From: Vladimir A. <vla...@ap...> - 2013-04-02 07:28:07
|
On 04/02/2013 05:07 AM, adrelanos wrote: > Vladimir Arseniev: >>>> I've used it with network-manager-openvpn as VPN client, and it's very >>>> intuitive. But I'm not sure that I'd trust it managing Whonix's internal >>>> network interface. >>> >>> Well, in Whonix-Workstation case in worst case it leaks through Tor. >>> >>> Just expanded that page. >>> >>> Quote https://bugzilla.gnome.org/show_bug.cgi?id=689339#c4 >>> >>>> "*Please also understand that currently networkmanager is not a >>> security tool at >>> all. VPN plugins are regarded as connectivity plugins, not security >>> plugins.*" >>> >>> Missing auto-reconnect feature: >>> https://bugzilla.gnome.org/show_bug.cgi?id=349151 >>> >>> So perhaps using NM to set up VPNs for security isn't a good idea. >>> >>> Doesn't look like it has a fail closed mechanism: >>> https://sourceforge.net/p/whonix/wiki/VPN/#fail-closed-mechanism >> >> It's easy to install shorewall and rules that prevent leaks. See >> https://www.wilderssecurity.com/showthread.php?p=2201706#post2201706 > > I don't think the following rule is very safe. > > # Allow this machine to connect to any server using UDP port 1194 > [change if using TCP or other port] > ACCEPT fw net udp 1194 True. Those rules wouldn't stop a direct attack. But I think that they're good enough for preventing leaks caused by software misconfiguration, remote server failure and so on. I only use VPNs via Tor to access websites that block Tor exits, so the stakes aren't very high. > Finally, I looked into the linux route command and tries to find a > solution for the VPN fail closed mechanism. > > The problem is, once the VPN breaks down, traffic will be send in the > clear (and in Whonix-Workstation case, "only" over Tor). Got started > with the solution... > > Check: > ip route show > > Stop applications which are not using proxy settings from using the > clearnet (or in Whonix-Workstation case, "only-Tor" fallback): > ip route del default via 192.168.0.10 dev eth0 > > If you want to undo it: > ip route add default via 192.168.0.10 dev eth0 > (or reboot) > > Perhaps adding a up script to configfile.openvpn could do it. > (up ip route del default via 192.168.0.10 dev eth0) > > In case of Whonix-Workstation many applications (ex: Tor Browser, wget, > curl...) are pre-configured to use a SocksPort (for stream isolation) > would still use "only-Tor". I recognize this must be quite confusing for > post-Tor-VPN users (user -> Tor -> VPN). > > There is still a route (sudo route) to 192.168.0.10 (Whonix-Gateway, > where Tor's SocksPorts are listening). Somehow I would have to configure > "the VPN may use 192.168.0.11, but nothing else". I don't know how to do > that. I primarily use pfSense VMs as VPN clients. My latest setups are described in https://www.wilderssecurity.com/showthread.php?p=2209523. It's a long thread, I admit. There's also a first draft of a video tutorial at http://vimeo.com/mirimir/, but there's no sound yet :( There are both routing and firewall rules. In particular, the VPN tunnel is the only gateway for anything from LAN. I've killed the openvpn process in pfSense while streaming a video, and nothing from LAN gets out on pfSense WAN. > Maybe I have very high security goals here. The goal is to rely on > OpenVPN to check if we're connected to the VPN server we expect and let > only OpenVPN connect to it and no other application. > > Using a firewall doesn't 100% enforce only using the VPN server. When > the IP of the VPN service gets assigned to another server, you could end > up connecting to a malicious server. Firewalls don't understand the VPN > authentication status, only OpenVPN does. Isn't it likely that an adversary that could steal an IP address from a VPN server could simply just monitor traffic to that VPN server? You do have the server's ca.crt to authenticate it, so you won't connect. > Ultimately, having a dedicated VPN-Gateway may be the most secure > option. - If people can and want to pay the price (cpu, ram, disk > space). Having a dedicated Gateway is the only possibility to prevent > malware (with root) from deactivating the VPN* (to the extend of the > vulnerability resistance of the isolation box). I go as far as pfSense VMs. I have at times run my networking VMs on different hosts from my workstation VMs. But then it becomes crucial to prevent unauthorized access to the switches ;) > Anyway, I could perhaps think about an iptables firewall designed to be > run inside Whonix-Workstation, which forbids any outgoing traffic from > users other than openvpn. That sounds good. > ------------------------------------------------------------------------------ > Own the Future-Intel(R) Level Up Game Demo Contest 2013 > Rise to greatness in Intel's independent game demo contest. Compete > for recognition, cash, and the chance to get your game on Steam. > $5K grand prize plus 10 genre and skill prizes. Submit your demo > by 6/6/13. http://altfarm.mediaplex.com/ad/ck/12124-176961-30367-2 > _______________________________________________ > Whonix-devel mailing list > Who...@li... > https://lists.sourceforge.net/lists/listinfo/whonix-devel > |