Critical Port Fail Vulnerability Reveals Real IP Addresses of VPN Users 




Critical Port Fail Vulnerability Reveals Real IP Addresses of VPN Users



Noredine BAHRI
Noredine BAHRI
  • Technical Writer
  • Entrepreneur
  • Founder and CEO
  • Developer
  • Blogger and IT Analyst
2015-11-29 13:40:46

| Share
| Share
| Share
Critical Port Fail Vulnerability Reveals Real IP Addresses of VPN Users

A newly discovered flaw affecting all VPN protocols and operating systems has the capability to reveal the real IP-addresses of users' computers, including BitTorrent users, with relative ease.

The vulnerability, dubbed Port Fail by VPN provider Perfect Privacy (PP) who discovered the issue, is a simple port forwarding trick and affects those services that:

Allow port forwarding

Have no protection against this specific attack

Port Forwarding trick means if an attacker uses the same VPN (Virtual Private Network) as the victim, then the real IP-address of the victim can be exposed by forwarding Internet traffic to a specific port.

"The crucial issue here is that a VPN user connecting to his own VPN server will use his default route with his real IP address, as this is required for the VPN connection to work," Perfect Privacy wrote in a blog post on Thursday.

Also Read: This $10 Device Can Guess and Steal Your Next Credit Card Number before You have Received It

Port Fail affects all VPN protocols including…

OpenVPN

IPSec

…as well as applies to all operating systems, posing a huge privacy risk.

How Does 'Port Fail' Work?

A successful IP address leak attack requires an attacker to be on the same VPN network as the victim and to know the victim's VPN exit IP address, which could be discovered by tricking a victim into visiting a website control controlled by the attacker.

For example, an attacker with port forwarding enabled can see the request from the victim's actual IP addresses by tricking the victim into opening an image file.

The same attack is possible for BitTorrent users, but, in this case, there is no need for the attacker to redirect the victim to their page.

In this case, the attacker only with the activated port forwarding for the default BitTorrent port, can expose the real IP-address of a VPN user on the same network.

Also Read:Dell - Laptops are infected with Superfish-Like pre-installed Malware​

Affected VPN Providers

The flaw affected various large VPN providers. Perfect Privacy tested nine VPN providers out of which five were found to be vulnerable to this flaw and were alerted last week.

VPN providers including Private Internet Access (PIA), Ovpn.to and nVPN have fixed the issue before publication.

However, the company warned, "other VPN providers may be vulnerable to this attack as we could not possibly test all."

VPN aims to make you sure that your real identity remains anonymous on the Internet so that nobody could track the origin of your connection back to you, but this newly discovered flaw shows that it's quite easy to bypass this on some VPN providers.

 

click the next for more ...
WITH THE LENOVO RAZER EDITION PC, TWO COMPANIES LAUNCH A GAMING HARDWARE PARTNERSHIP
WITH THE LENOVO RAZER EDITION PC, TWO COMPANIES LAUNCH A GAMING HARDWARE PARTNERSHIP
WITH THE LENOVO RAZER EDITION PC, TWO COMPANIES LAUNCH A GAMING HARDWARE PARTNERSHIP

.
Google following your every move here is how to limit it
Google following your every move here is how to limit it

As it turns out, even when you opt to limit Google's ability to track your location when using its search function or apps, some of your time-stam


Google following your every move here is how to limit it
TensorFlow 1.10 has just been released. Here’s what’s new.

Tensorflow, the popular Machine Learning framework, just released its version 1.10 on 09/08/2018. As any data scientist worthy of this name, ignoring


Google following your every move here is how to limit it
HOW! Lets Users Modify Group Chats in Whatsapp to Spread Fake News with WhatsApp Flaw

WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicio


Google following your every move here is how to limit it
Twitter CEO defends decision not to ban Alex Jones and InfoWars

Twitter CEO Jack Dorsey has doubled down on defending his company's decision not to kick far-right conspiracy theorist Alex Jones off its platform


Google following your every move here is how to limit it
7 Reasons to Switch to the Dvorak Keyboard Layout

“Something’s wrong with your keyboard,” a friend borrowing my laptop would say. “When I type, all that comes out is gibberish!


Google following your every move here is how to limit it
HACKADAY SUPERCONFERENCE: TICKETS AND PROPOSALS

This is the ultimate hardware conference. Hackers, designers, and engineers from all over the world converge — from the greenest beginners to th



© 2013-2018 best of geeks. All rights reserved.