On Wed, Feb 24, 2021 at 07:27:09PM +0000, tincanteksup wrote:
> which suggested to me that openvpn may have some vulnerability to TCP DDos.

A Linux kernel can offer a few protections against DDoS, for example
SYN cookies to avoid a memory exhaustion with fake TCP connection
openings. You may have to enable it with sysctl (see /etc/sysctl.conf).

> Obviously, the connection ultimately fails but I was simply expecting the
> server to drop the subsequent packets without logging anything. Especially
> as both server and client believe that TCP has established a connection,
> even to the extent of:

I guess that the OpenVPN TCP server logs this as soon as the kernel
tells that a new connection is opened (accept(2) returns), aka
SYN/SYNACK/ACK, and the client as soon as the ACK is sent.

The TLS handshake has not been done yet.  The connection will probably
be cut quickly if it does not happen (?).

> ESTAB            0                0 127.0.0.1:34571
> 127.0.0.1:42714
> ESTAB            0                0 127.0.0.1:42714
> 127.0.0.1:34571

That's two nexus, because you run the client and server on the same
machine.

> I wonder if IPv6 has any new features which can customise the initial Syn
> packet in any way ?

Not to my knowledge. Why would you want to do that?

You could use port knocking if you want to hide your service from
attackers.
 
> I doubt it but something for me to look into ;-)

If you want to avoid DDoS, look for SYN cookies, and also you may want
to use a firewall to limit what IP addresses can connect (if this
is possible), or possibly run an IDS/IRS/IPS to detect malicious
attempts.


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to