Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security //

VPN

End of Bibblio RCM includes -->
3/30/2018
09:35 AM
Larry Loeb
Larry Loeb
Larry Loeb

VPNs Are Still Leaking Your Personal Information

While VPNs are supposed to allow for safe, anonymous browsing, it turns out that STUN servers on the backend can still leak personal information and your whereabouts. Here's how to minimize that.

It has been found by a security researcher that almost one quarter -- 23% to be exact -- of current Virtual Private Networks (VPNs) will leak a user's true IP address due to a well-known, three-year-old vulnerability in a service that is enabled in most browsers by default.

However, let's start at the beginning.

WebRTC is open source software that provides browsers and mobile applications with Real-Time Communications (RTC) capabilities via simple APIs. Network, audio and video components used in voice and video chat applications can be simply built using WebRTC.

Session Traversal Utilities for NAT (STUN) servers are used to traverse networks by WebRTC. However, they are also used by VPNs when they execute the back-and-forth translation from a local home IP address to a new public IP address.

(Source: Flickr)
(Source: Flickr)

In January 2015, Daniel Roesler found that STUN servers will keep records of the user's public IP address and private IP address if the client is behind a NAT network, proxy or VPN client. Not only that, these servers will share this information with any other website if they had a WebRTC connection with a user's browser.

This means that it could be also used to de-anonymize and trace users behind common privacy protection methods such as a VPN, SOCKS Proxy, or HTTP Proxy. Tor users were also found to be vulnerable to tracking from this method before hardening was done.

Browser makers attempted to somewhat mitigate the problem, but most left WebRTC active in the end.

Still, browsers that have WebRTC running by default include Brave, Mozilla Firefox, Google Chrome, Internet (Samsung Browser), Opera, and Vivaldi. The Tor Browser, Microsoft Edge, and Internet Explorer do not enable by default.

Paolo Stagno wanted to see if the situation with WebRTC and VPNs had changed. He did some testing and posted the results on his blog. He found that VPNs from several vendors were still leaking local IPs if a browser had WebRTC active.

In his post, Stagno admits he didn't test every VPN out there and asked his readers to contribute their own results from other VPNs when they went to a WebRTC test page that he set up.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

Stagno gives these tips for anonymous surfing:

  • Disable WebRTC
  • Disable JavaScript (or at least some functions. Use NoScript)
  • Disable Canvas Rendering (Web API)
  • Always set a DNS fallback for every connection/adapter
  • Always kill all your browsers instances before and after a VPN connection
  • Clear browser cache, history and cookies
  • Drop all outgoing connections except for VPN provider

Another method might be to establish the VPN connection from your local router to it, rather than directly from your computer.

VPNs may not be as secure as users would like to think. Unless there is perfect end-to-end security, information may still leak out.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1268
PUBLISHED: 2022-05-23
The Donate Extra WordPress plugin through 2.02 does not sanitise and escape a parameter before outputting it back in the response, leading to a Reflected cross-Site Scripting
CVE-2022-1298
PUBLISHED: 2022-05-23
The Tabs WordPress plugin before 2.2.8 does not sanitise and escape Tab descriptions, which could allow high privileged users with a role as low as editor to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
CVE-2022-1320
PUBLISHED: 2022-05-23
The Sliderby10Web WordPress plugin before 1.2.52 does not properly sanitize and escape some of its settings, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
CVE-2022-1547
PUBLISHED: 2022-05-23
The Check & Log Email WordPress plugin before 1.0.6 does not sanitise and escape a parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting
CVE-2022-1558
PUBLISHED: 2022-05-23
The Curtain WordPress plugin through 1.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed