Feature request: updated TLS ciphers for SSTP
Posted: Wed Sep 08, 2021 12:25 pm
I've setup the SSTP server as below, but the strongest cipher suite that's offered is TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014). That's concerning because both CBC mode and the SHA1 hash are widely regarded as insufficiently secure today. The SSTP client on my Windows 10 PC supports cipher suites with GCM as well as SHA256 and 384 (e.g. TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)) so clients would be able to use them, if only RouterOS supported them.
Thanks.
Thanks.
Code: Select all
/interface sstp-server server
set authentication=mschap2 certificate=XXX default-profile=vpn enabled=yes \
force-aes=yes pfs=yes tls-version=only-1.2