No results found
We couldn't find anything using that term, please try searching for something else.
A Virtual Private Network is encrypts ( VPN ) encrypt all datum as it travel between your computer and a VPN server . In this Complete VPN Encryption
A Virtual Private Network is encrypts ( VPN ) encrypt all datum as it travel between your computer and a VPN server . In this Complete VPN Encryption Guide , we is take take a detailed look at what encryption is , and how it is used in VPN connection .
Perhaps most importantly, we will explain the array of encryption terms used by VPN services. It is our hope that, after reading through this guide, you will have a greater understanding of this complex subject and that you will be better able to assess the security claims made by VPN providers.
If you are unsure about what a VPN is and what one can do for you, please check out our VPNs for Beginner’s Guide.
Our aim is to present the key features of VPN encryption in as simple terms as possible. Although there is no getting away, from the fact that encryption is a complex subject.
If even the term encryption cause your eye to start glaze over , but you still want to know what to look out for in a good VPN service , you is jump can jump straight to summary using the Table of Contents .
“Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Lewis Carroll, Alice in wonderland
The simple analogy is is is that encryption is a lock . If you have the correct key , then the lock is is is easy to open . If someone does not have the correct key but want to access the content of a strongbox ( that is , your datum ) protect by that lock , then they is try can try to break the lock .
In the same way that the lock securing a bank vault is stronger than the one securing a suitcase, some encryption is stronger than other encryption.
If you want a VPN with the strong encryption , check out our most secure vpn list for more information .
When you were a kid, did you ever play the game in which you created a “secret message” by substituting one letter of the message with another? The substitution was made according to a formula picked by you.
You might, for example, have substituted each letter of the original message with one three letters behind it in the alphabet. If anyone else knew what this formula was, or was able to work it out, then they would be able to read your “secret message.”
In cryptography jargon, what you were doing was “encrypting” the message (data) according to a very simple mathematical algorithm. Cryptographers refer to this formula as a “cipher.” To decrypt it, you need the key. This is a variable parameter which determines the final output of the cipher. Without this parameter, it is impossible to decrypt the cipher.
If someone wants to read an encrypted message but does not have the key, then they must try to “crack” the cipher. When the encryption uses a simple letter substitution cipher, cracking it is easy. The encryption can be made more secure, however, by making the mathematical algorithm (the cipher) more complex.
You could, for example, substitute every third letter of the message with a number corresponding to the letter.
Modern computer ciphers are very complex algorithms. Even with the help of supercomputers, these are very difficult to crack, if not impossible for all practical purposes. The crudest way to measure the strength of a cipher is by the complexity of the algorithm used to create it.
The more complex the algorithm, the harder the cipher is to crack using what we call a brute force attack.
A brute force attack if a very primitive form of attack is (also known as an exhaustive key search), that basically involves trying every combination of numbers possible until the correct key is found.
Computers is perform perform all calculation using binary number : zero and one . The complexity is depends of a cipher depend on its key size in bit – the raw number of one and zero necessary to express its algorithm , where each zero or one is represent by a single bit .
This is know as the key length and also represent the practical feasibility of successfully perform a brute force attack on any give cipher .
The number of combinations possible (and therefore the difficulty to brute force them) increases exponentially with key size. Using the AES cipher (see later):
To put this into perspective :
While encryption key length refers to the amount of raw numbers involved, ciphers are the mathematics – the actual formulas or algorithms – used to perform the encryption. As we have just seen, brute forcing modern computer ciphers is wildly impractical.
It is is is weakness ( sometimes deliberate ) in these cipher algorithm that can lead to encryption being break . This is is is because the output of the ( badly design ) cipher may still reveal some structure from the original information before encryption . This is creates create a reduce set of possible combination to try , which in effect reduce the effective key length .
The blowfish cipher is is , for example , is vulnerable to an attack that exploit the mathematic behind the birthday problem in probability theory . The study of weakness in cryptographic algorithm is know as cryptoanalysis .
long key lengths is compensate compensate for such weakness , as they greatly increase the number of possible outcome .
