Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
68,120
38,878


iOS 16 continues to leak data outside an active VPN tunnel, even when Lockdown mode is enabled, security researchers have discovered.

Lockdown-Mode-Feature.jpg

Speaking to MacRumors, security researchers Tommy Mysk and Talal Haj Bakry explained that iOS 16's approach to VPN traffic is the same whether Lockdown mode is enabled or not. The news is significant since iOS has a persistent, unresolved issue with leaking data outside an active VPN tunnel.

In August, it again emerged that third-party VPNs for iOS and iPadOS routinely fail to route all network traffic through a secure tunnel after they have been turned on – an issue that Apple has purportedly known about for years.

Typically, when a user activates a VPN, the operating system closes all existing internet connections and then re-establishes them through the VPN tunnel. In iOS, security researchers have found that sessions and connections established before the VPN is turned on are not terminated as one would expect, and can still send data outside the VPN tunnel while it is active, leaving it potentially unencrypted and exposed to ISPs and other parties.

According to a report from privacy company Proton, an iOS VPN bypass vulnerability had been identified in iOS 13.3.1, which persisted through three subsequent updates. Apple indicated it would add Kill Switch functionality in a future software update that would allow developers to block all existing connections if a VPN tunnel is lost, but this functionality does not appear to prevent data leaks as of iOS 15 and iOS 16.

Mysk and Bakry have now discovered that iOS 16 communicates with select Apple services outside an active VPN tunnel and leaks DNS requests without the user's knowledge:



Mysk and Bakry also investigated whether iOS 16's Lockdown mode takes the necessary steps to fix this issue and funnel all traffic through a VPN when one is enabled, and it appears that the exact same issue persists whether Lockdown mode is enabled or not, particularly with push notifications. This means that the minority of users who are vulnerable to a cyberattack and need to enable Lockdown mode are equally at risk of data leaks outside their active VPN tunnel.

iOS 16 introduced Lockdown mode as an optional security feature designed to protect the "very small number" of users who may be at risk of "highly targeted cyberattacks" from private companies developing state-sponsored spyware, such as journalists, activists, and government employees. Lockdown mode does not enable a VPN itself, and relies on the same third-party VPN apps as the rest of the system.



Due to the fact that iOS 16 leaks data outside the VPN tunnel even where Lockdown mode is enabled, internet service providers, governments, and other organizations may be able to identify users who have a large amount of traffic, potentially highlighting influential individuals. It is possible that Apple does not want a potentially malicious VPN app to collect some kinds of traffic, but seeing as ISPs and governments are then able to do this, even if that is what the user is specifically trying to avoid, it seems likely that this is part of the same VPN problem that affects iOS 16 as a whole.

It is worth noting that Apple only lists high-level features that activate when Lockdown mode is enabled, and Apple has not explicitly mentioned any changes that take place to affect VPN traffic. Nevertheless, as Lockdown mode claims to be an extreme protection measure, it seems like a considerable oversight that VPN traffic is a vulnerable point.

Article Link: iOS 16 VPN Tunnels Leak Data, Even When Lockdown Mode Is Enabled
 
Last edited:
This is the most troubling part! Apple has the resources to fix anything they want to fix, why haven't they fixed this?
TBF, even the largest of organizations can't really effectively take on too many (major) things at once. However, I do hope Apple can shift gears, now, to deal with this. IIRC, this isn't the first time they've had VPN leaks (and they're still a $2+ trillion company). :(
 
In my opinion Apple will not close the bug because they want to make sure that the iphone talks to Apple servers at all times. Routing ALL traffic through a VPN Apple would not know where an iphone is because at the present moment Apple will know where every single network connected iphone on the planet is due to the hidden DNS requests.
 
This is the most troubling part! Apple has the resources to fix anything they want to fix, why haven't they fixed this?
Because they don't want to fix it, they make use of it, these control freaks loves to spy on you.

It's not a bug, it's a feature, they also tried on the Mac:
 
Last edited:


iOS 16 continues to leak data outside an active VPN tunnel, even when Lockdown mode is enabled, security researchers have discovered.

