Hej David,

thakn you for your statement!

Please excuse my delay....

Am 18.11.19 um 14:19 schrieb David Sommerseth:

[snip]


This just gave me a little itch.  Such old routers can often have quite poor
random entropy - which can result in more predictable keys.  This is
especially more important for keys which have longer life time (like key files
stored to disk).  So I rather suggest using a real computer to generate the
keying material and then copy that file to the server/router and clients.

I had a thread about that topic on the LEAF Bering uClibc. Erich gave me the same recommendation - for different reason. So I do (with xca).

Now, tls-auth with a potentially weaker key will still give some protection
and most likely shed off most of troubles you have.  But, theoretically at
least, it can be easier to "figure out" the tls-auth key if a dedicated
attacker figures out what kind of device you have and what kind of firmware it
is running.

We decided to get rid of the risc by stopping the openvpnd until we did the upgrade. Glad we can afford to live without the tunnel some days....

Other than that, Gert is absolutely right.  But you should generally put some
efforts upgrading asap.  The last OpenVPN 2.0 release was somewhere around
2006-ish (over 13 years ago).

Yes. The server box (original from 2004) will be ready in some hours. After that I'll care about the client.

Thanks again and regards,

Boris


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to