• corroded@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    6 months ago

    It doesn’t sound to me like this really negates the purpose of a VPN, more accurately it provides a way for someone on your local network to snoop on VPN traffic, if I understand correctly.

    From how the article describes the attack, someone on your local network would have to set up a malicious DHCP server/gateway. The average home user who is using a VPN to mask their public IP probably doesn’t need to worry about this.

    Or am I misunderstanding?

    • athairmor@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      6 months ago

      Sounds like the attack bypasses the VPN entirely. It’s not a worry on your home network if you control the DHCP server. But, on public networks, where you really should always use a VPN, you can’t be sure your traffic is going through the VPN.

      Maybe, you can check a trusted site like the VPN provider’s webpage to see if you’re going through the VPN. But, a really sophisticated attack could potentially route just that traffic through the VPN and everything else outside of it.

      If my reading of it is correct.

    • Arthur Besse@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      6 months ago

      VPNs have several purposes but the big two are hiding your traffic from attackers on the local area network and concealing your location from sites that you visit.

      If you’re using a VPN on wifi at a cafe and anyone else at the cafe can run a rogue DHCP server (eg, with an app on their phone) and route all of your traffic through them instead of through the VPN, I think most VPN users would say the purpose of the VPN has been defeated.

      • MotoAsh@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        6 months ago

        If some random user is able to configure themselves as DHCP, NOONE should be connected to that insecure trash.

        • Arthur Besse@lemmy.mlOP
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          6 months ago

          The vast majority of LANs do not do anything to prevent rogue DHCP servers.

          Just to be clear, a “DHCP server” is a piece of software which can run anywhere (including a phone). Eg, if your friend’s phone has some malware and you let them use the wifi at your house, someone could be automatically doing this attack against your laptop while they’re there.

          • MotoAsh@lemmy.world
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            6 months ago

            Seems like quite an amateur move to run a public network without filtering everyrhing, including dhcp. Again; insecure trash.

            Yes, I know there is a lot of insecure trash out there. The commonality doesn’t magically make it not insecure trash.