trailofbits / algo

Set up a personal VPN in the cloud
https://blog.trailofbits.com/2016/12/12/meet-algo-the-vpn-that-works/
GNU Affero General Public License v3.0
28.61k stars 2.32k forks source link

Support for "exit node" with different IP address #1626

Open tim1234567 opened 4 years ago

tim1234567 commented 4 years ago

Is your feature request related to a problem? Please describe. Advertisers and malicious actors can map your IP address with websites you visit. If an attacker can get control of the VPN server, or monitor the network of the server, they will be able to match VPN clients with their traffic, nullifying the privacy benefits of the VPN. In case of Algo it's even more important: all traffic from server's IP address completely belongs to VPN owner.

Such timing/correlation attacks are not difficult to accomplish. In countries with restrictive Internet regulations (China, Russia, Iran, Turkey, etc), or countries with broad surveillance powers (USA, UK, etc), state surveillance agencies typically have the legal ability to coerce either the VPN provider, or the network/server provider of the VPN provider, to assist with such network monitoring.

Describe the solution you'd like Create three instances of Algo in different locations and route all traffic through each of these servers (similar to Tor). For example:

user <-> Algo server #1 (UK) <-> Algo server #2 (Sweden) <-> Algo server #3 (Swiss) <-> website

Describe alternatives you've considered Similar solution is used by ProtonVPN Secure Core: https://protonvpn.com/support/secure-core-vpn/

TC1977 commented 4 years ago

See #1605.

dsecuma commented 4 years ago

In my case, I redirect all traffic to Tor transport port creating your own tor network

tim1234567 commented 4 years ago

See #1605.

That partially solves the case, but better than nothing. Thanks!

In my case, I redirect all traffic to Tor transport port creating your own tor network

An interesting approach to tackle the problem, I'll take a look. Thanks!