OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Official client software for OpenVPN Access Server and OpenVPN Cloud.
gkuenning
OpenVpn Newbie
Posts: 8
Joined: Wed Nov 01, 2017 5:29 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by gkuenning » Fri Nov 03, 2017 3:45 am

1.1.23 fails for me as well.

gkuenning
OpenVpn Newbie
Posts: 8
Joined: Wed Nov 01, 2017 5:29 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by gkuenning » Fri Nov 03, 2017 6:40 am

ordex wrote:
Fri Nov 03, 2017 2:48 am
Hi,
OpenVPN Connect for Android already supports "legacy" mode, but it goes as back as RSA with 1024 bits keys.

Providing a workaround to still accept MD5 basically means opening a (big) security hole and that is not really acceptable.

I know it can be troublesome, but servers still using MD5 should *really* upgrade to something stronger.
MD5 has been broken for years now and supporting it means being unprofessional towards our users.

However, this is different from the bug discussed by the OP of this post. I am glad to hear that the original problem was solved by 1.1.23.

Cheers,
Unfortunately it fails even if you don't use MD5. My certificate is 1024-bit RSA, SHA1 with RSA encryption as the signature algorithm. And 1.1.23 doesn't work. 1.1.17 does.

openwhat
OpenVpn Newbie
Posts: 11
Joined: Wed Nov 27, 2013 12:39 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by openwhat » Fri Nov 03, 2017 10:22 am

Same here, I don't use MD5.

A few Server settings I use:

- Authorization Mode: TLS
- Extra HMAC authorization (tls-auth / tls-crypt): Incoming Auth (0)
- Legacy/fallback cipher: AES-128-CBC
- Auth digest: SHA1
- Compression: LZO

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by TinCanTech » Fri Nov 03, 2017 11:29 am

If you use your own VPN try making a new PKI with the correct settings.

EastRSA comes with default settings which should be fully compatible, let us know how it goes.

If you are using a public VPN Service tell them their certificate bundle is out of date.

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by ordex » Fri Nov 03, 2017 12:25 pm

Can you also make sure certificates, CA and CRL (if used) are not expired? What is the exact message reported in the log?
Generally speaking, mbedTLS is simply trying to stick to the currently non-broken settings (whatever they are - which means not just the signature algorithm), therefore it's very possible that you are using something outdated.
The solution recommended by tincantech is probably the one that would take you to a safe spot.

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by ordex » Fri Nov 03, 2017 12:28 pm

openwhat wrote:
Fri Nov 03, 2017 10:22 am
Same here, I don't use MD5.

A few Server settings I use:

- Authorization Mode: TLS
- Extra HMAC authorization (tls-auth / tls-crypt): Incoming Auth (0)
- Legacy/fallback cipher: AES-128-CBC
- Auth digest: SHA1
- Compression: LZO
This is your VPN configuration. When I mentioned MD5 I referred to the algorithm used to sign your certificates by your CA.

openwhat
OpenVpn Newbie
Posts: 11
Joined: Wed Nov 27, 2013 12:39 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by openwhat » Fri Nov 03, 2017 2:22 pm

Thanks for the help gents!
It's all working now with OpenVPN Connect for Android 1.1.23

I grabbed the new EasyRSA (3.0.3) and generated all new certs and keys.
When I compared with the old stuff it seems I indeed used Server and Client certs with MD5 signature hash-algorithm.
The new generated certs are all sha256.

Problem solved.

openwhat
OpenVpn Newbie
Posts: 11
Joined: Wed Nov 27, 2013 12:39 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by openwhat » Fri Nov 03, 2017 2:58 pm

Oh, one more question.

It seems client download speed has dropped a bit.
From approx. 18 Mbps to 11 Mbps.
I didn't change anything in the VPN config, only new certificates and keys.

Is this as expected? (Increased CPU load because of new certs and keys.)

gkuenning
OpenVpn Newbie
Posts: 8
Joined: Wed Nov 01, 2017 5:29 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by gkuenning » Fri Nov 03, 2017 3:20 pm

TinCanTech wrote:
Fri Nov 03, 2017 11:29 am
If you use your own VPN try making a new PKI with the correct settings.

EastRSA comes with default settings which should be fully compatible, let us know how it goes.

If you are using a public VPN Service tell them their certificate bundle is out of date.
You're joking, right? I should redeploy the entire VPN because of this bug?

gkuenning
OpenVpn Newbie
Posts: 8
Joined: Wed Nov 01, 2017 5:29 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by gkuenning » Fri Nov 03, 2017 3:23 pm

ordex wrote:
Fri Nov 03, 2017 12:28 pm
openwhat wrote:
Fri Nov 03, 2017 10:22 am
Same here, I don't use MD5.

