On Sat, 24 Jul 2010 12:30:09 -0700 Alex T <a...@secure.net.im> wrote:

> I have 2 suggestions regarding openvpn (client mode):
> - the use of SHA512 with the TLS ciphers

OpenVPN does not implement any encryption; it relies on OpenSSL. So, if
the OpenSSL library used by OpenVPN supports it, so does OpenVPN.

> - some kind of route / firewall manipulation for the Windows client.
> If the client is set up to route all Internet traffic via the VPN,
> sometimes when the internet (especially the wireless connection) is lost,
> all the internet traffic is using the local link, not the VPN ... this
> might become a security issue. I saw a different VPN client (paid
> version, NCP secure IPSEC client is called) that , on startup, if the
> current profile is set to route all traffic via the VPN, manipulates the
> Windows routes , deleting the default gateway and routing only the VPN
> server ip to the local gateway. If the VPN tunnel is not up, then the
> Internet won't work.

If I understand you correctly, you may try pushing

redirect-gateway

instead of

redirect-gateway def1

to the client. The former overwrites the default gateway rather than
creating the two /1 routes.

However, I'm not sure about what happens if the VPN goes down (ie, leave
routing table as it is - which is what you want - or restore old default
gateway?) You can find out quite easily by just trying.

-- 
D.

Reply via email to