this post was submitted on 07 May 2024
149 points (98.1% liked)

Technology

34125 readers
71 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
all 20 comments
sorted by: hot top controversial new old
[–] [email protected] 47 points 3 months ago (1 children)

The researchers believe it affects all VPN applications when they’re connected to a hostile network and that there are no ways to prevent such attacks except when the user's VPN runs on Linux or Android.

Once again, Linux with a win!

[–] [email protected] 14 points 3 months ago

Partially. The summary isn’t quite in line with the detail:

Android is the only operating system that fully immunizes VPN apps from the attack because it doesn't implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks.

[–] [email protected] 28 points 3 months ago

Really interesting. Dhcp optional routes overriding VPN tunnel routing rules.

[–] [email protected] 24 points 3 months ago (2 children)

Dang option 121.

I told him 120 options was enough, but he just had to keep adding options.

[–] [email protected] 12 points 3 months ago (2 children)

120 options should be enough for anyone.

[–] [email protected] 7 points 3 months ago

119 is too few and 121 is too many.

[–] [email protected] 3 points 3 months ago

120 options is too many, we should make standard that works for everyone

[–] [email protected] 21 points 3 months ago

Any vpn solution that uses a TCP/IP shim in full tunnel mode will ignore option 121 or any other routing options (static routes, etc). Most corporate VPNs like Global Protect/Cisco Any Connect, Appgate, etc will enforce full-tunnel. Any user who is using a VPN for privacy reasons should also use a full tunnel as well especially when connecting to an untrusted networks.

[–] [email protected] 18 points 3 months ago (1 children)

Why doesn't my internet look like that stock image tunnel of 1 and 0?

[–] [email protected] 23 points 3 months ago

Skill issue

[–] [email protected] 6 points 3 months ago (1 children)

Linux and android unaffected, go figure. Anyway..

[–] [email protected] 6 points 3 months ago (1 children)

Not quite what the article says:

When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks. Network firewalls can also be configured to deny inbound and outbound traffic to and from the physical interface. This remedy is problematic for two reasons: (1) a VPN user connecting to an untrusted network has no ability to control the firewall and (2) it opens the same side channel present with the Linux mitigation.

[–] [email protected] 3 points 3 months ago (1 children)

It only works if you have split tunnel setup, which I don't think anybody does for commercial privacy VPNs

[–] [email protected] 4 points 3 months ago (1 children)

Do you mean the attack only works against people with a split tunnel setup?

[–] [email protected] 3 points 3 months ago
[–] [email protected] 3 points 3 months ago

How did nobody discover this sooner if it is a common network option? This seems like it should have been well known to professionals. Who dropped the ball?

[–] [email protected] 0 points 3 months ago

Your vpn should be running on a middlebox and have firewall rules to prevent leaks.