Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


ZenMate now MITMing connections
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

ZenMate now MITMing connections

joepie91joepie91 Member, Patron Provider
edited September 2016 in General

Source:

For those who use ZenMate: you should be aware that they are now actively MITMing your connections, to show 'offers' (and do who knows what else):

What this means in practice, is that ZenMate is looking at your traffic and processing it in some way. Exactly how they are processing it is unclear and likely always will be, but one thing that is certain is that your traffic isn't private.

This really should not be possible at all, especially for things that use TLS. I'm unsure of the exact implementation, but there are a few ways this can be happening:

  1. ZenMate is generating fake certificates - either with the help of a Certificate Authority, or by installing a custom certificate on the user's system. Both are bad.
  2. ZenMate is stripping TLS connections where possible, and the service in question (Steam, apparently) doesn't use HSTS to enforce a TLS connection. I don't know whether this is the case.

Either way, this would be a good moment to stop using ZenMate, or really any kind of VPN or proxy. This post explains why. It's worth nothing that every third-party proxy/VPN could be doing this without you knowing, it's just that there's now hard evidence for ZenMate doing so.

EDIT: Judging from the address bar on the screenshot, they are indeed stripping TLS. Very, very bad idea.

EDIT2: It seems Steam isn't enforcing TLS at all? I'm unclear on exactly how ZenMate deals with TLS when it's present, but given that almost every ecommerce place uses TLS, I can't imagine it doesn't try to circumvent it in some way... or the entire concept wouldn't work.

Comments

  • Is steam not using HSTS?

  • joepie91joepie91 Member, Patron Provider

    @teamacc said:
    Is steam not using HSTS?

    Seems not. I don't really know why.

  • joepie91 said: I don't really know why.

    To support the people using IE6..? :P

  • joepie91joepie91 Member, Patron Provider

    @karatekidmonkey said:

    joepie91 said: I don't really know why.

    To support the people using IE6..? :P

    IE6 would just ignore the HSTS header, though, so you don't need to disable HSTS for that. It's an opt-in header, meaning that if it's not present, it will not be applied.

    That's also why there's a "HSTS preload list" - normally, you'd have to be able to trust the first request to a service (over HTTP) to send you a HSTS header (since by default there won't be HSTS), and then your browser will remember that setting for the specified domain and duration.

    As a site operator, you can add your domain to a HSTS preload list, and that list is included in most of the major browsers, so that the browser knows to always use TLS even before it has ever talked to the server.

  • @joepie91 said:
    Source:

    For those who use ZenMate: you should be aware that they are now actively MITMing your connections, to show 'offers' (and do who knows what else):

    What this means in practice, is that ZenMate is looking at your traffic and processing it in some way. Exactly how they are processing it is unclear and likely always will be, but one thing that is certain is that your traffic isn't private.

    This really should not be possible at all, especially for things that use TLS. I'm unsure of the exact implementation, but there are a few ways this can be happening:

    1. ZenMate is generating fake certificates - either with the help of a Certificate Authority, or by installing a custom certificate on the user's system. Both are bad.
    2. ZenMate is stripping TLS connections where possible, and the service in question (Steam, apparently) doesn't use HSTS to enforce a TLS connection. I don't know whether this is the case.

    Either way, this would be a good moment to stop using ZenMate, or really any kind of VPN or proxy. This post explains why. It's worth nothing that every third-party proxy/VPN could be doing this without you knowing, it's just that there's now hard evidence for ZenMate doing so.

    EDIT: Judging from the address bar on the screenshot, they are indeed stripping TLS. Very, very bad idea.

    EDIT2: It seems Steam isn't enforcing TLS at all? I'm unclear on exactly how ZenMate deals with TLS when it's present, but given that almost every ecommerce place uses TLS, I can't imagine it doesn't try to circumvent it in some way... or the entire concept wouldn't work.

    Well, another fucking shitty money-making, privacy invasive piece of crap.

    Thanked by 1inthecloudblog
  • Are you sure this is not a plugin in the browser?

  • what kind of measures should be taken by a VPN company to provide its users with security.. In other words how can a VPN company assure its users about the safety of their info on its servers. What measures can a company take ?

