Hardening OpenVPN part of Softether VPN
Posted: Wed Jun 08, 2016 6:00 pm
I stumbled across Softether as a long time OpenVPN user and find it really great. It's relatively easy to configure and the technical implementation of the OpenVPN part over localbridge is way faster and better in my opinion as the OpenVPN one using TAP Adapter. So far I love it. So thanks for that @devs.
There are just two thing quite annoying:
OpenVPN Client Log: "Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA"
https://www.ssl.com/how-to/turn-off-ssl ... r-browser/
Since TLS1.0 is outdated and considered unsecure, I propose to update the OpenVPN implementation of TLS1.2 or the implementation in general. Benefit would also be the support of actual cipher suites to harden the OpenVPN server and also the authentication part (support for at least auth SHA256).
https://community.openvpn.net/openvpn/wiki/Hardening
I would really like to see that happening. @Devs give some hint if any updates of the Softether OpenVPN part are planned. If the suggestion above are somehow not possible, please give a short explanation.
Thanks! Really like Softether.
There are just two thing quite annoying:
OpenVPN Client Log: "Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA"
https://www.ssl.com/how-to/turn-off-ssl ... r-browser/
Since TLS1.0 is outdated and considered unsecure, I propose to update the OpenVPN implementation of TLS1.2 or the implementation in general. Benefit would also be the support of actual cipher suites to harden the OpenVPN server and also the authentication part (support for at least auth SHA256).
https://community.openvpn.net/openvpn/wiki/Hardening
I would really like to see that happening. @Devs give some hint if any updates of the Softether OpenVPN part are planned. If the suggestion above are somehow not possible, please give a short explanation.
Thanks! Really like Softether.