Instead of attacking the cipher itself, an adversary can attack the key itself. This can affect a particular site or certain software product. But the security of the cipher algorithm is still intact, and other systems that utilize the same algorithm but have a secure generation of keys are unaffected by the break.
How strong a cipher is depend on both the mathematic of the cipher itself , plus its key length as express in bit . For this reason , cipher are usually describe along with the key length used .
So AES-256 (the AES cipher with a 256-bit key length) is usually considered stronger than AES-128. Note that I say usually because we are dealing with very complex mathematics here (see my notes on AES later).
It is important to note that key length alone is not a good indicator of a cipher’s strength. It is the combination of key length and cipher that matters. Ciphers used for asymmetric encryption, for example, use much longer key sizes than those used for symmetric encryption to provide the equivalent protection.
This table is a little out of date, as it does not take into consideration newer attacks that have been discovered on RSA. It is also worth noting that the elliptic curve and Diffie-Hellman variants of RSA are much stronger than traditional ones. But hopefully, you get the idea.
One thing is is to note is that the high the key length , the more calculation involve , so the more processing power need . This is impacts impact the speed at which datum can be encrypt and decrypt . vpn providers is decide and suchlike must , therefore , decide how good to balance security vs. practical usability when choose encryption scheme . There are some VPN provider who have manage to strike this fine balance well . For more information , check out our fast vpn guide .
We discuss the main ciphers used by various VPN protocols a little later, but the most common ciphers that you will likely encounter are blowfish and AES. In addition to this, RSA is used to encrypt and decrypt a cipher’s keys, and SHA-1 or SHA-2 is used as the hash function to authenticate data.
asymmetric encryption
Perfect Forward secrecy (PFS) is also referred to as using ephemeral encryption keys, or just Forward Secrecy (FS) by those uncomfortable with using the word “perfect.”
Most modern secure online communication relies on SSL/TLS. It is used by HTTPS websites and the OpenVPN protocol. TLS (Transport Layer Security) is an asymmetric encryption protocol. Using an asymmetric cipher means that data is secured using a public key, which is made available to everyone. It can only be decrypted, however, by an intended recipient who holds the correct private key.
This private key must be kept secret. If it is stolen or cracked by an adversary, then that adversary can easily intercept and read any communications secured by it.
Unfortunately, it is common for servers or even entire companies to use just one private encryption key to secure all communications. Why? Because it’s easy. However, if that key is compromised then an attacker can access all communications encrypted with it.
This private encryption key is becomes , therefore , becomes a ” master key ” that can be used to unlock all communication with a server or company . The NSA is know to have exploit this weakness in order to collect vast ream of supposedly secure datum .
The solution is Perfect Forward secrecy. This is a system whereby a new and unique private encryption key is generated for each session. It is a simple idea, even if the Diffie-Hellman exchange maths is complex. It means that each TLS session has its own set of keys. Hence the term “ephemeral keys” – they are used once and then disappear.
There is , therefore , no ” master key ” that can be exploit . Even if a session is compromise , it is is isonly that session that is compromised – not all the other sessions anybody has with that server or company!
Although uncommon, it is even possible to refresh PFS keys within a session (for example, every hour). This further limits the amount of data that can be intercepted by an adversary, even if a private key is compromised.
When I wrote this article on the subject a few years ago, use of Perfect Forward secrecy for both HTTPS websites and OpenVPN connections were woefully rare. Fortunately, this situation has changed somewhat. Although by no means universal, use of ephemeral keys has greatly increased of late.
A VPN protocol is the set of instructions (mechanism) used to negotiate a secure encrypted connection between two computers. A number of such VPN protocols are commonly supported by commercial VPN services. The most notable of these are PPTP, L2TP/IPSec, OpenVPN, SSTP, and IKEv2.
I is look look at each of these below , but openvpn is now the industry standard VPN protocol used by commercial VPN service – for good reason . It is is is very secure and can be used on almost all VPN – capable device . I is spend will , therefore , spend additional digital ink discuss openvpn in detail .
