Review of Mullvad VPN

Scope of the Audit

  • Audit covers the Mullvad VPN app/client, not the whole VPN service or server infrastructure.
  • Some note this makes the original title misleading, but still relevant since the app is the main entrypoint for users.
  • Separate infrastructure audits (by other firms) were done earlier in the year.

Key Findings in the Report

  • Issues found include: unsafe signal handling (too-small alt stack, non–async-safe functions), IP leaks via ARP, deanonymization via NAT/MTU behaviors, and a sideloading risk in the setup process.
  • Commenters view these as “straightforward” and mostly low-to-moderate risk, with sideloading called the most concerning but not standalone-exploitable.
  • Deanonymization vectors are said to apply broadly to VPNs, not just Mullvad.

Deep Dive: Signal Handling

  • Large subthread debates how hard it is to write correct POSIX signal handlers.
  • Points raised:
    • Signal handlers can interrupt code in critical sections; they must not wait on locks or shared resources.
    • Very small set of async-signal-safe operations is allowed.
    • Languages/runtimes (C, Rust, Haskell, etc.) struggle to provide safe abstractions; ideas like function “coloring”, monads, or dedicated signal threads are discussed.
  • Consensus: safe signal handling is extremely tricky; Mullvad’s issues here are understandable but real.

Threat Models and Value of Audits

  • Several comments praise this report for explicitly stating its threat model.
  • Debate over whether customer-defined scope weakens audits; counterargument is that every audit must target a defined model and constraints of time/budget.
  • Users are encouraged to compare their own threat model (e.g., unprivileged local attacker vs. admin/nation-state) to the one used in the audit.

Mullvad’s Reputation and Business Model

  • Many express strong trust in Mullvad relative to other VPNs: no-logs policy, multiple public audits, RAM-only infrastructure, simple flat pricing, and anonymous payment options (cash, crypto, Monero).
  • Others worry about the general VPN industry’s marketing and snake-oil tendencies, but often exempt Mullvad as “one of the better ones.”

Usage, Limitations, and Ecosystem Issues

  • Practical complaints:
    • Removal of port forwarding significantly hurts torrenting and private tracker seeding.
    • Planned deprecation of OpenVPN pushes some to consider other providers.
    • Mullvad endpoints often hit CAPTCHAs or blocks (especially on YouTube/Reddit), possibly because of known hosting ASNs and anti-tracking incentives.
  • VPNs seen as most valuable for ISP privacy and censorship circumvention; some argue they are over-marketed for broad “anonymity.”