A few Server settings I use:

- Authorization Mode: TLS
- Extra HMAC authorization (tls-auth / tls-crypt): Incoming Auth (0)
- Legacy/fallback cipher: AES-128-CBC
- Auth digest: SHA1
- Compression: LZO
This is your VPN configuration. When I mentioned MD5 I referred to the algorithm used to sign your certificates by your CA.
Yes but I already posted evidence from my own certificate, which uses SHA1.

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by ordex » Fri Nov 03, 2017 3:26 pm

gkuenning wrote:
Fri Nov 03, 2017 3:23 pm
Yes but I already posted evidence from my own certificate, which uses SHA1.
I believe I have missed that. Was it here in this thread? If your cert is signed with SHA1 there might be something different to look at. IT would be interesting to inspect the cert and CA.

User avatar
dazo
OpenVPN Inc.
Posts: 155
Joined: Mon Jan 11, 2010 10:14 am
Location: dazo :: #openvpn-devel @ libera.chat

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by dazo » Fri Nov 03, 2017 4:29 pm

Just to clarify one important detail, as I'm not sure if there is a confusion or not.
- Auth digest: SHA1
This line does NOT mean the certificate is not signed using an MD5 based signature.

Please check the output of:

Code: Select all

    $ openssl x509 -in $CERTIFICATE_FILE -noout -text | grep "Signature Algorithm"
Make sure you check the CA certificate, as well as the server and client certificates.

And regarding ...
You're joking, right? I should redeploy the entire VPN because of this bug?
If you are using MD5 certificates, you should definitely do exactly that. More details can be found in these few tweets from the @OpenVPN account: https://twitter.com/OpenVPN/status/899604229240877056

User avatar
dazo
OpenVPN Inc.
Posts: 155
Joined: Mon Jan 11, 2010 10:14 am
Location: dazo :: #openvpn-devel @ libera.chat

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by dazo » Fri Nov 03, 2017 4:41 pm

openwhat wrote:
Fri Nov 03, 2017 2:58 pm
Oh, one more question.

It seems client download speed has dropped a bit.
From approx. 18 Mbps to 11 Mbps.
I didn't change anything in the VPN config, only new certificates and keys.

Is this as expected? (Increased CPU load because of new certs and keys.)
That seems to be a bit too much drop, to be honest. But there are many factors influencing the throughput. The certificate's public key length plays a role to a certain degree, but that is only used when establishing the session encryption keys for the tunnelled network traffic. But a few hints are to look at what kind of --cipher and --auth algorithm you use. Those have a far more massive impact - when otherwise ignoring the link quality between the client and server. By the way, which version does your OpenVPN server run?

Prefer GCM based ciphers if you can, as that gives the least packet overhead and does decryption and packet authentication in a single crypto operation. if you need to use a CBC based cipher, you should use --auth SHA1 (default) or --auth SHA256. Using SHA1 for --auth is considered safe, as SHA1 have no known cryptographic weaknesses when doing HMAC operations. SHA1 adds 20 bytes to each packet sent over the Internet link. SHA256 adds 32 bytes. And if you use SHA512, that adds 64(!) bytes and does not give any real security gain over SHA256.

gkuenning
OpenVpn Newbie
Posts: 8
Joined: Wed Nov 01, 2017 5:29 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by gkuenning » Mon Nov 06, 2017 12:34 am

dazo wrote:
Fri Nov 03, 2017 4:29 pm
Just to clarify one important detail, as I'm not sure if there is a confusion or not.
- Auth digest: SHA1
This line does NOT mean the certificate is not signed using an MD5 based signature.

Please check the output of:

Code: Select all

    $ openssl x509 -in $CERTIFICATE_FILE -noout -text | grep "Signature Algorithm"
Make sure you check the CA certificate, as well as the server and client certificates.
That's the issue. I only checked my CA certificate; the server has an MD5 certificate.
And regarding ...
You're joking, right? I should redeploy the entire VPN because of this bug?
If you are using MD5 certificates, you should definitely do exactly that. More details can be found in these few tweets from the @OpenVPN account: https://twitter.com/OpenVPN/status/899604229240877056
That depends entirely on why one is using a VPN. I don't give a hoot about encryption quality, and very little about the risk of strangers joining my VPN. For me it's all about routing.

Nevertheless I'll probably upgrade over the holidays when I have access to all the machines involved.

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by TinCanTech » Mon Nov 06, 2017 1:33 am

gkuenning wrote:
Fri Nov 03, 2017 3:20 pm
TinCanTech wrote:
Fri Nov 03, 2017 11:29 am
If you use your own VPN try making a new PKI with the correct settings.