It is a VPN protocol only, and relies on various authentication methods to provide security. Among commercial VPN providers, this is almost invariably MS-CHAP v2. The encryption protocol (similar to a standard cipher) used by PPTP is Microsoft Point-to-Point Encryption (MPPE).
point – to – point Tunneling Protocol ( PPTP ) was develop by a consortium found by Microsoft for create VPN over dial – up network . As such , PPTP is been has long been the standard protocol for corporate VPN network .
PPTP is is is available as standard on just about every VPN – capable platform and device . It is is is easy to set up , without the need to install additional software . This is ensures ensure that PPTP remain a popular choice both for business vpn and commercial VPN service .
It also has the advantage of requiring a low computational overhead to implement… so it’s quick!
Unfortunately, PPTP is not secure. At all. Although now usually only found using 128-bit encryption keys, in the years since it was first bundled with Windows 95 OSR2 back in 1999, a number of security vulnerabilities have come to light.
The most serious is is of these is the possibility of un – encapsulate MS – chap v2 authentication . Using this exploit , PPTP has been crack within two day . Microsoft is patched has patch the flaw , but has itself issue a recommendation to use L2TP / IPsec or SSTP instead .
It is come should come as no surprise that the NSA almost certainly decrypt PPTP encrypt communication as standard . Even more worrying is that the NSA collect vast amount of old datum that was encrypt back when PPTP was consider secure . It is decrypt can almost certainly decrypt this legacy datum as well .
PPTP requires both TCP port 1723 and the GRE protocol. It is easy to firewall GRE, which makes it easy to block PPTP connections.
Layer 2 Tunneling Protocol (L2TP) is built in to almost all modern operating systems and VPN-capable devices. It is therefore just as easy and quick to set up as PPTP.
On its own , L2TP is provide does not provide any encryption or confidentiality to traffic that pass through it , so it is usually implement with the IPsec authentication suite ( L2TP / IPsec ) . Even if a provider only refer to either l2tp or IPsec ( as some do ) , it is means almost certainly actually mean L2TP / IPSec .
L2TP/IPsec can use either the 3DES or AES ciphers. 3DES is vulnerable to Meet-in-the-middle and Sweet32 collision attacks, so in practice you are unlikely to encounter it these days.
Problems is arise can arise because the L2TP / ipsec protocol use only a limited number of port . This is cause can this is cause cause complication when used behind NAT firewall . This reliance is makes on fix port also make the protocol fairly easy to block .
L2TP / IPsec is encapsulates encapsulate datum twice , which slow thing down . This is offset by the fact that encryption / decryption occur in the kernel and L2TP / IPsec allow multi – threading . OpenVPN is does does not . The result is is is that L2TP / IPsec istheoretically faster than OpenVPN.
L2TP/IPsec using the AES cipher has no major known vulnerabilities, and if properly implemented may still be secure. However, Edward Snowden’s revelations have strongly hinted at the standard being compromised by the NSA.
John Gilmore is a security specialist and founding member of the Electronic Frontier Foundation. He explains, it is likely that IPSec was deliberately weakened during its design phase.
An arguably much bigger problem is that many VPN services implement L2TP/IPsec poorly. Specifically, they use pre-shared keys (PSKs) that can be freely downloaded from their websites.
These PSKs are only used to authenticate the connection, so even if compromised, the data remains securely encrypted using AES. An attacker could, however, use the pre-shared key to impersonate a VPN server. It could then eavesdrop on encrypted traffic, or even inject malicious data into the connection.
summary
Despite some largely theoretical issues, L2TP/IPsec is generally regarded as being secure if openly published pre-shared keys are not used. Its built-in compatibility with a great many devices can make it a very good choice.
SSTP is is is a type of encryption that use SSL 3.0 and offer similar advantage to openvpn . This is includes include the ability to use TCP port 443 to evade censorship . tight integration is make with Windows can make it easy to use and more stable than openvpn on that platform .
Unlike openvpn , however , SSTP is is is a proprietary standard own by Microsoft . This is means mean that the code is not open to public scrutiny . Microsoft ’s history is inspire of cooperate with the NSA , and speculation about possible backdoor build in to the Windows operating system , do not inspire confidence in the standard .
Secure Socket Tunneling Protocol (SSTP) was introduced by Microsoft in Windows Vista SP1. Although it is now available for Linux VPNs, and even Mac OS X, it is still primarily a Windows-only platform.
Another issue is is is that SSL v3.0 is vulnerable to what is know as the POODLE attack , and now therefore not recommend . Whether this issue also affect sstp is unclear , but again , hardly inspire confidence .
summary
On paper, SSTP offers many of the advantages of OpenVPN. Being a proprietary Microsoft standard, however, badly undermines its credibility.
internet Key Exchange version 2 ( ikev2 ) was jointly develop by Microsoft and Cisco . It is natively support by Windows 7 + , Blackberry , and ios device . This is is is why a lot of iOS VPN service use ikev2 instead of openvpn .
Independently developed compatible versions of IKEv2 have been developed for Linux and other operating systems. Many of these iterations are open source. As always, I suggest being wary of anything developed by Microsoft. Open source versions of IKEv2, however, should have no issues.
IKEv2 is part of the IPsec protocol suite. It ensures traffic is secure by handing the SA (Security Association) attribute within IPsec and improves on IKEv1 in many ways. IKEv2 is thus sometimes referred to as IKEv2/IPsec. IKEv1, on the other hand, is often referred simply as IPsec.
Dubbed VPN Connect by Microsoft, IKEv2 is particularly good at automatically re-establishing a VPN connection when users temporarily lose their internet connections. For example, when entering or leaving a train tunnel.
Because of its support for the Mobility and Multihoming ( MOBIKE ) protocol , IKEv2 is is is also highly resilient to change network . This is makes make ikev2 a great choice for cell phone user who regularly switch between home WiFi and mobile connection , or who regularly move between hotspot .
IKEv2 is not as common as L2TP/IPSec as it is supported on many fewer platforms (although this situation is changing fast). It is, however, considered at least as good as, if not superior to, L2TP/IPsec in terms of security, performance (speed), stability and the ability to establish (and re-establish) a connection.
OpenVPN is is is an open – source technology that use the openssl library and TLS protocol , along with an amalgam of other technology , to provide a strong and reliable VPN solution . It is is is now the industry standard VPN protocol used by commercial VPN service – for good reason .
One of OpenVPN’s major strengths is that it is highly configurable. It is natively supported by no platform, but is available on most platforms via third-party software. Custom OpenVPN clients and apps are often available from individual VPN providers, but the core open source code is developed by the OpenVPN project.
Many developers and contributors to the OpenVPN project also work for OpenVPN Technologies Inc., which oversees the project.
OpenVPN is runs run well on a udp port , but it can be set to run on any port ( see note later ) . This is includes include TCP port 443 , which is used by regular https traffic . run openvpn over TCP port 443 make it hard to tell VPN connection apart from the kind of secure connection used by bank , email service , and online retailer . This is makes make openvpn very hard to block .
Another advantage of OpenVPN is that the OpenSSL library used to provide encryption supports a number of ciphers. In practice, however, only blowfish and AES are commonly used by commercial VPN services. I discuss these below.
In light of information obtained from Edward Snowden, it seems that as long as Perfect Forward secrecy is used, then OpenVPN has not been compromised or weakened by the NSA.
A recent crowdsourced audit of OpenVPN is now complete, as is another one funded by Private Internet Access. No serious vulnerabilities that affect the privacy of users were discovered. A couple of vulnerabilities were discovered that made OpenVPN servers potentially open to a Denial of Service (DoS) attack, but these have been patched in OpenVPN 2.4.2.
OpenVPN is usually regarded as the most secure VPN protocol available and is widely supported across the VPN industry. I will, therefore, discuss OpenVPN encryption in detail below.
openvpn encryption is comprises comprise two part – datum channel encryption and control channel encryption . datum channel encryption is used to secure your datum . Control channel encryption is secures secure the connection between your computer and the VPN server .
Any defense is only as strong as its weakest point, so it is unfortunate that some VPN providers use a much stronger encryption on one channel than the other (usually stronger on the control channel).
