Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

iOS 5.0.1 wireless Bug - DHCP

We discovered an interesting issue yesterday on our network, and upon much searching, I didn't see anyone else with the same conclusion.

Allow me to start by describing the issue. It's happened on a few occassions in our network over the past several months (we recently started allowing Apple iOS devices on our network as Exchange Activesync clients), but I was finally able to narrow it down today.


Issue: Certain iOS devices when connected to the wireless network retain their DHCP Lease from their home network in the background, while connecting to the business network with a like subnet. The IP Address that the iOS device is retaining from home is NOT in the DHCP scope of the business network, but conflicts with a static assigned IP Address on one of the corporate network services (i.e. Print Server, Email Server, File Server, Database Server) in the like subnet. For example "User A" running an iPhone 4S with iOS 5.0.1 has an Airport Extreme at home that assigns DHCP Addresses in the 10.0.0.x scope. The Corporate DHCP Scope is 10.0.4.x-10.0.5.x with similar subnet. "User A" connects to corporate network via wi-fi and is assigned an IP address of 10.0.4.x (but in the background the device is reserving 10.0.0.x from home Airport Extreme.) Address 10.0.0.x belongs to back-end email server, and whenever "User A" turns their device on, it disrupts the network connectivity for the rest of the corporate network to the email server. "User A" turns off wi-fi on iPhone, and normal corporate network operations resume. In the past, the issue has conflicted with a less major server, or another windows client, and so a resolution was able to be acquired by renewing the IP Address on the Windows client computer.


The issue presents it self as one of our Windows Server machines complaining about an IP Address Conflict on the network. Upon examining the Windows Event Viewer in the System Log, we discover an error message from the "Tcpip" service "The system detected an address conflict for IP address 10.0.0.X with the system having network hardware address 60:C5:47:XX:XX:XX. Network operations on this system may be disrupted as a result." Upon examining the mac address beginning with 60:C5:47 we discover this particular MAC Address range belongs to Apple Inc. (LINK) This led us to search the building for the offending iOS device on which we were able to verify the Wireless MAC address.


In a similar forum post by a user in 2009, the suggestion was that the issue lay with the Windows computer. Well, in that particular case, it was a Home PC, and the user was able to 'work-around' the bug by renewing their DHCP lease on their other client that was reporting the issue. In our case, since the conflict occurs with a Network Server with a staticly assigned IP and services / certificates assigned to that interface, it's not as easy as renewing the IP address to allow the Windows computer to 'fix' the issue. I believe the issue lies in the iOS wireless driver, and needs to be addressed by Apple Development team. I'm not sure the best way to accomplish this, so I figured I'd start in the support forum. Since there wasn't a forum for iOS, I placed the issue under iPhone for Enterprise, though this issue is reproducable with iPad and iPod Touch also.



Here's a detailed post by Princeton University where they describe the issue in great detail. http://www.net.princeton.edu/apple-ios/ios41-allows-lease-to-expire-keeps-using- IP-address.html#chronology How can we get greater urgency to get this bug fixed?



I'd appreciate response / suggestions / input / feedback.


Thanks!
DRO4LIFE

iPhone 4S, iOS 5.0.1, wireless wifi dhcp bug

Posted on Jan 24, 2012 11:11 AM

Reply
18 replies

Jan 25, 2012 9:33 AM in response to DRO4LIFE

Interesting discovery...


Upon further investigation, I was able to do a remote session with "User A" 's home network, and his configuration at home is on the 192.168.0.x IP addressing scheme which, in my evaluation, complicates things further. This means somewhere over the timeframe of last weekend as "User A" was travelling, some wireless hotspot 'somewhere, anywhere' assigned him the IP Address of 10.0.0.x, and his iPhone somehow retained that DHCP lease. So, it wasn't the 'last known' network that was interfering with our corporate network, but one somewhere else, either at the institution that he was at last week, an airport, on the airplane, at a coffee shop or somewhere else. This is really concerning, because we had to 'turn-off' his wireless conneciton on his iPhone while he's in the building in order to ensure this doesn't happen again.

What adds to the concern is the number of other iOS devices we have in our organization continues to grow, and the realization that any one of these users could effectively disable our corporate communications / authentication / etc... simply by happening to use a wi-fi hotspot somewhere and then return to the building with that device and hop on the wireless here.


This issue really needs to be addressed and fixed by apple. I hope by this discovery, we can get some traction, and get it fixed soon.


Thanks again for any suggestions / input.

DRO4LIFE

Feb 17, 2012 6:57 AM in response to DRO4LIFE

You are not the only one having this issue. Princeton University is having the same issue as well as our university. You can image the number of these iOS devices we have on a university campus and the network disruption they cause. It is almost inconceivable to me that Apple has not recognized and permanently fixed this issue. How complicated could the fix be?


