Rich Freeman on 28 May 2011 13:04:12 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] VPN |
On Sat, May 28, 2011 at 3:49 PM, Stephen Slaughter <steve2slaughter@gmail.com> wrote: > I'm in a Linux Noob and interested in securing my internet traffic with a > VPN. I'm concerned that you might not understand how a VPN actually helps to secure traffic. VPNs securely get data from point A to point B without risk of interception or modification. > Is there any way to configure one machine as both server and client? So, you want to securely get data from machine A to machine A without anybody in-between intercepting it. What exactly is your threat model? Nobody can intercept it without having local access (likely root), and somebody with local root can just read anything you have right out of RAM. > > Is it possible to host a virtual machine as the OpenVPN server with Virtual > box while running the client software on the same physical machine? > Sure. That would let you securely send network data between the host and the virtual server without interception on the wire, although in this case it doesn't actually go over a wire where it could be intercepted anyway. > Do any of you know of an alternative VPN solution I can use which does not > require hosting a server? > None that are sane. Of course anything can be a server - including many linksys routers with the right firmware. I think you might have the wrong idea concerning VPN. Data that goes over a VPN isn't magically "more secure" - it is only secure from interception while it is in transit over the VPN. If the VPN server then passes it onto the regular internet in the clear then it is as vulnerable as it would otherwise be. VPN is a point-to-point communication protocol. If your two points are the same, it just is added complexity. The typical use case for VPN is that you want to let somebody in a hotel connect to your corporate network as if they were plugged right into it, and thus be able to get into local server resources that you don't expose to the internet at large. You could use it to set up a tunnel between your network and a friend's so that they appear to be a single network and you can print or play games or whatever as if you were on the same LAN, but without much risk of hackers exploiting your local machines. Another big use case is to set up your wireless to go into a network with nothing on it but a VPN server, and then send your traffic over VPN from your laptop to the VPN server, thus securing it from the next big WiFi attack method. In that case the client would be on your laptop, and the server would be a PC on your network. Hope that helps a little. Note, I am by no means an expert on VPN. Rich ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug