On 2009.11.08 at 00:17:38 +0100, David Sommerseth wrote:

> 
> Well said!  Thank you for emphasising this.  In my earlier posts, I
> never intended to suggest that this was a work around, just to be clear
> about that.  But --tls-auth is now, how I see it, the only way currently
> available "immediately" (vs. waiting for openssl to be widely available
> on all distros) which can make you safer against the current SSL/TLS flaw.

Can anybody explain, how the "current SSL/TLS flaw" can be used to
exploit OpenVPN.

As far as I can understand this flaw is ability to upgrade secure
connection from non-authenticated to authenticated transparently to
application layer. If then application applies security context of the
upgraded connection retroactively to the data send by non-authenticated
client before upgrading, exploit is possible.

This is typical behavoir of HTTP servers, which allows https connection
without client authentication, and then request renegotiation based on
URL send by encrypted, but not-authenticated connection, and if proper
client certificate is supplied - perform request send before
authentication.

Moreover, attacker cannot even read result of this request, because it
is send over upgraded coonection.

So, it is not really applicable to any connection-based protocols which
maintain state. Only stateless HTTPS is vulnerable.
I cannot imagine even  IMAP exploit, because IMAP severely limits set of
commands, available in the pre-auth state.

But OpenVPN uses TLS for authentication and key negotiation only.
So, non-authenticated man-in-the-middle attacker cannot send any commands 
which would be executed after attacker hand connection over to
legitimate client.


Reply via email to