Hi,

On Fri, 14 Sep 2018 at 18:46, <2...@minasithil.org> wrote:
> Would ECDHE-ECDSA-AES128-GCM-SHA256 be a good cipher for a routed VPN
> with a central server and many independent nodes?
> I have heard about ECDSA problems due to poor (P)RNG implementations
> causing key leakage, but I guess I could just pick
> ECDHE-RSA-AES128-GCM-SHA256 if that is of concern.
>
> I would like to hear your thoughts about that approach.
> Thank you.

Both are fine. Good random is indeed important ECDHE-ECDSA, but only
marginally less so for ECDHE-RSA. Both ECDHE (the ephemeral key
exchange) and the OpenVPN protocol itself need good random to generate
ephemeral keys too.

-Steffan


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to