This option has very limited usefulness and should be replaced by either
a better ``--ca`` configuration or with a ``--tls-verify`` script.
+``secret`` has been deprecated
+ static key mode (non-TLS) is no longer considered "good and secure enough"
+ for today's requirements. Use TLS mode instead. If deploying a PKI CA
+ is considered "too complicated", using ``--peer-fingerprint`` makes
+ TLS mode about as easy as using ``--secret``.
+
Overview of changes in 2.5
==========================
"\n"
"Data Channel Encryption Options (must be compatible between peers):\n"
"(These options are meaningful for both Static Key & TLS-mode)\n"
- "--secret f [d] : Enable Static Key encryption mode (non-TLS).\n"
+ "--secret f [d] : (DEPRECATED) Enable Static Key encryption mode (non-TLS).\n"
" Use shared secret file f, generate with --genkey.\n"
" The optional d parameter controls key directionality.\n"
" If d is specified, use separate keys for each\n"
msg(M_USAGE, "specify only one of --tls-server, --tls-client, or --secret");
}
+ if (!options->tls_server || !options->tls_client)
+ {
+ msg(M_INFO, "DEPRECATION: No tls-client or tls-server option in "
+ "configuration detected. OpenVPN 2.7 will remove the "
+ "functionality to run a VPN without TLS. "
+ "See the examples section in the manual page for "
+ "examples of a similar quick setup with peer-fingerprint.");
+ }
+
if (options->ssl_flags & (SSLF_CLIENT_CERT_NOT_REQUIRED|SSLF_CLIENT_CERT_OPTIONAL))
{
msg(M_WARN, "WARNING: POTENTIALLY DANGEROUS OPTION "
}
else if (streq(p[0], "secret") && p[1] && !p[3])
{
+ msg(M_WARN, "DEPRECATED OPTION: The option --secret is deprecated.");
VERIFY_PERMISSION(OPT_P_GENERAL|OPT_P_INLINE);
options->shared_secret_file = p[1];
options->shared_secret_file_inline = is_inline;