T 3.42 Insecure configuration of the VPN clients for remote access

The security of a virtual private network (VPN) depends on the secure configuration of the VPN server and VPN clients as well as on the correct use of the security mechanisms offered.

When the full responsibility for configuring the server is placed on the administrator, the VPN clients will often be used outside of the government agency or company, especially if the VPN is a remote access VPN. This means the clients can only be loosely integrated into the administrative procedures. Users can also be granted certain administrative rights, especially when using mobile VPN clients, to eliminate VPN access problems by changing the VPN configuration parameters themselves or by following instructions provided over the telephone.

In general, the limited control capabilities of the system administration means there is a risk that the VPN clients are configured insecurely. Examples of this include:

In general, it is possible to configure (client and/or server) a virtual private network (VPN) so that only weak security mechanisms are used or no security mechanisms at all are used. The mechanisms used for data encryption when establishing connections are negotiated dynamically between the client and the server when using IPSec or SSL, for example. When negotiating, the client provides the server with a list of supported methods, referred to as the cipher suites, for selection, and the server then selects a method from this list. The list of methods that can be used can be modified by changing the configuration accordingly. There is usually an option for "no encryption" available as well.

If the ability to establish unencrypted connections is not disabled when specifying the configuration, there is a general risk that the data will not be protected during transmission. This applies especially to VPN clients on which the users have the ability to adapt the configuration of the VPN to the local conditions in case of problems.

Example: