Educause Security Discussion mailing list archives
Re: VPN service -- Quick Poll (VPN Alternatives)
From: Sam Hooker <samuel.hooker () UVM EDU>
Date: Wed, 14 Mar 2012 11:49:15 -0400
On 20120312 10:28 , Gramke, Jim wrote:
For many years, we've been using citrix as our remote access tool. Although from the beginning this happened mostly by accident, I like the solution because this way, applications and sensitive data aren't exposed to the home machine, which, from a security perspective is an unknown quantity. I've always been a little leary to allow any home machine the direct access to sensitive apps and data that VPN provides, not to mention exposing the school's network directly to these home machines. Or are my fears unfounded, and I'm just missing something basic about the features and controls vpn's have?
While a fan of "the hosted desktop" for a number of reasons, I'll note that it doesn't mitigate against all threats to the endpoint -- keyloggers running on the user's home machine probably capture keystrokes bound for the Citrix client as well as any other. Depending upon what gets saved in the client's login dialog, this could lead to an enticing-looking string of entries in a keylog. I perk up when I find a text file with lines like ... citrix.uvm.edu sthooker h0lym0ly1'ml33t ... Although I haven't looked for any such thing specifically, I'd be surprised if there *weren't* malware designed to at least screen-scrape the Citrix and MS RDP clients -- and wonder if there's any practical countermeasure against such a technique. Cheers, -sth -- Sam Hooker | samuel.hooker () uvm edu Systems Architecture and Administration Enterprise Technology Services The University of Vermont
-----Original Message----- From: Dave Koontz [mailto:dkoontz () MBC EDU] Sent: Friday, March 09, 2012 6:56 PM Subject: Re: VPN service -- Quick Poll (split tunneling?) This topic is always a lively discussion! ;-) But I believe the conversations of old may need to be re-examined with today's technology options in mind. First disclosure, we only allow supervisor approved access to our VPN for our users, and only on institutionally owned machines. A fall back for a pandemic or other emergency is in place where those rules change. Like many of you, we ran Cisco VPN concentrators for years and forced our remote users through our limited bandwidth pipe whenever they needed a campus resource, and ALL traffic came through our pipe for security reasons. Since we did not allow split tunneling, our remote office users could not even do simple things print to their local printers from our ERP system. We have recently upgraded our systems to use the Palo Alto SSLVPN / Global Protect Client. This is generally setup as a purely SSL VPN, but can also act as a Cisco Style IPSec VPN for site to site VPN Tunnels, or setups on iPads and the like. So, we have moved away from not allowing split tunneling to embracing it - with proper control and network access limitations. With Palo Alto we can determine which traffic we allow into our core, and all others are blocked. And even the traffic that comes into our core must pass the IPS rules to ensure that the safe traffic safe. It's always a delicant balance to enable users, yet protect our networks. I believe modern technology can give you that balance, if properly configured. Don't ask a 10 year old product to try to do this. On 3/9/2012 3:25 PM, Kris Monroe wrote:For those that have answered yes, would you mind outlining whether you allow split tunneling or not? I would also appreciate your rationale one way or the other. I've always been taught that split tunneling is a really bad idea, but this topic has recently come up in our remote access project. -- Kris Monroe, CISSP, CISA, CISM Information Security Officer Office of Information Technology Services Job Hall Ithaca College 953 Danby Rd. | Ithaca, NY 14850 607.274.1997 | 607.274.1484 fax kmonroe () ithaca edu | ithaca.edu Follow us: facebook.com/ICInfosec | twitter.com/IC_infosec On 3/9/2012 9:18 AM, Zahid Mehmood wrote:Hi All, Quick Poll Please: 1. Is your campus using, or does it plan to use, VPN access for remote users? 2 . What vendor(s) and protocols (SSL, IPSec, other) are you using? 3. How many concurrent remote users can your system support? 4. Do you offer any specialized/custom VPN services for departments, researchers, etc.? 5. Is your VPN offering part of your DR plan/requirement? Thanks! Zahid Mehmood Network Software and IT Enablement Systems Columbia University Information Technology
Attachment:
signature.asc
Description: OpenPGP digital signature
Current thread:
- Re: VPN service -- Quick Poll (VPN Alternatives) Gramke, Jim (Mar 12)
- Re: VPN service -- Quick Poll (VPN Alternatives) Sam Hooker (Mar 14)
- Re: VPN service -- Quick Poll (VPN Alternatives) Gary Flynn (Mar 14)
- Re: VPN service -- Quick Poll (VPN Alternatives) Sam Hooker (Mar 14)