From mboxrd@z Thu Jan 1 00:00:00 1970 From: Michael Tremer To: development@lists.ipfire.org Subject: Re: [PATCH] OpenVPN: Delete 1024 bit DH-parameter from menu Date: Tue, 19 Jun 2018 11:31:48 +0100 Message-ID: <7917d09491273b6d97bf13938dbd1518bece2f73.camel@ipfire.org> In-Reply-To: <1529342196-12555-1-git-send-email-erik.kapfer@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============6224196417350584310==" List-Id: --===============6224196417350584310== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hello, this patch is fine, but what do we do with systems that already have a key generated with that size? -Michael On Mon, 2018-06-18 at 19:16 +0200, Erik Kapfer wrote: > Since OpenVPN-2.4.x do not accepts 1024 bit DH-parameter for security conce= rns > anymore, > it has been removed from the menu. >=20 > Signed-off-by: Erik Kapfer > --- > html/cgi-bin/ovpnmain.cgi | 2 -- > 1 file changed, 2 deletions(-) >=20 > diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi > index 0bc28ce..4bc3473 100644 > --- a/html/cgi-bin/ovpnmain.cgi > +++ b/html/cgi-bin/ovpnmain.cgi > @@ -1291,7 +1291,6 @@ END >
value=3D'yes' /> > > > $Lang::tr{'ovpn dh'}: >