I'm running an OpenVPN server with an OpenSSL version which is vulnerable to CVE-2016-2107 https://www.openssl.org/news/secadv/20160503.txt -> i.e. variant of a padding oracle attac.
However, I'm using the "--tls-auth"-feature.
Does this feature protect my OpenVPN connections with respect to CVE-2016-2107?
Moreover, I found a comment in the source of an older version on sourceforge. It says:
https://sourceforge.net/p/openvpn/openv ... 1aedaf8096
So is OpenVPN resistent agains padding oracle attacs at all?-OpenVPN's usage of HMAC is to first encrypt a packet, then HMAC the resulting ciphertext.
+The OpenVPN data channel protocol uses encrypt-then-mac (i.e. first encrypt a
+packet, then HMAC the resulting ciphertext), which prevents padding oracle
+attacks.
Thank you in advance
SONS