|
From: נתי ש. <ns...@gm...> - 2024-11-17 03:45:42
|
hi, I send logs: greetings, Netanel בתאריך יום א׳, 17 בנוב׳ 2024 ב-1:50 מאת Arne Schwabe <ar...@rf... >: > > Am 16.11.2024 um 20:22 schrieb נתי שטרן: > > > > Dear OpenVPN Security Team, > > > > This report describes a potential vulnerability impacting OpenVPN, > > version 2.6, exhibiting behavior indicative of denial-of-service (DoS) > > conditions. The observed behavior strongly suggests a susceptibility > > to attacks that exhaust server resources through repeated failed TLS > > handshakes, causing frequent process restarts. > > > This is statement is not true. There is no indication of a server > exhaustion in what you writing. > > > > Observed Behavior: Consistent TLS handshake failures, resulting in > > automatic server restarts, are observed. Log entries indicate > > escalating restart delays (initially 80 seconds, then consistently 300 > > seconds), demonstrating the server's attempt to mitigate this pattern > > but without success. > > > As already explained to you, that is called exponentional backoff, it is > documented in the documentation under the --connect-retry option. > > Evidence: The attached log file (openvpn_log.txt - replace this with > > the actual filename if you're sending it as an attachment) details > > these repeated failures. Key entries include: > > > Attachment missing but doesn't matter because the behaviour is intended > and expected behaviour. > > > > Repeated "TLS key negotiation failed to occur within 5 seconds > > (check your network connectivity)" errors. > > > You have a quite tight connect timeout. Normal timeout is 60s and not 5s. > > > > Corresponding "TLS handshake failed" errors. > > > > SIGUSR1[soft,tls-error] signals, triggering server restarts. > > > > Reproducibility: While we can't definitively prove reproducibility > > without controlled testing, the consistent pattern, occurring even > > over extended periods with incrementally increasing retry timeouts > > strongly suggest either network unreliability combined with server > > inadequacies to handle such errors gracefully, or a clear, repeatable > > exploitation approach capable of inducing sustained stress on OpenVPN > > instances without actual service outage > > Your argumentation makes no sense to make. A client doing exponential > backoff is not an indication that the server is overloaded. Hint: Look > what happens if TCP makes a connection attempt, SYN packets will show a > similar pattern of exponential backoff. > > > . > > > > Suspected Vulnerabilities: The observed behaviour suggests at least > > one of the following: > YOu are doing a wild guess and that wild guess is wrong. Please stop > trying to hallucinate a vulnerability where none exists. > > . > > > > Mitigating Factors: The self-mitigation measures already apparent in > > the server configuration include automatic restart after timeout. > > These automatic retries, combined with increasingly long durations for > > the forced pauses before restarting (80, then repeatedly 300 seconds) > > suggest attempts to alleviate this behaviour. They fail consistently. > > > This conclusion is wrong as said before. > > > > Analysis: The consistent failure rate combined with increased server > > pause intervals indicates that a self-mitigation measure implemented > > by the OpenVPN server processes appears not fully effective at > > recovering this. The frequency, and repetition, is far more aligned > > with possible DoS exploit capabilities and repeated attack attempts, > > far more than what could be considered a networking error of sorts > > only, regardless of network configuration changes attempted. > > > > Client Configuration: The attached OpenVPN client configuration file > > (openvpn_config.txt - again, use the correct filename) is provided for > > context > You are confusing a client behaviour with a server behaviour. > > . > > > > Additional Notes: The frequent WARNING: normally if you use --mssfix > > and/or --fragment, you should also set --tun-mtu 1500 (currently it is > > 1450) messages suggest potential MTU/MSS issues, which may be > > unrelated to this main security risk issue or be an intrinsic cause > > instead. This would require extensive and highly targeted tests to > > validate the implication. Further investigation will be required. > > > > We request your attention and an evaluation of this matter to > > establish if it constitutes a vulnerability eligible for CVE assignment. > > THE ANWSER IS STILL NO. You don't even describing a bug or anything > else. You are reporting the indented and desired behaviour. That is not > CVE or even bug worthy in the slightest. > > Please have a proper evaluation and stop some throwing some random > nonsense over and over again at our mailing list when you already been > told that this is INDENTED behaviour. > > Arne > > -- <https://netanel.ml> |