Readit News logoReadit News
alexw91 commented on Platform certificates used to sign malware   bugs.chromium.org/p/apvi/... · Posted by u/arkadiyt
MishaalRahman · 3 years ago
If you're speaking from the perspective of an enterprise making recommendations, yes that'd be an option. As a user, though, you could just avoid sideloading.
alexw91 · 3 years ago
Just trying to think if there are any other potential immediate recommendations for non-technical friends and family with Android phones from these vendors other than "don't sideload any apps" and "make sure to install any security updates as soon as they're available".
alexw91 commented on Platform certificates used to sign malware   bugs.chromium.org/p/apvi/... · Posted by u/arkadiyt
MishaalRahman · 3 years ago
There seems to be some confusion about this, so I'll just copy/paste what I wrote on Twitter:

>Folks, this is bad. Very, very bad. Hackers and/or malicious insiders have leaked the platform certificates of several vendors. These are used to sign system apps on Android builds, including the "android" app itself. These certs are being used to sign malicious Android apps!

>Why is that a problem? Well, it lets malicious apps opt into Android's shared user ID mechanism and run with the same highly privileged user ID as "android" - android.uid.system. Basically, they have the same authority/level of access as the Android OS process!

>Here's a short summary of [shared UID](https://blog.esper.io/android-13-deep-dive/#shared_uid_migra...), from my Android 13 deep dive.

>The post on the Android Partner Vulnerability Initiative issue tracker shared SHA256 hashes of the platform signing certificates and correctly signed malware using those certificates. Thanks to sites like VirusTotal and APKMirror, it's trivial to see who is affected...

>So, for example, this malware sample: https://virustotal.com/gui/file/b1f191b1ee463679c7c2fa7db5a2...

>scroll down to the certificate subject/issuer, and whose name do you see? The biggest Android OEM on the planet? Yeah, yikes.

>Go to APKMirror and just search for the SHA256 hash of the corresponding platform signing certificate... https://apkmirror.com/?post_type=app_release&searchtype=apk&...

>Yeah, this certificate is still being used to sign apps.

>That's just one example. [There are others at risk, too.](https://twitter.com/mszustak/status/1598406354464829440)

>In any case, Google recommends that affected parties should rotate the platform certificate, conduct an investigation into how this leak happened, and minimize the number of apps signed with the platform certificate, so that future leaks won't be as devastating.

>Okay, so what are the immediate implications/takeaways for users?

>- You can't trust that an app has been signed by the legitimate vendor/OEM if their platform certificate was leaked. Do not sideload those apps from third-party sites/outside of Google Play or trusted OEM store.

>- This may affect updates to apps that are delivered through app stores if the OEM rotates the signing key, depending on whether or not that app has a V3 signature or not. V3 signature scheme supports key rotation, older schemes do not.

>OEMs are not required to sign system apps with V3 signatures. The minimum signature scheme version for apps targeting API level 30+ on the system partition is V2. You can check the signature scheme using the apksigner tool: https://developer.android.com/studio/command-line/apksigner

>Affected OEMs can still rotate the cert used to sign their system apps that have V2 signatures and then push an OTA update to deliver the updated apps. Then they can push app updates with that new cert, but devices that haven't received OTAs won't receive those app updates.

alexw91 · 3 years ago
Any idea if signing up for Google's Advanced Protection program would mitigate/prevent potential attacks from this security issue?

My understanding is that signing up for this program blocks the usual methods of installing sideloaded apps (you can't install an app's apk file from your phone's local storage), and instead requires you to physically connect your Android phone to an external computer and use the adb CLI tool to sideload apps that are not on the Google Play store.

https://landing.google.com/advancedprotection/

alexw91 commented on OpenSSL security advisory: Infinite loop reachable when parsing certificates   openssl.org/news/secadv/2... · Posted by u/psanford
lmilcin · 4 years ago
> This vulnerability affects parsing maliciously crafted certificates, so it will mostly affect clients.

Actually, it is the opposite.

You seem to be unaware of the fact that servers do receive certificates from the clients which are then parsed.

Which is already mentioned in the advisory document:

  "Thus vulnerable situations include:

   - TLS clients consuming server certificates
   - TLS servers consuming client certificates <---- here
   - Hosting providers taking certificates or private keys from customers
   - Certificate authorities parsing certification requests from subscribers
   - Anything else which parses ASN.1 elliptic curve parameters"

alexw91 · 4 years ago
That's not how the TLS handshake works. The TLS server must be configured to request a certificate from the client in order for the client to know that it needs to send a client certificate to the server, and that server-side configuration is disabled for ~99%+ of endpoints.

TLS server implementations should be aborting the TLS connection for violating the TLS Handshake state machine if a client attempts to send a client certificate when it wasn't requested.

So while this bug affects both clients and servers, 100% of clients are parsing the server's TLS cert during the TLS handshake, but less than ~1% of servers are parsing a client's certificate during a handshake.

alexw91 commented on Facebook loses users for the first time   washingtonpost.com/techno... · Posted by u/lxm
giansegato · 4 years ago
> FB have never built a successful product besides Zuck's original.

Can we argue the same point for Google?

Considering their dominant position in digital ads, I wonder what this implies.

alexw91 commented on Factoring 2048 RSA integers in 177 days with 13436 qubits and a multimode memory   arxiv.org/abs/2103.06159... · Posted by u/athul7744
sushisource · 5 years ago
Obviously this isn't the strongest argument in the world, but, if the whole field is so bullshit why has anyone bothered putting effort into post-quantum encryption? What's the point if quantum computers will never materialize?
alexw91 · 5 years ago
It's theoretically possible for someone to record encrypted traffic today, keep a copy of it for a decade or two until quantum computers are available, and then decrypt it in the future using the quantum computer. If you have data today, that needs to be secure for more than a few decades, you may want to move to post quantum crypto soon to stop that potential leak.

u/alexw91

KarmaCake day9February 24, 2017
About
Alex Weibel Senior Software Engineer at AWS Cryptography
View Original