Mullvad VPN

32 readers
3 users here now

The unofficial community subreddit for Mullvad VPN.

founded 2 years ago
MODERATORS
976
 
 
The original post: /r/mullvadvpn by /u/preciouschild on 2024-12-17 09:20:53.

Looks like a total block. Sites won't load. Tried multiple entry points. Mullvad is getting far worse.

977
 
 
The original post: /r/mullvadvpn by /u/Mr0ldy on 2024-12-16 23:52:00.

The issue has been increasing lately but I got around it for some time by switching servers. today I tried all available servers in 5 different countries/cities and still no luck. I was surprised to not see any previous posts about the issue here. Am I doing something wrong or have people just accepted that YouTube is out of reach behind Mullvad? captchas are annoying but atleast they can be solved, YouTube just straight up blocks me.

Edit: thx for the tips from everyone who answered genuinely. I'm going to try the servers some of you recommended! Other than that it seems this is just the reality of using a VPN today. I'll give up YouTube before I give up my privacy though.

978
 
 
The original post: /r/mullvadvpn by /u/DoersVC on 2024-12-16 21:40:26.

Who else experience a DL speed at 3-5 Mbps when doing Multihop. Past days i felt that my network at home had some issues. But today I made a speedtest and it showed ridiculous DL speeds while upload was at 150-200 Mbps.

When I connect without Multihop I get usual speeds like what is possible with my ISP.

979
 
 
The original post: /r/mullvadvpn by /u/sammytammy212 on 2024-12-16 18:14:36.

I currently use the wireguard config but it's a hassle to edit the config file everytime I wanna change something. So I tried using the unofficial App. It connects smoothly for the first 10 minutes and stops working. Like zero internet access after that. Anybody facing this same issue?

980
 
 
The original post: /r/mullvadvpn by /u/No-Yard-9447 on 2024-12-16 16:05:11.
981
 
 
The original post: /r/mullvadvpn by /u/KinderSurprise1337 on 2024-12-15 21:58:34.

Hi

I just download this VPN on my iPhone and every 10min I have to reconnect the VPN because it’s unsecured connection.

It’s really annoying , what’s the problem with this VPN ?

982
 
 
The original post: /r/mullvadvpn by /u/Phatique on 2024-12-15 20:42:28.
983
 
 
The original post: /r/mullvadvpn by /u/LazyAdHdDreams on 2024-12-15 18:04:52.

i really like nextdns and mullvad as well, i use both of them together on one android device and one windows device. Now im trying to get both of them to work together in linux but my dns keeps leaking.

984
 
 
The original post: /r/mullvadvpn by /u/usestack on 2024-12-15 06:46:40.

There is an option to expand the settings info along with IP connections kind of hidden by default unless u pull the drawer up. This should actually become the default method as this gives more precision network info.

Maps on the other hand hardly matter as they just show a glowing bubbles and no user interaction possible for server selection. Being honest here to say that they don't even properly highlight the server location let alone country location. Everything is disguised under dark color palate.

Again, I don't care about maps at all but added few things I saw. Maybe an option to turn off them would be nice and even could improve app performance.

985
 
 
The original post: /r/mullvadvpn by /u/sqenixs on 2024-12-14 20:47:20.

For example if I use facebook, amazon, reddit apps on iogone I can tell I am still being tracked. Does this mean that there are trackers that aren't being blocked by mullvad dns and I need to add custom ones?

986
 
 
The original post: /r/mullvadvpn by /u/sileyirdoyur on 2024-12-14 14:23:06.

Hello guys. I need help split tunnelling Marvel Rivals. I've selected every .exe file in the game files but whenever I enable Mullvad, game still connects to the vpn. Am I doing something wrong?

987
 
 
The original post: /r/mullvadvpn by /u/kid147258369 on 2024-12-14 00:59:29.

I was on gb-lon-wg-304 because YouTube works on this server, but for some reason it's started blocking porn sites. When I change to another server, these sites are available

988
 
 
The original post: /r/mullvadvpn by /u/Ryuuzaki_L on 2024-12-13 23:20:55.

Hey all. I've been using a year old version of Mullvad because I was having an issue where the new update would just get stuck on Connecting... and never actually connect. Clicking disconnect would also cause it to hang. This resulted in me having no internet connection until I restart my computer.

Today I decided I would try an update to see if it was fixed. It however, has not been and I still get the issue in the newest version. I unfortunately forgot to check what version I had that was working. As before I just downgraded to it and it resumed working fine.

Does anyone know how I can fix this issue? It does seem strange that it works fine on an old version but the issue still persists after a year of updates.

989
 
 
The original post: /r/mullvadvpn by /u/TowelThink2644 on 2024-12-13 09:59:35.
990
 
 
The original post: /r/mullvadvpn by /u/jenoworld on 2024-12-13 01:15:34.

Hi, not sure if this has been discussed before, I’m wondering if it’s possible to make Mullvad “always active” on IOS?

