From patchwork Mon Dec 13 04:09:50 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arne Schwabe X-Patchwork-Id: 2157 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director14.mail.ord1d.rsapps.net ([172.31.255.6]) by backend41.mail.ord1d.rsapps.net with LMTP id kGdNAXZit2HpdQAAqwncew (envelope-from ) for ; Mon, 13 Dec 2021 10:10:46 -0500 Received: from proxy17.mail.iad3b.rsapps.net ([172.31.255.6]) by director14.mail.ord1d.rsapps.net with LMTP id KIdxG3Zit2HHZAAAeJ7fFg (envelope-from ) for ; Mon, 13 Dec 2021 10:10:46 -0500 Received: from smtp6.gate.iad3b ([172.31.255.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy17.mail.iad3b.rsapps.net with LMTPS id EEQJFnZit2HNdgAA5ccGVQ (envelope-from ) for ; Mon, 13 Dec 2021 10:10:46 -0500 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.105.38.7] Authentication-Results: smtp6.gate.iad3b.rsapps.net; iprev=pass policy.iprev="216.105.38.7"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dmarc=none (p=nil; dis=none) header.from=rfc2549.org X-Suspicious-Flag: YES X-Classification-ID: d8519728-5c26-11ec-9e41-5254000d607e-1-1 Received: from [216.105.38.7] ([216.105.38.7:51516] helo=lists.sourceforge.net) by smtp6.gate.iad3b.rsapps.net (envelope-from ) (ecelerity 4.2.38.62370 r(:)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id 79/2A-29509-57267B16; Mon, 13 Dec 2021 10:10:45 -0500 Received: from [127.0.0.1] (helo=sfs-ml-4.v29.lw.sourceforge.com) by sfs-ml-4.v29.lw.sourceforge.com with esmtp (Exim 4.94.2) (envelope-from ) id 1mwmxk-0006y4-36; Mon, 13 Dec 2021 15:10:00 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-4.v29.lw.sourceforge.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1mwmxi-0006xv-Ry for openvpn-devel@lists.sourceforge.net; Mon, 13 Dec 2021 15:09:58 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=Content-Transfer-Encoding:MIME-Version:References: In-Reply-To:Message-Id:Date:Subject:To:From:Sender:Reply-To:Cc:Content-Type: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=RMswuTvDBvfh1Gtq8NtZYFp9UjMSBrmL6HH8Ivby+o8=; b=jOYscFrn4Is2EuPPaF/YaqV68Y CIT2TWPo3ACoUWzFjQON3tmx27TrtZmZmApwt0WoJbH80I9ELz94/dHvwbRttjMO+Ub4d4+HTYFtF +yEjVFZAIRFz71lqAwo/KsJsbDBNDF8R1DhbkBAowgF4btKnLVAEWXgrQjGus87MZTYM=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=Content-Transfer-Encoding:MIME-Version:References:In-Reply-To:Message-Id: Date:Subject:To:From:Sender:Reply-To:Cc:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=RMswuTvDBvfh1Gtq8NtZYFp9UjMSBrmL6HH8Ivby+o8=; b=b5ylYk8smZ0PbMNnQRkry4KrSs jz4qnEwbhjwaqu3kUCxf+y6jJbFGdd/KQBvH8FCMVTEE7TzFhmb7oP7kymBicmG0byGMWJHeIDO/i Zo4gI7Zrrqg4LYzstexA6YJB3/k4Iq8708O+P2/wAbbYZam6oUmDWp/9k/vnLKGgcVts=; Received: from mail.blinkt.de ([192.26.174.232]) by sfi-mx-1.v28.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92.3) id 1mwmxi-00EERo-B8 for openvpn-devel@lists.sourceforge.net; Mon, 13 Dec 2021 15:09:58 +0000 Received: from kamera.blinkt.de ([2001:638:502:390:20c:29ff:fec8:535c]) by mail.blinkt.de with smtp (Exim 4.94.2 (FreeBSD)) (envelope-from ) id 1mwmUM-000Bm0-35 for openvpn-devel@lists.sourceforge.net; Mon, 13 Dec 2021 16:09:50 +0100 Received: (nullmailer pid 3993929 invoked by uid 10006); Mon, 13 Dec 2021 15:09:50 -0000 From: Arne Schwabe To: openvpn-devel@lists.sourceforge.net Date: Mon, 13 Dec 2021 16:09:50 +0100 Message-Id: <20211213150950.3993881-1-arne@rfc2549.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20211201180727.2496903-1-arne@rfc2549.org> References: <20211201180727.2496903-1-arne@rfc2549.org> MIME-Version: 1.0 X-Spam-Report: Spam detection software, running on the system "util-spamd-1.v13.lw.sourceforge.com", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: We originally wanted to deprecated these ciphers (especially BF-CBC) with 2.6 but currently these ciphers are still too widespread to make this transition for 2.6. --- src/openvpn/crypto.c | 2 +- 1 fi [...] Content analysis details: (0.3 points, 6.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.2 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record 0.0 SPF_NONE SPF: sender does not publish an SPF Record X-Headers-End: 1mwmxi-00EERo-B8 Subject: [Openvpn-devel] [PATCH] Move deprecation of SWEET32/64bit block size ciphers to 2.7 X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox We originally wanted to deprecated these ciphers (especially BF-CBC) with 2.6 but currently these ciphers are still too widespread to make this transition for 2.6. Acked-by: Gert Doering --- src/openvpn/crypto.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/openvpn/crypto.c b/src/openvpn/crypto.c index 36f880433..c4cf72a55 100644 --- a/src/openvpn/crypto.c +++ b/src/openvpn/crypto.c @@ -721,7 +721,7 @@ warn_insecure_key_type(const char *ciphername) " bit (%d bit). This allows attacks like SWEET32. Mitigate by " "using a --cipher with a larger block size (e.g. AES-256-CBC). " "Support for these insecure ciphers will be removed in " - "OpenVPN 2.6.", + "OpenVPN 2.7.", ciphername, cipher_kt_block_size(ciphername)*8); } }