-
-
Notifications
You must be signed in to change notification settings - Fork 160
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Show Android components that can bypass VPN even in lockdown mode #224
Comments
See also: Mullvad found "a leak" but Google wouldn't fix it: https://issuetracker.google.com/issues/250529027 |
NetGuard developer:
|
|
"protectable apps" (ex: Chrome) that can bypass the VPN on certain networks: https://android-review.googlesource.com/c/platform/system/netd/+/3056382 |
Inbound (but not outbound) LAN connections bypass Block connections without VPN (VPN Lockdown) if the tunnel does not have the default route ( via: #1618 (comment) |
No, you're misinterpreting this. |
No, they didn't discover these DNS leaks. They posted about the DNS leaks found by the GrapheneOS community which impact their app and filed issues about some of them. Our community discovered both DNS leaks and multicast packet leaks implementing these apps which we're well on the way to having fully solved despite VPN apps making it difficult for us with compatibility problems from how they do things. |
Even attempting to block inbound connections was missing before Android 14. |
Thanks. I could very well be as my knowledge of the network stack is very limited. Given that, I read the commit msgs & code comments again, and I can't make out what the intention is other than to let apps that can "protect sockets" to bypass certain networks, including VPN in "secure" mode (which I take it to mean, either VPN Lockdown mode is enabled or VpnService.allowBypass isn't set by the VPN app)?
Wow. Only multicast and broadcast or ALL traffic? |
Essentially all inbound traffic, before Android 14. It only mattered if apps listened for connections which is rare and why it was an issue for so long. We have major improvements to make and we've been doing a lot of testing uncovering assorted issues to make sure our fixes are complete. Our work on both fixing all the DNS and multicast issues is nearly complete. Fixing remaining holes in the inbound leak blocking after we address all the outbound issues is next. |
That list can be retrieved from
android.provider.Settings.Secure
key'd toALWAYS_ON_VPN_LOCKDOWN_WHITELIST
.https://cs.android.com/android/platform/superproject/+/android-11.0.0_r3:frameworks/base/core/java/android/provider/Settings.java;l=6283-6291
The text was updated successfully, but these errors were encountered: