2015
DOI: 10.1515/popets-2015-0006
|View full text |Cite
|
Sign up to set email alerts
|

A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

Abstract: Commercial Virtual Private Network (VPN) services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(19 citation statements)
references
References 31 publications
0
19
0
Order By: Relevance
“…Proxy-based Systems The most common approach used by circumvention systems is to run network proxies outside the censorship region, and use them to relay the traffic of censored users to censored Internet destinations. Many in-thewild circumvention systems such as Tor [15], Psiphon [58], Lantern [40], and VPN services [56], [52] deploy circumvention proxies in different ways to help censored users. Most circumvention systems [58], [67], [52], [40] use simple, singlehop proxies, while others [15], [57] use more complex models for proxy deployment.…”
Section: Background On Circumvention Systemsmentioning
confidence: 99%
“…Proxy-based Systems The most common approach used by circumvention systems is to run network proxies outside the censorship region, and use them to relay the traffic of censored users to censored Internet destinations. Many in-thewild circumvention systems such as Tor [15], Psiphon [58], Lantern [40], and VPN services [56], [52] deploy circumvention proxies in different ways to help censored users. Most circumvention systems [58], [67], [52], [40] use simple, singlehop proxies, while others [15], [57] use more complex models for proxy deployment.…”
Section: Background On Circumvention Systemsmentioning
confidence: 99%
“…The traditional censorship circumvention systems such as VPNs [55,57], Dynaweb [10], Ultrasurf [24], Lantern [13], Tor [32], and others [33] benefit from establishing proxy servers outside of the censored area. However, these systems are vulnerable to blockage.…”
Section: Related Workmentioning
confidence: 99%
“…The paper covered a large dataset of 283 applications, but only focused on VPN clients within the Android operating system. A Glance through the VPN Looking Glass [6] is another piece of VPN security research that investigated a significantly smaller dataset (just 14 VPN clients) but clients were analyzed on every common operating system (iOS, Android, Windows, OS X and Linux). The research involves testing the selection of VPN clients for known security issues within VPN clients (such as IPv6 leakage and DNS leakage).…”
Section: Prior Researchmentioning
confidence: 99%
“…Due to a lack of support by some VPN clients, IPv6 requests are routed outside of the secure VPN tunnel, potentially leaking user information. This issue is also detailed in A Glance through the VPN Looking Glass [6].…”
Section: Ipv6 Leakagementioning
confidence: 99%