FINDING · DETECTION

The "port shadow" exploit abuses five shared, limited resources in Linux conntrack/Netfilter (and analogous frameworks in BSD, Windows) to let an off-path attacker intercept or redirect encrypted VPN traffic, de-anonymize a VPN peer's source IP, or portscan a peer hidden behind a VPN server — all without compromising the VPN's cryptographic layer. Four concrete attacks are demonstrated; formal model checking with bounded model checking verified six process-isolation mitigations that prevent the shared-resource collision.

From 2024-mixon-baca-snitchAttacking Connection Tracking Frameworks as used by Virtual Private Networks · Abstract, §3, §5 · 2024 · Proceedings on Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
middlebox-interferencepacket-injectionflow-correlation
defenses
tunneling

Extracted by claude-sonnet-4-6 — review before relying.