-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/11/09 00:17, David Sommerseth wrote:
> 
> But to be honest, it would be greatly appreciated if an official
> statement about how the developers see the situation as well.  This is
> such a critical flaw which really need some critical eyes into the
> OpenVPN code by someone who can understand it well.  Just to confirm or
> reject the current assumptions.  I'm not comfortable with the little
> discussion this thread has generated.
> 


Just a little follow up, with a clearer explanation of this flaw:
<http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html>


kind regards,

David Sommerseth


>> Mr. Olli escreveu:
>>> Hi,
>>>
>>> I understand your point. tls-auth seems to be the best work-around
>>> currently.
>>>   
> 
> 
> 
> (further info about mail thread from openvpn-users list)
> 
>> On Sat, 2009-11-07 at 11:00 +0100, David Sommerseth wrote:
>>>> On 06/11/09 20:21, Mike Tancsa wrote:
>>>>>>>>>> Hi Everyone,
>>>>>>>>>>          Just wondering if the issue identified at
>>>>>>>>>> http://extendedsubset.com/ impacts OpenVPN.
>>>>>>>>>>
>>>>
>>>> I've read through the proposed RFC [1] for a fix to the TLS
> protocol.  I
>>>> am by no means a security expert, but from what I can understand this
>>>> can be a potential issue for OpenVPN as well.  Anyhow, the solution is
>>>> most probably not to fix OpenVPN but the TLS protocol.  But I do
> see one
>>>> feature which can make OpenVPN a little bit safer in the mean
> time, more
>>>> on that later on.
>>>>
>>>> A simple explanation, how I've understood it:  The problem is that the
>>>> TLS and SSL protocols allows a renegotiation of the secured channel.
>>>> This even happens in clear text, as far as I can understand.  The
>>>> problem is that this is now discovered to be prune to a MITM attack.
>>>> The attacker can issue such a renegotiation request to an already
>>>> on-going secured channel, and then the attacker will send the
> agreed TLS
>>>> handshake further to the client.  The attacker will not be able to
> read
>>>> the the client-server traffic, but when the attacker can now
> contact the
>>>> server, where the server do not differentiate the traffic from the
>>>> attacker or the real client.
>>>>
>>>> The proposed solution is to extend the TLS protocol with a 12
> bytes long
>>>> string with information generated during the first initial
> negotiation,
>>>> as a way to authenticate the renegotiation request.  On clients which
>>>> supports this sends this info to a server and the server do not
> respond
>>>> back in this information, it should close the connection.
>>>>
>>>> On the server side, the server should decline to renegotiate the
> channel
>>>> unless the client supports this new feature.  That way, a connection
>>>> will not be closed on the server side with older clients which don't
>>>> support this feature but prevents a MITM attack.
>>>>
>>>> In regards to OpenVPN, I don't know how OpenVPN will react if it
>>>> receives network packets which the OpenSSL implementation believes is
>>>> from a trusted host, while it in reality is a attacker.  And
> further, I
>>>> don't know how OpenVPN will handle the situation of one real
> client and
>>>> in parallel having an active channel to an attacker.  I don't believe
>>>> the OpenVPN protocol does any kind of authentication of the decrypted
>>>> OpenVPN packets.  This should really be investigated further, to
> see the
>>>> complete impact of this failure in the SSL/TLS protocols.
>>>>
>>>> The solution which I believe can be OpenVPN's way how to handle this
>>>> situation until OpenSSL is fixed is to make use of the --tls-auth
>>>> feature.  This implies the clients must have a distributed static
> key in
>>>> addition, and the OpenVPN server will not respond to network packets
>>>> which do not provide correct HMAC control packets which is based
> on this
>>>> static key.
>>>>
>>>>
>>>> kind regards,
>>>>
>>>> David Sommerseth
>>>>
>>>>
>>>>
>>>> [1]
>>>>
> <http://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt>
>>>>>>

- -
-
------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day
trial. Simplify your report design, integration and deployment - and
focus on
what you do best, core application coding. Discover what's new with
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
_______________________________________________
Openvpn-users mailing list
openvpn-us...@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkr4MyMACgkQDC186MBRfroEkQCgla+Wn1+E5pjEUE2x80zGlHYq
5jAAoKSgj5Ch0mGSco+9/MzllQqIsy/K
=G7eM
-----END PGP SIGNATURE-----

Reply via email to