Anybody here talking about: "A Glance through the VPN Looking Glass"
A new study published that discusses issues with most of the leading consumer VPNs, including possible issues with PIA. Among them the potential for IPV6 leaking and DNS hijacking.
http://www.eecs.qmul.ac.uk/~hamed/papers/PETS2015VPN.pdf
http://www.eecs.qmul.ac.uk/~hamed/papers/PETS2015VPN.pdf
Comments
Thanks PIA.
So this rebuttal says "Our client offers DNS leak protection for OS's that are susceptible to said issue." And I don't use PIA's custom client. So am I more vulnerable -- or did these vulnerabilities in this report not apply to me in the first place?
This has got me concerned now.
What about if your running the OpenVPN client v2.2.2 OR higher, (not the PIA Windows client), are you vulnerable ?
There seems to be no mention of this in the 'Support' comment above, it specifically talks about 'our client' or 'Our Windows client'.
I'm presently running the 64bit OpenVPN client v2.3.7.0, following the advice here: https://support.privateinternetaccess.com/Knowledgebase/Article/View/62/23/can-i-use-openvpn-23x-with-private-internet-access which mentions 'Private Internet Access is compatible with OpenVPN 2.2.x and 2.3.x.'
So if I have followed the instructions listed here: https://www.privateinternetaccess.com/pages/client-support/windows-openvpn) am I vulnerable ?
At any rate, Irryie said multiple times that l2tp is insecure, and yet I haven't found any hard evidence of that on my own. Maybe s/he is confused with pptp, which has been proven to be vulnerable. (?)
I am still looking for a clarification from a reliable source comparing the security of openvpn and ipsec/l2tp, and also a clarification about which one(s) the security report was referring to.
https://en.wikipedia.org/wiki/IPsec#Alleged_NSA_interference
So all the vpn clients are equally vulnerable to the nsa penetration for now.
I still want to know if the protocols are equally vulnerable to the DNS hijacking and IPv6 leakages mentioned in the report.
Firstly, I wouldn't be too concerned about your mind reading cloud servers.
So in reply to your comment 'taking your concern over this paper into account can you please define what has you concerned in terms of PIA and to what you are concerned about being 'vulnerable' to?'
I already mentioned that I'm running the 64bit OpenVPN client v2.3.7.0 (not the PIA Windows client), and followed PIA instructions on how to set this up to use with their VPN service.
The 'Support' comment above specifically talks about 'our client' or 'Our Windows client' being secure yet there is no mention on how secure the OpenVPN setup is in regard to the:
1/ IPv6-leak and
2/ DNS hijacking vulnerabilities
listed in the whitepaper http://www.eecs.qmul.ac.uk/~hamed/papers/PETS2015VPN.pdf
The 'Support' comment above says that 'Our Windows client should be safe since DHCP is disabled when using DNS leak protection.'
PIA advises the best (and most secure) methods to connect would be using the PIA client/OpenVPN.
There's no mention from PIA of using their OpenVPN setup, and specifically if it suffers the SAME vulnerabilities.
As Vitaminx says: So am I more vulnerable -- or did these vulnerabilities in this report not apply to me in the first place?
Being a subscriber to PIA I hopefully would like an answer from PIA, ESPECIALLY if there are any additional steps I would need to undertake to make sure that as an end-user I don't suffer the vulnerabilities outlined above using the 64bit OpenVPN client v2.3.7.0, or any other compatible OpenVPN client version used with PIA's VPN service.
Even if all else works perfectly this is a fucking stupid concept. This is the *Illusion* of secrecy. Even with an ephemeral key, the entire session can be recorded and then it just takes time to guess the number that was the shared secret.
If we were going to have true secure sites and services, we would need a huge master key that was never transferred anywhere in any form. You would have your copy of the key, and the few sites you need true security to connect to like your bank would have the other copy. And when you connect to your bank, your banks server chooses a psuedo random number and tells you it. That is the byte to start at in your key. Then cipher and bitrate are negotiated in plain text and finally the connection is ready to go.
Fuck Diffie-Hellman.
Thanks for this detailed explanation lrryie.
So in a security sense how does this information look to you ?
ie Using '64bit OpenVPN client v2.3.7.0'
System Date & Time = 07/03/2015/ - 23:17:44 hrs
Operating System : Microsoft Windows 8.1 6.3.9600 - Workstation - 64 bit
System Connection : System indicates a local area network type connection.
IPv4 Address : 168.1.99.200 (Public IPv4 Address)
IPv6 Address : None Detected
Domain Name Server (DNS) : resolver1.privateinternetaccess.com (209.222.18.222)
Resolving DNS : 168.1.99.200 - 168.1.99.200-static.reverse.softlayer.com
ISP : SOFTLAYER - SoftLayer Technologies Inc.,US
Host : 168.1.99.200-static.reverse.softlayer.com
IP Indicated City/Region/State : City = Melbourne -- Region/State = Victoria
IP Indicated Country = Australia (AU)
Network Adapters Info (below):
Network Adapter 1 Description = Qualcomm Atheros AR9285 Wireless Network Adapter
Network Adapter 1 Index = 2
Network Adapter 1 IP Address(s) = 192.168.1.199,fe80::b9ae:d536:6101:35f1
Network Adapter 1 DHCP Server = 192.168.1.1
Network Adapter 1 DNS Domain = Not Available
Network Adapter 1 DNS Search Order = 0.0.0.0
Network Adapter 1 MAC Address = 4*:5*:*0:7*:0*:C*C
Network Adapter 1 Connection ID = Wi-Fi
Network Adapter 2 Description = TAP-Windows Adapter V9
Network Adapter 2 Index = 21
Network Adapter 2 IP Address(s) = 10.114.1.6
Network Adapter 2 DHCP Server = 10.114.1.5
Network Adapter 2 DNS Domain = Not Available
Network Adapter 2 DNS Search Order = 209.222.18.222, 209.222.18.218
Network Adapter 2 MAC Address = 00:FF:93:62:1C:3D
Network Adapter 2 Connection ID = TAP-Windows Adapter v9
When I visit https://dnsleaktest.com or https://ipleak.net/ I get 168.1.99.200 as the only IP Address, and the same address for the DNS Address.
These are the tools I need to answer my question myself. And in case
anyone was wondering, both respond with only my public vpn ip. Which
means that ipsec/l2tp are fine. (and Robbo's results also indicate that updated openvpn clients are fine too).
As I and others have indicated, there is zero hard evidence that ipsec/l2tp has been compromised. The fact that this company doesn't recommend it is not proof of anything. I said multiple times that I'm using IPSEC over l2tp. Ipsec does encrypt every packet. That's how the protocols work together. Look it up.
But you have to acknowledge that L2TP And / or IPsec has boatloads of routers for sale that default to plainly shitty security. OpenVPN has better support, but it is still a bit more overhead to do harder encryption. (And that is the reason that in most cases IPsec is far from perfect.)
Actually they should share all their's first-class & advanced developments with us, the people! That's what talking about should be!