txtseam 0 Posted ... Is it dangerous to allow all traffic in and out of the tun interface? I noticed that via the tun device it has an IP address. Say my ip on tun0 is 10.4.29.50 and that I'm running a web server or Plex and it listens on all interfaces. Does this mean that other VPN users can connect to my 10.4.29.50 and use my services? Should I be worried about this at all and start configuring my firewall to only let specific traffic out of the tun0 device? Quote Share this post Link to post
Staff 9972 Posted ... Is it dangerous to allow all traffic in and out of the tun interface? I noticed that via the tun device it has an IP address. Say my ip on tun0 is 10.4.29.50 and that I'm running a web server or Plex and it listens on all interfaces. Does this mean that other VPN users can connect to my 10.4.29.50 and use my services? Should I be worried about this at all and start configuring my firewall to only let specific traffic out of the tun0 device? Hello, in a VPN in which all nodes are trusted, direct connections between nodes inside the VPN can be desirable (to share resources, for example, and more). In a public service like ours nodes of course can not be trusted. Therefore we do not allow direct connections between nodes inside the VPN. Kind regards Quote Share this post Link to post
zhang888 1066 Posted ... As a precaution, although 99.999% everything is perfectly configured on Air's side and it was verifiedby many users over the years, it's a good idea to have your own firewall rules set on tun0 interface.Not only it makes you more secure in case of failure on the provider side, but it also allows you tohave the ability to switch between providers and never worry that something is poorly configured ontheir end. In other words, this shouldn't be a question, you should trust only your own setup always. 3 InactiveUser, iwih2gk and rickjames reacted to this Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
iwih2gk 93 Posted ... As a precaution, although 99.999% everything is perfectly configured on Air's side and it was verifiedby many users over the years, it's a good idea to have your own firewall rules set on tun0 interface.Not only it makes you more secure in case of failure on the provider side, but it also allows you tohave the ability to switch between providers and never worry that something is poorly configured ontheir end. In other words, this shouldn't be a question, you should trust only your own setup always. Exactly. I have always appreciated the way Air "tells" us to setup partitions of trust and/or our own firewall rules if desired. Eddie tests solidly, but nothing is as sure fire as when a hobbyist user fortifies the system on their end, in tandem with Air's fine client and their behind the scenes support team. Air teamed with a hobbyist user makes for a pretty formidable communication model. Quote Share this post Link to post
amair 6 Posted ... Anyone using ZoneAlarm free edition with AirVPN to block VPN users from connecting your machine/network?Thanks in advance. Quote Share this post Link to post
Khariz 109 Posted ... No, because they can't do it anyway. 1 rickjames reacted to this Quote Share this post Link to post
eyes878 43 Posted ... Assuming no fault on AirVPN's side, which is very unlikely and has never happened before, they will not be able to connect to you unless you set the port to be forwarded via https://airvpn.org/ports Quote Share this post Link to post