Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
While this is bug that should get fixed you have to recall that for the initial intent of VPN this is not really an issue. A VPN was designed and intended to make your machine look like it's on another network in another location. Ex: you're at home or on a sales call in the field and need to use the server or printer in the office.
"privacy" companies have cop-opted the VPN structure to route all your internet traffic through them as the "remote location", and may provide add-on features to make you feel more secure.
For the overwhelming majority of people, even if your traffic (likely https, or other SSL encrypted data) bypasses the VPN the only thing anyone between you an the server can see is that you are connecting to the server, the data itself is most likely still secure and private.

When you're "out and about" or in less than "pro privacy" locations a VPN will keep those snoopers from seeing what you're actually doing; but then again simply using a VPN may raise suspicions and investigation by the authorities

VPNs aren't the magic panacea of privacy that those who sell them to you want you to believe they are unless you 100% trust the admins there to not be snooping on you for thier own gains.

This is simply false. The initial point of VPN lies in its name, its supposed to create a virtual private network. The main purpose of a VPN is to enable private IP addresses to be able to talk with each other, as private IP addresses are not routable on the public Internet.

If a company has 172.16.0.0/12 as their local subnet at work, and some employer needs to access internal resources when being outside the corporate network they would utilise a VPN to have an encrypted connection from their device to the firewall at their corporation making it possible said employer to reach resources within this private subnet which would otherwise be impossible.

And this is obviously going to be encrypted so you don't have data that would otherwise be local data within the corporation traverse the public internet for everyone to see.

Hiding your location was never the intent of a VPN. But VPN has evolved since its inspection, and today its often being used to not only route specific private subnets, but to route all traffic from a device thus making it into a privacy tool and possible to be used to make it look like you are coming from a different IP address with a different geo-location.
 
  • Like
Reactions: KaliYoni
At home, at least, invest in a router that lets you install a VPN on it instead of installing it on each device.
 
I don't read it like that, but it really doesn't matter that much. We just don't have enough info to place the blame squarely on the VPN's fault, or the OS. However, I expect the VPN guys to know about existing connections and what should be done about them. (it should actually be an option to either kill all connections, or let them be, as there really is a use case for keeping existing connections.)

What I would need to know, is if the OS's ip stack would allow a third party app to send a kill connection signal on other app connections, and this is where I suspect the problem is -- the VPN isn't being allowed to kill the connections. It sounds so like apple and their allowing their own app connections to bypass a VPN. I knew about the existing connections problem, but I actually have a bigger beef with what the IP stack doesn't pass thru, but that's a whole different discussion.
I believe you're right here. We have people on both sides of the coin wanting to place what they believe to be obvious blame. ArsTechnica could have gone more with a "this is Apple's fault" but I don't think that's completely proven. Is it possible? Oh definitely.

Meanwhile, the clash between those who think Apple is the very picture of evil and those who supposedly sell their soul to said evil continues.

One thing I am grateful for is security researchers keeping a check on this. I don't have time to packet sniff every little thing that leaves my device and make sure it is headed to where it is going. I do expect that to happen though.

Just re-reading the ArsTechnica article - trying to be as unbiased as possible - it does seem the article is blaming the VPN companies more than Apple. <shrug>.

But hey, "my dignity" is in question for not instantly blaming the completely evil and horrible Apple for everything and anything :). Good ole MR.
 
Nice to know Apple was faffing about with CSAM stuff while this vulnerability just sat there. Perhaps Apple should refund those of us who pay for VPN services? I live in the UK, where pretty much everybody, at every level of government, can gain access to your browsing history unless you use a VPN.

Better question — how many VPN vendors know about this and continued to sell you their products? Surely they tested their own products thoroughly and came to the same conclusion?
 
Never had an issue with this. iOS is rock solid and super-secure. Don't buy the FUD.
Do you use VPNs?
Have you tested for data leakage while using VPNs?
Have you reproduced the article's attestations?

Otherwise, respectfully, you are literally contributing to the FUD. If there's a real problem here (and there appears to be so) it behooves you to contribute to the signal, not the noise - I have no stick in this other than Apple refusing to acknowledge a problem that affects potentially everyone who uses VPNs on IOS.
 
  • Like
Reactions: AndyMacAndMic
Better question — how many VPN vendors know about this and continued to sell you their products? Surely they tested their own products thoroughly and came to the same conclusion?
I would imagine that if I were a VPN vendor and had a limited API to develop for an OS, that I would trust the OS to deliver the promise of routing accordingly. This isn't passing the buck -- it's not inherently any software developer's responsibility to test for flaws in the API stack.

