Security Questions - VPN Server w/ OpenVPN on DS718+. ios12 clients
Posted: Tue Nov 06, 2018 2:18 am
On AT&T wifi at work, I successfully connected to my VPN server at home set up on my DS718+ w/ OpenVPN (VPN symbol showed up on the iphone, ios12). I am wondering about security though. A few questions:
1 - Is it safe to allow the OpenVPN app to save the username and password to login to the server? I believe the answer is it is as safe as the passcode on the iphone since if saved, someone could get to my login screen for the DSM, after connecting the vpn.
2 - Follow up to 1 - would they theoreticaly have the username and password too and then use to login in to my DSM? Or would username/pass be really hard to lift from the phone?
3 - I only had to transfer (via iTunes) the .opvn file. Several other files were exported with the .opvn file (ca_bundle.crt and ca.crt). What are these files for?
4 - My opvn file has two certificate numbers: what are both of these? When I first did the export with a self-signed cert, it only gave me the ca.crt file (not the ca_bundle.crt) and, I believe, it only had one cert in the .opvn file. Is there something I can or should do with these files to make the VPN more secure?
5 - Once the VPN was active, I was able to find the login pages to the DSM and the SRM (router interface). However, on the iphone (running the latest ios 12), it said that the connection was not secure (see attached screenshots). (a) is there a way to keep the VPN connection but not allow access through it to the DSM and SRM logins? (b) Should I care about the "not secure" messages from safari? I've read a lot about certificates and keys and SSL but I'm confused.
6 - I do not have the DiskStation firewall enabled. Should I w/ an active VPN? Generally, is the firewall on the router enough, I should I also engage on the diskstation?
My setup:
DSM 6.2.1-23824 Update 1
LAN static IP for DS
Synology 2600 router. DDNS active and used in .opvn for server
self-signed cert on the router. Let'sEncrypt cert on the DS.
Port-fwd on router - besides the DDNS on the router, the only other thing I had to do was fwd port 1194 to my static LAN IP address for the DS. This entry automatically added an entry allowing the same in the router FW.
.opvn file
dev tun
tls-client
remote xxxxxx.synology.me 1194
#float
redirect-gateway def1
#dhcp-option DNS DNS_IP_ADDRESS
pull
proto udp
script-security 2
auth-nocache
reneg-sec 0
cipher AES-256-CBC
auth SHA512
auth-user-pass
remote-cert-tls server
<ca>
-----BEGIN CERTIFICATE-----
xxxxx
-----END CERTIFICATE----------BEGIN CERTIFICATE-----
xxxxxxx
-----END CERTIFICATE-----
</ca>
1 - Is it safe to allow the OpenVPN app to save the username and password to login to the server? I believe the answer is it is as safe as the passcode on the iphone since if saved, someone could get to my login screen for the DSM, after connecting the vpn.
2 - Follow up to 1 - would they theoreticaly have the username and password too and then use to login in to my DSM? Or would username/pass be really hard to lift from the phone?
3 - I only had to transfer (via iTunes) the .opvn file. Several other files were exported with the .opvn file (ca_bundle.crt and ca.crt). What are these files for?
4 - My opvn file has two certificate numbers: what are both of these? When I first did the export with a self-signed cert, it only gave me the ca.crt file (not the ca_bundle.crt) and, I believe, it only had one cert in the .opvn file. Is there something I can or should do with these files to make the VPN more secure?
5 - Once the VPN was active, I was able to find the login pages to the DSM and the SRM (router interface). However, on the iphone (running the latest ios 12), it said that the connection was not secure (see attached screenshots). (a) is there a way to keep the VPN connection but not allow access through it to the DSM and SRM logins? (b) Should I care about the "not secure" messages from safari? I've read a lot about certificates and keys and SSL but I'm confused.
6 - I do not have the DiskStation firewall enabled. Should I w/ an active VPN? Generally, is the firewall on the router enough, I should I also engage on the diskstation?
My setup:
DSM 6.2.1-23824 Update 1
LAN static IP for DS
Synology 2600 router. DDNS active and used in .opvn for server
self-signed cert on the router. Let'sEncrypt cert on the DS.
Port-fwd on router - besides the DDNS on the router, the only other thing I had to do was fwd port 1194 to my static LAN IP address for the DS. This entry automatically added an entry allowing the same in the router FW.
.opvn file
dev tun
tls-client
remote xxxxxx.synology.me 1194
#float
redirect-gateway def1
#dhcp-option DNS DNS_IP_ADDRESS
pull
proto udp
script-security 2
auth-nocache
reneg-sec 0
cipher AES-256-CBC
auth SHA512
auth-user-pass
remote-cert-tls server
<ca>
-----BEGIN CERTIFICATE-----
xxxxx
-----END CERTIFICATE----------BEGIN CERTIFICATE-----
xxxxxxx
-----END CERTIFICATE-----
</ca>