On 23/04/2014 18:22, Timothe Litt wrote:
I don't see that cryptoapi.c has been updated to work with TLS 1.2.
Yes, just came to the same conclusion.

Long-term the key-loaders need to get updated.

Maybe short-term the options that invoke them could force NO_TLSv_1_2...

That would make things work for most people in the short term.

One option would be to have a tls-version-max, but I'm wondering if this might be overkill.

It would also force people to add "tls-version-max 1.0" to their configs to go back to the original 2.3 behavior.

My preferred solution is to simply turn off tls-version-min if it's not specified in the config, and use the 2.3 behavior. That basically forces TLS 1.0.

I've seen a lot more breakage than just this... I believe the first significant real-world exposure was the iOS 1.0.2 and 1.0.3 releases from several months ago. There were hundreds of reports of breakage, mostly from countries behind government firewalls. This was using OpenVPN 3 with PolarSSL, so the issue seems to occur with different OpenVPN and SSL implementations.

James

Reply via email to