Unable to load image

VPN exploit discovered (that's been possible since 2002) and literally cucks everyone :chadstevejobsgenocide: :marseypenguingenocide: :marseybsodgenocide: except Android enjoyers :marseygigachad:

https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/

TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user's IP address. The researchers believe it affects all VPN applications when they're connected to a hostile network and that there are no ways to prevent such attacks except when the user's VPN runs on Linux or Android. They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then.

( . . . . )

Interestingly, Android is the only operating system that fully immunizes VPN apps from the attack because it doesn't implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there's a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks. Network firewalls can also be configured to deny inbound and outbound traffic to and from the physical interface. This remedy is problematic for two reasons: (1) a VPN user connecting to an untrusted network has no ability to control the firewall and (2) it opens the same side channel present with the Linux mitigation.

:!#marseygossipsmug: :#marseyglowtyping: :#marseygossipretard:

103
Jump in the discussion.

No email address required.

Jump in the discussion.

No email address required.

Bros! This works! It deactivates the security loophole!

Jump in the discussion.

No email address required.

Holy god android :marseyappicon: bros can we EVER STOP WINNING????

Jump in the discussion.

No email address required.

!codecels iToddlers btfo :marse!#ysmug2:

Jump in the discussion.

No email address required.

Greenbubblecels be seething at bluebubblechads.

Jump in the discussion.

No email address required.

I found it really funny when iCels were all chuffed that they could run emulators on their phones even though I did that on my first Android phone and got bored with it >10 years ago.


https://i.rdrama.net/images/17187151446911044.webp https://i.rdrama.net/images/17093267613293715.webp https://i.rdrama.net/images/17177781034384797.webp

Jump in the discussion.

No email address required.

I installed emus on my Moto Droid X while riding my dinosaur. I still load them all on my latest devices yet never really use them.

Do iKiddies have to root their phones and side load to get emus or something? I can't imagine Apple making deals to charge 30% of apps that are potentially for pirating old games.

Jump in the discussion.

No email address required.

Do iKiddies have to root their phones and side load to get emus or something? I can't imagine Apple making deals to charge 30% of apps that are potentially for pirating old games.

They finally got allowed on the App store due to a ToS change. It was the big hub-bub on twitter for a few days a few weeks ago


https://i.rdrama.net/images/17187151446911044.webp https://i.rdrama.net/images/17093267613293715.webp https://i.rdrama.net/images/17177781034384797.webp

Jump in the discussion.

No email address required.

Imagine their smugness if Apple "invented" an expandable memory port

Jump in the discussion.

No email address required.

I rooted an old iPhone back in the day to play emulators on it. Must've been like an

iPhone 2 or something it was over a decade ago

Jump in the discussion.

No email address required.

Are your bubbles blue though?

Jump in the discussion.

No email address required.

Androidcels' data remains safe from any prying eyes who want to listen in on all the discussion about how much s*x they aren't having.

Jump in the discussion.

No email address required.

hacks u in indian

Jump in the discussion.

No email address required.

>but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks

Sounds like you're not safe either.

Jump in the discussion.

No email address required.

On Linux, Android :marseysnappy: specifically denies it in a hardware level indinig

Jump in the discussion.

No email address required.

Whatever you say greenbubblecel.

Jump in the discussion.

No email address required.

I don't use a VPN so I'm fine :marseyindignantretard:

Jump in the discussion.

No email address required.

Me neither. We're the real chads.


Krayon sexually assaulted his sister. https://i.rdrama.net/images/17118241526738973.webp https://i.rdrama.net/images/17118241426254768.webp https://i.rdrama.net/images/17156480765435808.webp

Jump in the discussion.

No email address required.

The only people that need to use VPNs are criminals.

Jump in the discussion.

No email address required.

I have paid $0 for games, shows, movies, and books in the past year.

https://i.rdrama.net/images/1715043901031111.webp

Jump in the discussion.

No email address required.

I have paid $0 for games, shows, movies, books and VPNs for the past five years

:gigachad4#:

Jump in the discussion.

