Blind In/On-Path Attacks and Applications to VPNs

TitleBlind In/On-Path Attacks and Applications to VPNs
Publication TypeConference Paper
Year of Publication2021
AuthorsTolley, W. J., Kujath B., Khan M. Taha, Vallina-Rodriguez N., & Crandall J. R.
Published in30th USENIX Security Symposium '21
Page(s)3129-3146
Date Published08/2021
PublisherUSENIX Associationf
ISBN Number978-1-939133-24-3
KeywordsVPN
Abstract

Protecting network protocols within an encrypted tunnel, using technologies such as Virtual Private Networks (VPNs), is increasingly important to millions of users needing solutions to evade censorship or protect their traffic against in/onpath observers/attackers. In this paper, we present a series of attacks from two threat models: an attacker that can inject spoofed packets into the network stack of a VPN client (called client-side), and an attacker that can spoof packets on the Internet and send them to a VPN server (called server-side). In both cases, we assume that the attacker is in/on-path, and can count encrypted bytes or packets over time. In both threat models, we demonstrate attacks to infer the existence of, interfere with, or inject data into TCP connections forwarded through the encrypted VPN tunnel. In the server-side threat model, we also demonstrate an attack to hijack tunneled DNS queries and completely remove the protections of the VPN tunnel. For the attacks presented in this paper, we (1) assess their feasibility in terms of packet rates and timing; (2) test their applicability against a broad range of VPN technologies, types, and vendors; and (3) consider practical issues with respect to real-world attacks. We followed an ethical disclosure process for all attacks presented in this paper. Client-side attacks were addressed with two CVEs and partially mitigated by a series of updates from some operating system and VPN client vendors. Server-side attacks have not been addressed and are still feasible with all operating systems and VPN servers that we tested.

URLhttps://www.usenix.org/system/files/sec21fall-tolley.pdf