Mullvad has partnered with Obscura VPN

That is a good question. That really depends how it works but i would think they use their own IP and given dns is not encrypted it is fairly likely they could read it. If it is encapsulated packets to mullvad it could be encrypted but i am wonder how that initializes then.

What makes you say this? The team is completely different, I don’t see anything to indicate any sort of relationship here.

This is the entire point of the service, yes.

I just used their public info from this.

  1. Github org is Sovereign Engineering
  2. Their Copyright header says this.

Well get that but would that work for the DNS? I really would like to see some technical standard on how that would work.

2 Likes

https://sovereignengineering.io/ links their github as https://github.com/soveng (compare to the obscura VPN repo you linked: https://github.com/Sovereign-Engineering)

1 Like

Better question, why not just use SPN from portmaster, who safing is now owned by IVPN, and in turn, Portmaster / SPN.

I don’t really see the point in this service, as its doing something portmaster does pretty well. And SPN has been around for a lot longer.

From what I can tell from the code,[1] the DNS config is sent by Obscura’s API endpoint, and is set with macOS’ Networking APIs.

I imagine that depending on macOS’ documented behaviour (default or desired), either the DNS is sent back into the VPN tunnel (in which case the DNS query should be relayed over Obscura to Mullvad) or not (as in, sent out the underlying network, outside of the tunnel; which tbh seems unlikely to have skipped app developer’s attention).


  1. I used Sonnet to explore the codebase. Search terms: startTunnel, jsonTunnelArgs, NetworkConfig, NEPacketTunnelNetworkSettings, NEDNSSettings, PacketTunnelProvider. startSendLoop. ↩︎

2 Likes

I also poked them for some details on Discord about this, this morning.

Still waiting to see if they have any thoughts on my last messages, but it’s good to confirm this specific limitation.

Edit:

5 Likes

What are the benefits of rotating WG keys?

Happy to see this. Long overdue.
Hopefully it gains more platform support or others start offering similar.

It still however doesn’t match Apple Private Relay or Tor which both give unique circuits per site.

9 Likes

What part of jonah’s post above is unclear? I could give you an explanation. I thought he explained it fairly throughly why rotating the keys are important.

1 Like

I mean, MPR will always be a poor mans tor (which i get is an ironic name as this is a paid for service)

So Mullvad doesn’t know you’re the same person over a long period of time.

2 Likes

Thank you. I only asked to confirm whether I understood it correctly.

I only asked still because I wanted to confirm whether or not my understanding was accurate. So a more direct and clearer clarification in simpler words would help. But @fria clarified it.

If you have anything to add, please do!

3 Likes

(Carl from Obscura here)

DNS queries are relayed over Obscura to Mullvad. I believe folks can check DNS+WebRTC using Mullvad’s existing Connection check | Mullvad VPN page. (Mine is all green on Obscura)

7 Likes

One more comment on key rotations / inter-connection correlation: Jonah notes (correct me here if I’m mis-summarizing) that Obscura only decorrelates connections temporally (via key rotation) but not in a fine-grain way (per-connection). By choosing to tunnel vanilla WireGuard packets (over QUIC), we were able to easily integrate with Mullvad’s existing WireGuard infrastructure, but lost the ability to potentially do per-connection key rotation if we had made more customizations to the protocol.

However, I do think we gain a little something from that (staying with WireGuard) though because users can verify that the WireGuard pubkeys they’re encrypting their connection against are the same ones that are on Mullvad’s server website Servers. Otherwise, it would have been much more unclear what goes on behind the scenes and who has the keys and whatnot.

In any case, more good work to be done for sure!

6 Likes

I’m not sure what you mean by “per-connection” in this context since you do rotate keys every time a new VPN connection is established with Mullvad, don’t you?

Unless you mean per connection to each website the user visits, like what @SkewedZeppelin was saying?:


Regardless, I do think agree it is very useful to be able to verify keys against Mullvad’s server listing.

1 Like

Yeah by “per connection” I meant “per connection to each website the user visits”! :smile:

3 Likes

Yeah, it is a trickier problem. Although, I think it’s not the most important thing to most people, as long as they are aware it can theoretically be done tbh

Some UI like Tor Browser’s New Identity feature would essentially cover this use-case. This is sort of what I was getting at with the manual key rotation I had mentioned on Discord.

1 Like