Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security //

VPN

3/30/2018
09:35 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

VPNs Are Still Leaking Your Personal Information

While VPNs are supposed to allow for safe, anonymous browsing, it turns out that STUN servers on the backend can still leak personal information and your whereabouts. Here's how to minimize that.

It has been found by a security researcher that almost one quarter -- 23% to be exact -- of current Virtual Private Networks (VPNs) will leak a user's true IP address due to a well-known, three-year-old vulnerability in a service that is enabled in most browsers by default.

However, let's start at the beginning.

WebRTC is open source software that provides browsers and mobile applications with Real-Time Communications (RTC) capabilities via simple APIs. Network, audio and video components used in voice and video chat applications can be simply built using WebRTC.

Session Traversal Utilities for NAT (STUN) servers are used to traverse networks by WebRTC. However, they are also used by VPNs when they execute the back-and-forth translation from a local home IP address to a new public IP address.

In January 2015, Daniel Roesler found that STUN servers will keep records of the user's public IP address and private IP address if the client is behind a NAT network, proxy or VPN client. Not only that, these servers will share this information with any other website if they had a WebRTC connection with a user's browser.

This means that it could be also used to de-anonymize and trace users behind common privacy protection methods such as a VPN, SOCKS Proxy, or HTTP Proxy. Tor users were also found to be vulnerable to tracking from this method before hardening was done.

Browser makers attempted to somewhat mitigate the problem, but most left WebRTC active in the end.

Still, browsers that have WebRTC running by default include Brave, Mozilla Firefox, Google Chrome, Internet (Samsung Browser), Opera, and Vivaldi. The Tor Browser, Microsoft Edge, and Internet Explorer do not enable by default.

Paolo Stagno wanted to see if the situation with WebRTC and VPNs had changed. He did some testing and posted the results on his blog. He found that VPNs from several vendors were still leaking local IPs if a browser had WebRTC active.

In his post, Stagno admits he didn't test every VPN out there and asked his readers to contribute their own results from other VPNs when they went to a WebRTC test page that he set up.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

Stagno gives these tips for anonymous surfing:

  • Disable WebRTC
  • Disable JavaScript (or at least some functions. Use NoScript)
  • Disable Canvas Rendering (Web API)
  • Always set a DNS fallback for every connection/adapter
  • Always kill all your browsers instances before and after a VPN connection
  • Clear browser cache, history and cookies
  • Drop all outgoing connections except for VPN provider

Another method might be to establish the VPN connection from your local router to it, rather than directly from your computer.

VPNs may not be as secure as users would like to think. Unless there is perfect end-to-end security, information may still leak out.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24213
PUBLISHED: 2020-09-23
An integer overflow was discovered in YGOPro ygocore v13.51. Attackers can use it to leak the game server thread's memory.
CVE-2020-2279
PUBLISHED: 2020-09-23
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM.
CVE-2020-2280
PUBLISHED: 2020-09-23
A cross-site request forgery (CSRF) vulnerability in Jenkins Warnings Plugin 5.0.1 and earlier allows attackers to execute arbitrary code.
CVE-2020-2281
PUBLISHED: 2020-09-23
A cross-site request forgery (CSRF) vulnerability in Jenkins Lockable Resources Plugin 2.8 and earlier allows attackers to reserve, unreserve, unlock, and reset resources.
CVE-2020-2282
PUBLISHED: 2020-09-23
Jenkins Implied Labels Plugin 0.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to configure the plugin.