MacOS sometimes leaks traffic after system updates
Mullvad VPN has identified a potential traffic leak issue in macOS due to firewall malfunctions, affecting versions since 14.6. They are collaborating with Apple to find solutions and workarounds.
Read original articleMullvad VPN has identified a potential issue with macOS that may lead to traffic leaks following system updates. Specifically, it appears that the macOS firewall may not function correctly, ignoring established firewall rules. While most traffic is routed through the VPN tunnel, certain applications, including Apple's own, may bypass this tunnel and send data outside of it. This problem has been observed since macOS version 14.6 and continues into the recent 15.1 beta. Mullvad has reported the issue to Apple and is actively investigating potential workarounds. Users can check if they are affected by running specific terminal commands to test for traffic leaks. If a leak is detected, it indicates that the VPN is not functioning as intended. Mullvad is committed to providing updates and solutions as they continue their investigation.
- macOS may leak traffic after system updates due to firewall issues.
- Certain applications can bypass the VPN tunnel, leading to potential data exposure.
- The problem has been noted since macOS 14.6 and persists in the 15.1 beta.
- Mullvad VPN is working with Apple to address the issue and find workarounds.
- Users can run terminal commands to check for traffic leaks.
Related
Serious flaw in critical applications: Plaintext passwords in process memory
Security experts found a vulnerability in applications like OpenVPN, Bitwarden, and 1Password, allowing plaintext passwords to remain in memory post-logout, posing risks of exploitation by malware.
Warning: macOS Sequoia 15 may bypass DNS encryption
macOS Sequoia 15 has a bug allowing some DNS requests to bypass Little Snitch 6's encryption, affecting low-level legacy APIs. Firefox users may be particularly impacted, and a fix is pending.
macOS Sequoia 15 may bypass DNS encryption
macOS Sequoia 15 has a bug affecting DNS encryption, allowing some requests to bypass the DNS proxy, potentially exposing users' browsing activities. A fix is expected in future updates.
Apple's new macOS Sequoia update is breaking some cybersecurity tools
Apple's macOS 15, Sequoia, has caused significant disruptions to cybersecurity tools from CrowdStrike and SentinelOne, leading to user frustrations and expert criticism over inadequate testing prior to release.
macOS Sequoia change breaks networking for VPN, antivirus software
macOS 15 'Sequoia' is causing network issues for EDR and VPN users, prompting CrowdStrike and SentinelOne to recommend delaying upgrades. ESET offers a workaround, while some VPNs face connectivity problems.
This is not new - every time I update macOS, some of the system settings are changed to default including some in the firewall. And I have to painstakingly go through all of it and change it. Also, the few times I've reinstalled or updated macOS, I've always noticed that it takes longer for the installation if your system has access to the internet - so now I've made it a practice to switch of the router while installing or updating macOS or ios. (With all the AI bullshit being integrated everywhere in Windows, macOS and Android etc., I expect this kind of "offloading" of personal data, and downloading of data, to / from AI servers to keep increasing, especially during updates, to "prepare" for the new AI features in the newer OS updates. No internet means the installer is forced to skip it for later, saving you some valuable time, and hopefully you get to change the default setting before it starts up again. Whatever the claims of AI processing done on the Mac or iDevices itself, some "offloading" to their servers, will still happen, especially if the default settings - which you can change only after the OS is installed - also enables analytics and data collection.)
(More here https://news.ycombinator.com/item?id=26418809 and on this thread - https://news.ycombinator.com/item?id=26303946 ).
I highly recommended sniffing the traffic on the wire and piping it through wireshark. You can do this with a router, or a passive Ethernet tap. You’ll see a bunch of packets going to places other than your VPN entrypoint. If you use a router, you can check your mobile for leaks too. (Did you know if you have WiFi calling enabled, then your phone makes a TCP connection to a sensor server controlled by your ISP every 30 seconds? So if you’ve got T-Mobile and you’re abroad, not even using it as your default SIM, they’ll get a nice log of every exit IP you use.)
Apple’s seeming embrace of support for VPN and network filtering extensions is a red herring, because they’ll happily disable it for their own traffic.
On iOS, the App Store will skip any VPN, and similarly Apple will even block you from downloading updates if you’re on a VPN. I only realized this when I used my wireless router with VPN on it and updates failed to download.
On Mac, there are a bunch of issues, especially on first boot. It seems like the Mac will refuse to establish the VPN until it can make one connection outside of it. I encounter this when my computer wakes from sleep and the on-demand wireguard tunnel (using Cloudflare Warp) fails to send packets. I unplug my Ethernet, disable always-on, wait 30 seconds (for some timeout?), re-enable always-on, and then plug in the Ethernet and in connects. But I’m not actually sure this isn’t leaking, I need to investigate more.
Even though I had disabled all 'restore' applications features, macos sometimes decides to 'start' browsers BEFORE logging in after a restart AND those start auto-playing audio from whatever was paused before the reboot (or many days before).
Since then I went rather deep disabling that feature, but I never trusted it.
Insane. Why even have one or expose it to the user if it's just suggestive fiction?
Vendors really need to stop privileging themselves on users machines.
Related
Serious flaw in critical applications: Plaintext passwords in process memory
Security experts found a vulnerability in applications like OpenVPN, Bitwarden, and 1Password, allowing plaintext passwords to remain in memory post-logout, posing risks of exploitation by malware.
Warning: macOS Sequoia 15 may bypass DNS encryption
macOS Sequoia 15 has a bug allowing some DNS requests to bypass Little Snitch 6's encryption, affecting low-level legacy APIs. Firefox users may be particularly impacted, and a fix is pending.
macOS Sequoia 15 may bypass DNS encryption
macOS Sequoia 15 has a bug affecting DNS encryption, allowing some requests to bypass the DNS proxy, potentially exposing users' browsing activities. A fix is expected in future updates.
Apple's new macOS Sequoia update is breaking some cybersecurity tools
Apple's macOS 15, Sequoia, has caused significant disruptions to cybersecurity tools from CrowdStrike and SentinelOne, leading to user frustrations and expert criticism over inadequate testing prior to release.
macOS Sequoia change breaks networking for VPN, antivirus software
macOS 15 'Sequoia' is causing network issues for EDR and VPN users, prompting CrowdStrike and SentinelOne to recommend delaying upgrades. ESET offers a workaround, while some VPNs face connectivity problems.