On Sat, May 23, 2015 at 4:07 PM, Bonno Bloksma <b.blok...@tio.nl> wrote:
>>>> Just a heads up on this new attack
>>>> https://weakdh.org/
>>>>
>>> the short gist of this attack is:  upgrade your DH param file to 2048
>>> bits or more otherwise you're vulnerable :)
>>
>> This is true, but in the case of OpenVPN the case is less horrible, because:
>>
>> 1) OpenVPN encourages users to generate their own DH-group using 'openssl 
>> dhparam',
>> instead of using common groups. The man page / examples used to provide 1024 
>> bits
>> DH keys (updated to 2048 recently),
>
> Are you sure? I just looked at my setup which I generated many years ago and 
> it has a dh4096.pem file
> I think I generated this using default parameters because I did not 
> understand much about openvpn and keys at that time. But then again, maybe I 
> did increase it myself.

Yes, I'm sure. It was this commit where I updated the sample dh params
from 1024 to 2048 bits:
https://github.com/OpenVPN/openvpn/commit/b77c27a

-Steffan

------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud 
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to