OpenVPN: Delete 1024 bit DH-parameter from menu

Message ID 1529342196-12555-1-git-send-email-erik.kapfer@ipfire.org
State Accepted
Commit e3dda65eba58c6d168fcb1c98573a08d8c79703a
Headers
Series OpenVPN: Delete 1024 bit DH-parameter from menu |

Commit Message

Erik Kapfer June 19, 2018, 3:16 a.m. UTC
  Since OpenVPN-2.4.x do not accepts 1024 bit DH-parameter for security concerns anymore,
    it has been removed from the menu.

Signed-off-by: Erik Kapfer <erik.kapfer@ipfire.org>
---
 html/cgi-bin/ovpnmain.cgi | 2 --
 1 file changed, 2 deletions(-)
  

Comments

Michael Tremer June 19, 2018, 8:31 p.m. UTC | #1
Hello,

this patch is fine, but what do we do with systems that already have a key
generated with that size?

-Michael

On Mon, 2018-06-18 at 19:16 +0200, Erik Kapfer wrote:
> Since OpenVPN-2.4.x do not accepts 1024 bit DH-parameter for security concerns
> anymore,
>     it has been removed from the menu.
> 
> Signed-off-by: Erik Kapfer <erik.kapfer@ipfire.org>
> ---
>  html/cgi-bin/ovpnmain.cgi | 2 --
>  1 file changed, 2 deletions(-)
> 
> diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi
> index 0bc28ce..4bc3473 100644
> --- a/html/cgi-bin/ovpnmain.cgi
> +++ b/html/cgi-bin/ovpnmain.cgi
> @@ -1291,7 +1291,6 @@ END
>  		<form method='post'><input type='hidden' name='AREUSURE'
> value='yes' />
>  		<input type='hidden' name='KEY' value='$cgiparams{'KEY'}' />
>  			<select name='DHLENGHT'>
> -				<option value='1024'
> $selected{'DHLENGHT'}{'1024'}>1024 $Lang::tr{'bit'} ($Lang::tr{'vpn
> weak'})</option>
>  				<option value='2048'
> $selected{'DHLENGHT'}{'2048'}>2048 $Lang::tr{'bit'}</option>
>  				<option value='3072'
> $selected{'DHLENGHT'}{'3072'}>3072 $Lang::tr{'bit'}</option>
>  				<option value='4096'
> $selected{'DHLENGHT'}{'4096'}>4096 $Lang::tr{'bit'}</option>
> @@ -1973,7 +1972,6 @@ END
>  	    </select></td>
>  	<tr><td class='base'>$Lang::tr{'ovpn dh'}:</td>
>  		<td class='base'><select name='DHLENGHT'>
> -				<option value='1024'
> $selected{'DHLENGHT'}{'1024'}>1024 $Lang::tr{'bit'} ($Lang::tr{'vpn
> weak'})</option>
>  				<option value='2048'
> $selected{'DHLENGHT'}{'2048'}>2048 $Lang::tr{'bit'}</option>
>  				<option value='3072'
> $selected{'DHLENGHT'}{'3072'}>3072 $Lang::tr{'bit'}</option>
>  				<option value='4096'
> $selected{'DHLENGHT'}{'4096'}>4096 $Lang::tr{'bit'}</option>
  
ummeegge June 19, 2018, 9:58 p.m. UTC | #2
Hi Michael,
the connections won´t start for this systems and the logs should
display an appropriate error, in that case they will need to recreate
it which is possible over the WUI.
After the update to Core 120 only a few people wrote about that problem
 possibly because mostly people do use already 2048 bit.

Erik

Am Dienstag, den 19.06.2018, 11:31 +0100 schrieb Michael Tremer:
> Hello,
> 
> this patch is fine, but what do we do with systems that already have
> a key
> generated with that size?
> 
> -Michael
> 
> On Mon, 2018-06-18 at 19:16 +0200, Erik Kapfer wrote:
  
Michael Tremer June 19, 2018, 11:03 p.m. UTC | #3
We need to *warn* people about these changes in advance. And we need to
have a visual indicator that some action is required here to replace
the DH params then.

We cannot break things and expect people to find something in the log
files.

Can we do that and automatically generate a 2k DH params for them?
Would the clients notice that this has changed?

