On 22-04-2020 10:27, Jan Just Keijser wrote: > On 22/04/20 10:13, Arne Schwabe wrote: >>>> SSL_check_chain() function". >>>> >>>> Which we don't, I just grepped through our source tree. >>>> >>>> So, unless I misunderstand something about OpenSSL intricacies, I think >>>> we're safe - no new installers needed, and OpenVPN is not in risk. >>>> >>>> >>> the advisory applies only to application that use the SSL_check_chain() >>> function as part of a TLS 1.3 handshake. AFAIK, iIn OpenVPN 2.4 we don't >>> do anything with TLS 1.3 just yet, so this security advisory does not >>> apply to OpenVPN. Also note that this bug appears only in OpenSSL 1.1.1 >>> [d-f] , so anything older is fine as well. >> Hu? OpenVPN 2.4 supports TLS 1.3 just fine. We have support for it in >> tls-version-min and also tls-ciphersuites which is TLS 1.3 specific. >> >> > what I meant was that OpenVPN 2.4 does not do any *specific* with any of > the new features of TLS 1.3, like the new psk callbacks etc. If the > control session is negotiated using TLS 1.3 then sure, OpenVPN will use > that, but other that OpenVPN does not make use of any of the new > features or crypto algorithms that come with OpenSSL 1.1.1 or TLS 1.3 > (chacha20 anyone ;) ? )
Arne has been working on some of the TLS 1.3-specific features, such as using CHACHA20-POLY1305 for the control channel: $ openvpn --show-tls Available TLS Ciphers, listed in order of preference: For TLS 1.3 and newer (--tls-ciphersuites): TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_GCM_SHA256 For TLS 1.2 and older (--tls-cipher): TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384 (This is with OpenVPN 2.4.7 from the Ubuntu 20.04 package.) -Steffan _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel