Split-tunnelling always has a risk. 

Consider this "secure" scenario:-

1. You ensure that IP packets from the Internet *cannot* be forwarded to
the Office network (and vice versa). 
2. You deny all traffic except
   a. You allow application A to connect to (say) port 80 on the
Internet
   b. You allow application B to connect to (say) port 80 on the Office
network

This sounds secure, however, can you guarantee that:-

1. Application A is in fact Application A (and not some trojan), and of
course App B is App B?

OR 

2. Trojan application T isn't somehow using creating covert channel
between the Internet and the Office by effectively manipulating
information from application B to drive application A (or vice versa)?

If you can't ensure this, then you will be at risk.

I know I am exaggerating to the extreme, but this is the reason why
split-tunneling is insecure, even if you are fairly careful about
routing at the IP layer, it is very diffcult to prevent application
level interaction. (That being said I imagine today people using
split-tunneling have never had a security attack, as they are unlikely
to have a trojan this smart.) 

Martin Visser ,CISSP
Network and Security Consultant 
Technology & Infrastructure - Consulting & Integration
HP Services

3 Richardson Place 
North Ryde, Sydney NSW 2113, Australia 
Phone *: +61-2-9022-1670    Mobile *: +61-411-254-513
   Fax 7: +61-2-9022-1800     E-mail * : martin.visserAThp.com



-----Original Message-----
From: Stewart [mailto:[EMAIL PROTECTED] 
Sent: Thursday, 29 May 2003 12:07 PM
To: [EMAIL PROTECTED]
Subject: Fwd: [SLUG] VPN security issue


i forwarded that link to a network admin friend of mine who has this to 
say fyi:

> It doesn't have to be insecure, it just requires careful setup to
> ensure
> that incoming from the internet is controlled (ie not allowed, or 
> allowed
> in a completely accountable way) and that there is no capacity for 
> traffic
> to cross the two nets: internet <-> tunnel
>
> The vpn product that *** offer uses a cisco client and disables 
> split-tunnelling. It cannot be worked around as the the client has
> no local config. Start the client and it downloads its config from the
> server, which cannot be changed without restarting the client...

sounds like a good way of doing it.

..S.

-- 
SLUG - Sydney Linux User's Group - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug
--
SLUG - Sydney Linux User's Group - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug

Reply via email to