  • rm_rm_ IPv6 Advocate, Veteran
    edited December 2016

    Needs some introduction as to what the actual fuck is "Zen Mate"

    Thanked by 2Janevski netomx
  • @rm_ said:
    Needs some introduction as to what the actual fuck is "Zen Mate"

    Popular chrome VPN/Proxy extension....used by many

  • @noaman said:

    @rm_ said:
    Needs some introduction as to what the actual fuck is "Zen Mate"

    Popular chrome VPN/Proxy extension....used by many

    If it's an extension, then it could be injecting these elements itself, and there is no need for tls magic. The same as how adblockers work.

    But, the image seems to be IE?

    Thanked by 1deadbeef
  • You get what you pay for.

  • @yomero said:
    But, the image seems to be IE?

    Firefox

    Thanked by 2yomero deadbeef
  • deadbeefdeadbeef Member
    edited December 2016

    I thought IE too :D I'm a Blink guy, what can I say...

  • @yomero said:

    @noaman said:

    @rm_ said:
    Needs some introduction as to what the actual fuck is "Zen Mate"

    Popular chrome VPN/Proxy extension....used by many

    If it's an extension, then it could be injecting these elements itself, and there is no need for tls magic. The same as how adblockers work.

    It's just like @yomero says. Extensions run at the document level, whatever has happened during transport is well over by that time. Very surprised @joepie mixed that - I read his post and took it at face value.

  • williewillie Member
    edited December 2016

    HSTS is a pain unless the info on the site is actually private. Python.org has HSTS enabled even though it's a completely innocuous informational site about a programming language. It also uses a StartSSL or maybe WoSign certificate which is bogus these days. I took WoSign and StartSSL out of my browser trust list and that makes it impossible to view Python.org through the browser (maybe I'll figure out some hacky workaround).

    I prefer the system where the browser pops an alert saying the cert is untrusted, giving the user the option of accepting what amounts to an insecure connection. Given that plenty of web sites are unencrypted http, it seems ok to decide to browse an https site without trusting the security.

  • FranciscoFrancisco Top Host, Host Rep, Veteran

    @willie - MITM yourself :D

    Francisco

    Thanked by 3netomx tmwc yomero
  • willie said: Python.org has HSTS enabled even though it's a completely innocuous informational site about a programming language. It also uses a StartSSL or maybe WoSign certificate which is bogus these days

    python.org use's a DigiCert EV cert not WoSign or StartSSL.

  • Razza said: python.org use's a DigiCert EV cert not WoSign or StartSSL.

    I see a startcom cert:

    $ openssl s_client -connect  python.org:443 -showcerts
    
    depth=2 C = IL, O = StartCom Ltd., OU = Secure Digital Certificate Signing, CN = StartCom Certification Authority
    verify return:1
    depth=1 C = IL, O = StartCom Ltd., OU = Secure Digital Certificate Signing, CN = StartCom Class 2 Primary Intermediate Server CA
    verify return:1
    depth=0 C = US, ST = Oregon, L = Beaverton, O = Python Software Foundation, CN = *.python.org, emailAddress = [email protected]
    verify return:1
    ...
    
    Thanked by 1Razza
  • WilliamWilliam Member
    edited January 2017

    willie said: It also uses a StartSSL

    Removing that means you now also cannot access any website of over 1million Gandi (French ISP, also hosts Python.org) customers anymore - They used Startcom as primary. They are also one of the largest hosting providers in Europe...

    joepie91 said: EDIT2: It seems Steam isn't enforcing TLS at all?

    Why would it? This would IMMEDIATELY break most of Steam in Kazakhstan, Saudi Arabia (not anymore? seems SSL mostly works now) and multiple other countries that enforce MITM or block SSL entirely.

    Profit wise it makes far more sense to NOT do this, you might not like it but Steam/Valve is a business, not a privacy protection company.

    Thanked by 1TarZZ92
  • Lol. You don't need to go farther than their website to figure out it's a scam.

    https://zenmate.com/ loads content from 5 different hosts, including google and the page is full of dirty javascript.

    Privacy for sure.

    Thanked by 1Janevski
  • cubedatacubedata Member, Patron Provider
    edited January 2017

    Here is what we use my own vpn server we made off my 2012r2 server it runs Microsoft ssl vpn implementation and it works great

  • willie said: I see a startcom cert:

    Your right, i was looking at www.python.org funny www and python.org got two different ssl cert.

Sign In or Register to comment.