Natanael,

Pushing a route also means that the network traffic will be sent over the same interface as the DHCP server instead of the virtual network interface. This is intended functionality that isn’t clearly stated in the RFC. Therefore, for the routes we push, it is never encrypted by the VPN’s virtual interface but instead transmitted by the network interface that is talking to the DHCP server. As an attacker, we can select which IP addresses go over the tunnel and which addresses go over the network interface talking to our DHCP server.

Ok, so double encrypted and authenticated traffic (TLS inside the VPN) would still be safe, and some stuff requiring an internal network origin via the VPN is safe (because the attacker can’t break into the VPN connection and your client won’t get the right response), but a ton of other traffic is exposed (especially unencrypted internal traffic on corporate networks, especially if it’s also reachable without a VPN or if anything sends credentials in plaintext)

  • All
  • Subscribed
  • Moderated
  • Favorites
  • technology@lemmy.world
  • DreamBathrooms
  • magazineikmin
  • InstantRegret
  • thenastyranch
  • Durango
  • Youngstown
  • ngwrru68w68
  • slotface
  • everett
  • rosin
  • osvaldo12
  • kavyap
  • cubers
  • mdbf
  • JUstTest
  • khanakhh
  • cisconetworking
  • GTA5RPClips
  • modclub
  • tacticalgear
  • ethstaker
  • tester
  • normalnudes
  • anitta
  • Leos
  • provamag3
  • megavids
  • lostlight
  • All magazines