You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Why does iTunes 10.7 try to contact the domain bogusapple.com?

I have noticed a lot of strange behavior from iTunes over the past few days, both in the Mac app, the iOS apps, iTunes Match, iTunes in the Cloud, etc. Servers are down, purchases aren't showing up, my iPhone 5 doesn't automatically download (and when I finally got it enabled, it showed up as an iPhone 4S under the iTunes in the Cloud settings), etc.


Also, just now, I tried to search for an app using the Mac app and Little Snitch reported that it was trying to reach bogusapple.com on port 443. Does anyone have any idea what this is? I can't imagine Apple seriously using such a dodgy sounding domain name.

Posted on Sep 30, 2012 10:45 PM

Reply
21 replies

Oct 1, 2012 5:38 AM in response to amfek

Going to www.bogusapple.com in a browser shows a placeholder provided by the registrar. Going to bogusapple.com, however, shows the following:


Hi! You're here because of some feature in OS X Mountain Lion that I'm incredibly curious about.

  • No, I didn't hack your computer.
  • No, being here does not mean you did something wrong, or that something is broken.
  • No, There's no malware on this site, there's not even an image, and I don't set cookies.
  • I think Apple "tests the waters" by sending you to bogusapple.com to ensure it fails.
  • Foolish idea, because any one can run it, and now I do 🙂

Who am I? No one particularly important.

Does this page's existence make you as curious as this domain did to me? Get in touch with me!



So Apple for whatever reason maybe uses it as a fallback domain, if something goes wrong like it did last night, they redirect whatever is going wrong to that domain. See below for a more lengthly explanation as to how I arrived at this conclusion:



Same issue here. Little Snitch caught it, I denied until quit, seems like everything is working ok so I'm not sure what traffic was affected.


The connection alert popped up when I tried to play a song from the Cloud as I have iTunes Match turned on. Before the song would play I had to agree to new iTunes terms and conditions. I was still able to accept terms and conditions.


I know last night (September 30, 2012) into this morning there was an issue on (at least) iDevices where the ToS popup led to an endless loop where they could not be accepted, maybe this has something to do with it? The interwebs report the issue is fixed as of now.


Also, I was unable to get any music off iTunes Match on my iPhone 4S running 6.0. I would play a song and it would skip to the next and the next and go on doing that until I forced quit. I could watch the album artwork flash on the screen, but nothing would play. Before coming here, I turned off iTunes Match on the iPhone, rebooted, synced a few songs the traditional way from iTunes, then turned iTunes match back on for the iPhone, and now I seem to have no issues.


Also, I have not accepted any new Terms on the iPhone, and I have purchased a song from iTunes on the device as a test.


Back to bogusapple.com , whois seems to show the owner of the domain is shielded by Contact Privacy Inc in Toronto. Ahh, see the first paragraph, which I typed last.

Oct 1, 2012 5:49 AM in response to M3437

Interesting, thanks. I checked earlier today and nothing came up. I also checked various whois databases and found no record of that domain. Maybe it only just appeared after this guy also got the Little Snitch prompt. I'll be honest and say I was wondering if iTunes itself was somehow hacked on the server side to send traffic to the wrong domain. After all, we presumably all have Gatekeeper on which presumably would avoid bad iTunes or Mac App Store binaries working their way on to our machines. Hopefully it is just as this person says - a dummy URL that is not really used for anything.

Oct 1, 2012 6:12 AM in response to amfek

That's exactly why I picked up the domain and set up the site 🙂.


Nothing specifically exciting yet, pretty standard visits so far. The only unique thing is attempts to retrieve a 'missing.html' file.


User agents are however a completely different story. Browsers, iTunes (Windows + Mac), Flipboard, a few Twitter apps, etc.


Invariably since public discussion has started here and in a public chat room, most recent visits? The spam bots to a handful of phony URLs.

Oct 1, 2012 7:58 AM in response to VxJasonxV

Awesome - I'm surprised they used a domain like that and not an API for discovering whether DNS was resolving or a certain port were open. At worst, I could see them using something more self-explanitory like:


no-dns.apple.com to test something that never should be in DNS and site-down.apple.com and site-up.apple.com for http port status.


But then again, I'm just in the peanut gallery, eating popcorn on this one.

Oct 1, 2012 2:08 PM in response to cronin1024

Just :80. It's on a shared web host, it was the quickest way to see any traffic occurring. It's a shame I can't adequately log :443 as a result though.


Based off the initial evidence (iTunes and MAS), it sounded like they would be plain HTTP requests. I think I've been mostly right in that regard.


My inclination was to capture User Agents. Obviously that concept generally doesn't exist outside of HTTP. Though now that I think about it, having access to raw payloads would be very interesting to see as well, and just respond to things that are HTTP requests with the current content like I have now. Sounds like a fun undertaking.

Oct 1, 2012 2:50 PM in response to VxJasonxV

Perhaps just a typo by the developers: maybe they meant bogus.apple.com? Easy to miss in testing, and that would be a reasonable DNS test (though still odd from a user experience side).


Jason, it does appear that iTunes is either validating the server key against some expected value, or is bailing after establishing the connection without sending a payload. I redirected bogusapple.com traffic to an arbitrary web server (running SSL) via my hosts file, and used Wireshark to examine the traffic. After the key exchange handshake, iTunes immediately sent FIN,ACK.

Oct 1, 2012 3:19 PM in response to amfek

This sounds like a check to see what the connectivity status of the network is.


Because they request a (previously) non existing domain and a /missing.html page this sound the software intentionally tries to trigger a failure. This makes me think it's related to wifi login detection. Say you visit a Starbuck, initially they serve you a landing page, even when you request a non-existing domain.


Might be related to the wifi bug fix last week caused by the page the software requested previously accidently returning succesfully ( http://arstechnica.com/apple/2012/09/wifi-connectivity-under-ios-6-temporarily-b roken-by-server-proble/ )

Oct 1, 2012 3:21 PM in response to VxJasonxV

I've been proceeding on the assumption that they intended this request to go to an existing server, and just screwed up, in which case they will be expecting (I assume) a certificate they can validate via PKI. Internally, during development bogusapple.com would refer to a server running in their development environment, so they don't roll out their new features to production ahead of schedule. When they released, someone forgot to update the host name.


I bring this up only because you appeared interested in assessing the payload of the HTTPS requests, which I imagine would only exist if they expected something to respond to the request. If the alternative theory is correct, that this is an attempt to gather diagnostic information, then indeed they would not be expecting any particular result, nor sending any particularly interesting payload.

Why does iTunes 10.7 try to contact the domain bogusapple.com?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.