diff options
author | Bernhard Schmidt <berni@debian.org> | 2020-10-20 19:17:07 +0200 |
---|---|---|
committer | Bernhard Schmidt <berni@debian.org> | 2020-10-20 19:17:07 +0200 |
commit | 63934be0e9a494086d103bc3ba43c444b5460b5b (patch) | |
tree | e2b5876072df6d56023d21a66379544e2bef9d5f /src/openvpn/ssl_ncp.c | |
parent | 4ca7910f8fbd80a28780cff34d27b481ae882f67 (diff) | |
parent | 80285c31e83a8e233016e227a393543d508194eb (diff) |
Update upstream source from tag 'upstream/2.5_rc3'
Update to upstream version '2.5~rc3'
with Debian dir 654a857be97a3895ea7ff814fea7c3f9f80e8794
Diffstat (limited to 'src/openvpn/ssl_ncp.c')
-rw-r--r-- | src/openvpn/ssl_ncp.c | 18 |
1 files changed, 16 insertions, 2 deletions
diff --git a/src/openvpn/ssl_ncp.c b/src/openvpn/ssl_ncp.c index 5549639..45bddbe 100644 --- a/src/openvpn/ssl_ncp.c +++ b/src/openvpn/ssl_ncp.c @@ -110,7 +110,15 @@ mutate_ncp_cipher_list(const char *list, struct gc_arena *gc) * e.g. replacing AeS-128-gCm with AES-128-GCM */ const cipher_kt_t *ktc = cipher_kt_get(token); - if (!ktc) + if (strcmp(token, "none") == 0) + { + msg(M_WARN, "WARNING: cipher 'none' specified for --data-ciphers. " + "This allows negotiation of NO encryption and " + "tunnelled data WILL then be transmitted in clear text " + "over the network! " + "PLEASE DO RECONSIDER THIS SETTING!"); + } + if (!ktc && strcmp(token, "none") != 0) { msg(M_WARN, "Unsupported cipher in --data-ciphers: %s", token); error_found = true; @@ -118,6 +126,12 @@ mutate_ncp_cipher_list(const char *list, struct gc_arena *gc) else { const char *ovpn_cipher_name = cipher_kt_name(ktc); + if (ktc == NULL) + { + /* NULL resolves to [null-cipher] but we need none for + * data-ciphers */ + ovpn_cipher_name = "none"; + } if (buf_len(&new_list)> 0) { @@ -325,4 +339,4 @@ check_pull_client_ncp(struct context *c, const int found) "to this server."); return false; } -}
\ No newline at end of file +} |