On 9-4-2014 10:49, Илья Шипицин wrote:
> I did not say "nobind protects from everything", but I did mean that
> clients with "nobind" are more protected in case of non patched
> openssl library shipped with (old) openvpn windows installer.
>
>
> if server is patched (what is rather easy thing comparing to hundreds
> windows users), nobody can steal server ssl cert, sniffering traffic
> is useless in that case. mitm type attack is also useless when you
> have no server cert. the only thing you can attack is client, and if
> he uses "nobind", it looks rather good.
>
> 2014-04-09 14:44 GMT+06:00 Arne Schwabe <a...@rfc2549.org>:
>> Am 09.04.14 10:32, schrieb Илья Шипицин:
>>> I used to think that client without "nobind" option binds to 1194/udp
>>> (we encountered that issue with multiple openvpn connection on the
>>> same machine), so, "nobind" tells openvpn instance not to bind to
>>> udp/1194, and so, only openvpn server can exploit heartbleed
>>> vulnerability, but not any attacker.
>>>
>> Yes the server can attack you. Or any man in the middle attack including
>> ARP spoofing/DNS spoofing etc.
>>
>> If you see nobind that as protection basically you don't need a VPN.
>>
>> Arne
>>
I don't see the difference between nobind and bind. As soon as you
connect to the server, a MITM attack or an attack by the server is
possible.

Adriaan

Reply via email to