This package
https://download.copr.fedorainfracloud.org/results/dsommers/openvpn-release-2.6/epel-7-x86_64/06080865-openvpn/openvpn-2.6.5-1.el7.src.rpm
contains
  0001-Change-the-default-cipher-to-AES-256-GCM-for-server-.patch
which contains
    This change makes the server use AES-256-GCM instead of BF-CBC as the default
    cipher for the VPN tunnel.
    --- a/distro/systemd/openvpn-ser...@.service.in
    +++ b/distro/systemd/openvpn-ser...@.service.in
    @@ -10,7 +10,7 @@
    Type=notify
    PrivateTmp=true
    WorkingDirectory=/etc/openvpn/server
    -ExecStart=@sbindir@/openvpn --status %t/openvpn-server/status-%i.log --status-version 2 --suppress-timestamps --config %i.conf     +ExecStart=@sbindir@/openvpn --status %t/openvpn-server/status-%i.log --status-version 2 --suppress-timestamps --cipher AES-256-GCM --data-ciphers AES-256-GCM:AES-128-GCM:AES-256-CBC:AES-128-CBC --config %i.conf


Is this actually still necessary in openvpn 2.6.x?

Besides, changelog for 2.6 contains
    ...
CHACHA20-POLY1305 is included in the default of |--data-ciphers| when available.
   ...
will this patch disable CHACHA-20?

Thanks

_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to