You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

MacOS Sequoia blocking VPN, won't allow use of Messages and iCloud

On a MacMini M1, MacOS 15.


I've been using ExpressVPN for years for my work, recently I discovered I can't use iCloud while using VPN. I could work around it by simply using it on my phone, but it wasn't optimal. I also can't airdrop while using VPN.


Now in this latest update, the MacOS is actively blocking my messages while using VPN which is a big problem now as my clients communicate through that.


I can't whitelist anything through ExpressVPN and I don't see what I can do in MacOS since I can't do anything to adjust this. It went from working to not working after the update.


Anyone else having this issue? I'd love a work around as right now, it's not at all ideal with the new OS. Most of the features that I looked forward to aren't even available in Europe which makes no sense. I somewhat understand the AI issue, but the screen sharing with your iPhone isn't available? Why? If I can screen share with my local machines why not the iphone? Something doesn't sit right with me in these latest updates.


Any help would be appreciated. Thank you in advance


PS. How can I downgrade if I have to?

Mac mini, macOS 15.0

Posted on Sep 17, 2024 8:31 AM

Reply
Question marked as Top-ranking reply

Posted on Sep 20, 2024 2:20 PM

As an information security professional, your advice is irresponsible, and some items in the link are uninformed or out of date. Many of us require a VPN for work, many of us for travel, and others use them to greatly reduce the advertising traffic which, if you've ever used one, you'd know can be a transformative online experience.


Please everyone saying "just stop using the VPN" - stop giving us advice. If you have no helpful advice on the topic, please just stay silent.


So many of us are reeling from the loss of services after this update, and we're trying together to find a solution. The solution is not to stop using a VPN. Just move on, please.

79 replies

Sep 26, 2024 11:00 PM in response to MrHoffman

In a tech support call with ExpressVPN, I was told ExpressVPN is aware of the issue and it has been escalated to get fixed. For the time being, in your ExpressVPN settings, in the "general" tab, uncheck the box "Network Lock: Stop all internet traffic if the VPN disconnects unexpectedly." This seemed to work to allow messages to be sent and received, as well as allows FaceTime calls through Mac OS's newest upgrade.



This works for me. Awesome.

Sep 30, 2024 5:12 AM in response to Elian Gonzalez

Elian Gonzalez wrote:

OpenVPN is also having a problem for me, but only with Messages. Even updating to 3.5.0 did not help.

As of now, PIA is the only app I know with a workaround (though that fix is punching a hole in the VPN that even they don't advise). If you were able to export your config to OpenVPN, perhaps you could export a WireGuard config as well? If so, you can use the WireGuard app from the App Store with that config and get Messages back. You won't have a kill-switch, but it works well as a temporary solution.

Oct 1, 2024 1:52 PM in response to NightStarOtter

I concur, as do the VPN vendors I have had tickets with. It also seems that unless you let an app accept incoming connections, it will not get responses from DNS queries in all cases. At least one helpful user said the 15.1 upcoming release seems to address both issues, but as of today I don't see anything related to networking in the release notes. I am not in a position to try the latest dev release, but anyone who is might want to give it a try.

Oct 1, 2024 3:44 PM in response to asdfdsfasdfasf

You should avoid making untrue inflammatory statements. There have been well-known and publicized (including by Proton) issues with leaks on iOS. The last substantive update to that is documented here - https://protonvpn.com/blog/apple-ios-vulnerability-disclosure/...which is specifically about DNS and pre-exisitng connections (and mitigated when Apple provided a kill-switch in their VPN framework).


Even so, connections or DNS requests leaking outside a VPN is very different from leaking to Apple's servers, which implies that the connections that ought be going through the VPN are instead going to Apple's infrastructure, rather than directly to the intended end-point outside the VPN tunnel.


It similarly implies that Apple may be logging and tracking those connections (as opposed to an ISP logging and tracking...).


Apple may very well have made changes to their Framework APIs that introduced a bug - but there is quite a difference between using Apple's APIs and using Apple's infrastructure.


On the other hand, perhaps I'm wrong and you have discovered that Apple is MITM-ing all VPNs in Sequoia...in which case you should publish your technical findings and become the darling of the ITSEC community for the next 15 mins (and you absolutely would be if that were the case).

