FINDING · DETECTION
When a VPN server uses Port Preservation for NAT, a co-tenant off-path attacker can infer another user's externally mapped source port by sending probe SYN packets with guessed ports through the tunnel and spoofed SYN/ACK verification packets outside the tunnel; confirmation comes from observing which port the VPN server forwards the response to, enabling targeted TCP session hijacking.
From 2026-yang-invisible-adversaries-systematic — Invisible Adversaries: A Systematic Study of Session Manipulation Attacks on VPNs · §III-B1, §IV-A, Table II · 2026 · arXiv preprint
Implications
- VPN and proxy servers should use random port selection rather than Port Preservation; Table II confirms that random selection blocks the port-inference prerequisite for TCP hijacking across all tested frameworks.
- Circumvention server operators should audit whether their NAT implementation defaults to Port Preservation and switch to random allocation to prevent session enumeration by co-tenants.
Tags
Extracted by claude-sonnet-4-6 — review before relying.