Hi,

On 04-11-16 02:03, Jason Haar wrote:
> Am I correct that to move off Blowfish cipher, we'll have to reconfigure
> the openvpn servers and clients simultaneously? The server and clients
> don't currently have "cipher" defined, but the newer clients are
> generating those "cipher" warnings. 
> 
> Also, am I correct that "cipher" cannot be used within a "<connection>"
> block? ie there's no way to migrate - it has to be a "hard" outage. 
> 
> I'm just wondering how other people do it. I can't see any way out of
> this other than bringing up entirely independent server infrastructure,
> so that the new clients can use the new servers while the old clients
> migrate.

With 2.3, yes.  OpenVPN 2.4 offers 'Negotiable Crypto Parameters', which
will (by default) negotiate AES-GCM if both client and server support
negotiation (ie, are 2.4+).  That is the more elegant migration path.

2.4 isn't stable yet, but an alpha2 preview is available for testing
[1].  The current goal is to release 2.4.0 by the end of this year.

The risks of the 64-bit block ciphers are as of 2.3.13 mitigated by
setting --reneg-bytes to 64 MB.  That is of course suboptimal, but
should be barely noticeable for most use cases.  So you might want to
consider waiting for the 2.4.0 release, or start testing 2.4 right away
and migrate as soon as you've got confidence in the 2.4 code base.  (The
2.4/master branch really is quite stable actually, and has a lot of
other nice features worth migrating for.)

-Steffan

[1] https://openvpn.net/index.php/open-source/downloads.html

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today. http://sdm.link/xeonphi
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to