Hello,
I wanted to set up my own VPN. I have a late 2012 Mac Mini that I was using as an iTunes server and for EyeTV so I could watch US TV when I travel outside the states.
Purchased a copy of OSX Server, installed and configured the VPN it so it would actually connect with a fairly long VPN shared secret. Set up a 'noip" account with a static ip address. Changed the Airport Time Capsule set up to allow connections on ports 500, 1701, 4500 on UDP, but removed the TCP access for port 1723 as I was only planning on using the L2PP VPN.
Got everything up and running left the VPN on for a couple days, went to check the logs today and find a large amount of activity, words and comments I didn't understand, and it appears some of the log info was removed as the top statement was something along the lines of "log history removed". I realize now I should have kept a copy of the log, but didn't before I reformatted the drive.
But what really concerned me is in the "Users" list there are at least 50 "new" users, each with a name of a process Mail, Calendar, etc., and a few others I didn't recognize like "NoName" and "NoUser".
I then unplugged the machine from ethernet, formatted the drive and reinstalled Yosemite and am in the process of reinstalling Server.
The only thing I can think of is within the AirPort Utility, I did not have the "Block incoming IPv6 connections" box checked (it is now!)
As I go through and rebuild my set up, what other security issues should I be on the look out for?
I will have multiple user accounts on the machine, and only allow one non admin to run the VPN, and one to run iTunes, and make the Admin account a very long password and not leave it logged in (I think I may have left the mini logged in with the Admin account).
I have since changed my AppleID password, and everything else that machine would have had in the Keychain (email, bank info, etc.). When I re-do the Mac Mini, I will not use it for any of that kind of communication.
Thanks for your thoughts!
I wanted to set up my own VPN. I have a late 2012 Mac Mini that I was using as an iTunes server and for EyeTV so I could watch US TV when I travel outside the states.
Purchased a copy of OSX Server, installed and configured the VPN it so it would actually connect with a fairly long VPN shared secret. Set up a 'noip" account with a static ip address. Changed the Airport Time Capsule set up to allow connections on ports 500, 1701, 4500 on UDP, but removed the TCP access for port 1723 as I was only planning on using the L2PP VPN.
Got everything up and running left the VPN on for a couple days, went to check the logs today and find a large amount of activity, words and comments I didn't understand, and it appears some of the log info was removed as the top statement was something along the lines of "log history removed". I realize now I should have kept a copy of the log, but didn't before I reformatted the drive.
But what really concerned me is in the "Users" list there are at least 50 "new" users, each with a name of a process Mail, Calendar, etc., and a few others I didn't recognize like "NoName" and "NoUser".
I then unplugged the machine from ethernet, formatted the drive and reinstalled Yosemite and am in the process of reinstalling Server.
The only thing I can think of is within the AirPort Utility, I did not have the "Block incoming IPv6 connections" box checked (it is now!)
As I go through and rebuild my set up, what other security issues should I be on the look out for?
I will have multiple user accounts on the machine, and only allow one non admin to run the VPN, and one to run iTunes, and make the Admin account a very long password and not leave it logged in (I think I may have left the mini logged in with the Admin account).
I have since changed my AppleID password, and everything else that machine would have had in the Keychain (email, bank info, etc.). When I re-do the Mac Mini, I will not use it for any of that kind of communication.
Thanks for your thoughts!