OpenVPN simple installation
I have to make VPN between Debian 9.7 and another Linux or ASUS router with VPN support. I have seen different options for ciphers and other settings. Is there good and bad choices for OpenVPN settings and risk to have vulnerable link?
linux openvpn
add a comment |
I have to make VPN between Debian 9.7 and another Linux or ASUS router with VPN support. I have seen different options for ciphers and other settings. Is there good and bad choices for OpenVPN settings and risk to have vulnerable link?
linux openvpn
1
Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.
– slhck
Feb 28 at 19:07
add a comment |
I have to make VPN between Debian 9.7 and another Linux or ASUS router with VPN support. I have seen different options for ciphers and other settings. Is there good and bad choices for OpenVPN settings and risk to have vulnerable link?
linux openvpn
I have to make VPN between Debian 9.7 and another Linux or ASUS router with VPN support. I have seen different options for ciphers and other settings. Is there good and bad choices for OpenVPN settings and risk to have vulnerable link?
linux openvpn
linux openvpn
asked Feb 28 at 15:24
i486i486
1488
1488
1
Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.
– slhck
Feb 28 at 19:07
add a comment |
1
Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.
– slhck
Feb 28 at 19:07
1
1
Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.
– slhck
Feb 28 at 19:07
Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.
– slhck
Feb 28 at 19:07
add a comment |
1 Answer
1
active
oldest
votes
This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.
OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.
Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.
While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.
What about ECDSA? OpenVPN 2.4 included support for that.
– slhck
Feb 28 at 19:07
The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.
– i486
Feb 28 at 20:09
2
@i486 PPTP is not the same thing as openVPN.
– Andy
Feb 28 at 21:13
@slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.
– Andy
Feb 28 at 21:20
@Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.
– Cliff Armstrong
Feb 28 at 22:04
|
show 2 more comments
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1410228%2fopenvpn-simple-installation%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.
OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.
Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.
While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.
What about ECDSA? OpenVPN 2.4 included support for that.
– slhck
Feb 28 at 19:07
The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.
– i486
Feb 28 at 20:09
2
@i486 PPTP is not the same thing as openVPN.
– Andy
Feb 28 at 21:13
@slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.
– Andy
Feb 28 at 21:20
@Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.
– Cliff Armstrong
Feb 28 at 22:04
|
show 2 more comments
This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.
OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.
Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.
While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.
What about ECDSA? OpenVPN 2.4 included support for that.
– slhck
Feb 28 at 19:07
The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.
– i486
Feb 28 at 20:09
2
@i486 PPTP is not the same thing as openVPN.
– Andy
Feb 28 at 21:13
@slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.
– Andy
Feb 28 at 21:20
@Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.
– Cliff Armstrong
Feb 28 at 22:04
|
show 2 more comments
This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.
OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.
Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.
While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.
This is an opinion answer. This answer may get out of date easily. OpenVPN provides a guide on tuning secuirty options here.
OpenVPN has three options for cryptography. You choose the ciphers on certificates, the hash used for authentication, and the cipher used for the tunnel's data encryption separately.
Generally you want to use the strongest available cryptography for both of the authentication components. As of writing, SHA256 (Diffie-Hellman RSA) is almost always used during authentication, combined with an RSA 4096 public/private key pair or certificate chain. OpenVPN has a guide for generating your authentication certificates here.
While performance on authentication doesn't matter (2 seconds to connect the VPN versus 2.5 seconds), performance on the data encryption cipher can be a point of compromise. When using two big-core computers, performance isn't an issue; always use the strongest available cipher. When one of the machines is an embedded system, performance is limited. The two main choices for cipher in OpenVPN are aes-128-gbc or aes-256-gbc. If using OpenVPN version older than 2.4, use AES-CBC instead of GBC. On embedded systems such as routers, aes-128 might get 15Mbps of bandwidth but aes-256 might only get 4Mbps. You have to test performance yourself, weigh the needed performance and security, and decide which one to use. Never use DES or RC4; these are 'broken' ciphers.
edited Feb 28 at 21:46
answered Feb 28 at 18:45
AndyAndy
1,056311
1,056311
What about ECDSA? OpenVPN 2.4 included support for that.
– slhck
Feb 28 at 19:07
The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.
– i486
Feb 28 at 20:09
2
@i486 PPTP is not the same thing as openVPN.
– Andy
Feb 28 at 21:13
@slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.
– Andy
Feb 28 at 21:20
@Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.
– Cliff Armstrong
Feb 28 at 22:04
|
show 2 more comments
What about ECDSA? OpenVPN 2.4 included support for that.
– slhck
Feb 28 at 19:07
The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.
– i486
Feb 28 at 20:09
2
@i486 PPTP is not the same thing as openVPN.
– Andy
Feb 28 at 21:13
@slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.
– Andy
Feb 28 at 21:20
@Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.
– Cliff Armstrong
Feb 28 at 22:04
What about ECDSA? OpenVPN 2.4 included support for that.
– slhck
Feb 28 at 19:07
What about ECDSA? OpenVPN 2.4 included support for that.
– slhck
Feb 28 at 19:07
The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.
– i486
Feb 28 at 20:09
The stock firmware of router has limited settings: i.imgur.com/ici0iAE.png There are only MS-CHAPv1 and Auto for Authentication. I have to install Tomato or OpenWrt for better VPN.
– i486
Feb 28 at 20:09
2
2
@i486 PPTP is not the same thing as openVPN.
– Andy
Feb 28 at 21:13
@i486 PPTP is not the same thing as openVPN.
– Andy
Feb 28 at 21:13
@slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.
– Andy
Feb 28 at 21:20
@slhck Elliptic curve cryptography is also an option. It is not as common and requires more configuration. Last I saw it wasn't a native option in OpenVPN and you have to manually install your crypto libraries on both the server and client. Given that RSA 4096 is already ridiculously beyond the cryptography strength generally required, I wouldn't recommend ECDSA to a first timer.
– Andy
Feb 28 at 21:20
@Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.
– Cliff Armstrong
Feb 28 at 22:04
@Andy From what I've read RSA (including 4096) is not that strong any more. There are security experts that consider it fundamentally insecure now. There's a reason ECDSA, Ed25519, and other elliptical curve based cryptography are gaining traction.
– Cliff Armstrong
Feb 28 at 22:04
|
show 2 more comments
Thanks for contributing an answer to Super User!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1410228%2fopenvpn-simple-installation%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
1
Check out github.com/angristan/openvpn-install if you want a zero-config, sane-defaults installation script.
– slhck
Feb 28 at 19:07