Menu
VPN users, beware: You may not be as safe as you think you are

VPN users, beware: You may not be as safe as you think you are

Thanks to IPv6 leakage, your data could be out there for anyone to see

Security

Security

It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.

In fact, because of a vulnerability known as IPv6 leakage, many of them can expose user information to prying eyes, according to a paper from researchers at Sapienza University of Rome and Queen Mary University of London.

Entitled "A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients," the report describes a study conducted late last year that examined 14 popular commercial VPN providers around the world.

Specifically, the researchers tested the VPNs by attempting two kinds of attacks: passive monitoring, whereby a hacker might simply collect the user's unencrypted information, and DNS hijacking, where the hacker would redirect the user's browser to a controlled Web server by pretending to be a popular site like Google or Facebook.

What they found was unnerving: 11 of the 14 providers leaked information, including the websites the user was accessing and the actual content of the user's communications. The only three that didn't were Private Internet Access, Mullvad and VyprVPN. TorGuard offered a way around the problem, they noted, but it wasn't enabled by default.

The study also examined the security of various mobile platforms when using VPNs and found that they were much more secure when using iOS but were still vulnerable to leakage using Android.

Interactions with websites running HTTPS encryption were not leaked, the researchers noted.

So what's to blame for the leakage? One factor is that while network operators are increasingly deploying IPv6, many VPNs still protect only IPv4 traffic, the researchers concluded.

Another problem they found, however, is that many VPN service providers still rely on outdated tunneling protocols such as PPTP that can be easily broken through brute-force attacks.

The authors point to Tor along with Linux distributions such as Tails as potential alternatives for those seeking anonymity. Enterprise VPNs, meanwhile, are largely unaffected by the leakage problems, they said.

"For the average business user of VPN technology, there is no impact," said Steve Manzuik, director of research at Duo Security.

Users who rely on VPN services for privacy, however, should "always be aware of what protocols their systems are transmitting on and consider a VPN service that also provides coverage for those or at the very least disable those that are unused," Manzuik advised.

It's also worth noting that VPN technology was not designed to offer privacy so much as to offer a more secure way to connect to an organization's internal network infrastructure via untrusted networks, he pointed out.

"Even with a well-configured VPN in place," Manzuik said, "there are other methods to identify a user and violate their perceived privacy."


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags mobile securityNetworkingvpnSapienza University of RomeQueen Mary University of London

Brand Post

What to expect from your IT Distributor

Whether you’re just starting out or you’ve been around since before the dot com rollercoaster, choosing the right distribution partner can be a pivotal factor in your success. This definitive guide outlines the traits that every IT partner needs to look for in their IT Distributor.

Featured

Slideshows

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

This year’s Reseller News 30 Under 30 Tech Awards were held as an integral part of the first entirely virtual Emerging Leaders​ forum, an annual event dedicated to identifying, educating and showcasing the New Zealand technology market’s rising stars. The 30 Under 30 Tech Awards 2020 recognised the outstanding achievements and business excellence of 30 talented individuals​, across both young leaders and those just starting out. In this slideshow, Reseller News honours this year's winners and captures their thoughts about how their ideas of leadership have changed over time.​

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners
Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

This exclusive Reseller News Exchange event in Auckland explored the challenges facing the partner community on the cloud security frontier, as well as market trends, customer priorities and how the channel can capitalise on the opportunities available. In association with Arrow, Bitdefender, Exclusive Networks, Fortinet and Palo Alto Networks. Photos by Gino Demeer.

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security
Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomed 2019 inductees - Leanne Buer, Ross Jenkins and Terry Dunn - to the fourth running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing face of the IT channel ecosystem in New Zealand and what it means to be a Reseller News Hall of Fame inductee. Photos by Gino Demeer.

Reseller News welcomes industry figures at 2020 Hall of Fame lunch
Show Comments