On 07/03/12 07:55, Alon Bar-Lev wrote: > 1. Multi user computer - we need to make sure one user cannot use > another user credentials and not effect the other users. With changes > I suggested there is full solution for this.
Is that really a risk worth solving? I mean, does *anyone*, *anywhere* allow *any* form of end-user triggered VPN access from a multi-user machine? I cannot imagine (say) a Windows 2008 terminal server where users have local administrator privileges (huh?!?) and are allowed to create PPTP/L2TP/whatever links at will - it'd be chaos! Here's what I see are the primary use-cases of openvpn (or any software vpn really) 1. Using openvpn as a router. No need to worry about this - as there are no local users 2. I believe anyone using openvpn on multi-user servers should be expected to have set authentication details for the management interface (or not use it at all...). Users wouldn't have admin privilege, so no concerns with stealing creds from memory 3. single-user computers where users have local admin. Malware would be an issue - but would be even with the best privilege separation (can you say "keylogger"?) 4. single-user computers where users don't have local admin. Privilege separation is a must for this scenario Your comments on rogue servers is certainly worth discussing too. What can a rogue openvpn server push back to a client? Routes obviously - but other than screwing the client, is there any new risk? If the client has "pull" enabled, it is implicit that there's the opportunity for the client to find their network access corrupted by bad routes from the server. As the server is meant to be able to push routes to the client, I cannot see how that can ever be remediated (besides disabling "pull" and/or using "route-noexec/route-nopull", etc). However, the server can't tell the client to become a router (therefore opening up the client's internal network to be accessible from the server), nor can it force the client to create local accounts, install software, etc. So what are the actual risks? -- Cheers Jason Haar Information Security Manager, Trimble Navigation Ltd. Phone: +1 408 481 8171 PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1