Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site-to-Site VPN Tunnel Flagges in PCI Scan

    Scheduled Pinned Locked Moved OpenVPN
    12 Posts 2 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      parkerask_centuryci
      last edited by

      Greetings,

      We recently ran a PCI scan as part of our quarterly checks. This scan failed. I believe this is caused by what is discussed in this article. https://forum.netgate.com/topic/170071/heads-up-openvpn-deprecating-shared-key-mode-requires-tls-deprecating-cipher-selection/12

      Weak SSL_TLS Key Exchange.png TLS_1_0.png SSL Certificate.png

      If I am reading this right, does this mean, I would have to create an entire new certificate and recreate the tunnels to be secure again?

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @parkerask_centuryci
        last edited by

        @parkerask_centuryci said in Site-to-Site VPN Tunnel Flagges in PCI Scan:

        This scan failed. I believe this is caused by what is discussed in this article. https://forum.netgate.com/topic/170071/heads-up-openvpn-deprecating-shared-key-mode-requires-tls-deprecating-cipher-selection/12

        Cannot see any relation with that thread. It talks about disabling shared key mode (none-TLS).

        The test complains that the server still supports elder TLS versions.
        You can force it using current versions by entering

        tls-version-min 1.2
        

        into the advanced options box.

        Also the test complains about the self-signed server certificate.
        If you need a public one you can get it from an official CA or simply install the ACME package and get a Let's encrypt cert.

        However, as self-signed certificate is not a vulnerability in my opinion.

        P 1 Reply Last reply Reply Quote 0
        • P
          parkerask_centuryci @viragomann
          last edited by

          @viragomann I can enter that. Would that be through the command prompt, Execute shell command?

          And are the two top screen shots about the same TLS 1.0 being active still?

          Would this affect other VPN clients that I have with OpenVPN?

          Thank you,

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @parkerask_centuryci
            last edited by

            @parkerask_centuryci said in Site-to-Site VPN Tunnel Flagges in PCI Scan:

            I can enter that. Would that be through the command prompt, Execute shell command?

            In the OpenVPN server settings.

            e10e7c63-78eb-4296-ab27-3e7fcaceb66b-grafik.png

            And are the two top screen shots about the same TLS 1.0 being active still?

            About the first one I'm not sure, but think so.

            Would this affect other VPN clients that I have with OpenVPN?

            No, all clients should support TLS 1.2 nowadays.
            But when changing the server settings, the client connections are dropped and they have to reconnect.

            P 1 Reply Last reply Reply Quote 0
            • P
              parkerask_centuryci @viragomann
              last edited by

              @viragomann That sounds good. I can put that in behind my custom routes.

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @parkerask_centuryci
                last edited by

                @parkerask_centuryci said in Site-to-Site VPN Tunnel Flagges in PCI Scan:

                I can put that in behind my custom routes.

                Separated by a semicolon.

                P 1 Reply Last reply Reply Quote 0
                • P
                  parkerask_centuryci @viragomann
                  last edited by

                  @viragomann I have saved the line in and the VPN tunnels have reconnected. Is there a way to check what version they are on?

                  And is there a way to disable TLS 1.0 or did the command do both at once? Still learning the system.

                  Thank you,

                  P 1 Reply Last reply Reply Quote 0
                  • P
                    parkerask_centuryci @parkerask_centuryci
                    last edited by parkerask_centuryci

                    @viragomann This morning the VPN tunnels are not up and not connecting. The firewall does a reboot every night. I did check the logs and found that it was exiting with an error now.
                    openvpn log.png

                    What would be the main problem here? IS it the compression or is a certificate failure?

                    After a few minutes the tunnels came back up. This is very strange and makes me nervous. The system rebooted at 4:30 am and it took this long to come back? The only thing I did was to remove the tls-version-min 1.2 command. Then I added it back in when the tunnels still did not come back after a few minutes. Both times I saved.

                    ff854166-a91c-4b11-8e9b-b2cfa349f765-image.png

                    I am wondering if this will happen tomorrow when both firewalls reboot.

                    P 1 Reply Last reply Reply Quote 0
                    • P
                      parkerask_centuryci @parkerask_centuryci
                      last edited by

                      @viragomann Update: So this morning, I could only get the tunnels to come back after taking out the new tls setting. After a couple of minutes, both tunnels connected. I added in the setting again and it did the reboot. Currently both tunnels are up and working.

                      Here is a screenshot when they were not working earlier.
                      openvpn log 2.png

                      Is this again related to the certificate? Would you like to see my settings for the VPN Server?

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @parkerask_centuryci
                        last edited by

                        @parkerask_centuryci said in Site-to-Site VPN Tunnel Flagges in PCI Scan:

                        So this morning, I could only get the tunnels to come back after taking out the new tls setting.

                        The log from 6:34 let me assume that there was something wrong with the advanced options.

                        Are your VPNs both site-to-site? What are the clients?

                        The other log shows an error thrown at client cert verification. But if the cert really doesn't match, he would never be able to connect. However, as a understand, the connection worked in the past.

                        P 1 Reply Last reply Reply Quote 0
                        • P
                          parkerask_centuryci @viragomann
                          last edited by

                          @viragomann Yes, both of the VPNs under 1194 are Peer to Peer (SSL/TLS).
                          downtown vpn.png

                          workshop vpn.png
                          They both have a device mode of: tun - Layer 3 Tunnel Mode

                          Yes, they did work before the addition of the TLS min. I would every so often restart the OpenVPN server to reconnect/establish a connection. I have changed no other settings. I do restart both firewalls. The top one starts at 4:30 to reboot. The second one reboots 5 minutes later. I did this to have a fresh connection (and clear cache) each morning. Otherwise I had to restart the VPN service once a day anyway.

                          P 1 Reply Last reply Reply Quote 0
                          • P
                            parkerask_centuryci @parkerask_centuryci
                            last edited by

                            @parkerask_centuryci I had to remove the line to bring up my secure tunnels again today. Right now I have removed it till we can find a way to have the tunnels come back after the Firewall reboots in the morning. I do not want to have to do an hours work for it to come back for the day.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.