VPN (wireless) connection secure or no?
VPN (wireless) connection secure or no?
Let's say I am in a hotel or in the airport using a WiFi connection and I establsih a VPN session. (We use CISCO VPN Client Ver 4.x.x.) Is my connection secure or is it still easily penetrated to the point I cannot and should not be sending secure data, email, etc.?
Thanks.
Thanks.
T30 2366-85U
T43 2668-4DU
R60e 0657-3ZU
T61 7663-2EU
T420 4178-6VU
E420 1141-BTU
G570 4334-4QU
Acer Aspire 1430
Gateway Solo9300
T43 2668-4DU
R60e 0657-3ZU
T61 7663-2EU
T420 4178-6VU
E420 1141-BTU
G570 4334-4QU
Acer Aspire 1430
Gateway Solo9300
What did your IT department say?
Jane
2015 X1 Carbon, ThinkPad Slate, T410s, X301, X300, X200 Tablet, T60p, HP TouchPad, iPad Air 2, iPhone 5S, IdeaTab A2107A, Yoga 3 Pro
Bill Morrow's thinkpads.com Facebook group
I'm on Twitter
I do NOT respond to PM or e-mail requests for personal tech support.
2015 X1 Carbon, ThinkPad Slate, T410s, X301, X300, X200 Tablet, T60p, HP TouchPad, iPad Air 2, iPhone 5S, IdeaTab A2107A, Yoga 3 Pro
Bill Morrow's thinkpads.com Facebook group
I'm on Twitter
I do NOT respond to PM or e-mail requests for personal tech support.
-
jjesusfreak01
- Junior Member

- Posts: 395
- Joined: Sat Jun 10, 2006 11:27 am
- Location: Raleigh, NC
VPN security is independent of the type of connection. So for VPN only, it doesn't matter wired or wireless.
Now view the VPN as what it says - a tunnel riding securely inside your connection. If the VPN allows for split connections (internet as well as VPN) and most do today, then on wireless, be *absolutely* certain you have a software firewall. Otherwise, while an assailant probably cannot penetrate your VPN, they sure could screw up your machine if not secure.
... JD Hurst
Now view the VPN as what it says - a tunnel riding securely inside your connection. If the VPN allows for split connections (internet as well as VPN) and most do today, then on wireless, be *absolutely* certain you have a software firewall. Otherwise, while an assailant probably cannot penetrate your VPN, they sure could screw up your machine if not secure.
... JD Hurst
-
techflavor
- Freshman Member
- Posts: 119
- Joined: Sun Jan 29, 2006 1:55 am
- Location: Baton Rouge, LA
- Contact:
It all depends on what kind of security encryption your office has setup for VPN (i.e. PPTP, IPSec, L2TP).
It seems most offices are still using PPTP these days and it is very insecure (especially when connecting from an open wireless network).
An example of an attack:
Let's say I'm somewhere with an open wireless network. On computer A (running linux), I connect to the wireless network and setup my ARP poisoning attack and begin sniffing. Computer B connects to the open wireless network, pulls up their VPN dialog, and connects using their username and password. Computer A then see computer B make its VPN connection and reports back the username and password. Now person on computer A has the username and password to VPN into computer B's office network.
Username and passwords can also be sniffed from SSL connections using this same ARP poisoning attack method. You may think because you have that "lock" displaying in your browser you can't be compromised but that isn't the case. While the data will continue to be encrypted, the hacker is still able to retrieve your username and password.
This is why it is not recommended to visit certain websites or perform certain tasks (i.e. check your POP email, connect to a company FTP site) when connected to an open wireless network.
It seems most offices are still using PPTP these days and it is very insecure (especially when connecting from an open wireless network).
An example of an attack:
Let's say I'm somewhere with an open wireless network. On computer A (running linux), I connect to the wireless network and setup my ARP poisoning attack and begin sniffing. Computer B connects to the open wireless network, pulls up their VPN dialog, and connects using their username and password. Computer A then see computer B make its VPN connection and reports back the username and password. Now person on computer A has the username and password to VPN into computer B's office network.
