Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add setting for unblocking APNS networks #6859

Merged
merged 1 commit into from
Sep 25, 2024
Merged

Add setting for unblocking APNS networks #6859

merged 1 commit into from
Sep 25, 2024

Conversation

hulthe
Copy link
Contributor

@hulthe hulthe commented Sep 24, 2024

This is a temporary mitigation of the MacOS 15 issues with iMessage, etc. It works by simply allowing packets through the firewall on the physical interface if the destination is one of a few specific apple-owned networks.


This change is Reviewable

Copy link
Member

@raksooo raksooo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed 13 of 27 files at r1.
Reviewable status: 13 of 27 files reviewed, all discussions resolved

raksooo
raksooo previously approved these changes Sep 24, 2024
Copy link
Member

@raksooo raksooo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:lgtm:

Reviewed 7 of 7 files at r2.
Reviewable status: 14 of 28 files reviewed, all discussions resolved

@hulthe hulthe requested a review from dlon September 24, 2024 14:22
dlon
dlon previously approved these changes Sep 24, 2024
Copy link
Member

@dlon dlon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:lgtm:

Reviewed 20 of 27 files at r1, 7 of 7 files at r2, 1 of 1 files at r3, all commit messages.
Reviewable status: :shipit: complete! all files reviewed, all discussions resolved

@hulthe hulthe dismissed stale reviews from dlon and raksooo via abbaa18 September 25, 2024 08:34
Copy link
Member

@dlon dlon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed all commit messages.
Reviewable status: 27 of 28 files reviewed, all discussions resolved (waiting on @raksooo)

Copy link
Member

@raksooo raksooo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed 1 of 1 files at r3, 1 of 1 files at r5.
Reviewable status: :shipit: complete! all files reviewed, all discussions resolved

@hulthe hulthe force-pushed the leak-apple-nets branch 3 times, most recently from 6bef35e to ba3207f Compare September 25, 2024 08:52
Copy link
Member

@raksooo raksooo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:lgtm:

Reviewed 4 of 4 files at r6.
Reviewable status: 28 of 29 files reviewed, all discussions resolved

@hulthe hulthe merged commit 453410b into main Sep 25, 2024
57 of 58 checks passed
@hulthe hulthe deleted the leak-apple-nets branch September 25, 2024 09:58
for &port in apple_ports {
let mut rule_builder = self.create_rule_builder(FilterRuleAction::Pass);
rule_builder.quick(true);
let allow_out = rule_builder
Copy link

@banister banister Oct 2, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you should add a further constraint for user = 0 on this rule so that only root processes (such as apsd) can send off-vpn traffic to these ips - currently it looks like any process (even user processes - such as web browsers) can leak out these ips, there's many attack scenarios (though admittedly a bit obscure) in this situation.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good idea, but were currently working on getting rid of this feature all together.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants