-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/03/2011, David Sommerseth wrote:
> Sorry that you haven't received any response quickly.  Most of us
> here are having full time jobs which is not directly related to
> OpenVPN.

I'm sorry if I sounded like I felt that answers were slow in coming.
Actually, I was amazed with the response time to my initial
submission. When the rhythm of the discussion dropped, I thought
people were losing interest, that's why I asked.

> None of these products supports network device name for setting up
> listen addresses.  I chose these products as they are all aimed at
> being accessed from the "wild Internet", accepting connections from
> whoever who are not necessarily known to the server.  Which makes
> their use cases closer to OpenVPN.

The reason I looked into this in the first place was that, unlike
those TCP-based protocols, I couldn't get OpenVPN to work on a
firewall with two external IP addresses without running two deamons,
each one bound to one interface only. It is then that I stumbled upon
the difficulty of setting up the server that must listen on an
interface that has a dynamically-assigned address.
> But to summarise it somehow, based on my pondering ... a quick
> pro/cons list:
>    + makes config easier for sys-admins
>    - OpenVPN will only listen to the first identified IP address,
>      which will need to be both IPv4 and IPv6 aware.  This will
>      become a support issue pretty quickly.

Actually, that would require a user to *both* have multiple IP
addresses on the same interface, *and* to want to use this feature,
which I'd gather is not likely. In any case, a short mention in the
documentation that the "if:" notation only works with interfaces that
have just one interface would solve it (I can even add code to check
for this condition and log a warning). This of course, would only be
the case until OpenVPN supports listening on multiple addresses, then
we can simply fix it.

>    - 6 different open source products which has a similar usage
> profile (open access from the Internet) do not have this support.

Those protocols aren't affected by the issue I mentioned, and I'd
venture to say that they are not nearly as likely to be used in a
dynamic-IP address setup as OpenVPN, which is great for tunnelling
into home.

In any case: I didn't tackle this because I was bored, but because I
have a real use case, and a working setup, which I think other people
may find useful.

>    - Can cause some surprises, if people re-plug a network cable
> between two network devices.  Suddenly OpenVPN is available on a
> network segment it should not be available on, due to not being
> restricted to particular a IP address.  Of course it should be a
> firewall stopping it in front, but that might have been disabled as
> well - for unknown reasons.  Surely this is a PEBKAC issue, but
> they do happen more often than we like to admit.

Sure... but such a problem would:

   1) be rather quickly discovered, when people cannot connect to the
      VPN,
   2) be rather unlikely to cause security issues, since even
      from the wrong network, people would need the credentials to
      get connected.

        Fede
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFNeun1bPULDL0CxuARAtSsAJ9DFnb8SFs/Gd0Am9/A9IRKpui6LACg1/aw
lif+92pajziWM1/x41kRbhA=
=N/8A
-----END PGP SIGNATURE-----

Reply via email to