The headline is about exposing your IP, which frankly isn’t that big of a deal. The actual article says it exposed your IP, and then includes arbitrary code execution as the after thought… Clearly the code execution is the massive vulnerability here lol
If you’re worried about your IP being “leaked” you have no idea what an IP is. You can literally grab everyone’s IP using the console commands to list the players.
Man shut down the net. When you visit a site your IP is leaked, well be the next headline.
Status no longer reports user Ips as those are hidden through some steam routing, I’m not sure if rcon status still reports it but that would be limited to server admins. If you open the steam overlay while in CS it shows some of the details.
No, most multiplayer games and services these days only share your IP with the server, and not with other players.
Leaking your IP to someone malicious can mean DDoS attacks and rough geolocation. IP can be a good narrowing to find your address when combined with additional information.
SC2 is not a game one would expect to leak your IP and is a valid, small concern.
Server owners can be just as malicious many games support private servers
Choosing to join a private server is very different from having your IP leaked on official servers.
Can you please clarify what you mean? I think I get the gist but may be misunderstanding.
Being aware of the small risk you’re taking with one person (the server owner) versus being unaware of the risk you’re taking with many different random lobbies.
Server owners are more likely to ban you than DDoS you. And it’s a single digit number of people with access to that information vs hundreds in random lobbies.
The risk, while still small, is hundreds of times greater than a private server.
Ah thank you very much for that. I see now :)
It can be very rough geolocation, currently my IP geolocates to a city around 300 Km away, other times the right city.
If only leaking your IP was the huge exploit lmao. It literally allowed for arbitrary code execution which is infinitely worse. Honestly bad title by the author of that article, it’s far more serious than they let on.
Pretty unfortunate bug but at least they patched it pretty quickly it seems.
It sounds like the person who posted this believes you can run code on people’s machines simply by having their IP address rather than there actually being any kind of exploitable code-running capability. Leaking your IP isn’t really a big deal, as you’re constantly leaking your IP any time you connect to anything anyways, and if CS:2 uses any kind of peer-to-peer to lower latency or make the game more responsive, you could have grabbed those ips with a simple netstat (for windows users) command anyhow.
Right, the worst that can happen is a DDoS, you can take down a residential connection really easily. Those little consumer grade routers cannot handle much lmao
And since most residential IPs are short-lived DHCP leases, instead of permanent IPs, a simple router reset will usually get you a new IP and you’re good at that point.
Well that sucks, hope it gets sorted soon.
deleted by creator
I play CS2 on VPN and I still get about 25 ping. No excuses
My excuse is that it’s a waste. There is no point in doing that unless you want to do something that you are not allowed to do like hop regions or something.
All of my traffic for all the devices in my home goes through VPN cause I have it configured at the router level. I’m not gonna turn it off for gaming.
Have you considered just setting up the vpn in a better way.
Thats not actually a bad way to have a vpn set up though?
This is the better way.
Security, that’s a major use of vpns.
Edit: I should of pointed out that I meant limited use for security reasons, like accessing your bank account in public areas, its not much but it can help to protect you from MitM attacks at the very least.
VPNs doesn’t really improve security in a way that usually matters.
Nearly all web traffic is already encrypted.
VPNs absolutely have their uses (like accessing remote networks, bypassing firewalls and censorship, piracy) but they are not needed for just using all the time.
Web encryption is genuinely security theater considering whose root certificates come pre-installed. Microsoft has the ability to decrypt all web traffic on Windows at will due to their preinstalled cert, and they are almost certainly under gag order and compelled to give the NSA unrestricted access to this backdoor.
Futher, the EU is going to install their certs on every computer and make it illegal for browsers to uninstall or untrust them. I don’t live in the EU so I can’t confirm if this is happened already but theoretically this can have global impact.
I’m not saying a VPN necessarily helps here but your trust in web encryption is misplaced.
Microsoft has the ability to decrypt all web traffic on Windows at will due to their preinstalled cert,
I am gonna need a source for that.
EU is going to install their certs on every computer and make it illegal for browsers to uninstall or untrust them.
You sure? Are you talking about the encryption thing? That was (of course) rejected.
YouTube sponsorship is the major use of VPNs. Hiding your IP does nothing to mitigate user tracking by application/hardware finger printing, tracking of users logged into a service, or tracking of user activity with cookies.
I know there are so many other ways they are tracking people. There was one discovered they put a list of I think 500 top sites and they could identify people with I think it was 90% accuracy, just by telling which sites they visited because the links turn purple. I these are the ones discovered, so they where doing this before people found out what else are the doing that nobody knows about yet.
So what are you gaining using a VPN to access your bank? Your bank website is https so it’s already encrypted. VPN’s are vastly misrepresented in their commercials.
If you must know, I seed my public tracker torrents to a ratio of 10:1. That’s why I have a router-level VPN config. Someone’s gotta do it.
Okay but why not set up a separate/dedicated route for that traffic?
Not that I disapprove of what/how you’re doing, curious because it’s what I do. I’d assume you’ve got a VM or node other than your workstation hosting your torrent client, otherwise this method doesn’t make sense.
The VPN runs on my router and my torrent client runs on my server. Anyhow, why would I want only some of my traffic to go through VPN when I can send it all through?
Fighting the good fight. I have about 25 torrents that have one one seed, me, and can’t be otherwise purchased. I just leave them on unlimited ratio and feel better when every I see a leech connect.
I wouldn’t mind joining you in eternally seeding those torrents if you wanna send me a list.