Block insecure private network requests
Author: s | 2025-04-23
Enable the Chrome flag Block insecure private network requests. chrome://flags/block-insecure-private-network-requests
Enforcing the blocking of insecure private network requests with
Block encryption algorithms and works in Cipher Feedback Mode, for each packet to be sent, the encryption process will start from encrypting a nonce from the system entropy, so encryption to same plaintexts never leads to a same ciphertexts thereafter.The contents of the packets are completely anonymous with encryption, including the headers(FEC,KCP), checksums and contents. Note that, no matter which encryption method you choose on you upper layer, if you disable encryption by specifying -crypt none to kcptun, the transmit will be insecure somehow, since the header is PLAINTEXT to everyone it would be susceptible to header tampering, such as jamming the sliding window size, round-trip time, FEC property and checksums. aes-128 is suggested for minimal encryption since modern CPUs are shipped with AES-NI instructions and performs even better than salsa20(check the table below).Other possible attacks to kcptun includes: a) traffic analysis, dataflow on specific websites may have pattern while interchanging data, but this type of eavesdropping has been mitigated by adapting smux to mix data streams so as to introduce noises, perfect solution to this has not appeared yet, theoretically by shuffling/mixing messages on larger scale network may mitigate this problem. b) replay attack, since the asymmetrical encryption has not been introduced into kcptun for some reason, capturing the packets and replay them on a different machine is possible, (notice: hijacking the session and decrypting the contents is still impossible), so upper layers should contain a asymmetrical encryption system to guarantee the authenticity of each message(to process message exactly once), such as HTTPS/OpenSSL/LibreSSL, only by signing the requests with private keys can eliminate this type of attack.Important:-crypt and -key must be the same on both KCP Client & KCP Server.-crypt xor is also insecure and vulnerable to known-plaintext attack, do not use this unless you know what you are doing. (cryptanalysis note: any type of counter mode is insecure in packet encryption due to the shorten of counter period and leads to iv/nonce collision)Benchmarks for crypto algorithms supported by kcptun:BenchmarkSM4-4 50000 32087 ns/op 93.49 MB/s 0 B/op 0 allocs/opBenchmarkAES128-4 500000 3274 ns/op 916.15 MB/s 0 B/op 0 allocs/opBenchmarkAES192-4 500000 Enable the Chrome flag Block insecure private network requests. chrome://flags/block-insecure-private-network-requests chrome flags block insecure private network requests On GrabDuck5,0(2)Shows GrabDuck search results side by side with Google, DuckDuckGo, Bing, or Yahoo results.!Bang Quick Search4,5(15)DuckDuckGo !bang quick search!bang2,0(1)!bang extention. a quick and geeky search engine.BangDD4,7(7)Adds a google bang in the duckduckgo searchDuckDuckGo Hider/Disguiser5,0(2)Search like a pro, look like a normy!Duck Duck Private0,0(0)The extension allows you to redirect requests to the Google search engine.POST Search Privacy5,0(2)Automatically replaces insecure GET requests of search providers with secure/private POST requests.DuckDuckGo Search Engines for Chrome0,0(0)All of the thousands of search engines from DuckDuckGo, in chrome! Simply type "!", press tab, then search for anything anywhere!DuckDuckGo to Google0,0(0)Unhappy with DuckDuckGo results? Quickly search the same query on Google. Use the toolbar button or the keyboard command shift + gSearch with DuckDuckGo3,7(9)Search with DuckDuckGo in ChromeAdd google search option to duckduckgo3,8(4)Hate when you can't find what you're looking for on DuckDuckGo? Why not look at Google with a simple press of the button!Omnibang5,0(2)Search many sites right from address bar using bangs provided by DuckDuckGo. Click Omnibang icon next to address bar for more info.Search Results on GrabDuck5,0(2)Shows GrabDuck search results side by side with Google, DuckDuckGo, Bing, or Yahoo results.!Bang Quick Search4,5(15)DuckDuckGo !bang quick search!bang2,0(1)!bang extention. a quick and geeky search engine.BangDD4,7(7)Adds a google bang in the duckduckgo searchDuckDuckGo Hider/Disguiser5,0(2)Search like a pro, look like a normy!Duck Duck Private0,0(0)The extension allows you to redirect requests to the Google search engine.POST Search Privacy5,0(2)Automatically replaces insecure GET requests of search providers with secure/private POST requests.Comments
Block encryption algorithms and works in Cipher Feedback Mode, for each packet to be sent, the encryption process will start from encrypting a nonce from the system entropy, so encryption to same plaintexts never leads to a same ciphertexts thereafter.The contents of the packets are completely anonymous with encryption, including the headers(FEC,KCP), checksums and contents. Note that, no matter which encryption method you choose on you upper layer, if you disable encryption by specifying -crypt none to kcptun, the transmit will be insecure somehow, since the header is PLAINTEXT to everyone it would be susceptible to header tampering, such as jamming the sliding window size, round-trip time, FEC property and checksums. aes-128 is suggested for minimal encryption since modern CPUs are shipped with AES-NI instructions and performs even better than salsa20(check the table below).Other possible attacks to kcptun includes: a) traffic analysis, dataflow on specific websites may have pattern while interchanging data, but this type of eavesdropping has been mitigated by adapting smux to mix data streams so as to introduce noises, perfect solution to this has not appeared yet, theoretically by shuffling/mixing messages on larger scale network may mitigate this problem. b) replay attack, since the asymmetrical encryption has not been introduced into kcptun for some reason, capturing the packets and replay them on a different machine is possible, (notice: hijacking the session and decrypting the contents is still impossible), so upper layers should contain a asymmetrical encryption system to guarantee the authenticity of each message(to process message exactly once), such as HTTPS/OpenSSL/LibreSSL, only by signing the requests with private keys can eliminate this type of attack.Important:-crypt and -key must be the same on both KCP Client & KCP Server.