Skip to main content
School of Electronic Engineering and Computer Science

Most internet anonymity software leaks users’ details

Services used by hundreds of thousands of people in the UK to protect their identity on the web are vulnerable to leaks, according to our researchers.

Published:

Services used by hundreds of thousands of people in the UK to protect their identity on the web are vulnerable to leaks, according to our researchers.

School of Electronic Engineering and Computer Science researchers presented an important paper yesterday at the Privacy Enhancing Technologies Symposium: ‘A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients’.

Virtual Private Networks (VPNs) are legal and increasingly popular for individuals wanting to circumvent censorship, avoid mass surveillance or access geographically limited services like Netflix and BBC iPlayer. Used by around 20 per cent of European internet users they encrypt users’ internet communications, making it more difficult for people to monitor their activities.

Our lecturers Gareth Tyson and Hamed Haddadi, together with Vasile C. Perta, Marco V. Barbera, and Alessandro Mei of Sapienza University of Rome, found that eleven of fourteen popular VPN providers leaked information about the user. This was because of a vulnerability known as ‘IPv6 leakage’. The leaked information ranged from the websites a user is accessing to the actual content of user communications, for example comments being posted on forums. Interactions with websites running HTTPS encryption, which includes financial transactions, were not leaked.

The leakage occurs because network operators are increasingly deploying a new version of the protocol used to run the Internet called IPv6. IPv6 replaces the previous IPv4, but many VPNs only protect user’s IPv4 traffic. The researchers tested their ideas by choosing fourteen of the most famous VPN providers and connecting various devices to a WiFi access point which was designed to mimic the attacks hackers might use.

Researchers attempted two of the kinds of attacks that might be used to gather user data – ‘passive monitoring’, simply collecting the unencrypted information that passed through the access point; and DNS hijacking, redirecting browsers to a controlled web server by pretending to be commonly visited websites like Google and Facebook.

The study also examined the security of various mobile platforms when using VPNs and found that they were much more secure when using Apple’s iOS, but were still vulnerable to leakage when using Google’s Android.

Dr Gareth Tyson, a lecturer in networks and co-author of the study, said:

“There are a variety of reasons why someone might want to hide their identity online and it’s worrying that they might be vulnerable despite using a service that is specifically designed to protect them.

“We’re most concerned for those people trying to protect their browsing from oppressive regimes. They could be emboldened by their supposed anonymity while actually revealing all their data and online activity and exposing themselves to possible repercussions.”

More Information:
The paper ‘A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients’ by V. Perta, M. Barbera, G. Tyson, H. Haddadi, A. Mei was presented at the Privacy Enhancing Technologies Symposium on Tuesday 30 June 2015.

 

 

Back to top