Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handle CVE-2024-3661 (TunnelVision) #69

Open
M0dEx opened this issue May 6, 2024 · 2 comments
Open

Handle CVE-2024-3661 (TunnelVision) #69

M0dEx opened this issue May 6, 2024 · 2 comments
Assignees
Labels
priority-high High priority issue security Issues with Quincy's security

Comments

@M0dEx
Copy link
Owner

M0dEx commented May 6, 2024

A new decloaking technique for nearly all VPN implementations has been found, which allows attackers to inject entries into the routing tables of unsuspecting victims using DHCP option 121. This allows attackers to redirect traffic, which is supposed to be sent encrypted over the VPN, through the physical interface handling DHCP for the network the victim's computer is connected to, effectively bypassing any and all confidentiality provided by the VPN.

This attack vector can be partly mitigated in different ways on different systems, such as Network Namespaces on Linux. However, apart from disabling DHCP option 121 on all DHCP clients, this attack vector is very difficult to completely mitigate.

More information about this attack can be found on the Leviathan Security blog.

This issue is meant for tracking any and all possible mitigations on Quincy's side, to provide at least some protection against this attack vector, as malicious (and state) actors might use it (or already are using it) as a major decloaking attack vector.

@M0dEx M0dEx added priority-high High priority issue security Issues with Quincy's security labels May 6, 2024
@M0dEx M0dEx self-assigned this May 6, 2024
@M0dEx M0dEx pinned this issue May 6, 2024
@M0dEx
Copy link
Owner Author

M0dEx commented May 6, 2024

Documented in a security advisory: GHSA-hqmp-g7ph-x543

@M0dEx
Copy link
Owner Author

M0dEx commented May 9, 2024

The workarounds for this will likely have to be platform-specific, as different platforms allow different mitigations of this attack.

On Linux, Network Namespaces might be a good way to work around this issue, if supported by most distributions.
On MacOS, it might be a good idea to monitor routes and identify malicious ones, which are attempting to redirect traffic from Quincy.
On Windows, it might be possible to monitor routes as well.

@M0dEx M0dEx unpinned this issue Jun 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
priority-high High priority issue security Issues with Quincy's security
Projects
None yet
Development

No branches or pull requests

1 participant