-crypt xor is also insecure and vulnerable to known-plaintext attack, do not use this unless you know what you are doing. (cryptanalysis note: any type of counter mode is insecure in packet encryption due to the shorten of counter period and leads to iv/nonce collision)Benchmarks for crypto algorithms supported by kcptun:BenchmarkSM4-4 50000 32087 ns/op 93.49 MB/s 0 B/op 0 allocs/opBenchmarkAES128-4 500000 3274 ns/op 916.15 MB/s 0 B/op 0 allocs/opBenchmarkAES192-4 500000
2025-03-26On GrabDuck5,0(2)Shows GrabDuck search results side by side with Google, DuckDuckGo, Bing, or Yahoo results.!Bang Quick Search4,5(15)DuckDuckGo !bang quick search!bang2,0(1)!bang extention. a quick and geeky search engine.BangDD4,7(7)Adds a google bang in the duckduckgo searchDuckDuckGo Hider/Disguiser5,0(2)Search like a pro, look like a normy!Duck Duck Private0,0(0)The extension allows you to redirect requests to the Google search engine.POST Search Privacy5,0(2)Automatically replaces insecure GET requests of search providers with secure/private POST requests.DuckDuckGo Search Engines for Chrome0,0(0)All of the thousands of search engines from DuckDuckGo, in chrome! Simply type "!", press tab, then search for anything anywhere!DuckDuckGo to Google0,0(0)Unhappy with DuckDuckGo results? Quickly search the same query on Google. Use the toolbar button or the keyboard command shift + gSearch with DuckDuckGo3,7(9)Search with DuckDuckGo in ChromeAdd google search option to duckduckgo3,8(4)Hate when you can't find what you're looking for on DuckDuckGo? Why not look at Google with a simple press of the button!Omnibang5,0(2)Search many sites right from address bar using bangs provided by DuckDuckGo. Click Omnibang icon next to address bar for more info.Search Results on GrabDuck5,0(2)Shows GrabDuck search results side by side with Google, DuckDuckGo, Bing, or Yahoo results.!Bang Quick Search4,5(15)DuckDuckGo !bang quick search!bang2,0(1)!bang extention. a quick and geeky search engine.BangDD4,7(7)Adds a google bang in the duckduckgo searchDuckDuckGo Hider/Disguiser5,0(2)Search like a pro, look like a normy!Duck Duck Private0,0(0)The extension allows you to redirect requests to the Google search engine.POST Search Privacy5,0(2)Automatically replaces insecure GET requests of search providers with secure/private POST requests.
2025-04-13Learn about using private endpoints to reach your Object Storage buckets and objects using a private IP address within your VCN instead of the public internet.Private endpoints provide secure access to Object Storage from your OCI VCNs or on-premise networks. The private endpoint is a VNIC with a private IP address in a subnet you choose within your VNC. This method is an alternative to using a service gateway using public IP addresses associated with OCI services.Private endpoints differ from dedicated endpoints in that dedicated endpoints are tenancy-specific endpoints that each have a dedicated namespace string in the URL. This attribute ensure full isolation to help meet your organization's security and compliance requirements. Similar to the traditional public endpoint URLs, the dedicated endpoints resolve to the public IP address of Object Storage.In contrast, private endpoints are customizable endpoints which resolve to a private IP address of a VNIC. Requests go to a private IP address in the your VCN. The traffic is then routed to Object Storage service from the VNIC.Creating a private endpoint in a VCN and associating it with a bucket doesn't limit access to the bucket from the internet or other network sources. You need to define rules using IAM polices on the bucket, so requests are only authorized if they originate from a specific VCN or a CIDR block within that VCN. All other access, including over the internet, is blocked to these buckets. See Managing Network Sources for more information.The following is a sample policy to restrict a specific bucket to a specific network source:allow group groupName to manage objects in tenancy where all {target.bucket.name = 'bucketName', request.networkSource.name = 'networkSourceName'}When you create a private endpoint, you can restrict access to certain Object Storage resources by specifying access targets. Each access target consists of the following required parameters:Namespace: Specifies the target namespace that's to be allowed to egress from the private endpoint.Compartment: Specifies what namespace/compartments the private endpoint can access. You can configure either a single compartment or all compartments.Bucket: Specifies what namespace/buckets within the allowed compartments the private endpoint can access. You can configure either a single bucket or all buckets within the allowed compartments.Specify either the parameter's name or a wildcard ("*") to allow any parameter access. See Creating a Private Endpoint for more information on configuring access targets.Each private endpoint must have at least one access target to a maximum of 10.In the
2025-04-04