首页> 外文会议>International Carnahan Conference on Security Technology >One leak will sink a ship: WebRTC IP address leaks
【24h】

One leak will sink a ship: WebRTC IP address leaks

机译:一个泄漏将沉没船:WebRTC IP地址泄漏

获取原文

摘要

The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. WebRTC is a set of communications protocols and APIs that provides browsers and mobile applications with Real-Time Communications (RTC) capabilities over peer-to-peer connections. The WebRTC API causes a range of client IP addresses to become available to a visited website via JavaScript, even if a VPN is in use. This is informally known as a WebRTC Leak, and is a potentially serious problem for users using VPN services for anonymity. The IP addresses that could leak include the client public IPv6 address and the private (or local) IP address. The disclosure of such IP addresses, despite the use of a VPN connection, could reveal the identity of the client as well as enable client tracking across websites. To better understand the magnitude of this issue, we performed experiments with the five most widely used WebRTC-enabled browsers, i.e. Chrome, Firefox, Opera, Edge and Safari. We tested each of them with five widely used commercial VPN services in order to discover which client IP addresses can be revealed. Our experiments employed a specially established website which downloaded a slightly modified version of publicly available JavaScript to the client under test. The script fetches IP addresses made available via the browser WebRTC functionality. In most cases, at least one of the client IP addresses is leaked. Edge was the most seriously affected by WebRTC leaks, whereas Safari leaked no addresses at all. Our experiments revealed that the number and type of leaked IP addresses are affected by the choice of browser as well as the VPN service and program settings. We conclude the paper by proposing countermeasures that can be used to help mitigate this problem.
机译:将WebRTC API引入现代浏览器已经为用户隐私带来了新的威胁。 WebRTC是一组通信协议和API,提供具有在对等连接上的实时通信(RTC)功能的浏览器和移动应用程序。即使在使用VPN,WebRTC API会导致一系列客户端IP地址可通过JavaScript可用于访问的网站。这是非正式称为WebRTC泄漏,对于使用VPN服务进行匿名的用户来说是一个可能的严重问题。可能泄露的IP地址包括客户端公共IPv6地址和私有(或本地)IP地址。披露此类IP地址,尽管使用VPN连接,但可以揭示客户端的身份,并在跨网站启用客户端跟踪。为了更好地了解这个问题的幅度,我们对最广泛使用的WebRTC的浏览器进行了实验,即Chrome,Firefox,Opera,Edge和Safari。我们用五种广泛使用的商业VPN服务测试了它们中的每一个,以便发现可以揭示哪些客户端IP地址。我们的实验聘请了一个专门建立的网站,该网站将略微修改的javascript版本下载到被测客户端。该脚本获取通过浏览器WebRTC功能可用的IP地址。在大多数情况下,至少一个客户端IP地址泄露。边缘是受到WebRTC泄漏最严重的影响,而Safari则泄露没有地址。我们的实验表明,泄露的IP地址的数量和类型受到浏览器的选择以及VPN服务和程序设置的影响。我们通过提出可以用来帮助减轻这个问题的对策来完成纸张。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号