EastRSA comes with default settings which should be fully compatible, let us know how it goes.

If you are using a public VPN Service tell them their certificate bundle is out of date.
You're joking, right? I should redeploy the entire VPN because of this bug?
It is not a bug .. And it is your PKI not your VPN.
gkuenning wrote:
Fri Nov 03, 2017 6:40 am
Unfortunately it fails even if you don't use MD5. My certificate is 1024-bit RSA, SHA1 with RSA encryption as the signature algorithm. And 1.1.23 doesn't work. 1.1.17 does.
It doesn't work because your certificate not up to scratch with modern security ..
gkuenning wrote:
Mon Nov 06, 2017 12:34 am
That depends entirely on why one is using a VPN. I don't give a hoot about encryption quality, and very little about the risk of strangers joining my VPN. For me it's all about routing.
Everyone else is concerned about their security .. It is the P in V.P.N.

There are two parts to Openvpn .. the network side and the security side ..
The network side is a work of art when you understand how it is done.

The security side is almost but not completely down to the SSL Library in use ..
Many decisions regarding it's implementation are resolved upstream not by OpenVPN.

ch-ch-ch-ch-Changes :cry:

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by ordex » Mon Nov 06, 2017 4:11 am

gkuenning wrote:
Mon Nov 06, 2017 12:34 am
dazo wrote:
Fri Nov 03, 2017 4:29 pm
Just to clarify one important detail, as I'm not sure if there is a confusion or not.
- Auth digest: SHA1
This line does NOT mean the certificate is not signed using an MD5 based signature.

Please check the output of:

Code: Select all

    $ openssl x509 -in $CERTIFICATE_FILE -noout -text | grep "Signature Algorithm"
Make sure you check the CA certificate, as well as the server and client certificates.
That's the issue. I only checked my CA certificate; the server has an MD5 certificate.
And regarding ...
You're joking, right? I should redeploy the entire VPN because of this bug?
If you are using MD5 certificates, you should definitely do exactly that. More details can be found in these few tweets from the @OpenVPN account: https://twitter.com/OpenVPN/status/899604229240877056
That depends entirely on why one is using a VPN. I don't give a hoot about encryption quality, and very little about the risk of strangers joining my VPN. For me it's all about routing.

Nevertheless I'll probably upgrade over the holidays when I have access to all the machines involved.
There is a beta release on PlayStore (1.1.24 build 93) that is expected to support MD5 again. Would you mind giving it a shot and let us know if that works?

YUChoe
OpenVpn Newbie
Posts: 2
Joined: Fri Nov 03, 2017 1:44 am

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by YUChoe » Wed Nov 08, 2017 4:32 am

1.1.24 works again for me. Thanks! Good job :)

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by ordex » Wed Nov 08, 2017 12:27 pm

Yeah, the beta release is out live. MD5 is supported again.
Please have a look at the changelog: in 6 months MD5 will be definitely dropped, thus this is the time to act and get rid of broken algorithms! :)

gkuenning
OpenVpn Newbie
Posts: 8
Joined: Wed Nov 01, 2017 5:29 pm

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by gkuenning » Thu Nov 09, 2017 3:07 am

I always gotta love the "We know better than you, so we're going to force you to change even though we don't understand your use case" attitude.

Sigh.

I cannot being to count the number of perfectly acceptable applications and services that have stopped working for me because somebody thinks they should be my parent. Not to mention the number of hours I've wasted working around this nanny-ism.

It's one thing to say "We recommend really strongly that you do X, for very good reasons Y." I've often--in fact, nearly always--made configuration changes as a result of such suggestions. But it's quite another to say "You MUST do X because we lack the imagination to see that there are reasons where X is either unnecessary or downright inappropriate."

T84a
OpenVpn Newbie
Posts: 13
Joined: Fri Nov 10, 2017 2:56 am

Re: OpenVPN update from 1.1.21 to 1.1.22 (Google Play)

Post by T84a » Sat Dec 23, 2017 3:59 pm

dazo wrote:
Fri Nov 03, 2017 4:29 pm
Just to clarify one important detail, as I'm not sure if there is a confusion or not.
- Auth digest: SHA1
This line does NOT mean the certificate is not signed using an MD5 based signature.

Please check the output of:

Code: Select all

    $ openssl x509 -in $CERTIFICATE_FILE -noout -text | grep "Signature Algorithm"
Make sure you check the CA certificate, as well as the server and client certificates.

And regarding ...
You're joking, right? I should redeploy the entire VPN because of this bug?
If you are using MD5 certificates, you should definitely do exactly that. More details can be found in these few tweets from the @OpenVPN account: https://twitter.com/OpenVPN/status/899604229240877056
dazo,

I need help. Can you help me?

Post Reply