OpenVPN P2P AES-GCM hashing option?

Hi All,

Running IPFire 2.29 (x86_64) - Core-Update 195
I have not yet upgraded to 196 due to an ongoing p2p openVPN challenge

it seems that for road warriors, AES256-GCM and SHA512 happily co-exist:

but My Peer-to-peer connection (a Teltonika RUTX11 router) failed as a result of a software upgrade, and when I logged in to IPFire to check the status I noticed something odd.

In the Peer-to-peer config I enabled SHA512, then selected AES256-GCM.

The second I did so, SHA512 gets greyed out.

I pressed the SAVE button and it went back to the main OpenVPN screen
But when I clicked the pencil to edit the P2P connection again I see a different
hashing option:

image

unfortunately, as far as I am aware Whirlpool 512 is not supported by my client device.

is this just a curiosity of the GUI ? or can I not use SHA512 for P2P with AES256-GCM Please (and if not , what is the limitation please ?)

Regards

BB

Please see this section in the net to net wiki documentation

https://www.ipfire.org/docs/configuration/services/openvpn/tls-server#hash-algorithm

Thanks Adolf

To check my understanding of the article (I am not yet a cryptography expert)

AES-GCM uses its own algorithm (GMAC) for data integrity, therefore the option is greyed out. Implicitly then, no other HMAC is necessary when using GCM? correct?

I am therefore a little confused as to why I can specify AES-GCM with a selection of HMAC approaches for a road warrior but not for a P2P ?

Surely the same applies for both client types ?

Can you enlighten me further perhaps please ?

regards

BB

Correct. That is how the code has been written.

I am not 100% sure but I believe it is related to the roadwarrior being a server/client interaction while the net2net is a server/server interaction. The WUI page for the P2P nete2net connection uses the terms “server” and “client” but this is just to differentiate the two ends. They could just as easily have been called “fred” and “tony”.

@ummeegge can probably explain better, and correct me if my input is incorrect, as he has been involved very closely in the code for the net2net connection.

Very interesting, many thanks Adolf

I note that Teltonika list AES-GCM as a supported method, but still seem to default to an HMAC in their GUI page . I must raise it with them! :slight_smile:

I look forward to any more clarity from your colleague!

Many thanks again ,

Regards

BB

Hi all,
the n2n WUI is a little more advanced according to the HMAC selection and greys the HMAC selection out if you choose an GCM (AEAD) cipher since the Galois Counter Mode offers already an Galois Message Authentication Code (GMAC) . The n2n WUI shows this fact to the user whereby the Roadwarrior would need also an approrpiate Java Code to show this too git.ipfire.org Git - ipfire-2.x.git/blob - html/cgi-bin/ovpnmain.cgi .
–tls-auth (TLS Channel Protection:) uses also it´s own HMAC but if --auth has been set in server.conf and you choose an GCM in the WebUserInterface or in general an AEAD Cipher, the --auth directive will simply be ignored by OpenVPN., so everything will work as it should.

Hope this helps a little.

Best,

Erik

Ah, okay. So with the RW connection, it makes no difference what HMAC I choose (I am using AES GCM 256 bit) so it will just use the GMAC automatically behind the scenes.

Correct Adolf.

Best,

Erik

1 Like

Very interesting Erik

Many thanks both

Regards

BB