Lockdown-Mode-Feature.jpg

Speaking to MacRumors, security researchers Tommy Mysk and Talal Haj Bakry explained that iOS 16's approach to VPN traffic is the same whether Lockdown mode is enabled or not. The news is significant since iOS has a persistent, unresolved issue with leaking data outside an active VPN tunnel.

In August, it again emerged that third-party VPNs for iOS and iPadOS routinely fail to route all network traffic through a secure tunnel after they have been turned on – an issue that Apple has purportedly known about for years.

Typically, when a user activates a VPN, the operating system closes all existing internet connections and then re-establishes them through the VPN tunnel. In iOS, security researchers have found that sessions and connections established before the VPN is turned on are not terminated as one would expect, and can still send data outside the VPN tunnel while it is active, leaving it potentially unencrypted and exposed to ISPs and other parties.

According to a report from privacy company Proton, an iOS VPN bypass vulnerability had been identified in iOS 13.3.1, which persisted through three subsequent updates. Apple indicated it would add Kill Switch functionality in a future software update that would allow developers to block all existing connections if a VPN tunnel is lost, but this functionality does not appear to prevent data leaks as of iOS 15 and iOS 16.

Mysk and Bakry have now discovered that iOS 16 communicates with select Apple services outside an active VPN tunnel and leaks DNS requests without the user's knowledge:



Mysk and Bakry also investigated whether iOS 16's Lockdown mode takes the necessary steps to fix this issue and funnel all traffic through a VPN when one is enabled, and it appears that the exact same issue persists whether Lockdown mode is enabled or not, particularly with push notifications. This means that the minority of users who are vulnerable to a cyberattack and need to enable Lockdown mode are equally at risk of data leaks outside their active VPN tunnel.

iOS 16 introduced Lockdown mode as an optional security feature designed to protect the "very small number" of users who may be at risk of "highly targeted cyberattacks" from private companies developing state-sponsored spyware, such as journalists, activists, and government employees. Lockdown mode does not enable a VPN itself, and relies on the same third-party VPN apps as the rest of the system.



Due to the fact that iOS 16 leaks data outside the VPN tunnel even where Lockdown mode is enabled, internet service providers, governments, and other organizations may be able to identify users who have a large amount of traffic, potentially highlighting influential individuals. It is possible that Apple does not want a potentially malicious VPN app to collect some kinds of traffic, but seeing as ISPs and governments are then able to do this, even if that is what the user is specifically trying to avoid, it seems likely that this is part of the same VPN problem that affects iOS 16 as a whole.

It is worth noting that Apple only lists high-level features that activate when Lockdown mode is enabled, and Apple has not explicitly mentioned any changes that take place to affect VPN traffic. Nevertheless, as Lockdown mode claims to be an extreme protection measure, it seems like a considerable oversight that VPN traffic is a vulnerable point.

Article Link: iOS 16 VPN Tunnels Leak Data, Even When Lockdown Mode Is Enabled

This is the most troubling part! Apple has the resources to fix anything they want to fix, why haven't they fixed this?

Is Craig and his team being supremely LAZY, Ignorant (is locking this down could affect a region), or is Craig and the iOS team being directed NOT to fix this. Either way this is a serious concern!

Come on Apple! How long is this going to take to fix? For a company that prides itself on privacy this is not good enough
You've got to look only as far as the lead for iOS : Craig Federighi!

If this has been going on since iOS 13.3.1 then this is a SERIOUS concern and goes against ALL their privacy claims! Leaking data with/without VPN needs a direct focus.

When fixed I can see devices as far back as the 5S getting a major security update.
 
Interestingly when I saw this I also looked to see if Android 13 has this issue - I use both OS's.
There are claims it does.

But...
Using ProtonVPN, I can see the issue on my 13 ProMax with iOS 16.1 beta 5
Using ProtonVPN, I cannot see the issue on my OnePlus 10 Pro with Android 13 (OxyOS13).

Wonder if I am missing something on the 10 Pro.
 
This is really bad. It’s one thing to have gaps in your privacy, but it’s something else entirely to have a user believe that their Virtual Private Network is, well, Private and unknowingly be leaking data. If I were a person who’s privacy was important, such as a journalist or activist, this would chill me to the bone. As someone who thinks protecting those people is a priority, this just makes me very angry.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.