Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

I edited my OpenVPN static key, changing some of the hex bytes, but the key still connects to a remote peer which is using the original key. Is this a bug?

0
Posted

I edited my OpenVPN static key, changing some of the hex bytes, but the key still connects to a remote peer which is using the original key. Is this a bug?

0

>When I modify the Preshared 2048 bit Static Key on the Initiator Side of the >Tunnel(don’t tested the other way) I’m anyhow able to establish the >Tunnel an send Packets through the Tunnel. I don’t understand >the Key splitting and handling as described below, but I think the Keys >on both Sides of the Tunnel should be identical for the Tunnel to be >established. >I can modify every Char in Line 2,3,4,7,8,9,10,11,12,13,14,15,16 without any effect and think this is possible a Bug. >Bye >Klaus No, this is not a bug. The 2048 bit static key is designed to be large enough to allow 512 bit encrypt, decrypt, HMAC send, and HMAC receive keys to be extracted from it. However, this key size is far too large for current conventional OpenVPN usage. OpenVPN uses the 128 bit blowfish cipher by default. It also uses the 160 bit HMAC-SHA1 as a cryptographic signature on packets to protect against tampering. Since you probably didn’t specify a key direction parameter, the encrypt/decrypt keys for bot

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123