On 24/02/2021 20:05, Marc SCHAEFER wrote:
On Wed, Feb 24, 2021 at 07:27:09PM +0000, tincanteksup wrote:
which suggested to me that openvpn may have some vulnerability to TCP DDos.

A Linux kernel can offer a few protections against DDoS, for example
SYN cookies to avoid a memory exhaustion with fake TCP connection
openings. You may have to enable it with sysctl (see /etc/sysctl.conf).

I'll take a good look, thanks.

The TLS handshake has not been done yet.  The connection will probably
be cut quickly if it does not happen (?).

The server cut the connection in a timely manor, however, nc did not:
CLOSE-WAIT 0 0 127.0.0.1:42714 127.0.0.1:34571

Still not fully cleared over an hour later .. that is the kernel because nc was terminated. I imagine that can be configured.

Finally closed about 1h10Mins~1h20 later.. 80 mins default ?


ESTAB            0                0 127.0.0.1:34571
127.0.0.1:42714
ESTAB            0                0 127.0.0.1:42714
127.0.0.1:34571

That's two nexus, because you run the client and server on the same
machine.

"two nexus" you got me there .. I'll have to google that expression.


I wonder if IPv6 has any new features which can customise the initial Syn
packet in any way ?

Not to my knowledge. Why would you want to do that?

Just a passing thought .. I think I just sort of re-invented syn-cookies without realising it ;-) I was thinking that IPv6 might have something like that actually defined by RFC and built in to a syn packet. I mean, why not ?

In fact, this idea seems to TCP Fast Open (https://tools.ietf.org/html/rfc7413)

You could use port knocking if you want to hide your service from
attackers.

Nice, obviously openvpn does not need this but, yeah.

Thanks


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to