Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Internet Proxy is easy to bypass when you have a wrong setting #4207

Open
love-code-yeyixiao opened this issue Sep 5, 2024 · 2 comments
Open
Labels
Confirmation pending Further confirmation is requested

Comments

@love-code-yeyixiao
Copy link
Contributor

Describe what you noticed and did

Occasionally, applications can have direct access to the network when proxy server are unavailable or proxy configuration changes occur. Not everyone wants to be directly monitored by a network provider to a communications destination, and by the time he realizes that direct connectivity has occurred, it’s too late.
In addition, the SOCKS5 proxy can not forward non-TCP or non-UDP connection traffic, which may lead to some niche connection protocol programs also bypass the proxy and directly access, there should be an option to block this unproxied connection traffic.
Furthermore, sandbox-level proxies will not work when system-level proxies are set.

How often did you encounter it so far?

Not relevant.

Expected behavior

When the proxy is set up incorrectly, no connection will be accepted. When there is non-TCP or non-UDP traffic without a proxy, you can intercept all of it. When there are system-level proxies (even local proxies) , you can prevent the program from sending traffic to them instead, perhaps by preventing the program from sending traffic to IP addresses other than proxies.

Affected program

Not relevant.

Download link

Not relevant

Where is the program located?

Not relevant to my request.

Did the program or any related process close unexpectedly?

No, not at all.

Crash dump

No response

What version of Sandboxie are you running now?

1.14.6

Is it a new installation of Sandboxie?

I recently did a new clean installation.

Is it a regression from previous versions?

No response

In which sandbox type you have this problem?

Not relevant to my request.

Can you reproduce this problem on a new empty sandbox?

Not relevant to my request.

What is your Windows edition and version?

Not revelant.

In which Windows account you have this problem?

Not relevant to my request.

Please mention any installed security software

Not relevant.

Did you previously enable some security policy settings outside Sandboxie?

No response

Trace log

No response

Sandboxie.ini configuration

No response

@love-code-yeyixiao love-code-yeyixiao added the Confirmation pending Further confirmation is requested label Sep 5, 2024
@bastik-1001
Copy link
Collaborator

bastik-1001 commented Sep 5, 2024

(GitHub shows a reply, even if there is no comment, beside mine, I guess, once I click "Comment". Now it shows only 1 reply, must be a glitch of some sort.)

It failed hard in my attempts and in David's attempts, which should be a good start. Improvements are welcome and depending on the impact needed, if it is all too easy to have it bypass the SOCKS5 proxy Sandboxie points to.

I had forgotten that ping (for example) uses ICMP and SOCKS handles TCP and UDP, which can be a privacy concern, and it can be used to exfiltrate data, e.g. by resolving, b.example.com a.example.com d.example.com to spell something (bad) or even thisisthesecret.com if the attacker can observe or handle the requests.

@isaak654 isaak654 changed the title Internet Proxy is easy to bypassed when you have a wrong setting Internet Proxy is easy to bypass when you have a wrong setting Sep 5, 2024
@love-code-yeyixiao
Copy link
Contributor Author

love-code-yeyixiao commented Sep 6, 2024 via email

@github-staff github-staff deleted a comment Sep 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Confirmation pending Further confirmation is requested
Projects
None yet
Development

No branches or pull requests

2 participants