Am 14.04.17 um 17:40 schrieb Steffan Karger:
> This allows the user to specify what certificate crypto algorithms to
> support.  The supported profiles are 'preferred' (default), 'legacy' and
> 'suiteb', as discussed in <84590a17-1c48-9df2-c48e-4160750b2...@fox-it.com>
> (https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg14214.html).
> 
> This only implements the feature for mbed TLS builds, because for mbed it
> is both more easy to implement and the most relevant because mbed TLS 2+
> is by default somewhat restrictive by requiring 2048-bit+ for RSA keys.
> 

ACK so far as the code goes. As for the whole MD5 stuff is at the moment
blowing up with OSSL 1.1, we need a md5 allowing option (with a fat
warning probably).

And the other thing is that OpenSSL has a similar feature in 1.1:
Security levels. Which can be specified as part of tls-cipher or set
independently by
https://www.openssl.org/docs/manmaster/man3/SSL_CTX_set_security_level.html

The levels are similar to the proposed level here but not identical.
Should we somehow align these two features? Configuring it for one
library in tls-cipher and for the other in tls-cert-profile is bit strange.

Also shouldn't be tls-min-version included in the preferred/legacy options?

And suiteb would be tls-cipher SUITEB128 in OpenSSL

Arne

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to