Risks of auth and cipher none
Posted: Fri Aug 18, 2017 5:19 pm
Can anyone tell me of the risks of setting up on the openvpn config file:
cipher none
auth none
Besides the obvious that the connection becomes transparent and people will be able to see the packets?
Can anyone connect to the server without the keys?
The server is using client/server/ca/dh keys of 4096 bits RSA with sha512. It also uses 2048bit RSA tls-auth static key. And it also requires user/pass credentials.
Why would I want to use cipher/auth none? The connections to the server are few and are mainly for streaming services. Using the Linux TOP command on my router with tomato OS, the openvpn app is using the CPU at 80% when streaming and keeping my router hot.
Regards
cipher none
auth none
Besides the obvious that the connection becomes transparent and people will be able to see the packets?
Can anyone connect to the server without the keys?
The server is using client/server/ca/dh keys of 4096 bits RSA with sha512. It also uses 2048bit RSA tls-auth static key. And it also requires user/pass credentials.
Why would I want to use cipher/auth none? The connections to the server are few and are mainly for streaming services. Using the Linux TOP command on my router with tomato OS, the openvpn app is using the CPU at 80% when streaming and keeping my router hot.
Regards