Avatar

xabadak

xabadak@lemmings.world
Joined
3 posts • 26 comments
Direct message

No worries, and thanks for providing a response nonetheless. I’ll look into your suggestion when I have the time. The official Wireguard website also had some guide on network namespaces here but afaik it didn’t explain how to set it up persistently

permalink
report
parent
reply

So it’s really that simple…I can see why there are security issues 😅

permalink
report
parent
reply

Great write-up, I’ve been looking for something like this. I’ve heard of vopono and eznetns before but not namespaced-openvpn, and this is the first post I’ve seen where somebody details how they use a tool like this, so thanks! I’ll have to try setting it up some time.

permalink
report
parent
reply

Yeah, you don’t have to dig very deep to find out how insecure our networks are. Mac addresses can be spoofed, ports can be scanned, TCP numbers can be guessed, etc…

permalink
report
parent
reply

From a privacy standpoint I don’t think it would make a big difference over not using a VPN at all. It will take a bit of time but your new IP will become associated with your identity. From the perspective of Facebook and Google, it will just look like you moved and are living inside a datacenter now.

permalink
report
reply

That sounds very cool, I’ve been interesting in network namespaces but it’s hard to find information on how to use them. How did you do it?

permalink
report
parent
reply

If exposing hostnames and IP addresses is dangerous

It’s not necessarily dangerous, but it’s a major privacy issue. Hiding your browsing history from other people (except for the VPN provider) is one of the main reasons why people get a commercial VPN in the first place. And this vulnerability mainly concerns those users.

permalink
report
parent
reply

I added clarification that the HTTPS part is assuming that the attacker has already performed the DHCP attack. Thanks for the note!

The DHCP race is one part I didn’t go into detail about since I’m not very familiar with the details, but what you wrote makes sense. One potential danger is a hacker at a coffee shop, where the shop owner is unlikely to be monitoring the network, and there are going to be many new connections coming in all the time. It’s still an unlikely scenario, but it also isn’t a particularly difficult attack.

permalink
report
parent
reply

No offense taken, on the contrary thanks for the constructive criticism! I’ll add some more details to my repo to make things more clear.

permalink
report
parent
reply

Yeah, it does come down to threat model and preference. If you only need to route specific apps, Gluetun sounds like a great solution.

permalink
report
parent
reply