Is there a new OpenVPN exploit

Same here:

2018-08-29 17:04:49,486 fail2ban.actions [2301]: NOTICE [openvpn] Ban 37.59.10.176
2018-08-29 17:08:55,235 fail2ban.actions [2301]: NOTICE [openvpn] Ban 198.23.252.109
2018-08-29 17:14:54,028 fail2ban.actions [2301]: NOTICE [openvpn] Ban 23.94.184.47
2018-08-29 17:39:40,979 fail2ban.actions [2301]: NOTICE [openvpn] Ban 143.202.36.18
2018-08-29 20:33:29,716 fail2ban.actions [2301]: NOTICE [openvpn] Ban 54.183.149.10
2018-08-29 20:58:43,179 fail2ban.actions [2301]: NOTICE [openvpn] Ban 178.217.186.86
2018-08-29 21:03:25,188 fail2ban.actions [2301]: NOTICE [openvpn] Ban 37.230.228.92
2018-08-29 21:28:43,146 fail2ban.actions [2301]: NOTICE [openvpn] Ban 103.206.192.227
2018-08-29 21:28:59,685 fail2ban.actions [2301]: NOTICE [openvpn] Ban 104.223.60.5
2018-08-29 21:29:40,451 fail2ban.actions [2301]: NOTICE [openvpn] Ban 66.82.204.116
2018-08-29 21:30:11,303 fail2ban.actions [2301]: NOTICE [openvpn] Ban 78.47.84.146
2018-08-29 21:30:40,347 fail2ban.actions [2301]: NOTICE [openvpn] Ban 66.82.204.215
2018-08-29 21:31:25,102 fail2ban.actions [2301]: NOTICE [openvpn] Ban 66.82.203.229
2018-08-29 21:31:50,141 fail2ban.actions [2301]: NOTICE [openvpn] Ban 109.190.166.182

Continuing with this topic, I has been check the fail2ban logs and I found this

The yellow mark log show Unban Ip, but i don’t unban any ip on this time, so what do you tinnk on this case.

Fail2ban sets a ban for a limited time. By default it’s 3? hours. After that set time an IP is removed (unbanned) from the blacklist.

1 Like

Is there a way to tweak the recidive ban on a per jail basis. Since I started getting these OpenVPN messages (almost 200 in the past month, 0 in the previous 6 months) I was looking at putting a more stringent rule for these.

Cheers.

2 Likes

You have probably some eastern eggs in the esmith template of jail.local, please hunt them

This is getting bizarre. last week I had 434 bans by fail2ban of which 412 on openvpn service…

1 Like

You are right. 577 bans in openvpn and counting… Love fail2ban

Edit: 578

1 Like

me too I can see a lot of ban in the openvpn Jail

Same here. Over 500 bans in 2 weeks. Crazy.
Thanks for this module @stephdl

1 Like

I’m seeing the same behavior on my machine. What steps need to be taken to change the OpenVPN port to something else? e.g. something that’s not port 1194?
Bob

If you mean openvpn roadwarrior setup, just go to the panel “OpenVPN-Roadwarrior/Server” in the GUI and change the port and then change the port in the client config or download the a openvpn-config from the panel “OpenVPN-Roadwarrior/Roadwarrior Account”. But I’m not sure that this will make it better. I had the same idea and changed to 1294. The number of bans was doubled. :roll_eyes: So I changed back. Today it seems teh mainhype is over. Only 5 IPs currently banned.

Don’t be mad about proper behavior of your app
Do you see any successful connection to your server?
NO
so this mean -> you are using common port to your OpenVPN server
this is not a abused
this is the punks trying to connect to you-> still no authorization -> (so no action) this is how you can see in your logs
You can change port to your OpenVPN <- for what???
They can scan you and find your OoenVPV port - no point
Ignore it
This is how your OpenVPV server respond to tricky questions like that…
You can check your firewall and block it from there -> not recommended
If your attacker is clever ten he never back from the same IP address
Your OpenVPN server will ignorit any way
You are not exposed my friend but you can see whe is intersting in your OpenVpn server -> on the default por is many

Hopefully you can understand the background of this.
THIS IS NOT AN venerability - this is proper behavior of OpenVPN
please do we have guys with security background or juts scriptkids?
Be clever how you read infos from your firewall.

