What's new
  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Planning to remove some obsolete OpenVPN settings in the near future

RMerlin

Asuswrt-Merlin dev
Staff member
Depending on when OpenVPN 2.7 goes final, when I merge it into Asuswrt-Merlin, I will probably take the occasion to start removing some obsolete/deprecated settings. Some of them will already be gone with 2.7, while others may be marked as deprecated, for removal in 2.8.

I haven't done a complete analysis yet of the 2.7 changes, but one of the settings I will most likely retire is support for compression, which has been deprecated for years now (and even marked as a security liability by the OpenVPN devs).

Another possible removal might be for some obsolete ciphers and HMAC algorithms.

Whenever possible, features removal will only be on the Server. I realize that some remote servers still require support for some older settings, so provided the feature is still available in OpenVPN 2.7, I don't intend to remove any feature from the Client.

What this means is people using the OpenVPN Server at that time might possibly need to readjust some settings, and export an updated config file for their clients.

Keep an eye on the changelog. People doing remote firmware updates over OpenVPN might need to be extsra careful that time.

Be warned that once Asus finally migrates to OpenSSL 3.x (no idea when that will be, previous ETAs have come and gone by now), it might introduce additionnal changes. OpenSSL 3.x by default no longer support some obsolete ciphers, so unless Asus decides to manually re-enable them, that means that some clients will also be impacted, not just servers.

At some point I might add a new client setting to enable connectivity to legacy servers. I personally have to use that myself to connect to some older OpenVPN servers (like the very old implementation used by Mikrotik routers). That would probably set settings like "compat-mode 2.4.0" or "tls-cert-profile insecure" in the router's client config.

I'll probably start poking at the community for more feedback from people with particular client needs, especially people connecting to very old servers.
 
One bit of advice I can make ahead of this - start looking at your server configuration. If you still use compression, disable it, then export a new client config for your devices connecting to the VPN server.
 

Similar threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Back
Top