When setting up a DD-WRT router to use a major VPN service, I stumbled upon something that seems like it could be a significant weakness and after getting an abysmally lacking answer from the company, I though I would ask here.
The services stipulates that the OpenVPN protocol be used with the same user certificate and private key used by everyone and available to anyone for download on their website. My questions is: given a known user private key, is it possible someone could intercept the TLS handshake and gain the session key to the underlying encryption - or does this weaken security in any other way? To my knowledge, ephemeral encryption in TLS would prevent this but without a guarantee of a server configuration requiring its use, this is an unknown and cannot be relied upon. The service claims "other mechanisms such as username password authentication" are in use but to my knowledge this has nothing to do with transport security and is only used to authenticate the user to the service. The mere fact that user certificates are not required by the OpenVPN protocol but this service demanding the customers use the same private key is a huge red flag to me.