Hi,

>>> Just a heads up on this new attack
>>> https://weakdh.org/
>>>
>> the short gist of this attack is:  upgrade your DH param file to 2048 
>> bits or more otherwise you're vulnerable :)
>
> This is true, but in the case of OpenVPN the case is less horrible, because:
> 
> 1) OpenVPN encourages users to generate their own DH-group using 'openssl 
> dhparam',
> instead of using common groups. The man page / examples used to provide 1024 
> bits
> DH keys (updated to 2048 recently),

Are you sure? I just looked at my setup which I generated many years ago and it 
has a dh4096.pem file
I think I generated this using default parameters because I did not understand 
much about openvpn and keys at that time. But then again, maybe I did increase 
it myself.

Bonno Bloksma



------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud 
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to