diff options
author | Matt Lewandowsky <lewellyn@foxmail.com> | 2016-03-02 19:02:07 +0300 |
---|---|---|
committer | Matt Lewandowsky <lewellyn@foxmail.com> | 2016-03-02 19:02:07 +0300 |
commit | 15876de6fbce47f920d5349f492c08f4eadeff5b (patch) | |
tree | 5dc389df83b43d5a00c9aad11fc6c17cae9131f6 /src | |
parent | d3a1b26413acf3b387475f9ec5c4cbd93c5ffffe (diff) |
Default to TLS connections only
Due to DROWN (CVE-2016-0800), SSLv2 must be disabled by default. This is the most straight-forward way to ensure new installations are not vulnerable. The upgrade use case is not addressed by this PR, though I posted information to the forum: http://www.vpnusers.com/viewtopic.php?f=7&t=5596
This patch is made available under Contribution Option 1, to allow PacketiX to be fixed the same way.
Diffstat (limited to 'src')
-rw-r--r-- | src/Cedar/Server.c | 15 |
1 files changed, 14 insertions, 1 deletions
diff --git a/src/Cedar/Server.c b/src/Cedar/Server.c index e5e2aff5..83a66d01 100644 --- a/src/Cedar/Server.c +++ b/src/Cedar/Server.c @@ -2577,6 +2577,9 @@ void SiLoadInitialConfiguration(SERVER *s) return;
}
+ // Default to TLS only; mitigates CVE-2016-0800
+ s->Cedar->AcceptOnlyTls = true;
+
// Auto saving interval related
s->AutoSaveConfigSpan = SERVER_FILE_SAVE_INTERVAL_DEFAULT;
s->BackupConfigOnlyWhenModified = true;
@@ -2762,6 +2765,9 @@ void SiInitConfiguration(SERVER *s) s->AutoSaveConfigSpan = SERVER_FILE_SAVE_INTERVAL_DEFAULT;
s->BackupConfigOnlyWhenModified = true;
+ // Default to TLS only; mitigates CVE-2016-0800
+ s->Cedar->AcceptOnlyTls = true;
+
// IPsec server
if (s->Cedar->Bridge == false)
{
@@ -6156,7 +6162,14 @@ void SiLoadServerCfg(SERVER *s, FOLDER *f) SetGlobalServerFlag(GSF_DISABLE_SESSION_RECONNECT, CfgGetBool(f, "DisableSessionReconnect"));
// AcceptOnlyTls
- c->AcceptOnlyTls = CfgGetBool(f, "AcceptOnlyTls");
+ if (CfgIsItem(f, "AcceptOnlyTls"))
+ {
+ c->AcceptOnlyTls = CfgGetBool(f, "AcceptOnlyTls");
+ }
+ else
+ {
+ c->AcceptOnlyTls = true;
+ }
}
Unlock(c->lock);
|