[talk] VPNs: Choosing between OpenVPN and L2TP/IPsec

Christos Zoulas christos at zoulas.com
Sun Apr 19 20:42:09 EDT 2015


On Apr 19,  7:39pm, ike at blackskyresearch.net ("Isaac (.ike) Levy") wrote:
-- Subject: Re: [talk] VPNs: Choosing between OpenVPN and L2TP/IPsec

| Christos, I don't mean to put you on the spot, but I figure you're a
| great person to thoughtfully comment on the relative security of IPSec
| itself these days?
| 
| Problems like these worry me,
| http://www.mail-archive.com/cryptography@metzdowd.com/msg12325.html

I've read this article and I agree with all its points. While I agree,
I don't see many alternatives out there -- you mentioned most of them
(and nobody has published an exploit that I know of).

| To me, it IPSec seems ripe for a very serious design flaw to come to
| light in coming years- and at the least, all the fuss surrounding it-
| and it's relative complexity- bothers me more.

What makes things worse is that the "roadwarrior" configuration
everyone uses utilizes a common shared secret (which makes things
easier to abuse and to break since now you only have to find the
username and password) and also needs a wildcard match since we
don't know a-priori the address of the client endpoint. This is
explained here (ENABLE_WILDCARD_MATCH explanation about shared
secret problems):

    http://www.daemon-systems.org/man/racoon.conf.5.html

I would not feel comfortable deploying that configuration to customer
connections (unless I only had one customer), but this is what I use
for home (where I am the only customer). Others don't seem to mind,
and sell such tunnels for a few bucks a month... It is the ease of
stealing ones credentials from those tunnels that compelled me
to deploy my own.

I think that the OpenVPN solution is easier to deploy. I chose to
use IPSEC+L2TP mostly because I wanted to have a kernel supported,
standards compliant tunnel solution on NetBSD working.

christos



More information about the talk mailing list