Feeds

VPN security - if you want it, come and get it

Attention WiFi hotspotters: You want it

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Into the Tunnel of Love

Before starting OpenVPN on your client, make sure it's connected to the internet, and make a note of its wide area network IP address by visiting WhatIsMyIP.com. The IP address should belong to whatever provider the coffee shop subscribes to.

Now double click on the OpenVPN GUI icon on the client PC and follow the same steps you took when connecting on your server. Because we created a passphrase for the client key, you'll be prompted to enter it now. You should now see a client connect window and, 30 or so seconds later, a message indicated the client has connected successfully.

Client connection status window

Client connecting ...

Client connected pop-up

Client connected!

Tunnel of Love

If all goes according to plan, within 30 seconds, your client's IP address should change to the same one being used by your server machine. Make sure by once again checking WhatIsMyIP.com.

With the generous help of the Wall of Sheep organization camped out at this year's Black Hat security conference, we monitored a LAN as our packets traveled through OpenVPN's tunnel of love. We can confirm that they were absolutely unintelligible, even when we typed (nonexistent) passwords in the clear using Pop3 email clients and other unprotected programs.

The caveat is that if your client disconnects from the server for any reason, it will automatically resume normal use of the LAN, and if that happens (as it did, briefly, to us at Black Hat) anything you send in the clear is fair game to snoops. (Yonan, the OpenVPN creator, says he's working on an update that will alert users when the virtual connection is broken; until then, you'll just have to be vigilant.)

With the advent of OpenVPN, there's no longer a good excuse to connect to strange networks without the protection of a robust virtual private network. So go ahead and take the plunge. And if you run into trouble, leave a comment. We'll do what we can to help. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.