Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Networking Privacy Security IT

VPN Flaw Shows Users' IP Addresses 124

AHuxley writes "A VPN flaw announced at the Telecomix Cyphernetics Assembly in Sweden allows individual users to be identified. 'The flaw is caused by a combination of IPv6, which is a new Internet protocol due to replace the current IPv4, and PPTP (point-to-point tunneling protocol)-based VPN services, which are the most widely used. ... The flaw means that the IP address of a user hiding behind a VPN can still be found, thanks to the connection broadcasting information that can be used to identify it. It's also relatively easy to find a MAC address (which identifies a particular device) and a computer's name on the network that it's on.' The Swedish anti-piracy bureau could already be gathering data using the exploit."
This discussion has been archived. No new comments can be posted.

VPN Flaw Shows Users' IP Addresses

Comments Filter:
  • by Michael Kristopeit ( 1751814 ) on Monday June 21, 2010 @01:25PM (#32643296)
    it's also relatively easy to spoof an IP address or MAC address.
  • by bagboy ( 630125 ) <(ten.citcra) (ta) (oen)> on Monday June 21, 2010 @01:27PM (#32643318)
    has not been using pptp for vpn for quite some time. IPSEC (AES) anyone? Just sayin.
  • by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Monday June 21, 2010 @01:27PM (#32643322) Homepage Journal

    You don't need PPTP if you're using IPSEC and IPv6. Even Microsoft clients don't need it any more.

  • by Rijnzael ( 1294596 ) on Monday June 21, 2010 @01:33PM (#32643394)
    MAC address sure, since your device's MAC address isn't used after your packets reach the ISP's border. However, I invite you to try to establish a full duplex connection using a spoofed IP. Sure, you can send packets using a spoofed IP provided your ISP allows you to send packets for IP's which they don't announce, but you're not getting the response to that packet back. This is actually the basis for DDoS reflection attacks [plynt.com].
  • Any Network Admin worth his weight has not been using pptp for vpn for quite some time. IPSEC (AES) anyone? Just sayin.

    IPSEC doesn't have to use AES, it supports other ciphers. Further, PPTP does not specify encryption, but Windows clients use MPPE, which is RSA RC4.

  • Re:Tor (Score:3, Informative)

    by Rijnzael ( 1294596 ) on Monday June 21, 2010 @01:39PM (#32643488)
    The Tor nodes themselves are actually quite identified, as you can see by the hostnames/IP's of the nodes themselves. The clients are the ones who are anonymous, as is intended.
  • by SJ2000 ( 1128057 ) on Monday June 21, 2010 @01:58PM (#32643732) Homepage
  • by quantumplacet ( 1195335 ) on Monday June 21, 2010 @02:03PM (#32643802)

    assigning a second IP address, that you also control, to an interface is not 'spoofing' in any sense of the word. If you assign an IP address that I control, then you're spoofing, at which point you have the same problem in IP6 that you have in IP4.

  • by vlm ( 69642 ) on Monday June 21, 2010 @02:21PM (#32644008)

    Kind of two separate arguments.

    Lets look at the original posters claim

    MAC address sure, since your device's MAC address isn't used after your packets reach the ISP's border. However, I invite you to try to establish a full duplex connection using a spoofed IP.

    Now his point is that your MAC is irrelevant beyond your layer 2 link. OK, correct on ipv4.

    However, what if you use ipv6 and RFC 2462 "Stateless Address Autoconfiguration" which basically picks your ipv6 address based on your MAC address. Wedging a 48 bit mac address into, say, a /28 of ipv4 space isn't going to work too well, but wedging a 48 bit mac address into a /64 LAN of ipv6 works pretty well.

    http://www.ietf.org/rfc/rfc2462.txt [ietf.org]

    Now the argument is that no matter which ISP you connect to, or which starbucks you connect to, etc, you can always correlate that large collection of 128 bit ipv6 addresses in a log by trashing the upper 64 bits and figuring out which 48 bit mac addresses map into the /64 ipv6 addresses.

    Even worse, the top 24 bits of the mac define the device manufacturer, so no matter where you go in the world, people know you've got an apple, or whatever.

    So, "your device's MAC address isn't used after your packets reach the ISP's border" isn't really true if your layer 3 address depends directly on your layer 2 address.

    On the other hand, if instead of using your autoconfigured address, you fake or "spoof" some other random /64 on the LAN, then you can't be tracked. Now if you do this at work, your local net nanny is going to get all teed off that some "unknown" mac address is online, because look at that ipv6 address that doesnt match any known inventoried hardware MAC address.

    You can insist that using a "fake" MAC is not spoofing, or whatever, but then you're getting into pointless naming games.

  • Re:Tor (Score:3, Informative)

    by Tacvek ( 948259 ) on Monday June 21, 2010 @02:29PM (#32644110) Journal

    Somebody who listens to your tor traffic at your end has absolutely no way of telling who you are communicating with. so who you are talking to is just as hidden as what you say. All packets in the tor network are encrypted in such a way that the contents are only ever known by the exit node. There is little point in using SSL if sending a file to wikieaks via tor, since only wikileaks and the exit node would see the plaintext even over plain old http, and neither would be able to determine who or where the sender was. If wikileaks is going to publish what you sent anyway, so the exit node could see it upon publication, there is little reason to hide anything, unless there is identifying information in your submission that wikileaks has agreed not to republish. In that case using SSL over tor to talk to wikileaks makes good sense.

    You would use SSL over Tor only if there was some reason why the it would be undesirable for the exit node to hear what you are saying, and you also want to hide your identity or perhaps only your location from the server you are talking to.

  • Re:Tor (Score:3, Informative)

    by Hatta ( 162192 ) on Monday June 21, 2010 @02:30PM (#32644130) Journal

    The exit node might know that there's an SSL connection going through his computer that terminates at wikileaks. If everything is configured properly he should be unable to determine where that SSL connection originated.

  • by Anonymous Coward on Monday June 21, 2010 @03:05PM (#32644558)

    Unfortunately the talk is structured very poorly. The talk is about several deanonymization techniques: Flash, which allegedly does not respect proxy settings (I think it's an option), can be used to establish connections outside of the VPN if you can make the victim open a web page. Alternatives are image URLs with FTP or other protocols for which no proxy on the VPN is configured, etc. The IPv6 problem is of the same nature: If you link to an image with an IPv6 address in the URL, the request will not go through the VPN but through the normal IPv4 interface where the OS uses an IPv6 translation scheme which uses the real IPv4 and MAC addresses as part of the IPv6 address.

    The common idea between all these attacks is that not all connections are forced through the VPN (or dropped) and the applications can still see the local network environment and leak this information. This is a problem shared by all VPN technologies. If you want to avoid this, make a VPN router connect to the VPN and expose only the VPN to the local network. The only packets which are ever allowed on the real external IPv4 interface should be the encapsulated tunnel packets and packets necessary for setting up the tunnel. You can still leak information by (stupidly) making services available which leak local information (like network shares, browser services with identifying names, etc.).

Stellar rays prove fibbing never pays. Embezzlement is another matter.

Working...