iOS 15 iCloud Private Relay vulnerability leaks user's real IP address

iOS 15 iCloud Private Relay vulnerability leaks user's real IP address

[[426360]]

The iCloud private relay service vulnerability introduced in Apple iOS 15 caused the user's real IP address to be leaked.

iCloud Private Relay service is a new feature introduced in Apple's iOS 15 beta, which allows users to browse the Internet in a more secure and private way through the Safari browser. The service ensures that the traffic leaving the device is encrypted, and uses 2 Internet relays to allow users to browse the Internet without using their real IP address and location.

Client IP address leaks using iCloud Private Relay

FingerprintJS security researchers found that users can obtain the proxy's IP address through HTTP requests received by the server. The real IP address of the client can also be obtained through webRTC. WebRTC (web real-time communication) is an open source project that aims to provide real-time communication for web browsers and mobile applications through APIs, which can achieve point-to-point audio and video communication without installing plug-ins or apps.

The real-time media information exchange between two terminals is established through a discovery and negotiation process called signaling. A framework called interactive connectivity establishment (ICE) is used in signaling. There are two methods in the framework that can be used to find and establish connections.

FingerprintJS researchers found that when data needs to be transmitted between terminals through the NAT (Network Address Translation) protocol, the STUN server will generate a "Server Reflexive Candidate". STUN is a tool used to extract the public IP address and port number of the network device behind NAT.

The vulnerability stems from the fact that STUN requests are not proxied through iCloud Private Relay, which will cause the client's real IP address to be exposed when ICE candidates are exchanged during the signaling process.

FingerprintJS said it has reported the security vulnerability to Apple, and Apple has fixed it in the latest version of macOS Monterey. However, it is still not fixed in iOS 15 system using iCloud Private Relay.

This issue shows that iCloud Private Relay cannot replace a virtual network. Users who want to hide their real IP address should still consider using a virtual network or browsing the Internet through Tor, and use JS to turn off WebRTC-related features when using the Safari browser.

For full technical details, see: https://fingerprintjs.com/blog/ios15-icloud-private-relay-vulnerability/

This article is translated from: https://thehackernews.com/2021/09/apples-new-icloud-private-relay-service.html. If reprinted, please indicate the original address.

<<:  iFixit shares iPhone 13 Pro disassembly report: repairability is only 5/10 points

>>:  WeChat cloud storage charges kill three birds with one stone, but it is "going against the trend"

Recommend

Snow leopards, big cats active in the snowy mountains

In nature, there is a big cat with a long tail th...

Mazda, the BMW of Japan, may still have a chance to save itself in fuel vehicles

Mazda is known as the BMW of Japan. But when BMW ...

China Mobile's 4G penetration rate is four times that of 3G

According to relevant statistics, in the first fou...

High scores can make money? Why do mobile phone manufacturers cheat on scores?

Many mobile phone users often run benchmarks when...

[Case sharing] How did she gain 1 million followers in just two months?

1. My date was disrupted I was supposed to go on ...

Is the world chaotic? Wandering between order and disorder

Yang Mingzhe Introduction: Imagine we throw a sto...

A crab with 17 legs? Uncovering the secrets of the mysterious creature "Myoga"

In our daily lives, we are all familiar with crab...

6 core concepts of community operation!

I recently reread Professor Xu Zhibin’s "The...