/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release

  • Committer: Teddy Hogeborn
  • Date: 2015-03-10 18:03:38 UTC
  • mto: (237.7.304 trunk)
  • Revision ID: teddy@recompile.se-20150310180338-pcxw6r2qmw9k6br9
Add ":!RSA" to GnuTLS priority string, to disallow non-DHE kx.

If Mandos was somehow made to use a non-ephemeral Diffie-Hellman key
exchange algorithm in the TLS handshake, any saved network traffic
could then be decrypted later if the Mandos client key was obtained.
By default, Mandos uses ephemeral DH key exchanges which does not have
this problem, but a non-ephemeral key exchange algorithm was still
enabled by default.  The simplest solution is to simply turn that off,
which ensures that Mandos will always use ephemeral DH key exchanges.

There is a "PFS" priority string specifier, but we can't use it because:

1. Security-wise, it is a mix between "NORMAL" and "SECURE128" - it
   enables a lot more algorithms than "SECURE256".

2. It is only available since GnuTLS 3.2.4.

Thanks to Andreas Fischer <af@bantuX.org> for reporting this issue.
Filename Latest Rev Last Changed Committer Comment Size
..
File bridge 237.22.4 12 years ago Teddy Hogeborn * plugins.d/mandos-client.c (get_flags): Don't clo 2 KB Diff Download File
bridge.conf 237.17.8 13 years ago teddy at recompile * network-hooks.s/bridge: Don't use interface name 189 bytes Diff Download File
File openvpn 237.22.4 12 years ago Teddy Hogeborn * plugins.d/mandos-client.c (get_flags): Don't clo 1.4 KB Diff Download File
openvpn.conf 237.16.26 13 years ago teddy at bsnet * network-hooks.d/openvpn: Tolerate relative MANDO 291 bytes Diff Download File
File wireless 237.22.4 12 years ago Teddy Hogeborn * plugins.d/mandos-client.c (get_flags): Don't clo 4 KB Diff Download File
wireless.conf 237.17.8 13 years ago teddy at recompile * network-hooks.s/bridge: Don't use interface name 611 bytes Diff Download File