Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
What's the chances the US security services has requested Apple not to fix the bug because it is something that was requested from the beginning? Just think of all the bad people in the world using an iphone thinking they was secure from prying eyes due to using a VPN when in fact their every move could be plotted due to the hidden DNS requests that are made outside of a VPN. If Apple was to fix the bug these bad people would suddenly become invisible. Somehow I do not think the US government is going to allow that to happen.
Unlikely. Apple has said no to the US government many times. You remember the infamous case when they refused to unlock the San Bernardino shooter's iPhone right?
 
...

I don't think they failed on purpose, I think they took their eye off the ball, but it's still inexcusable in a context like this. People were supposed to be protected from scams, but are now forced through a (most likely accidentally) insecure system.

If you look at this originally from the Proton AG and Apple interaction, Proton AG told Apple, Apple fixed a few things and said they were done even after PAG showed them where issues still existed. (see articles in Post 33).
 
Considering this has been a “thing” for years, and it has blown up previously, at this point it’ll just blow up over and over again every time a Security Researcher needs to get their name in the news. :) They are likely hoping very hard that it stays JUST the way it is so that they can ‘report’ on it again when iOS 17 comes out. More publicity!
At the end of the day, everyone with knowledge and skill wants to eat a pie of some kind from this VPN leak bs, and customer is always the loser in between. Both Apple and security researchers have their own nefarious intention in mind After all.
 
Unlikely. Apple has said no to the US government many times. You remember the infamous case when they refused to unlock the San Bernardino shooter's iPhone right?
Yeah, for publicity and live Marketing I suppose, even if they actually pull it off.
 
  • Like
Reactions: scrtagntman
If you look at this originally from the Proton AG and Apple interaction, Proton AG told Apple, Apple fixed a few things and said they were done even after PAG showed them where issues still existed. (see articles in Post 33).
I can't tell if you think you're saying something different than I did in the sentences you cropped out...
when they decided to pull all VPN operations into the OS under Apple control they took responsibility for doing it right.

And they haven't.

The bolded takeaway from Proton is still: the kill switch mostly works but despite there being some DNS queries and such that leak "if you use Proton VPN while connected to public WiFi, your sensitive traffic still cannot be monitored."

I'd personally consider DNS queries to be sensitive and don't see an excuse to delay the reconnection through the tunnel (and it does eventually reroute through the tunnel). I find the fact that Apple hasn't buttoned this up yet to be enormously frustrating. Still, that's not the same as saying they only care about appearances and not actually protecting customers. Going that far is hyperbolic and not supported by fact.
 
Presumably it’s because Apple doesn’t want users to circumvent geofences for their own services.
There is also the fact that, for Apple to be able to cell phones in certain regions, certain features have to be disabled. Any government that cares that much to have that as a requirement for selling devices is likely not going to accept “They had VPN on, so we didn’t know where in the world they were!“
 
vpn is no privacy tool, it is for connecting 2 networks secure. Don't try to change a feature to do a thing it is not meant to do...
While you aren’t wrong, problem here is they are failing at doing that.

View attachment 2094167

Going old school for the sake of security.

Hey's it's 14.4K with forward error correction!

Yes, I had one of these....
I still have an old 300 baud VICModem in storage. Couldn’t believe how lighting quick the 1200 was when I got it as a Christmas present. I thought it was too fast because I couldn’‘t keep up with the text. 😆
 
  • Like
Reactions: IIGS User
Honestly I suspect a lot of these connections are left the way they are to ensure things keep working. If the connection was established before the VPN is connected, then the site or service you’re connecting with already has had access to info that can be used to finger print you.

I genuinely wish Apple kicked half the VPN services off the App Store. So many seniors end up paying monthly for these products that slow down their connection or outright break it, especially if they stop paying for it but don’t delete the app.

Also I suspect this ‘research’ is probably being paid for by one of the ones that tracks users of its service.
 
  • Like
Reactions: Nermal
Are they? It's my world too and I have never seen a split tunnel setup. What we use VPN for is accessing secured resources in house from remote users. It's nice to be able to encrypt all data to and from so any older protocols that we do need to use (legacy stuff), are basically unseen by anyone else. Ours is a full tunnel with the stipulation you don't attach if the client is requesting a split tunnel. It wouldn't be secure enough as a split tunnel traffic could be sniffed too easily from outside.

I know why some might want to use a split tunnel -- to keep normal internet traffic from remotes taking up bandwidth, but there's no way it's as secure. (easy out is to not allow outside internet traffic passthrough)
Tunnel all offers no added benefit and puts more burden on the corp network. The traffic destin for the Corp Lan is encapsulated in the tunnel and is not sniffable unless the computer itself is compromised (which is true for tunnel all at that point). The only benefit to tunnel all is for trying to ensure IPS and AVG is inspecting all the traffic, but that is not going to guarantee anything. Most of the burden of tunnel all is not the bandwidth, it's the number of connections being maintained by the firewall and the added burden of the inspection services. It's just a poor practice that is perpetrated by security compliance written by people that aren't network experts. ISO is full of theory holes. I would love to be able to explain my point better, but it's been a while since I had to bust out the theory books. Either way if you need to be ISO compliant...they force you to tunnel all. So you win by default LOL.
 
