EarthVPN certificate configuration vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



EarthVPN (www.earthvpn.com) is a VPN service provider which claims "When connected, your data will be secured and encrypted, keeping all your personal details private. EarthVPN will make sure that your online presence cannot be intercepted, monitored and recorded by your internet service provider, company, school or government."

Their server configuration and suggested openvpn setup guide contains a number of vulnerabilities.

- The provided CA certificate earthvpn.crt is actually a public certificate authority ("GlobalSign Root CA"). This means that anybody can register for a valid SSL certificate from GlobalSign.

- the setup guide did not advise to enable the "certificate hostname check" (under "authentication/encryption"). This means that a certificate issued by GlobalSign to, say, fbi.gov will pass certificate validation, and can result in an active man-in-the-middle attack that could eavesdrop on all traffic.

- They appear to be using the same certificate ("*.earthvpn.com") and keys on all servers that I've tried to connect to. This means that compromise of any one of these servers would allow the theft of private keys that can be used to m-i-t-m any other server. Put another way, a Russian dissident might want to connect to their  UK servers to avoid interception of his traffic. But the Russian government could compel the datacentre in Russia hosting their server to reveal its keys. And it can use these keys to intercept and monitor the traffic to the UK server (or other servers).

EarthVPN has been contacted about these concerns, and insists that "it is not possible to do mitm attack without knowing username and password of the clients as authentication will not be succeeded."




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux