Jump to content
  • 0

IPv6 Leakage and DNS Hijacking in Commercial VPN clients study

Rate this question




Has anyone read the article :

A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients' by

Vasile C. Perta, Marco V. Barbera, Gareth Tyson, Hamed Haddadi

and Alessandro Mei?


The article says Torguard didn't have a problem (like most vpn services) with IPv6 leakage, but like almost all the others it was susceptible to DNS hijacking. It also proposed that VPN services weren't nearly as anonymous as they claimed to be, and this doesn't mean the not keeping logs part (which is important, but a misleading claim it turns out).

I'm pretty concerned about all this. Any comments?











Link to post
Share on other sites

1 answer to this question

Recommended Posts

  • 0
TorGuard Admin



Please see our new IPv6 leak prevention feature here:




Regarding the point on DNS: It is important to note that the potential for this exploit only exists (in theory) if you are connected to a compromised WiFi network in which the attacker has gained full control of the router. (If that is the case, DNS hijacking is only the beginning of one’s worries.) During our own testing of TorGuard’s OpenVPN app, we were unable to reproduce this when using private DNS servers because any DNS queries can only be accessed from within the tunnel itself. Regardless, we are researching this further and will release new features to patch this if necessary. 



Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Answer this question...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...