Additionally this might have worked initially and degraded over time.

Not an excuse for either side of this argument, just a statement. ISVs do not inherently have any rights over the OS and must utilize the APIs provided.
 
I would imagine that if I were a VPN vendor and had a limited API to develop for an OS, that I would trust the OS to deliver the promise of routing accordingly. This isn't passing the buck -- it's not inherently any software developer's responsibility to test for flaws in the API stack.

Additionally this might have worked initially and degraded over time.

Not an excuse for either side of this argument, just a statement. ISVs do not inherently have any rights over the OS and must utilize the APIs provided.
I'll give you that. If I was an iOS developer - I would hope that the OS would have a call to terminate all connections and thus re-route or route all new connections from that point forward to the VPN instance my app created.

I would definitely expect the developer of a VPN to make sure to send out to the OS a "kill all connections" or "reroute" of sorts.

I can agree with you that I'd expect the OS to do the same thing once a VPN was established.

I haven't touched iOS development since swift came out so...
 
leave it to apple to screw up something as basic as vpn

I've been following this situation on a few forums, and it's debatable that Apple "screwed up VPN", really. The first thing people need to understand is that a VPN can be used for 2 completely different purposes. Some people use it as a method of accessing company resources behind a firewall. Others rely on it as a privacy tool, to hide all of their Internet traffic's true source location.

The iOS implementation of VPN works just fine for the former use-case, but maybe not so well for the later.

From what I read from a couple of people who packet-sniffed the traffic to learn more about it? What they observed was that certain network connections coming from iOS itself and its services continued to communicate outside the VPN after the VPN was connected. (There was data going out on port 443 to both an Apple and a Microsoft server as well as a bit of traffic going to some high numbered ports to another Apple server.) On the other hand? Applications like "WhatsApp" that were started before the VPN was connected stopped showing up as communicating outside the VPN tunnel, after it was established.

It sounds to me like Apple purposely designed things so they're keeping some of their iOS traffic from traveling through a VPN connection (maybe things like FindMy, notifications, etc.). Beyond that? If people are seeing other apps not switching to using the VPN when it's connected, it could be bugs with how those applications handle changes in connection status? Obvious solution there is to make sure you connect your VPN *before* you launch your apps that need to securely communicate through it.
 
Yes.
Yes.
No.
It was an eye opener to me to use https://objective-see.org 's tools to see exactly what was going on in the background. So many apps (even name brand) making so many calls to seemingly random IPs constantly throughout the day... Just astounding. One app would send a call to several IPs every time I moved a mouse over it. lol.
 
You are wrong here. Apple has a policy to not allow fraudulent apps on its store right? It claims to vet every single app on the store for its legitimacy yes? This issue is affecting ALL VPN’s from small ones to well established brands.
It allows VPN’s because Apple full well knows it is its fault or by its design that they do not work correctly. And I don’t know but I’ll take a guess here that their are clauses in the contracts VPN ‘s have with Apple to sell their services which prevent them from publicly calling out Apple.

So please do not just accuse other companies for something Apple is fully aware of and allows to happen daily, for over 2 years now. VPN’s are working fine on other platforms. Apple are the ones at fault, not the VPN companies.
You pay a VPN company not Apple for the service. Apple is at fault for not fixing this problem. VPN companies are at fault for not disclosing that their products are compromised and putting customers at risk.
 
The main thing is I continue to trust iOS as the world's most advanced and secure operating system.
Your dignity!!! YOUR DIGNITY!!!!! ... <cries> Your.... dig...nity... /s. :p

While I agree that iOS / Mac OS is great - and I trust it a lot, I am glad security researchers are keeping them on their toes and calling out shortcomings when they see them.
 
Last edited:
  • Haha
  • Like
Reactions: Pezimak and addamas
You pay a VPN company not Apple for the service. Apple is at fault for not fixing this problem. VPN companies are at fault for not disclosing that their products are compromised and putting customers at risk.

My own experience today tells me you are wrong, because turning on and off the Airplane mode fixes my Nord VPN, so they work as expected, once you use a feature to fix Apples bug.
 
  • Like
Reactions: dk001
My personal experience is that, I very often check my ip address while connected to expressvpn on my iphone. It always, always shows expressvpn's ip address, never shows my own.

On windows it is the same. However, recently expressvpn on windows sometimes shows my real ip address.....
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.