This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How can I change the SSL VPN Control Channel to be TLS 1.2?

I was looking at the connection logs from the stoplight and noticed that the Control Channel was using TLS 1.0/SSL3.0. Is there a way I can change that to use TLS 1.2? I looked through all the VPN options and I didn't see anything that would allow me to make sure only TLS 1.2 was used...



This thread was automatically locked due to age.
Parents
  • As far as i know, XG should use TLS1.2 per default.

     

    The log can show something else but the Connection should be TLS1.2. 

    Check out what the port is offering you with a linux client.

    openssl s_client -host XG.DNS -port 443     / Or your SSLVPN Port

     

Reply
  • As far as i know, XG should use TLS1.2 per default.

     

    The log can show something else but the Connection should be TLS1.2. 

    Check out what the port is offering you with a linux client.

    openssl s_client -host XG.DNS -port 443     / Or your SSLVPN Port

     

Children
  • I tested at https://www.ssllabs.com/ssltest and can confirm that TLS 1.2 is used only.

     

  • Interesting...I would have expected the log to report a bit more accurately lol......

     

    Log:

    Thu Sep 13 10:58:17 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

    Thu Sep 13 10:58:17 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication

    Thu Sep 13 10:58:17 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

    Thu Sep 13 10:58:17 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication

    Thu Sep 13 10:58:17 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

    openssl

    CONNECTED(00000003)
    140461058606744:error:140790E5:SSL routines:ssl23_write:ssl handshake failure:s23_lib.c:177:
    ---
    no peer certificate available
    ---
    No client certificate CA names sent
    ---
    SSL handshake has read 0 bytes and written 305 bytes
    ---
    New, (NONE), Cipher is (NONE)
    Secure Renegotiation IS NOT supported
    Compression: NONE
    Expansion: NONE
    No ALPN negotiated
    SSL-Session:
        Protocol  : TLSv1.2
        Cipher    : 0000
        Session-ID:
        Session-ID-ctx:
        Master-Key:
        Key-Arg   : None
        PSK identity: None
        PSK identity hint: None
        SRP username: None
        Start Time: 1536850990
        Timeout   : 300 (sec)
        Verify return code: 0 (ok)
    ---

  • Take a look at this: https://forums.openvpn.net/viewtopic.php?f=24&t=26778

    Maybe open a case with the sophos support.