New Attack

Started by fabian, August 25, 2016, 05:30:33 PM

Previous topic - Next topic
There is a new attack against 64 bit ciphers: https://sweet32.info/

Please be careful when using an affected cipher especially when using it with vpn.


fabian

Thanks for the update Fabian. Will make sure unaffected Ciphers are used for encryption.
Regards,
Bobby Thomas

Sent from my ONE A2003 using Tapatalk


My favourite bit: "by capturing around 785 GB of traffic". That's a lot for a persistent session.

Not saying this isn't a problem and that standards need to be changed (which OpenVPN did not do during their 2.3.12 bump this week), but it's easy to work around the threat model class or avoid it in particular domains.

An example: old PGP keys still use 3DES by default, but the attack is not applicable because an email will not easily sum up to what is required by the POC.


Cheers,
Franco

Is this also for users using SSL + User Authentication radius authentication ?
DEC4240 – OPNsense Owner

Yes. SSL and user credentials are for authentication, not tunnel encryption.