Fw: Re: VPN killswitch

2024-11-25 Thread bsdbsdbsd1
Best regards John Scofield Sent with [Proton Mail](https://proton.me/mail/home) secure email. --- Forwarded Message --- From: hahahahacker2009 Date: On Monday, November 25th, 2024 at 1:32 PM Subject: Re: VPN killswitch To: bsdbsdbsd1 > Vào 1:10, Th 2, 25 thg 11, 2024 bsdbsdbsd1

Re: VPN killswitch

2024-11-25 Thread Stefan Sperling
On Mon, Nov 25, 2024 at 07:59:09PM +1000, David Gwynne wrote: > On Sun, Nov 24, 2024 at 05:55:12PM +, bsdbsdbsd1 wrote: > > OpenBSD needs an easily implementable killswitch for VPNs. > > i'd argue it has one. or two. maybe more. > > my preferred solution is to put the vpn protected traffic in

Re: VPN killswitch

2024-11-25 Thread David Gwynne
On Sun, Nov 24, 2024 at 05:55:12PM +, bsdbsdbsd1 wrote: > OpenBSD needs an easily implementable killswitch for VPNs. i'd argue it has one. or two. maybe more. my preferred solution is to put the vpn protected traffic in a separate rdomain to the vpn transport. for example, let's use wireguard

Re: VPN killswitch

2024-11-24 Thread Polarian
Hello, You could do this via PF, block all traffic (in and out) on any other traffic than the vpn interface. Then allow traffic out on the physical interface ONLY to the IP(s)/port(s) of the VPN. This is what I do currently for always on VPN, I am sure there is a better way, but it works. Take

Re: VPN killswitch

2024-11-24 Thread Kirill A . Korinsky
On Sun, 24 Nov 2024 18:55:12 +0100, bsdbsdbsd1 wrote: > > OpenBSD needs an easily implementable killswitch for VPNs. > Do you mean something like that Solène did here? https://dataswamp.org/~solene/2021-10-09-openbsd-wireguard-exit.html -- wbr, Kirill

VPN killswitch

2024-11-24 Thread bsdbsdbsd1
OpenBSD needs an easily implementable killswitch for VPNs. Best regards John Scofield