Guest rascas Posted May 18, 2011 Report Posted May 18, 2011 (edited) First some links: german: http://www.ksta.de/html/artikel/1305651201172.shtml english: http://www.freedom-to-tinker.com/blog/dwal...roid-smartphone http://www.uni-ulm.de/en/in/mi/staff/koeni...authtokens.html What should the ordinary user do now? Upgrade to cyanogen, or is this leak already fixed in the custom roms? below 2.3.4 Edited May 18, 2011 by rascas
Guest devilkazuya Posted May 18, 2011 Report Posted May 18, 2011 I have just read the article and also read about this previously on other news sites and apparently it has to do with browsing on open wifi networks. Reading from the article you posted, google calendar is the only one that seems to be affected which i dont personally use anyway and its best to keep gps off when not in use anyway. Just disabling the GPS will not prevent your location from being sent. The phone can use phone triangulation and also can use WIFI to find your location. I guess it all boils down to the user and just be vigilant or <joke>buy a windows phone</joke> LOL.
Guest wbaw Posted May 18, 2011 Report Posted May 18, 2011 (edited) options are upgrade to 2.3.4, use a vpn when using unencrypted public wifi, or don't use unencrypted public wifi. it's unlikely to be fixed in any versions below 2.3.4. don't install the facebook app either. Edited May 18, 2011 by wbaw
Guest rascas Posted May 18, 2011 Report Posted May 18, 2011 So not using open Wlans is enough to be safe? ... at least as long as cyanogen is stable enough :unsure:
Guest wbaw Posted May 18, 2011 Report Posted May 18, 2011 (edited) So not using open Wlans is enough to be safe? ... at least as long as cyanogen is stable enough :unsure: Not using public or unencrypted wifi should help to prevent against that method of attack. You can't connect to the same network as a bad guy that wants to steal your google/facebook/any other website login info, without using an additional layer of encryption, like a vpn. http://codebutler.com/firesheep?c=1 Edited May 18, 2011 by wbaw
Guest Orbbman Posted May 18, 2011 Report Posted May 18, 2011 Uh, hey, that's also a problem for Blackberry, Nokias, Sony Ericssons, iPhones - general internet problem? :unsure: Maybe it's a "revenge" on the "iPhone Tracking System". You definetly can't reduce the problem only on Android. :)
Guest crblues Posted May 18, 2011 Report Posted May 18, 2011 (edited) Uh, hey, that's also a problem for Blackberry, Nokias, Sony Ericssons, iPhones - general internet problem? :P Maybe it's a "revenge" on the "iPhone Tracking System". You definetly can't reduce the problem only on Android. <_< I was thinking exactly the same... hehehe If someone read a bit about "man in middle" attacks will find out that it is a quite common problem that exists with any type of unencrypted connection over wi-fi... :rolleyes: Look for "pineapple" and wi-fi... Ohh and if you want it to be a secret, don't put it on the internet... would you send your account number and pin in a postcard? Edited May 18, 2011 by crblues
Guest jurrasstoil Posted May 18, 2011 Report Posted May 18, 2011 Is this really just for unencrypted wifis? What about sitting in a hotel lobby that uses wpa2 and you get the key when you check in - wouldn't everyone who is using the network be able to do the same thing?
Guest wbaw Posted May 18, 2011 Report Posted May 18, 2011 Is this really just for unencrypted wifis? no What about sitting in a hotel lobby that uses wpa2 and you get the key when you check in - wouldn't everyone who is using the network be able to do the same thing? yes
Guest german_psycho Posted May 18, 2011 Report Posted May 18, 2011 Just use a VPN when connecting to public wifis and you are safe..
Guest curl66 Posted May 18, 2011 Report Posted May 18, 2011 this crap is running throug the newspaper everywhere. there is ALWAYS a risk of somebody sniffing your data on unsecured wireless networks. there are many APPs for android and iphone that dont use encryption anyway. and nobody knows and so dont care about. DONT USE SENSITIVE APPS ON UNSECURED PUBLIC NETWORKS! USE YOUR OWN BRAIN!!!!!!! THINK ABOUT SECURITY. SECURITY STARTS WITH YOURSELF! dont whine about such "bugs". there are many of them, everywhere.
Guest ColdEmbrace Posted May 18, 2011 Report Posted May 18, 2011 I think everyone is missing the point, this wasn't about people sniffing open networks, it was about people making open network specifically to sniff your data, e.g living near starbucks and creating an identical SSID so that you connect to the wrong WAP and divulge your data. This was not about people linking onto the same open WiFi as you and stealing your data from the network.
Guest Schwinni Posted May 18, 2011 Report Posted May 18, 2011 I think everyone is missing the point, this wasn't about people sniffing open networks, it was about people making open network specifically to sniff your data, e.g living near starbucks and creating an identical SSID so that you connect to the wrong WAP and divulge your data. This was not about people linking onto the same open WiFi as you and stealing your data from the network. That really doesn't matter. The point is that some services sending password (or in this case the tokens) shall use HTTPS!
Guest wbaw Posted May 18, 2011 Report Posted May 18, 2011 I think everyone is missing the point, this wasn't about people sniffing open networks, it was about people making open network specifically to sniff your data, e.g living near starbucks and creating an identical SSID so that you connect to the wrong WAP and divulge your data. This was not about people linking onto the same open WiFi as you and stealing your data from the network. It is about people packet sniffing on public wifi networks. There is no need to set up a fake ap. You can connect to your local public wifi & see what everybody else is sending across that network (as long as the data isn't encrypted). Most web services don't use encryption or any other protection against this kind of man in the middle attack. It isn't just Google & it certainly isn't just Android affected by this. You should be using another form of encryption, like a vpn, if you're using a public wifi service.
Guest Nick Rhodes Posted May 18, 2011 Report Posted May 18, 2011 Good news, fix to be rolled out: http://www.pcmag.com/article2/0,2817,2385565,00.asp Said will roll out to everyone automatically, does this included rooted/3rd party roms though ?
Guest Ibcus Posted May 18, 2011 Report Posted May 18, 2011 Isn't the problem just that the token that is sent is not tied to the device it was sent from? Seems an easy fix to tie the token to a specific device and block any other device that is trying to use it.
Guest wbaw Posted May 19, 2011 Report Posted May 19, 2011 (edited) Isn't the problem just that the token that is sent is not tied to the device it was sent from? Seems an easy fix to tie the token to a specific device and block any other device that is trying to use it. OK, so how would it identify the device, then how would it prevent somebody who can see the network traffic doing a replay attack & impersonating that device? The fix is strong encryption. Edited May 19, 2011 by wbaw
Guest Nick Rhodes Posted May 19, 2011 Report Posted May 19, 2011 I found out that the fix is a serverside fix, http://www.theregister.co.uk/2011/05/18/go...d_security_fix/ which ensures https is used. :P
Guest rascas Posted May 19, 2011 Report Posted May 19, 2011 It isn't just Google & it certainly isn't just Android affected by this. You should be using another form of encryption, like a vpn, if you're using a public wifi service. There is one thing i do not understand. - As i read the articles about this leak, it seems as if it is app dependend, other devices some not even running android are on risk, too. - the leak is fixed in 2.3.4 How can this be? How can it be an android leak if other devices - not running android - are affected and how can it be fixed in android 2.3.4 if it is at least partly app dependend? If the above is true i would not call it an android leak.
Guest Nick Rhodes Posted May 19, 2011 Report Posted May 19, 2011 The servers that handled authentication were configuired to accept both http and https connections. 2.3.4 initiated a https connection. Other devices initiated a http non secure connection. What I think google have done is configured their servers to redirect the http to the https connection (this is something we do on one of the websites I develop). Cheers, Nick
Guest rascas Posted May 19, 2011 Report Posted May 19, 2011 What I think google have done is configured their servers to redirect the http to the https connection (this is something we do on one of the websites I develop). Cheers, Nick That would fix the google apps side. And google apps only but not an android leak. I am a little bit confused. :P
Guest Schwinni Posted May 19, 2011 Report Posted May 19, 2011 That would fix the google apps side. And google apps only but not an android leak. I am a little bit confused. :P What Android leak? If an program chooses to communicate only via HTTP it is the fault of the application's developer. The calendar app has this problem and Google can fix that because they force HTTPS when the tokens are exchanged. You have exactly the same problem when using your notebook in such an environment. When you decide to connect to your mail provider with POP/IMAP & SMTP instead of POPS/IMAPS & SSMTP you may not wonder that everybody in your WLAN can read your mails!
Guest rascas Posted May 19, 2011 Report Posted May 19, 2011 What Android leak? The android leak everybody is talking about. But i am with you, i would not call it an android leak, too if it is just an issue using unsecure apps in an wlan - open or secure. If this is so, why is everybody talking about an adroid leak and why is Google rolling out a fix for android... There must be more, than just the app issue.
Guest Schwinni Posted May 19, 2011 Report Posted May 19, 2011 If this is so, why is everybody talking about an adroid leak and why is Google rolling out a fix for android... There must be more, than just the app issue. Google is rolling out a fix for Android? So all Android phones are upgraded to 2.3.4? Seriously, Google fixes that on the servers' side. The login was secured by SSL anyway, but older version of the apps (found in ROMs < 2.3.4) uses non-SSL when exchanging the token. Google now sets an rewrite rule to force SSL. Just open http://webmail.uni-wuerzburg.de for example and see what happens to the protocol. That's what Google rolls out on their servers.
Guest rascas Posted May 19, 2011 Report Posted May 19, 2011 The login was secured by SSL anyway, but older version of the apps (found in ROMs < 2.3.4) uses non-SSL when exchanging the token. Google now sets an rewrite rule to force SSL. I have read that on a german site. But on english sites they talk about "rolling out" ... So it seems as if there are many guys out there with different ideas. Instead of a rewrite rule, rolling out the 2.3.4 apps would be an option, too. So let's wait and see.
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now