TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Novel attack against virtually all VPN apps neuters their entire purpose

204 pointsby quibussabout 1 year ago

19 comments

agwaabout 1 year ago
I mentioned attacks using DHCP option 121 (aka &quot;classless static routes&quot;) nearly 9 years ago in my blog post about attacks on OpenVPN: <a href="https:&#x2F;&#x2F;www.agwa.name&#x2F;blog&#x2F;post&#x2F;hardening_openvpn_for_def_con" rel="nofollow">https:&#x2F;&#x2F;www.agwa.name&#x2F;blog&#x2F;post&#x2F;hardening_openvpn_for_def_co...</a> (under &quot;Attacks on redirect-gateway&quot;)<p>It&#x27;s really hard to make a robust VPN.
评论 #40287317 未加载
评论 #40284904 未加载
dmmabout 1 year ago
Would isolating a Wireguard interface using namespaces as described here[0] mitigate this?<p>[0] <a href="https:&#x2F;&#x2F;www.wireguard.com&#x2F;netns&#x2F;#the-new-namespace-solution" rel="nofollow">https:&#x2F;&#x2F;www.wireguard.com&#x2F;netns&#x2F;#the-new-namespace-solution</a>
评论 #40285027 未加载
fxtentacleabout 1 year ago
&quot;there are no ways to prevent such attacks except when the user&#x27;s VPN runs on Linux or Android&quot;<p>I guess it really is the year of the Linux desktop :)
评论 #40285161 未加载
评论 #40285671 未加载
评论 #40286184 未加载
this_userabout 1 year ago
The real problem with all of this is that DHCP has a lot of weird legacy options that most people are not aware off and that may or may not be fully implemented on most clients, but some of which that are pretty powerful. And in practice, clients trust DHCP servers implicitly, because it&#x27;s an old protocol that didn&#x27;t really consider the possibility that you may be on a LAN where the DHCP cannot be trusted.
评论 #40285018 未加载
jacob019about 1 year ago
It seems that this is only an issue if there is a malicious actor present on the remote network. I&#x27;ve always considered VPN services to be snakeoil, and this doesn&#x27;t really seem like a problem with VPN technology at all. If you are connecting to an untrusted network, then you are at risk. This has always been true. From the VPN service providers perspective, can&#x27;t this be mitigated by blocking direct traffic between clients?
评论 #40289579 未加载
评论 #40285437 未加载
gz5about 1 year ago
Encapsulate and encrypt in the app itself, or in the browser.<p>App (via the openziti sdk): <a href="https:&#x2F;&#x2F;blog.openziti.io&#x2F;no-listening-ports" rel="nofollow">https:&#x2F;&#x2F;blog.openziti.io&#x2F;no-listening-ports</a><p>Browser (the openziti js sdk loads on the fly): <a href="https:&#x2F;&#x2F;blog.openziti.io&#x2F;introducing-openziti-browzer" rel="nofollow">https:&#x2F;&#x2F;blog.openziti.io&#x2F;introducing-openziti-browzer</a><p>Disclosure: openziti (apache v2) maintainer
评论 #40287280 未加载
londons_exploreabout 1 year ago
It&#x27;s because networks&#x2F;routing tables aren&#x27;t really designed with security principles in mind.<p>If they were, it would be a simple setting to set an ACL on the network interface to say &quot;DENY all traffic except from VPN application&quot;.
评论 #40284614 未加载
评论 #40289203 未加载
flufluflufluffyabout 1 year ago
Not my area of expertise — can somebody clarify if the DHCP server runs on your router, or your local machine? The article keeps mentioning it needs to be on the “same network” but the graphic seems like it’s all on one device.<p>edit: ahh I’m dumb, it’s the router (correct me if I’m wrong!). So as others have said, you have to already be on a compromised network, yes?
评论 #40286883 未加载
评论 #40286090 未加载
jaggsabout 1 year ago
Android phones running VPNs are apparently still secure. They&#x27;re recommending using phone as hotspots if you can.
gipsiesabout 1 year ago
There needs to be extra evidence before claiming that &quot;virtually all VPNs apps&quot; are vulnerable. From my understanding, they tested WireGuard on multiple platforms. However, other VPN clients may install extra firewall rules, I&#x27;ve seen that happen with VPNs on Windows&#x2F;macOS&#x2F;Linux.
avsteeleabout 1 year ago
So every company who uses VPNs to allow their people to get into the network from offsite (customer site, airport, hotel) now can&#x27;t safely?<p>You basically have to trust everyone on the remote LAN to not act like a malicious DHCP server.<p>Reading the other thread, this wouldn&#x27;t even be just the gateway.. Sounds bad!
评论 #40284706 未加载
评论 #40284949 未加载
评论 #40284606 未加载
评论 #40285337 未加载
betabyabout 1 year ago
Attack assumes that someone already controls DHCP. If bad actor controls DHCP you have a bigger problem.
评论 #40287025 未加载
评论 #40285932 未加载
评论 #40286604 未加载
评论 #40286984 未加载
评论 #40285975 未加载
评论 #40286997 未加载
PeterStuerabout 1 year ago
My VPN provider claims I&#x27;m not vulnerable to this by default (running this VPN endpoint on a spare ASUS Router (<a href="https:&#x2F;&#x2F;www.expressvpn.com&#x2F;blog&#x2F;tunnelvision-expressvpns-statement-and-assessment-of-the-technique&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.expressvpn.com&#x2F;blog&#x2F;tunnelvision-expressvpns-sta...</a>)
username135about 1 year ago
One thing ive seen overlooked is the mention of trusted vs untrusted networks.
yencabulatorabout 1 year ago
Adding routes via DHCP does nothing to my VPN that is activated by fwmark.
M95Dabout 1 year ago
TLDR explanation:<p>- User connects to an untrusted network (public wifi).<p>- That network uses DHCP to assign IP address for the user.<p>- A malicious DHCP would push static routes via DHCP that are more specific than a common default route, and send traffic via a malicious gateway.<p>- User connects to his&#x2F;her VPN thinking his&#x2F;her traffic is secured over the insecure network.<p>- The malicious static routes, being more specific, take precedence over the default route added by the VPN.
betabyabout 1 year ago
Wait til they learn you can initiate booting the whole OS through DHCP + tftp.
评论 #40286877 未加载
bell-cotabout 1 year ago
And yet another time when a strict policy of &quot;Always Ban the OhSoCoolConvenientKludgeTech for anything that could matter&quot; turns out to look like a genius move. :(
评论 #40285296 未加载
yarisabout 1 year ago
Dupe? <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=40279632">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=40279632</a>