Dataentry
Our Free Home Use XG Firewall is a fully equipped software version of the Sophos XG firewall, available at no cost for home users – no strings attached. Features full protection for your home network, including anti-malware, web security and URL filtering, application control, IPS, traffic shaping, VPN, reporting and monitoring, and much more. Sophos 'XG Firewall' distribution has a very nice user interface and is free for home use. We generally don't recommend it because it's not a system that Sophos itself promotes. Sophos' website seems to make it purposefully hard to find, and the community is very small. Sophos, in general, is an enterprise software company, with one community.
- Device Type:
- WiFi Router
- Brand:
- Sophos
- Model:
- RED 15w
- Version:
- Rev. 1
- Availability:
- unknown 2018
- Where available:
- ¿
- Supported Since Commit:
- https://git.openwrt.org/?p=openwrt/openwrt.git;a=commit;h=97e4311fca73d064d17065e7844699aa777cb157
- Supported Since Rel:
- 19.07.0
- Supported Current Rel:
- 19.07.7
- Gluon support:
- unknown
- Target:
- mpc85xx
- Subtarget:
- generic
- Package architecture:
- powerpc_8540
- Bootloader:
- U-Boot
- CPU:
- Freescale P1010
- CPU Cores:
- 1
- CPU MHz:
- ¿
- Flash MB:
- 128NAND
- RAM MB:
- 128
- Ethernet 100M ports:
- -
- Ethernet Gbit ports:
- 5
- Switch:
- ¿
- VLAN:
- ¿
- Modem:
- -
- WLAN Hardware:
- SparkLan WPEA-121N, Atheros AR9382
- WLAN 2.4GHz:
- b/g/n
- WLAN 5.0GHz:
- a/n
- WLAN driver:
- unknown
- Detachable Antennas:
- ¿
- Bluetooth:
- -
- miniPCI ports:
- ¿
- USB ports:
- 1x 2.0
- SATA ports:
- -
- Video ports:
- -
- Audio ports:
- -
- Phone ports:
- -
- Serial:
- Yes
- Serial connection parameters:
- ¿
- JTAG:
- ¿
- LED count:
- 10
- GPIOs:
- -
- Power Supply:
- 12 VDC, 1.0 A
- OpenVPN performance:
- ¿
- Wireguard performance:
- ¿
- Firmware OpenWrt Install URL:
- http://downloads.openwrt.org/releases/19.07.7/targets/mpc85xx/generic/openwrt-19.07.7-mpc85xx-generic-red-15w-rev1-initramfs-kernel.bin
- Firmware OpenWrt Upgrade URL:
- http://downloads.openwrt.org/releases/19.07.7/targets/mpc85xx/generic/openwrt-19.07.7-mpc85xx-generic-red-15w-rev1-squashfs-sysupgrade.bin
- Firmware OpenWrt snapshot Install URL:
- http://downloads.openwrt.org/snapshots/targets/mpc85xx/generic/openwrt-mpc85xx-generic-red-15w-rev1-initramfs-kernel.bin
- Firmware OpenWrt snapshot Upgrade URL:
- http://downloads.openwrt.org/snapshots/targets/mpc85xx/generic/openwrt-mpc85xx-generic-red-15w-rev1-squashfs-sysupgrade.bin
- Installation method(s):
- see git-commit
- Recovery method(s):
- see git-commit
- Picture:
Researchers have discovered a security flaw in macOS, Linux, and several other operating systems that could let attackers hijack a wide range of virtual private network (VPN) connections.
The bug, discovered by University of New Mexico researchers William J Tolley, Beau Kujath, and Jedidiah R. Crandall, lets a malicious access point or someone on the same network snoop on a user’s VPN session. The snooper can tell that they’re on a VPN and figure out what site they’re visiting. The researchers explain:
This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel.
The attack begins by working out the VPN client’s virtual IP address, which is the fake IP address that a VPN gives you when you use it to pretend that you’re somewhere else. It does this by sending SYN (short for synchronization) and ACK (short for acknowledgement) packets to the device. Because it doesn’t know the device’s exact address, it sends these packets to all addresses in the virtual IP space. When this noisy attack eventually hits the victim’s machine, it will respond with a reset (RST) packet that drops the connection.
That tells the attacker that the device is using an external network connection that gives it a virtual IP address. It can then send its own RST packets. The victim machine responds with a ‘challenge ACK’, inviting its VPN to set up a new connection, and the attacker can sniff out these packets by timing them and examining their size. By analysing the packets, it can determine the in-window sequence number of the connection, which tells it what type of VPN connection the victim is using.
From there, they can work out how to inject malicious packets into the VPN connection. An attacker could use those techniques to inject malicious code into a website that could help to compromise a browser.
The bug, CVE-2019-14899, works against a variety of VPN protocols including OpenVPN and IKEv2/IPSec, along with the young upstart WireGuard P2P protocol that is angling for inclusion in the Linux kernel. It exists in Linux distributions including but not limited to Ubuntu, Fedora, Debian, Arch, Manjaro, Devuan, MX Linux, Void Linux, Slackware and Deepin. It also affects FreeBSD and OpenBSD, as well as Android, macOS, and iOS.
Having said that, the issue doesn’t seem to be an exploitable problem in all flavours of Linux. The researchers said that they couldn’t replicate it on Ubuntu versions before 19.10, for example, and pointed to a configuration update in systemd (the startup system used in many Linux distributions) made on 28 November 2018 as a possible trigger condition.
Wire Guard Sophos Security
The researchers haven’t tested the vulnerability against the Tor onion routing protocol, which focuses on anonymous communications, but believe that this wouldn’t be vulnerable to the attack. That’s because Tor handles its authentication and encryption outside of the operating system kernel.
What to do
Wireguard Client
The researchers’ proposed workarounds all have problems. Turning reverse path filtering on (which would stop routing packets from inappropriate addresses) won’t solve the issue for all operating systems and the attack may still work anyway, the researchers said. Filtering bogus packets (known as bogon filtering) could interfere with local network addresses in some instances, they added.
Wireguard Vpn Sophos
The good news is that this is likely to be extremely hard for attackers to exploit – and those that would wish to have very little information to go on.
Wire Guard Sophos Antivirus
The best bet is to wait for a patch from your Linux distributor. The researchers have chosen not to publish a detailed paper on the hack until then.