首页> 外文会议>International Carnahan Conference on Security Technology >One leak will sink a ship: WebRTC IP address leaks
【24h】

One leak will sink a ship: WebRTC IP address leaks

机译:一次泄漏将使一艘船沉没:WebRTC IP地址泄漏

获取原文

摘要

The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. WebRTC is a set of communications protocols and APIs that provides browsers and mobile applications with Real-Time Communications (RTC) capabilities over peer-to-peer connections. The WebRTC API causes a range of client IP addresses to become available to a visited website via JavaScript, even if a VPN is in use. This is informally known as a WebRTC Leak, and is a potentially serious problem for users using VPN services for anonymity. The IP addresses that could leak include the client public IPv6 address and the private (or local) IP address. The disclosure of such IP addresses, despite the use of a VPN connection, could reveal the identity of the client as well as enable client tracking across websites. To better understand the magnitude of this issue, we performed experiments with the five most widely used WebRTC-enabled browsers, i.e. Chrome, Firefox, Opera, Edge and Safari. We tested each of them with five widely used commercial VPN services in order to discover which client IP addresses can be revealed. Our experiments employed a specially established website which downloaded a slightly modified version of publicly available JavaScript to the client under test. The script fetches IP addresses made available via the browser WebRTC functionality. In most cases, at least one of the client IP addresses is leaked. Edge was the most seriously affected by WebRTC leaks, whereas Safari leaked no addresses at all. Our experiments revealed that the number and type of leaked IP addresses are affected by the choice of browser as well as the VPN service and program settings. We conclude the paper by proposing countermeasures that can be used to help mitigate this problem.
机译:WebRTC API在现代浏览器中的引入给用户隐私带来了新的威胁。 WebRTC是一组通信协议和API,可通过对等连接为浏览器和移动应用程序提供实时通信(RTC)功能。即使使用了VPN,WebRTC API也会通过JavaScript使一定范围的客户端IP地址可供访问的网站使用。这被非正式地称为WebRTC泄漏,对于使用VPN服务进行匿名处理的用户而言,这是一个潜在的严重问题。可能泄漏的IP地址包括客户端的公共IPv6地址和私有(或本地)IP地址。尽管使用了VPN连接,但此类IP地址的公开仍可以揭示客户端的身份,并使客户端可以跨网站进行跟踪。为了更好地了解此问题的严重性,我们使用了五个使用最广泛的支持WebRTC的浏览器进行了实验,这些浏览器分别是Chrome,Firefox,Opera,Edge和Safari。我们使用五种广泛使用的商业VPN服务对它们中的每一个进行了测试,以发现可以公开哪些客户端IP地址。我们的实验使用了一个专门建立的网站,该网站将经过稍微修改的公开JavaScript版本下载到了受测试的客户端。该脚本获取通过浏览器WebRTC功能提供的IP地址。在大多数情况下,至少一个客户端IP地址被泄漏。 Edge受WebRTC泄漏的影响最严重,而Safari根本没有泄漏任何地址。我们的实验表明,泄漏的IP地址的数量和类型受浏览器的选择以及VPN服务和程序设置的影响。我们通过提出可用于缓解此问题的对策来结束本文。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号