254 Commits

Author SHA1 Message Date
Angristan
b205980053 Use best encryption available
Does not affect speed significantly, if at all.
2017-03-02 23:42:23 +01:00
Angristan
beb9148b6e Merge pull request #40 from Kcchouette/patch-1
Remove the last archlinux part
2017-03-01 18:04:17 +01:00
Kcchouette
2a6422057e Remove the last $SYSCTL var
This var was indeed removed with the commit f5ec9f3a17
2017-02-24 10:33:52 +01:00
Kcchouette
135729d0ab Remove the archlinux part
that @Angristan had forgotten
2017-02-23 22:47:40 +01:00
Angristan
f5ec9f3a17 Remove Arch Linux support
Revert PR#2 :https://github.com/Angristan/OpenVPN-install/pull/2/files#diff-cda9722285f1718b319bb88e134e9efe

Too much work to do with OpenVPN 2.4 for a distro that is not much used on servers.
2017-02-17 22:54:29 +01:00
Angristan
624774736d Remove RSA key size input 2017-02-16 22:33:12 +01:00
Angristan
5fe4bf62d6 Replace tls-auth with tls-crypt 2017-02-16 22:32:09 +01:00
Angristan
afa0162c4c Use ECDSA cert instead of RSA 2017-02-16 20:27:57 +01:00
Angristan
ed779b9b52 Fix cipher 2017-02-16 19:36:24 +01:00
Angristan
547f689f00 Use secp256k1 curve for ECDH (fix)
I forgot the curve in 23daeca80a
2017-02-16 19:35:50 +01:00
Angristan
935896dbc7 Remove cp for dh 2017-02-16 19:33:07 +01:00
Angristan
64433208d6 Remove DH key size input, remove cipher input
And use AES-128-GCM as the data channel's cipher
2017-02-16 19:10:53 +01:00
Angristan
da947d8ae3 Update repo for Debian and Ubuntu 2017-02-16 19:07:17 +01:00
Angristan
23daeca80a Use secp256k1 curve for ECDH
cf. https://github.com/Angristan/OpenVPN-install/pull/33#issuecomment-280399196
2017-02-16 18:34:33 +01:00
Angristan
56fad22cad Disable DH and enable ECDH
cf. https://community.openvpn.net/openvpn/wiki/Openvpn24ManPage#lbAK
2017-02-16 18:30:40 +01:00
Angristan
fa6cf4e569 Update tls-cipher to use ECDHE and ECDSA 2017-02-16 17:54:08 +01:00
Angristan
56b755f937 Update AES data channel ciphers 2017-02-06 12:05:01 +01:00
Angristan
adfb8b9a2f Update LICENSE 2016-12-20 15:04:12 +01:00
Angristan
63ed1449de Merge pull request #11 from Seeder101/patch-1 (typo)
Fix typos
2016-12-17 20:01:18 +01:00
Seeder101
89925cbbe8 Update openvpn-install.sh
change sould to should and correct adress to address in line 195
2016-12-11 16:03:40 +03:00
Seeder101
e548a61dcc Update openvpn-install.sh
change sould to should
2016-12-11 15:58:06 +03:00
Angristan
316ecfe7f4 Use SHA-256 instead of SHA-384
Following 693bd13fa7
2016-12-11 12:11:11 +01:00
Angristan
693bd13fa7 Use SHA-256 instead of SHA-384
Thanks to David_5.1 (https://angristan.fr/mise-a-jour-de-mon-script-openvpn/#comment-2750) who pointed out that there was a mistake on the Wikipédia page of the Length extension attack (https://en.wikipedia.org/wiki/Length_extension_attack), and it was affecting all the SHA2 family, not just SHA256. It's a theoretical attack though. I didn't find any reason to use one member of the SHA2 family more than an other, so I switched to SHA-256 for now.
2016-12-11 12:07:50 +01:00
Angristan
7f6a007637 Add source for the crypto update 🔐 2016-12-04 19:00:26 +01:00
Angristan
98a0dbf26d Fix typo of the crypto update 🔐
Thanks to https://twitter.com/TiCubius/status/805468611875897344
2016-12-04 18:49:08 +01:00
Angristan
da64aa8df8 The crypto update 🔐 + improvements
Following this commit : 56477bba34

I wanted to improve the readability of the Readme, and also explain myself regarding the encryption parameters I have chosen in the script.

I took hours to write and add the sources, so I may have made some mistakes. I'll gladly accept any feedback ^^
2016-12-04 18:24:38 +01:00
Angristan
7a5bb93cbe AES-256 is not necessarily the most secure cipher
Indeed, it it most vulnerable to Timing Attacks : https://en.wikipedia.org/wiki/Length_extension_attack

Also, AES 128 is secure enough for every one, so it's still the recommended cipher.
2016-12-04 17:21:41 +01:00
Angristan
56477bba34 The crypto update 🔐
- Removed "fast" and "slow" mode (not a good idea, I prefer to give the choice for the parameters directly)
- Corrected some confusion between the cipher for the data channel and the control channel, my bad.
- using TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 by default for the control channel
- using SHA384 by default for HMAC auth and RSA certificate
- giving the choice for the cipher of the data channel, the size of the DH key and the RSA Key

I will explain all my choices here : https://github.com/Angristan/OpenVPN-install#encryption (likely tomorrow)
2016-11-28 22:13:32 +01:00
Angristan
c03a55f11f Making sure a correct DNS option is selected 2016-11-27 14:31:25 +01:00
Angristan
421d69e92d Arch Linux + other changes 2016-11-26 17:20:56 +01:00
TheKinrar
50f39963e6 Merge branch 'TheKinrar-master' 2016-11-26 16:13:23 +01:00
TheKinrar
f76db9f589 Merge branch 'master' of https://github.com/TheKinrar/OpenVPN-install into TheKinrar-master 2016-11-26 16:13:02 +01:00
TheKinrar
c659a47dd4 Add ArchLinux to README 2016-11-26 16:03:37 +01:00
TheKinrar
f3ff29d6c7 rc.local fix 2016-11-25 18:25:37 +01:00
Angristan
d3b0ec10e7 Remove UFW and MASQUERADE
See 17a9d76ae9
2016-11-25 01:01:10 +01:00
Angristan
17a9d76ae9 Remove ufw and MASQUERADE support
Not useful, badly implemented.
2016-11-25 00:59:03 +01:00
Angristan
218e474f85 Add logs
Can be useful.
2016-11-24 23:34:15 +01:00
Angristan
2db5ff8adf Avoid DNS leak on W10 2016-11-24 23:04:24 +01:00
Angristan
98ca79a9de Move rc.local and sysctl installation after the confirmation 2016-11-24 20:28:49 +01:00
TheKinrar
358e80b5a6 sysctl fix, again. 2016-11-24 19:37:45 +01:00
TheKinrar
cc657fa459 Fixed rc.local and sysctl.conf files on ArchLinux 2016-11-24 18:07:23 +01:00
Angristan
f9016fb3b5 Add TCP support 2016-11-23 20:22:57 +01:00
TheKinrar
9b261809eb Automatically enable and start iptables on ArchLinux. 2016-11-22 19:55:17 +01:00
TheKinrar
6e2b5cb439 Added ArchLinux support. 2016-11-21 20:59:00 +01:00
Angristan
80dbca6e63 Add TCP support
There is now the choice to use TCP or UDP for OpenVPN protocol. You should always use UDP, but TCP can be useful sometimes : on lossy networks or to bypass some blockage
2016-11-21 19:57:52 +01:00
Angristan
662fe26f5b I don't know why it wasn't like this from the beginning 2016-11-20 23:09:42 +01:00
Angristan
552709059e Fix my previous commit
My bad.
2016-11-20 22:50:51 +01:00
Angristan
a09ef4868a The user can choose to continue the installer even if its OS is not supported
At its own risk of course. But usefull if using Ubuntu beta or Debian unstable/testing
2016-11-20 22:47:23 +01:00
Angristan
457005d03a Add old repo 2016-11-20 16:39:36 +01:00
Angristan
cbd57e6416 Add contributors 2016-11-20 16:03:59 +01:00