Username and passwords can also be sniffed from SSL connections using this same ARP poisoning attack method. You may think because you have that "lock" displaying in your browser you can't be compromised but that isn't the case. While the data will continue to be encrypted, the hacker is still able to retrieve your username and password.
This is why it is not recommended to visit certain websites or perform certain tasks (i.e. check your POP email, connect to a company FTP site) when connected to an open wireless network.
In short: IPSEC is very secure!
How secure a VPN connection is, depends on the type of VPN and the authentication method that is used.
PPTP
-----
All PPTP VPN's use the same authentication techniques as point-to-point (PPP) links. This is their main weaknes.
Some PPP-authentication types:
1) CHAP and PAP authentication --> client sends clear-text username and password to server.
2) MS-CHAP, MS-CHAP-v2 or EAP-TLS authentication --> server send a challenge (MD5?) to the connecting client, the password itself is not sent.
IPSEC
-----
L2TP/IPSEC VPN's create an encrypted tunnel based on certificates installed on the server and on the client.
Within this secure tunnel the authentication procedure is started. Even if an insecure authentication method is used and cleartext passwords are sent, sniffers only see the encrypted ipsec tunnel.
This probably sound link complete jibberish
How secure a VPN connection is, depends on the type of VPN and the authentication method that is used.
PPTP
-----
All PPTP VPN's use the same authentication techniques as point-to-point (PPP) links. This is their main weaknes.
Some PPP-authentication types:
1) CHAP and PAP authentication --> client sends clear-text username and password to server.
2) MS-CHAP, MS-CHAP-v2 or EAP-TLS authentication --> server send a challenge (MD5?) to the connecting client, the password itself is not sent.
IPSEC
-----
L2TP/IPSEC VPN's create an encrypted tunnel based on certificates installed on the server and on the client.
Within this secure tunnel the authentication procedure is started. Even if an insecure authentication method is used and cleartext passwords are sent, sniffers only see the encrypted ipsec tunnel.
This probably sound link complete jibberish
-
smugiri
- Senior Member

- Posts: 774
- Joined: Tue Nov 23, 2004 4:29 pm
- Location: Mississauga, ON
- Contact:
Cisco VPNs deal with this attack using a 2 level authentification scheme; the user name and passwork for the VPN only allows you to connect to connect to the Cisco hardware at the far end. Once you are connected, you still need to connect to the domain using a a different user name/password combo. Check out the diagrm on this page that illustrates this,techflavor wrote:It all depends on what kind of security encryption your office has setup for VPN (i.e. PPTP, IPSec, L2TP).
It seems most offices are still using PPTP these days and it is very insecure (especially when connecting from an open wireless network).
An example of an attack:
Let's say I'm somewhere with an open wireless network. On computer A (running linux), I connect to the wireless network and setup my ARP poisoning attack and begin sniffing. Computer B connects to the open wireless network, pulls up their VPN dialog, and connects using their username and password. Computer A then see computer B make its VPN connection and reports back the username and password. Now person on computer A has the username and password to VPN into computer B's office network.
Username and passwords can also be sniffed from SSL connections using this same ARP poisoning attack method. You may think because you have that "lock" displaying in your browser you can't be compromised but that isn't the case. While the data will continue to be encrypted, the hacker is still able to retrieve your username and password.
This is why it is not recommended to visit certain websites or perform certain tasks (i.e. check your POP email, connect to a company FTP site) when connected to an open wireless network.
This approach makes it much harder to crack the CISCO VPN setup just by using ARP packet poisoning. While you can connect to the concentrator on the far end, you still have to come up with another technique to reveal the domain login info as packet poisoning will not work once connected to the concentrator - you can not run any type of "man in the middle" attack between the concentrator and the domain.
To make things even more complicated, some (paranoid) organizations put the concentrator outside the domain in a DMZ so you have to logon onto the DMZ machine before you can then log onto the domain.
Steve
Yeah, that's correct. When I establish the VPN connection I have to create a log-in password that consists of three pieces. Two pieces of the password are static, the 3rd component is created by a hard token (random character generator).smugiri wrote: Cisco VPNs deal with this attack using a 2 level authentification scheme; the user name and passwork for the VPN only allows you to connect to connect to the Cisco hardware at the far end. Once you are connected, you still need to connect to the domain using a a different user name/password combo.
