I have a setup where I issue openvpn certificates to clients to redirect their traffic to specific sites. It's important to restrict the sites each client is redirected to.
Each client has the IPs that should be routed in the server in client-configs/config-dir/ like this: push route 123.123.123.123 255.255.255.255.
Clients are given an ovpn file with their keys and configurations to setup on their terminals. The issue is that a client could potentially edit their ovpn file and route more traffic through the VPN even though the new routes are not on the server side configs. This would allow them to access sites that they should not.
Is there a solution to restrict this behavior or maybe another tool I could use?
Notes:
- OpenVPN server has only one public IP attached and is forwarding traffic.
- Locking down permissions is not an option because this is a BYOD scenario.
- Outbound firewall restrictions on the openvpn server is also not an option because each client is routed to a different set of IPs.