-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 18/01/17 18:19, debbie10t wrote:
> Hi,
> 
> I have following config:
> 
> 
> ** Server Win10 (as per default generally) v2.4.0 with --auth
> *RSA-SHA512* --ncp-disable
> 
> Log file shows:
> 
> Wed Jan 18 17:04:34 2017 us=914797 Outgoing Control Channel 
> Authentication: Using 512 bit message hash '*SHA512*' for HMAC 
> authentication Wed Jan 18 17:04:34 2017 us=914797 Incoming Control
> Channel Authentication: Using 512 bit message hash '*SHA512*' for
> HMAC authentication
> 
> 
> ** Client Linux (as per default generally) v2.4.0 with --auth
> *RSA-SHA512*
> 
> Log file shows:
> 
> Wed Jan 18 17:05:00 2017 us=778089 Outgoing Control Channel 
> Authentication: Using 512 bit message hash '*SHA512*' for HMAC 
> authentication Wed Jan 18 17:05:00 2017 us=778182 Incoming Control
> Channel Authentication: Using 512 bit message hash '*SHA512*' for
> HMAC authentication
> 
> The connection works but ..
> 
> Because there is another digest called SHA512 why does the log 
> *not* reflect the config correctly ? eg: hash '*RSA-SHA512*'
> 
> (This had me very confused for sometime today)

I am on thin ice here, as I've not dug much into the naming schemes of
the various algorithms.

But ... I am fairly confident the hashing reference in the log refers
purely to the hashing algorithm, which most commonly is MD* or  SHA*
variants (there are a few exceptions).

And as I understand the code, the RSA-* stuff is just ignored, as that
is not used by by HMAC functions in our code.  So using --auth SHA512
would provide the same result.


- -- 
kind regards,

David Sommerseth
OpenVPN Technologies, Inc

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=bXK1
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to