> - Will it supersede IPsec, in your opinion?

No. 

It sounds like a “diet IKEv2.” It does key exchange and encapsulation over one 
port and is layer 3 only. [1]

It might be a sufficient solution for a quick, simple VPN setup. If you want 
something more, there’s OpenIKED. 


[1] https://www.wireguard.io/papers/wireguard.pdf

> On Jul 13, 2017, at 17:50, if...@airmail.cc wrote:
> 
> Hi,
> I have recently read about WireGuard Protocol and it seems really
> interesting. Here's a description (from wireguard.io):
> 
> ----------------------------------------------------------------
> 
> "WireGuard is an extremely simple yet fast and modern VPN that
> utilizes state-of-the-art cryptography. It aims to be faster,
> simpler, leaner, and more useful than IPSec, while avoiding the
> massive headache." [It] "has been formally verified in the symbolic
> model using Tamarin. This means that there is a security proof of
> the WireGuard protocol. The protocol has been verified to possess
> the following security properties:
> * Correctness
> * Strong key agreement & authenticity
> * Key-compromise impersonation resistance
> * Key secrecy
> * Forward secrecy
> * Session uniqueness
> * Identity hiding"
> 
> "It intends to be considerably more performant
> than OpenVPN" [and] "aims to be as easy to configure and deploy
> as SSH." [...] "WireGuard uses state-of-the-art cryptography, like
> the Noise protocol framework, Curve25519, ChaCha20, Poly1305,
> BLAKE2, SipHash24, HKDF, and secure trusted constructions." [...]
> "Compared to behemoths like *Swan/IPsec or OpenVPN/OpenSSL, in which
> auditing the gigantic codebases is an overwhelming task even for
> large teams of security experts, WireGuard is meant to be
> comprehensively reviewable by single individuals."
> 
> ----------------------------------------------------------------
> 
> 
> 
> So, my question is:
> - Will it supersede IPsec, in your opinion?
> - Why should someone use OpenIKED instead of WireGuard
> (if it will be ported to OpenBSD)?
> - There's any plan for a future implementation of the protocol,
> using the best security practices of OpenBSD team? I'm mainly
> concerned about privsep here (pledge) and correctness. It doesn't
> matter if the protocol has a formal verification if it's
> implementation is bad.
> 
> 
> 
> Regards.
> 

Reply via email to