Open GoogleCodeExporter opened 9 years ago
Can you also provide the config file you imported or a snippet of the config
file?
Original comment by arne@rfc2549.org
on 26 Feb 2015 at 8:38
Sure, see below. Please note the same config works just fine on my Linux
openvpn client with larger keysize and is respected / utilized, so that's
why I filed the bug for the Android and iOS clients. If there is a more
secure cipher / keysize that works across all platforms, please also
recommend what that should be. Per my research BF@448 seemed the most
trustable and secure option...
client.ovpn
"""
client
dev tun
proto udp
remote <redacted> <redacted>
resolv-retry infinite
nobind
user nobody
group nogroup
persist-key
persist-tun
cipher BF-CBC # Blowfish (default)
comp-lzo
verb 3
keysize 448
remote-cert-tls server
auth SHA512
...
<redacted private / public keys follow>
...
"""
Original comment by kristian...@gmail.com
on 26 Feb 2015 at 12:11
From https://community.openvpn.net/openvpn/ticket/519 I think that this bug
only applies to OpenVPN Connect, did you test with OpenVPN for Android or only
with OpenVPN Connect?
Original comment by arne@rfc2549.org
on 26 Feb 2015 at 12:37
Original comment by arne@rfc2549.org
on 27 Feb 2015 at 10:05
Original issue reported on code.google.com by
kristian...@gmail.com
on 26 Feb 2015 at 3:44