<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class="">Hi Robert,<div class=""><br class=""></div><div class="">Thank you for coming back to me. I have a client who is pushing for VDI (HTTPS) instead of VPN (IPSEC) and I’m wondering whether there is a security standpoint I can argue or if its just as secure. I am also limited to the native OSX/Windows VPN clients which currently support a maximum of aes256-sha256-prfsha256-ecp256-modp2048 (Windows does not support ecp)</div><div class=""><br class=""></div><div class="">Apart from IPSEC being Layer 3 and HTTP being Layer 6, meaning that should a VPN client be infected with a worm, it is easier for that worm to infect the network, I’m struggling to see another security argument.</div><div class=""><br class=""></div><div class="">Data encrypted over RSA 4096 SHA-2 on paper seems a secure connection. Whereas IKE also uses a certificate to do the KeyExchange before logging in and then encrypting the data with ESP, so the ciphers used on ESP I feel is the comparison that needs to be made.</div><div class=""><br class=""></div><div class="">I will have a read of that Cipher suites page, but if I remember correctly, it is not a comparison but a standpoint.</div><div class=""><br class=""></div><div class="">C<br class=""><div><br class=""><blockquote type="cite" class=""><div class="">On 19 Jul 2018, at 05:51, Robert Leonard <<a href="mailto:rjlcontracting@gmail.com" class="">rjlcontracting@gmail.com</a>> wrote:</div><br class="Apple-interchange-newline"><div class=""><div dir="ltr" class="">I don't really know where to start with this article. It appears to be sponsored by OpenVPN, and is written from the perspective of a home user, not a security standpoint. I<div class="">I would suggest taking a look at the documentation for the Cipher suites rather than taking this article at face value.</div><div class=""><br class=""></div><div class=""><a href="https://wiki.strongswan.org/projects/strongswan/wiki/IKEv2CipherSuites" class="">https://wiki.strongswan.org/projects/strongswan/wiki/IKEv2CipherSuites</a><br class=""></div><div class=""><br class=""></div><div class="">Most importantly, what is your use case? </div><div class=""><br class=""></div><div class=""><br class=""></div></div><br class=""><div class="gmail_quote"><div dir="ltr" class="">On Wed, Jul 18, 2018 at 6:23 PM Christian Salway <<a href="mailto:christian.salway@naimuri.com" class="">christian.salway@naimuri.com</a>> wrote:<br class=""></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word;line-break:after-white-space" class="">I was just doing some research focusing on the security of the data over a VPN connection - and the chap in the following link has marked OpenVPN, which uses RSA, as being more secure than IKEv2 IPSEC<div class=""><br class=""></div><div class=""><a href="https://thebestvpn.com/pptp-l2tp-openvpn-sstp-ikev2-protocols/" target="_blank" class="">https://thebestvpn.com/pptp-l2tp-openvpn-sstp-ikev2-protocols/</a></div><div class=""><br class=""></div><div class="">So my question is, in your opinion, do you rate IKEv2 IPSEC more secure than an RSA encrypted VPN like OpenVPN</div></div></blockquote></div><br clear="all" class=""><div class=""><br class=""></div>-- <br class=""><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr" class=""><div class="">Rob Leonard<br class="">RJL Contracting<br class="">Cell: (248) 403 4817<br class="">E-Mail: <a href="mailto:rjlcontracting@gmail.com" target="_blank" class="">rjlcontracting@gmail.com</a></div></div></div>
</div></blockquote></div><br class=""></div></body></html>