]> git.ipfire.org Git - people/ms/ipfire-2.x.git/commit
vpnmain.cgi: Reduce the number of offered ciphers strongswan
authorMichael Tremer <michael.tremer@ipfire.org>
Mon, 20 Jan 2025 14:06:19 +0000 (14:06 +0000)
committerMichael Tremer <michael.tremer@ipfire.org>
Mon, 20 Jan 2025 14:06:19 +0000 (14:06 +0000)
commitd061eed3f1635a24f203b9ff2d8489c5961811d7
treef9e620e7916ce457f79ffb0ada24aa7547b01f01
parentfa14de054e89f1061e0725d531d51bcd5db4188d
vpnmain.cgi: Reduce the number of offered ciphers

For new connections, we will now configure fewer ciphers by default. I
currently do not see any reason why we should support so many different
versions of AES-GCM and AES-128 by default.

The defaults should provide high security as well as decent
compatibility to solutions from other vendors.

I am currently not sure whether ChaCha20-Poly1305 should remain as
default as AES should usually outperform it by far. We can assume that
most hardware has support for AES-NI.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
html/cgi-bin/vpnmain.cgi