Mullvad VPN Enhances iOS App Security with New Traffic Feature

iOS VPN security TunnelCrack mitigation includeAllNetworks WireGuard obfuscation Apple NetworkExtension VPN kill switch Cybersecurity
V
Viktor Sokolov

नेटवर्क इंफ्रास्ट्रक्चर और प्रोटोकॉल सुरक्षा शोधकर्ता

 
23 अप्रैल 2026
3 मिनट का पठन
Mullvad VPN Enhances iOS App Security with New Traffic Feature

TL;DR

This article explores the technical implementation of the 'Force all apps' feature on iOS designed to prevent TunnelCrack attacks and data leaks. It details the challenges of using the includeAllNetworks flag, specifically regarding broken update loops in the App Store, and examines new security enhancements like quantum-resistant tunnels and DAITA v2. You will learn why manual intervention is currently necessary during app updates to maintain connectivity.

Technical Implementation of Force All Apps on iOS

The latest update for the iOS application introduces a feature called "Force all apps," which is designed to mitigate TunnelCrack attacks and prevent traffic leaks. This feature functions by setting the includeAllNetworks configuration option to true within Apple's NetworkExtension framework. When this flag is active, the VPN kill switch becomes airtight, instructing the iOS networking stack to route every byte of data through the encrypted tunnel. If the tunnel is not active, all outbound traffic is dropped to prevent the exposure of the user's true IP address.

This implementation addresses long-standing vulnerabilities where certain system-level processes could bypass the tunnel. SquirrelVPN users interested in similar high-security configurations should note that this leverages specific iOS configuration options to ensure that no data escapes the VPN's protection during standard operation.

Network Stack Limitations and the Update Loop

A significant technical hurdle in the iOS ecosystem is how the system handles automatic updates when includeAllNetworks is enabled. Historically, SquirrelVPN and other providers have noted that automatic updates briefly drop the VPN connection. When the "Force all apps" setting is active, it creates a broken update loop:

  1. The App Store attempts to update the VPN application.
  2. The existing VPN tunnel is shut down to allow the update.
  3. Because includeAllNetworks is active, the iOS networking stack blocks all traffic since no tunnel exists.
  4. The App Store downloader cannot reach the internet to fetch the update, causing the process to hang or fail.

To resolve this, the app now uses userspace networking to generate TCP and ICMP traffic internally. This allows the app to function even when the tunnel process cannot bind sockets to the tunnel device due to Apple's networking stack limitations.

Manual Update Procedures and Traffic Leaks

Because there is no native workaround to maintain a secure tunnel during the actual update of the VPN binary itself, users must follow specific protocols to avoid bricking their network connectivity. According to the technical blog post, users will receive a notification of a new version before the App Store triggers an update.

Mullvad to add feature that forces all iOS traffic through the VPN tunnel

Image courtesy of Cyber Insider

Users are instructed to either disconnect the VPN or disable the "Force all apps" feature before proceeding with the update. It is explicitly acknowledged that traffic will leak during this brief window. This manual intervention is currently the only way to prevent the device from entering a state where it loses all internet access, requiring a hard reboot. For those seeking the best VPN experience with advanced security, these trade-offs represent the current limits of the Apple NetworkExtension framework.

Advanced Obfuscation and Protocol Enhancements

Beyond the "Force all apps" feature, recent changes in the iOS CHANGELOG.md reveal several advancements in traffic obfuscation and protocol security. The app now supports Lightweight WireGuard Obfuscation (LWO) and the ability to obfuscate WireGuard tunnel traffic as the QUIC protocol. These methods are essential for circumventing deep packet inspection (DPI) used by ISPs and restrictive governments.

Additional technical updates include:

  • DAITA (Defence against AI-guided Traffic Analysis): A feature designed to protect against traffic analysis attacks, now updated to DAITA v2.
  • Quantum-Resistant Tunnels: The transition from Classic McEliece to HQC for post-quantum safe key exchanges, which significantly reduces CPU load and public key size.
  • Multihop Routing: The ability to route traffic through two relays before reaching the destination, enhancing anonymity.

These features, including WireGuard over Shadowsocks obfuscation, provide a robust toolkit for users operating in high-surveillance environments.

For more deep dives into network architecture and the latest in encryption protocols, explore the cutting-edge insights at squirrelvpn.com.

V
Viktor Sokolov

नेटवर्क इंफ्रास्ट्रक्चर और प्रोटोकॉल सुरक्षा शोधकर्ता

 

विक्टर सोकोलोव एक नेटवर्क इंजीनियर और प्रोटोकॉल सुरक्षा शोधकर्ता हैं, जिन्हें इस बात की गहरी समझ है कि डेटा इंटरनेट पर कैसे यात्रा करता है और यह कहाँ असुरक्षित हो जाता है। उन्होंने आठ साल तक एक प्रमुख इंटरनेट सेवा प्रदाता (ISP) के लिए काम किया, जहाँ उन्होंने ट्रैफिक विश्लेषण, डीप पैकेट इंस्पेक्शन और ISP-स्तरीय निगरानी क्षमताओं का प्रत्यक्ष अनुभव प्राप्त किया। विक्टर के पास कई सिस्को प्रमाणन (CCNP, CCIE) और दूरसंचार इंजीनियरिंग में मास्टर डिग्री है। ISP कार्यप्रणालियों के बारे में उनका आंतरिक ज्ञान वीपीएन (VPN) के उपयोग और एन्क्रिप्टेड संचार की वकालत करने के लिए उन्हें प्रेरित करता है।

संबंधित समाचार

Cybersecurity Insiders Report Reveals SMBs Increasing Security Spend to Counter Escalating Remote Infrastructure Risks
SMB cybersecurity budget

Cybersecurity Insiders Report Reveals SMBs Increasing Security Spend to Counter Escalating Remote Infrastructure Risks

Facing a 50% breach rate, SMBs are finally increasing security budgets. Discover why legacy tech and AI adoption gaps are driving this critical investment shift.

द्वारा Marcus Chen 23 मई 2026 4 मिनट का पठन
common.read_full_article
Russian State-Sponsored Actors Target RDP and VPN Protocol Vulnerabilities to Compromise Enterprise Networks
VPN protocol vulnerabilities 2026

Russian State-Sponsored Actors Target RDP and VPN Protocol Vulnerabilities to Compromise Enterprise Networks

Russian state-sponsored actors are exploiting known RDP and VPN vulnerabilities to breach enterprise networks. Learn the risks and how to secure your infrastructure.

द्वारा Elena Voss 22 मई 2026 5 मिनट का पठन
common.read_full_article
Western Digital Launches First Post-Quantum Cryptography Hard Drives to Secure Data Against Future Threats
post-quantum cryptography standards 2026

Western Digital Launches First Post-Quantum Cryptography Hard Drives to Secure Data Against Future Threats

Western Digital unveils enterprise HDDs with NIST-approved quantum-resistant cryptography to protect long-term data against future decryption threats.

द्वारा James Okoro 21 मई 2026 4 मिनट का पठन
common.read_full_article
New Market Report Projects Rapid Adoption of Zero-Trust Network Access Amid Evolving Cyber Threats
zero-trust network access (ZTNA) market shifts

New Market Report Projects Rapid Adoption of Zero-Trust Network Access Amid Evolving Cyber Threats

Explore the rapid growth of the Zero-Trust Network Access (ZTNA) market. Discover why ZTNA is the new baseline for cybersecurity in a remote and cloud-first era.

द्वारा Marcus Chen 20 मई 2026 4 मिनट का पठन
common.read_full_article