I do not know why you sent me this. I do not know you. Please do not e-mail me 
again.


On Tuesday, April 8, 2014 1:31 PM, 
"openvpn-devel-requ...@lists.sourceforge.net" 
<openvpn-devel-requ...@lists.sourceforge.net> wrote:
 
Send Openvpn-devel mailing list submissions to
    openvpn-devel@lists.sourceforge.net

To subscribe or unsubscribe via the World Wide Web, visit
    https://lists.sourceforge.net/lists/listinfo/openvpn-devel
or, via email, send a message with subject or body 'help' to
    openvpn-devel-requ...@lists.sourceforge.net

You can reach the person managing the list at
    openvpn-devel-ow...@lists.sourceforge.net

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Openvpn-devel digest..."


Today's Topics:

   1. Re: Heartbleed (Mike Tancsa)
   2. Re: Heartbleed (Steffan Karger)
   3. Re: Heartbleed (Mike Tancsa)
   4. Re: Heartbleed (Enno Gr?per)
   5. Re: Heartbleed (Samuli Sepp?nen)
   6. Re: Heartbleed (Gert Doering)


----------------------------------------------------------------------

Message: 1
Date: Tue, 08 Apr 2014 10:04:06 -0400
From: Mike Tancsa <m...@sentex.net>
Subject: Re: [Openvpn-devel] Heartbleed
To: Steffan Karger <steffan.kar...@fox-it.com>,    Adriaan de Jong
    <dej...@fox-it.com>, "openvpn-devel@lists.sourceforge.net"
    <openvpn-devel@lists.sourceforge.net>
Message-ID: <534401d6.1080...@sentex.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed

On 4/8/2014 9:42 AM, Steffan Karger wrote:

>> Perhaps a dumb question, but if the server instance is linked against
>> an older version of openssl (9.8.x), but the client is compiled and
>> linked against the vulnerable version, is it still an issue for both
>> sides, or is the client going to leak private information ?
>
> The client can then leak keys (both private master key and session keys), 
> which completely breaks your secure connection, for that client.
>
> So when the server is not vulnerable, each client has to be attacked 
> individually, and not-vulnerable clients have a secure connection to the 
> server. As long as there are vulnerable clients, you should consider those as 
> potentially malicious, and thus you should consider the network as insecure.

Thanks for the replay. I am still trying to understand as it relates to 
the analysis here

http://blog.existentialize.com/diagnosis-of-the-openssl-heartbleed-bug.html

How does one attack the client ? In my case, the client only connects to 
my servers ? I use a tls-auth key file as well. If I understand 
correctly, the scenario would be the attacker would have to have the 
tls-auth key file, and then do a man in the middle attack to pretend its 
the server's IP, and then coax the client into allocating the 64k block 
of memory as described in the above link ?

    ---Mike

-- 
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, m...@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada  http://www.tancsa.com/



------------------------------

Message: 2
Date: Tue, 8 Apr 2014 16:13:59 +0200
From: Steffan Karger <steffan.kar...@fox-it.com>
Subject: Re: [Openvpn-devel] Heartbleed
To: Mike Tancsa <m...@sentex.net>, Adriaan de Jong
    <dej...@fox-it.com>,    "openvpn-devel@lists.sourceforge.net"
    <openvpn-devel@lists.sourceforge.net>
Message-ID:
    <1ced409804e2164c8104f9e623b08b90170093c...@foxdft02.fox.local>
Content-Type: text/plain; charset="us-ascii"

On 08/04/2014 16:04, Mike Tancsa wrote:
> How does one attack the client ? In my case, the client only connects
> to my servers ? I use a tls-auth key file as well. If I understand
> correctly, the scenario would be the attacker would have to have the
> tls-auth key file, and then do a man in the middle attack to pretend
> its the server's IP, and then coax the client into allocating the 64k
> block of memory as described in the above link ?

Correct. But man-in-the-middle can also be something like DNS poisoning.

If you use TLS-auth, the attacker must have previously obtained the TLS-auth 
key. When the user base is large, it is not unlikely that one of the users was 
compromised and should be considered malicious.

-Steffan



------------------------------

Message: 3
Date: Tue, 08 Apr 2014 10:23:53 -0400
From: Mike Tancsa <m...@sentex.net>
Subject: Re: [Openvpn-devel] Heartbleed
To: Steffan Karger <steffan.kar...@fox-it.com>,    Adriaan de Jong
    <dej...@fox-it.com>, "openvpn-devel@lists.sourceforge.net"
    <openvpn-devel@lists.sourceforge.net>
Message-ID: <53440679.8060...@sentex.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed

On 4/8/2014 10:13 AM, Steffan Karger wrote:
> On 08/04/2014 16:04, Mike Tancsa wrote:
>> How does one attack the client ? In my case, the client only connects
>> to my servers ? I use a tls-auth key file as well. If I understand
>> correctly, the scenario would be the attacker would have to have the
>> tls-auth key file, and then do a man in the middle attack to pretend
>> its the server's IP, and then coax the client into allocating the 64k
>> block of memory as described in the above link ?
>
> Correct. But man-in-the-middle can also be something like DNS poisoning.

