> > cipher AES-256-CBC
> > auth SHA256
> 
> AES-256-GCM is what you want, because it's less overhead than -CBC+SHA
> (AEAD, crypt-and-hash in one go)

tls-version-min 1.2
tls-cipher      TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
ncp-cipher      AES-256-GCM:AES-256-CBC
auth            SHA256
dh              none
ecdh-curve      secp384r1

like on https://www.privacy-handbuch.de/handbuch_97a.htm ?

> And, if all your systems are 2.4+ and you do not change --ncp-disable or
> --ncp-ciphers, is what you get automatically anyway. :-)

Which they are not :( The IGEL Client uses 2.3.10 :(

Ralf Hildebrandt
Charité - Universitätsmedizin Berlin
Geschäftsbereich IT | Abteilung Netzwerk

Campus Benjamin Franklin (CBF)
Haus I | 1. OG | Raum 105
Hindenburgdamm 30 | D-12203 Berlin

Tel. +49 30 450 570 155
ralf.hildebra...@charite.de
https://www.charite.de


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to