Am 02.04.19 um 11:45 schrieb David Sommerseth:
> On 29/03/2019 14:27, Arne Schwabe wrote:
>> With modern Clients and server initialising the crypto cipher later
>> and not when reading in the config, most users never the warning when
>> having selected BF-CBC in the configuration.
>>
>> This patch adds the logic to print out warning to init_key_type.
>>
>> Main reason for this patch is a personal experience with someone who was
>> strictly against putting 'cipher' into a config file because he did not
>> like hardcoding a cipher and "OpenVPN will do AES-GCM anyway" and thinks
>> that it is better to not have it in configuration even after told by me
>> that 15 year defaults might not be good anymore.
>>
>> Signed-off-by: Arne Schwabe <a...@rfc2549.org>
> Just so that I understand this correctly.
> 
> If a pre-2.4 _server_ (or 2.4 server with NCP disabled) uses default BF-CBC
> and the client is *not* listing --cipher at all - expecting the server to push
> a sane cipher - the current behaviour will to NOT warn about a weak cipher.
> Is that correctly understood?

Condition is 2.4 server or 2.4 client with cipher BF-CBC in the config
(or no cipher). If they push/get a secure cipher pushed, never warn
about having an insecure configuration.

Especially on a server this is important because without cipher in both
client and server everything works but only you actually connect a 2.3
or ncp-disable, you get a warning that your configuration is potentially
insecure. With this patch, server/client warn as soon as you load the
configuration.

Arne


_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to