Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Nov 2015 17:01:08 +0100
From:      Terje Elde <terje@elde.net>
To:        Mario Lobo <lobo@bsd.com.br>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: VPN security breach
Message-ID:  <63A85255-F131-406C-998D-AD9FB3670E4C@elde.net>
In-Reply-To: <20151127104401.7fdfd5fd@Papi>
References:  <20151127104401.7fdfd5fd@Papi>

next in thread | previous in thread | raw e-mail | index | archive | help


> On 27 Nov 2015, at 14:44, Mario Lobo <lobo@bsd.com.br> wrote:
> 
> Any comments on this?
> 
> https://thehackernews.com/2015/11/vpn-hacking.html

Unless I'm missing something, this is not only entirely possible, but it's also completely obvious. 

In order for it to work, you depend on letting attackers "book" port mappings on the same IP that other customers "dial in" to. "Dial in" and "exit" IPs needs to be the same. 

That's such a broken concept that any serious service couldn't possible come up with it. In fact, in order to do that, you more or less have to take extra precautions towards making sure you fail. 

Terje





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?63A85255-F131-406C-998D-AD9FB3670E4C>