• 0 Posts
  • 27 Comments
Joined 2 years ago
cake
Cake day: June 17th, 2023

help-circle


  • Slotos@feddit.nltoLinux@lemmy.mlssh reverse tunnel
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    3 months ago
    • ssh to remote, forwarding some remote port to your local ssh port (-R)
    • ssh from remote through the exposed port, starting socks proxy in the process (-D)
    • use socks proxy explicitly or find some tool that can route the traffic into it

    Similar approach can be used to establish VPN tunnel with no encryption (ssh already provides that), routing everything but your ssh connection through it.

    • ssh to remote, reverse forwarding your VPN-over-tcp server’s listening port
    • establish vpn connection on remote, route everything but your ssh connection through the newly established interface

    It will be wasteful, but it will work.













  • If you use HTTPS, the attacker can still see what websites you connect to, they just can’t see what you are sending or receiving. So basically they can steal your browsing history, which defeats the purpose of a commercial VPN for many users.

    This is blatantly false. They can see IP addresses and ports of you connect to from IP packets, and hostnames from TLS negotiation phase (and DNS requests if you don’t use custom DNS settings). HTTP data is fully encrypted when using HTTPS.

    If exposing hostnames and IP addresses is dangerous, chances are that establishing a VPN connection is as dangerous.


  • Control of the DHCP server in the victim’s network is required for the attack to work.

    This is not a VPN vulnerability, but a lower level networking setup manipulation that negates naive VPN setups by instructing your OS to send traffic outside of VPN tunnel.

    In conclusion, if your VPN setup doesn’t include routing guards or an indirection layer, ISP controlled routers and public WiFis will make you drop out of the tunnel now that there’s a simple video instruction out there.




  • Please correct me if I’m wrong, but doesn’t this allow one to represent virtually any resource as a mail inbox/outbox with access through a generic mail app?

    I’m working with a specialized healthcare company right now, and this looks like a way to represent patient treatments data as an intuitive timeline of messages. With a local offline cache in case of outages. Security of local workstations is a weak point of course, but when is it not…