From e0a977cf83097d7499a4be8f7633cadb5c060b64 Mon Sep 17 00:00:00 2001 From: Quentin McGaw Date: Thu, 2 May 2024 08:13:51 +0000 Subject: [PATCH] change(openvpn): default upgraded from 2.5 to 2.6 --- Dockerfile | 2 +- internal/configuration/settings/openvpn.go | 2 +- internal/configuration/settings/settings.go | 2 +- internal/configuration/settings/settings_test.go | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/Dockerfile b/Dockerfile index de18c826..38d5baef 100644 --- a/Dockerfile +++ b/Dockerfile @@ -85,7 +85,7 @@ ENV VPN_SERVICE_PROVIDER=pia \ OPENVPN_PASSWORD= \ OPENVPN_USER_SECRETFILE=/run/secrets/openvpn_user \ OPENVPN_PASSWORD_SECRETFILE=/run/secrets/openvpn_password \ - OPENVPN_VERSION=2.5 \ + OPENVPN_VERSION=2.6 \ OPENVPN_VERBOSITY=1 \ OPENVPN_FLAGS= \ OPENVPN_CIPHERS= \ diff --git a/internal/configuration/settings/openvpn.go b/internal/configuration/settings/openvpn.go index 52ce17e1..ee13494e 100644 --- a/internal/configuration/settings/openvpn.go +++ b/internal/configuration/settings/openvpn.go @@ -286,7 +286,7 @@ func (o *OpenVPN) overrideWith(other OpenVPN) { } func (o *OpenVPN) setDefaults(vpnProvider string) { - o.Version = gosettings.DefaultComparable(o.Version, openvpn.Openvpn25) + o.Version = gosettings.DefaultComparable(o.Version, openvpn.Openvpn26) o.User = gosettings.DefaultPointer(o.User, "") if vpnProvider == providers.Mullvad { o.Password = gosettings.DefaultPointer(o.Password, "m") diff --git a/internal/configuration/settings/settings.go b/internal/configuration/settings/settings.go index 988d95da..736bc2fd 100644 --- a/internal/configuration/settings/settings.go +++ b/internal/configuration/settings/settings.go @@ -155,7 +155,7 @@ func (s Settings) Warnings() (warnings []string) { if helpers.IsOneOf(s.VPN.Provider.Name, providers.SlickVPN) && s.VPN.Type == vpn.OpenVPN { - warnings = append(warnings, "OpenVPN 2.5 uses OpenSSL 3 "+ + warnings = append(warnings, "OpenVPN 2.5 and 2.6 use OpenSSL 3 "+ "which prohibits the usage of weak security in today's standards. "+ s.VPN.Provider.Name+" uses weak security which is out "+ "of Gluetun's control so the only workaround is to allow such weaknesses "+ diff --git a/internal/configuration/settings/settings_test.go b/internal/configuration/settings/settings_test.go index c86947b0..9fa0f351 100644 --- a/internal/configuration/settings/settings_test.go +++ b/internal/configuration/settings/settings_test.go @@ -30,7 +30,7 @@ func Test_Settings_String(t *testing.T) { | | ├── Protocol: UDP | | └── Private Internet Access encryption preset: strong | └── OpenVPN settings: -| ├── OpenVPN version: 2.5 +| ├── OpenVPN version: 2.6 | ├── User: [not set] | ├── Password: [not set] | ├── Private Internet Access encryption preset: strong