Wiki Article

Draft:VORACLE

Nguồn dữ liệu từ Wikipedia, hiển thị bởi DefZone.Net

VORACLE

[edit]

The VORACLE (short for VPN ORACLE) is a class of compression oracle attacks against virtual private network (VPN) traffic that exploit the use of data compression prior to encryption. The attack allows an active network adversary to infer sensitive information by observing variations in encrypted packet sizes.[1][2]

VORACLE extends earlier compression-based attacks such as CRIME and BREACH, which targeted TLS and HTTP compression respectively, by applying similar techniques at the VPN tunnel layer.[3]

Background

[edit]

Compression-oracle attacks rely on the observation that compression algorithms produce shorter output when redundant data is present. If an attacker can influence plaintext that is compressed together with secret values and observe resulting ciphertext lengths, the attacker may infer the secret through adaptive queries.[1]

Earlier attacks such as CRIME and BREACH demonstrated this technique against web traffic. In response, TLS and HTTP compression were widely disabled. However, compression remained enabled in some VPN implementations, creating a residual attack surface.[4]

Attack description

[edit]

The VORACLE attack targets VPN configurations in which user traffic is compressed before encryption. An attacker who can inject or influence victim traffic and observe encrypted packet sizes can perform adaptive length analysis to infer secrets that share a compression context with attacker-controlled data.[1]

Unlike CRIME and BREACH, which operate at higher protocol layers, VORACLE operates below the transport layer, allowing it to bypass mitigations that disable compression in TLS or HTTP.[5]

The vulnerability does not depend on a specific encryption algorithm but arises from the interaction between compression and encryption.[6]

Affected systems

[edit]

VORACLE affects VPN setups that enable compression within encrypted tunnels, including configurations using OpenVPN and other tunneling protocols that compress plaintext prior to encryption.[7]

Mitigation

[edit]

The primary mitigation for the VORACLE attack is to disable compression in VPN tunnels, mirroring the mitigations adopted for earlier compression-oracle attacks.[7]

Industry response

[edit]

Following public disclosure, multiple VPN providers acknowledged the vulnerability and disabled compression in affected configurations.[7]

VPN providers including Proton VPN,[8] ExpressVPN,[9] NordVPN,[10] AirVPN,[11] TorGuard,[12] SAP,[13] and McAfee[14] published public statements describing the attack and confirming configuration changes to mitigate compression-oracle risks.

See also

[edit]

References

[edit]
  1. ^ a b c "VORACLE: Recovering HTTP Traffic from VPN Connections". arXiv. 2018.
  2. ^ "VORACLE attack can recover HTTP data from VPN connections". BleepingComputer. 2018.
  3. ^ "Compression and VPNs make for leaked secrets". PCMag. 2018.
  4. ^ "VPN VORACLE attack demonstrated at DEF CON". Tom's Guide. 2018.
  5. ^ "New VORACLE attack can recover HTTP data from some VPN connections". Slashdot. 2018.
  6. ^ "Your VPN service may be leaking private data". LiveMint. 2019.
  7. ^ a b c "The VORACLE attack vulnerability". OpenVPN. 2018.
  8. ^ "VORACLE attack". Proton VPN. 2018.
  9. ^ "ExpressVPN fixes VORACLE compression vulnerability". ExpressVPN. 2018.
  10. ^ "NordVPN and the VORACLE attack". NordVPN. 2018.
  11. ^ "AirVPN and VORACLE". AirVPN. 2018.
  12. ^ "TorGuard disables compression to protect against VORACLE attacks". TorGuard. 2018.
  13. ^ "VPN losing its security over a new threat: VORACLE". SAP. 2019.
  14. ^ "VORACLE OpenVPN attack: What consumers need to know". McAfee. 2019.