Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use PIA "strong" ovpn config files instead of current ones with weaker ciphers #320

Open
2 of 3 tasks
moonraker2 opened this issue Oct 30, 2024 · 0 comments
Open
2 of 3 tasks

Comments

@moonraker2
Copy link

moonraker2 commented Oct 30, 2024

Do you have the latest provider files?

  • I have checked that the provider are the latest

Have you tested the provider files?

  • I have tested the provider files

Can you create a PR for this config?

  • I can create a PR for this

Provider details

Data encryption cipher should be AES-256-GCM (instead of the current default AES-128-CBC) as used in the official PIA VPN app, and data auth could probably be upgraded to SHA-256.
Also, why are we still using the 2048 bit CA certificate (ca.rsa.2048.crt) and not the 4096 bit one?

Link to PIA "strong" OVPN config (ZIP archive):
https://www.privateinternetaccess.com/openvpn/openvpn-strong.zip

In case you don't want to change the default, is there an easy way for me to specify that I want strong encryption in my docker compose file, or otherwise?

Anything else?

No response

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant