On 31/03/17 10:56, Илья Шипицин wrote:
> 
> 
> 2017-03-31 13:26 GMT+05:00 Samuli Seppänen <sam...@openvpn.net
> <mailto:sam...@openvpn.net>>:
> 
>     Hi,
> 
>     We still bundle EasyRSA 2 with our Windows installers and it is
>     prominently advertised on our widely linked to HOWTO:
> 
>     <https://openvpn.net/index.php/open-source/documentation/howto.html
>     <https://openvpn.net/index.php/open-source/documentation/howto.html>>
> 
>     As such, EasyRSA 2 is used by many/most OpenVPN server admins.
> 
>     However, the default values for EasyRSA 2 such as MD5 hashing algorithm
>     and 1024-bit keysize seem totally inadequate for today's standards:
> 
>     <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/vars#L53
>     
> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/vars#L53>>
>     
> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/openssl-1.0.0.cnf#L57
>     
> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/openssl-1.0.0.cnf#L57>>
> 
>     I think we should upgrade these to something more recent. What would
>     more modern reasonable defaults be?
> 
> 
> 
> someday we decided to use DSA (instead of default RSA)
> it worked ... until we started to use OpenVPN Connect for iOS.
> next, we had to change back to RSA
> 
> 
> the conclusion would be "test all available platforms and take a
> decision", probably even set up special test server and ask people on
> openvpn-users mailing list

Always a good idea to test as many platforms as possible.  But we can
also leverage all the testing which have been done indirectly by others
as well.

The suggestion from Samuli is to update the default key size and hashing
algorithm.  MD5 is broken.  MD5 have been broken for years.  SHA1 have
the recent SHAttering panic, which have its own set of challenges - and
should not be used for certificates any longer (if I have understood the
crypto-gurus correctly).

Also considering that the "world in general" have been moving towards
stronger keys *and* have moved towards SHA256 hashing in certificates,
updating EasyRSA is more than reasonable.

So, I would highly recommend using SHA256.  I have used that for my
OpenVPN setups for several years already.  That works fine for me, and I
know others have done the same.  This is actually the most challenging
move, from a technical point of view - using a new algorithm.  But this
algorithm is well supported by all OpenSSL and mbed TLS implementations
OpenVPN can be built against.

Secondly, updating the key length from 1024 bits to at least 2048 should
not cause any issues at all.  Many users (myself included) often use
4096 bits keys without any issues.

Swapping RSA for DSA is an issue of a completely different league. And
DSA is by OpenSSH considered too weak; IIRC it was even removed in
OpenSSH v7.0.


-- 
kind regards,

David Sommerseth
OpenVPN Technologies, Inc


Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to