Hello Netanal,

For security related issues, especially those under embargo, use secur...@openvpn.net only. Do not include the developer mailing list. It is also not appreciated to add in other security reporting lists. If you have something to report in terms of security for OpenVPN, then report it only to OpenVPN (secur...@openvpn.net).

However since there is nothing known and that is not a secret I can answer all 3 of your questions with a simple; no.

Your idea of reporting security issues and doing security testing does not seem to meet (our) standards, sorry. You've found nothing yet continue to claim that you think there is something. We've proven there isn't. You provide no proof there is. And your recent response to "Please investigate, Tnx" is quite frankly hilarious as well as entirely useless.

We gave you explicit advice and instructions to make a decent report that you just seem to ignore. You've proven nothing. You're quite frankly embarrassing yourself in the community. Being inexperienced at something is not a crime, we all had to start somewhere, and I've made mistakes in the past too. But that's okay, we learn and get better. However, there is a lot of information out there on the Internet and also given in these email conversations that can help you to become a decent security researcher and make sensible reports, if you would care to actually follow that advice. It does not seem you are willing to do what is necessary. Because of that, I am going to ignore messages from you going forward, unless you actually have something relevant to report.

Kind regards,
Johan Draaisma

On 18-11-2024 15:30, נתי שטרן wrote:

Dear OpenVPN Security Team,

I hope this message finds you well. I am writing to inquire about recent vulnerabilities disclosed in OpenVPN, specifically related to Data Channel Offload (DCO) and associated components.

Our current deployment uses OpenVPN version *2.6.12*, which appears to include patches for the vulnerabilities described under CVE-2024-27459, CVE-2024-24974, CVE-2024-27903, and CVE-2024-1305. However, I would like to confirm the following:

 1. Are there additional security recommendations for mitigating
    potential exploitation of DCO-specific features?
 2. Are there any newly identified vulnerabilities in OpenVPN 2.6.12
    that have not yet been disclosed in advisories?
 3. Could you provide more detailed guidance or best practices for
    hardening configurations against these and similar vulnerabilities?

If you require any additional information from our side, I am happy to provide details within the limits of operational confidentiality.



TNX,

NETANEL




_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to