• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

OpenVPN in server mode using TLS-crypt-v2 allows remote attackers to trigger a DoS by corrupting and replaying network packets in the early handshake phase

Scheduled Pinned Locked Moved OpenVPN
2 Posts 2 Posters 364 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    johnpitton
    last edited by Apr 3, 2025, 3:44 PM

    Looks like 24.11 is on openvpn version (2.6.12) which is in-between 2.6.1 and 2.6.13, but the vulnerability is only for TLS-crypt-v2, which I don't believe 24.11 uses nor is there an option to enabled through the GUI that I can see. But I just wanted to confirm 24.11's OpenVPN isn't affected by this.
    ref: https://github.com/advisories/GHSA-5gwv-2q72-gxrm

    OpenVPN 2.6.12 amd64-portbld-freebsd15.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] [DCO]
    library versions: OpenSSL 3.0.14 4 Jun 2024, LZO 2.10
    DCO version: FreeBSD 15.0-CURRENT #0 plus-RELENG_24_11-n256407-1bbb3194162: Fri Nov 22 05:08:46 UTC 2024 root@freebsd:/var/jenkins/workspace/pfSense-Plus-snapshots-24_11-main/obj/amd64/AKWlAIiM/var/jenkins/workspace/pfSense-Plus-snapshots-24_11-main/sources/FreeBS
    Originally developed by James Yonan

    1 Reply Last reply Reply Quote 0
    • M
      maverick_slo
      last edited by Apr 4, 2025, 6:36 PM

      I believe that is not affected.
      I can only see tls crypt (without V2) being enabled in my config.

      1 Reply Last reply Reply Quote 0
      2 out of 2
      • First post
        2/2
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
        This community forum collects and processes your personal information.
        consent.not_received