OPNsense Forum

Archive => 16.7 Legacy Series => Topic started by: fabian on August 25, 2016, 05:30:33 pm

Title: New Attack
Post by: fabian on August 25, 2016, 05:30:33 pm
There is a new attack against 64 bit ciphers: https://sweet32.info/

Please be careful when using an affected cipher especially when using it with vpn.


fabian
Title: Re: New Attack
Post by: bobbythomas on August 26, 2016, 08:00:30 am
Thanks for the update Fabian. Will make sure unaffected Ciphers are used for encryption.
Regards,
Bobby Thomas

Sent from my ONE A2003 using Tapatalk

Title: Re: New Attack
Post by: franco on August 26, 2016, 05:35:09 pm
My favourite bit: "by capturing around 785 GB of traffic". That's a lot for a persistent session.

Not saying this isn't a problem and that standards need to be changed (which OpenVPN did not do during their 2.3.12 bump this week), but it's easy to work around the threat model class or avoid it in particular domains.

An example: old PGP keys still use 3DES by default, but the attack is not applicable because an email will not easily sum up to what is required by the POC.


Cheers,
Franco
Title: Re: New Attack
Post by: Julien on August 27, 2016, 10:01:13 pm
Is this also for users using SSL + User Authentication radius authentication ?
Title: Re: New Attack
Post by: franco on August 28, 2016, 01:56:37 pm
Yes. SSL and user credentials are for authentication, not tunnel encryption.