Description |
- |
One client can effectively stop VPN traffic of another client by 'client float' mechanism in case of reuse peer_id. |
+ |
A security issue has been found in OpenVPN before 2.4.9, where a 'peer-id' check is not performed correctly during a small amount of time after a connection has been established. A rogue client sending a data channel packet during that time, from a different source address and with the same 'peer-id', would cause the client data to float to that new address, effectively sopping the VPN traffic of the first, legitimate client. |
|