Hello David,

Thanks for the time that you spent on explaining basic concepts to me.

> Sent: Friday, December 16, 2016 at 2:11 AM
> From: "David Sommerseth" <[email protected]>
> To: "Sebastian Rubenstein" <[email protected]>, 
> [email protected]
> Subject: Re: [Openvpn-users] Experts' opinions needed: Is my VPN provider 
> using weak or strong encryption algorithms?
> 
> But --tls-auth makes it far harder to inject packets, as
> both client and server will just throw away packets with an unexpected
> HMAC signature.  However, commercial public VPN providers will need to
> provide the same key to all its users, so if the packet injection comes
> from a user who managed to get a copy of that --tls-auth key, the
> protection isn't effective any more.

Thanks David for highlighting the above. When you wrote --tls-auth key, you 
were referring to the server-side --tls-auth key, which is owned and kept by 
the VPN provider, yes?

> 
> So if the VPN provider uses a proper community based version and not
> their own AES-GCM implementation, this should work quite fine out of the
> box with v2.4.

My VPN provider has its own AES-GCM implementation and has even offered me the 
source code to check for security risks. As I am no expert in OpenVPN 
technologies and cryptography, I declined to use their software.

Regards.

Sebastian

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to