Hi Samuli, On 03/04/17 15:53, Samuli Seppänen wrote: > On 02/04/2017 10:57, Steffan Karger wrote: >> Hi, >> >> On 31-03-17 22:34, David Sommerseth wrote: >>> On 31/03/17 10:56, Илья Шипицин wrote: >>>> 2017-03-31 13:26 GMT+05:00 Samuli Seppänen <sam...@openvpn.net >>>> <mailto:sam...@openvpn.net>>: >>>> >>>> Hi, >>>> >>>> We still bundle EasyRSA 2 with our Windows installers and it is >>>> prominently advertised on our widely linked to HOWTO: >>>> >>>> <https://openvpn.net/index.php/open-source/documentation/howto.html >>>> <https://openvpn.net/index.php/open-source/documentation/howto.html>> >>>> >>>> As such, EasyRSA 2 is used by many/most OpenVPN server admins. >>>> >>>> However, the default values for EasyRSA 2 such as MD5 hashing >>>> algorithm >>>> and 1024-bit keysize seem totally inadequate for today's standards: >>>> >>>> >>>> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/vars#L53 >>>> >>>> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/vars#L53>> >>>> >>>> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/openssl-1.0.0.cnf#L57 >>>> >>>> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/openssl-1.0.0.cnf#L57>> >>>> >>>> I think we should upgrade these to something more recent. What would >>>> more modern reasonable defaults be? >>>> >>>> >>>> >>>> someday we decided to use DSA (instead of default RSA) >>>> it worked ... until we started to use OpenVPN Connect for iOS. >>>> next, we had to change back to RSA >>>> >>>> >>>> the conclusion would be "test all available platforms and take a >>>> decision", probably even set up special test server and ask people on >>>> openvpn-users mailing list >>> Always a good idea to test as many platforms as possible. But we can >>> also leverage all the testing which have been done indirectly by others >>> as well. >>> >>> The suggestion from Samuli is to update the default key size and hashing >>> algorithm. MD5 is broken. MD5 have been broken for years. SHA1 have >>> the recent SHAttering panic, which have its own set of challenges - and >>> should not be used for certificates any longer (if I have understood the >>> crypto-gurus correctly). >>> >>> Also considering that the "world in general" have been moving towards >>> stronger keys *and* have moved towards SHA256 hashing in certificates, >>> updating EasyRSA is more than reasonable. >>> >>> So, I would highly recommend using SHA256. I have used that for my >>> OpenVPN setups for several years already. That works fine for me, and I >>> know others have done the same. This is actually the most challenging >>> move, from a technical point of view - using a new algorithm. But this >>> algorithm is well supported by all OpenSSL and mbed TLS implementations >>> OpenVPN can be built against. >>> >>> Secondly, updating the key length from 1024 bits to at least 2048 should >>> not cause any issues at all. Many users (myself included) often use >>> 4096 bits keys without any issues. >>> >>> Swapping RSA for DSA is an issue of a completely different league. And >>> DSA is by OpenSSH considered too weak; IIRC it was even removed in >>> OpenSSH v7.0. >> Yes, upgrading would be good if we still ship it. I can echo David's >> SHA256 / RSA2048+ recommendation. Enough security margin, and very good >> interop (not only crypto libs, but also smart cards, OS key stores, >> ...). To not dramatically slow down connection setup on low-cpu-power >> devices (e.g. home routers), don't go beyond RSA4096 though. >> >> DSA is _not_ a preferred choice. The original 1024-bit DSA is too weak >> nowadays, and the 'larger' DSA variants are not even close to the wide >> support that RSA has. >> >> -Steffan >> > Hi, > > I've issue a pull request here and review would be appreciated: > > <https://github.com/OpenVPN/easy-rsa-old/pull/1> > > I tested these changes on Debian 8 which has OpenSSL-1.0.1. Key size was > set to 4096-bits and signature algorithm to SHA256WithRSAEncryption. > > The only real issue was DH parameter generation: it took ~25 minutes on > my Intel i5 laptop. Is that acceptable default behavior? > >
what kind of i5 is this? on my i7-4810 it took 5 minutes. Can you give the full CPUID string (from /proc/cpuinfo) ? then I can guestimate whether the 25 minutes is realistic for slower hardware. cheers, JJK ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel