Am 17.08.2013 12:30, schrieb Gert Doering:

> So, what I'm hoping to hear from you...
> 
>  - should we include this in 2.3.3?
>     - if yes, are changes needed?

Well, it would take huge warning banners because it might disrupt
existing setups (which would be insecure through the "connect around
tunnel" behaviour), so I'd prefer "2.4" with a sooner 2.4 release.

>  - should we try to implement something for 2.4/master that will work 
>    by pointing the IPv6 routes into the tunnel, and then synthesize the
>    IPv6 ICMP errors inside OpenVPN?  That would work on Android and iOS
>    as well, and remove the extra per-platform logic for the "reject" routes

Absolutely, on both accounts, if technically feasible.  You may need to
synthesize RST for stale TCP sockets, and ICMP for UDP, too.

>  - any clever ideas how to achieve "full" IPv6 blocking (right now, it only
>    kills the default route, but all more specific routes continue working -
>    this is by design to keep the implementation simple, and was considered
>    "good enough" by the end customer asking for it)

End users may also have requirements to override certain more specific
routes to bypass the tunnel.  I can fancy only few things that are
worse than flipping global connection status "with/without VPN" every
few minutes if you need host and "home" resources at the same time.

Use case is for guests in a "host" LAN that need the VPN for the default
route and "home" networks, but need to access local organizer (host)
information, too. And very common during symposiums, conferences, and
thereabouts.

Like: you visit another place, and you need access to the journals of
your home university, but at the same time the organizer uploaded
documents for collaborative work or you need local public transport
schedules.

I found myself using the "permit local specific routes" switch quite
often to avoid dis-/reconnecting all the time.  That was with "all
IPv4", however.


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to