-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 24/09/14 10:15, Gert Doering wrote:
>> But to get to the point, that if I setup openvpn on my droplet
>> and let's say an evil admin sniffing my traffic for 3 months with
>> tcpdump then decides to decrypt that traffic what tools does he
>> have (if any to do this). At this point he has a pcap file and
>> the openvpn server certificates and keys.
> 
> Now that is easy - OpenVPN does PFS, so the stored keys won't help
> decrypt sniffed session traffic.

If an attacker have sniffed the complete handshake and is in
possession of the keys, I believe it is a theoretical possibility to
compromise the key exchange handshake.  Which again gives you the
access to the tunnel data.  If the attacker in addition have access to
client keys, then this process goes even faster.  But it is correct
that you don't get the raw key out of the handshake.

- -- 
kind regards,

David Sommerseth
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlQigC0ACgkQDC186MBRfrrwGwCbBxX3NGm6CqsaHTSdJjO+gRqS
8HsAmwet8HLyrGFnEQUuHml/y62/wxvI
=flwL
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to