991
 
 
The original post: /r/mullvadvpn by /u/TheUnburdenedJuan on 2024-12-12 20:14:33.

Hello everyone, I've been using Mullvad for about a year now and so far every single application or game that I've split-tunneled has worked just fine, however this is not the case with PoE2.

I've bought early access to the game recently off of Steam and noticed that the split tunneling was not working, and no matter which executable I add (Steam or just the game's own), it will simply not work. Steam itself is being split tunneled just fine, as the browser in the overlay shows, but the game itself will still connect through the VPN and choose a server close to whichever region I set it to.

So far the only solution has been to stop the VPN completely. Is there any way to fix this?

992
 
 
The original post: /r/mullvadvpn by /u/mothafucka9000 on 2024-12-12 18:21:30.

I wasn't paying attention to the instructions and I sent 3 separate payments to the same Bitcoin address. The instructions state as follows:

Do not reuse a one-time payment address: your account will not be automatically credited.

Does anyone know exactly what that means? Are none of my payments going to go through, just one, or all of them?

993
 
 
The original post: /r/mullvadvpn by /u/New_Assignment_1683 on 2024-12-12 18:12:20.
994
 
 
The original post: /r/mullvadvpn by /u/dot1034 on 2024-12-12 01:00:40.
995
 
 
The original post: /r/mullvadvpn by /u/reverselavender99 on 2024-12-11 22:08:15.

Hello ! Does the recent issue concerning Amazon and Mullvad been fixed ? Can we now buy and use vouchers from Amazon without any issues ?

996
 
 
The original post: /r/mullvadvpn by /u/Revolutionary_Cap_44 on 2024-12-11 20:01:23.

Hello, as the title says. We are going on a tour in CHINA , 55 people and wanted to ask if we all can use the APP only from Google Play, without downloading anything extra (does it work , just click connect and you're done). Thanks, in advance.

997
 
 
The original post: /r/mullvadvpn by /u/MullvadNew on 2024-12-11 17:58:49.

| Server | Country | City | Gbp/s | Ownership | DAITA | |


|


|


|


|


|


| | se-mma-wg-011 | Sweden | Malmö | 10 | 31173 - Owned | Yes | | se-mma-wg-012 | Sweden | Malmö | 10 | 31173 - Owned | Yes | | se-mma-wg-111 | Sweden | Malmö | 40 | 31173 - Owned | Yes | | se-mma-wg-112 | Sweden | Malmö | 40 | 31173 - Owned | Yes |

998
 
 
The original post: /r/mullvadvpn by /u/BitBoy1999 on 2024-12-11 16:29:20.

When I open the app, I can't share the screen to my TV via AirPlay, when I close the app it works again, I have already activated the "Local Network Sharing" function

999
 
 
The original post: /r/mullvadvpn by /u/MullvadNew on 2024-12-11 14:50:09.

Link: https[://]mullvad[.]net/en/blog/the-report-for-the-2024-security-audit-of-the-app-is-now-available


The third party security audit of the Mullvad VPN app has concluded that the app has a high security level. Some non-critical issues were found, and have been fixed to the extent possible.

We have been conducting external security audits of our VPN apps biennially since 2018. We did this in 2018 (https[://]mullvad[.]net/blog/2018/9/24/read-results-security-audit-mullvad-app/), 2020 (https[://]mullvad[.]net/blog/2020/6/25/results-available-audit-mullvad-app/) and 2022 (https[://]mullvad[.]net/en/blog/security-audit-report-for-our-app-available). Two more years have passed and a fourth audit has recently been completed.

Four people from X41 D-Sec performed a penetration test and source code audit of the Mullvad VPN app on all supported platforms for a total of 30 person-days. The audit was performed between 23rd October 2024 and 28th November 2024. The audit report was handed over to Mullvad on 30th November 2024.

Three quotes with key conclusions from the report:

A total of six vulnerabilities were discovered during the test by X41. None were rated as having a critical severity, three as high, two as medium, and one as low. Additionally, three issues without a direct security impact were identified.

Overall, the Mullvad VPN Application appear to have a high security level and are well positioned to protect from the threat model proposed in this report. The use of safe coding and design patterns in combination with regular audits and penetration tests led to a very hardened environment.

In conclusion, the client applications exposed a limited number of relevant vulnerabilities. Mullvad VPN AB addressed them swiftly and the fixes were audited to be working properly.

Read the report

The final report is available on X41's website. We also host all revisions of the report in our git repository.

Overview of findings

A total of six vulnerabilities were discovered during the test by X41. None were rated as having a critical severity, three as high, two as medium, and one as low. Additionally, three issues without a direct security impact were identified.

Mullvad implemented fixes for four of the issues during the audit, and released a new version of the app on the affected platforms around the time when we were handed the audit report.

For more details on each finding, please see our audit documentation in git.

