Android Traffic Leaks Outside VPN Tunnels even with Always-on VPN Enabled

Mullvad VPN experts have found that on Android, traffic “leaks” outside VPN tunnels when the device connects to a Wi-Fi network. This happens even if the Block connections without VPN or Always-on VPN features are enabled.

Let me remind you that we also wrote that NordVPN and TorGuard talk about compromise.

In fact, information such as source IP addresses, DNS queries, HTTPS traffic, and possibly NTP traffic leaks outside VPN tunnels.

Although this behavior in Android is, in fact, normal, few people know about this feature of the OS, due to the inaccurate description of the VPN Lockdown functionality in the official documentation.

Mullvad VPN analysts explain that there is an option in Android settings to block network connections if the user is not using a VPN. This feature is designed to prevent the user’s real IP address from being accidentally leaked if the VPN connection is interrupted or abruptly terminated.

However, this feature is often hampered by special cases, such as authentication in captive portals (such as Wi-Fi in a hotel), and checks that must be verified before a user can log in, or when using split tunneling features.

For this reason, Android “leaks” some data when connecting to a new Wi-Fi network, regardless of whether the Block connections without VPN setting is enabled.

The specialists reported the problem to Google developers and asked them if it was possible to somehow fix it by refusing connection checks. Unfortunately, Google replied that it would not be possible to fix the problem for the following reasons:

  1. many VPNs rely on the results of these connectivity checks;
  2. checks are not the only exceptions and far from being the most risky ones;
  3. The impact on user privacy is minimal, if not negligible, since leaked information is already available on L2 connections.

The researchers argue that the traffic flowing outside the VPN connection contains metadata that can be used to obtain sensitive information, such as the location of Wi-Fi hotspots.

Connectivity testing traffic can be monitored and analyzed by the party that controls the connectivity testing server, as well as any other person who monitors network traffic. Even if the message doesn’t reveal anything other than “some Android device is connected,” the metadata (including the source IP address) can be used to provide additional information, especially when combined with data such as the location of Wi-Fi hotspots.the researchers write in a blog post.

Mullvad VPN experts are convinced that even if these leaks are not fixed, Google engineers should at least update the documentation and explain that Block connections without VPN protection does not cover connection checks.

About the author

Carina Wilson

With over 10 years' experience of writing for online and print media, I'm an expert in delivering clear and compelling copy.

I've written for a leading SEO copywriting agency as well as writing for some of the UK’s best known brands, magazines and newspapers.

Leave a Comment