Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
68,067
38,790


macOS Big Sur 11.2 beta 2, which was released yesterday, eliminates a feature that allowed Apple apps bypass third-party firewalls, security tools, and VPN apps, according to reports from ZDNet and security researcher Patrick Wardle.

First-Look-Big-Sur-Feature2.jpg

macOS Big Sur 11 included a ContentFilterExclusionList that let Apple's apps like the App Store, Maps, iCloud, and more to avoid firewall and VPN apps that users had installed. These apps were not able to filter or inspect traffic for some built-in Apple apps.

Security researchers believed that the feature, found last October, was a major security risk as malware could be designed to latch on to a legitimate Apple app and bypass security software. Users who had VPNs installed also risked exposing their real IP address and location to Apple's apps.


Apple told ZDNet last year that the list was temporary and the result of a series of bugs related to the deprecation of network kernel extensions in macOS Big Sur. Apple has been addressing those bugs, and in the second beta of macOS Big Sur released yesterday, removed the ContentFilterExclusionList from the macOS code.

When macOS Big Sur 11.2 sees a release, Apple apps will be compatible with VPN apps and will no longer be able to bypass firewalls and other security tools.

Article Link: macOS Big Sur 11.2 Beta 2 Removes Feature Letting Apple Apps Bypass Third-Party Firewalls and VPNs
 
Excellent news - been aching to move to Big Sur (love the place - LOL) but holding back until VPN's would function there (plus other Objective see tools) - wife is itching to do so for work and will do so as soon as the update to 11.2 is out.
 
  • Like
Reactions: hellosil and DocerZ
That's absolutely Fantastic News !

Hopefully soon, AAPL will need to play by ALL the same rules it makes third-party App Devs play by !

At least those of us who Adhere to the rules.

Next up, hopefully, NO favoritism towards Apple's apps WRT skirting App Permissions, which I've definitely caught them violating !
I think the logic is that “we know our apps are safe” but of course, they don’t know that and can’t know that.
 
  • Like
Reactions: ArtOfWarfare
Excellent news - been aching to move to Big Sur (love the place - LOL) but holding back until VPN's would function there (plus other Objective see tools) - wife is itching to do so for work and will do so as soon as the update to 11.2 is out.
SurfShark is the only brand name VPN I have seen with Silicon support thus far. Nord and PIA are dragging their software heels.
 
It's not purely how a company conducts business but how they respond when people identify and make noise about flaws. Intentional or not by Apple, I'm glad they changed course here.
 
So does this mean split tunnel VPNs won’t work anymore? Or is it still up to the service to implement it or not?
 
The older I get the more this might as well be a foreign language

<sigh>
Apple recently started requiring third party software who want to control network traffic (such as firewalls) to intercept it a different way. They documented and explained the new way, and it's been mostly fine. However, they then exempted some of their own software from this new way.

A security researcher example: they want to observe how an app communicates with the network, how its behavior changes when they limit some of that communication, etc. They weren't able to do that with some of Apple's apps. For example, if App Store or Find My had a security bug related to network communication, they would have a hard time finding out. Not only can they not control the traffic from those services, they can't even see it.

A more general-purpose example: you're on cellular (or some other metered connection), and use an app like Trip Mode to limit data usage. Well, you can't see the data some of Apple's stuff uses. App Store or Software Update download a large update in the background? Trip Mode won't be able to tell you.

There were probably some reasons Apple did all this in the first place (for example, one might argue that macOS needs to be able to download updates to Xprotect malware definitions no matter what), but there's also a fair bit of hubris involved. It feels like once they did decide to make that exemption list, all kinds of software teams internally signed up to be added, and that's just opening the floodgates for trouble.

Anyway, all this, it appears, is now resolved.
 
Apple told ZDNet last year that the list was temporary and the result of a series of bugs related to the deprecation of network kernel extensions in macOS Big Sur. Apple has been addressing those bugs, and in the second beta of macOS Big Sur released yesterday, removed the ContentFilterExclusionList from the macOS code.

Apple is a joke these days.
 
  • Haha
Reactions: 0279317 and tonyr6
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.