LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 05-07-2024, 08:20 AM   #1
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,404

Rep: Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336
DHCP clients & Option 121


There's some exploit that's been out there a long time but only noticed recently - Er, This one which uses option 121 on dhcp clients. Now I gather it's difficult
Quote:
When apps run on Linux there's a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks.
In the case of Slackware's chosen dhcp servers, how vulnerable are Slackware users? It's not like I'm in the Secret Service, I'm just curious.
 
Old 05-07-2024, 09:15 AM   #2
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Option 121 simply adds a static route on the client. It's unclear to me how this defeats a VPN.

If your system is configured as a DHCP client, you are by default accepting route information from an untrusted party. Any other user on the network could quite easily take over the DHCP Server role, with or without the use of option 121.
 
Old 05-07-2024, 10:56 AM   #3
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,404

Original Poster
Rep: Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336
Quote:
Originally Posted by Ser Olmy View Post
Option 121 simply adds a static route on the client. It's unclear to me how this defeats a VPN.

If your system is configured as a DHCP client, you are by default accepting route information from an untrusted party. Any other user on the network could quite easily take over the DHCP Server role, with or without the use of option 121.
No expert here, but It doesn't work on Android because Android DHCP client(s) don't support option 121. So that's the key. That's why I asked if Slackware DHCP clients support option 121. What's more important, I suppose, is if they can be compiled without option 121 without hurting anyone. If anyone listened in on my traffic, they'd quickly get bored.

EDIT: From the Article:
Quote:
The attack can most effectively be carried out by a person who has administrative control over the network the target is connecting to. In that scenario, the attacker configures the DHCP server to use option 121...
So if I configure option 121 I can hack myself .

Last edited by business_kid; 05-07-2024 at 11:03 AM.
 
Old 05-07-2024, 12:01 PM   #4
Aeterna
Senior Member
 
Registered: Aug 2017
Location: Terra Mater
Distribution: VM Host: Slackware-current, VM Guests: Artix, Venom, antiX, Gentoo, FreeBSD, OpenBSD, OpenIndiana
Posts: 1,011

Rep: Reputation: Disabled
I am not an expert but if one does not use VPN splitting app or uses app that blocks non-vpn traffic (e.g. Mulvard) then vpn connection is not vulnerable to this attack.
 
Old 05-07-2024, 01:00 PM   #5
rizitis
Member
 
Registered: Mar 2009
Location: Greece,Crete
Distribution: Slackware64-current, Slint
Posts: 676
Blog Entries: 1

Rep: Reputation: 511Reputation: 511Reputation: 511Reputation: 511Reputation: 511Reputation: 511
If I understnd right the only one who can bypass vpn using DHCP options 121 is the admin of DHCP server.
So if your are not the admin of DHCP server that means you cannot set or change DHCP options, including Option 121.
But if you are in Corporate/Enterprise Network or Shared or Public Networks then lots of things might happen...
 
Old 05-07-2024, 01:27 PM   #6
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,404

Original Poster
Rep: Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336
There is a link in post#1 which is easily missed. What perked my interest was that Android alone was immune - there's no option 121. iOS presumably is vulnerable, as is linux. The video showed lease renewal time as the vulnerable point, which happens automagically. A dhcp client's query for a lease is answered by the hacker.

That sort of stuff is above my pay grade, hence the question. I wouldn't have asked if I knew. But security of lease renewal is a grey area for me. The dhcp client is asking "Is there anyone out there?" and when it gets an answer, it doesn't reply "Who the hell are you?", it says "Thanks."
 
Old 05-07-2024, 01:28 PM   #7
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 371

Rep: Reputation: 172Reputation: 172
Quote:
Originally Posted by business_kid View Post
how vulnerable are Slackware users?
One aspect of this is, suppose I am a Slackware admin, and that I host some users. According to what I've read, I could configure DHCP on my host and spy on my users.
 
Old 05-07-2024, 03:10 PM   #8
Aeterna
Senior Member
 
Registered: Aug 2017
Location: Terra Mater
Distribution: VM Host: Slackware-current, VM Guests: Artix, Venom, antiX, Gentoo, FreeBSD, OpenBSD, OpenIndiana
Posts: 1,011

Rep: Reputation: Disabled
Not only android. OS in VM will not be vulnerable either.

Also, this is useful in hotel, airport, internet cafe, public wifi environment where rouge DHCP server set up is possible.
This way, while communication is still encrypted, connected sites are visible.
 
Old 05-07-2024, 03:52 PM   #9
ctrlaltca
Member
 
Registered: May 2019
Location: Italy
Distribution: Slackware
Posts: 333

Rep: Reputation: 389Reputation: 389Reputation: 389Reputation: 389
Quote:
Originally Posted by Ser Olmy View Post
Option 121 simply adds a static route on the client. It's unclear to me how this defeats a VPN.
Non-corporate VPns are used to route all traffic through the VPN itself, so they create a default route (0.0.0.0/0) on their gateway, usually with a lower metric.
DHCP usually pushes to the client an IP address for the interface and a gateway IP address. It can also push additional routes, using eg. option 33 (RFC 2132, obsolete) or option 121 (RFC 3442), that the client "should" install and use.
This attack exploits these options by pushing to clients a lot of routes (eg. 1.0.0.0/8, 2.0.0.0/8, and so on) pointing them to a malicious gateway.
These routes are more specific than the "default route" used by the VPN, so they will "intercept" network traffic bypassing the VPN.

