Ask the Expert

Evidence of the risks of split tunneling

Many thanks for the answer to my query. Steve backed up my theory. As I am not a professional hacker, it would be great to know how I could piggy back or hijack a VPN session from the Internet so that I can prove to our network guy that split tunneling is indeed a risk.

    Requires Free Membership to View

I don't know how I could describe for you how to do this without giving out sources and methods to those that could be hackers. Ethically, I really can't do that. However, I can point you to some other sources so that perhaps having the overwhelming evidence will convince your network guy.

From the SANS Institute: Telecommuting safely -- remote node or remote session?, by Mark Levine

From CSOonline: Addressing teleworker network security risks, by Chad Robinson of Robert Frances Group

From SearchNetworking.com: Know your split-tunnel "gotchas", by Tom Lancaster

From Security Management Online: Tunnel of Secure Transmission, by Christopher J. Carlson

Finally, by allowing split tunneling, you are in effect dual-homing your remote client on both your internal network and the Internet at the same time. Since you likely cannot control how your remote client is configured, that is the same as opening up your corporate network to whatever bad things can happen to that remote client. Is the antivirus up-to-date on that remote client? I hope so, because if a virus gets on it, it can easily spread to the corporate network, bypassing any antivirus at your corporate firewall. Does your remote user have a wireless network at home? If so, can his neighbor hack into that network and then use the tunnel that has been set up because the shared permissions of the home network are setup wrong? Probably.

I really cannot emphasize enough that split-tunneling is a really bad idea.


For more information on this topic, visit these other SearchSecurity.com resources:
Ask the Expert: The threat of split tunneling with PPTP
Ask the Expert: Split tunneling in a VPN environment
Best Web Links: Infrastructure and network security


This was first published in January 2003

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: