Hi,

On 26-06-17 13:44, Christian Hesse wrote:
> Arne Schwabe <a...@rfc2549.org> on Mon, 2017/06/26 13:13:
>> OpenSSL 1.1 does not allow MD5 signed certificates by default anymore. This
>> can be enabled again by settings tls-cipher "DEFAULT:@SECLEVEL=0" but only
>> if the cipher list is set before loading the certificates. This patch
>> changes the order of loading. --- src/openvpn/ssl.c | 8 +++++--- 1 file
>> changed, 5 insertions(+), 3 deletions(-)
>>
>> diff --git a/src/openvpn/ssl.c b/src/openvpn/ssl.c
>> index 29280dce..9ca300c0 100644
>> --- a/src/openvpn/ssl.c
>> +++ b/src/openvpn/ssl.c
>> @@ -616,6 +616,11 @@ init_ssl(const struct options *options, struct
>> tls_root_ctx *new_ctx) tls_ctx_client_new(new_ctx);
>>      }
>>  
>> +    /* Allowable ciphers */
>> +    /* Since @SECLEVEL also influces loading of certificates, set the
>> +     * cipher restrictions before loading certificates */
>> +    tls_ctx_restrict_ciphers(new_ctx, options->cipher_list);
>> +
>>      tls_ctx_set_options(new_ctx, options->ssl_flags);
>>  
>>      if (options->pkcs12_file)
>> @@ -708,9 +713,6 @@ init_ssl(const struct options *options, struct
>> tls_root_ctx *new_ctx) tls_ctx_load_ecdh_params(new_ctx,
>> options->ecdh_curve); }
>>  
>> -    /* Allowable ciphers */
>> -    tls_ctx_restrict_ciphers(new_ctx, options->cipher_list);
>> -
>>  #ifdef ENABLE_CRYPTO_MBEDTLS
>>      /* Personalise the random by mixing in the certificate */
>>      tls_ctx_personalise_random(new_ctx);
> 
> Looks good and tested on a server with CA and server certificates using MD5.
> So ACK.

MD5 must die, die, die.  People still using MD5 certs should be thankful
that OpenSSL pointed out this security hole in their setup, and fix that
by immediately issuing SHA2 certs...

That said, the patch does not specifically allow MD5, makes sense by
itself, and passes my tests.  So, ACK.

-Steffan

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to