{"id":30518,"date":"2020-10-22T15:58:41","date_gmt":"2020-10-22T19:58:41","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=30518"},"modified":"2020-10-22T19:50:02","modified_gmt":"2020-10-22T23:50:02","slug":"apple-apps-exempt-from-network-filters-and-vpns","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2020\/10\/22\/apple-apps-exempt-from-network-filters-and-vpns\/","title":{"rendered":"Apple Apps Exempt From Network Filters and VPNs"},"content":{"rendered":"<p><a href=\"https:\/\/twitter.com\/mxswd\/status\/1318307089773588481\">Maxwell Swadling<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/mxswd\/status\/1318307089773588481\">\n<p>Some Apple apps bypass some network extensions and VPN Apps. Maps for example can directly access the internet bypassing any NEFilterDataProvider or NEAppProxyProviders you have running &#x1F612;<\/p>\n<p>The new beta for @littlesnitch seems to use an NEFilterDataProvider instead of kext, I don&rsquo;t think they will be able to block Maps from tile loading...<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/patrickwardle\/status\/1318437929497235457\">Patrick Wardle<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=24838816\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/patrickwardle\/status\/1318437929497235457\"><p>Previously, a comprehensive macOS firewall could be implemented via a Network Kernel Extension (kext)<\/p>\n<p>Apple deprecated kexts, giving us Network Extensions....but apparently (many of) their apps \/ daemons bypass this filtering mechanism.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/buckymsj\/status\/1318498879231430656\">bucky<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/buckymsj\/status\/1318498879231430656\"><p>NEXTs = obviously more complexity than KEXTs = bigger attack surface&#8230; and all you need is a &ldquo;NEXT exempt exploit&rdquo; (which will definitely happen at some point), and LuLu, \n@littlesnitch\n etc. won&rsquo;t be able to intercept malware traffic.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/lapcatsoftware\/status\/1318519626859466753\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/lapcatsoftware\/status\/1318519626859466753\"><p>Getting rid of kernel extensions &ldquo;for our security&rdquo;? DIRTY FUCKING LIE! Now you can&rsquo;t stop Apple from phoning home.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/news.ycombinator.com\/item?id=24839189\">joncp<\/a>:<\/p>\n<blockquote cite=\"https:\/\/news.ycombinator.com\/item?id=24839189\"><p>That totally breaks my use case for Little Snitch: working tethered. When I tether my laptop it thinks it has free reign with the bandwidth and all of the little background processes can kill my data in a few minutes. With a firewall, I can grant access to only the processes that I need to get my work done.<\/p>\n<p>Now, I guess I have to run some external firewall between my laptop and my phone. ... or better yet, abandon Apple.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/medium.com\/tripmode\/apple-started-hiding-the-traffic-of-its-own-mac-apps-9dc83c5a9c5b\">David Dudok de Wit<\/a> (developer of <a href=\"https:\/\/tripmode.ch\">TripMode<\/a>, <a href=\"https:\/\/twitter.com\/david_ddw\/status\/1318578265905369089\">tweet<\/a>, <a href=\"https:\/\/openradar.appspot.com\/radar?id=5064458556669952\">Radar<\/a>):<\/p>\n<blockquote cite=\"https:\/\/medium.com\/tripmode\/apple-started-hiding-the-traffic-of-its-own-mac-apps-9dc83c5a9c5b\"><p>With macOS Big Sur however, that <a href=\"https:\/\/developer.apple.com\/support\/kernel-extensions\/\">changed<\/a>, as application-level firewalls now need to use the new NetworkExtensions APIs, such as NEFilterDataProvider or NEAppProxyProvider, to offer a similar level of functionality as in previous macOS releases.<\/p><p>[&#8230;]<\/p><p>Starting with macOS Big Sur, users can&rsquo;t:<\/p><ol><li>View <em>a full, uncensored list of apps <\/em>trying to access the Internet on their Mac &mdash; as Apple is hiding 56 of its own apps.<\/li><li>Know how much data these Apple apps upload or download.<\/li><li>Know which domains or IP addresses these Apple apps interact with.<\/li><li>Block or allow traffic from these Apple apps.<\/li><\/ol><\/blockquote>\n\n<p><a href=\"https:\/\/tidbits.com\/2020\/10\/22\/apple-hides-traffic-of-some-its-own-apps-in-big-sur\/\">Adam Engst<\/a>:<\/p>\n<blockquote cite=\"https:\/\/tidbits.com\/2020\/10\/22\/apple-hides-traffic-of-some-its-own-apps-in-big-sur\/\"><p>I don&rsquo;t believe this move shows any grand conspiracy to undermine TripMode or Little Snitch. I suspect it&rsquo;s just another change that Apple has made&mdash;perhaps in the name of overall security, perhaps merely with no thought to what developers and users want&mdash;that has an unintended and undesirable consequence. It&rsquo;s reminiscent of when Apple quietly prevented apps like <a href=\"https:\/\/support.busymac.com\/help\/112805-activity-list-is-not-showing-emails-in-busycontacts-on-macos-catalina\">BusyContacts<\/a> and <a href=\"https:\/\/support.busymac.com\/help\/112805-activity-list-is-not-showing-emails-in-busycontacts-on-macos-catalina\">HoudahSpot<\/a> from indexing Mail&rsquo;s email archive in Catalina, regardless of how you set your permissions. Nevertheless, it&rsquo;s disappointing, and if you&rsquo;re bothered by the move, let Apple know via its <a href=\"https:\/\/feedbackassistant.apple.com\/\">Feedback Assistant<\/a>.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/tinyapps.org\/blog\/202010210700_whose_computer_is_it.html\">Miles Wolbe<\/a>:<\/p>\n<blockquote cite=\"https:\/\/tinyapps.org\/blog\/202010210700_whose_computer_is_it.html\"><p>Deleting those entries [from <tt>\/System\/Library\/Frameworks\/NetworkExtension.framework\/Versions\/A\/Resources\/Info.plist<\/tt>] under Big Sur turned out to be <a href=\"https:\/\/apple.stackexchange.com\/a\/395509\/51806\">rather involved<\/a>; in fact, one could be forgiven for coming away with the vague suspicion that Apple would prefer them not to be disturbed[&#8230;]<\/p>\n<p>[&#8230;]<\/p>\n<p>Little Snitch 5 and TripMode 3 had no problem blocking the previously-cloaked processes afterwards[&#8230;]<\/p><\/blockquote>\n\n<p>But it causes problems for the IMTransferAgent process.<\/p>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/03\/25\/little-snitch-and-the-deprecation-of-kernel-extensions\/\">Little Snitch and the Deprecation of Kernel Extensions<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/08\/29\/spotlight-excludes-mail-folder-on-macos-10-15\/\">Spotlight Excludes Mail Folder on macOS 10.15<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Maxwell Swadling: Some Apple apps bypass some network extensions and VPN Apps. Maps for example can directly access the internet bypassing any NEFilterDataProvider or NEAppProxyProviders you have running &#x1F612; The new beta for @littlesnitch seems to use an NEFilterDataProvider instead of kext, I don&rsquo;t think they will be able to block Maps from tile loading... [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2020-10-22T19:58:45Z","apple_news_api_id":"b47b3e0b-9b72-4e59-8322-286c8c9cd63a","apple_news_api_modified_at":"2020-10-22T23:50:06Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAA==","apple_news_api_share_url":"https:\/\/apple.news\/AtHs-C5tyTlmDIihsjJzWOg","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[828,139,2008,30,32,39,1891,476,355,2007,1132],"class_list":["post-30518","post","type-post","status-publish","format-standard","hentry","category-technology","tag-kernel-extensions","tag-littlesnitch","tag-lulu","tag-mac","tag-macapp","tag-macappstore","tag-macos-11-0","tag-networking","tag-privacy","tag-tripmode","tag-virtual-private-network-vpn"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/30518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=30518"}],"version-history":[{"count":2,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/30518\/revisions"}],"predecessor-version":[{"id":30527,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/30518\/revisions\/30527"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=30518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=30518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=30518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}