diff --git a/internal/configuration/settings/settings.go b/internal/configuration/settings/settings.go index 6b212e86..1745a14d 100644 --- a/internal/configuration/settings/settings.go +++ b/internal/configuration/settings/settings.go @@ -167,8 +167,7 @@ func (s Settings) Warnings() (warnings []string) { " so this will likely not work anymore. See https://github.com/qdm12/gluetun/issues/1498.") } - if helpers.IsOneOf(*s.VPN.Provider.Name, providers.SlickVPN, - providers.VPNUnlimited) && + if helpers.IsOneOf(*s.VPN.Provider.Name, providers.SlickVPN) && s.VPN.Type == vpn.OpenVPN { warnings = append(warnings, "OpenVPN 2.5 uses OpenSSL 3 "+ "which prohibits the usage of weak security in today's standards. "+ diff --git a/internal/provider/vpnunlimited/openvpnconf.go b/internal/provider/vpnunlimited/openvpnconf.go index 76bcdbf7..5468a666 100644 --- a/internal/provider/vpnunlimited/openvpnconf.go +++ b/internal/provider/vpnunlimited/openvpnconf.go @@ -22,11 +22,5 @@ func (p *Provider) OpenVPNConfig(connection models.Connection, }, } - // VPN Unlimited's certificate is sha1WithRSAEncryption and sha1 is now - // rejected by openssl 3.x.x which is used by OpenVPN >= 2.5. - // We lower the security level to 0 to allow this algorithm, - // see https://www.openssl.org/docs/man1.1.1/man3/SSL_CTX_set_security_level.html - providerSettings.TLSCipher = `"DEFAULT:@SECLEVEL=0"` - return utils.OpenVPNConfig(providerSettings, connection, settings, ipv6Supported) }