-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 24/09/14 10:26, David Sommerseth wrote:
> On 24/09/14 10:15, Gert Doering wrote:
>>> But to get to the point, that if I setup openvpn on my droplet 
>>> and let's say an evil admin sniffing my traffic for 3 months
>>> with tcpdump then decides to decrypt that traffic what tools
>>> does he have (if any to do this). At this point he has a pcap
>>> file and the openvpn server certificates and keys.
> 
>> Now that is easy - OpenVPN does PFS, so the stored keys won't
>> help decrypt sniffed session traffic.
> 
> If an attacker have sniffed the complete handshake and is in 
> possession of the keys, I believe it is a theoretical possibility
> to compromise the key exchange handshake.  Which again gives you
> the access to the tunnel data.  If the attacker in addition have
> access to client keys, then this process goes even faster.  But it
> is correct that you don't get the raw key out of the handshake.

Gert and I have had a private discussion regarding if it is possible
or not to break the session key.  We both agree that it's not an easy
task, and capturing data + having they key material alone isn't enough
to break the session key.  But I believe with that information it is
in theory possible to mount an attack, when weaknesses in the
Diffie-Hellman key exchange are discovered and utilised.

Some papers on these issues related to weaknesses in DH:
<http://www.cl.cam.ac.uk/~rja14/Papers/psandqs.pdf> (CVE-2011-5095,
CVE-2011-1923)
<http://www.it.iitb.ac.in/~praj/acads/netsec/FinalReport.pdf>
<http://crypto.cs.mcgill.ca/~stiglic/Papers/dhfull.pdf>

What I'm actually saying is that no packets passing over the Internet
is safe forever.  There will always be weaknesses discovered which can
be used.  So the important aspect of encryption isn't to make it safe
forever, but to protect it as long as possible as the data has value
for an attacker.  In this regard, I'm one of those who don't think the
word "Perfect" in PFS is appropriate, because it never will be 100%
perfect.

However, one more point we've forgotten to mention, which is fare more
important:  random data

You must have good quality of the random data when generating
private/public keys and dhparams.  Otherwise the keys can more easily
be compromised.  And you should as much as possible avoid generating
keys on virtual machines, as the random data on those machines often
can be weaker.

These are a few of the papers on this topic:
<http://www.isoc.org/isoc/conferences/ndss/10/pdf/15.pdf>
<harvey.binghamton.edu/~ychen/chen-kerrigan.pdf>
<http://www.ieee-security.org/TC/SP2014/papers/Not-So-RandomNumbersinVirtualizedLinuxandtheWhirlwindRNG.pdf>


- -- 
kind regards,

David Sommerseth
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlQijTMACgkQDC186MBRfrqNbwCcCdEDgymFROwsF4T/Ai64yoNZ
058An1gMF1VkAHUbOFc9gUoOEbWOoLjU
=nv1k
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to