fix(vpnunlimited): remove DEFAULT:@SECLEVEL=0
This commit is contained in:
@@ -167,8 +167,7 @@ func (s Settings) Warnings() (warnings []string) {
|
|||||||
" so this will likely not work anymore. See https://github.com/qdm12/gluetun/issues/1498.")
|
" so this will likely not work anymore. See https://github.com/qdm12/gluetun/issues/1498.")
|
||||||
}
|
}
|
||||||
|
|
||||||
if helpers.IsOneOf(*s.VPN.Provider.Name, providers.SlickVPN,
|
if helpers.IsOneOf(*s.VPN.Provider.Name, providers.SlickVPN) &&
|
||||||
providers.VPNUnlimited) &&
|
|
||||||
s.VPN.Type == vpn.OpenVPN {
|
s.VPN.Type == vpn.OpenVPN {
|
||||||
warnings = append(warnings, "OpenVPN 2.5 uses OpenSSL 3 "+
|
warnings = append(warnings, "OpenVPN 2.5 uses OpenSSL 3 "+
|
||||||
"which prohibits the usage of weak security in today's standards. "+
|
"which prohibits the usage of weak security in today's standards. "+
|
||||||
|
|||||||
@@ -22,11 +22,5 @@ func (p *Provider) OpenVPNConfig(connection models.Connection,
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
// VPN Unlimited's certificate is sha1WithRSAEncryption and sha1 is now
|
|
||||||
// rejected by openssl 3.x.x which is used by OpenVPN >= 2.5.
|
|
||||||
// We lower the security level to 0 to allow this algorithm,
|
|
||||||
// see https://www.openssl.org/docs/man1.1.1/man3/SSL_CTX_set_security_level.html
|
|
||||||
providerSettings.TLSCipher = `"DEFAULT:@SECLEVEL=0"`
|
|
||||||
|
|
||||||
return utils.OpenVPNConfig(providerSettings, connection, settings, ipv6Supported)
|
return utils.OpenVPNConfig(providerSettings, connection, settings, ipv6Supported)
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user