• 1 Post
  • 10 Comments
Joined 1 year ago
cake
Cake day: July 9th, 2023

help-circle



  • How about we all stop paying taxes until the fucks start using the income for things other than making foreign peoples dead?

    There’s enough money in the pot, it’s just squandered on things that don’t benefit the people. We could accomplish so fucking much with just the amount of cash that the Pentagon misplaces every year.

    I’ll never understand the obsession with demanding more from the rich while we can’t even account for what we already have. Is everything a goddamn distraction campaign?

    /rant


  • Tailscale is one of those services…

    Tailscale isn’t an exposed service. Headscale is, and it isn’t connected to the Tailnet. It’s a control server used to communicate public keys and connectivity information between nodes. Sure, a threat actor can join nodes to the Tailnet should it become compromised. But have you looked at Headscale’s codebase? The attack surface is significantly smaller than anything like OpenVPN.

    A cert tells you that you are actually…

    I’m all for ssl/tls, but it’s more work and may not always be worth the effort depending upon the application, which is exactly why I recommended SmallStep+Caddy. Let’s not pretend that introducing things like a CA don’t introduce complexity and overhead, even if it’s just distributing the root cert to devices.

    MITM/DNS Hijack/ARP Poisoning…

    Are you suggesting that these attack techniques are effective against zero trust tunnels? Given that the encryption values are sent out of band, via the control channel, how would one intercept and replay the traffic?




  • Yikes! I’d avoid leaving any services externally exposed unless they’re absolutely necessary…

    Tailscale+Headscale are pretty easy to implement these days. Since it’s effectively zero trust, the tunnels become the encrypted channel so there’s an argument that HTTPS isn’t really required unless some endpoints won’t be accessing services over the Tailnet. SmallStep and Caddy can be used to automatically manage certs if it’s needed though.

    You can even configure a PiHole (or derivative) to be your DNS server on the VPN, giving you ad blocking on the go.