On Tue, Aug 7, 2018 at 2:10 PM, Jeroen Balduyck
<[email protected]> wrote:
>>
>> The server should pick the same ciphersuite as in the TLS channel. However 
>> you raise a valid point, you have no way to affect that ciphersuite right? 
>> Either in the old or the new protocol. Indeed the oc client gives >no 
>> control on the priority string used to negotiate. You can only configure it 
>> at server side. That looks like an omission.
>>
>
> The server is definitely *not* picking the same cipher as in the TLS
> channel. That TLS cipher (AES256-GCM-SHA384 ) is not being offered for
> the DTLS-channel when using PSK-negotiate (as I checked using
> Wireshark). So the server can't pick it for that reason. Hence, with
> PSK-negotiate we arrive at AES256-CBC-SHA for the DTLS-channel. So
> that's issue 1.

That seems to remind some limitations of the openssl build of
openconnect but I may be wrong. Are you compiling the openconnect
client with openssl or gnutls?

> 2nd issue is that I can use -dtls-ciphers=OC-DTLS1_2-AES128-GCM as a
> parameter at client side to force a GCM cipher.

Please see the replies from David and me. This only negotiates the
algorithm of the DTLS part of the session _not_ the TLS, and is doing
it in an unnatural way via text strings while DTLS has a robust
negotiation mechanism. What openconnect client is missing is a way to
set the ciphersuite preferrence of the client (in TLS or DTLS) by
command line. Feel free to submit a patch to address that; note that
these are already configurable if you have control on the server side.

regards,
Nikos

_______________________________________________
openconnect-devel mailing list
[email protected]
http://lists.infradead.org/mailman/listinfo/openconnect-devel

Reply via email to