Skip to main content
Topic: WireGuard: Next Generation Secure Network Tunnel (Black Hat Presentation) (Read 357 times) previous topic - next topic

WireGuard: Next Generation Secure Network Tunnel (Black Hat Presentation)

WireGuard: Next Generation Secure Network Tunnel (Black Hat Presentation)

Code: [Select]
https://www.youtube.com/watch?v=88GyLoZbDNw

https://www.youtube.com/watch?v=88GyLoZbDNw

The state of VPN protocols is not pretty, with popular options, such as IPsec and OpenVPN, being overwhelmingly complex, with large attack surfaces, using mostly cryptographic designs from the 90s. WireGuard presents a new abuse-resistant and high-performance alternative based on modern cryptography with a focus on implementation and usability simplicity. It uses a 1-RTT handshake, based on NoiseIK, to provide perfect forward secrecy, identify hiding, and resistance to key-compromise impersonation attacks, among other important security properties, as well as high performance transport using ChaCha20Poly1305. A novel IP-binding cookie MAC mechanism is used to prevent against several forms of common denial-of-service attacks, both against the client and server, improving greatly on those of DTLS and IKEv2. Key distribution is handled out-of-band with extremely short Curve25519 points, which can be passed around in the likes of OpenSSH. Discarding the academic layering perfection of IPsec, WireGuard introduces the idea of a "cryptokey routing table", alongside an extremely simple and fully defined timer-state mechanism, to allow for easy and minimal configuration; WireGuard is actually securely deployable in practical settings. In order to rival the performance of IPsec, WireGuard is implemented inside the Linux kernel, but unlike IPsec, it is implemented in less than 4,000 lines of code, making the implementation manageably auditable.

https://www.blackhat.com/us-18/briefings/schedule/#wireguard-next-generation-secure-network-tunnel-11207