From mboxrd@z Thu Jan 1 00:00:00 1970 From: Erik Kapfer To: development@lists.ipfire.org Subject: [PATCH] OpenVPN: Mark unsecure ciphers and DH-parameter as 'weak' in WUI menu Date: Thu, 08 Feb 2018 09:54:58 +0100 Message-ID: <1518080098-22100-1-git-send-email-erik.kapfer@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1977603405291834505==" List-Id: --===============1977603405291834505== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable 64 bit block ciphers like Blowfish, TDEA and CAST5 are vulnerable to the so c= alled 'Birthday attacks' . Infos for 'Sweet32' Birthday attacks can be found in here https://sweet32.info/ . An Overview of 64 bit clock ciphers can also be found in here http://en.citizendium.org/wiki/Block_cipher/Catalogs/Cipher_list#64-b= it_blocks 1024 bit Diffie-Hellman parameter has also been marked as weak causing the 'L= ogjam Attack' . Infos for 'Logjam Attack' can be found in here https://weakdh.org/ . Signed-off-by: Erik Kapfer --- html/cgi-bin/ovpnmain.cgi | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi index 9f5e682..0fa1d04 100644 --- a/html/cgi-bin/ovpnmain.cgi +++ b/html/cgi-bin/ovpnmain.cgi @@ -2002,7 +2002,7 @@ END $Lang::tr{'ovpn dh'}: =20 @@ -5210,12 +5210,12 @@ END - - - - - + + + + + $Lang::tr{'comp-lzo'} --=20 2.7.4 --===============1977603405291834505==--