Date: Fri, 27 Nov 2015 16:55:38 +0100 From: "lokadamus@gmx.de" <lokadamus@gmx.de> To: Matthias Apitz <guru@unixarea.de>, freebsd-questions@freebsd.org Subject: Re: VPN security breach Message-ID: <56587CFA.3010309@gmx.de> In-Reply-To: <20151127145148.GA2047@c720-r276659.oa.oclc.org> References: <20151127104401.7fdfd5fd@Papi> <20151127145148.GA2047@c720-r276659.oa.oclc.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 11/27/15 15:51, Matthias Apitz wrote: > El día Friday, November 27, 2015 a las 10:44:01AM -0300, Mario Lobo escribió: > >> Any comments on this? >> >> https://thehackernews.com/2015/11/vpn-hacking.html > > $ netstat -rn > Routing tables > > Internet: > Destination Gateway Flags Netif Expire > default 192.168.2.1 UGS wlan0 > 10.0.1.0/24 10.49.94.103 UGS tun0 > 10.13.1.0/24 10.49.94.103 UGS tun0 > ... > > i.e. my default route goes to the WLAN AP in my home with an unreachable > private IP addr. So what? > > matthias > Do you really have an extern IP? Where this ip is shown in your netstat? Sorry, but looking in your own lan is a little bit stupid. It is an error, which is possible. When NSA get your ip, they can look, what you have done. Greetings
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?56587CFA.3010309>