Is this OpenVPN killswitch safe to use?
Many VPN apps have killswitch on them. I did not want to run a closed source VPN app just to get a killswitch. I use OpenVPN so I have looked around and found some similar killswitches which work with UFW and supports OpenVPN connections. Unfortunately none of them worked for me. So I made my own...
Code:
#!/bin/bash For unkillswitch.sh I have: Code:
#!/bin/bash Is it safe to use? Should I be worried about any attacks? |
attacks?
well, leaks .. https://browserleaks.com/ this is bad Code:
ufw allow out 443 I guess you have that so you can connect to the VPN, I assume tcp assuming eth0 is 'real' network device Code:
ufw allow out on eth0 to ${VPN_IP} port 443 proto tcp this doesn't make much sense Code:
the_ip=$(ip addr show | grep 'inet 192.168' | awk '{print $2;}') Code:
the_ip=$(ip -brief -f inet addr show eth0 | grep -Eo "[0-9]{1,3}(\.[0-9]{1,3}){3}" ) Code:
ufw allow from ${the_ip%.*}.0/24 to ${the_ip} port 22,1080 proto tcp so, from anywhere on your lan, you can ssh in or use the socks proxy to connect to the internet via the VPN other typical proxy ports 3128,8080,8118 you should also throw in Code:
ufw status verbose you may want to allow out to your lan Code:
ufw allow out on eth0 from ${the_ip} to 192.168.1.20 port 3632 proto tcp |
All times are GMT -5. The time now is 03:48 PM. |