From: Erik Kapfer Date: Thu, 8 Feb 2018 08:54:58 +0000 (+0100) Subject: OpenVPN: Mark unsecure ciphers and DH-parameter as 'weak' in WUI menu X-Git-Tag: v2.19-core120~121 X-Git-Url: http://git.ipfire.org/?p=ipfire-2.x.git;a=commitdiff_plain;h=ea6dd5b0aca7b28d7b9a5b539f614fcf6b736b18 OpenVPN: Mark unsecure ciphers and DH-parameter as 'weak' in WUI menu 64 bit block ciphers like Blowfish, TDEA and CAST5 are vulnerable to the so called 'Birthday attacks' . Infos for 'Sweet32' Birthday attacks can be found in here https://sweet32.info/ . An Overview of 64 bit clock ciphers can also be found in here http://en.citizendium.org/wiki/Block_cipher/Catalogs/Cipher_list#64-bit_blocks 1024 bit Diffie-Hellman parameter has also been marked as weak causing the 'Logjam Attack' . Infos for 'Logjam Attack' can be found in here https://weakdh.org/ . Signed-off-by: Erik Kapfer Signed-off-by: Michael Tremer --- diff --git a/html/cgi-bin/ovpnmain.cgi b/html/cgi-bin/ovpnmain.cgi index 9f5e682bdc..0fa1d046e5 100644 --- a/html/cgi-bin/ovpnmain.cgi +++ b/html/cgi-bin/ovpnmain.cgi @@ -2002,7 +2002,7 @@ END $Lang::tr{'ovpn dh'}: @@ -5210,12 +5210,12 @@ END - - - - - + + + + + $Lang::tr{'comp-lzo'}