Skip to content

VPNs

Warning

This section is under construction

Danger

There are a lot of old VPN technologies out there that are old and insecure. This section will not cover those technologies. vpn-image

Tip

To improve traditional encrypt-then-MAC VPN solutions, one should choose modern AEAD ciphers like AES-GCM or ChaCha20-poly1305.

OpenVPN

Danger

More research is required on the OpenVPN TLS protocol. Watching a YouTube video for one of my academic courses stated that TLS does not rekey. Prolong connections can be susceptible to cryptanalysis

Tip

While OpenVPN allows either the TCP or UDP protocol to be used as the VPN carrier connection, the UDP protocol will provide better protection against DoS attacks and port scanning than TCP:

    proto udp

Cite

IPSec

Cite

WireGuard

WireGuard’s protocol was developed from scratch, based on best cryptographic practices and using the newest ciphers. Contrary to committee-guided protocols like IPsec, WireGuard is strongly opinionated on certain topics and includes radical ideas. It does away with cryptographic agility by locking in on a single AEAD cipher and authentication algorithm with no feature negotiation: ChaCha20-poly1305. Backwards compatibility is explicitly missing: handshake and key derivation include a hash of the protocol version number, so two different implementations will derive distinct keys, making them permanently non-compatible. These measures heavily incentivize keeping the software up-to-date and prevent degradation attacks found in SSL.

Cite
  • Hulsing, A., Ning, K.-C., Schwabe, P., Weber, F., & Zimmermann, P. R. (2021). Post-quantum WireGuard. 2021 IEEE Symposium on Security and Privacy (SP), Security and Privacy (SP), 2021 IEEE Symposium on, SP, 304–321. https://doi-org.ezproxy.snhu.edu/10.1109/SP40001.2021.00030
  • Lipp, B., Blanchet, B., & Bhargavan, K. (2019). A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol. 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Security and Privacy (EuroS&P), 2019 IEEE European Symposium On, 231–246. https://doi-org.ezproxy.snhu.edu/10.1109/EuroSP.2019.00026
  • Priambodo, D. F., Amiruddin, & Trianto, N. (2021). Hardening a Work from Home Network with Wireguard and Suricata. 2021 International Conference on Computer Science and Engineering (IC2SE), Computer Science and Engineering (IC2SE), 2021 International Conference On, 1, 1–4. https://doi-org.ezproxy.snhu.edu/10.1109/IC2SE52832.2021.9791983