Do I have to worry about checking my POP3 mailbox as mentioned above? Is that the real concern?
Thx.
T30 2366-85U
T43 2668-4DU
R60e 0657-3ZU
T61 7663-2EU
T420 4178-6VU
E420 1141-BTU
G570 4334-4QU
Acer Aspire 1430
Gateway Solo9300
T43 2668-4DU
R60e 0657-3ZU
T61 7663-2EU
T420 4178-6VU
E420 1141-BTU
G570 4334-4QU
Acer Aspire 1430
Gateway Solo9300
-
smugiri
- Senior Member

- Posts: 774
- Joined: Tue Nov 23, 2004 4:29 pm
- Location: Mississauga, ON
- Contact:
I don't think so, the Cisco VPN approach is about as safe as you can get. Unlike other tools that allow you to split the network and connect to the net separately without using the VPN, Cisco creates a virtual network adapter and sends ALL traffic over this adapter. So, all traffic is over IPSEC and possibly also over SSL. I think that this is about as safe as you can get with a commercial product.uberT wrote:Yeah, that's correct. When I establish the VPN connection I have to create a log-in password that consists of three pieces. Two pieces of the password are static, the 3rd component is created by a hard token (random character generator).smugiri wrote: Cisco VPNs deal with this attack using a 2 level authentification scheme; the user name and passwork for the VPN only allows you to connect to connect to the Cisco hardware at the far end. Once you are connected, you still need to connect to the domain using a a different user name/password combo.
Do I have to worry about checking my POP3 mailbox as mentioned above? Is that the real concern?
Thx.
If you still feel that you have to do something, add on a GOOD software firewall (not the windows default one, maybe zonealarm pro? I am not sure whats a good firewall for windows as I use linux most of the time.)
Check out this page in your Cisco VPN client help (assuming you installed to the default location)
C:\Program Files\Cisco Systems\VPN Client\help\vc525.html#1010052
Steve
-
DIGITALgimpus
- Senior Member

- Posts: 774
- Joined: Sat Aug 20, 2005 1:01 pm
For the record, nothing is 100% secure, any claims that something is... are made by idiots and idiots only.
That said, VPN over WiFi is generally considered _very_ safe (though not 100%). I personally wouldn't have a problem with that for all but the most secure data.... I personally wouldn't do that for a banking or medical institution for example, or military usage. But for just about all civilian data... I wouldn't question it.
That said, VPN over WiFi is generally considered _very_ safe (though not 100%). I personally wouldn't have a problem with that for all but the most secure data.... I personally wouldn't do that for a banking or medical institution for example, or military usage. But for just about all civilian data... I wouldn't question it.
T43 (2687-DUU) - 1.86GHz, 1.5GB RAM, 100GB 5400 (non IBM-firmware Hitachi 5k100) HD, Fingerprint Scanner, 802.11abg/Bluetooth, ATI x300
-
- Similar Topics
- Replies
- Views
- Last post
-
-
Expresscard to SCSI device? Need DB25 connection
by excal32 » Tue Jan 17, 2017 3:20 am » in ThinkPad T6x Series - 10 Replies
- 1437 Views
-
Last post by Shredder11
Sun Jan 29, 2017 2:00 pm
-
-
-
A22m wired internet connection
by Sudevan » Sun Feb 12, 2017 3:48 pm » in ThinkPad R, A, G and Z Series - 5 Replies
- 1334 Views
-
Last post by rkawakami
Mon Feb 13, 2017 11:38 pm
-
-
-
T60 1952A97. WIRELESS LAN VS WIRELESS WAN CONFUSION.
by slaterlp » Sat Mar 04, 2017 12:16 pm » in ThinkPad T6x Series - 17 Replies
- 1372 Views
-
Last post by ajkula66
Fri Mar 10, 2017 6:31 am
-
-
- 2 Replies
- 498 Views
-
Last post by Sudevan
Sat Jan 28, 2017 8:21 pm
Who is online
Users browsing this forum: No registered users and 6 guests