I agree it is normal behaviour, but I did move my SSH port to something else and I get next to none attempts to SSH into my server. So IMO it does work to use some ‘security by obscurity’.

Are you 100% certain that this is not probing for one. How long is the “responsible” period after reporting to the owning party before publishing.

I was not stating that it was one, but it has all the hallmarks of a zero-day vulnerability. No previous “probes/sniffs” for months followed by a massive number in a very short period.

Cheers.

Probably you can’t be 100% sure for nothing in security field but this behavior is the proper one.
You need have exposed one TCP or UDP port to be able to connect to your VPN.
Up to this days they are not known vulnerabilities to this protocol.
You can also use fail2ban module for better security.

I’ve been thinking about these intrusion attempts.

Here’s an extract from my openvpn log

Sat Sep 22 20:22:07 2018 85.106.103.214:80 SIGUSR1[soft,tls-error] received, client-instance restarting
Sat Sep 22 20:26:16 2018 147.135.26.5:65139 TLS: Initial packet from [AF_INET]147.135.26.5:65139 (via [AF_INET]30.1.1.3%eth0), sid=6a22eb44 5adb63fe
Sat Sep 22 20:27:17 2018 147.135.26.5:65139 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Sep 22 20:27:17 2018 147.135.26.5:65139 TLS Error: TLS handshake failed
Sat Sep 22 20:27:17 2018 147.135.26.5:65139 SIGUSR1[soft,tls-error] received, client-instance restarting
Sat Sep 22 20:27:20 2018 147.135.26.5:65139 TLS: Initial packet from [AF_INET]147.135.26.5:65139 (via [AF_INET]30.1.1.3%eth0), sid=6a22eb44 5adb63fe
Sat Sep 22 20:28:20 2018 147.135.26.5:65139 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Sep 22 20:28:20 2018 147.135.26.5:65139 TLS Error: TLS handshake failed
Sat Sep 22 20:28:20 2018 147.135.26.5:65139 SIGUSR1[soft,tls-error] received, client-instance restarting
Sat Sep 22 20:35:19 2018 149.56.13.49:443 TLS: Initial packet from [AF_INET]149.56.13.49:443 (via [AF_INET]30.1.1.3%eth0), sid=6a22eb44 5adb63fe
Sat Sep 22 20:36:19 2018 149.56.13.49:443 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Sep 22 20:36:19 2018 149.56.13.49:443 TLS Error: TLS handshake failed
Sat Sep 22 20:36:19 2018 149.56.13.49:443 SIGUSR1[soft,tls-error] received, client-instance restarting
Sat Sep 22 20:36:19 2018 149.56.13.49:443 TLS: Initial packet from [AF_INET]149.56.13.49:443 (via [AF_INET]30.1.1.3%eth0), sid=6a22eb44 5adb63fe
Sat Sep 22 20:37:19 2018 149.56.13.49:443 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Sep 22 20:37:19 2018 149.56.13.49:443 TLS Error: TLS handshake failed
Sat Sep 22 20:37:19 2018 149.56.13.49:443 SIGUSR1[soft,tls-error] received, client-instance restarting

All the in coming scans are from random ports.

Can the Nethserver firewall be set up to only NAT traffic to the OpenVPN server that comes FROM the OpenVPN port 1194? That should help eliminate most of the in comming rouge traffic.

if so…how?

Regards
Bob

Nethserver openvpn client config uses the nobind option that randomizes client ports which is recommended when using more VPN connections so blocking source ports is not possible with firewall.

https://community.openvpn.net/openvpn/wiki/GettingStartedwithOVPN#Settinguptheconnection

1 Like

oh, that’s a shame. it seemed like a logical way to stop the intrusion attempts.
thanks
bob

OK, maybe I should keep quiet here before I jinx myself and my IP.

It looks like the list of IPs that were being hit continuously by this were harvested from somewhere. (Hopefully not this community). That would explain why the probes suddenly started back in August, out of nowhere, and why following a re-boot I did yesterday where I forced my cable ISP to give me a new IP I have seen only 2 attempts at connection in over 24 hours, where previously I was seeing hundreds, if not thousands per day.

Cheers.

2 Likes