Hi,

On Sun, May 15, 2016 at 11:11:06AM +0200, Chris Laif wrote:
[..]
> > Or just not using --pull at all, and statically configuring --ifconfig
> > and --route according to your needs.
> >
> > To some extent, you have to trust the VPN server anyway - you're sending
> > your IP packets there, and after decryption, the server can see them in
> > the plain.  By virtue of its certificate, the server shows itself to be
> > trusted (for some definition of trust).
> 
> I agree with you that we have to trust the VPN with the data/pakets we
> send to the other endpoint.
> 
> My problem is, that the remote administrator might 'inject' arbitrary
> IP addresses/networks conflicting with my existing (local) network. He
> might do this by malicious intent or even by accident (renumbering his
> network, overlapping with other networks on our side). In our current
> setup, we have a 'VPN hub' connecting to 10+ partner networks. If any
> of the partners changes his network topology, this might clash with
> other partner networks. And no, unfortunately we can not negotiate
> fixed IP addresses with all of the partners. This is why I vote for
> implementing 'ifconfig-limit' and 'route-limit' statements or some
> other mechanism to protect our setup.

OK, I can see that in your setup (with multiple VPNs connecting to a 
hub, not "just the client") more tight control is desireable.

I'm not promising anything - this is a fairly special-case request, and
we already have sooo many special-case options that tend to get broken
if we change other bits of the code - it should be able to implement
these (route, ifconfig, ipv4 and ipv6) in a way that is not touched
much by other code bits - and maybe we can even come up with a more
general "--pull-option-filter <script>" thing where options get run
through an external script that implements local policy, and returns
only those options that are acceptable, or throws an error if things
cannot go on...

I'd actually prefer the latter (a generic script) because once we have
these four options for your requirements, the next one will show up
and ask for a DHCP filter, and then we'll see something else again.

I'm not going to run out and implement it "right now", though - busy 
with lots of other open ends... - and maybe someone else can beat me
to it, and I just need to review the result :-)


So - to ensure that this is not forgotten: can you put this as a feature
with into our trac on http://community.openvpn.net/openvpn/newticket 
please?   (You need to register and login first)

thanks,

gert

-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: signature.asc
Description: PGP signature

------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to