Hello, A bit late to jump into this one but it's now hot for us as we switch to NC split-tunneling with access to local subnet for our employees (68K). http://en.wikipedia.org/wiki/DNS_hijacking#Manipulation_by_ISPs is an interesting one. The concern about WIndows machines sending traffic to non corporate DNS servers is genuine, and a risk for us. So, if it is a risk then why not switching back to no tunneling at all? Good question... And some answers (side note: we have a forest made of several domains, thus the DNS search list is not made of a single entry) Although using NC for the time being, we are looking for Junos Pulse in the future. The "Location awarness" feature which may trigger the tunnel establishment is attractive. DNS hijacking will break it as our users often enter non FQDN hostnames in whatever program they are using. Regarding Web browsing, we are going to switch from a proxy PAC file settings model to no proxy settings at all: WCCP, thus routing will do the job. Sending browsing traffic to the corporate forward-proxy's via the tunnel is non-sense (assessing the risk of split-tunneling is not for this particular DNS topic). Ideally, I'd be happy to see NC or Pulse tricking the hijacking made by these ISP (which are somehow breaking the RFC by the way. Read this if interested http://www.icann.org/en/committees/security/sac032.pdf ). I meant: ideally, Juniper is providing a workaround. Another quick(?) fix would be to create a list of these hijacker DNS Server IPs, a kind of ongoing community work. The file could be fetched by simple http get (of course, some security mechanisms should be put in place to avoid wrong IP to be there, but it's not the point at this stage). This file could be then used to feed the NC allow Tunneling policies so that traffic for these IP are routed into the tunnel.... Not sure it would do, but it could be worth the try :-). Who is connected via an ISP which is doing such nasty resdirections and want to test the above? Feedback would be more than welcome! Cheers, //P
... View more