From mboxrd@z Thu Jan 1 00:00:00 1970 From: Michael Tremer To: development@lists.ipfire.org Subject: Re: [PATCH] OpenVPN: Mark unsecure ciphers and DH-parameter as 'weak' in WUI menu Date: Mon, 12 Feb 2018 13:09:13 +0000 Message-ID: <1518440953.2541.67.camel@ipfire.org> In-Reply-To: <1518080098-22100-1-git-send-email-erik.kapfer@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============0250889019368335235==" List-Id: --===============0250889019368335235== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Merged. On Thu, 2018-02-08 at 09:54 +0100, Erik Kapfer wrote: > 64 bit block ciphers like Blowfish, TDEA and CAST5 are vulnerable to the so > called 'Birthday attacks' . > Infos for 'Sweet32' Birthday attacks can be found in here > https://sweet32.info/ . > An Overview of 64 bit clock ciphers can also be found in here > http://en.citizendium.org/wiki/Block_cipher/Catalogs/Cipher_list#64= -bi > t_blocks >=20 > 1024 bit Diffie-Hellman parameter has also been marked as weak causing the > 'Logjam Attack' . > Infos for 'Logjam Attack' can be found in here > https://weakdh.org/ . >=20 > Signed-off-by: Erik Kapfer > --- > html/cgi-bin/ovpnmain.cgi | 24 ++++++++++++------------ > 1 file changed, 12 insertions(+), 12 deletions(-) >=20 > diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi > index 9f5e682..0fa1d04 100644 > --- a/html/cgi-bin/ovpnmain.cgi > +++ b/html/cgi-bin/ovpnmain.cgi > @@ -2002,7 +2002,7 @@ END > > $Lang::tr{'ovpn dh'}: > > > =20 > @@ -5210,12 +5210,12 @@ END > > > > - > - > > - > - > - > + > + > + > + > + > > > $Lang::tr{'comp-lzo'} --===============0250889019368335235==--