Am 11.09.17 um 14:30 schrieb David Sommerseth:
> On 11/09/17 14:02, Илья Шипицин wrote:
>>
>>
>> 2017-09-11 16:54 GMT+05:00 Илья Шипицин <chipits...@gmail.com
>> <mailto:chipits...@gmail.com>>:
>>
>>
>>
>>     2017-09-11 16:45 GMT+05:00 Jan Just Keijser <janj...@nikhef.nl
>>     <mailto:janj...@nikhef.nl>>:
>>
>>         Hi,
>>
>>         On 11/09/17 13:22, Илья Шипицин wrote:
>>
>>             Hello,
>>
>>             is someone actually using "tls-verify" in production ?
>>             we tried to implement additional certificate check using
>>             tls-verify
>>
>>
>>             while it works in general, in case when it hits "exit 1", it
>>             look like a timeout from client point of view. it is not any
>>             good
>>
>>
>>         do you mean that when a client is denied access (i.e. the
>>         tls-verify script exits 1 on the server) that the client sees
>>         this as a timeout?  that is "normal" behaviour, as the server
>>         does not tell the client *WHY* access is refused - it simply
>>         stop responding to a client that does not pass
>>         authentication/authorization. The client will not hear from the
>>         server, and will time out after a specified interval.  This is
>>         actually the most secure way to do things, as a rogue client
>>         cannot DoS a server this way.
>>
>>
>>     I'd say it depends.
>>
>>     we run a lot of openvpn-gui with real people sitting in front of
>>     them, from their point of view it "oh, it does not work! fix it!"
>>     in out case better UX is to deliver proper reason to the client
>>
>>     for someone maybe the better UX is to keep silence
>>
>>
>>
>> what is wrong with timeout is endless retry.
>> there's no way to pass authentication once it failed, so why does client
>> have to retry ?
> 
> User-friendliness and security seldom walks hand-in-hand.  As this
> friendliness provides enough information fragments for an attacker to
> figure out "I need to try something else".  A non-responding server
> gives no clues.  It can be a crappy server or it can be access denied;
> the attacker doesn't know - thus making it harder to figure out what to
> do next.
> 
> The client will by default try to reconnect, because that is what it in
> most cases is told to do when the server is unresponsive.  And since
> this happens with many seconds in between, a single client will not
> attempt to DoS a server by mistake by retrying in a too tight loop.
> 
> A failed authentication is a failed authentication.  Thus UX client
> front-ends could treat this silence like that - but also account for
> other types of connectivity issues.  If it should try to reconnect or
> not, well, that's entirely up to the configuration file.   There is
> --single-session which can be used to control this.
> 
> But for servers running OpenVPN clients, retrying indefinitely at
> regular intervals may just as well be valuable; if it is an issue which
> is temporary.  Then these clients would reconnect once everything is
> back online again on the server side.
> 


Also you can limit the number of unsucessfull retries in OpenVPN with
the connnect-retry option.

Arne

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to