Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Nov 2015 16:55:38 +0100
From:      "lokadamus@gmx.de" <lokadamus@gmx.de>
To:        Matthias Apitz <guru@unixarea.de>, freebsd-questions@freebsd.org
Subject:   Re: VPN security breach
Message-ID:  <56587CFA.3010309@gmx.de>
In-Reply-To: <20151127145148.GA2047@c720-r276659.oa.oclc.org>
References:  <20151127104401.7fdfd5fd@Papi> <20151127145148.GA2047@c720-r276659.oa.oclc.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 11/27/15 15:51, Matthias Apitz wrote:
> El día Friday, November 27, 2015 a las 10:44:01AM -0300, Mario Lobo escribió:
> 
>> Any comments on this?
>>
>> https://thehackernews.com/2015/11/vpn-hacking.html
> 
> $ netstat -rn
> Routing tables
> 
> Internet:
> Destination        Gateway            Flags      Netif Expire
> default            192.168.2.1        UGS       wlan0
> 10.0.1.0/24        10.49.94.103       UGS        tun0
> 10.13.1.0/24       10.49.94.103       UGS        tun0
> ...
> 
> i.e. my default route goes to the WLAN AP in my home with an unreachable
> private IP addr. So what?
> 
> 	matthias
> 
Do you really have an extern IP? Where this ip is shown in your netstat?
Sorry, but looking in your own lan is a little bit stupid.

It is an error, which is possible.
When NSA get your ip, they can look, what you have done.
Greetings



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?56587CFA.3010309>