Skip to content

Harden openvpn Tunnel #5498

@stephdl

Description

@stephdl

Following this https://bettercrypto.org/static/applied-crypto-hardening.pdf we learnt that :

OpenVPN uses TLS only for authentication and key exchange. The bulk traffic is then encrypted
and authenticated with the OpenVPN protocol using those keys.
Note that while the tls-cipher option takes a list of ciphers that is then negotiated as usual with
TLS, the cipher and auth options both take a single argument that must match on client and
server.

We have more interesting informations from a openvpn dev at BetterCrypto/Applied-Crypto-Hardening#91 (comment)

In short for what he said, we cannot specify the option tls-version-min 1.0 (or 1.1/1.2) because it could break some configurations. Or of course we could test it as beta.

Hence we could give the cipher list as it is suggested in the documentation we follow

tls-cipher DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-\
\SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-CAMELLIA256-SHA:DHE-RSA-AES256-SHA:DHE-RSA\
\-CAMELLIA128-SHA:DHE-RSA-AES128-SHA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:\
\AES128-SHA

we have also a good documentation to follow https://community.openvpn.net/openvpn/wiki/Hardening

Metadata

Metadata

Assignees

No one assigned

    Labels

    verifiedAll test cases were verified successfully

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions