-
Notifications
You must be signed in to change notification settings - Fork 17
Closed
Labels
verifiedAll test cases were verified successfullyAll test cases were verified successfully
Milestone
Description
Following this https://bettercrypto.org/static/applied-crypto-hardening.pdf we learnt that :
OpenVPN uses TLS only for authentication and key exchange. The bulk traffic is then encrypted
and authenticated with the OpenVPN protocol using those keys.
Note that while the tls-cipher option takes a list of ciphers that is then negotiated as usual with
TLS, the cipher and auth options both take a single argument that must match on client and
server.
We have more interesting informations from a openvpn dev at BetterCrypto/Applied-Crypto-Hardening#91 (comment)
In short for what he said, we cannot specify the option tls-version-min 1.0 (or 1.1/1.2) because it could break some configurations. Or of course we could test it as beta.
Hence we could give the cipher list as it is suggested in the documentation we follow
tls-cipher DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-\
\SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-CAMELLIA256-SHA:DHE-RSA-AES256-SHA:DHE-RSA\
\-CAMELLIA128-SHA:DHE-RSA-AES128-SHA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:\
\AES128-SHA
we have also a good documentation to follow https://community.openvpn.net/openvpn/wiki/Hardening
Metadata
Metadata
Assignees
Labels
verifiedAll test cases were verified successfullyAll test cases were verified successfully