supported cipher suite has changed in 9.3 for ssl vpn connectionsSame choices as 9.2.
Hello did someone know why AES-<128-256>-GCM is not supported???
is it not save or what are the reasons??? hmmmm ;/
regards
Hello my friend ;-)
Thank you, I need it for OpenVPN Site2Site for testing
I use a VPN provider (Converted the provided *.ovpn) to UTM compatible.
Works all fine with MASQ over tun(commandline) and Policy based Routing for specified Sites.
But would get more performance , and because of that i would test GCM ;-)
Set it to GCM over Restapi is not possible and if set in the config-default in chroot-openvpn/etc/openvpn/client/ it cant connect because of OpenSSL errors.
Regards
Ah, I didn't read closely enough - SSL VPN, not IPsec!
I thought that Sophos modified the current code a couple years ago for the SSL VPN so that it would take advantage of AES-NI, but I just did a search in the and don't see that it was. I think you can't change the setting because it's an issue of the code for that has not been added.
Cheers - Bob
Since CBC is becmoing more and more insecure, see https://blog.qualys.com/technology/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities for example, i would STRONGLY suggest pushing support for GCM ASAP.
The other provided ciphers are also crap (sorry but thats About it).
The openssl and openvpn Version should support GCM without any Problems so the implentation should be done in 5 minutes..
regards