On 2019-02-25, Frank Beuth <[email protected]> wrote:
> On Sun, Feb 24, 2019 at 03:12:31PM +0000, Stuart Henderson wrote:
>>Basically I'm trying to say, if you wanted to do it the other way round
>>(pass by default, block certain traffic) you wouldn't be able to block
>>everything.
>>
>>If you're trying to stop all possible paths something on the system
>>might use to exfiltrate information then this is important (for example
>>if ping(1) is available and you're not blocking ICMP, this could be used
>>even as non-root with ping -p).
>
> I see. "If you're in a situtation that requires blocking everything, then you 
> should block by default" seems logical enough.
>
> Not sure if there's any situation where you want to block by default but 
> allow 
> ICMP, that might be a bigger issue.
>
>>> I had no idea there was such a thing as SSH tun forwarding, thanks for
>>> telling me about it! :)
>>
>>A useful addition to the toolkit :)
>
> Do you know how (or how well!) it handles the performance issues associated 
> with TCP-over-TCP? e.g
> http://sites.inka.de/bigred/devel/tcp-tcp.html
> https://unix.stackexchange.com/questions/34499/are-there-disadvantages-in-ssh-tunneling
>
> apropos:
> https://github.com/sshuttle/sshuttle

I've not done much with ssh tun forwarding, but I have previously had
to run openvpn over TCP and didn't find that it really get in the
way in practice, even with connections over wifi. It would depend
on connection characteristics though.

The sshuttle documentation mostly talks about lack of feedback into
TCP's congestion control mechanism; that could be mitigated by
"regenerating" the TCP sessions on the tunnel endpoint, I think
it maybe possible to bodge this together using relayd's "forward
to destination". But I would only mess about with that if I had
tried it and was seeing things working poorly, rather than just
for the sake of maybe making things faster.


Reply via email to