Oct 1, 2024 5:24 PM in response to g_wolfman

@g_wolfman I don't see anyone saying any of the things you posted. Can you elaborate what inflammatory statement you refer to and what untrue statement you are referencing? I must have missed where anyone even implied Apple is MITM'ing VPNs. The issue we are discussing is that on macOS, VPNs break Apple services when not using Apple's MacOS VPN services (visible in the Network preferences under VPN). You can manually add in the VPN in the preferences, or use some of the temporary hot fixes from PIA and Mullvad that allow Apple traffic outside the VPN. I hope that helps.

Oct 1, 2024 5:47 PM in response to Cthulhu

The specific post I responded to says "I investigated how protonvpn works - it leaks everything to apple servers, does not send over VPN." (emphasis added).


Perhaps just sloppy language, but the way it is written does carry the implication that all traffic outside the VPN is going through Apple's infrastructure - the plain reading of "leaks everything to apple servers." That's quite different from Apple services going to Apple (which isn't a leak to Apple in any case because those services have to go to Apple, VPN or not).

Oct 1, 2024 6:49 PM in response to etresoft

Well, admittedly my comment about MITM was a bit hyperbolic...


But the post I was replying to made a hyperbolic comment about everything leaking to Apple servers, and the post I replied to started with the words "I investigated". I don't think it's out of the realm of possibility for someone to read that and come to a worst case conclusion - a mistaken one of course - that all their data is going through Apple's servers. Which is the definition of MITM.


So to be clear, I didn't actually say the person I replied to implied Apple was MITM anything, but that their imprecise language and the claim that they investigated the issue, could lead others to that sort of conclusion

Oct 1, 2024 6:49 PM in response to g_wolfman

I did not read it that way and do not see it as sloppy. It does technically bypass the VPN for all Apple Services services, and leaks your real IP to Apple in VPN parlance (assuming no other layers of networking protection). And while I don't have any particular distrust of Apple, exceptions like this without split tunneling specifically configured by a user is not a pattern you want to start seeing. And there are important reasons in some parts of the world to be sure your data is properly proxied.

Oct 1, 2024 7:00 PM in response to Cthulhu

I agree with everything you just said - didn't see that level of precision in the post in question, though.


Although one point maybe worth noting - Apple is the OS developer, so the idea that "Apple" doesn't know your real IP even with the VPN working perfectly is a bit silly. macOS is almost certainly not sending that kind of telemetry to Apple, but that is because Apple is basically trustworthy - and it is a trust thing.

Oct 3, 2024 8:01 AM in response to Oberon-Station

YES YES YES , SAME HERE BEEN USING VPN FOR YEAR

UPDATED SEQUOIA 15 and VPN ON , IMESSAGES WONT WORK

I REACHED OUT TO APPLE SERVICE , THEY HAVE TOLD ME

THERE HUNDREDS IF NOT THOUSANDS OF US IN THE SAME BOAT as YOU n I

She said that they will fix this with next UPDATE VERSION , God know when that will be , but it really made me double think about APPLE PRODUCTS AGAIN ,


long story short you not the only one that is extremely dissapointed with this update

Oct 3, 2024 11:46 AM in response to Oberon-Station

I saw that ExpressVPN had released an update for their Mac app v11.60.0. Updated it yesterday and it seemed to work on the Automatic protocol setting again, along with the Advanced Protection settings. Sadly, today it went back to the known issue. Messages that come in on the iPhone, or are sent from the iPhone, do not show up on the mac.


Had to go back to the IKEv2 protocol to get things to sync again. Really sad this hasn't been resolved. In my situation, there is no option about using a VPN. It's a hard, cold requirement.

Oct 4, 2024 10:57 AM in response to Oberon-Station

Same Problem here ( Germany ). VPN configuration blocks at least iMessage.

Update to 15.0.1. does not solve the issue. Downgrade is a **** of work. So I have to

select: No Facetime, no iMessage on my Mac or reduce security by switching VPN off.

The answer should be clear for all of us...

Apple did a very bad job here! This should be obvious and has absolutely to be tested before announcing a global update.

What a shame

Oct 7, 2024 2:58 PM in response to etresoft

etresoft wrote:
But that is a very important debugging step. If you turn the VPN off and that corrects the problem, then you know, with certainty, that the VPN is the problem.

Using the same logic: if you upgrade the OS and that breaks Messages and other apps while using a VPN, then you know, with certainty, that the OS is the problem?

MacOS Sequoia blocking VPN, won't allow use of Messages and iCloud

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.