Q

Evidence of the risks of split tunneling

Many thanks for the answer to my query. Steve backed up my theory. As I am not a professional hacker, it would be great to know how I could piggy back or hijack a VPN session from the Internet so that I can prove to our network guy that split tunneling is indeed a risk.
 

I don't know how I could describe for you how to do this without giving out sources and methods to those that could be hackers. Ethically, I really can't do that. However, I can point you to some other sources so that perhaps having the overwhelming evidence will convince your network guy.

From the SANS Institute: Telecommuting safely -- remote node or remote session?, by Mark Levine

From CSOonline: Addressing teleworker network security risks, by Chad Robinson of Robert Frances Group

From SearchNetworking.com: Know your split-tunnel "gotchas", by Tom Lancaster

From Security Management Online: Tunnel of Secure Transmission, by Christopher J. Carlson

Finally, by allowing split tunneling, you are in effect dual-homing your remote client on both your internal network and the Internet at the same time. Since you likely cannot control how your remote client is configured, that is the same as opening up your corporate network to whatever bad things can happen to that remote client. Is the antivirus up-to-date on that remote client? I hope so, because if a virus gets on it, it can easily spread to the corporate network, bypassing any antivirus at your corporate firewall. Does your remote user have a wireless network at home? If so, can his neighbor hack into that network and then use the tunnel that has been set up because the shared permissions of the home network are setup wrong? Probably.

I really cannot emphasize enough that split-tunneling is a really bad idea.

 


 

This was first published in January 2003

Dig deeper on SSL and TLS VPN Security

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

1 comment

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close