MLLVD-CR-24-01: Signal Handler Alternate Stack Too Small (Severity: High)

The alternative stack configured for the fault signal handler in mullvad-daemon was too small. Since there was no guard page or other stack overrun protections in place, this could lead to the signal handler reading and writing beyond the allocated stack, leading to potential heap corruption and undefined behavior. This affected Android, Linux and macOS.

The fix for this issue is included in version 2024.8 for desktop and version 2024.9 for Android.

We agree with the conclusion from X41 that this vulnerability is not trivial to exploit, but if exploited it would be severe. Due to the low exploitability and the fact that this issue has been present for multiple years without any practical issues surfacing, we decided to not immediately mark existing apps as unsupported, but to release a fixed app version as soon as the audit was complete. We still recommend users on the affected platforms to upgrade to the latest version of the app at their earliest convenience.

MLLVD-CR-24-02: Signal Handler Uses Non-Reentrant Safe Functions (Severity: High)

The fault signal handler in mullvad-daemon called functions which are not signal safe. This could cause undefined behavior, or worst case, be exploitable if the attacker was able to control enough of the program state and externally trigger a fault. This affected Android, Linux and macOS.

The fix for this issue is included in version 2024.8 for desktop and version 2024.9 for Android.

We are not aware of any way to maliciously or accidentally exploit or trigger this bug. This bug has been around for multiple years without any practical issues surfacing. So just like for MLLVD-CR-24-01 above, we decided to not release any quick patch release immediately, but instead wait for the audit to finish and release fixes for all audit findings at the same time.

MLLVD-CR-24-03: Virtual IP Address of Tunnel Device Leaks to Network Adjacent Participant (Severity: Medium)

The Linux kernel (and consequently Android) by default replies to ARP requests for any local target IP address, configured on any interface. This allows an attacker on the same local network to learn the IP address of the VPN tunnel interface by sending an ARP request for every private IPv4 address to the device.

This can be used by an adversary on the same local network to make a qualified guess if the device is using Mullvad VPN. Furthermore, since the in-tunnel IP only changes monthly, the adversary can also possibly identify a device over time.

Linux and Android are the only affected operating systems. For Linux, the fix for this issue is included in version 2024.8.

Android apps, including Mullvad VPN, do not have the permission to change this OS behavior. All Android devices that we know of are affected. We have reported this issue upstream to Google, and recommended that they change the relevant settings to prevent this issue.

We don't consider this a high severity leak since the in-tunnel IP does not disclose a lot about the user. The IP is also automatically rotated every month, only making it a temporary identifier. However, Android users that are worried can log out and back in to the app, as this gives them a new tunnel IP. We are working on solutions that stops the in-tunnel IP from remaining the same over time. When this has been deployed, the issue will be gone on Android also.

MLLVD-CR-24-04: Deanonymization Through NAT (Severity: Medium)

This attack is about how an attacker that can both observe a user’s tunnel traffic and also send UDP traffic with a spoofed sender IP can potentially infer if the user has a connection to a specific internet service. They can do this by sending UDP packets with a unique size with the source address and port set to the internet service they are interested in, the destination IP to the exit VPN relay of the user. They need to do this for every possible destination port. If the user has a connection with that internet service endpoint, eventually one packet will match the NAT table entry on the VPN relay and be forwarded down the tunnel. The attacker can then observe a packet on the tunnel with the unique size (plus VPN headers).

The attack would be hard to carry out. First of all the attacker would need to be able to send UDP packets with spoofed source IPs. Many network providers prevent this, but not all of them. The attacker would also need to be able to observe the client's tunnel traffic. On top of this, the attacker would also need to send large volumes of data with good timing to carry out the attack. If the attacker knows what VPN relay IP address the client exits through, they would need to send tens of thousands of packets before hitting the correct destination port, that match the relay's NAT table entry. Since every Mullvad relay has multiple exit IPs, and each client is assigned a random IP, the attacker would need to figure out what exit IPs the relay has, and repeat the above brute force method on all of them. Moreover, if the client uses multihop, the attacker can't easily infer what exit VPN relay the client uses. The attacker must then perform the above brute force attack against every exit IP of every Mullvad relay. All of this must be carried out in the somewhat short amount of time that the NAT table entry is active on the relay, meaning a time window of just a few minutes around when the client device communicates with the internet service.

This is a privacy problem with how UDP works in general, and not really about Mullvad VPN specifically. Since UDP is becoming a more common and important protocol due to http/3 and similar, Mullvad would love if it became the norm that all network providers performed UDP source address validation, as it would mitigate issues like this to a large extent.

The ...


Content cut off. Read original on https://old.reddit.com/r/mullvadvpn/comments/1hbv4jj/the_report_for_the_2024_security_audit_of_the_app/

1000
 
 
The original post: /r/mullvadvpn by /u/shalomxyzw on 2024-12-11 14:46:43.

What will make me more private, is it Multihop or DAITA? Asking this bcs both enabled give me a speed of 300kbps on my preferred servers.

view more: ‹ prev next ›