]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/commit - html/cgi-bin/vpnmain.cgi
IPsec: Drop SHA1 and MODP<=1536 from proposed ciphers
authorMichael Tremer <michael.tremer@ipfire.org>
Wed, 5 Apr 2017 10:42:55 +0000 (11:42 +0100)
committerMichael Tremer <michael.tremer@ipfire.org>
Wed, 5 Apr 2017 10:42:55 +0000 (11:42 +0100)
commit570d54fd84ead452753ac7fd498c7ee760caa3ff
treeda4e9fd062e85dc897cf679362321ef0ae48e80c
parent4f6790a7e48c1c5bf52ad53c060ef6f3274bd5a1
IPsec: Drop SHA1 and MODP<=1536 from proposed ciphers

IPsec is still proposing to use SHA1 and MODP-1536 or MODP-1024
when initiating a connection. These are considered weak although
many off-the-shelf hardware is still using this as defaults.

This patch disables those algorithms and additionally changes
default behaviour to only accept the configured cipher suites.

This might create some interoperability issues, but increases
security of IPFire-to-IPFire IPsec connections.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
html/cgi-bin/vpnmain.cgi