Versionen im Vergleich

Schlüssel

  • Diese Zeile wurde hinzugefügt.
  • Diese Zeile wurde entfernt.
  • Formatierung wurde geändert.

...

This document contains information on the measures that can be taken against the "LocalNet" and "ServerIP" attacks described by Mathy Vanheof in the paper " Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables" (#VU563667VU#563667). The attacks are also described at https://tunnelcrack.mathyvanhoef.com/ .

Info

With the attacks described, it is important to mention that they do not compromise the actual VPN tunnel. Data transmitted through the VPN tunnel is still secure.

Rather, attempts are Instead, an attempt is made to redirect divert data traffic intended for the VPN tunnel to another destination before the tunnel in order to then be able to read it in plain text or to operate as a so-called man-in-the-middle.

In the application scenarios usually used by our customers (secure VPN client access, e.g. from the home network to the company network), this can only succeed if an attacker has access not only to the local network in which the VPN client is currently located, but also to the (company) network to which the VPN tunnel connects.

Therefore, for example, VPN client connections that a company uses to provide its employees with secure access to the company network are less likely to be affected by attacks.

scenarios described, a rogue access point is used as the access medium, which suggests to a WLAN client that it is connecting to a known and trusted SSID. This goal is usually most easily achieved on public WLAN networks.

On the access point controlled by the attacker, the routing can now be changed by assigning IP addresses so that the data traffic is redirected accordinglyIn public (WLAN) networks and/or when using public VPN servers, however, these attack possibilities pose a certain danger, which is why the countermeasures described in this document should be implemented there in any case.

All attacks and their variants are described in the following CVE messages in addition to the explanations in the paper:

...

ServerIP attacks:

Info

In the default setting, both the Advanced VPN Clients for Windows and macOS are vulnerable to both attacks (LocalNet and ServerIP).

We have compiled detailed technical information on this topic for you in a PDF document:

View file
nameAdvisory_VPN-Leaks TunnelCrack vulnerabilities (VU#563667).pdf
height150400

1. LANCOM Advanced VPN Client for Windows

...

For the LANCOM Advanced VPN Client for Windows, the LocalNet attack can be prevented by enabling the “Full Local Network Enclosure Mode” option. As a result, all network traffic will be sent through the tunnel.

Image RemovedImage Added

Alternatively, the integrated Advanced VPN Client Firewall can be configured such that only VPN traffic is allowed outside the tunnel (using the firewall option “Permit IPsec protocol” firewall option), with dedicated exceptions for, e.g., the local network printer. 

Info
Please be aware that those rules could lead to undetected blocking of important network traffic (CVE-2023-35838). Against this problem, you need to take separate countermeasures.

Image Added Image Removed

1.2 Countermeasurements against ServerIP attacks

...

Additionally, the integrated Advanced VPN Client Firewall can be configured such that only VPN traffic is allowed outside the VPN tunnel. This can be achieved by setting the “Permit IPsec protocol” firewall option and removing all other firewall rules (see step 1.1).


2. LANCOM Advanced VPN Client for macOS

...

For the LANCOM Advanced VPN Client for macOS, the LocalNet attack can be prevented only partially by enabling the “Full Local Network Enclosure Mode” option. Network traffic to and from the standard gateway will not be routed into the VPN tunnel.

Image RemovedImage Added

Alternatively, a third-party firewall can be configured such that only VPN traffic is allowed outside the tunnel, with dedicated exceptions for, e.g., the local network printer.

...