![]() |
Re: Maemo 5 as a vulnerability / "hacking" victim
Quote:
Quote:
Quote:
Quote:
Quote:
Thx for responding btw:) |
Re: Maemo 5 as a vulnerability / "hacking" victim
Quote:
It is better to use SSL based mode, SSL itself enforces the generation of shared secret each time. Thus created secure channel is used to exchange the keying material which is used to dynamically generate shared secrets. Quote:
The possible intrusion vector may be the built-in browser. I don't know which version of Gecko is used, but I am pretty sure the there were severe problems with firefox pre-3.6 versions. Closed-source Flash might also be interesting for poking around. |
Re: Maemo 5 as a vulnerability / "hacking" victim
Quote:
'Hardening OpenVPN Security One of the often-repeated maxims of network security is that one should never place so much trust in a single security component that its failure causes a catastrophic security breach. OpenVPN provides several mechanisms to add additional security layers to hedge against such an outcome. tls-auth The tls-auth directive adds an additional HMAC signature to all SSL/TLS handshake packets for integrity verification. Any UDP packet not bearing the correct HMAC signature can be dropped without further processing. The tls-auth HMAC signature provides an additional level of security above and beyond that provided by SSL/TLS. It can protect against: * DoS attacks or port flooding on the OpenVPN UDP port. * Port scanning to determine which server UDP ports are in a listening state. * Buffer overflow vulnerabilities in the SSL/TLS implementation. * SSL/TLS handshake initiations from unauthorized machines (while such handshakes would ultimately fail to authenticate, tls-auth can cut them off at a much earlier point). Using tls-auth requires that you generate a shared-secret key that is used in addition to the standard RSA certificate/key: openvpn --genkey --secret ta.key' To my current understanding this option uses a SHA1 hash of secret ta.key file and the packet data to verify that packet comes from source and that it hasn't been tempered with and places this hash in the packet header. I think it also gets encrypted with the cypher of your choice, but that I can't tell for sure. Quote:
Quote:
Quote:
Quote:
Please note that I am no way an expert in either networking nor security, I just have a genuine interest in these areas. I just started reading up on both very recently. I have some knowledge of ITC from my past, but I wasn't very interested until I actually joined this community. So that being said any positive criticism is hugely welcome. |
Re: Maemo 5 as a vulnerability / "hacking" victim
Quote:
Quote:
My guess is that the shared secret is used to feed IV of hash function (MD5, SHA1, SHA224, SHA256, SHA384, SHA512), although I would have to inspect source code to see what is actually going on. In case of SHA1 20 bytes * 8 bits, gives you 160 bits. Instead of putting SHA1 to the outer package, I would prefer to keep it together with plain-source, than encrypt everything together. That would provide more security. Any poking around with the cipher text, would cause inner SHA1 hash to fail. The drawback to this approach is the need to decrypt each packet, than calculate SHA1 to detect the "faulty" packet. |
Re: Maemo 5 as a vulnerability / "hacking" victim
Wow. This is getting very interesting. Thanks good Sirs.
Quote:
Nokia didn't specify about MicroB property but I'm pretty sure MicroB is closed-source as a property of Nokia. Maybe here's an answer to the sandboxing idea (again, maybe): http://browser.garage.maemo.org/docs/build_howto.html White paper of MicroB showing internal architecture: http://browser.garage.maemo.org/docs/browser_paper.html Lemme know it this helped you. |
Re: Maemo 5 as a vulnerability / "hacking" victim
Quote:
|
Re: Maemo 5 as a vulnerability / "hacking" victim
Quote:
That sucks big time. |
Re: Maemo 5 as a vulnerability / "hacking" victim
Quote:
Developing such piece of software requires years and huge resources. The complexity of that effort is significantly higher than a sum of all source code created by Nokia for 4 devices so far. So they have resorted to using existing product based on MPL licence which is far less restrictive to source closing. They may have done some patches, but the scale of changes is negligible compared to original Gecko. In addition, the company culture dictates rapid releases of new devices, so I can bet they did not spend too much time patching security issues. By following this logic you can expect "Mozilla Engine" to suffer majority of problems identified within original Gecko engine. Sure they can continue to merge with the original project, but this did not happen too often for any of the devices. Once the support has stopped, no new updates have appeared and it is reasanoble to expect that some exploits will work in MicroB |
Re: Maemo 5 as a vulnerability / "hacking" victim
Quote:
|
Re: Maemo 5 as a vulnerability / "hacking" victim
Quote:
I think tls-auth /etc/openvpn/ta.key 1 stands for the dynamic one. So the preshared ta.key file is needed probably for this very reason: Quote:
Quote:
Quote:
PS: MD5 is not recomended due to vulnerabilities and some other problems. |
All times are GMT. The time now is 02:10. |
vBulletin® Version 3.8.8