Solved

VPN Information Leakage on iPhone?

Posted on 2014-02-03
2
666 Views
Last Modified: 2014-02-04
Friends,

Does anyone know the technicality of how Apple has implemented VPN via iPhone (iOS 7).  I need to know if my iPhone is leaking information when in standby via 4G/LTE once Wi-Fi goes out (which is typical to save battery life even when Wi-Fi is still strong and active).

Thank you all.
0
Comment
Question by:neowillendit
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 39832299
This is a short brief on Apples VPN - note the VPN on demand various setting which will establish a connection automatically when accessing predefined domains. Out of the box, iOS supports Cisco IPSec, L2TP over IPSec, and PPTP. Split- tunneling should be disable to ensure all traffic route through the VPN tunnel, and also to lockdown proxy to Enterprise authorise proxy prior to any device surfing - this ensure internet traffic is not available unless VPN is up first.

http://images.apple.com/ipad/business/docs/iOS_6_VPN_Apr13.pdf

More stringent lockdown is App VPN or called "Per App VPN" feature in iOS7. This is must be implemented by the developers themselves. So when Apps can phone home through a VPN tunnel as soon as they are launched, and send all their network traffic (and only their network traffic) through it. There can be control by the Enterprise MDM admin, on top of the app developer incorporation using the configuration profile.

https://discussions.apple.com/thread/5318472

The link on the configuration profile and setting specific is a good means to ascertain what the device is able to lockdown and the granularity of it. These are also specific to what iPhone Configuration profile to be provisioned into the iPhone set. Key word search on VPN and Wireless will shed more details in the section

https://developer.apple.com/library/ios/featuredarticles/iPhoneConfigurationProfileRef/Introduction/Introduction.html#//apple_ref/doc/uid/TP40010206-CH1-SW37

Having said that, to be network connected, be it wireless of via the phone network signalling, the device is likely to be "leaking" device info already. See the Wifi-Payload on above link for the parameter to likely to be make available in open to establish connection.

Side note, for Android, if your Wi-Fi is turned on, even though it is not connected to any network, your phone will periodically broadcast a unique number (the MAC address), as well as all the Wi-Fi network names and addresses it remembers ever connecting to. With newer Android versions this can happen even if Wi-Fi is turned off, due to a feature called "scanning always available", which helps your device better determine its location.
0
 
LVL 1

Author Closing Comment

by:neowillendit
ID: 39832996
This is top-notch feedback and answers my question completely.  Thank you.
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Users will learn how resize a batch of photos from a single command in Photoshop via Photoshop's Image Processor. Open up an Image you'd like to resize in Adobe Photoshop: Adjust the image size according to your preferences. Image > Adjustments > …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question