Best,
-Michael

On Tue, 2018-06-19 at 13:58 +0200, ummeegge wrote:
> Hi Michael,
> the connections won´t start for this systems and the logs should
> display an appropriate error, in that case they will need to recreate
> it which is possible over the WUI.
> After the update to Core 120 only a few people wrote about that problem
>  possibly because mostly people do use already 2048 bit.
> 
> Erik
> 
> Am Dienstag, den 19.06.2018, 11:31 +0100 schrieb Michael Tremer:
> > Hello,
> > 
> > this patch is fine, but what do we do with systems that already have
> > a key
> > generated with that size?
> > 
> > -Michael
> > 
> > On Mon, 2018-06-18 at 19:16 +0200, Erik Kapfer wrote:
> 
>
  
ummeegge June 20, 2018, 4:39 a.m. UTC | #4
Hi Michael,

Am Dienstag, den 19.06.2018, 14:03 +0100 schrieb Michael Tremer:
> We need to *warn* people about these changes in advance.
This would be best suited but i didn´t realize that OpenVPN-2.4x do not
accept 1024 bit anymore. All testers seems to oversee this too and the
OpenVPN change log didn´t pointed it out clearly...

>  And we need to
> have a visual indicator that some action is required here to replace
> the DH params then.
Started to make a $problemmessage section where we can put also some
other potential or real problems like e.g. check for 'no MD5 for
signature anymore', 'Soon needed RFC3280 compliance for the
certificates' . There is surely more...
Good idea ?

> 
> We cannot break things and expect people to find something in the log
> files.
Should be like above written displayed then above the main settings
section like $errormessage.

> 
> Can we do that and automatically generate a 2k DH params for them?
> Would the clients notice that this has changed?
Except a little longer time for the handshake the clients won´t realize
this since the DH-parameter takes only place on server side.

Should we do an automatic DH generation of 2k via update.sh with the
next update ?

Best,

Erik

> 
> Best,
> -Michael
> 
> On Tue, 2018-06-19 at 13:58 +0200, ummeegge wrote:
> > 
> > Hi Michael,
> > the connections won´t start for this systems and the logs should
> > display an appropriate error, in that case they will need to
> > recreate
> > it which is possible over the WUI.
> > After the update to Core 120 only a few people wrote about that
> > problem
> >  possibly because mostly people do use already 2048 bit.
> > 
> > Erik
> > 
> > Am Dienstag, den 19.06.2018, 11:31 +0100 schrieb Michael Tremer:
> > > 
> > > Hello,
> > > 
> > > this patch is fine, but what do we do with systems that already
> > > have
> > > a key
> > > generated with that size?
> > > 
> > > -Michael
> > > 
> > > On Mon, 2018-06-18 at 19:16 +0200, Erik Kapfer wrote:
> >
  
ummeegge June 21, 2018, 7:52 p.m. UTC | #5
Hi Michael,

Am Dienstag, den 19.06.2018, 14:03 +0100 schrieb Michael Tremer:
> We need to *warn* people about these changes in advance. And we need
> to
> have a visual indicator that some action is required here to replace
> the DH params then.
> 
> We cannot break things and expect people to find something in the log
> files.

here the first idea how we could solve this
-> https://patchwork.ipfire.
org/patch/1835/ .


Best,

Erik
  

Patch

diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi
index 0bc28ce..4bc3473 100644
--- a/html/cgi-bin/ovpnmain.cgi
+++ b/html/cgi-bin/ovpnmain.cgi
@@ -1291,7 +1291,6 @@  END
 		<form method='post'><input type='hidden' name='AREUSURE' value='yes' />
 		<input type='hidden' name='KEY' value='$cgiparams{'KEY'}' />
 			<select name='DHLENGHT'>
-				<option value='1024' $selected{'DHLENGHT'}{'1024'}>1024 $Lang::tr{'bit'} ($Lang::tr{'vpn weak'})</option>
 				<option value='2048' $selected{'DHLENGHT'}{'2048'}>2048 $Lang::tr{'bit'}</option>
 				<option value='3072' $selected{'DHLENGHT'}{'3072'}>3072 $Lang::tr{'bit'}</option>
 				<option value='4096' $selected{'DHLENGHT'}{'4096'}>4096 $Lang::tr{'bit'}</option>
@@ -1973,7 +1972,6 @@  END
 	    </select></td>
 	<tr><td class='base'>$Lang::tr{'ovpn dh'}:</td>
 		<td class='base'><select name='DHLENGHT'>
-				<option value='1024' $selected{'DHLENGHT'}{'1024'}>1024 $Lang::tr{'bit'} ($Lang::tr{'vpn weak'})</option>
 				<option value='2048' $selected{'DHLENGHT'}{'2048'}>2048 $Lang::tr{'bit'}</option>
 				<option value='3072' $selected{'DHLENGHT'}{'3072'}>3072 $Lang::tr{'bit'}</option>
 				<option value='4096' $selected{'DHLENGHT'}{'4096'}>4096 $Lang::tr{'bit'}</option>