macOS Sequoia 15 may bypass DNS encryption
macOS Sequoia 15 has a bug affecting DNS encryption, allowing some requests to bypass the DNS proxy, potentially exposing users' browsing activities. A fix is expected in future updates.
Read original articleA recent blog post from Objective Development highlights a significant issue with macOS Sequoia 15 that may compromise DNS encryption. Little Snitch 6, a network monitoring tool, offers DNS encryption to protect users' DNS lookups from being visible to internet providers and other entities. However, it has been discovered that some DNS requests, particularly those using certain low-level legacy APIs, are bypassing the DNS proxy registered by Little Snitch. This results in unencrypted requests being sent to the system's default name server, potentially exposing users' browsing activities. The issue is not limited to Little Snitch and may affect any DNS proxy on macOS. While higher-level API requests, such as those made in Safari or Chrome, remain secure, Firefox users may be particularly vulnerable. The bug has been reported to Apple, and the developers of Little Snitch are awaiting a fix in future macOS updates. The problem appears to have existed since at least macOS 14.5 Sonoma. Users are advised to stay informed for updates regarding this issue.
- macOS Sequoia 15 has a bug affecting DNS encryption in Little Snitch 6.
- Some DNS requests bypass the DNS proxy, leading to unencrypted lookups.
- The issue may affect any DNS proxy, not just Little Snitch.
- Higher-level API requests remain secure, but Firefox users may be at risk.
- The bug has been reported to Apple, and a fix is anticipated in future updates.
Related
Mac and Windows users infected by software updates delivered over hacked ISP
Hackers compromised an ISP to deliver malware to Windows and Mac users via software updates, affecting multiple applications. Users are advised to avoid insecure updates and use secure DNS protocols.
Apple memory holed its broken promise for an OCSP opt-out
Apple has not fulfilled its promise to provide an opt-out for OCSP checks in macOS, raising privacy concerns. Following macOS 14 Sonoma, it removed related documentation, prompting user skepticism.
Apple to Address '0.0.0.0' Security Vulnerability in Safari 18
Apple will address a security vulnerability in Safari 18 affecting macOS Sequoia, Sonoma, and Ventura, blocking malicious requests to the IP address 0.0.0.0, with an update expected later this year.
Little Snitch for Mac
Little Snitch is a macOS network monitoring tool that enhances privacy by allowing users to control internet connections, featuring Silent Mode, DNS encryption, and a 30-day free trial for testing.
Warning: macOS Sequoia 15 may bypass DNS encryption
macOS Sequoia 15 has a bug allowing some DNS requests to bypass Little Snitch 6's encryption, affecting low-level legacy APIs. Firefox users may be particularly impacted, and a fix is pending.
- Many users believe the issue is specific to Little Snitch rather than a broader macOS problem.
- There are concerns about the complexity and reliability of DNS encryption setups on macOS.
- Some users express frustration over Apple's handling of network APIs and bugs that persist across OS updates.
- Several comments highlight the need for better communication regarding bug reports and fixes.
- Users share alternative DNS solutions and configurations to mitigate potential issues.
Sure, I expect most macOS apps will use something in Foundation or some other NetworkKit-type framework to do DNS queries, but it's odd to me that the code there wouldn't then call down to getaddrinfo() or the like to do the dirty work. I guess GAI is blocking, so presumably there's some other low-level non-blocking call?
> After further investigation, we found that this bug has already existed at least since macOS 14.5 Sonoma (maybe even earlier, but we currently don’t have access to an older 14.x system for testing).
I also wish people would post the FB numbers and the details of their report when they say they've reported things like this.
Well, seems this is the LS blog, so only confusion is why this is portrayed as a macOS bug? I'm not saying it's wrong, it's their domain not mine after all, it just doesn't seem to be justified in TFA?
Maybe part of this old bug (that I thought was fixed)
I use a stub listener on localhost:53 for local requests and then forward them via UDP QUIC (TLS 0-RTT) requests to Cloudflare (1.1.1.1) with caching for most requests. Fast and reasonably secure.
Isn't this an inherent risk when attempting to do network stuff in userspace? You're at a very high level so hoping that lower level things comply seems risky if DNS encryption is critical to your use case.
this is not "bypass encryption" this is "uses a range of ABI/API bindings in code which don't expose well into a single control point"
As a long-time DNS security researcher, the ultimate and final end means would be to mirror the root servers, but I assert, for now, popping in your own `resolv.conf` should suffice, … again, for now.
Browsers such as Firefox have offered this directly for a while. Of course, that only covers DNS lookups made from the web browser, but it doesn't rely on OS-level hooks that (at least in Apple's case) can break.
I also still haven't figured out how to get SSID-based switching to work, does it even?
TBH I’m too lazy to dig in and find out. Has anybody else run into this issue?
Does Little Snitch do things differently?
man 5 resolver
also try with a domain that existsRelated
Mac and Windows users infected by software updates delivered over hacked ISP
Hackers compromised an ISP to deliver malware to Windows and Mac users via software updates, affecting multiple applications. Users are advised to avoid insecure updates and use secure DNS protocols.
Apple memory holed its broken promise for an OCSP opt-out
Apple has not fulfilled its promise to provide an opt-out for OCSP checks in macOS, raising privacy concerns. Following macOS 14 Sonoma, it removed related documentation, prompting user skepticism.
Apple to Address '0.0.0.0' Security Vulnerability in Safari 18
Apple will address a security vulnerability in Safari 18 affecting macOS Sequoia, Sonoma, and Ventura, blocking malicious requests to the IP address 0.0.0.0, with an update expected later this year.
Little Snitch for Mac
Little Snitch is a macOS network monitoring tool that enhances privacy by allowing users to control internet connections, featuring Silent Mode, DNS encryption, and a 30-day free trial for testing.
Warning: macOS Sequoia 15 may bypass DNS encryption
macOS Sequoia 15 has a bug allowing some DNS requests to bypass Little Snitch 6's encryption, affecting low-level legacy APIs. Firefox users may be particularly impacted, and a fix is pending.