For "a", one could limit it to the current openvpn version in the script
and print a warning about the script being out of date and possibly
dangerous if the openvpn version is higher?
On 08/16/2017 03:10 AM, open...@keemail.me wrote:
Thank you for the feedback!
a)
You're absolutely right,
Thanks your for the interest.
The first tool, to grade the server configuration will not be like the
ssh-audit tool you mentioned.
It merely parses a local configuration file and informs the user about the
security of the setup and further suggestions.
The second tool I'm planning to release in
Thank you for the feedback!
a)
You're absolutely right, once the tool is not maintained anymore, it could give
a false sense of security and therefore do more harm than good. I'll do my best
to keep it up-to-date. I'm also to open-source it on github, therefore any user
suggestions will be tak
Hello,
On 16/08/17 14:21, open...@keemail.me wrote:
> Hello,
>
> I've developed a Python script to grade OpenVPN server configurations
> considering the security.
> The tool mainly focuses on: auth, cipher, tls-cipher, prng, tls-auth,
> tls-version-min/max, no-replay, no-iv, key-method, ncp-ci
2017-08-16 11:21 GMT+05:00 :
> Hello,
>
> I've developed a Python script to grade OpenVPN server configurations
> considering the security.
> The tool mainly focuses on: auth, cipher, tls-cipher, prng, tls-auth,
> tls-version-min/max, no-replay, no-iv, key-method, ncp-ciphers,
> ncp-disable, tls-c
Hello,
I've developed a Python script to grade OpenVPN server configurations
considering the security.
The tool mainly focuses on: auth, cipher, tls-cipher, prng, tls-auth,
tls-version-min/max, no-replay, no-iv, key-method, ncp-ciphers, ncp-disable,
tls-crypt and key-direction.
The result is