Hi,

On Sat, Jun 24, 2023 at 01:46:45AM +0200, Stella Ashburne wrote:
> > Why would you want that, when bookworm ships with OpenVPN 2.6.2?
> 
> I just checked and found that Debian Bookworm's version of OpenVPN
> is 2.6.3-1. It is not yet updated to 2.6.4 (According to
> https://github.com/OpenVPN/openvpn/blob/v2.6.4/Changes.rst, version
> 2.6.4 provides some fixes to bugs discovered in 2.6.3)

I'm aware of that, I maintain that file :-) - for Linux users, there is
nothing really interesting in 2.6.3 -> 2.6.4.  The bugs fixed in 2.6.4 
affect Windows, MacOS/pkcs#11 and Android users.

There *is* a mem leak in 2.6.4 -> 2.6.5, and I assume that Debian is
picking up this bugfix and will do a fixed 2.6.3 re-release - by debian
policy, they will normally not upgrade to fully new versions within a
release, just pick relevant bugfixes and release updated packages.

> Secondly, I find that the pace with which the minor versions of 2.6 series
> is released to be too fast. It just takes about five months for 2.6.0 to
> reach 2.6.5. 

This is an interesting statement - we intentionally tried to release
frequently, so bug fixes (that are inevitably found when doing a new
release with new features) can be distributed quickly.

So would you trust us more if we only did a 2.6.1 release after 5 months,
containing all the bugfixes found, instead of 5 release, each with just
a few commits?

> OpenVPN is a privacy-focused software and I fear there is
> insufficient time to uncover bugs and security vulnerabilities. I
> know there is this novel technology called DCO (data channel offload).
> Without enough time for it to prove itself that it is safe and
> secure for us to use, we end-users might unwittingly offload our
> sensitive data to the channels operated by state-sponsored hackers
> and cyber criminals. When this happens, DCO would become the butt
> of jokes among OpenVPN users.

Indeed, the DCO side of things has not seen as thorough testing and
scrutiny as the rest of the code.

On the other hand, there is no extra risk of offloading your data to 
people that would not otherwise be able to see it - the kernel code (DCO)
can only handle encrypted data, so there is no way it could leak
unencrypted data.  All the TLS handshaking is done by userland OpenVPN
just the same as in 2.5 (so, userland negotiates all the crypto, and
then informs the kernel "use this key") - if the kernel would not use
this key, the other end's OpenVPN would not be able to decrypto it.

If you have a root breach on your machine, yes, an attacker could read
packets handed to DCO - but that attacker could also read all your data
before going into OpenVPN, or modify OpenVPN to send a copy elsewhere
(= with or without DCO, after a root breach, you're toast).

> Let's compare the length of time taken to release 2.5.9 to that of version 
> 2.6.5.
> 
> Version 2.5.0 was released on 28 October 2020 and the final version
> 2.5.9 was released about two years and four months later. There was
> sufficient time for bugs and security vulnerabilities to be uncovered
> and patched.

This is one way to look at it, but I'm not sure how relevant it is - 
2.5.x is in maintenance mode, with nothing really happning anymore,
except if we find a bug in "master", which is then fixed in 2.6.x and
2.5.x at the same time.  So, for example, in 2.5.8 we still found a
NULL pointer bug, even though 2.5.0 was released two years ago - in
a dark corner of the code, which would not affect most users.

> Thirdly, most commercial VPN service providers might not be keen
> to upgrade their OpenVPN versions to the 2.6 series due to stability
> concerns and the impact of the latter on their businesses.

"most commercial VPN service providers" just suck big time at code
maintenance, and talking to OpenVPN upstream - they hack extra features
into OpenVPN, sometimes breaking the protocol in incompatible ways, and
most of them never nother to actually speak to us to ensure best results
for their customers... and then we get to deal with the bug reports.

This said, commercial OpenVPN providers would do very good in looking
at 2.6.x, as the increased efficiency of using DCO means "much less CPU
needed, less energy spent, money saved".

But this is really not a relevant argument for the question "why do you
want a 2.5.9 package for debian 12" - what commercial VPN providers do
is their choice, and we've taken great care to ensure OpenVPN compatibility
- meaning, if you run 2.6.x, and the other end runs OpenVPN 2.4 or 2.5,
it will still interoperate just fine (we do test with 2.2 and 2.3 as 
well, but these will need --compat-mode settings on 2.6).


But all this said - providing packages for Debian 12 needs resources on
the side of the OpenVPN project (read: Frank needs to do that).  Since we
think 2.6.x is better than 2.5.x, and Debian thinks that 2.6.x is stable
enough to include into bookworm, we think this is human life time better
spent elsewhere.  Like, on improving OpenVPN.

gert

-- 
"If was one thing all people took for granted, was conviction that if you 
 feed honest figures into a computer, honest figures come out. Never doubted 
 it myself till I met a computer with a sense of humor."
                             Robert A. Heinlein, The Moon is a Harsh Mistress

Gert Doering - Munich, Germany                             g...@greenie.muc.de

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to