Am 29.09.23 um 03:25 schrieb Selva Nair:


On Thu, Sep 28, 2023 at 8:55 PM Arne Schwabe <a...@rfc2549.org <mailto:a...@rfc2549.org>> wrote:


    Am 29.09.2023 um 01:08 schrieb mike tancsa:

    Hi Selva,

        Thank you for looking!


    My guess is that something in the certificate or private key is
    not to
    OpenSSL 3.1's liking and it rejects it. Is there any way for you
    to check the
    contents of the token independently using a tool linked against
    OpenSSL 3.1 ?

    What am I looking for in that case ?  Taking a look at the cert
    just with openssl 3.0 on FreeBSD releng14 it seems ok with it.
    Same with the Windows version 3.1.x that comes with OpenVPN. Is it
    possible it doesnt like the sha1RSA sig ?


    OpenSSL 3.0 has security 1 by default (OpenSSL 3.1 has 2 by
    default)  and that does not allow SHA1 signatures anymore. See
    https://www.openssl.org/docs/man3.1/man3/SSL_CTX_set_security_level.html 
<https://www.openssl.org/docs/man3.1/man3/SSL_CTX_set_security_level.html>


Good point. But, unless the config has "tls-cert-profile foo", we still default to legacy and call SSL_CTX_set_security_level(ctx, 1), isn't it? Wouldn't that allow SHA1 with 3.1.x ?

For SHA1 you need security 0 aka tls-cert-profile insecure.

But we might update OpenVPN to longer fiddle with the default security level in OpenSSL 3+ to avoid downgrading security from 2 to 1 on OpenSSL 3.1

Arne


_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to