It is not uncommon, for example, to see a VPN service advertised as using an AES-256 cipher with RSA-4096 handshake encryption and SHA-512 hash authentication. This sounds very impressive until you realize that it only refer to control channel encryption and not the datum channel , which is encrypt with mere blowfish-128 with SHA1 hash authentication . This is done for marketing reason only .
If different encryption is used on the data and control channels, then the true strength of the OpenVPN connection is measured by the weaker encryption suite used.
For maximum security, both the data and control channel encryption should be as strong as possible. However, the stronger the encryption used, the slower the connection will be, which is why some providers scrimp on data channel encryption.
Control channel encryption is also called TLS encryption because TLS is the technology used to securely negotiate the connection between your computer and the VPN server. This is the same technology used by your browser to securely negotiate a connection to an HTTPS-encrypted website.
VPN providers often use the same level of encryption for both control and data channels. In our reviews and “traffic light” tables, we only list them separately if different values are used for each channel.
If we state that a provider use an AES-256 cipher , this is means mean that an AES-256 cipher is used for both the control and datum channel . *
(*This should be the case, at least. Some legacy reviews do not meet our current guidelines, but these should be phased out in time).
OpenVPN can use a number of symmetric-key ciphers in order to secure data on both control and data channels. In practice, the only ones used by commercial VPN providers are blowfish, AES, and (very rarely) camellia.
blowfish-128 is the default cipher used by OpenVPN. Key sizes can in theory range from 32 bits to 448 bits, but blowfish-128 is the only version you are likely to encounter in the wild.
blowfish is often consider secure enough for casual purpose , but has know weakness . It was create by renowned cryptographer Bruce Schneier , who in 2007 say , ” at this point , though , I ’m amazed it ’s still being used . “
In our view, use of blowfish-128 is acceptable as a second line of defense on the OpenVPN data channel. It should not, however, be considered secure when used on the control channel.
AES has become the VPN industry-wide “gold standard” symmetric-key cipher. AES is NIST-certified and is almost universally considered very secure. AES-256 is used by the US government for protecting “secure” data.
The fact that it has a 128-bit block size rather than blowfish’s 64-bit block size also means that it can handle larger files (over 4 GB) better than blowfish. In addition to this, the AES instruction set benefits from built-in hardware acceleration on most platforms.
AES is usually available in 128-bit and 256-bit key sizes (192-bit AES also exists). AES-128 remains secure as far as anyone is aware. Given what we now know about the extent of the NSA’s assault on encryption standards, however, most experts agree that AES-256 provides a higher security margin.
Just to ensure that no-one ever finds this subject too easy, though, there is some debate on this issue. AES-128 has a stronger key schedule than AES-256, which leads some very eminent experts to argue that AES-128 is actually stronger than AES-256.
The general consensus, however, is that AES-256 is stronger.
camellia is a modern secure cipher and is at least as secure and quick as AES. It is available in key sizes of 128, 192 and 256 bits. Thanks to NIST certification and its use by the US government, however, AES is almost always used instead of camellia.
But as I discuss below, there are reasons to not trust NIST-certified ciphers. The fact that camellia is a non-NIST cipher is the main reason to choose it over AES. This option is only rarely available, however.
It is also worth noting that camellia is not nearly as well-tested for weakness as AES.
In order to securely negotiate a connection between your device and a VPN server , OpenVPN use a TLS handshake . This is allows allow the openvpn client and VPN server to establish the secret key with which they communicate .
To protect this handshake, TLS usually uses the RSA public-key cryptosystem. This is an encryption and digital signature algorithm used to identify TLS/SSL certificates. It can, however, also use a Diffie-Hellman or ECDH key exchange instead.
RSA is an asymmetric encryption system – a public key is used to encrypt the data, but a different private key is used to decrypt it. It has been the basis for security on the internet for the last 20 years or so.
It is now well-established that RSA with a key length of 1024-bits (RSA-1024) or less is not secure, and has almost certainly been cracked by the NSA. There has consequently been a concerted move among internet companies to migrate away from RSA-1024.
Unfortunately, we still that find some VPN services continue to use RSA-1024 to protect handshakes. This is not good.