> If you use TLS-auth, the attacker must have previously obtained the TLS-auth 
> key. When the user base is large, it is not unlikely that one of the users 
> was compromised and should be considered malicious.

Thanks!  Although we are certainly planing to update the vulnerable 
clients, this is not quite as dire and urgent as first described in the 
popular press-- at least as it applies to my client base. We also use IP 
addresses for the target servers in the client configs.

    ---Mike

-- 
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, m...@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada  http://www.tancsa.com/



------------------------------

Message: 4
Date: Tue, 08 Apr 2014 15:53:05 +0200
From: Enno Gr?per <groep...@cms.hu-berlin.de>
Subject: Re: [Openvpn-devel] Heartbleed
To: openvpn-devel@lists.sourceforge.net
Message-ID: <5343ff41.3080...@cms.hu-berlin.de>
Content-Type: text/plain; charset="iso-8859-1"

Hi,

Am 08.04.2014 15:42, schrieb Steffan Karger:
>> Perhaps a dumb question, but if the server instance is linked
>> against an older version of openssl (9.8.x), but the client is
>> compiled and linked against the vulnerable version, is it still an
>> issue for both sides, or is the client going to leak private
>> information ?
>
> The client can then leak keys (both private master key and session
> keys), which completely breaks your secure connection, for that
> client.
>
> So when the server is not vulnerable, each client has to be attacked
> individually, and not-vulnerable clients have a secure connection to
> the server. As long as there are vulnerable clients, you should
> consider those as potentially malicious, and thus you should consider
> the network as insecure.
Then OpenVPN should release new Windows Versions.
The current binaries are linked against OpenSSL (ssleay32.dll, 
libeay32.dll) 1.0.1.5 (-> 1.0.1e).

Greetings,
Enno

-- 
Enno Gr?per
groep...@cms.hu-berlin.de - Raum 2'325, Rudower Chaussee 26
Tel. +49.(0)30.2093.70053  Fax +49.(0)30.2093.2959
Humboldt-Universit?t zu Berlin - http://www.hu-berlin.de/
ZE Computer- und Medienservice - http://www.cms.hu-berlin.de/
Unter den Linden 6, D-10099 Berlin, Germany

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4781 bytes
Desc: S/MIME Cryptographic Signature

------------------------------

Message: 5
Date: Tue, 08 Apr 2014 18:09:17 +0300
From: Samuli Sepp?nen <sam...@openvpn.net>
Subject: Re: [Openvpn-devel] Heartbleed
To: Enno Gr?per <groep...@cms.hu-berlin.de>,
    "openvpn-devel@lists.sourceforge.net"
    <openvpn-devel@lists.sourceforge.net>
Message-ID: <5344111d.3080...@openvpn.net>
Content-Type: text/plain; charset=ISO-8859-1


> Hi,
>
> Am 08.04.2014 15:42, schrieb Steffan Karger:
>>> Perhaps a dumb question, but if the server instance is linked
>>> against an older version of openssl (9.8.x), but the client is
>>> compiled and linked against the vulnerable version, is it still an
>>> issue for both sides, or is the client going to leak private
>>> information ?
>> The client can then leak keys (both private master key and session
>> keys), which completely breaks your secure connection, for that
>> client.
>>
>> So when the server is not vulnerable, each client has to be attacked
>> individually, and not-vulnerable clients have a secure connection to
>> the server. As long as there are vulnerable clients, you should
>> consider those as potentially malicious, and thus you should consider
>> the network as insecure.
> Then OpenVPN should release new Windows Versions.
> The current binaries are linked against OpenSSL (ssleay32.dll, 
> libeay32.dll) 1.0.1.5 (-> 1.0.1e).
>
>
Hi all,

We'll try to push OpenVPN 2.3.3 out today. The Windows installer will
contain OpenSSL 1.0.1g which fixes this particular problem. In addition
several other small changes and enhancements will be included.

-- 
Samuli Sepp?nen
Community Manager
OpenVPN Technologies, Inc

irc freenode net: mattock




------------------------------

Message: 6
Date: Tue, 8 Apr 2014 17:13:15 +0200
From: Gert Doering <g...@greenie.muc.de>
Subject: Re: [Openvpn-devel] Heartbleed
To: Enno Gr?per <groep...@cms.hu-berlin.de>
Cc: openvpn-devel@lists.sourceforge.net
Message-ID: <20140408151315.gd16...@greenie.muc.de>
Content-Type: text/plain; charset="iso-8859-1"

Hi,

On Tue, Apr 08, 2014 at 03:53:05PM +0200, Enno Gr?per wrote:
> Then OpenVPN should release new Windows Versions.

Yeah, always glad to have people tell us what to do.

Working on it...

gert
-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                            g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 305 bytes
Desc: not available

------------------------------

------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees

------------------------------

_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


End of Openvpn-devel Digest, Vol 95, Issue 3
********************************************

Reply via email to