>> Hi,
>>
>> Am 08.04.2014 15:42, schrieb Steffan Karger:
>>>> Perhaps a dumb question, but if the server instance is linked
>>>> against an older version of openssl (9.8.x), but the client is
>>>> compiled and linked against the vulnerable version, is it still an
>>>> issue for both sides, or is the client going to leak private
>>>> information ?
>>> The client can then leak keys (both private master key and session
>>> keys), which completely breaks your secure connection, for that
>>> client.
>>>
>>> So when the server is not vulnerable, each client has to be attacked
>>> individually, and not-vulnerable clients have a secure connection to
>>> the server. As long as there are vulnerable clients, you should
>>> consider those as potentially malicious, and thus you should consider
>>> the network as insecure.
>> Then OpenVPN should release new Windows Versions.
>> The current binaries are linked against OpenSSL (ssleay32.dll, 
>> libeay32.dll) 1.0.1.5 (-> 1.0.1e).
>>
>>
> Hi all,
>
> We'll try to push OpenVPN 2.3.3 out today. The Windows installer will
> contain OpenSSL 1.0.1g which fixes this particular problem. In addition
> several other small changes and enhancements will be included.
>
Minor correction: I will build and publish OpenVPN 2.3.2 Windows
installers with OpenSSL 1.0.1g today; this will fix the security problem
at hand. OpenVPN 2.3.3 will follow on Thursday, if I encounter no big
problems with the changes it contains.

-- 
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc

irc freenode net: mattock


Reply via email to