  • Like
Reactions: Nermal
Apple should fix this immediately. Not nice that it has been like this for a long time now.
 
I don’t know anything about modern software design … but is this a hard problem to solve in iOS or is apple just being slow (or both)?
This has been discussed before. This is not what VPNs were originally created to do - they were built to connect to private networks, not to tunnel the public internet.

There have also been a few bad eggs in the past who have abused VPNs to analyze internet traffic of Apple customers (*cough* Facebook, Google). There have been companies who have used VPN tunnels to monitor and block access, sometimes as part of parental control products, sometimes as part of something more nefarious like monitoring the online activity of your partner.

There are more VPN controls available on iOS devices outside of consumer products, via enterprise MDM. A deliberate design decision was made to not expose all these controls to consumer apps where they might be abused.

The first step would be to get Apple to confirm that it isn't working exactly as designed/intended.
 
Day by day, I’m honestly thinking about going back to Android; it took me 20 minutes last night just to put on some music on my phone because there is no drag and drop functionality, there isn’t even an sound eq setting OS wide like what LG and Asus have.

  1. I’m tired of paying the apple storage tax;
  2. friends who use Garmin watches on Android get way more functionality;
  3. Lighting port is absolute garbage, it’s USB 2.0;
  4. Simple things, such as setting a high ring volume but low notification volume still are absent;
  5. Widgets still suck like it’s android 5.0
  6. And yes, I want a headphone jack;

Pros; 5 years of OS updates. And that’s really it, that is the only reason I switched
 
Apple fans and their supporters are very quick to deride Google and Meta (formerly Facebook), especially Meta for the way they go about tracking people and here we have Apple doing EXACTLY the same and hardly anyone bats an eyelid!!!. This bug was found in iOS13 and the exact same bug has now been found in iOS16 and what does the bug do? it leaks DNS requests outside of VPN's. What is so signifigant about DNS requests one might ask, well DNS requests are bits of data that constantly communicate with Apple servers. DNS data can be tracked and monitored therefore allowing the tracker to know exactly where you are at all times.

Whilst the majority of us do not care and we are happy to go about using our iphones without a care in the world allowing Apple to see what we do of every minute of every day there are some who do not and thus rely on the security aspect of a VPN because if Apple can see you, so can others who want to track you down.

It is obvious Apple do not want to fix this bug because it's been allowed to go unfixed since it was first reported in iOS13 because we have all seen how fast Apple respond to bugs in their software when users start complainging about something, it is fixed in the next update but here we have a security flaw bug reported in iOS 13 and still gone unfixed. That should tell people a lot.
 


iOS 16 continues to leak data outside an active VPN tunnel, even when Lockdown mode is enabled, security researchers have discovered.

Lockdown-Mode-Feature.jpg

Speaking to MacRumors, security researchers Tommy Mysk and Talal Haj Bakry explained that iOS 16's approach to VPN traffic is the same whether Lockdown mode is enabled or not. The news is significant since iOS has a persistent, unresolved issue with leaking data outside an active VPN tunnel.

In August, it again emerged that third-party VPNs for iOS and iPadOS routinely fail to route all network traffic through a secure tunnel after they have been turned on – an issue that Apple has purportedly known about for years.

Typically, when a user activates a VPN, the operating system closes all existing internet connections and then re-establishes them through the VPN tunnel. In iOS, security researchers have found that sessions and connections established before the VPN is turned on are not terminated as one would expect, and can still send data outside the VPN tunnel while it is active, leaving it potentially unencrypted and exposed to ISPs and other parties.

According to a report from privacy company Proton, an iOS VPN bypass vulnerability had been identified in iOS 13.3.1, which persisted through three subsequent updates. Apple indicated it would add Kill Switch functionality in a future software update that would allow developers to block all existing connections if a VPN tunnel is lost, but this functionality does not appear to prevent data leaks as of iOS 15 and iOS 16.

Mysk and Bakry have now discovered that iOS 16 communicates with select Apple services outside an active VPN tunnel and leaks DNS requests without the user's knowledge:



Mysk and Bakry also investigated whether iOS 16's Lockdown mode takes the necessary steps to fix this issue and funnel all traffic through a VPN when one is enabled, and it appears that the exact same issue persists whether Lockdown mode is enabled or not, particularly with push notifications. This means that the minority of users who are vulnerable to a cyberattack and need to enable Lockdown mode are equally at risk of data leaks outside their active VPN tunnel.

iOS 16 introduced Lockdown mode as an optional security feature designed to protect the "very small number" of users who may be at risk of "highly targeted cyberattacks" from private companies developing state-sponsored spyware, such as journalists, activists, and government employees. Lockdown mode does not enable a VPN itself, and relies on the same third-party VPN apps as the rest of the system.



