-
Notifications
You must be signed in to change notification settings - Fork 1
Description
Since 2011, Debookee intercepts and decrypts IPv4 traffic of "any device on the same network, in just a simple click".
We discovered that an update of macOS Monterey breaks a behavior of pf firewall's routing internally used by Debookee (to redirect traffic to mitmproxy and sslsplit components)
his bug affects the final version of macOS 12 and all subsequent macOS versions.
Which traffic Debookee can see and decrypt normally
- IPv4 & IPv6 traffic of the mac running Debookee (called Own Traffic)
- Seen in menu : Own Traffic → HTTP ✅
- Seen in menu : Own Traffic → Traffic statistics ✅
- IPv4 traffic of other devices on the same network (called Targets), if interception works through ARP spoofing.
- Seen in menu : Target → HTTP ❌
- Seen in menu : Target → Traffic statistics ✅
What are the consequences ?
Only Target's IPv4 traffic (decrypted or not) is affected : it's not seen in HTTP view.
Own Traffic is not affected although it uses the same routing rules. (looks that the bug affects packets concerned by IP forwarding and if IP source is different that NIC's IP)
- NA, SSL & PRO modules are affected for target's traffic.
- WM module is not affected
Actions taken
- The bug was submitted in August 2022 via Apple's Feedback Assistant (as of November 2024: still no response).
- Users are warned on our website that some key features of Debookee don't work at the moment, on the website, and also at the payment process with a dedicated check box to read this text before buying new licenses (as Own Traffic decryption still works, we don't suspend licenses purchases)
Technical details
- Debookee uses this method to configure pf firewall and decrypt Target's traffic and Own Traffic at the same time
- Bug reported to mitmproxy issues : Unable to get transparent mode to work in OSx 12.0 mitmproxy/mitmproxy#4835
- Related bug reported to Apple : https://openradar.appspot.com/FB9658819
We're very sorry about those consequences and will do our best to find a workaround meanwhile Apple works on this bug.
Thanks for any feedback or technical consideration !
Thomas
Updates
August 08, 2022:
- Bug filled at Apple - FB11087263 - pf firewall transparent routing failure in macOS 12 & 13 beta
- → As of November 2024: still no response
June 13, 2025:
- Intercepted Target traffic decryption has been fully removed from Debookee due to unresolved macOS bugs and increasing system-level restrictions.
- The future of Debookee remains uncertain.