Hi,
I have recently read about WireGuard Protocol and it seems really
interesting. Here's a description (from wireguard.io):

----------------------------------------------------------------

"WireGuard is an extremely simple yet fast and modern VPN that
utilizes state-of-the-art cryptography. It aims to be faster,
simpler, leaner, and more useful than IPSec, while avoiding the
massive headache." [It] "has been formally verified in the symbolic
model using Tamarin. This means that there is a security proof of
the WireGuard protocol. The protocol has been verified to possess
the following security properties:
* Correctness
* Strong key agreement & authenticity
* Key-compromise impersonation resistance
* Key secrecy
* Forward secrecy
* Session uniqueness
* Identity hiding"

"It intends to be considerably more performant
than OpenVPN" [and] "aims to be as easy to configure and deploy
as SSH." [...] "WireGuard uses state-of-the-art cryptography, like
the Noise protocol framework, Curve25519, ChaCha20, Poly1305,
BLAKE2, SipHash24, HKDF, and secure trusted constructions." [...]
"Compared to behemoths like *Swan/IPsec or OpenVPN/OpenSSL, in which
auditing the gigantic codebases is an overwhelming task even for
large teams of security experts, WireGuard is meant to be
comprehensively reviewable by single individuals."

----------------------------------------------------------------



So, my question is:
- Will it supersede IPsec, in your opinion?
- Why should someone use OpenIKED instead of WireGuard
(if it will be ported to OpenBSD)?
- There's any plan for a future implementation of the protocol,
using the best security practices of OpenBSD team? I'm mainly
concerned about privsep here (pledge) and correctness. It doesn't
matter if the protocol has a formal verification if it's
implementation is bad.



Regards.

Reply via email to