Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Why OpenVPN3 uses mbedTLS 2.28.4, when >3 versions are available #349

Open
shyamsundar87 opened this issue Jan 16, 2025 · 5 comments
Open

Comments

@shyamsundar87
Copy link

According to https://ciphersuite.info/ only TLS1.3 inclusive ciphers seem to be recommended.
So why does OpenVPN doesnt upgrade to recent TLS versions.

@schwabe schwabe closed this as completed Jan 16, 2025
@schwabe schwabe reopened this Jan 16, 2025
@schwabe
Copy link
Contributor

schwabe commented Jan 16, 2025

The main focus of OpenVPN 3.x library is OpenSSL nowadays. But I think mbed TLS 3.x should be supported if you build it yourself. But that will not help you with TLS 1.3.

For OpenVPN 2.x, which supports mbed TLS 3.x, we have to disable TLS 1.3 since mbed TLS 3.x lacks features (TLS EKM with TLS 1.3) that currently make it impossible to use TLS 1.3 with OpenVPN and mbed TLS 3.x

@schwabe
Copy link
Contributor

schwabe commented Jan 16, 2025

Side note: https://ciphersuite.info/cs/?security=recommended includes TLS 1.2 cipher suites like TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

@ordex
Copy link
Member

ordex commented Jan 16, 2025

I think @shyamsundar87 is just confused by the naming. TLS1.3 is the protocol version. mbedTLS2.x is the LIBRARY version.

ON top of that read what Arne said above regarding mbedTLS and its limitations.

@shyamsundar87
Copy link
Author

Side note: https://ciphersuite.info/cs/?security=recommended includes TLS 1.2 cipher suites like TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

ECDHE mostly must be related to Encrypted client hello. But TLS1.2 might include lots of other insecure ciphers as well. Just to include 1 cipher from 1.2, its not wiser to use it as a whole I suppose.

@schwabe
Copy link
Contributor

schwabe commented Jan 16, 2025

You are confusing encrypted client hello or ECH with Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).

They are very different things. And that cipher was an example. Of the list actually only the first three cipher suites (TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256) are TLS 1.3 cipher suites.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants