-
Notifications
You must be signed in to change notification settings - Fork 7
Description
It has been pointed out on discord that DPC currently has a couple of options that lower the security of the solution overall. A couple that have been pointed out are:
- Ability to disable NPS server validation checks
- Ability to configure a tunnel without custom cryptography being enabled (Default encryption is tripledes I believe?)
- Ability to configure custom cryptography with insecure options
As DPC does not collect any kind of telemetry it is not possible to understand how many customers may be impacted by removing these features. Current feedback is that some (very large) customers disable the NPS checks so that they don't have to manage the NPS server lists individually. I also don't see an option to enforce custom cryptography as this requires configuration on the server side and unless they were set up correctly, a lot of people would struggle to upgrade to this configuration.
Removing insecure custom cryptography is easier as it can be done at the ADMX level rather than removing the functionality entirely, this should allow existing people to continue to use this setting or people can make use of manual registry updates if they really want it.
I'll also add warnings into the profile generation process to highlight that these options are insecure and ideally links to places where they can understand the issues and how to remediate @richardhicks I sense a blog post or 2 coming 😉. Unfortunately not everyone knows that the event logs exist and so only notice when the profile breaks. As such any breaking change will need a major revision (6.x) and will have to be telegraphed in advance
Please do input into these discussions. Overall DPC attempts to be flexible but opinionated, always trying to push people towards a more secure configuration and attempting to minimise the about of knowledge the average AOVPN administrator needs to have to setup a secure and functioning system.