So for this attack to work, the attacker needs to be able to run a malicious DHCP server on the target machine’s network.
Meaning they need to have already compromised your local network either physically in person or by compromising a device on that network. If you’ve gotten that far you can already do a lot of damage without this attack.
For the average person this is yet another non-issue. But if you regularly use a VPN over untrusted networks like a hotel or coffee shop wifi then, in theory, an attacker could get your traffic to route outside the VPN tunnel.
adam_y@lemmy.world 6 months ago
So there are ways.
Rin@lemm.ee 6 months ago
Common Linux w
NeatNit@discuss.tchncs.de 6 months ago
Not really, Linux is still vulnerable and there is a mitigation but it opens a side channel attack.
sugar_in_your_tea@sh.itjust.works 6 months ago
Except sometimes.
FridaG@reddthat.com 6 months ago
True, if you neg a linux dev online enough for two years, you can make your entire infrastructure vulnerable to attack
pineapplelover@lemm.ee 6 months ago
Wait so the vulnerability exists on macos and iphone even though those are based on bsd (right?)
Natanael@slrpnk.net 6 months ago
Hilariously enough, Windows users can use WSL to run a Linux VPN (but only applications running in WSL are safe if I understand the attack right)
lurch@sh.itjust.works 6 months ago
This is the way
Railing5132@lemmy.world 6 months ago
Hate to rain on the Linux parade here, but didn’t the article say: “There are no ways to prevent such attacks except when the user’s VPN runs on Android.” and that Linux was just as vulnerable as Windows?
0xD@infosec.pub 6 months ago
It’s not as vulnerable but it still is.
noodlejetski@lemm.ee 6 months ago
you’re replying to a verbatim quote from the article.