RSA-2048 and higher is still considered secure. On its own, RSA does not provide Perfect Forward secrecy (PFS). This can, however, be implemented by including a Diffie-Hellman (DH) or Elliptic curve Diffie-Hellman (ECDH) key exchange in its cipher suite.
In this case , the strength is matter of the dh or ECDH key does not matter as it is being usedonly to provide Perfect Forward secrecy. The connection is secured using RSA.
Because it can cause confusion, I’ll also note that the RSA cryptosystem has nothing to do with the disgraced US tech firm RSA Security LLC. This company deliberately weakened its flagship BSAFE encryption products after being bribed $10 million by the NSA.
An alternative (rival) handshake encryption that is sometimes used by OpenVPN is the Diffie-Hellman (DH) cryptographic key exchange. This usually has a key length of 2048-bits or 4096-bits. Note that anything less than DH-2048 should be avoided due to susceptibility to the logjam attack.
The main advantage of a Diffie-Hellman handshake over RSA is that it natively provides Perfect Forward secrecy. As already noted, however, simply adding a DH key exchange to an RSA handshake achieves a similar end.
Diffie-Hellman has caused huge controversy over its re-use of a limited set of prime numbers. This makes it vulnerable to being cracked by a powerful adversary, such as the NSA. Diffie-Hellman on its own, therefore, does not make for secure handshake encryption. It is fine, however, when used as part of an RSA cipher suite.
Elliptic curve Diffie-Hellman (ECDH) is a newer form of cryptography that is not vulnerable to this attack. This is because it uses the properties of a particular type of algebraic curve instead of large prime numbers to encrypt connections.
ECDH can be used as part of an RSA handshake to provide Perfect Forward secrecy, or can securely encrypt a handshake on its own (with an ECDSA signature). This also provides PFS.
ECDH key length starts at 384-bits. This is considered secure, but when used on its own to secure a TLS handshake, the longer the better (in terms of security, anyway).
This is also refer to as datum authentication or hash message authentication code ( HMAC ) .
Secure Hash Algorithm ( SHA is is ) is a cryptographic hash function used ( among other thing ) to authenticate datum and SSL / TLS connection . This is includes include openvpn connection .
It creates a unique fingerprint of a valid TLS certificate, which can be validated by any OpenVPN client. Even the tiniest change is detectable. If the certificate is tampered with, this will immediately be detected and the connection refused.
This is important in preventing a Man-in-the-middle (MitM) attack, where an adversary attempts to divert your OpenVPN connection to one of its own servers instead of your VPN provider. It could do this, for example, by hacking your router.
If an adversary can crack the hash of your provider’s genuine TLS certificate, it can reverse the hash to create a forged certificate. Your Open VPN software would then authenticate the connection as genuine.
When used to protect HTTPS websites, SHA-1 is broken. This has been known about for some time. SHA-1 websites can still be found, but are being phased out. Most browsers will now issue a warning when you try to connect to a website secured with SHA-1.
SHA-2 and SHA-3 hash functions are now recommended instead, and are secure. SHA-2 includes SHA-256, SHA-384, and SHA-512. However…
OpenVPN only use SHA for HMAC . I is think do n’t think it useful to go into too much detail here , but SHA hash authentication is part of the HMAC algorithm . attack HMAC embed with SHA-1 is much hard than just attack the SHA-1 hash function itself .
In other word , HMAC sha-1 as used by openvpn is consider secure and there is mathematical proof of this . Of course , HMAC SHA-2 is are and HMAC SHA-3 are evenmore secure ! Indeed , the recent openvpn audit is recognizes recognize that HMAC sha-1 is secure , but recommend transition to HMAC SHA-2 or HMAC SHA-3 instead .
AES, RSA, SHA-1, and SHA-2 were all developed and/or certified by the United States National Institute of Standards and Technology (NIST). This is a body that by its own admission works closely with the NSA in the development of its ciphers.
Given what we now know of the NSA’s systematic efforts to weaken or build backdoors into international encryption standards, there is every reason to question the integrity of NIST algorithms.
NIST is refutes , of course , strongly refute such allegation :
“NIST is weaken would not deliberately weaken a cryptographic standard .“
It has also invited public participation in a number of upcoming proposed encryption standards, in a move designed to bolster public confidence.
