Yes, that is what I meant: AES-256-CBC instead of AES-128-CBC. Is it possible to set up the OpenVPN server with several different ciphers so that users can choose one, or is that not possible? That way, users with slower computers or routers will be able to choose the cipher that best suits their purposes. Maybe you can give users a choice of different profiles to download.pmbell wrote:there are some limited and rather academic scenarios in which aes-256 is weaker than aes-128!kgc wrote:Are you asking that we change the cipher used from AES-128-CBC to AES-256-CBC? We believe that AES-128-CBC provides a reasonable balance of security in performance, especially when lower-end systems are taking into account.Guest wrote:Could you guys raise the key size to 256?
https://www.schneier.com/blog/archives/ ... w_aes.html
I think it's useful to ask "who is the adversary?" here. in my thinking, for this VPN, att is the adversary and the design is fine - so long as att only sees a static tunnel leaving their network, they're unlikely to be able to do much, as traffic analysis is broken.
if the adversary is the government, nothing I do on a networked computer is secure and I need to be able to go out of band for privacy. traffic analysis is the least of my worries, but I do enjoy making it harder, and running VPN to multiple hosts helps. and the more of us running VPN, the more it helps.
As for your point, pmbell, I believe the "limited and academic" scenario you're talking about is a related key attack. Doesn't this require the attacker to have plaintext? I don't think plaintext will be available for Sonic's adversaries, whoever they might be.
Your point that nothing you do on a networked computer is secure sounds needlessly paranoid. Snowden himself said that properly implemented encryption works: http://techcrunch.com/2013/06/17/encryp ... d-snowden/
That said, my concern is not about the government at all. If they wanted to know what someone was doing on Sonic's VPN, they would simply serve a warrant. Aside from performance issues, however, I see no reason not to use the strongest type of encryption possible. Schneier, the cryptographer you quoted, said in the same article that attacks only get better, never worse.