Princeton's published research concludes that increasing the lease time on the DHCP servers could possibly eliminate the occurances of these conflicts across all versions. We have tried that as well and it does not seem to have an affect. They have also published workarounds for the devices themselves. We try to have the users practice them, but these work arounds are just not practical on a university system.


One other thing that we have found is that this issue is not restricted to the Apple iOS devices. It also shows up from MacOS devices using wireless.


I am very interested in knowing how we can push on Apple to help get this resolved.

Feb 21, 2012 1:02 PM in response to CCUNetman

Well,

According to Apple, they've "investigated and resolved the matter".


Below is the information on my bug-filing report:

"Follow-up: 188900310


Hello Developer,


Thank you for reporting this issue.


We have investigated and resolved the matter.


If the problem persists, let us know by replying to this email."




I gave them this information and the background information when submitting the bug request:
"

- Web browser (Safari, Firefox, etc.) and Version: N/A


- Operating system and Version: iOS 5.0.1


- Date and time zone when this problem occurred: 1/23/2012 (GMT -6) 08:23


- Reproducibility (Always, Sometimes, Rarely, Not Reproducible, Did not try): Always (when iOS device is retaining DHCP Lease)"

Feb 21, 2012 1:04 PM in response to DRO4LIFE

My response to the 'resolved' was this:

Follow-up: 188900310


Can you please explain "HOW" the issue was investigated and resolved?


Will the issue be fixed in an upcoming patch? Is there a bug-tracker in the apple system that I can see to verify when the issue will be fixed?


It's not as simple as saying "it's fixed" if you haven't actually done anything.


Please expand upon your statement below.


Thank you

Apr 14, 2012 12:38 PM in response to DRO4LIFE

I'm not sure exactly how this was resolved, but as someone who uses mutiple wifi-only iOS devices on the Princeton U. network every day, this is no longer an issue. As a matter of fact, there are now hundreds of iOS devices deployed with U. personel. And whatever happened, Andriod devices are still basically banned from the wifi network. And I never saw any evidence that OSX devices had a similar problem.

Apr 14, 2012 7:36 PM in response to DRO4LIFE

This is nothing a feature like DHCP Snooping, IP Source Guard and Dynamic ARP Inspection couldn't resolve. Why on earth would this be affecting the rest of your network? If everything is properly segmented, it shouldnt matter if that thing boots up with your e-mail servers IP address. If it is, you are using a big *** network like a /16 and simply dishing out certain ranges to certain functions rather than using proper subnetting. I really hope this is not the case as thats a big mistake.


If you have everything setup properly, I cannot see that device as affecting anything at all; if it came up with that IP on your wireless subnet, no devices in other subnets should ever be trying to talk to that thing since that IP range is supposed to be reachable elsewhere, like your server subnet, not the wireless subnet. Your other networks will always be forwarding traffic for your server to your server subnet, never to the wireless subnet.


If you are at all confused about what I am saying, let me ask you this. What is the default gateway for your Wireless devices and what is the default gateway for your Servers? If that answer is the same, there lies your problem. Hire a network engineer to clean up that mess. If it is not the same, then something like proxy ARP must be turned on since that incorrect IP should not affect anything other than itself with proper layer 3 boundaries.


If that is not an option, you should be able to use a combination of DHCP Snooping,IP Source Guard and Dynamic ARP Inspection to nip this problem in the butt if your running Cisco gear (if other gear, cross reference, I'm sure the feature exists with another name). The only way for it to cause havok is if the offending device is producing an ARP reply for your servers IP. If running Dynamic ARP Inspection, it should see the offender responding with an ARP for your servers IP which doesnt match what the DHCP snooping database has in it, and it will drop that ARP reply. If by chance that offending device did try to transmit as your servers IP, IP Source Guard's dynamic PACL should have dropped that traffic since its source IP does not match what is in the DHCP Snooping database.


I am not doubting that a bug exists here, however a robust network infrastructure would not be affected by what you describe. Those switch features were designed to halt malicious actions, whether performed intentionally or accidentally via a bug. A network engineer worth his/her salt would have implemented that in their design.

Apr 16, 2012 6:06 AM in response to Network Engineer

I agree with some of what you are saying. However, the problem this bugs is creating for us (it doesn't affect our servers or other parts of the network). It creates problems for other devices that need to be managed on that same subnet as well as other users. Not everyone has the luxury of having Cisco hardware. Apple should fix the problem instead of us having to work around it. I assure you, our network is NOT a mess.

Apr 16, 2012 6:11 AM in response to Xenotar7

Just because you personally do not experience the problem does not mean one does not exist. I use iOS devices daily as well on our university's network. I never have an issue. However, I see the havoc it causes on other devices and users daily. A lot of this issue showing itself has to do with what IP address space is in use at the previous hot spot you were connected to. If it was an address space that is not utilized by the university, then you will probably never see the problem.