Still, this seems like a lame attack to me, but quite feasible on public WIFIs like hotels and airports.

Last edited by ctrlaltca; 05-07-2024 at 03:54 PM.
 
Old 05-07-2024, 04:46 PM   #10
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by ctrlaltca View Post
These routes are more specific than the "default route" used by the VPN, so they will "intercept" network traffic bypassing the VPN.
Ah, so there's where the issue lies: The VPN relies on IP routing priorities when deciding whether or not to encrypt traffic instead of using a policy, probably by routing traffic through a virtual interface (most likely PPP).

That seems ridiculously short-sighted and should be considered a vulnerability in and of itself, or at the very least a high-severity bug. This is not the fault of the DHCP client correctly accepting DHCP option 121.

I would assume that all IPsec-based VPNs are immune to this, as they are policy-based.
Quote:
Originally Posted by ctrlaltca View Post
Still, this seems like a lame attack to me, but quite feasible on public WIFIs like hotels and airports.
The lame part would be that there apparently exists VPN solutions against which this attack actually works.
 
Old 05-07-2024, 04:50 PM   #11
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by metaed View Post
One aspect of this is, suppose I am a Slackware admin, and that I host some users. According to what I've read, I could configure DHCP on my host and spy on my users.
Of course you could.

For instance, you could exhaust the entire scope of the local DHCP server by flooding it with DHCP requests, making sure that any subsequent requests from other clients would be served exclusively by your malicious server.

Insecure networks are insecure.
 
1 members found this post helpful.
Old 05-07-2024, 07:45 PM   #12
HQuest
Member
 
Registered: Jan 2018
Location: 2001:470:c2d0::/56
Distribution: Anything I can interface with
Posts: 93

Rep: Reputation: Disabled
DHCP Snooping on Cisco switches can make the network to avoid using unexpected network ports for DHCP traffic, hence mitigating (to an extent) the issue. I'm certain this feature exists in other vendors. And I'm certain, as Ser_Olmy explained above, there are other ways to make this exploit to work - where there's a will, there's a way.

Option 121 exists at pretty much each and every DHCP server out there, and yes, aside of Android, all OSes are "vulnerable" by implementing things per the book, but if one can spin up a DHCP server in your network and get it unnoticed, you have much bigger problems than just a rogue DHCP server.

Last edited by HQuest; 05-07-2024 at 07:46 PM.
 
Old 05-08-2024, 02:27 AM   #13
___
Member
 
Registered: Apr 2023
Posts: 155
Blog Entries: 1

Rep: Reputation: Disabled
IDK VPN (at all). When I saw this yesterday, comments seemed to vary from: irrelevant clickbait -to- VPNs don't really work!
Here's the links: https://arstechnica.com/security/202...ntire-purpose/
https://news.ycombinator.com/item?id=40284111 https://news.ycombinator.com/item?id=40279632 (Origin: https://www.leviathansecurity.com/blog/tunnelvision )
And https://krebsonsecurity.com/2024/05/...-as-it-claims/

Even tho I'm clueless here, web-research seemed to say: 1/3 to 1/2 of internet users do use a VPN! (Totally surprising to me!)

Last edited by ___; Today at 03:55 AM.
 
Old 05-08-2024, 02:28 AM   #14
guanx
Senior Member
 
Registered: Dec 2008
Posts: 1,183

Rep: Reputation: 237Reputation: 237Reputation: 237
The dhcp client could be confined to a dedicated network namespace. The default namespace can then be routed through this dedicated namespace through a pair of veth.

It might be a good idea to add this setup to rc.inet1 considering rc.inet1 has already supported a bunch of miscellaneous configurations.
 
1 members found this post helpful.
Old 05-08-2024, 02:34 AM   #15
guanx
Senior Member
 
Registered: Dec 2008
Posts: 1,183

Rep: Reputation: 237Reputation: 237Reputation: 237
Quote:
Originally Posted by ___ View Post
IDK VPN (at all). When I saw this yesterday, comments seemed to vary from: irrelevant clickbait -to- VPNs don't really work!
Here's the links: https://arstechnica.com/security/202...ntire-purpose/
https://news.ycombinator.com/item?id=40284111 https://news.ycombinator.com/item?id=40279632 (Origin: https://www.leviathansecurity.com/blog/tunnelvision )

Even tho I'm clueless here, web-research seemed to say: 1/3 to 1/2 of internet users do use a VPN! (Totally surprising to me!)
TLDR but I presume anyone on the Internet is connected through EVPN at some point.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Linux 5.9, KDE Plasma 5.20, LibreOffice, Pine64 Updates & More | This Week in Linux 121 LXer Syndicated Linux News 0 10-23-2020 07:43 AM
Can I have a network w/ a Linux Server & Linux clients & a few MSFT Windows clients bhowerton Linux - Networking 1 04-21-2007 12:45 AM
Phục hồi dữ liệu bị mất???, cứ pollsite General 1 06-27-2005 12:39 PM
wireless pci card sitecom wl-121 and fedora 2 xlaudio Linux - Wireless Networking 1 08-29-2004 08:36 PM
Gotta love those ٱٱٱٱٱٱٱ&# iLLuSionZ Linux - General 5 11-18-2003 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 01:57 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration