Tag Archive for: VPNs

China makes VPNs that bypass Great Firewall illegal – www.theinquirer.net


www.theinquirer.net

China makes VPNs that bypass Great Firewall illegal
www.theinquirer.net
The move means that all cable and VPN services in China will need prior government approval, but could also affect businesses designing and manufacturing goods in China, who fear that the campaign may also aid industrial espionage. The Ministry argues …
China tightens Great Firewall by declaring unauthorised VPN services illegalSouth China Morning Post

all 114 news articles »

Espionage China – read more

Cisco fixes iOS 9 compatibility issue that blocked some VPNs

When iOS 9 debuted in September, Cisco’s AnyConnect VPN client for iOS stopped working correctly with some VPN server configurations, preventing resources from loading. During iOS 9’s beta period, Cisco filed a bug report with Apple about iOS 9 breaking DNS resolution in IPv4-based split tunnneling, but iOS 9 shipped without a fix. So did iOS 9.01, 9.02, and this week’s iOS 9.1.

But on Thursday, Cisco released an AnyConnect client update in the App Store, version 4.0.03016, that resolves the issue. Split-tunnel VPNs again work correctly, InfoWorld’s tests reveal.

To read this article in full or to leave a comment, please click here

Network World Security

NSA has VPNs in Vulcan death grip—no, really, that’s what they call it

The National Security Agency’s Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today, according to documents published this week by the German news magazine Der Speigel. A slide deck from a presentation by a member of OTP’s VPN Exploitation Team, dated September 13, 2010, details the process the NSA used at that time to attack VPNs—including tools with names drawn from Star Trek and other bits of popular culture.

OTP’s VPN exploit team had members assigned to branches focused on specific regional teams, as well as a “Cross-Target Support Branch” and a custom development team for building specialized VPN exploits. At the regional level, the VPN team representatives acted as liaisons to analysts, providing information on new VPN attacks and gathering requirements for specific targets to be used in developing new ones.

While some VPN technologies—specifically, those based on the Point-to-Point Protocol (PPTP)—have previously been identified as being vulnerable because of the way they exchange keys at the beginning of a VPN session, others have generally been assumed to be safer from scrutiny. But in 2010, the NSA had already developed tools to attack the most commonly used VPN encryption schemes: Secure Shell (SSH), Internet Protocol Security (IPSec), and Secure Socket Layer (SSL) encryption.

Read 6 remaining paragraphs | Comments


Ars Technica » Technology Lab