Unable to load image

VPN exploit discovered (that's been possible since 2002) and literally cucks everyone :chadstevejobsgenocide: :marseypenguingenocide: :marseybsodgenocide: except Android enjoyers :marseygigachad:

https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/

TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user's IP address. The researchers believe it affects all VPN applications when they're connected to a hostile network and that there are no ways to prevent such attacks except when the user's VPN runs on Linux or Android. They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then.

( . . . . )

Interestingly, Android is the only operating system that fully immunizes VPN apps from the attack because it doesn't implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there's a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks. Network firewalls can also be configured to deny inbound and outbound traffic to and from the physical interface. This remedy is problematic for two reasons: (1) a VPN user connecting to an untrusted network has no ability to control the firewall and (2) it opens the same side channel present with the Linux mitigation.

:!#marseygossipsmug: :#marseyglowtyping: :#marseygossipretard:

103
Jump in the discussion.

No email address required.

Should've proper authentication and encryption mean this is a nothing issue? It's just redirecting traffic through the DHCP shit which already handled assigning ips, but if the data is encrypted snooping it doesn't do anything no different than wireshark but less gay.

https://old.reddit.com/r/homelab/comments/1cltprg/comment/l2wbsu5/?context=8

>In other words, you're staying at a hotel, the hotel has garbage security on their WiFi network, and some attacker manages to get control of it and takes over the DHCP server (or disables the DHCP server and launches their own). You, sitting in your hotel room, connect to the hotel WiFi, then immediately open up a VPN back home so you can route all your traffic through your trusted home network. This attack breaks your VPN connection, so while your computer reports it's sending all traffic through the VPN, in reality it's not, it's sending it unencrypted through the hijacked DHCP server on the hotel network.

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.