Skip to content
Cheers,
James
Witopia 256 Bit How To?
Got a problem with Viscosity or need help? Ask here!
I understand that Witopia (whose service I use) have recently enabled 256bit encryption on their servers, and there is a wiki page detailing how to enable this, but for Tunnelblick users:
http://www.wiki.witopia.net/wiki/256_bit_Encryption
Now I'm certainly no tech-head in such matters but am I right in guessing that all I have to do to enable the similar in Viscosity is to change the remote server address to 256vpn.witopia.net in the General tab in preferences and add "cipher AES-256-CBC" under the "Advanced" tab?
Any other changes that I need to make?
While I'm on it, looking through the connections details interface, I sometimes notice the following:
"WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this"
What does this mean, or, how do i make it right?
Thanks in advance from a happy Viscosity user!
http://www.wiki.witopia.net/wiki/256_bit_Encryption
Now I'm certainly no tech-head in such matters but am I right in guessing that all I have to do to enable the similar in Viscosity is to change the remote server address to 256vpn.witopia.net in the General tab in preferences and add "cipher AES-256-CBC" under the "Advanced" tab?
Any other changes that I need to make?
While I'm on it, looking through the connections details interface, I sometimes notice the following:
"WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this"
What does this mean, or, how do i make it right?
Thanks in advance from a happy Viscosity user!
Now I'm certainly no tech-head in such matters but am I right in guessing that all I have to do to enable the similar in Viscosity is to change the remote server address to 256vpn.witopia.net in the General tab in preferences and add "cipher AES-256-CBC" under the "Advanced" tab?Spot on. That is all you should need to do.
What does this mean, or, how do i make it right?It means OpenVPN will store your username and/or password (if you entered any) in memory, so if the VPN connection drops out and reconnects you won't be re-asked for these details. However it does mean that if you are on a multi-user system (other users are logged in as well), it could be a potential security risk. If the other users are malicious and know what they are doing, they may be able to extract your username/password from system memory. In most cases you don't need to worry about this. However if you wish to stop the warning you can add the "auth-nocache" on a new line under the Advanced tab.
Cheers,
James
Web: https://www.sparklabs.com
Support: https://www.sparklabs.com/support
Twitter: https://twitter.com/sparklabs
Support: https://www.sparklabs.com/support
Twitter: https://twitter.com/sparklabs
3 posts
Page 1 of 1