Hi Ralf,

On 16/06/15 16:40, Ralf Hildebrandt wrote:
> Are there currently recommendations for the ciphers when dealing with
> clients >= 2.3.6 (Cross-platform; windows, mac os x, Linux)?
>
> I've seen:
>
> cipher AES-256-CBC
> keysize 256
> auth SHA256
>
> and:
>
> cipher AES-256-CBC
> auth SHA512
> tls-cipher DHE-RSA-AES256-SHA
>
I'd recommend

cipher AES-256-CBC
auth SHA256

(the keysize is fixed for AES so there's no need to specify it; the only 
ciphers with variable keysize are RC2, CAST5 and BlowFish).

The main reason to use AES-256 is if you're using machines that are 
optimized for AES (e.g. AES-NI capable CPU's). AES-256 is faster than 
Blowfish on such CPU's.
Increasing the auth (hash) size to 512 is not likely to increase 
security, unless you are also issuing certificates signed using SHA512: 
the control channel hashing algo is almost always the same as the algo 
used to sign the certificates.
By using 'auth sha512' you could end up making the data channel more 
securely hashed/signed (and a lot slower) than the control channel, 
which does add a lot of extra security.

HTH,

JJK

------------------------------------------------------------------------------
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to