On 12/2/10 4:16 AM, Paul Hill wrote:
> On Wed, Dec 1, 2010 at 11:17 PM, Paul McNett<[email protected]>  wrote:
>> Some vpn clients tweak the default route to be over the VPN, but I think 
>> that is
>> silly unless the workstation is supposed to be totally locked down by the 
>> company's
>> network.
>
> The problem with not tweaking the default route is that it opens up a
> security hole into your network.
> If a compromised PC connects to your VPN then your internal network is
> also compromised,
> making your expensive firewall useless...

Well, you have to be very careful about what ports you allow over the VPN. For 
instance, most of my VPNs only allow SSH (port 22) and vnc (5900).

In a couple instances, people have needed (shudder) access to a windows share 
from 
home, so I had to enable (shudder) ports 137-139. But I enabled it only for 
them, and 
disabled their $IPC access completely.

But common ports like 80 are explicitly disabled over the vpn.

You already open a security hole by putting remote systems on vpn. Properly 
mitigated, I don't see how not redirecting the default route is any less secure.

Paul


_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to