Am 27.10.14 22:59, schrieb Steffan Karger:
> Hi,
>
> Since I had to miss the most recent IRC meeting, I'll just put this on
> the mailinglist.
>
> OpenVPN has used TLSv1.0 exclusively for a long time. A few months ago,
> TLS version negotiation was added for OpenSSL builds (PolarSSL builds
> already had version negotiation), but that triggered quite some problems
> at our users. For example, our cryptoapi implementation doesn't support
> TLSv1.2 and some external PKCS#11 libraries and tokens refuse to create
> TLSv1.2 signatures (which we can't fix ourselves).
>
> To ease the transition, while we and external vendors fix the various
> problems, I propose to add an option '--tls-version-max', similar to the
> current '--tls-version-min'. That will enable users to e.g. use TLSv1.1
> on the clients that won't work with 1.2. At least for one of the
> problematic setups I encountered, this was a nice way out.
>
> Attached are two patches that do just that for the 2.3 and master branches.
>
> Of course this should not stop us from fixing problems with TLSv1.2 (at
> least the problems we actually can fix...).
ACK. TLS 1.0-1.1 is better than TLS 1.0 only because TLS 1.2 does not work.

I think if this gets commited cryptoapicert should set max-tls-version
to 1.1 and warn accordingly.

Arne

-- 
Arne Schwabe, M.Sc. - http://www.uni-paderborn.de/cs/cn/
Computer Science, University of Paderborn, Germany,  +49 5251 60-1756



Reply via email to