FINDING · DETECTION

The root cause of port-shadow vulnerabilities is that connection-tracking frameworks maintain five shared, globally-accessible resources across all VPN clients on the same server. The paper's formal model identifies these as: the conntrack table, the NAT table, the port space, the routing table, and the ARP/neighbor cache. Any of these shared resources can be used as a side-channel. Bounded model checking confirmed that enforcing strict process isolation around all five resources eliminates the attack surface.

From 2024-mixon-baca-snitchAttacking Connection Tracking Frameworks as used by Virtual Private Networks · §4 (Formal Model), §6 (Mitigations) · 2024 · Proceedings on Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
middlebox-interferenceflow-correlation
defenses
tunneling

Extracted by claude-sonnet-4-6 — review before relying.