Hi, On Wed, Aug 05, 2020 at 08:43:18AM +0200, Gert Doering wrote: > Test run with "cipher bf-cbc" in all server configs next...
For completeness, this works nicely: start client jobs... 22... Test sets succeeded: 1 2 3 4 6 8. Test sets failed: none. 23.small... Test sets succeeded: 1 2 3 4. Test sets failed: none. 23... Test sets succeeded: 1 1a 1b 1d 2 2a 2b 2c 2d 3 4 5 6 8 8a 9. Test sets failed: none. 24... Test sets succeeded: 1 1a 1b 1c 1d 1e 2 2a 2b 2c 2d 2e 3 4 4a 5 6 8 8a 9. Test sets failed: none. master... Test sets succeeded: 1 1a 1b 1c 1d 1e 2 2a 2b 2c 2d 2e 3 4 5 5a 5b 5c 5d 5v1 5v2 5v3 5w1 5w2 5w3 5w4 5x1 5x2 5x3 5x4 6 7 7x 8 8a 9 2f 4b. Test sets failed: none. so, if we break someone's existing server setup, the answer is "put 'fallback-cipher BF-CBC' into your config!" (or 'cipher BF-CBC' explicitly, so it's 2.4-compatible) Not sure how to tackle the "ccd/ push cipher is broken now with 2.4-NCP clients" part. I think this is useful functionality, but the current patch does not allow this "unless the client is already using the to-be- pushed cipher, or it's one of the two NCP=2 AEAD ciphers". Which makes it slightly less than useful... gert -- "If was one thing all people took for granted, was conviction that if you feed honest figures into a computer, honest figures come out. Never doubted it myself till I met a computer with a sense of humor." Robert A. Heinlein, The Moon is a Harsh Mistress Gert Doering - Munich, Germany g...@greenie.muc.de
signature.asc
Description: PGP signature
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel