tharrisone 2 Posted ... There has been lots of talk on PFS, and so far the only drawback to it is added cpu power usage. For those who aren't aware of it: The security of communications transmitted across the Internet can be improved by using public key cryptography. However if the public and private keys used in those communications are compromised it can reveal the data exchanged in that session as well as the data exchanged in previous sessions. The concept of Perfect Forward Secrecy (PFS) is the property that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the (long-term) private keys is compromised in the future. Online systems such as IPSEC can negotiate new keys for every communication and if a key is compromised only the specific session it protected will be revealed. For Perfect Forward Secrecy to exist the key used to protect transmission of data must not be used to derive any additional keys, and if the key used to protect transmission of data was derived from some other keying material, that material must not be used to derive any more keys. Security now on TWIT did an entire show on it. Quote Share this post Link to post
Staff 9972 Posted ... Hello, it's already implemented. PFS is on SSL/TLS, which is used by OpenVPN. OpenVPN with double certificate authentication in TLS mode (as implemented in Air) provides forward security. New encryption key is negotiated every hour by default ("re-keying"), so this is a higher security degree than that described about IPsec. You can also lower this time frame. Kind regards Quote Share this post Link to post
tharrisone 2 Posted ... Thank you very much for your prompt answer, your company is really on top of things. I'm a happy customer. Quote Share this post Link to post
retiredpilot 6 Posted ... Perhaps members would like to have a quick look at AIR's connection going through their browser. I found this interesting and I am impressed by AIR as well. The following link will examine your current AIR connection and display it below in the page. https://cc.dcsec.uni-hannover.de/See my display below using FF version 22. As you can see it is DHE-RSA meaning fully enabled PFS at high levels. Some day I'll update my TLS version but in FF its pain and a bit over my head. This connection uses TLSv1 with DHE-RSA-CAMELLIA256-SHA and a 256 Bit key for encryption. Quote Share this post Link to post
Staff 9972 Posted ... @retiredpilot Thanks! A warning: the result displayed by the web site you linked pertains to the cipher suite of your browser, regardless of the suite used by OpenVPN. The cipher suite in our OpenVPN setup is DHE-RSA-AES-256-CBC-SHA (RSA 2048 bit, packet authentication HMAC SHA-1). TLS mode on, TLS re-keying set by default (60 minutes, can be lowered on the client side). Kind regards Quote Share this post Link to post