Pinterest Stumbleupon Whatsapp
Ads by Google

Virtual Private Network What A VPN Tunnel Is & How To Set One Up What A VPN Tunnel Is & How To Set One Up Read More  is a really useful tool for protecting your privacy and staying anonymous online. VPNs work by passing your Internet connection through another computer (called an “endpoint), using an encrypted tunnel. This means that anyone situated between your computer and the endpoint is unable to see what you’re doing. It also means that you’re disguised as the endpoint to any computers your machine connects to. Put simply, it hides your IP address.

But a vulnerability in many VPN providers recent discovered by Perfect Privacy puts that last point in doubt. This security flaw could potentially see people lose their anonymity whilst using VPNs. Here’s how.

The Vulnerability

So, how does the attack (which has been dubbed “Port Fail”) work? Well, first, a few conditions need to be met.

Firstly, the VPN provider and the attacker have to have port-forwarding enabled. This is where the IP address and port number changes while the packet is traversing the network. For some background reading on this, check out our piece on Network Address Translation What Is Network Address Translation (NAT) and How Does It Work? What Is Network Address Translation (NAT) and How Does It Work? Read More (NAT). The attack still works if the victim doesn’t have port forwarding enabled.

The attacker has to also have an account with the VPN they’re targeting, and know the IP address of the VPN endpoint the user is using. This can be found by watching a BitTorrent swarm (all the peers connected to a single torrent), or by monitoring an IRC.

Ads by Google

peers

Then, the attacker connects to the same VPN endpoint as the victim, and waits for them to visit a malicious webpage that’s under the control of the attacker. This can often be accomplished by embedding the webpage in a legitimate site, either as an image hosted on the webserver or as an iFrame. From this, it becomes possible to deduce the real IP address of the person being targeted.

Who Was Affected

Some of the biggest names in VPNs were affected by this vulnerability. This included Ovpn.to, nVPN, and Private Internet Access (PIA). All of whom were informed about the vulnerability before it was disclosed, and were able to issue a fix before it became public knowledge. Speaking to TorrentFreak, Private Internet Access said:

“We implemented firewall rules at the VPN server level to block access to forwarded ports from clients’ real IP addresses. The fix was deployed on all our servers within 12 hours of the initial report”.

PIA also gave Perfect Privacy a $5,000 bug bounty in recognition of their efforts, and the fact they disclosed the vulnerability in a responsible manner. In the past, we’ve written extensively about the ethics of vulnerability disclosure Full or Responsible Disclosure: How Security Vulnerabilities Are Disclosed Full or Responsible Disclosure: How Security Vulnerabilities Are Disclosed Security vulnerabilities in popular software packages are discovered all the time, but how are they reported to developers, and how do hackers learn about vulnerabilities that they can exploit? Read More , and how it’s almost always better to inform the vendor before releasing the vulnerability to the wild.

Of course, there are thousands of VPN providers. Whilst some have issued fixes, it’s likely many more have not.

Why This Matters

People use VPNs for a variety of reasons 8 Instances You Weren't Using a VPN, but Should've Been: The VPN Checklist 8 Instances You Weren't Using a VPN, but Should've Been: The VPN Checklist If you haven't already considered subscribing to a VPN to secure your privacy, now is the time. Read More . Many people use them to defeat georestrictions The Ultimate Guide to Watching Online TV with Private Internet Access The Ultimate Guide to Watching Online TV with Private Internet Access Virtual private networks (VPNs) allow you to push your network traffic through an encrypted tunnel, making it easy to hide your identity, and to browse the Internet securely when using a public access points. Read More on Internet TV sites. Some use them to secure their communications while using a public Wi-Fi hotspot. Others use them to defeat government censorship and surveillance, or to download movies and music illegally without getting sued.

georestriction

For those in the latter category, the discovery of this vulnerability will be of real concern. As always, your only real option is to vote with your wallet, and subscribe to a VPN provider that’s been confirmed to have patched this vulnerability.

Personally speaking, I’m a huge fan of Private Internet Access Secure Your Browsing Activity With Private Internet Access VPN [Giveaway] Secure Your Browsing Activity With Private Internet Access VPN [Giveaway] We're giving away 10 Private Internet Access accounts valid for one year! Read our walkthrough then join the giveaway! Read More , and would recommend them any day of the week. For a more detailed look at the market, check out our list of the best VPN services. There are also some free VPN services, too.

Stay Secure

When using a VPN, there’s few things you can do to improve your privacy. Firstly, you can configure your computer to protect against DNS leaks How DNS Leaks Can Destroy Anonymity When Using a VPN, And How to Stop Them How DNS Leaks Can Destroy Anonymity When Using a VPN, And How to Stop Them When you're trying to stay anonymous online, a VPN is the simplest solution, by masking your IP address, service provider, and location. But a DNS leak can totally undermine the purpose of a VPN... Read More , which can utterly undermine your anonymity. Furthermore, consider turning off JavaScript (what is JavaScript? What is JavaScript, And Can the Internet Exist Without It? What is JavaScript, And Can the Internet Exist Without It? JavaScript is one of those things many take for granted. Everybody uses it. Read More ) in order to defend against Canvas Fingerprinting attacks Canvas Fingerprinting Will Track You Everywhere You Go. Here's Why You Should Be Worried Canvas Fingerprinting Will Track You Everywhere You Go. Here's Why You Should Be Worried Read More . It’s worth pointing out that this can have an adverse effect on your browsing experience, and many (including James Bruce; our Chief Web Officer) advise against of it AdBlock, NoScript & Ghostery - The Trifecta Of Evil AdBlock, NoScript & Ghostery - The Trifecta Of Evil Over the past few months, I've been contacted by a good number of readers who have had problems downloading our guides, or why they can't see the login buttons or comments not loading; and in... Read More .

Have you got any other strategies for improving your privacy when using a VPN? Tell me about them in the comments below.

Image Credit: Server racks by Oleksiy Mark via Shutterstock

  1. Dennis in Japan
    November 30, 2015 at 3:48 pm

    The article stated "check out our list of the best VPN services".

    Wish it had provided a link.
    As of: 2015/05/07

    http://www.makeuseof.com/tag/best-vpn-services/

  2. fcd76218
    November 29, 2015 at 11:16 pm

    "This can be found by watching a BitTorrent swarm (all the peers connected to a single torrent), or by monitoring an IRC."
    So, if one uses neither BitTorrent nor IRC, one is not vulnerable to this exploit?

    • Matthew Hughes
      November 30, 2015 at 1:36 pm

      Nope, those were just two examples of how you could identify someone's IP address.

Leave a Reply

Your email address will not be published. Required fields are marked *