-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Harden openvpn Tunnel #5498
Comments
https://community.openvpn.net/openvpn/wiki/Hardening#Useof--tls-auth |
Proposals and talk to harden openssl tunnel Openvpn works with two channels, the Please feel free to comment @DavidePrincipi and @gsanchietti. First I would talk about the If we need to remove or enforce settings we must think about backward compatibily between different openvpn version, we have a tools to know what version id used, crossing several distributions: https://pkgs.org/download/openvpn Still relative to cipher, we list in the dropdown several ciphers which are not compatible with the P2P topology, this will drive to a crash of the openvpn service. You can check what ciphers are relevant by When no cipher is used, I mean the --auth setting is not used by Nethserver, if not specified, the default is SHA1 which is 160 bit, we could propose a stronger one ( see
as a side note, comp-lzo is now obsolete, but with no removal date, we should use |
NS is not built for security gurus, we need to find a good balance between security and ease of use.
Let's add it to the "Advanced" section.
I agree, let's mark them as deprecated.
We can just enforce safer defaults for new tunnel servers since they are often used with other NethServer.
I'd go for the latter solution: add a label inside the current dropdown. Something like "XXXX-XX (subnet only)", and eventually add a validator to check if the selected policy can work with the current topology.
This is not entirely true: OpenVPN 2.4 automatically negotiate a stronger policy.
I agree, let's add it to "Advanced" section. Recap
I think the following options are too complex (experienced users can use template-custom):
|
Testing case Two new settings
The Now you can see the
|
As a side note if you do not set the values, openvpn negotiates itself @gsanchietti was right :D
|
|
@cotosso do you have some inputs |
Harden vpn and nethgui validation NethServer/dev#5498
in |
Verification check post above |
I 've installed and tested the rpm. In fact the SUBNET topology can use every cipher whereas p2p topology allows you only to use a small subset of ciphers (CBC). The validator of the web page correctly blocks you if you try to use "non CBC" cipher with p2p topology. Said that everything seems to work flawlessy for every test case, when I tried to use specific digest and cipher it worked as expected: Server Side:
Client Side:
Control channel uses specified Digest and cipher, whereas Data channel uses AES-256-CGM cipher |
in |
relased as 1.6.12 |
Following this https://bettercrypto.org/static/applied-crypto-hardening.pdf we learnt that :
We have more interesting informations from a openvpn dev at BetterCrypto/Applied-Crypto-Hardening#91 (comment)
In short for what he said, we cannot specify the option
tls-version-min 1.0 (or 1.1/1.2)
because it could break some configurations. Or of course we could test it as beta.Hence we could give the cipher list as it is suggested in the documentation we follow
we have also a good documentation to follow https://community.openvpn.net/openvpn/wiki/Hardening
The text was updated successfully, but these errors were encountered: