Mullvad VPN

25 readers
1 users here now

The unofficial community subreddit for Mullvad VPN.

founded 1 year ago
MODERATORS
701
 
 
The original post: /r/mullvadvpn by /u/BitBoy1999 on 2024-12-11 16:29:20.

When I open the app, I can't share the screen to my TV via AirPlay, when I close the app it works again, I have already activated the "Local Network Sharing" function

702
 
 
The original post: /r/mullvadvpn by /u/MullvadNew on 2024-12-11 14:50:09.

Link: https[://]mullvad[.]net/en/blog/the-report-for-the-2024-security-audit-of-the-app-is-now-available


The third party security audit of the Mullvad VPN app has concluded that the app has a high security level. Some non-critical issues were found, and have been fixed to the extent possible.

We have been conducting external security audits of our VPN apps biennially since 2018. We did this in 2018 (https[://]mullvad[.]net/blog/2018/9/24/read-results-security-audit-mullvad-app/), 2020 (https[://]mullvad[.]net/blog/2020/6/25/results-available-audit-mullvad-app/) and 2022 (https[://]mullvad[.]net/en/blog/security-audit-report-for-our-app-available). Two more years have passed and a fourth audit has recently been completed.

Four people from X41 D-Sec performed a penetration test and source code audit of the Mullvad VPN app on all supported platforms for a total of 30 person-days. The audit was performed between 23rd October 2024 and 28th November 2024. The audit report was handed over to Mullvad on 30th November 2024.

Three quotes with key conclusions from the report:

A total of six vulnerabilities were discovered during the test by X41. None were rated as having a critical severity, three as high, two as medium, and one as low. Additionally, three issues without a direct security impact were identified.

Overall, the Mullvad VPN Application appear to have a high security level and are well positioned to protect from the threat model proposed in this report. The use of safe coding and design patterns in combination with regular audits and penetration tests led to a very hardened environment.

In conclusion, the client applications exposed a limited number of relevant vulnerabilities. Mullvad VPN AB addressed them swiftly and the fixes were audited to be working properly.

Read the report

The final report is available on X41's website. We also host all revisions of the report in our git repository.

Overview of findings

A total of six vulnerabilities were discovered during the test by X41. None were rated as having a critical severity, three as high, two as medium, and one as low. Additionally, three issues without a direct security impact were identified.

Mullvad implemented fixes for four of the issues during the audit, and released a new version of the app on the affected platforms around the time when we were handed the audit report.

For more details on each finding, please see our audit documentation in git.

MLLVD-CR-24-01: Signal Handler Alternate Stack Too Small (Severity: High)

The alternative stack configured for the fault signal handler in mullvad-daemon was too small. Since there was no guard page or other stack overrun protections in place, this could lead to the signal handler reading and writing beyond the allocated stack, leading to potential heap corruption and undefined behavior. This affected Android, Linux and macOS.

The fix for this issue is included in version 2024.8 for desktop and version 2024.9 for Android.

We agree with the conclusion from X41 that this vulnerability is not trivial to exploit, but if exploited it would be severe. Due to the low exploitability and the fact that this issue has been present for multiple years without any practical issues surfacing, we decided to not immediately mark existing apps as unsupported, but to release a fixed app version as soon as the audit was complete. We still recommend users on the affected platforms to upgrade to the latest version of the app at their earliest convenience.

MLLVD-CR-24-02: Signal Handler Uses Non-Reentrant Safe Functions (Severity: High)

The fault signal handler in mullvad-daemon called functions which are not signal safe. This could cause undefined behavior, or worst case, be exploitable if the attacker was able to control enough of the program state and externally trigger a fault. This affected Android, Linux and macOS.

The fix for this issue is included in version 2024.8 for desktop and version 2024.9 for Android.

We are not aware of any way to maliciously or accidentally exploit or trigger this bug. This bug has been around for multiple years without any practical issues surfacing. So just like for MLLVD-CR-24-01 above, we decided to not release any quick patch release immediately, but instead wait for the audit to finish and release fixes for all audit findings at the same time.

MLLVD-CR-24-03: Virtual IP Address of Tunnel Device Leaks to Network Adjacent Participant (Severity: Medium)

The Linux kernel (and consequently Android) by default replies to ARP requests for any local target IP address, configured on any interface. This allows an attacker on the same local network to learn the IP address of the VPN tunnel interface by sending an ARP request for every private IPv4 address to the device.

This can be used by an adversary on the same local network to make a qualified guess if the device is using Mullvad VPN. Furthermore, since the in-tunnel IP only changes monthly, the adversary can also possibly identify a device over time.

Linux and Android are the only affected operating systems. For Linux, the fix for this issue is included in version 2024.8.

Android apps, including Mullvad VPN, do not have the permission to change this OS behavior. All Android devices that we know of are affected. We have reported this issue upstream to Google, and recommended that they change the relevant settings to prevent this issue.

We don't consider this a high severity leak since the in-tunnel IP does not disclose a lot about the user. The IP is also automatically rotated every month, only making it a temporary identifier. However, Android users that are worried can log out and back in to the app, as this gives them a new tunnel IP. We are working on solutions that stops the in-tunnel IP from remaining the same over time. When this has been deployed, the issue will be gone on Android also.

MLLVD-CR-24-04: Deanonymization Through NAT (Severity: Medium)

This attack is about how an attacker that can both observe a user’s tunnel traffic and also send UDP traffic with a spoofed sender IP can potentially infer if the user has a connection to a specific internet service. They can do this by sending UDP packets with a unique size with the source address and port set to the internet service they are interested in, the destination IP to the exit VPN relay of the user. They need to do this for every possible destination port. If the user has a connection with that internet service endpoint, eventually one packet will match the NAT table entry on the VPN relay and be forwarded down the tunnel. The attacker can then observe a packet on the tunnel with the unique size (plus VPN headers).

The attack would be hard to carry out. First of all the attacker would need to be able to send UDP packets with spoofed source IPs. Many network providers prevent this, but not all of them. The attacker would also need to be able to observe the client's tunnel traffic. On top of this, the attacker would also need to send large volumes of data with good timing to carry out the attack. If the attacker knows what VPN relay IP address the client exits through, they would need to send tens of thousands of packets before hitting the correct destination port, that match the relay's NAT table entry. Since every Mullvad relay has multiple exit IPs, and each client is assigned a random IP, the attacker would need to figure out what exit IPs the relay has, and repeat the above brute force method on all of them. Moreover, if the client uses multihop, the attacker can't easily infer what exit VPN relay the client uses. The attacker must then perform the above brute force attack against every exit IP of every Mullvad relay. All of this must be carried out in the somewhat short amount of time that the NAT table entry is active on the relay, meaning a time window of just a few minutes around when the client device communicates with the internet service.

This is a privacy problem with how UDP works in general, and not really about Mullvad VPN specifically. Since UDP is becoming a more common and important protocol due to http/3 and similar, Mullvad would love if it became the norm that all network providers performed UDP source address validation, as it would mitigate issues like this to a large extent.

The ...


Content cut off. Read original on https://old.reddit.com/r/mullvadvpn/comments/1hbv4jj/the_report_for_the_2024_security_audit_of_the_app/

703
 
 
The original post: /r/mullvadvpn by /u/shalomxyzw on 2024-12-11 14:46:43.

What will make me more private, is it Multihop or DAITA? Asking this bcs both enabled give me a speed of 300kbps on my preferred servers.

704
 
 
The original post: /r/mullvadvpn by /u/alettertoppl on 2024-12-11 11:23:47.
705
 
 
The original post: /r/mullvadvpn by /u/jakevox on 2024-12-11 07:03:15.

Until yesterday, the VPN UI has always opened right above the tray on the right corner of my taskbar. For some reason, since yesterday, it's been opening up right in the middle of my screen when I click the icon. The option to "unpin from taskbar" has always been off. I don't want to turn it on and reposition it manually because then it adds those ugly Windows borders around the app. It's always worked fine just as it was without that option. Also, if I reposition it manually and then turn off the "unpin from taskbar" option, it snaps back to the middle of my screen.

Is there a reason for this sudden change? Is it a bug? If so, I hope the devs can address it. It's not a major thing. But it's a thing. Thanks

706
 
 
The original post: /r/mullvadvpn by /u/Mydnight69 on 2024-12-11 05:24:51.

This one is a bit different. I live in the country with the Great Firewall and the service works great for most of the day - especially in the mornings. I don't have many complaints, though it does sometimes require searching around for faster servers.

In the evening, it slows down like crazy. I typically use fast.com to check speeds and last night I think I got around 500kBs from the usually LA server I use and like 1.5mBs from HK. I can watch TY and do basic stuff but updating or much else is painfully slow. During the day it can get up to 45mbs, etc.

Is it just the ISP being overloaded of what? Any tips or tricks to make my connection faster? I'm using WG.

707
 
 
The original post: /r/mullvadvpn by /u/0x536D6972 on 2024-12-11 03:57:59.

Hi, im using vpn to connect to offsec Vpnlabs(county wide firewall)and while im successfully connected to offsec the VMs still seems unreachable and the ping msg output is destination Host unreachable operation not permitted

708
 
 
The original post: /r/mullvadvpn by /u/Firm_Proof4745 on 2024-12-11 00:15:31.

going to China for 4 weeks, would Mullvad be good vpn use on laptop? Just for general spotify, youtube, social media access at night times.

709
 
 
The original post: /r/mullvadvpn by /u/Careless-Fisherman40 on 2024-12-10 14:05:55.

Is there a work around or solution? I have to turn off Mullvad, make my perplexity search on the perplexity app, then once done turn Mullvad back on.

There’s no split tunneling in iOS, is there a work around?

710
 
 
The original post: /r/mullvadvpn by /u/ImpressiveDark3026 on 2024-12-10 06:47:11.

I've been using Mullvad for a while now and all is good. Decided to try out multi-hop today. I understand it reduces latency but it was quite noticeable. I've never noticed latency issues with mullvad before, so I decided to measure it using ping google.com

Multi-hop on: ~320ms

Multi-hop off: ~40ms

Mullvad off: ~15ms

Seems a bit extreme, is this expected? Would using WireGuard rather than Mullvad client help a lot or not really?

711
 
 
The original post: /r/mullvadvpn by /u/RedSwordMan on 2024-12-09 12:18:02.
712
 
 
The original post: /r/mullvadvpn by /u/SuperPigDots on 2024-12-09 10:54:10.

I just installed Mullvad on my new PC and the little Mullvad app window now pins to the center of my PC screen. This is really ugly and annoying to me. It always pinned to the bottom right corner of the screen (next to the lock system tray icon) on my previous PC. That made sense and was more functional.

To make matters worse, when I go to select the option to find more apps on split tunneling, that pop-up window is pinned below the annoyingly center-pinned Mullvad main app window. I have to shuffle that split tunneling screen around the Mullvad main app window multiple times just to be able to read the file path or select the buttons.

This is a horrible UI and UX. Has anyone expereinced this and does anyone have a suggested fix?

Also, I have always been annoyed that the Mullvad PC app shows the same size as a mobile screen and isn't adjustable. I am using a PC for a reason, the main one being that I like to work with a bigger screen. It seems like pure developer laziness imo. It's not hard to create dynamic mobile/tablet/desktop interfaces for apps nowadays. It's pretty darn standard.

713
 
 
The original post: /r/mullvadvpn by /u/No_Clock2390 on 2024-12-09 05:15:58.

I have the same question as this guy who never got an answer https://www.reddit.com/r/mullvadvpn/comments/17r8ggo/mullvad_adapter_in_hyperv_vm/

The Mullvad network adapter doesn't show up in the Hyper-V Virtual Switch Manager

714
 
 
The original post: /r/mullvadvpn by /u/MostDubs on 2024-12-09 04:29:15.

When I switch servers, is there a chance my IP will leak?

715
 
 
The original post: /r/mullvadvpn by /u/jikesar968 on 2024-12-09 03:39:26.

I don't mean to attack the developers in any way but truth be told, being blocked by more and more websites makes Mullvad increasingly unusable. There are numerous websites that provide 403 and other kinds of error messages. Even on Reddit, I constantly need switch servers to find one that isn't blocked. Not even switching to old Reddit or logging in works anymore in a lot of cases. I can't even watch YouTube via NewPipe and LibreTube without changing servers every few videos now. It's even more annoying when my accounts on some websites get permabanned the second I create them.

It used to be that only streaming services didn't work or that you were fed annoying amounts of captchas, but now Mullvad is being outright blocked by a sizeable portion of the internet.

They seriously need to work out something with IP blacklist creators and/or develop some kind of workaround to bypass these blocks. Even if it is a cat and mouse game, that's still preferable to the current situation.

716
 
 
The original post: /r/mullvadvpn by /u/0rionis on 2024-12-08 21:34:48.

Am I the only one? Any fix?

717
 
 
The original post: /r/mullvadvpn by /u/Bob_Lennart_92 on 2024-12-08 07:02:47.

Greetings. I recently acquired mullvad VPN mainly to access streaming services from different countries. For example, BBC iplayer requires you to be in the UK to use. This works with another brand of VPN i have used in the past, but with mullvad it doesn't seem to work. Even if i connect to the UK, it still recognizes that i am not in the UK. Am i doing something wrong? I'm new to this VPN business so be gentle.

718
 
 
The original post: /r/mullvadvpn by /u/Dreddguy on 2024-12-08 03:11:07.

Any plans to set up in India? One sixth of the planet's population. Nearly 1.5 billion people and no Mullvad servers.

719
 
 
The original post: /r/mullvadvpn by /u/Alexis___________ on 2024-12-08 03:00:05.

Every time I try do the Fedora install instructions with the terminal I get an error message that says

error: unrecognized subcommand 'config-manager'

is there any way to fix this?

720
 
 
The original post: /r/mullvadvpn by /u/billybellybutton on 2024-12-07 20:41:57.

Hey all,

I am not a super technically profiecient guy so sorry if this question is dumb but I am in the UAE and got a new Mac. I want to install the app but unable to do so because they won't let me visit the website. What are my options for I can install the app? As I understand, the app is not on the Mac Appstore.

Thanks in advance for your help!

721
 
 
The original post: /r/mullvadvpn by /u/jdoggo90 on 2024-12-07 18:11:44.

When updating Mullvad on Mac OS the vpn closes and installs the new version. Does this cause my real IP to leak?

722
 
 
The original post: /r/mullvadvpn by /u/Proved3119 on 2024-12-07 17:06:43.

I saw that its best to leave mullvad browser the same as you install it; but i want to tweak the dns to nextdns because it provides me more blocklists. So my question is if i do that would i be better off sticking to a hardened firefox or is it fine to modify the dns on mullvad browser?

723
 
 
The original post: /r/mullvadvpn by /u/emanbuoy on 2024-12-07 16:21:37.