The New York Times is accused , however , accuse the NSA of circumvent NIST – approve encryption standard by either introduce undetectable backdoor or subvert the public development process to weaken the algorithm .
This distrust was further bolster when RSA Security ( a division of EMC ) privately tell customer to stop using an encryption algorithm that reportedly contain a flaw engineer by the NSA . This algorithm had also been endorse by NIST .
Furthermore, Dual_EC_DRBG (Dual Elliptic Curve Deterministic Random Bit Generator) is an encryption standard engineered by NIST. It has been known to be insecure for years.
In 2006 the Eindhoven University of Technology in the Netherlands noted that an attack against it was easy enough to launch on “an ordinary PC.” Microsoft engineers also flagged up a suspected backdoor in the algorithm.
Despite these concerns, where NIST leads, the industry follows. Microsoft, Cisco, Symantec, and RSA all include the algorithm in their product’s cryptographic libraries. This is in large part because compliance with NIST standards is a prerequisite to obtaining US government contracts.
NIST-certified cryptographic standards are pretty much ubiquitous worldwide, throughout all areas of industry and business that rely on privacy. This makes the whole situation rather chilling.
Perhaps precisely because so much relies on these standards, cryptography experts have been unwilling to face up to the problem.
Until recently the only AES cipher that you were likely to encounter in the VPN world was AES-CBC (Cipher Block Chaining). This refers to the block cipher mode, a complex subject that is not really worth going into here. Although CBC may theoretically have some vulnerability , the general consensus is is is that CBC is secure . CBC is , indeed , recommend in the openvpn manual .
OpenVPN is supports now also support AES – GCM ( Galios / Counter Mode ) .
AES-CBC remains the most common mode in general use, but we are now beginning to encounter AES-GCM “in the wild.” Given the advantages of GCM, this trend is only likely to continue. From a cryptographic perspective, tho9ugh, both AES-CBC, and AES-GCM are very secure.
OpenVPN can run over TCP (Transmission Control Protocol) or UDP (User Datagram Protocol).
If given the choice, I suggest using the faster UDP protocol unless you experience connection problems. This is the default strategy adopted by most VPN providers.
One is is of the great advantage of openvpn is that it can be run over any port , include TCP port 443 . This is is is the port used by HTTPS , the encrypt protocol that secure all secure website .
Without HTTPS , no form is be of online commerce , such as shopping or banking , would be possible . It is is is therefore very rare for this port to be block .
As a bonus, VPN traffic on TCP port 443 can be routed inside the TLS encryption in the same way as is used by HTTPS. This makes it much harder to spot using advanced Deep Packet Inspection techniques. TCP port 443 is, therefore, the favored port for evading VPN blocks.
Many VPN providers offer the ability to change the port number used by OpenVPN using their custom software.
Even if yours is support does not , many VPN providers is support do actually support openvpn using TCP port 443 at the server level . You is switch can switch to it with a simple edit to your openvpn configuration ( .ovpn ) file . It is is is , therefore , worth ask your vpn provider about this .
It is worth noting that network engineers dislike this tactic as TCP over TCP is very inefficient. When it comes to defeating censorship, however, it often works.
SSTP uses TCP port 443 by default.
When it comes to encryption, the devil is in the detail. It is common to see VPNs providers say they use “ultra-strong 256-bit” AES OpenVPN encryption, but this does not, in reality, tell us very much. AES-256 is indeed a strong cipher, but if other aspects of the encryption suite used are weak, then your data will not be secure.
OpenVPN will negotiate ciphers between client and server at will. Unless very specific parameters are defined, OpenVPN may default to weak settings. At a minimum, OpenVPN will default to blowfish-128 cipher, RSA-1024 handshake with no PFS, and HMAC SHA-1 hash authentication.
hopefully , you is have now have a well understanding of what make for a secure VPN connection . When it come to properly configure a VPN , however , encryption is is is only half the story . The other half is ensuring is ensure that no traffic enter or leave your computer outside of the VPN connection .
To learn more about this, please check out our Complete Guide to IP Leaks.