Hi,

On 16/12/16 13:27, Sebastian Rubenstein wrote:
 > Can I take your above statement into consideration when I shop for a 
commercial VPN provider? For example, before I buy a subscription plan, 
I will ask if they use tls-auth ta.key. If they do, it means they trust 
their customers, yes?

Not really - it means they use tls-auth to protect their servers against 
DDoS attacks. I'd not trust the tls-auth key file provided by a large 
VPN provider at all, as almost *anybody* will have access to that file.


On 16/12/16 13:31, Sebastian Rubenstein wrote:

> AES-GCM has a shorter authentication tag (128 bits) than HMAC-SHA256 
> (256 bits). Also, AES-GCM doesn't need a unpredictable IV but rather 
> just a unique-per-key nonce, which mean we can transfer 8 less bytes 
> per packet for the IV. This saves us a total of 24 bytes per packet 
> overhead compared to cipher AES-256-CBC + auth SHA256. Furthermore, 
> AES-GCM can maximallu leverage the AES-NI hardware acceleration 
> available in modern Intel CPUs, which will result is *much* faster 
> crypto.
> in terms of cryptographic strength, AES-256-GCM is comparable to HMAC-SHA256?
>
>

AES-256-GCM is an alternative for AES-256 + SHA2 and is , as Steffan 
wrote, much faster due to a very nicely optimized implementation in the 
underlying OpenSSL libs.
Most https:// connections nowadays are based on AES-256-GCM so they can 
be considered trusted+secure.

HTH,

JJK


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to