Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple APILearn More
that sucks - the same reason why I've switched from Cisco's AnyConnect to OpenConnect.
If you're not using AnyConnect - any chance you could get away with custom routes?
@coffeeholic OpenConnect is an anyconnect-server-compliant client. Works with hotp/totp codes as well (you just need to have the *top SECRET in its raw format -- there are ways to get it :) ).
Been using openconnect for over a year now. No problems there. And, in fact, I enjoy the debug logging as I can see when there's a glitch in my network. Less time wasted ;)
I've had that too and I might have sent some N(aa)SFW pron through it occasionally.. So I changed the openvpn config to not do that anymore.
Nowadays I run a dedicated work VM (Qubes OS).
My hobby is breaking IT security. And sometimes flatly necessary to do my job.
I do vpn at the router level. Pfsense has, among other things, the ability to configure redirection of traffic ranges through a vpn connection on a virtual or physical adapter. Set up the VPN on pfsense, then configure it to route your work device traffic for whatever class c 10.x.x.x range your work network uses through it. It's split tunneling without the split.
You can do the same thing low key and locally with either a second network adapter, or a bridge network and a VM clone of your work laptop acting as a proxy. Just set an OS level static route to push the same 10 dot ranged thorough the alternate ip.
Make sure your local DNS also has your work DNS last to ensure you're not getting routed through a Palo Alto-style content filter. Or if you can swing it, don't use name resolution at all.
The router hosted connrction is persistent, so you don't have to deal with reauthing. You can also use it on multiple machines without having to run vpn on them.
In the case of anyconnect, it has mechanisms to detect fuckery and prevent split or side tunneling. The alternatives are mostly to work around that.
@SortOfTested I see. I didn't figure this part was meant for the router configuration as well - I assumed you were mentioning a physical dongle in the per-host-configuration case :)
As for anyconnect - last I checked it simply upserts the whole routing table every second or so :) Since this procedure is not resource-demanding, it's not noticeable. At least so the internets claim
The latest versions started including security checks and all manner of scanning. For example, it can be configured to block if you're running a local development proxy, if a particularly cert authority is unavailable, certs are missing or have invalid signatures, scan window names, process lists and phone home with that data in telemetric payloads and even rewrite or disallow local DNS modifications. It really abuses it's admin perms.
One or the bright sides of working with shitty clients who have gui-pilot admins s you learn what "all switches to on" looks like in all sorts of networking scenarios and tools.
@SortOfTested scanning process list and window names.. and why they do it? I guess it is least about malware protection. The reasons I could think of is corporate surveillance to protect data leaks and/or monitor employee is working by using the rigth windows with open times...
Can you filter this kind of data on the firewall?
It's usually the VPN gateway itself that validates it to enforce policy, so filtering the data fails your auth.
My personal favorite was on a windows system, a client insisted we use their hardware. The hardware had this shitty aggressive appliance called sentinelone installed. It basically eradicated system perf.
Naturally, I kill it with a script on a loop and go about day. Then I leave the client site after a few weeks because project startup is finished and dev work has begun in earnest.
I get home and try to sign into the VPN. "security assertion failed." Bit of fiddling later and sure as shit its the security system I killed. Turns out it was only validating process name in its rule, so spinning up a bullshit CLI that set it's name allowed me to get in.
This was the project I cooked up the vm laptop hd clone as proxy trick on.