Antonio Quartulli <a...@unstable.cc> 于2021年3月4日周四 下午3:48写道:

> Hi Tony,
>
> On 04/03/2021 03:10, Tony He wrote:
> >
> > Arne Schwabe <a...@rfc2549.org <mailto:a...@rfc2549.org>> 于2021年3月3日
> > 周三 下午7:56写道:
> >
> >     Am 03.03.21 um 08:46 schrieb Tony He:
> >     > Hi Arne,
> >     >
> >     > I encountered segmentation fault in your dco branch. Master branch
> is
> >     > OK. I reverted the commit "Linux data-channel offload support",
> but it
> >     > still happens.
> >     > Anything wrong? Can you reproduce?
> >
> >     OpenVPN without any encryption or TLS is not something I tested.
> >     Consider this obscure mode broken as part of being a preview release.
> >
> >
> > So can you reproduce this issue at your side? Did you just test static
> > key? Can you paste your commands or configurations?
>
> What Arne meant is that, given the following message in your log,
>
> ******* WARNING *******: All encryption and authentication features
> disabled -- All data will be tunnelled as clear text and will not be
> protected against man-in-the-middle changes. PLEASE DO RECONSIDER THIS
> CONFIGURATION!
>
> it appears that you are testing *without* any form of encryption.
> This special case is untested at the moment.
>
I used static key and saw same error.
 % sudo /project/openvpn/schwabe/openvpn.git/src/openvpn/openvpn --ifconfig
10.200.0.1 10.200.0.2 --dev tun --secret static.key
[sudo] password for tony:
2021-03-04 16:20:33 OpenVPN 2.6_git [git:dco/8be9bbd16b2c5e1b]
x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
[DCO] built on Mar  4 2021
2021-03-04 16:20:33 library versions: OpenSSL 1.1.1  11 Sep 2018, LZO 2.08
2021-03-04 16:20:33 WARNING: INSECURE cipher (BF-CBC) with block size less
than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by
using a --cipher with a larger block size (e.g. AES-256-CBC). Support for
these insecure ciphers will be removed in OpenVPN 2.6.
2021-03-04 16:20:33 WARNING: INSECURE cipher (BF-CBC) with block size less
than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by
using a --cipher with a larger block size (e.g. AES-256-CBC). Support for
these insecure ciphers will be removed in OpenVPN 2.6.
2021-03-04 16:20:33 WARNING: INSECURE cipher (BF-CBC) with block size less
than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by
using a --cipher with a larger block size (e.g. AES-256-CBC). Support for
these insecure ciphers will be removed in OpenVPN 2.6.
2021-03-04 16:20:33 sitnl_send: rtnl: generic error (-17): File exists
2021-03-04 16:20:33 net_iface_mtu_set: mtu 1500 for ovpn-dco1
2021-03-04 16:20:33 net_iface_up: set ovpn-dco1 up
2021-03-04 16:20:33 net_addr_ptp_v4_add: 10.200.0.1 peer 10.200.0.2 dev
ovpn-dco1
2021-03-04 16:20:33 Could not determine IPv4/IPv6 protocol. Using AF_INET
2021-03-04 16:20:33 UDPv4 link local (bound): [AF_INET][undef]:1194
2021-03-04 16:20:33 UDPv4 link remote: [AF_UNSPEC]
zsh: segmentation fault  sudo
/project/openvpn/schwabe/openvpn.git/src/openvpn/openvpn --ifconfig


>
> A classic configuration with CA/certs/keys should work.
> Have you tried that?
>
> Yes. I also tried this for a while and did not saw this error. However,
the dco was not enabled by default.  So I asked Arne's commands or
configurations.
But I just played with my configurations again and adjust verb to "5".
Below log tells that I must set "topology subnet“ explicitly. Now it
finally works.


Note: NOT using '--topology subnet' disables data channel offload.



> Regards,
>
> >
> >
> >     Thanks for the report.
> >
> >     Arne
> >
> >
> >
> > _______________________________________________
> > Openvpn-devel mailing list
> > Openvpn-devel@lists.sourceforge.net
> > https://lists.sourceforge.net/lists/listinfo/openvpn-devel
> >
>
> --
> Antonio Quartulli
>
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to