Hi,

On Wed, Dec 09, 2015 at 04:03:37PM -0500, Jonathan K. Bullard wrote:
> Inspired by Gert Doering (but don't blame him for any of my bad ideas
> : ), I'm considering adding a feature to Tunnelblick (a FOSS GUI for
> OpenVPN on OS X) that would allow a standard user on a Mac to install
> "safe" OpenVPN client configurations without requiring administrator
> credentials. 

Obviously, I would like this :-) (sorry for never replying to the other
mail reply you sent on my original query) - but I can see that there are
caveats.

A few thoughts on this:

 - I think that this should be enabled by the administrator on Tunnelblick
   install - so, some shops would like to have it (us!), while others might
   consider this "total no-go, never!".

 - "iroute" is a server option which controls IP routing inside a 
   point-to-multipoint server, and can only be set by ccd/ or --client-connect,
   so that one is moot

 - "ifconfig" and "route" (and by extention, "ifconfig-ipv6" and "route-ipv6")
   are not needed in *my* deployment scenario, because as you say, they are
   pushed - but then, if I can specify --remote, or control the other side
   of the VPN, I can still generate arbitrary route/ifconfig commands and
   mess up the client's network config.  I do not see a strong security risk
   here, as OpenVPN will not execute arbitrary *commands* here, just set
   potentially disruptive network configs - and if someone does not want 
   a user sending traffic into a tunnel, they need to ensure that the server
   firewalls it.  So the biggest risk is "a user shooting himself in the foot"
 

In the long run, a totally different approach to this might be what 
NetworkManager is doing under Linux and what we plan for the iService on
Windows - OpenVPN is run with user-privileges (so --up etc. cannot do 
more harm than the user could do from a terminal window), and the privileged
operations (ifconfig, route) are done by a plugin / --up script / via
a service pipe.  I don't know the specifics how NetworkManager is doing it,
but I can find out.


As a matter of reference, this is how "our" configs look like, which should
be fairly typical client-side stuff:

-------------------------------------------------------
client
nobind
dev tun
proto udp
remote mysecretvpnserver.corporate.domain
ns-cert-type server
comp-lzo
auth-nocache
auth-retry interact
reneg-sec 43200
auth-user-pass
<ca>
...
</ca>
<cert>
...
</cert>
<key>
...
</key>
-------------------------------------------------------

(inline cert is what got this all started - user certs are renewed yearly,
and since half of them are not really able to understand "move this .p12
file to where you stored last one's and where your OpenVPN config is
referencing it" but they *do* understand "click on this link to your new
.ovpn file and have Tunnelblick import it"...)

gert

-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: signature.asc
Description: PGP signature

------------------------------------------------------------------------------
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to