OpenVPN Server TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384 ?



  • Dear pfSense friends,

    After reading some stuff on the web (and not being an expert...) and trying to make my openvpn connection safer and faster (home: pfsense 2.4.4 p3, i7-2600, 8GB - travel: openwrt 18.06.4 avm 4040 router) ...

    I could achieve TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 (with 4096 bit) via pfsense GUI.

    Before going into detail, is TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384 achievable via pfsense GUI ?

    Many thanks ! and

    cheers chulio



  • Dear pfSense friends,

    Unfortunately I found this
    https://github.com/davidemyers/algo-pfsense
    saying
    "pfSense does not officially support the ECDSA certs created by Algo, but they do work when you choose Mutual RSA when creating the Phase 1. You may not be able to install ECDSA certs on pfSense versions older than 2.4."
    which relates to IKEv2, but not to OpenVPN.

    I read controversial stuff ECDSA vs RSA about security and speed.
    Shall I stay with RSA ?
    If yes, why is ECDHE anyway used whatever I enter in the DH parameter ?

    Many thanks ! and

    cheers chulio.


Log in to reply