvpn-users@lists.sourceforge.net Subject: Re: [Openvpn-users] doubts about possible sniffing Hi, On Mon, May 05, 2014 at 06:38:35PM +, Andy

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread Gert Doering
Hi, On Mon, May 05, 2014 at 06:38:35PM +, Andy Wang wrote: > with that in hand, I would consider mac-cert-remoteipandport have a very > strong binding and it is not easy to break it by just ARP spoofing. *ARP* spoofing does not target the "switch" (OpenVPN) but the communication endpoints.

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread Andy Wang
-Original Message- Hi, On Mon, May 05, 2014 at 07:51:23PM +0200, David Sommerseth wrote: > > ARP spoofing might indeed work. So don't use TAP. Don't use TAP > > anyway, unless you have a very strong reason to do so, and this is > > usually along the lines of "I need dynamic routing pro

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread Gert Doering
Hi, On Mon, May 05, 2014 at 08:31:19PM +0200, David Sommerseth wrote: > > Which OpenVPN does not do (and neither do most switches, even > > fairly expensive L3 switch stuff). In TAP mode, all it cares about > > is MAC addresses. > > I see ... but if a spoofed packet is sent, wouldn't return pack

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread David Sommerseth
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/05/14 20:12, Gert Doering wrote: > Hi, > > On Mon, May 05, 2014 at 07:57:50PM +0200, David Sommerseth wrote: >> But, that doesn't mean that all kind of attacks will work. >> Because OpenVPN does some checks on the packets it receives and >> forw

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread Gert Doering
Hi, On Mon, May 05, 2014 at 07:57:50PM +0200, David Sommerseth wrote: > But, that doesn't mean that all kind of attacks will work. Because > OpenVPN does some checks on the packets it receives and forwards. So > there is a chance OpenVPN won't make ARP spoofing work too easily, > compared to swi

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread Gert Doering
Hi, On Mon, May 05, 2014 at 07:51:23PM +0200, David Sommerseth wrote: > > ARP spoofing might indeed work. So don't use TAP. Don't use TAP > > anyway, unless you have a very strong reason to do so, and this is > > usually along the lines of "I need dynamic routing protocols to > > work across Ope

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread David Sommerseth
Subject: Re: [Openvpn-users] doubts about possible sniffing >> >> Of course not. The session key is negotiated between client and >> the server as part of the TLS handshake, and is unique for each >> client. > > Sure, but there is nothing "of course" about it.

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread David Sommerseth
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04/05/14 22:31, Jason Haar wrote: > The way I look at it (and hopefully I'm correct - I've never used > tap so I haven't tested that), "tun" interfaces are like > traditional physical point-to-point WAN links - and one WAN link > cannot see the traf

Re: [Openvpn-users] doubts about possible sniffing

2014-05-05 Thread David Sommerseth
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04/05/14 21:51, Gert Doering wrote: > Hi, > > On Sun, May 04, 2014 at 08:08:54PM +0100, Jonathan Tripathy wrote: >> I still think the OP has asked a very good question. >> >> Whilst the traffic won't physically go to C (at least for TUN >> networ

Re: [Openvpn-users] doubts about possible sniffing

2014-05-04 Thread david
> -Original Message- > From: Gert Doering [mailto:g...@greenie.muc.de] > Sent: Monday, 5 May 2014 5:51 AM > To: Jonathan Tripathy > Cc: openvpn-users@lists.sourceforge.net > Subject: Re: [Openvpn-users] doubts about possible sniffing > > Of course not. The s

Re: [Openvpn-users] doubts about possible sniffing

2014-05-04 Thread Jason Haar
The way I look at it (and hopefully I'm correct - I've never used tap so I haven't tested that), "tun" interfaces are like traditional physical point-to-point WAN links - and one WAN link cannot see the traffic from another WAN link. Similarly, "tap" interfaces are equivalent to a *switch* - not an

Re: [Openvpn-users] doubts about possible sniffing

2014-05-04 Thread Gert Doering
Hi, On Sun, May 04, 2014 at 08:08:54PM +0100, Jonathan Tripathy wrote: > I still think the OP has asked a very good question. > > Whilst the traffic won't physically go to C (at least for TUN > networks), an answer would be great regarding whether C could de-crypt > the traffic using the keys he

Re: [Openvpn-users] doubts about possible sniffing

2014-05-04 Thread Jonathan Tripathy
On 2014-05-04 19:52, Gert Doering wrote: > Hi, > > On Sun, May 04, 2014 at 08:31:21PM +0200, Pol Hallen wrote: >> Hi folks, I'm sorry if my question is trivial... >> >> My situation: 1 openvpn server, many clients over internet that uses >> openvpn >> >> My doubt is: if a client (A) exchange dat

Re: [Openvpn-users] doubts about possible sniffing

2014-05-04 Thread Gert Doering
Hi, On Sun, May 04, 2014 at 08:31:21PM +0200, Pol Hallen wrote: > Hi folks, I'm sorry if my question is trivial... > > My situation: 1 openvpn server, many clients over internet that uses openvpn > > My doubt is: if a client (A) exchange data from/to other client (B) with > ftp protocol, another

[Openvpn-users] doubts about possible sniffing

2014-05-04 Thread Pol Hallen
Hi folks, I'm sorry if my question is trivial... My situation: 1 openvpn server, many clients over internet that uses openvpn My doubt is: if a client (A) exchange data from/to other client (B) with ftp protocol, another client (C) can sniff the traffic from A to B? if yes, is it clear traffic? (