cross-posted from: https://beehaw.org/post/13643895
Pulling this off requires high privileges in the network, so if this is done by intruder you’re probably having a Really Bad Day anyway, but might be good to know if you’re connecting to untrusted networks (public wifi etc). For now, if you need to be sure, either tether to Android - since the Android stack doesn’t implement DHCP option 121 or run VPN in VM that isn’t bridged.
Interesting it does not work on Linux or Android… Didn’t understand why though 😬
Android doesn’t implement the option that’s being abused for this exploit; and Linux offers more control allowing you to lock down the network stack enough to not be affected.
Good explanation, thank you!
It does affect Linux, tho! In fact that’s the only platform where proton claims to have no solution yet.