HI ALL, I AM trying to set up my opnsense so i can use mullvad vpn to route all of my internet traffic out to the internet with the VPN.

currently,

Brief details on my setup( I DID THE WHOLE SET UP JUST WATCHING YT VIDEOS, I AM A COMPLETE NOOB AT THIS)

-i have opn sense runningby it self on an old dell desktop

-i have my mail LAN with about 5 vlans running

-for DNS, i use adguard home and it be4en great, no problem at all

-ALL OF THIS WORKS AND I AM ABLE TO COMMUNICATE WITH OTHER VLANS ON MY NETWORK AS I PERMIT

MY PROBLEMS

I HAVE BEEN TRYING TO SET UP MULLVARD TO ROUTE ALL OF MY INTERNET TRAFFIC OUT TO THE INTERNET INCLUING THE ONES ON THE VLAN BUT I HAVE BEEN UNABLE TO DO THAT, I TRIED FOLLOWING TWO YT VIDEO ( https://www.youtube.com/watch?v=fFszlJpTBoc&t=29s AND https://www.youtube.com/watch?v=ev3uT-dPSyc )

i can set each of my network like my lan or vlan to each use the gateway, they work but once that happens i loose access to communication with other network like i have been able to, once i set it to use the default gateway, everything start to work normall again.

MY GOAL/WHAT I AM TRYING TO ARCHIVE

1. I want to route all of my internet over mullvard to the internet, and i still want my network to be able to communicate to each other( the ones i allow to do that)

2.i will like to keep adguard as my Dns server( i notice once i set mullvard to be the gateway it hijacks the dns aswell.

Thank you so much, configuration pics

https://preview.redd.it/nls1t53n6g5e1.jpg?width=1257&format=pjpg&auto=webp&s=e87dcb98226749be245aa14a6c6fed03993afe7f

https://preview.redd.it/62e4v63n6g5e1.jpg?width=1273&format=pjpg&auto=webp&s=9db09ae4722a190fbd258b3432cf980b7fa7aa94

https://preview.redd.it/fcenw73n6g5e1.jpg?width=1258&format=pjpg&auto=webp&s=04be2fd8f6a49caf923b1bf8e4c56a3e02a6a1fe

https://preview.redd.it/xosug73n6g5e1.jpg?width=1272&format=pjpg&auto=webp&s=1a3263a77c7b3f0d196d8fc2397dd43e870febcb

https://preview.redd.it/z37m5z3n6g5e1.jpg?width=1236&format=pjpg&auto=webp&s=e1d51697962d474ede900a0441609d8d72af6593

https://preview.redd.it/jm3nr73n6g5e1.jpg?width=1243&format=pjpg&auto=webp&s=c6c3d1e66052f33ff5fdd25c469a8c50cd1eb20d

https://preview.redd.it/gkwul73n6g5e1.jpg?width=868&format=pjpg&auto=webp&s=24a4d99fb64f94deb5a0f39d91644b80211a89da

724
 
 
The original post: /r/mullvadvpn by /u/CarelessDot5657 on 2024-12-07 14:03:35.

Edit 3: So after learning it was only me I decided to restart. Mullvad connected, disconnected for a second, connected again and now seems to be stable. Really strange behaviour tbh but leaving this here as documentation in case this finds someone in the same boat

Edit 2: Nvm apparently it's just me. I'm not sure why :/

Site and client are down for me. Edit: There are enough reports on downdetector now that I'm pretty sure it really is down. What a shame

725
 
 
The original post: /r/mullvadvpn by /u/Coolst3r on 2024-12-07 11:11:48.

hi everyone i found a problem with mullvad and account generation this is just theory and a poc but this is opensource so i thought about this since mullvad account only have number why cant account just be brute forced and saved to a list of valid ones and it turns out it might me possible

remediation is hexadecimal accounts not just numbers

Generate Account Numbers Sequentially: Use a tool like seq in Linux or Python to generate numbers in the required 16-digit format.

Test Against Mullvad's API: Use curl or a similar tool to send HTTP requests to the Mullvad endpoint to check if an account number is valid.

Save Valid Accounts: If the API response indicates the account is valid, save the number to a file.

validgen is the final poc

poc: https://github.com/s-b-repo/mullvad-vpn-account-gen

view more: ‹ prev next ›