VPN connection - any mean against server being hacked?
as per my understanding the answer to this would be mainly no.
As it's only making the traffic between such a server and whoever is accessing it through that VPN better then only an encrypted SSL connection (not even sure if that is the case).
In my usecase it's an ERP application on that server, accessed by users via a browser interface from the outside world.
The only benefit in regards to hardening a (Linux) server would be that passwords being transferred are less likely to be picked up on their way.
Is that understanding accurate?
security vpn webserver
add a comment |
as per my understanding the answer to this would be mainly no.
As it's only making the traffic between such a server and whoever is accessing it through that VPN better then only an encrypted SSL connection (not even sure if that is the case).
In my usecase it's an ERP application on that server, accessed by users via a browser interface from the outside world.
The only benefit in regards to hardening a (Linux) server would be that passwords being transferred are less likely to be picked up on their way.
Is that understanding accurate?
security vpn webserver
add a comment |
as per my understanding the answer to this would be mainly no.
As it's only making the traffic between such a server and whoever is accessing it through that VPN better then only an encrypted SSL connection (not even sure if that is the case).
In my usecase it's an ERP application on that server, accessed by users via a browser interface from the outside world.
The only benefit in regards to hardening a (Linux) server would be that passwords being transferred are less likely to be picked up on their way.
Is that understanding accurate?
security vpn webserver
as per my understanding the answer to this would be mainly no.
As it's only making the traffic between such a server and whoever is accessing it through that VPN better then only an encrypted SSL connection (not even sure if that is the case).
In my usecase it's an ERP application on that server, accessed by users via a browser interface from the outside world.
The only benefit in regards to hardening a (Linux) server would be that passwords being transferred are less likely to be picked up on their way.
Is that understanding accurate?
security vpn webserver
security vpn webserver
asked Jan 24 at 11:37
vrmsvrms
297
297
add a comment |
add a comment |
1 Answer
1
active
oldest
votes
You are correct that a VPN only protects the communication channel between the VPN endpoints. And a well secured VPN should be sufficiently resistant to attack that you can effectively discount that risk.
It does nothing to harden either end - which is why attackers either try to compromise an endpoint, or try to make you connect to a spoof endpoint that they control.
thanks, what do you mean exactly by "a weak secured VPN should be sufficiently resistant to attack that you can discount it."
– vrms
Jan 24 at 12:55
I blame autocucumber...
– Rory Alsop
Jan 24 at 13:44
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1397878%2fvpn-connection-any-mean-against-server-being-hacked%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
You are correct that a VPN only protects the communication channel between the VPN endpoints. And a well secured VPN should be sufficiently resistant to attack that you can effectively discount that risk.
It does nothing to harden either end - which is why attackers either try to compromise an endpoint, or try to make you connect to a spoof endpoint that they control.
thanks, what do you mean exactly by "a weak secured VPN should be sufficiently resistant to attack that you can discount it."
– vrms
Jan 24 at 12:55
I blame autocucumber...
– Rory Alsop
Jan 24 at 13:44
add a comment |
You are correct that a VPN only protects the communication channel between the VPN endpoints. And a well secured VPN should be sufficiently resistant to attack that you can effectively discount that risk.
It does nothing to harden either end - which is why attackers either try to compromise an endpoint, or try to make you connect to a spoof endpoint that they control.
thanks, what do you mean exactly by "a weak secured VPN should be sufficiently resistant to attack that you can discount it."
– vrms
Jan 24 at 12:55
I blame autocucumber...
– Rory Alsop
Jan 24 at 13:44
add a comment |
You are correct that a VPN only protects the communication channel between the VPN endpoints. And a well secured VPN should be sufficiently resistant to attack that you can effectively discount that risk.
It does nothing to harden either end - which is why attackers either try to compromise an endpoint, or try to make you connect to a spoof endpoint that they control.
You are correct that a VPN only protects the communication channel between the VPN endpoints. And a well secured VPN should be sufficiently resistant to attack that you can effectively discount that risk.
It does nothing to harden either end - which is why attackers either try to compromise an endpoint, or try to make you connect to a spoof endpoint that they control.
edited Jan 24 at 13:43
answered Jan 24 at 12:01
Rory AlsopRory Alsop
3,0571530
3,0571530
thanks, what do you mean exactly by "a weak secured VPN should be sufficiently resistant to attack that you can discount it."
– vrms
Jan 24 at 12:55
I blame autocucumber...
– Rory Alsop
Jan 24 at 13:44
add a comment |
thanks, what do you mean exactly by "a weak secured VPN should be sufficiently resistant to attack that you can discount it."
– vrms
Jan 24 at 12:55
I blame autocucumber...
– Rory Alsop
Jan 24 at 13:44
thanks, what do you mean exactly by "a weak secured VPN should be sufficiently resistant to attack that you can discount it."
– vrms
Jan 24 at 12:55
thanks, what do you mean exactly by "a weak secured VPN should be sufficiently resistant to attack that you can discount it."
– vrms
Jan 24 at 12:55
I blame autocucumber...
– Rory Alsop
Jan 24 at 13:44
I blame autocucumber...
– Rory Alsop
Jan 24 at 13:44
add a comment |
Thanks for contributing an answer to Super User!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1397878%2fvpn-connection-any-mean-against-server-being-hacked%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown