When a VPN server uses Port Preservation for NAT, a co-tenant off-path attacker can infer another user's externally mapped source port by sending probe SYN packets with guessed ports through the tunnel and spoofed SYN/ACK verification packets outside the tunnel; confirmation comes from observing which port the VPN server forwards the response to, enabling targeted TCP session hijacking.
From 2026-yang-invisible-adversaries-systematic — Invisible Adversaries: A Systematic Study of Session Manipulation Attacks on VPNs
· §III-B1, §IV-A, Table II
· 2026
· arXiv preprint
Implications
VPN and proxy servers should use random port selection rather than Port Preservation; Table II confirms that random selection blocks the port-inference prerequisite for TCP hijacking across all tested frameworks.
Circumvention server operators should audit whether their NAT implementation defaults to Port Preservation and switch to random allocation to prevent session enumeration by co-tenants.