Due to the fact that iOS 16 leaks data outside the VPN tunnel even where Lockdown mode is enabled, internet service providers, governments, and other organizations may be able to identify users who have a large amount of traffic, potentially highlighting influential individuals. It is possible that Apple does not want a potentially malicious VPN app to collect some kinds of traffic, but seeing as ISPs and governments are then able to do this, even if that is what the user is specifically trying to avoid, it seems likely that this is part of the same VPN problem that affects iOS 16 as a whole.

It is worth noting that Apple only lists high-level features that activate when Lockdown mode is enabled, and Apple has not explicitly mentioned any changes that take place to affect VPN traffic. Nevertheless, as Lockdown mode claims to be an extreme protection measure, it seems like a considerable oversight that VPN traffic is a vulnerable point.

Article Link: iOS 16 VPN Tunnels Leak Data, Even When Lockdown Mode Is Enabled
Sure, I use a VPN. But I also want Find My Phone to work. I want driving directions from my home, not Denver. When I search for a resto I’m looking locally, not in Seattle or New Orleans. I want the right time on my screen, I want my device to register the right time zone. Some stuff (if you want it to work) still needs actual-ish location to deliver. This is a conundrum inside of a riddle inside of a marketing ploy.
 
Last edited:
  • Like
Reactions: Unregistered 4U
All this crying and moaning about Apple VPN by people who use Chrome daily and don’t question why there is a google server running in the background transmitting data to Google even when Chrome is not being used. Really?!
 
Sure, I use a VPN. But I also want Find My Phone to work. I want driving directions from my home, not Denver. When I search for a resto I’m looking locally, not in Seattle or New Orleans. I want the right time on my screen, I want my device to register the right time zone. Some stuff (if you want it to work) still needs actual-ish location to deliver. This is a conundrum inside of a riddle inside of a marketing ploy.

But all those thing you require should be options that you enable or disenable via the VPN shouldn't it? Years ago due to DDOS attacks I used a firewall which allowed control of everything going to and fro from my computer. the firewall was very precise, I could control IP's, DNS responses, networks sockets, network ports, the list goes on. Any decent VPN should allow you to do the same so you have control of what you want going in and out of your iphone.

I understand that you want certain features of your iphone to work as intended but surely you should have control of that via a VPN and not Apple, yes?
 
All this crying and moaning about Apple VPN by people who use Chrome daily and don’t question why there is a google server running in the background transmitting data to Google even when Chrome is not being used. Really?!

If people used a VPN on their devices that use Chrome and the same was going on I am sure people would be complaining about Google as well.
 
Apple fans and their supporters are very quick to deride Google and Meta (formerly Facebook), especially Meta for the way they go about tracking people and here we have Apple doing EXACTLY the same and hardly anyone bats an eyelid!!!. This bug was found in iOS13 and the exact same bug has now been found in iOS16 and what does the bug do? it leaks DNS requests outside of VPN's. What is so signifigant about DNS requests one might ask, well DNS requests are bits of data that constantly communicate with Apple servers. DNS data can be tracked and monitored therefore allowing the tracker to know exactly where you are at all times.

Whilst the majority of us do not care and we are happy to go about using our iphones without a care in the world allowing Apple to see what we do of every minute of every day there are some who do not and thus rely on the security aspect of a VPN because if Apple can see you, so can others who want to track you down.

It is obvious Apple do not want to fix this bug because it's been allowed to go unfixed since it was first reported in iOS13 because we have all seen how fast Apple respond to bugs in their software when users start complainging about something, it is fixed in the next update but here we have a security flaw bug reported in iOS 13 and still gone unfixed. That should tell people a lot.
Nice conspiracy post, but don't you need Apple to track you if you lost your phone? Was facebook handling of PII really above board. Remember when the service is free, you are the product.
 
  • Like
Reactions: Unregistered 4U
Give Apple a break. They had to bring us lots of new features this year, no time to fix things like this.

I mean come on, you don’t have to deal with a SIM card!
 
  • Haha
Reactions: dk001 and Razorpit
Let’s get real Apple doesn’t close this security hole because the NSA harvests this data from Apple. Those who think Apple is some kind of privacy warrior clearly doesn’t remember the Snowden leaks that showed Apple participating in PRISM. With a gag order.
NSA (aka Meta) is quite happy when you register with Apple email to Meta. Even with hide my email on. There is no confirmation of identity needed. Strange isn’t it?
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.