xabadak

joined 1 year ago
[–] xabadak 10 points 3 months ago (1 children)

It's true, you never really know what will be going through your router. I guess I just got over it after a few years of struggling with VPNs and port-forwarding. Just felt like the noose was getting tighter, especially after Mullvad stopped providing the feature. My stance is that if I ever knew that such content was going through my PC I would block it, but if it's all encrypted then what can I do? Same reason why I support encrypted messaging apps - they can be used for harm but is that the fault of the tool? Though I recognize it's a complex issue.

[–] xabadak 1 points 5 months ago (1 children)

You might be interested in my tool wg-lockdown. I mainly use it on desktops but it should work on servers as well, it's just an nftables config after all. It also shouldn't interfere with UFW though you might want to double-check with some of the networking experts here.

[–] xabadak 1 points 1 year ago

No worries, and thanks for providing a response nonetheless. I'll look into your suggestion when I have the time. The official Wireguard website also had some guide on network namespaces here but afaik it didn't explain how to set it up persistently

[–] xabadak 3 points 1 year ago

So it's really that simple...I can see why there are security issues 😅

[–] xabadak 3 points 1 year ago* (last edited 1 year ago)

Great write-up, I've been looking for something like this. I've heard of vopono and eznetns before but not namespaced-openvpn, and this is the first post I've seen where somebody details how they use a tool like this, so thanks! I'll have to try setting it up some time.

[–] xabadak 2 points 1 year ago (3 children)

Yeah, you don't have to dig very deep to find out how insecure our networks are. Mac addresses can be spoofed, ports can be scanned, TCP numbers can be guessed, etc...

[–] xabadak 5 points 1 year ago (1 children)

From a privacy standpoint I don't think it would make a big difference over not using a VPN at all. It will take a bit of time but your new IP will become associated with your identity. From the perspective of Facebook and Google, it will just look like you moved and are living inside a datacenter now.

[–] xabadak 4 points 1 year ago (2 children)

That sounds very cool, I've been interesting in network namespaces but it's hard to find information on how to use them. How did you do it?

[–] xabadak 6 points 1 year ago

If exposing hostnames and IP addresses is dangerous

It's not necessarily dangerous, but it's a major privacy issue. Hiding your browsing history from other people (except for the VPN provider) is one of the main reasons why people get a commercial VPN in the first place. And this vulnerability mainly concerns those users.

[–] xabadak 3 points 1 year ago* (last edited 1 year ago) (2 children)

I added clarification that the HTTPS part is assuming that the attacker has already performed the DHCP attack. Thanks for the note!

The DHCP race is one part I didn't go into detail about since I'm not very familiar with the details, but what you wrote makes sense. One potential danger is a hacker at a coffee shop, where the shop owner is unlikely to be monitoring the network, and there are going to be many new connections coming in all the time. It's still an unlikely scenario, but it also isn't a particularly difficult attack.

[–] xabadak 1 points 1 year ago (1 children)

No offense taken, on the contrary thanks for the constructive criticism! I'll add some more details to my repo to make things more clear.

[–] xabadak 2 points 1 year ago

Yeah, it does come down to threat model and preference. If you only need to route specific apps, Gluetun sounds like a great solution.

view more: ‹ prev next ›