This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree". The branch, next has been updated via ea6dd5b0aca7b28d7b9a5b539f614fcf6b736b18 (commit) from cb18f19307f64bfadada2d995893d9f5699911ed (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit ea6dd5b0aca7b28d7b9a5b539f614fcf6b736b18 Author: Erik Kapfer Date: Thu Feb 8 09:54:58 2018 +0100 OpenVPN: Mark unsecure ciphers and DH-parameter as 'weak' in WUI menu 64 bit block ciphers like Blowfish, TDEA and CAST5 are vulnerable to the so called 'Birthday attacks' . Infos for 'Sweet32' Birthday attacks can be found in here https://sweet32.info/ . An Overview of 64 bit clock ciphers can also be found in here http://en.citizendium.org/wiki/Block_cipher/Catalogs/Cipher_list#64-bit_blocks 1024 bit Diffie-Hellman parameter has also been marked as weak causing the 'Logjam Attack' . Infos for 'Logjam Attack' can be found in here https://weakdh.org/ . Signed-off-by: Erik Kapfer Signed-off-by: Michael Tremer ----------------------------------------------------------------------- Summary of changes: html/cgi-bin/ovpnmain.cgi | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) Difference in files: diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi index 9f5e682bd..0fa1d046e 100644 --- a/html/cgi-bin/ovpnmain.cgi +++ b/html/cgi-bin/ovpnmain.cgi @@ -2002,7 +2002,7 @@ END $Lang::tr{'ovpn dh'}: @@ -5210,12 +5210,12 @@ END - - - - - + + + + + $Lang::tr{'comp-lzo'} hooks/post-receive -- IPFire 2.x development tree