W dniu 18.02.2016 o 18:03, Gert Doering pisze:
> Hi,
> 
> On Thu, Feb 18, 2016 at 05:15:50PM +0100, Jacek Wielemborek wrote:
>> The thing is that in order to fuzz it most efficiently, it would be good
>> to modify the server to use stdin/stdout (or dev null) for network I/O
>> and terminate after handling a single connection. Also, we would need to
>> disable any checksums, compression or encryption.
> 
> OpenVPN can be called from inetd, so it can sort of handle "an already
> connected socket on stdin/stdout".
> 
> "sort of" because the backend refuses most normal options in this case
> (it can only handle tap interfaces, and no --ifconfig, because the
> assumption is that this only makes sense if you attach to a pre-configured
> bridge) - but for fuzzing the network side, this should work.
> 
> Of course, if you take out checksumming, encryption and tls-auth, you
> take away two layers of hardening against funny packets... - but I'm still
> fairly confident that the worst thing our code will do is ASSERT() on
> you :-)
> 
> gert

Well the attacker could send a funny packet with a valid checksum,
encrypted and authenticated, right? This is just to make AFL's genetic
algorithm work well.

The inetd mode sounds like a perfect start.

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to