Apr 16, 2012 7:33 AM in response to CCUNetman

Well, I wasn't suggesting that the problem "didn't exist." I was stating that the problem at Princeton has been effectively resolved for iOS devices. And I mispoke when I said Andriod devices were "banned" - I meant to say that the current solution (whatever it is) didn't include Android devices. That's what I know. And it's not based on my personal experience running my personal devices. It's based on first-hand knowledge of a large deployment of wi-fi only iOS devices by the University.


I don't usually repeat hearsay, but this tidbit was particulaly interesting. I heard that an "if network=Princeton" statement was added to iOS that changed the DHCP behavior when connected to the Princeton network. I think that's crazy (why would Apple fix it for Princeton and no one else?) but that's what I was told. I was also told that this fix was temporairily dropped in an iOS beta - then restored when "all heck broke loose." Again - just hearsay.

Apr 16, 2012 8:46 AM in response to CCUNetman

Ok, I understand you aren't running Cisco gear but whatever it may be those features are likely supported and should be running on your wireless network anyway. Imagine someone was doing this on purpose rather than it being a bug. They could easily disrupt the network they are directly connected to, in your case the wireless subnet. Imagine someone sets their IP to that of the default gateway!


Cisco, Juniper, Enterasys, whatever your running, those features are likely supported and are probably even called the same thing. Since your running DHCP, they would be very easy to implement especially if you have few to none static mappings on user access VLANs. I would suggest enabling these features on the switch(es) where your WLC's reside, as well as on all edge switches where a user can plug in directly. This should not have any fallout effect, it should only solve your problem. Test it out in your lab, its pretty cool stuff.

Sep 6, 2012 8:44 AM in response to DRO4LIFE

Well here is what I found on my very simple home network. DSL gateway/router, wired XP desktop, Vonage phone adapter, DD-WRT WiFi repeater, WiFi laptop, D-link print server, Two iPod Touch's, and a Kindle.

Symptom was that my Vonage VOIP adapter would stop working. Rebooting the gateway router and the Vonage adapter fixed the problem, but it would be back the next day. After a LOT of testing and research, I came accross the Princeton posting about iOS problems with DHCP. Firstly I went to static IP on all clients except my iPod Touch's, but the problem persisted. Then I went to static IP on ALL my clients, including the iOS ones. The problem has gone away, and not returned.

All this tells me is that iOS is responsible and it has something to do with DHCP.

I'm not a networking guru so I would appreciate anyone else's comment on this .....

Jan 7, 2015 6:01 AM in response to Network Engineer

Hi,

I appreciate this issue appears old and many may assume it is FIXED, but unfortunately I assure you it is still there, even in iOS 8 (even latest version as of Jan 2015).


i run a medium (I'd say) educational boarding school network, with approx 450 simultaneous users that at peak times can have 500+ pupil wifi devices connected! (Most kids have at least a phone and laptop or phone, laptop and tablet... Some have more like AirPlay devices, speakers etc).


this issue is causing me a massive amount of support work trying to get infernal iOS devices to connect.

As I write this, a third of our users Apple devices are not connecting to the network due to them insisting on using their last acquired IP...! Our DHCP server logs are full of NACKs listing Apple MAC/Ethernet addresses and totally fictional IP's that are not part of the scope for the DHCP server on the Pupil dedicated WiFI SSID residing on their own (contained) VLAN.

I'm flummoxed at how to proceed, as whilst I sympathise with the issues the OP mention, I specifically took care to ensure the precautions Mr Network Engineer documents in his post above. Unfortunately even though the users with bad/naughty Apple iOS clients are wreaking havoc taking my servers offline, it is tiresome dealing with 20-30 users constantly in out out of out IT office complaining they can't connect - the worst part is that we can't even write up a fix or workaround to print and put in the dormitories as we don't know how to FORCE the device to rediscover the DHCP and work like they SHOULD do.

Any ideas?

Please?!

Jan 7, 2015 6:57 AM in response to ChrisK-999

Sorry post above should say:


I'm flummoxed at how to proceed, as whilst I sympathise with the issues the OP mention, I specifically took care to ensure the precautions Mr Network Engineer documents in his post above. Unfortunately even though the users with bad/naughty Apple iOS clients are NOT wreaking havoc taking my servers offline, it is tiresome dealing with 20-30 users constantly in out and of our IT office complaining they can't connect - the worst part is that we can't even write up a fix or workaround to print and put in the dormitories as we don't know how to FORCE the device to rediscover the DHCP and work like they SHOULD do.

Can't even edit or use the forum with my iPad and Safari or Chrome - looks like another bug Apple!

iOS 5.0.1 wireless Bug - DHCP

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.