The Following User Says Thank You to fasza2 For This Useful Post: | ||
![]() |
2011-06-16
, 07:04
|
Posts: 673 |
Thanked: 856 times |
Joined on Mar 2006
|
#32
|
I meant kind of meant both, but more of the latter; does HMAC auth protect the client from DoS and portscan by dropping non-authenticated packets before processing?
Yes exactly, to create a chroot jain in case server or another client get compromised. Is it possible client side only assuming server is a win box?
![]() |
2011-06-16
, 13:51
|
|
Posts: 187 |
Thanked: 96 times |
Joined on Sep 2010
@ London, UK
|
#33
|
I would not go for static key mode, since in this case the same keys are reused on each connection.
It is better to use SSL based mode, SSL itself enforces the generation of shared secret each time. Thus created secure channel is used to exchange the keying material which is used to dynamically generate shared secrets.
The possible intrusion vector may be the built-in browser. I don't know which version of Gecko is used, but I am pretty sure the there were severe problems with firefox pre-3.6 versions.
![]() |
2011-06-16
, 14:28
|
Posts: 673 |
Thanked: 856 times |
Joined on Mar 2006
|
#34
|
Using tls-auth requires that you generate a shared-secret key that is used in addition to the standard RSA certificate/key:
openvpn --genkey --secret ta.key'
In static-key encryption mode, the HMAC key is included in the key file generated by --genkey. In TLS mode, the HMAC key is dynamically
generated and shared between peers via the TLS control channel. If OpenVPN receives a packet with a bad HMAC it will drop the packet.
HMAC usually adds 16 or 20 bytes per packet. Set alg=none to disable authentication.
The Following User Says Thank You to momcilo For This Useful Post: | ||
![]() |
2011-06-16
, 15:16
|
Posts: 135 |
Thanked: 75 times |
Joined on Apr 2011
@ Buenos Aires, Argentina
|
#35
|
That I am also worried about and we are not likely to recive any security updates for MicroB, unless in CSSU. I don't even know wether MicroB is open. It would be a good thing if some of our 'seasoned' members looked into this.
Probably the weakest link as there is no way we can apply updates to that.
.
![]() |
2011-06-16
, 18:21
|
Posts: 673 |
Thanked: 856 times |
Joined on Mar 2006
|
#36
|
Wow. This is getting very interesting. Thanks good Sirs.
Nokia didn't specify about MicroB property but I'm pretty sure MicroB is closed-source as a property of Nokia.
Maybe here's an answer to the sandboxing idea (again, maybe):
http://browser.garage.maemo.org/docs/build_howto.html
White paper of MicroB showing internal architecture:
http://browser.garage.maemo.org/docs/browser_paper.html
Lemme know it this helped you.
![]() |
2011-06-16
, 19:07
|
Posts: 135 |
Thanked: 75 times |
Joined on Apr 2011
@ Buenos Aires, Argentina
|
#37
|
The Following User Says Thank You to sr00t For This Useful Post: | ||
![]() |
2011-06-16
, 19:22
|
Posts: 673 |
Thanked: 856 times |
Joined on Mar 2006
|
#38
|
Yeah I know that part, but as being a 'fork' of Firefox it has a lot of source tweaks that appear to be closed. I didn't see microb source code available anywhere. Even if it's based in the same engine, the rest of it's a part of Maemo's closed source parts.
That sucks big time.
![]() |
2011-06-16
, 19:41
|
Posts: 135 |
Thanked: 75 times |
Joined on Apr 2011
@ Buenos Aires, Argentina
|
#39
|
I don't know about the facts at the moment. But consider this: they wanted to use gecko in order to have a device with good and stable browser.
Developing such piece of software requires years and huge resources. The complexity of that effort is significantly higher than a sum of all source code created by Nokia for 4 devices so far.
So they have resorted to using existing product based on MPL licence which is far less restrictive to source closing. They may have done some patches, but the scale of changes is negligible compared to original Gecko.
In addition, the company culture dictates rapid releases of new devices, so I can bet they did not spend too much time patching security issues.
By following this logic you can expect "Mozilla Engine" to suffer majority of problems identified within original Gecko engine.
Sure they can continue to merge with the original project, but this did not happen too often for any of the devices. Once the support has stopped, no new updates have appeared and it is reasanoble to expect that some exploits will work in MicroB
![]() |
2011-06-16
, 21:05
|
|
Posts: 187 |
Thanked: 96 times |
Joined on Sep 2010
@ London, UK
|
#40
|
In short, this is used for static keys when used with UDP. For dynamic (TLS based) you do not need it.
My guess is that the shared secret is used to feed IV of hash function (MD5, SHA1, SHA224, SHA256, SHA384, SHA512), although I would have to inspect source code to see what is actually going on.
Instead of putting SHA1 to the outer package, I would prefer to keep it together with plain-source, than encrypt everything together. That would provide more security.
The drawback to this approach is the need to decrypt each packet, than calculate SHA1 to detect the "faulty" packet.
Thx for responding btw