Hi,

On 18-03-2020 14:27, Ralf Hildebrandt wrote:
>>> cipher AES-256-CBC
>>> auth SHA256
>>
>> AES-256-GCM is what you want, because it's less overhead than -CBC+SHA
>> (AEAD, crypt-and-hash in one go)
> 
> tls-version-min 1.2
> tls-cipher      TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
> ncp-cipher      AES-256-GCM:AES-256-CBC
> auth            SHA256
> dh              none
> ecdh-curve      secp384r1
> 
> like on https://www.privacy-handbuch.de/handbuch_97a.htm ?

This seems good advise, yes. If you can update all configs: consider
also adding "cipher AES-256-GCM" (or CBC if you have 2.3 peers around)
to prevent any corner cases where OpenVPN might fall back to BF-CBC.

If performance is an issue, you might consider using AES-128, which is
slightly faster and good enough for most purposes, though possibly not
secure against future quantum computers.

Further: in order or preference, use --tls-crypt-v2 (not released yet,
new in OpenVPN 2.5), --tls-crypt (2.4+) or --tls-auth.

-Steffan


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to