Even if you have encrypted your traffic with a VPN (or the Tor Network), advanced traffic analysis is a growing threat against your privacy. Therefore, we now introduce DAITA.

Through constant packet sizes, random background traffic and data pattern distortion we are taking the first step in our battle against sophisticated traffic analysis.

27 points

How about defense against dhcp option 121 changing the routing table and decloaking all VPN traffic even with your kill switch on? They got a plan for that yet? Just found this today.

https://www.leviathansecurity.com/blog/tunnelvision

permalink
report
reply
13 points

Don’t you control your dhcp server?

permalink
report
parent
reply
3 points

Of course but you don’t control rogue dhcp servers some asshat might plug in anywhere else that isn’t your network

permalink
report
parent
reply
16 points

The Option 121 attack is a concern on networks where you don’t.

Exactly where you’d want a VPN. Cafes, hotels, etc.

permalink
report
parent
reply
5 points
*

True that. Hadn’t thought of that as it’s not my typical VPN use case.

I’m not sure what a VPN provider could do about that though, they don’t control the operating system’s networking stack. If the user or an outside process that the user decides to trust (i.e. a dhcp server) adds its own network routes, the OS will follow it and route traffic outside of the tunnel.

The defenses I see against it are:

  • Run the VPN and everything that needs to go through the VPN in a virtualized, non-bridged environment so it’s unaffected by the routing table.
  • Put a NAT-ing device in between your computer and the network you want to use
  • Modify the DHCP client so that option 121 is rejected

Edit: thinking about it some more, on Linux at least the VPN client could add some iptables rules that block traffic going through any other interface than the tunnel device (i.e. if it’s not through tun0 or wg0, drop it). Network routes can’t bypass iptables rules, so that should work. It will have the side effect that the VPN connection will appear not to work if someone is using the option 121 trick though, but at least you would know something funny was happening.

permalink
report
parent
reply
45 points
2 points

I doubt it would matter in some environments at all.

As an example a pc managed by a domain controller that can modify firewall rules and dhcp/dns options via group policy. At that point firewall rules can be modified.

permalink
report
parent
reply
37 points

I love these guys. Let’s see if somebody can just bootstrap the FOSS framework directly on TCP to work on the internet without a VPN. Fantastic project

permalink
report
reply
9 points

Those words sound cool and mean literally nothing

permalink
report
parent
reply
-8 points

Bootstrapping See the Application section specifically.

FOSS = Free/Open Source Software TCP = Transmission Control Protocol VPN = Virtual Private Network

These words mean a lot actually. Pretty basic terms when it comes to the internet.

permalink
report
parent
reply
10 points

I think they meant the comment as a whole doesn’t really make sense, it’s a bunch of technical terms kind of shoved together. If you understand it can you explain what it means?

permalink
report
parent
reply
12 points

That means the same as fossing the tcp so it bootstraps your privacy.

See I can sound like a bot too. Or a journo.

permalink
report
parent
reply
5 points
*

Yes, the individual words have meanings, as words tend to do. Those words, in that order, form a NCIS, two people typing on the same keyboard, level word salad that has so little real world relevance that it tips soundly into the absurd.

permalink
report
parent
reply
1 point
*

Err… Like… a 2009 Java applet? Those were built straight on TCP. And the lack of security let anyone else in the same LAN cafe steal your password.

The closest thing I can think of that goes for the vibe you’re talking about is I2P

permalink
report
parent
reply
2 points

I’m afraid just generating random traffic from your IP address won’t do anything against traffic flow analysis. Because most internet traffic is point to point, people who are interested in the flow, just follow the traffic moving between various points. So if you’re sending extra traffic to other random sites, it doesn’t interfere with point-to-point flow analysis.

In the context of a VPN, because all of your traffic is encrypted, you have to work harder to determine what traffic is going where. Because all traffic is going from your network to another virtual network. So an outside observer just sees the size and frequency of traffic but not the destinations. In this context since they don’t see the destinations, it makes sense to add random traffic flows, because that’ll obscure the signal that the observers are looking for.

permalink
report
parent
reply
2 points

Considering that VPNs are Point-to-point too (home->VPN), I was wondering if one could use DAITA with TCP directly instead of having to use a VPN. Imagine if TCP had DAITA baked in.

permalink
report
parent
reply
2 points
*

Even if you baked in variable packet size into TCP. It would be trivial for anybody monitoring network flow, to see you who you’re talking to. There would be no ambiguity.

The only reason this makes sense for a VPN, is there’s a lot of traffic bundled together, so a third party doesn’t actually know where your traffic flow is going.

Consider the example if you ran your own personal VPN endpoint. So you were the only user on the VPN. Even with randomized traffic flow injected into your VPN connection, it would be trivial for any third party who’s monitoring traffic flow to know that traffic is yours. Because you’re the only VPN connection talking to the VPN server. This thought experiment applies when you don’t have a VPN at all.

permalink
report
parent
reply
53 points

Still waiting for Defense Against the AI Dark Arts to drop

permalink
report
reply
6 points

?

permalink
report
parent
reply
14 points

Harry Potter reference.

permalink
report
parent
reply
12 points

DAIDA

permalink
report
parent
reply
5 points

And Dumbledore’s AIrmy for when they forbid DAAIDA as an anti-terrorist measure

permalink
report
parent
reply
3 points

So… Tor?

permalink
report
reply
19 points
*

Not just tor. Tor plus random traffic.

Let’s say across your VPN you always sent one megabyte per second of traffic even if you had nothing to say. And then everybody connected to the VPN endpoint did the same thing. Then it gets very difficult to actually follow the traffic flows of the encrypted packets. You don’t see a large chunk of data passing through the network

permalink
report
parent
reply
-2 points

Tor does this to and is much better than a VPN

permalink
report
parent
reply
6 points

It does not generate random traffic on your link to Tor.

permalink
report
parent
reply
5 points

Tor is much better than a VPN privacy wise. However, you are limited on speed and stuck with TCP.

permalink
report
parent
reply
18 points

I swear the defense against the dark arts teacher just keeps getting weirder and weirder.

permalink
report
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 15K

    Monthly active users

  • 13K

    Posts

  • 568K

    Comments