From patchwork Wed Feb 23 10:16:41 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Michael Tremer X-Patchwork-Id: 5275 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4K3X5D6jtxz3xgV for ; Wed, 23 Feb 2022 10:16:48 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4K3X5B5Jgzz1gD; Wed, 23 Feb 2022 10:16:46 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4K3X5B4lRSz2ypl; Wed, 23 Feb 2022 10:16:46 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4K3X594Tdhz2xRb for ; Wed, 23 Feb 2022 10:16:45 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4K3X586G5TzjC; Wed, 23 Feb 2022 10:16:44 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1645611404; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=zdufbr3djyBxVcT49pl4Pvp7fib4o7J8iOqOo8a4a30=; b=73lgzjt6MRvxHzLMlW7+vVw86T6Wd1OSGvIR+eiRKgtJqP1M+EQ5Tw8IRdHIF/09K/Fd/5 QhUW8dnM0wQK7OCA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1645611404; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=zdufbr3djyBxVcT49pl4Pvp7fib4o7J8iOqOo8a4a30=; b=gExwWSeUozgyeFLBdDFbeh9iy5Q03ZnbRzDPEkuSnIJRBRA7OrLYzFMYWRIKCcN2B6Tk+p mm1mR0hOd09JFLtyYt/9RQJAnthn19we+69Xuv1+bs8CN7jAuDde1vuNfJb2PWK3NbEhWV +P0FXLWUK52bGBb8Vco8mwVfJnxmktdnk+bQ2A+650lp+smbCoZ1wHPryviuekumZXH4ML 0X/gjv78Eif2KpeE3KeGT6SlzwDWjLx69Dq8X0gLLxavhhQ3t2iiK+dtSUYBpbu+XuH11J 4P4uyfCxnYwEcUkiQTF9FbykEyeP5T92srJFoygEO21qwGvLuPDUXSaBpXUb7A== From: Michael Tremer To: development@lists.ipfire.org Subject: [PATCH] vpnmain.cgi: Select Curve 25519 as default Date: Wed, 23 Feb 2022 10:16:41 +0000 Message-Id: <20220223101641.1272786-1-michael.tremer@ipfire.org> MIME-Version: 1.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Michael Tremer Errors-To: development-bounces@lists.ipfire.org Sender: "Development" This was supposed to be enabled by default. Due to a copy-and-paste error, it was, however, not selected for IKE, but only for ESP. Signed-off-by: Michael Tremer Reviewed-by: Peter Müller --- html/cgi-bin/vpnmain.cgi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/html/cgi-bin/vpnmain.cgi b/html/cgi-bin/vpnmain.cgi index fb0af104f..3652627e9 100644 --- a/html/cgi-bin/vpnmain.cgi +++ b/html/cgi-bin/vpnmain.cgi @@ -2360,7 +2360,7 @@ END #use default advanced value $cgiparams{'IKE_ENCRYPTION'} = 'chacha20poly1305|aes256gcm128|aes256gcm96|aes256gcm64|aes256|aes192gcm128|aes192gcm96|aes192gcm64|aes192|aes128gcm128|aes128gcm96|aes128gcm64|aes128'; #[18]; $cgiparams{'IKE_INTEGRITY'} = 'sha2_512|sha2_256'; #[19]; - $cgiparams{'IKE_GROUPTYPE'} = 'curve448|curve448|4096|3072|2048'; #[20]; + $cgiparams{'IKE_GROUPTYPE'} = 'curve448|curve25519|4096|3072|2048'; #[20]; $cgiparams{'IKE_LIFETIME'} = '3'; #[16]; $cgiparams{'ESP_ENCRYPTION'} = 'chacha20poly1305|aes256gcm128|aes256gcm96|aes256gcm64|aes256|aes192gcm128|aes192gcm96|aes192gcm64|aes192|aes128gcm128|aes128gcm96|aes128gcm64|aes128'; #[21]; $cgiparams{'ESP_INTEGRITY'} = 'sha2_512|sha2_256'; #[22];