No email address required.

if you use VPNs for anything except pirating or ban evasion you're a brainlet and deserve what you get coming

Jump in the discussion.

No email address required.

I don't even vpn to pirate, I ain't paying for that shit


:#marseyviewerstaretalking:

Jump in the discussion.

No email address required.

I'd pirate VPNs if that was possible :whitesicko:

Jump in the discussion.

No email address required.

It is possible, just steal someone elses credit card

Jump in the discussion.

No email address required.

internet piracy is ethical, they said

it's not a gateway drug to real life piracy and no one is gonna start swashbuckling and looting, they said

Jump in the discussion.

No email address required.

i used to do that a long time ago but my ISP sent me a physical letter yelling at me for torrenting the first 10 seasons of the simpsons

Jump in the discussion.

No email address required.

that's all they can do lol. I got cease and desists a couple times from my ISP when I was younger, just ignore them and file it in that special filing cabinet. It's not illegal to pirate except for when you are making money off the pirated shit. Consumer downloads are fine ISPs will just sent a letter to your house that you are downloading porn so your parents yell at you

Jump in the discussion.

No email address required.

i could have sworn i heard stories of people getting their internet shut off because they pirated stuff. but thats good to know that i wont get in trouble :marseythumbsup:

Jump in the discussion.

No email address required.

They went hard after a bunch of random consumers twenty years ago, and between that and the letters it instilled the fear of consequences in a lot of people. But no one gets done for that sort of thing now, it's far more about DCMA claims against YouTubers, whether it's fair use or not.

Pirate away.

Jump in the discussion.

No email address required.

Warner still sends ISPs notices, so in theory you can get still get your service cut off for piracy, but it's generally not worth it to take anyone to court for it these days.

Jump in the discussion.

No email address required.

I VPNd to my house :marseyvampirecrusader: once :#marseybigbrain:

Jump in the discussion.

No email address required.

>except android and linux users

:#marseypenguin: :#gigachad2:

Jump in the discussion.

No email address required.

When apps run on Linux there's a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks.

Jump in the discussion.

No email address required.

oh fugg, i only read the first few bits before eating dinner

:#marseyitsover:

Jump in the discussion.

No email address required.

The attack works by manipulating the DHCP server that allocates IP addresses to devices trying to connect to the local network. A setting known as option 121 allows the DHCP server to override default routing rules that send VPN traffic through a local IP address that initiates the encrypted tunnel. By using option 121 to route VPN traffic through the DHCP server, the attack diverts the data to the DHCP server itself.

:#marseynothingburger:

Jump in the discussion.

No email address required.

explain for me and my flock of !r-slurs

Jump in the discussion.

No email address required.

From a fellow r-slur

Normally you -> router(sends to) -> VPN server

A DHCP basically assigns who's who on your local network (wifi)

By changing this DHCP setting it becomes

You -> (DHCP server controlled by :marseyhacker:) -> router -> vpn server

Meaning :marseyhacker: can see where the data is heading to and potentially control where it comes from and what's coming back.

BUT this can only be done on your LOCAL network, meaning your WiFi has to be controlled by :marseyhacker: for him to do this. Meaning on stuff like public WiFi it's a threat.

If :marseyhacker: tries to do this at your home, he's in range for :marseydomesticabuse2: :marseybattered: :marseypunching:a beat down

Jump in the discussion.

No email address required.

:marseybrainletclapping: :chadthankskingcapy:

i imagine cell networks are resilient to such a thing

Jump in the discussion.

No email address required.

lol no cell networks are only secure until some engineer pokes around. All things are insecure since we send info to one another and to figure which gets what we need to be open.

However it's a nothingburger since the network has to be compromised and that has always been a dangerous thing itself

Jump in the discussion.

No email address required.

However it's a nothingburger since the network has to be compromised and that has always been a dangerous thing itself

Now that it's common knowledge that you can perform this exploit, it seems like a something burger. Previously you could use your vpn in public and there was a super small chance of this exploit being present.


