openvpn: renamed the ncp-cipher to data-cipher as per the latest changes (#1528)

This commit is contained in:
srividya0208 2024-08-22 15:17:51 +05:30 committed by GitHub
parent 7600f55643
commit 78c7e67fbe
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -147,8 +147,8 @@ Local Configuration:
set interfaces openvpn vtun1 local-address '10.255.1.1' # Local IP of vtun interface set interfaces openvpn vtun1 local-address '10.255.1.1' # Local IP of vtun interface
set interfaces openvpn vtun1 remote-address '10.255.1.2' # Remote IP of vtun interface set interfaces openvpn vtun1 remote-address '10.255.1.2' # Remote IP of vtun interface
set interfaces openvpn vtun1 tls certificate 'openvpn-local' # The self-signed certificate set interfaces openvpn vtun1 tls certificate 'openvpn-local' # The self-signed certificate
set interfaces openvpn vtun1 tls peer-fingerprint <remote cert fingerprint> # The output of 'run show pki certificate <name> fingerprint sha256 set interfaces openvpn vtun1 tls peer-fingerprint <remote cert fingerprint> # The output of 'run show pki certificate <name> fingerprint sha256 on the remote router
on the remote rout set interfaces openvpn vtun1 tls role active
Remote Configuration: Remote Configuration:
@ -163,8 +163,8 @@ Remote Configuration:
set interfaces openvpn vtun1 local-address '10.255.1.2' # Local IP of vtun interface set interfaces openvpn vtun1 local-address '10.255.1.2' # Local IP of vtun interface
set interfaces openvpn vtun1 remote-address '10.255.1.1' # Remote IP of vtun interface set interfaces openvpn vtun1 remote-address '10.255.1.1' # Remote IP of vtun interface
set interfaces openvpn vtun1 tls certificate 'openvpn-remote' # The self-signed certificate set interfaces openvpn vtun1 tls certificate 'openvpn-remote' # The self-signed certificate
set interfaces openvpn vtun1 tls peer-fingerprint <local cert fingerprint> # The output of 'run show pki certificate <name> fingerprint sha256 set interfaces openvpn vtun1 tls peer-fingerprint <local cert fingerprint> # The output of 'run show pki certificate <name> fingerprint sha256 on the local router
on the local router set interfaces openvpn vtun1 tls role active
Pre-shared keys Pre-shared keys
=============== ===============
@ -253,14 +253,15 @@ Remote Configuration:
set protocols static route 10.0.0.0/16 interface vtun1 set protocols static route 10.0.0.0/16 interface vtun1
The configurations above will default to using 256-bit AES in GCM mode The configurations above will default to using 256-bit AES in GCM mode
for encryption (if both sides support NCP) and SHA-1 for HMAC authentication. for encryption (if both sides support data cipher negotiation) and SHA-1 for HMAC authentication.
SHA-1 is considered weak, but other hashing algorithms are available, as are SHA-1 is considered weak, but other hashing algorithms are available, as are
encryption algorithms: encryption algorithms:
For Encryption: For Encryption:
This sets the cipher when NCP (Negotiable Crypto Parameters) is disabled or This sets the cipher when NCP (Negotiable Crypto Parameters) is disabled or
OpenVPN version < 2.4.0. OpenVPN version < 2.4.0. This option should not be used any longer in TLS
mode and still exists for compatibility with old configurations.
.. code-block:: none .. code-block:: none
@ -277,15 +278,16 @@ OpenVPN version < 2.4.0.
aes256 AES algorithm with 256-bit key CBC aes256 AES algorithm with 256-bit key CBC
aes256gcm AES algorithm with 256-bit key GCM aes256gcm AES algorithm with 256-bit key GCM
This sets the accepted ciphers to use when version => 2.4.0 and NCP is This option was called --ncp-ciphers in OpenVPN 2.4 but has been renamed
enabled (which is the default). Default NCP cipher for versions >= 2.4.0 is to --data-ciphers in OpenVPN 2.5 to more accurately reflect its meaning.
aes256gcm. The first cipher in this list is what server pushes to clients. The first cipher in that list that is also in the client's --data-ciphers list
is chosen. If no common cipher is found the client is rejected.
.. code-block:: none .. code-block:: none
vyos@vyos# set int open vtun0 encryption ncp-ciphers vyos@vyos# set int open vtun0 encryption data-ciphers
Possible completions: Possible completions:
des DES algorithm none Disable encryption
3des DES algorithm with triple encryption 3des DES algorithm with triple encryption
aes128 AES algorithm with 128-bit key CBC aes128 AES algorithm with 128-bit key CBC
aes128gcm AES algorithm with 128-bit key GCM aes128gcm AES algorithm with 128-bit key GCM
@ -591,7 +593,7 @@ Server Side
.. code-block:: none .. code-block:: none
set interfaces openvpn vtun10 encryption cipher 'aes256' set interfaces openvpn vtun10 encryption data-ciphers 'aes256'
set interfaces openvpn vtun10 hash 'sha512' set interfaces openvpn vtun10 hash 'sha512'
set interfaces openvpn vtun10 local-host '172.18.201.10' set interfaces openvpn vtun10 local-host '172.18.201.10'
set interfaces openvpn vtun10 local-port '1194' set interfaces openvpn vtun10 local-port '1194'
@ -617,7 +619,7 @@ Client Side
.. code-block:: none .. code-block:: none
set interfaces openvpn vtun10 encryption cipher 'aes256' set interfaces openvpn vtun10 encryption data-ciphers 'aes256'
set interfaces openvpn vtun10 hash 'sha512' set interfaces openvpn vtun10 hash 'sha512'
set interfaces openvpn vtun10 mode 'client' set interfaces openvpn vtun10 mode 'client'
set interfaces openvpn vtun10 persistent-tunnel set interfaces openvpn vtun10 persistent-tunnel
@ -629,6 +631,10 @@ Client Side
set interfaces openvpn vtun10 tls crypt-key client-1 set interfaces openvpn vtun10 tls crypt-key client-1
set interfaces openvpn vtun10 use-lzo-compression set interfaces openvpn vtun10 use-lzo-compression
.. note:: Compression is generally not recommended. VPN tunnels which use
compression are susceptible to the VORALCE attack vector. Enable compression
if needed.
Options Options
======= =======
@ -855,6 +861,18 @@ The following commands let you check tunnel status.
Use this command to check the tunnel status for OpenVPN site-to-site Use this command to check the tunnel status for OpenVPN site-to-site
interfaces. interfaces.
OpenVPN Logs
------------
.. opcmd:: show log openvpn
Use this command to check log messages which include entries for successful
connections as well as failures and errors related to all OpenVPN interfaces.
.. opcmd:: show log openvpn interface <name>
Use this command to check log messages specific to an interface.
Reset OpenVPN Reset OpenVPN
------------- -------------