See below

-----Original Message-----
From: Jochen Bern <jochen.b...@binect.de>
Sent: Friday, September 22, 2023 1:06 AM
To: openvpn-users@lists.sourceforge.net
Subject: Re: [Openvpn-users] URL forwarding and blacklisting

On 21.09.23 21:50, Jason Long via Openvpn-users wrote:
> Hello,I have two questions:1- When someone connects to an OpenVPN
> server, is it possible to be redirected to duckduckgo.com when trying
> to go to google.com?
> 2- How can I block access to certain websites?
> Does OpenVPN offer such features?

You can manipulate traffic that *does* go through the VPN and, thus, your 
server(s) in whatever way *other* soft- and hardware allows you to.
OpenVPN itself does not have any such functionality.

Relevant sidenotes:

a) There are OpenVPN(-protocol) clients that allow the user to override the 
routes the OpenVPN(-software) server sends it, not to mention adding routes 
with more specific prefixes pointing to selected servers (e.g., Google's), and 
also any DNS manipulation can be countered by way of /etc/hosts, so users can 
trivially circumvent your blocks (as long as they're willing to have the 
traffic *not* go through your VPN).

b) As of right now, Google.com's servers have IPv6 addresses, which will be 
preferred in a dual stack setup, so you'll have to add IPv6 to your VPN to even 
stand a chance of intercepting those users' connections to Google.

c) As of right now, DuckDuckGo.com does *not* have IPv6 addresses, so be 
prepared to run a 6-to-4 gateway as well ...

Kind regards,
--
Jochen Bern
Systemingenieur

Binect GmbH

Just  my $0.02 for general discussion....
All of google's machine are capable of doing IPv6 for a long time, they were 
one of the front runners.

Regarding blacklisting: It is hard to do it in a controlled way... (too many 
sideways)
For the clients going through the VPN that you control: you define what 
DNS-servers they use. It’s a parameter pushed from the VPN-server.
You CAN push the ip-addresses of your own DNS-servers, and block all other 
DNS-request with a iptables-rule.
On your own DNS-server, you can declare yourself as "authorative" for the 
unwanted domain.
If you want to completely deny everything, that is doable, but if you want to 
allow some URLS to remain reachable that will become rather labour intensive to 
maintain.

For me, it works right now.
But for details, see the manual pages of IPTABLES and BIND.



Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet 
de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt u 
verzocht dat aan de afzender te melden en het bericht te verwijderen. De Staat 
aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die verband 
houdt met risico's verbonden aan het elektronisch verzenden van berichten.

This message may contain information that is not intended for you. If you are 
not the addressee or if this message was sent to you by mistake, you are 
requested to inform the sender and delete the message. The State accepts no 
liability for damage of any kind resulting from the risks inherent in the 
electronic transmission of messages.

_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to