Right, the issue he has is with @trevp__ 's NoiseIK -- https://noiseprotocol.org/noise.pdf Notably the only security analysis done on other aspects of the WireGuard protocol -- such as the Cookies and defense-in-depth design -- has been in the original NDSS paper.
I'm pretty sure the comparison here to TLS is ridiculous. The proofs we currently _already have_ of WireGuard put it leagues beyond issues found in TLS.
-
-
Because we have twenty years of seeing how TLS did it wrong to learn from. I thought one of the lessons we learned was to structure protocols for easier cryptographic analysis.
-
And Noise does quite a bit differently from TLS. WireGuard itself is designed to specifically not be TLS. We've indeed learned tons from the failings of TLS and brought those lessons into Noise and into WireGuard. The comparison to TLS here just isn't a good one.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.