Functionalities of MyCrypNet.
If you want the technical informations for MyCrypNet, take a look here.
The client software needs the following files:
- a key/certificate duo (vpn.key/vpn.cert) signed with our certification authority set for OpenVPN, it is specific to each subscribed MyCrypNet access. It is a SSL compatible format working with the asymmetric algorithm RSA.
- A configuration file (MyCrypNet.conf or MyCrypNet.ovpn), common to all users and client softwares but different according to operating systems (Mac OS®, Windows®, Android™, IOS®, Linux®). This file contains a dissipation key that acts against DDOS attacks. It also contains the public certificate of our certification authority, common to all clients and the server, also based on RSA. The key corresponding to that certificate is stored protected and never communicated to the rest of the infrastructure, it is used to sign clients and servers certificates.
Handshake (authentication and session)
This process provides the opening of a VPN session or the renegotiation of it, at least per hour.
- The client software sends a packet with TLS headers signed with the dissipation key to the server trying to connect (SSL/TLS authentication).
- The server accepts or rejects it according to the validity of the dissipation key signature, reducing DDOS attacks risks. The TLS headers being light to generate, it provides a performant first authentication.
- The client software sends its certificate to the server.
- The server checks the certificate signature comparing it to the public certificate of the certification authority that it possesses and a crl (certificate revocation list) generated by the certification authority (currently internal but publishable in the future in order to invalidate servers with the client software).
- If the signature is right, the server sends its certificate to the client software.
- The client software checks the certificate signature by comparing with the public certificate of the certification authority it possesses (the crl will come later).
- If the signature is right, the client software and the server are sure on their mutual identities (as long as they trust the certification authority).
- The encryption and signature checks by asymmetric key are heavy to calculate compared to the encryption by symmetric key and signature by hash. We generate a HMAC containing a session symmetric key and a hash. The Diffie Hellman protocol is used to generate that HMAC without communicating it:
- the client software sends a public base C to the server, a public prime number and a public part calculated from this base, this prime number and a secret c.
- the server sends to the client software a public part S calculated from the base and the prime number sent by the client software and a secret s.
- secrets from the client software and the server did not transit through the network. S*c = C*s = HMAC (working with the symmetric algorithm AES variant GCM for the key and SHA384 for the hash).
- The conversation starts.
This process provides the packets encryption during a VPN session.
- The client software sends an encrypted packet with the session symmetric key to the server and signed with the hash.
- If the packet has to go on Internet by an exit node, the server decrypts the packet with the session symmetric key, checks the origin and the integrity with the hash and processes it.
- The server encrypts the answer from Internet coming to the exit node.
- The client software decrypts the answer with the session symmetric key. It checks the origin and the integrity with the hash.
Cryptographic algorithms used
- AES (Wikipedia): Symmetric algorithm. Provides communication performance compared to RSA.
- GCM variant (Wikipedia): this variant from AES provides both data authenticity (integrity) and confidentiality..
- Length: 256 bits.
- RSA (Wikipedia): Asymmetric algorithm. Provides the signatures check so the parties identity check.
- Length: 4096 bits.
- DH (Wikipedia): Protocol. Ensures the generation of a symmetric key without communicating secret elements through the network. In conjunction with RSA, it provides a resistance against “man in the middle attacks” (Wikipedia) (someone cannot put himself on the middle of the communication faking each of the parties identity to the other), because RSA signs exchanges ensuring the identity of both parties. Being done every hour, it ensures a perfect forward secrecy (Wikipedia) (the previous symmetric key being destroyed, an attacker who would be able to possess secret elements of a session can not use them for next sessions).
- SHA384 (Wikipedia): Hash algorithm. Provides signatures check faster than an asymmetric algorithm. It provides check of packets integrity.
- Length: 384 bits.
- HMAC (Wikipedia): Protocol. It is used for packets encapsulation. It also provides SSL/TLS packets signature with the dissipation key reducing DDOS risks.
- Variant: Composition of SHA384 and AES-256-GCM.
Other systems used
- OpenVPN (Wikipedia): Open source software used to create the MyCrypNet network. It implements communication protocols quoted above (authentication, session and conversation).
- OpenSSL (Wikipedia): Open source library used by OpenVPN. It provides the implementation of the algorithms quoted above and needed by the OpenVPN protocols.
Create your secure network
A MyCrypNet network is made of MyCrypNet accesses installed on different devices.
The MyCrypNet accesses identify the devices on the MyCrypNet network.
A devices can have several accesses. It can be used by several users with, each, his(her) own MyCrypNet access for him(her) alone. But also, a common access can be installed on the device, available for all the users of the device.
Accesses in a MyCrypNet network can be delegated.
How to install MyCrypNet
Here are the tutorials allowing to install a MyCrypNet access on the main operating systems:
If you want to adapt the accesses configuration to particular networks constraints (firewalls, routers…) You can edit the configurations with the help of the following tutorials:
If you want to delegate parts of your MyCrypNet network, here is the tutorial showing you how to do:
And here is the tutorial with the provided options to the delegated:
If you want to detach completely an access from the network, isolate it from its network to use it as a simple anonymous tunnel, here is the tutorial:
If one of your devices is compromised, lost or stolen, it is strongly recommended to revoke the access installed on it to avoid a potential intrusion on the network.
Here is the revocation tutorial:
If you want to reinforce, even more, the access security, you can add a two-factor authentication to it:
Also, if you want to reinforce the accesses management interface (available on Limawi) and your payment informations handled by Limawi as well, you can add a two-factor authentication too: