|
| legrande wrote:
| Well I will be turning this off when it's out of beta and I'm
| prompted to use it. I already cloak my traffic with a self-hosted
| VPN+VPS box that I control. And using Mullvad combined with
| Private Relay would be redundant and overkill. Just turn it off
| if using a VPN client.
| cosmiccatnap wrote:
| That is just how a VPN works in general, nothing special.
| treesknees wrote:
| The article is referring to the Private Relay connection itself
| (the "VPN" connection. In quotes because it's not a real VPN)
| bypassing the firewall, which is not typical. Apple took some
| heat for doing this to their other apps when Big Sur was first
| released [1].
|
| Mullvad is installing a rule to essentially disallow any non-
| VPN'd traffic to prevent leaks. But iCloud Private Relay is not
| being stopped by that rule.
|
| [1] https://arstechnica.com/gadgets/2020/11/apple-lets-some-
| big-...
| pornel wrote:
| Especially rich coming from a VPN vendor, whose business
| happens to be threatened by Apple's relay.
| VWWHFSfQ wrote:
| Seems like a valid complaint to me. Apple is giving
| themselves privileges to end-around potential competitors on
| their platforms. Although this is not new.
| jeffbee wrote:
| This isn't something Apple has sneakily reserved for
| itself. Any process the user authorizes can access PF_NDRV
| sockets which bypass firewall rules. It's a documented
| feature of Darwin.
| VWWHFSfQ wrote:
| I fail to see the difference. apple authorized themselves
| to bypass firewall rules without the users input
| howinteresting wrote:
| Personally I trust Mullvad a million times more than Apple.
| Mullvad is one of the few vendors which have earned my trust.
| Meanwhile, Apple caved into pressure from the FBI to keep
| iCloud message backups unencrypted.
| N0RMAN wrote:
| Does disabling Private Relay[1] on a DNS-level prevent this?
|
| [1] https://developer.apple.com/support/prepare-your-network-
| for...
| xvector wrote:
| Yes, but just keep the feature off in the OS. Why go through
| these ridiculous workarounds?
| ec109685 wrote:
| The headline implies that normal user traffic bypasses the
| firewall. When in fact, it's only apple system traffic. Still not
| great, but way less bad than if the VPN was actually bypassed for
| all traffic:
|
| "It is worth noting that Private Relay (mostly) disables itself
| as soon as any firewall rule is added to PF (the system firewall
| on macOS devices). The Mullvad VPN app does add firewall rules.
| Once you connect the Mullvad app, Private Relay announces that it
| has disabled itself. We see no correlation between user traffic
| and the leaking packets. We believe they are just some heartbeat
| signal calling home to Apple. We do not know what information is
| transmitted to Apple, but since the destination is Apple servers,
| it is a strong signal to your local network and ISP that you
| might be a macOS user."
| gigel82 wrote:
| It's not the first time Apple allowed certain applications
| bypass the firewall / VPN (see
| https://www.macworld.co.uk/news/apples-own-programs-bypass-f...
| ).
|
| It is very bad indeed; not even Microsoft dares to do this in
| Windows (you can still very much block any network request from
| any part of the system via firewalls or DNS ad-blockers).
| adamomada wrote:
| I've been using little snitch for a decade+ and as far as I
| remember it was the only time, and was probably a mistake by
| Apple.
|
| From your link:
|
| > Objective Development, the developers of Little Snitch,
| also writes about the discovery - and that they take it for
| granted that Apple will correct it. (Update, 14 January 2021:
| Apple indeed appears to have removed the whitelist exemption
| in macOS Big Sur 11.2 beta 2.)
| tedmiston wrote:
| > It is worth noting that Private Relay (mostly) disables
| itself as soon as any firewall rule is added to PF (the system
| firewall on macOS devices).
|
| Unclear if that's the case on iOS though.
| olliej wrote:
| I'm unsure how a VPN and private relay would be expected to
| operate concurrently?
|
| What happens if you enable two VPNs concurrently today?
|
| Private relay and VPNs serve significantly different purposes -
| private relay is very clearly http[s] focused to the extent that
| I recall it doesn't cover most traffic?
| ec109685 wrote:
| Private Relay turns itself off when a VPN is enabled.
| tedmiston wrote:
| > Private Relay turns itself off when a VPN is enabled.
|
| I tested this on iOS and Private Relay _does not_ turn itself
| off when a VPN is enabled.
| tedmiston wrote:
| > What happens if you enable two VPNs concurrently today?
|
| I don't believe it's possible to have more than one VPN
| configuration be enabled simultaneously.
| Vladimof wrote:
| Apple being marketed as a privacy company makes me laugh... about
| once a month.
| EricE wrote:
| Ugh - I appreciat the spirit of what they are doing, but it's yet
| another example of the best of intentions getting flattend by
| unintended second order effects.
|
| At least it's still beta!
| lazyier wrote:
| Seems annoying, but any application can work around any firewall
| rules pretty trivially provided they can get at least one type of
| connection out to the internet. TCP, UDP, DNS... anything. Just
| need that one connection and it can be turned into a tunnel.
|
| The private relay feature is worth being aware of, but it's
| irritating for users to deal with overzealous and clueless admins
| who think that locking down systems by disabling features like
| this can "increase security". It just ends up getting in the way
| of getting work done without any real benefit.
| danamit wrote:
| The issue here is that an application is bypassing a kernel-
| level firewall, seems crazy to me that a Unix system is
| allowing that.
| ocdtrekkie wrote:
| You're ignoring that admins have often legal responsibilities
| and compliance requirements to manage and monitor their
| networks. It doesn't really matter how I feel about a given VPN
| service... if you want to be on my network you have to turn it
| off.
|
| (And yes, I often end up annoying myself by blocking stuff I
| myself would like to access at work. But that's my job.)
| Maxburn wrote:
| This is why apple tells you how to block private relay.
|
| https://developer.apple.com/support/prepare-your-network-
| for...
|
| mask.icloud.com mask-h2.icloud.com
| tinus_hn wrote:
| In addition if this service is a problem, consider there
| could be a thousand providers you have never heard of
| providing the same kind of service but while going out of
| their way to make sure you don't actually have a way to
| block it.
|
| If you really 'need' to block that kind of connection the
| onus is on you, not on the services.
| Maxburn wrote:
| Absolutely. There are block lists out there that can help
| but they are unlikely to be perfect. This guy seems to be
| up to date; https://github.com/oneoffdallas/dohservers
| tomjen3 wrote:
| Sure and that is understandable, but it doesn't really do
| much. My personal phone is not on my employeers wifi but is
| still right next to me. There is nothing technical that they
| can do, short of a faraday cage for the building, to prevent
| me from going where ever I want on it.
|
| I feel like rules such as yours are a pre smartphone era
| thing, when I had to use the company laptop to get online
| away from home.
| ocdtrekkie wrote:
| It does a lot: You aren't exposing our network to security
| threats or legal liability. I don't care what you do with
| your phone on your own Internet connection. But if you want
| to connect it to my Wi-Fi then it has to follow my rules.
| msh wrote:
| If you don't control the endpoints you don't control the
| network.
| ocdtrekkie wrote:
| It depends. Obviously a lot of effort by certain
| monopolistic advertising companies have gone into
| ensuring the web platform is increasingly opaque and
| difficult to manage or monitor, but it's entirely in the
| purview of a network owner to disable or block anything
| that can't be inspected to satisfaction.
| msh wrote:
| Well if you want to block everything that can't be
| inspected you will block a lot of common functionality.
|
| The question about if it's in the network owners purview
| to inspect depends on the network and traffic. It could
| also be illegal privacy violations.
| ocdtrekkie wrote:
| There is no reasonable expectation of privacy on someone
| else's network, particularly an employer's. Arguably
| network operators have the ultimate authority on what
| should and shouldn't happen over their networks on their
| equipment.
|
| I understand that ad companies have a vested interest in
| circumventing this and trying to move internet standards
| to opaque protocols, but until that particular fiefdom is
| unseated, we have to make reasonable tradeoffs.
|
| In the meantime, we block a massive amount of malware by
| blocking their ad domains.
| hesdeadjim wrote:
| Yea, like enforcing the seemingly obvious "don't use the
| fucking office network for torrenting".
|
| I nearly lost my mind when I got a DMCA notice from our ISP.
| I never thought I'd need to lecture a team of professionals
| that the consequences of losing our office internet would be
| significant to the business.
| [deleted]
| 2Gkashmiri wrote:
| you comment "anything. Just need that one connection and it can
| be turned into a tunnel."
|
| this interests me because a few years ago i was subjected to a
| government imposed firewall
| https://thewire.in/government/kashmir-internet-whitelisted-w...
|
| and i tried my best to bypass this but i did not have the
| energy to fashion a touniquet of sorts. i did end up spinning
| up a free amazon vps because apparently "amazon website" was
| unblocked and that forced them to allow aws. i ended up simply
| using ssh -D to the ip of the vps. that worked for a while but
| it was not fun... the connection would drop frequently but
| otherwise it was a POC.
|
| my point is, when we are talking about a hostile adversary like
| your government that is out to get you, regular "vpn" does not
| work, in my case, i tried every darn thing but until i came up
| with my thing, i could not get access to regular internet so
| for the next time, what can i do?
| teakettle42 wrote:
| I've historically used IP over DNS tunneling to pull this
| off.
|
| A major advantage of this approach is that it leverages a
| port and protocol that's rarely blocked, and if 53 is
| blocked, you can generally still use the approved local dns
| servers for your data-carrying queries.
|
| These days, it looks like there are at least a few well-known
| pieces of software to do this, e.g.
| https://github.com/yarrick/iodine
| hhh wrote:
| This is my first thought of how to do my own VPN in a hostile
| environment, with the term VPN do you think of consumer VPNs?
| (Mullvad, Nord, etc.)
|
| When I moved to university, bandwidth was limited in the
| dormitory to 1mbps/user (in 2016...) This was unacceptable to
| me, but we had a private link (non-internet) to the campus
| with virtual desktop infrastructure that had no such limits
| :). ssh -D immediately gave me 500mbps download to my dorm
| room, and I guess this sort of thing is probably why I think
| of ssh -D and running on port 53 etc to evade this sort of
| thing. Public education in the US can function pretty well as
| a government out to get you in terms of digital freedom :)
| 2Gkashmiri wrote:
| yeah, i even ended up using firefox foxyproxy addon because
| then i could either go all in on the proxy or whitelist
| style only few websites or blacklist with all websites and
| few open. that addon probably was the best thing in all of
| it because i was not pushing the entire OS through the
| tunnel.
|
| yeah, i guess for some time, cisco was called out by news
| outlets for helping the government impose the firewall
| which the company later denied but the damage was done by
| then so it didnt really matter, still, i think this just
| slipped from their minds, a random port, somethimes 80,
| 8080, 3400. it was fun (well considering the circumstances)
| with the added risk of incarceration if caught and many
| were unfortunately so yeah
| jawngee wrote:
| It's also great for accessing stuff Vietnamese ISP's try so
| poorly to block.
| 0xdeadb00f wrote:
| Completely tangential but I had no idea (what I assume to be
| remnants of) FreeBSD's pf firewall is included, and works, in
| standard MacOS.
| toast0 wrote:
| IIRC, ipfw is there too, but maybe a little less supported, not
| sure about FreeBSD's third firewall (ipfilter).
|
| As with most of the stuff pulled from FreeBSD, it was pulled
| around the year 2000, usually with no updates from upstream,
| and often with few updates from Apple. Pf's synproxy doesn't
| really work on macos, and is unlikely to get fixed.
| smegsicle wrote:
| meanwhile does everything on wsl2 still bypass windows firewall?
| egberts1 wrote:
| That's why you always carry your personal pocket-cellular WiFi
| modem with custom firewall settings.
|
| Then turn on Airport mode on your cellphone.
|
| Sign on to your WiFi.
|
| IP address Privacy, pretty much assured (assuming you have your
| own backend WireGuard and remote VPS-based gateway. )
| VWWHFSfQ wrote:
| sounds like a lot of punishment just so you can use an iphone.
| maybe try a different device
| actionfromafar wrote:
| Yeah... like a laptop with OpenBSD?
|
| Otherwise it sounds like sound advice for any device if you
| have the threat profile to warrant it.
| VWWHFSfQ wrote:
| Seems like a lot of theater to me. If you really have that
| kind of risk profile then you're not running your exit on
| your own vps. That will singularly identify you and there's
| no plausible deniability. And you're leaking way more PII
| in a typical web request over your VPN than than just an
| IP. I appreciate that people are interested in this stuff
| and want to do it, but it sounds pointless really.
| mrmuagi wrote:
| Isn't this a quite an annoying thing to setup? IRL Live
| streamers have these backpacks and they seem needed to be
| battery powered and quite bulky.
| 3np wrote:
| Got any models you have tried and used?
| jeroenhd wrote:
| I doubt this is a leak, it very much sounds like Apple is using
| QUIC to connect home and make the API work.
|
| Not respecting the system firewall does seem like a flaw, but
| Apple has had a history of bypassing attempts at filtering
| network traffic. Firewalls have been blocked from working and
| Apple services have been made unblockable in later APIs. I'm not
| surprised in the slightest that Apple also bypasses your VPN to
| call home.
|
| I don't know if this is a problem, though. If you buy Apple, you
| let Apple make the decisions for you, that's how the entire
| ecosystem is designed. You must trust Apple unconditionally and
| accept traffic sent home to adhere to their privacy settings, or
| you should not run macOS at all. Try to run Windows or Linux on
| it if you've bought your computer for the hardware quality,
| though the M1 makes that nearly impossible without sacrificing
| user experience.
| KarlKemp wrote:
| If you run Windows or Linux you gain nothing. Apple just
| demonstrates some ability that operating systems have. They all
| have this ability. Apple's benign use of it gives you no new
| information.
| seanw444 wrote:
| Stuff like this in-kernel with Linux is heavily discouraged
| and you'd be almost publicly shamed. If it's a problem with
| user-space, simply use something else.
|
| With Mac, you can usually handle the user-space scenario. Not
| so much the kernel-space one.
|
| That's what's great about Linux. You don't have to submit to
| somebody else's will if you don't want to. It takes more
| effort, but good things always come at some cost.
| xvector wrote:
| And yet Linux is a terrible choice for the vast majority of
| users, no amount of "user choice" will change this. Most
| users don't need choice, they need structure and guide
| rails.
|
| Apple is arguably engineering computers and OS UX
| "correctly," e.g. better for most people.
| ajsnigrutin wrote:
| Yep, if some linux kernel component would bypass iptables
| and called home, Linus would probably use some very very
| profound words, before denying the patch and effectively
| killing the "new feature".
| thefz wrote:
| Benign? Even if you are trying to conceal yourself? And to
| justify that, you go off with a "tu quoque"? Boy, how much
| are they paying you?
| olliej wrote:
| Then just .. don't use private relay if you don't want it?
|
| The problem being reported hear is a VPN provider (or their
| firewall rules?) aren't interacting well with what is
| fundamentally another firewall/vpn.
|
| I'm not sure what the usual expected behavior is when you
| have multiple conflicting vpn+firewall products?
|
| Also as far as I can make out private relay isn't a vpn? It
| protects http[s], and for https I don't know if it operates
| outside of safari?
|
| I appreciate the fancy language conspiracy nonsense, but
| please look at actual facts:
|
| * this is not free - it is part of the paid iCloud services
| afaik
|
| * it is opt in - you have to decide you want to use this,
| they're not just hoovering everything, which gets to
|
| * even if they were hoovering everything, unlike a vpn,
| private relay is actually private
|
| If you are trying to conceal yourself, VPNs services are
| routinely found to be logging what they say they aren't,
| and fundamentally all traffic through a VPN can be logged
| by them. Private relay is strictly better privacy
| guarantees for connections that go through it rather than
| the VPN.
|
| This provider points out a reasonable issue: they have
| added rules to simply block some connections _entirely_ ,
| and it seems like PR should respect that - but as I said
| above, I don't know what the usual expected behaviour for
| operating multiple VPNs and firewalls concurrently is?
|
| _finally_ apple documents explicitly how you can disable
| iCPR completely, regardless of user setting.
| noasaservice wrote:
| That sounds like treacherous computing. And I've argued before,
| that this smells like a rental with the name of a "sale".
|
| A computer does what its owner whats it to do. And when Apple
| or another company is directing its actions, tells me that what
| I have is a rental.
|
| Either relinquish control, or put it on the market with the
| real name. It's not a sale.
| Retric wrote:
| Apple does tell you how to block this stuff if that's your
| concern. Having highly opinionated defaults is required for
| "it just works" which millions of users really do want, but
| those same defaults will always annoy someone.
| hn_version_0023 wrote:
| I agree with this take 110%
|
| As an aside, I'd also like to subscribe to "No as a service".
| olliej wrote:
| Dude, literally the article says: data gets sent to private
| relay if you have it enabled. You can stop it from being
| sent by not turning it on.
|
| What is apple meant to do? Just not provide the service at
| all?
|
| Because private relay is vastly superior to a VPN for web
| content, which is what matters to most users?
| simonh wrote:
| As a user you have made the choice to both enable private
| relay, and enable a VPN. Now PR isn't itself a VPN as such,
| but clearly there's some level of potential conflict in
| making such a decision. If you don't want Private Relay
| interfering with network traffic routing, pretty much it's
| job as advertised, for goodness sake just switch it off and
| the whole problem goes away.
| dkonofalski wrote:
| >A computer does what its owner whats it to do.
|
| If you've enabled Private Relay then it's doing exactly that.
| pkulak wrote:
| You're suggesting that Windows is equal to Linux as an
| alternative to MacOS if you favor control and privacy???
| jeroenhd wrote:
| Windows doesn't come close to Linux in terms of privacy, but
| Linux doesn't come close to Windows in terms of reliability
| and professional software support (Photoshop, MS Office,
| etc.) without hacks and Github scripts.
|
| For the technically-minded Linux is an option, but for
| everyone else Windows at least allows you to firewall off any
| domain you choose. Sure, you'll probably break Windows Update
| in some way, but the Windows kernel doesn't try to bypass
| your settings (yet).
| RobertRoberts wrote:
| > "Linux doesn't come close to Windows in terms of
| reliability..."
|
| I can't tell if you being extremely sarcastic or lack
| experience running both of these OS's...
| xmprt wrote:
| Linux is quite reliable. Maybe even more reliable in day
| to day use. However it occasionally breaks for me in very
| subtle ways and when it does break, I have to use
| technical skills to resolve the issue. That doesn't
| happen to me on Windows or MacOS. For those reasons, I
| don't think I'd suggest Linux to anyone who I didn't feel
| would be able to resolve issues on their own.
| californical wrote:
| I got my parents on Linux Mint after their desktop died,
| which I fixed, but they didn't want to buy a new Windows
| license. They are absolutely not tech savvy, but only use
| the internet and some super basic document editing &
| viewing.
|
| They got used to the system quickly and used it for 4
| years, until the OS went out of LTS and I told them not
| to use it anymore... but still, they have no idea what a
| terminal is, no tech savvy, but still used it for their
| basic use-case for 4 straight years without issue! I
| didn't even have to help them after the initial install.
| Couldn't have been easier.
| heavyset_go wrote:
| My experience, as well. I just set up my parents' Linux
| desktops to look and act like the systems they were used
| to and it's been fine for them for years. They've even
| added printers and scanners to their systems without my
| help.
| asddubs wrote:
| I haven't really found windows to be that reliable,
| although I don't use it a lot. Lots of weird little
| issues and googling dll names, but maybe I'm just
| unlucky. a while back i tried installing vscode and it
| was literally just an all black window, until i installed
| directx or something along those lines. and that's just
| off the top of my head
| pkulak wrote:
| The only thing you said that I agree with is that Windows
| has better professional software support. Unfortunately,
| that's not what we're talking about. :/
| heavyset_go wrote:
| In my experience, if someone's use cases would be well-
| suited by Chromebooks or ChromeOS, then desktop Linux will
| work just as well, if not better, for them.
|
| Reliability-wise, desktop Linux is boringly stable these
| days as long as you don't insist on the bleeding edge by
| using Arch or Debian unstable.
|
| The MS Office situation has gotten much better with the
| rise of online office suite web apps, including Office 365,
| as well as professional desktop software like SoftMaker's
| closed-sourced and misnomered FreeOffice[1] that has great
| compatibility with files written in MS Office's formats.
|
| Lack of Photoshop is a problem, but if you're doing
| animation, special effects or video editing work, Linux has
| you covered because companies release Linux versions of
| their workstation software like DaVinci Resolve, Houdini,
| Autodesk Flame, Blender, Lightworks etc.
|
| [1] https://www.freeoffice.com/en/
| jolux wrote:
| Windows is by far the worst of the three.
| danamit wrote:
| Not in this use case.
| jolux wrote:
| With regards to privacy and control, yes. There's loads
| of telemetry you can't turn off in Windows anymore, and
| you can't even setup Windows 11 without an internet
| connection.
| evilsetg wrote:
| You can. Today I learned how. You just have to press
| Shift+F10 to access the console when it asks you to
| connect to a network and then enter 'OOBE\BYPASSNRO'.
| That is all. To skip the security questions set no
| password initially and then set it later using
| ctrl+alt+del.
| jeffbee wrote:
| System VPN is a privileged process and it's quite possible that
| it uses raw networking, for efficiency or other implementation
| reasons. You'd also see that any Linux process with CAP_NET_RAW
| "ignores" iptables. It's good to keep in mind the inherent
| limitations of in-system software firewalls.
___________________________________________________________________
(page generated 2022-04-25 23:01 UTC) |