OpenVPN simple installation












0















I have to make VPN between Debian 9.7 and another Linux or ASUS router with VPN support. I have seen different options for ciphers and other settings. Is there good and bad choices for OpenVPN settings and risk to have vulnerable link?










share|improve this question


















  • 1





    Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.

    – slhck
    Feb 28 at 19:07
















0















I have to make VPN between Debian 9.7 and another Linux or ASUS router with VPN support. I have seen different options for ciphers and other settings. Is there good and bad choices for OpenVPN settings and risk to have vulnerable link?










share|improve this question


















  • 1





    Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.

    – slhck
    Feb 28 at 19:07














0












0








0








I have to make VPN between Debian 9.7 and another Linux or ASUS router with VPN support. I have seen different options for ciphers and other settings. Is there good and bad choices for OpenVPN settings and risk to have vulnerable link?










share|improve this question














I have to make VPN between Debian 9.7 and another Linux or ASUS router with VPN support. I have seen different options for ciphers and other settings. Is there good and bad choices for OpenVPN settings and risk to have vulnerable link?







linux openvpn






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Feb 28 at 15:24









i486i486

1488




1488








  • 1





    Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.

    – slhck
    Feb 28 at 19:07














  • 1





    Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.

    – slhck
    Feb 28 at 19:07








1




1





Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.

– slhck
Feb 28 at 19:07





Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.

– slhck
Feb 28 at 19:07










1 Answer
1






active

oldest

votes


















2














This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.



OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.



Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.



While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.






share|improve this answer


























  • What about ECDSA? OpenVPN 2.4 included support for that.

    – slhck
    Feb 28 at 19:07











  • The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.

    – i486
    Feb 28 at 20:09








  • 2





    @i486 PPTP is not the same thing as openVPN.

    – Andy
    Feb 28 at 21:13











  • @slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.

    – Andy
    Feb 28 at 21:20











  • @Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.

    – Cliff Armstrong
    Feb 28 at 22:04












Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1410228%2fopenvpn-simple-installation%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









2














This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.



OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.



Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.



While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.






share|improve this answer


























  • What about ECDSA? OpenVPN 2.4 included support for that.

    – slhck
    Feb 28 at 19:07











  • The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.

    – i486
    Feb 28 at 20:09








  • 2





    @i486 PPTP is not the same thing as openVPN.

    – Andy
    Feb 28 at 21:13











  • @slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.

    – Andy
    Feb 28 at 21:20











  • @Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.

    – Cliff Armstrong
    Feb 28 at 22:04
















2














This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.



OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.



Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.



While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.






share|improve this answer


























  • What about ECDSA? OpenVPN 2.4 included support for that.

    – slhck
    Feb 28 at 19:07











  • The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.

    – i486
    Feb 28 at 20:09








  • 2





    @i486 PPTP is not the same thing as openVPN.

    – Andy
    Feb 28 at 21:13











  • @slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.

    – Andy
    Feb 28 at 21:20











  • @Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.

    – Cliff Armstrong
    Feb 28 at 22:04














2












2








2







This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.



OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.



Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.



While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.






share|improve this answer















This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.



OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.



Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.



While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.







share|improve this answer














share|improve this answer



share|improve this answer








edited Feb 28 at 21:46

























answered Feb 28 at 18:45









AndyAndy

1,056311




1,056311













  • What about ECDSA? OpenVPN 2.4 included support for that.

    – slhck
    Feb 28 at 19:07











  • The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.

    – i486
    Feb 28 at 20:09








  • 2





    @i486 PPTP is not the same thing as openVPN.

    – Andy
    Feb 28 at 21:13











  • @slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.

    – Andy
    Feb 28 at 21:20











  • @Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.

    – Cliff Armstrong
    Feb 28 at 22:04



















  • What about ECDSA? OpenVPN 2.4 included support for that.

    – slhck
    Feb 28 at 19:07











  • The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.

    – i486
    Feb 28 at 20:09








  • 2





    @i486 PPTP is not the same thing as openVPN.

    – Andy
    Feb 28 at 21:13











  • @slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.

    – Andy
    Feb 28 at 21:20











  • @Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.

    – Cliff Armstrong
    Feb 28 at 22:04

















What about ECDSA? OpenVPN 2.4 included support for that.

– slhck
Feb 28 at 19:07





What about ECDSA? OpenVPN 2.4 included support for that.

– slhck
Feb 28 at 19:07













The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.

– i486
Feb 28 at 20:09







The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.

– i486
Feb 28 at 20:09






2




2





@i486 PPTP is not the same thing as openVPN.

– Andy
Feb 28 at 21:13





@i486 PPTP is not the same thing as openVPN.

– Andy
Feb 28 at 21:13













@slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.

– Andy
Feb 28 at 21:20





@slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.

– Andy
Feb 28 at 21:20













@Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.

– Cliff Armstrong
Feb 28 at 22:04





@Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.

– Cliff Armstrong
Feb 28 at 22:04


















draft saved

draft discarded




















































Thanks for contributing an answer to Super User!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1410228%2fopenvpn-simple-installation%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Probability when a professor distributes a quiz and homework assignment to a class of n students.

Aardman Animations

Are they similar matrix