Putting the :e: in spookie turkey

Jump in the discussion.

No email address required.

Should've proper authentication and encryption mean this is a nothing issue? It's just redirecting traffic through the DHCP shit which already handled assigning ips, but if the data is encrypted snooping it doesn't do anything no different than wireshark but less gay.

https://old.reddit.com/r/homelab/comments/1cltprg/comment/l2wbsu5/?context=8

>In other words, you're staying at a hotel, the hotel has garbage security on their WiFi network, and some attacker manages to get control of it and takes over the DHCP server (or disables the DHCP server and launches their own). You, sitting in your hotel room, connect to the hotel WiFi, then immediately open up a VPN back home so you can route all your traffic through your trusted home network. This attack breaks your VPN connection, so while your computer reports it's sending all traffic through the VPN, in reality it's not, it's sending it unencrypted through the hijacked DHCP server on the hotel network.

Jump in the discussion.

No email address required.

just use tor

Jump in the discussion.

No email address required.

Yeah so the fbi can steal :marseychildcatcher: my Naruto :marseysharingan: dubs, no thanks

Jump in the discussion.

No email address required.

This doesn't look like it affects tor but I'm not a giga neurodivergent so idk :marseyshrug:

Jump in the discussion.

No email address required.

a wise assumption :marseyclueless:

Jump in the discussion.

No email address required.

there are no ways to prevent such attacks except when the user's VPN runs on Linux or Android.

:marseype#nguin: :gigachad#2:

Jump in the discussion.

No email address required.

I'm assuming vpn companies will do something about this now? I only use vpns for tv shows so idgaf really, not important enough to target either as I'm a total loser, but interesting nonetheless

Jump in the discussion.

No email address required.

It seems to be the actual network you're using that allows it. Nothingburger if you're on home wifi but bad shit if you're a criminal who uses public ones.

Maybe one precaution could be to force all traffic to be routed on your device idk not smart

The traffic is being messed with at the router level so if the vpn traffic is being directed to the router then directed to the device. So shouldn't encryption handle that or something?

Jump in the discussion.

No email address required.

Idk why the feds wouldn't ask all ISP's to do this unless it really is a big ask.

I don't know if it does. But honestly it seems like with an exploit this huge there should have a been a lot of opportunities to bust really bad actors or enemy's of the state? Or maybe they did but planted something else on them to no reveal their methods?

Jump in the discussion.

No email address required.

I read other places, basically it's messing with the routers DHCP server for a WiFi network.

The attacker modifies it so your traffic goes to them before being sent to the vpn server, meaning they can peep into it unless your device is encrypting the data before sending to the DHCP server which directs it to the vpn server.

It would be a really big ask as it's something your server used to allocate where traffic inside the network goes and assigns devices local ips and handles outbound traffic (probably) which is why only a hostile / compromised network is vunerable. Which if that's already the case you're frick being there already

Jump in the discussion.

No email address required.

The attacker modifies it so your traffic goes to them before being sent to the vpn server, meaning they can peep into it unless your device is encrypting the data before sending to the DHCP server which directs it to the vpn server.

This has to be the biggest :marseynothingburger: then, why would anyone use a VPN that doesn't have encryption? The worse case scenario is them recording the encrypted data in the hopes of decrypting it later, but they're already doing that.

Jump in the discussion.

No email address required.

Technically they can figure out the destination and make sure to capture everything from the tunneled device in case they don't have a kill switch and leak anything.

Even the Reddit thread I dug up everyone was joking about how a BASIC routing setting is considered a “major vulnerability”

Jump in the discussion.

No email address required.

im sure some nerd linux that doesn't implement option 121 will appear in a bit. interesting stuff

Jump in the discussion.

No email address required.

won't this only affect you if you're on a device connected to a hostile network? or am i reading this wrong. if so, then no big deal unless you're connecting to kiwifarms on your work wifi or something

Jump in the discussion.

No email address required.

Jump in the discussion.

No email address required.

yayyy I've mostly only used my VPN on my phone :marseyparty:

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.