View Single Post
Posts: 673 | Thanked: 856 times | Joined on Mar 2006
#30
Originally Posted by fasza2 View Post
Does our openvpn client have any known vulnerabilities?(let's assume the server is secure)
You may want to check the openvpn page on that topic. But you can not eliminate the server as a factor.

A lot depends on the actual configuration of vpn server. In addition, there may be weaknesses in implementation as well as cryptography.

In brief:
OpenVPN uses TLS/SSL as transport protocol. When SSL session is established, two sides exchange public keys (certificates). By applying both keys to Diffie-Hellman authentication, the shared secret is computed. This shared secret is the symmetric key that is used for the symmetric cipher to transform the plain text to cipher text at the source, and later to transform the cipher text to plain text at the destination.

Originally Posted by fasza2 View Post
Does HMAC auth apply to client as well as server?
Please be more specific, because I am not sure if you are referring to the session establishment, or later integrity checks, when data are actualy sent?

Originally Posted by fasza2 View Post
Can user/group nobody be set up on client side if server is not *NIX. Would chroot work client side only in the same scenario?
By this you mean chroot-ing the openvpn client itself?

Originally Posted by fasza2 View Post
Is there any way to log keystrokes through a browser in N900?

Sandboxing Maemo's browsers?

Just some questions that I'd love to hear your opinion about.
The posted exploit does not recover username/passwords from within browser. It basically replaces legitimate login page.

The attacker poses as a default router, by producing massive number of arp messages in order to confuse the victim about default gateways actual ARP address.

The attacker itself is configured to forward any incoming traffic to the legitimate router. The sslstrip is used in-between to replace unencrypted HTML login pages, with ones that can be used to log username/passwords.

Once the username/password is recovered, the information is used to create a legitimate session, so victim firmly belives it is secure, since the SSL is established and locker is visible.

Last edited by momcilo; 2011-06-15 at 21:43.
 

The Following User Says Thank You to momcilo For This Useful Post: