Merged. On Thu, 2018-02-08 at 09:54 +0100, Erik Kapfer wrote: > 64 bit block ciphers like Blowfish, TDEA and CAST5 are vulnerable to the so > called 'Birthday attacks' . > Infos for 'Sweet32' Birthday attacks can be found in here > https://sweet32.info/ . > An Overview of 64 bit clock ciphers can also be found in here > http://en.citizendium.org/wiki/Block_cipher/Catalogs/Cipher_list#64-bi > t_blocks > > 1024 bit Diffie-Hellman parameter has also been marked as weak causing the > 'Logjam Attack' . > Infos for 'Logjam Attack' can be found in here > https://weakdh.org/ . > > Signed-off-by: Erik Kapfer > --- > html/cgi-bin/ovpnmain.cgi | 24 ++++++++++++------------ > 1 file changed, 12 insertions(+), 12 deletions(-) > > diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi > index 9f5e682..0fa1d04 100644 > --- a/html/cgi-bin/ovpnmain.cgi > +++ b/html/cgi-bin/ovpnmain.cgi > @@ -2002,7 +2002,7 @@ END > > $Lang::tr{'ovpn dh'}: > > > > @@ -5210,12 +5210,12 @@ END > > > > - > - > > - > - > - > + > + > + > + > + > > > $Lang::tr{'comp-lzo'}