-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/11/09 00:17, David Sommerseth wrote: > > But to be honest, it would be greatly appreciated if an official > statement about how the developers see the situation as well. This is > such a critical flaw which really need some critical eyes into the > OpenVPN code by someone who can understand it well. Just to confirm or > reject the current assumptions. I'm not comfortable with the little > discussion this thread has generated. >
Just a little follow up, with a clearer explanation of this flaw: <http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html> kind regards, David Sommerseth >> Mr. Olli escreveu: >>> Hi, >>> >>> I understand your point. tls-auth seems to be the best work-around >>> currently. >>> > > > > (further info about mail thread from openvpn-users list) > >> On Sat, 2009-11-07 at 11:00 +0100, David Sommerseth wrote: >>>> On 06/11/09 20:21, Mike Tancsa wrote: >>>>>>>>>> Hi Everyone, >>>>>>>>>> Just wondering if the issue identified at >>>>>>>>>> http://extendedsubset.com/ impacts OpenVPN. >>>>>>>>>> >>>> >>>> I've read through the proposed RFC [1] for a fix to the TLS > protocol. I >>>> am by no means a security expert, but from what I can understand this >>>> can be a potential issue for OpenVPN as well. Anyhow, the solution is >>>> most probably not to fix OpenVPN but the TLS protocol. But I do > see one >>>> feature which can make OpenVPN a little bit safer in the mean > time, more >>>> on that later on. >>>> >>>> A simple explanation, how I've understood it: The problem is that the >>>> TLS and SSL protocols allows a renegotiation of the secured channel. >>>> This even happens in clear text, as far as I can understand. The >>>> problem is that this is now discovered to be prune to a MITM attack. >>>> The attacker can issue such a renegotiation request to an already >>>> on-going secured channel, and then the attacker will send the > agreed TLS >>>> handshake further to the client. The attacker will not be able to > read >>>> the the client-server traffic, but when the attacker can now > contact the >>>> server, where the server do not differentiate the traffic from the >>>> attacker or the real client. >>>> >>>> The proposed solution is to extend the TLS protocol with a 12 > bytes long >>>> string with information generated during the first initial > negotiation, >>>> as a way to authenticate the renegotiation request. On clients which >>>> supports this sends this info to a server and the server do not > respond >>>> back in this information, it should close the connection. >>>> >>>> On the server side, the server should decline to renegotiate the > channel >>>> unless the client supports this new feature. That way, a connection >>>> will not be closed on the server side with older clients which don't >>>> support this feature but prevents a MITM attack. >>>> >>>> In regards to OpenVPN, I don't know how OpenVPN will react if it >>>> receives network packets which the OpenSSL implementation believes is >>>> from a trusted host, while it in reality is a attacker. And > further, I >>>> don't know how OpenVPN will handle the situation of one real > client and >>>> in parallel having an active channel to an attacker. I don't believe >>>> the OpenVPN protocol does any kind of authentication of the decrypted >>>> OpenVPN packets. This should really be investigated further, to > see the >>>> complete impact of this failure in the SSL/TLS protocols. >>>> >>>> The solution which I believe can be OpenVPN's way how to handle this >>>> situation until OpenSSL is fixed is to make use of the --tls-auth >>>> feature. This implies the clients must have a distributed static > key in >>>> addition, and the OpenVPN server will not respond to network packets >>>> which do not provide correct HMAC control packets which is based > on this >>>> static key. >>>> >>>> >>>> kind regards, >>>> >>>> David Sommerseth >>>> >>>> >>>> >>>> [1] >>>> > <http://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt> >>>>>> - - - ------------------------------------------------------------------------------ Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day trial. Simplify your report design, integration and deployment - and focus on what you do best, core application coding. Discover what's new with Crystal Reports now. http://p.sf.net/sfu/bobj-july _______________________________________________ Openvpn-users mailing list openvpn-us...@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iEYEARECAAYFAkr4MyMACgkQDC186MBRfroEkQCgla+Wn1+E5pjEUE2x80zGlHYq 5jAAoKSgj5Ch0mGSco+9/MzllQqIsy/K =G7eM -----END PGP SIGNATURE-----