PIA Not Vulnerable to Weak Diffie-Hellman Key Exchange
Dear Customers,
Thank you for choosing Private Internet Access as your VPN provider. As you may have heard being discussed in the news media recently, new research has suggested that the NSA may be able to intercept certain types of private key exchange used in VPN cryptography. More details can be found in the below article published by the EFF:
We would like to reassure our users that PIA does not use the vulnerable 1024-bit Diffie-Hellman key exchange, as targeted by this attack. All VPN connections to our network use a stronger key exchange (2048-bit for OpenVPN, 1536-bit for our iOS app), and are not affected by this disclosure.
If you have any concerns about this, please feel free to contact PIA support.
Best Regards,
PIA

Comments
Oct 16 16:02:45 openvpn[18748]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Oct 16 16:02:45 openvpn[18748]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Oct 16 16:02:45 openvpn[18748]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Oct 16 16:02:45 openvpn[18748]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA