BorgDrone ,

(…) the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user’s IP address.

No. That is not the entire point of a VPN. That’s just what a few shady companies are claiming to scam uninformed users into paying for a useless service. The entire point of a VPN is to join a private network (i.e. a network that is not part of the Internet) over the public internet, such as connecting to your company network from home. Hence the name ‘virtual private network’.

There are very little, if any, benefits to using a VPN service to browse the public internet.

the_third ,

Well, for one, using one of those VPN providers has kept DMCA takedown notices away from me or the hosting provider of my seed box. So that is useful.

Passerby6497 ,

There are very little, if any, benefits to using a VPN service to browse the public internet.

I've run into issues multiple times where a site doesn't load until I turn on my VPN with an endpoint in the EU

desktop_user ,

There are very little, if any, benefits to using a VPN service to browse the public internet.

accessing services that are blocked in your region.

lurch ,

that works, but a regular SOCKS proxy should do. for HTTP even a HTTP proxy. many VPN providers offer them too, btw.. may help with mitigating this attack vector.

mako ,

There are very little, if any, benefits to using a VPN service to browse the public internet.

This is why it's often best to just avoid the comments completely

vext01 ,
@vext01@lemmy.sdf.org avatar

Come to think of it, why do they even call this use case a VPN? I'd call that a proxy.

TipRing ,

I use option 121 as part of my work, though I am not an expert on DHCP. This attack does make sense to me and it would be hard to work around given the legitimate uses for that option.

runswithjedi ,

What are the legitimate uses of option 121?

Max_P ,
@Max_P@lemmy.max-p.me avatar

Adding routes for other thing on the network the clients can reach directly and remove some load from the router. For example, reaching another office location through a tunnel, you can add a route to 10.2.0.0/16 via 10.1.0.4 and the clients will direct the traffic directly at the appropriate gateway.

Arguably one should design the network such that this is not necessary but it's useful.

Nyfure ,

To be fair, any proper VPN setup that only relies on the routing table like this is flawed to begin with.
If the VPN program dies or the network interface disappears, the routes are removed aswell, allowing traffic to leave the machine without the VPN.
So it is already a good practice to block traffic where it shouldnt go (or even better, only allowing it where it should).

Cyberflunk ,

So..

reject 121;

In your dhclient?

homesweethomeMrL ,

there are no ways to prevent such attacks except when the user's VPN runs on Linux or Android.

So . . . unix? Everything-but-Windows?

freeman ,

Maybe it affects BSD and MacOS.

It also can affect some Linux systems based on configuration. Android doesn't implement the exploited standard at all and is always immune.

abhibeckert , (edited )

Everything-but-Windows?

No. Any device that implements a certain DHCP feature is vulnerable. Linux doesn't support it, because most Linux systems don't even use DHCP at all let alone this edge case feature. And Android doesn't support it because it inherited the Linux network stack.

I would bet some Linux systems are vulnerable, just not with the standard network packages installed. If you're issued a Linux laptop for work, wouldn't be surprised if it has a package that enables this feature. It essentially gives sysadmins more control over how packets are routed for every computer on the LAN.

ElderWendigo ,
@ElderWendigo@sh.itjust.works avatar

because most Linux systems don't even use DHCP

This is the dumbest thing I've heard all day.

gsfraley ,

most Linux systems don't even use DHCP

WTF are you smoking? WTF is wrong with you that you think such a dumb claim would go unscrutinized? I would play Russian roulette on the chances of a random Linux installation on a random network talking DHCP.

Edit, in case being charitable helps: DNS and IP address allocation aren't the only things that happen over DHCP. And even then the odds are overwhelming that those are being broadcast that way.

gravitas_deficiency ,

As of this writing, 5 people who don’t know how DHCP works saw this comment

Buelldozer ,
@Buelldozer@lemmy.today avatar

Meh, option 121 shenanigans can be detected and remediated via post connection scripting.

Got_Bent ,

Does this mean I still can't watch porn in Texas?

Imgonnatrythis ,

Aren't you aware of the loophole that you can as long as your cousin is in it and you hold a rosary while you watch it?

Coasting0942 ,

It’s means the government can watch you visit the porn site. The rest is their imagination.

RaoulDook ,

So if they are changing routes by using DHCP options, perhaps this could be exploited by telecom insiders when you are using mobile data, because your mobile data IP could be assigned by a DHCP server on the telecom network. If you're at home on wifi, then you can control your own DHCP server to prevent that.

rimu ,
@rimu@piefed.social avatar

No - the VPN provider has another DHCP server for use 'inside' the VPN.

SzethFriendOfNimi ,

Except this bypasses that I believe.

ignirtoq ,

The attack vector described in the article uses the VPN client machine's host network, i.e. the local network the device is attached to. They don't discuss the DHCP server of the VPN provider.

mox , (edited )

Read this part more carefully:

By pushing routes that are more specific than a /0 CIDR range that most VPNs use, we can make routing rules that have a higher priority than the routes for the virtual interface the VPN creates.

Most traffic gets sent through a VPN only because of a default gateway (set by the VPN) in the client's routing table. If the client's ISP were to have their DHCP server set one or more specific routes that are broad enough to cover most of the global address space, they would effectively override that default gateway. I believe that's the scenario described in the article.

Note that the "ISP" here could be a mobile operator, an internet cafe, an airport, someone running a wifi access point that looks like the airport's, or a guest on the same local network running an unauthorized DHCP server.

Max_P ,
@Max_P@lemmy.max-p.me avatar

Most VPN providers don't use DHCP. OpenVPN emulates and hooks DHCP requests client-side to hand the OS the IP it got over the OpenVPN protocol in a more standard way (unless you use Layer 2 tunnels which VPN providers don't because it's useless for that use case). WireGuard doesn't support DHCP at all and it always comes from configuration.

Max_P ,
@Max_P@lemmy.max-p.me avatar

The attack vector here seems to be public WiFi like coffee shops, airports, hotels and whatnot. The places you kinda do want to use a VPN.

On those, if they're not configured well such as coffee shops using consumer grade WiFi routers, an attacker on the same WiFi can respond to the DHCP request faster than the router or do an ARP spoof attack. The attacker can proxy the DHCP request to make sure you get a valid IP but add extra routes on top.

AnAnonymous ,

A good reason to never trust in shady VPNs.

autotldr Bot ,

This is the best summary I could come up with:


Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering.

TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user’s IP address.

The attack works by manipulating the DHCP server that allocates IP addresses to devices trying to connect to the local network.

A setting known as option 121 allows the DHCP server to override default routing rules that send VPN traffic through a local IP address that initiates the encrypted tunnel.

When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks.

This remedy is problematic for two reasons: (1) a VPN user connecting to an untrusted network has no ability to control the firewall and (2) it opens the same side channel present with the Linux mitigation.


The original article contains 903 words, the summary contains 196 words. Saved 78%. I'm a bot and I'm open source!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • kbinchat
  • All magazines