mirror of
https://github.com/OpenVPN/openvpn.git
synced 2026-02-03 20:39:40 -05:00
Since commit bd9aa06feb (Jan 2015) OpenVPN has allowed to use
'--dh none' to disable traditional Diffie Hellman, since more secure
ECDH algorithms are available that do not use explicit DH parameters.
If configured with a suffiently high securelevel (3+), or if running in
FIPS mode, OpenSSL 3.5 will refuse 2048 bit DH files, making our tests
fail.
Thus, remove all the DH2048 stuff from our sample configs.
Github: triggered by OpenVPN/openvpn#819
Change-Id: If66438662bd862a195b2a69c4fa45f63838982b7
Signed-off-by: Gert Doering <gert@greenie.muc.de>
Message-Id: <20250820175459.11227-1-gert@greenie.muc.de>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg32632.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
27 lines
676 B
Text
27 lines
676 B
Text
# Perform a TLS loopback test -- server side.
|
|
#
|
|
# This test performs a TLS negotiation once every 10 seconds,
|
|
# and will terminate after 2 minutes.
|
|
#
|
|
# From the root directory of the OpenVPN distribution,
|
|
# after openvpn has been built, run:
|
|
#
|
|
# ./openvpn --config sample-config-files/loopback-client (In one window)
|
|
# ./openvpn --config sample-config-files/loopback-server (Simultaneously in another window)
|
|
|
|
rport 16001
|
|
lport 16000
|
|
remote localhost
|
|
local localhost
|
|
dev null
|
|
verb 3
|
|
reneg-sec 10
|
|
tls-server
|
|
dh none
|
|
ca sample-keys/ca.crt
|
|
key sample-keys/server.key
|
|
cert sample-keys/server.crt
|
|
tls-auth sample-keys/ta.key 0
|
|
cipher AES-256-GCM
|
|
ping 1
|
|
inactive 120 10000000
|