

This was a defense against client impersonation. You can read what we announced about it at the time. This protocol didn't do anything on Mac other than to obfuscate the traffic to and from localhost. The analog of that check on windows was didn't work, as was pointed out to us by Tavis Ormandy in August 2016. As you noted, on Mac the server checks the owner of the process behind the client. The reason why we added the this "broken ad-hoc crypto protocol" (you are not wrong to call it that) was to defend against client impersonation on Windows. Server impersonation vs client impersonation It is not relevant to either client or server impersonation.

So as long was we were adding in a new protocol, we added that in as well. Although we dislike obfuscation, there is a history of people getting very worried when they discover that an admin user can read that traffic. We took the opportunity when creating this ad-hoc protocol to obfuscate that traffic. The wireshark issue was only about reading bidirectional traffic between client and server. I probably should have edited irrelevant sections of the thing I quoted. (We were already successfully preventing this on macOS.) The bug we were fixing with this protocol was to prevent client impersonation on Windows.It requires an admin user to read the localhost traffic on macOS.

