kuketzblog, to android German
@kuketzblog@social.tchncs.de avatar

Meine Beobachtungen zeigen, dass Certificate-Pinning bei Apps nicht immer als Schutzmechanismus eingesetzt wird, sondern häufig dazu dient, rechtlich fragwürdige Praktiken und (kalkulierte) Datenschutzverstöße zu verschleiern. Auszug aus dem demnächst erscheinenden Artikel »In den Datenstrom eintauchen: Ein Werkzeugkasten für Tester von Android-Apps«.

meisterdieb,
@meisterdieb@norden.social avatar

@kuketzblog Nur für Verständnis: Was meinst du mit Certificate Pinning? Bei HTTP(S) ist diese Praxis aus vielerlei Gründen obsolet, hauptsächlich aber weil die Praxis mehr Probleme verursacht als sie löst. Gibt es da bei Apps noch andere Arten des Pinnings oder meinst du hier das gleiche?

kuketzblog,
@kuketzblog@social.tchncs.de avatar

@meisterdieb https://de.m.wikipedia.org/wiki/HTTP_Public_Key_Pinning

Aber nicht nur. Manchmal stößt man auch auf Apps, die mit Flutter gebaut sind. Flutter verwendet Dart, das nicht den System-CA-Speicher verwendet.

slink, to random
@slink@fosstodon.org avatar
scott, to security
@scott@tams.tech avatar

So I think my partner @owen is experiencing a @signalapp #MitM attack... I suspect on the part of the phone manufacturer, #Unihertz

How can I...I don't know, prove this? Fix it?

Here's what I did so far to troubleshoot:

  • @owen received a new phone, a Unihertz Atom L, and switched his Signal over to it. As I try to make a habit of, I called him over to verify our "security number". The check failed. The first sign of trouble.

1/3

#security #privacy #cyberSecurity #Android #vulnerability

jimsalter,
@jimsalter@fosstodon.org avatar

@scott @grimmy @GossiTheDog @owen @signalapp @JoeRess @pluralistic assuming you're following my advice and using opnSense rather than just trying to do tcpdump from the CLI on a random *nix box:

https://docs.opnsense.org/manual/diagnostics_interfaces.html

grimmy,
@grimmy@mastodon.social avatar

@jimsalter @scott @GossiTheDog @owen @signalapp @JoeRess @pluralistic If you're just going to use TCP dump, you'll just want to tell it the correct network interface to capture and then after you have the capture you can filter it down and investigate in wireshark.

HonkHase, to random German
@HonkHase@chaos.social avatar

#EIDAS 2.0: EU-Regulierung könnte #staatliche HTTPS-#MITM ermöglichen

"Die EU will Browser zur Nutzung möglicherweise unsicherer staatlicher Zertifikate zwingen. Sicherheitsexperten befürchten #Spionagemöglichkeiten."
https://www.golem.de/news/eidas-2-0-eu-regulierung-koennte-staatliche-https-mitm-ermoeglichen-2311-179225.html

larsmb,
@larsmb@mastodon.online avatar

@HonkHase Was heißt "könnte", das ist doch ganz offensichtlich das reale Hauptziel des Vorstoßes?

RTP, to news
@RTP@fosstodon.org avatar
madargon, to announcement
@madargon@is-a.cat avatar

It's official #announcement :blobcatbolbscream:​

No, I am NOT doing #MITM.

I am too busy being a #cat on fedi :blobcatadorablepink:​

jabberati, to random
@jabberati@social.anoxinon.de avatar

Mitigating the Hetzner/Linode XMPP.ru MitM interception incident, part 2: XMPP-specific mitigations

https://www.devever.net/~hl/xmpp-incident-2

#xmpp #mitm #tls

xmpp, (edited ) to security
@xmpp@fosstodon.org avatar

Announcement

Recently there was an incident via a so called attack happened to an .

To reduce the risk of such attacks in the future an early stage service called CertWatch has been published by our Community: https://certwatch.xmpp.net/

Many thanks to Stephen P. Weber (@singpolyma)!

Read two related blog posts:
http://blog.jmp.chat/b/certwatch/certwatch

https://snikket.org/blog/on-the-jabber-ru-mitm/

RyunoKi,
@RyunoKi@layer8.space avatar

@xmpp @singpolyma An alternative form of MitM is Manipulator-in-the-middle.

I prefer it as it is (1) more accurate and (2) less focused on a gender („man“ being ambiguous in English here).

jabberati, to random
@jabberati@social.anoxinon.de avatar

Machine-in-the-middle Detection and Monitoring for #XMPP Servers

https://certwatch.xmpp.net/

This service allows you to check your XMPP server's #TLS setup, helps you publicly store the hash of the public key in a secure way, and then monitors your server to make sure that connections to it get the same public key that you have configured and sends notifications if anything changes (which may indicate a #mitm attack on your service).

wolf480pl,
@wolf480pl@mstdn.io avatar

@feld @jabberati
XMPP uses starttls.

IOW, you open an XMPP connection, signal in an XMPP-specific way that you want to use TLS, the server confirms it, and only then you run a TLS handshake.

wolf480pl,
@wolf480pl@mstdn.io avatar

@jabberati @feld
they attacker could try send valid XMPP stanzas unencrypted, together with the starttls and a buggy server may interpret them as part of the encrypted and authenticated connection after starttls.

If a server has a bug like that, an attacker in a MITM position can inject stanzas into client's session without actually MITMing the TLS.

this blog has an example for SMTP:

https://blog.apnic.net/2021/11/18/vulnerabilities-show-why-starttls-should-be-avoided-if-possible/
(haven't read the whole blog post, only the example SMTP exchange)

slink, to Amazon German
@slink@fosstodon.org avatar

#okta http://blog.fefe.de/?ts=9bcd85f0 #phizer http://blog.fefe.de/?ts=9bcc0e4b #amazon http://blog.fefe.de/?ts=9bcc02f4 #mitm http://blog.fefe.de/?ts=9bcc63d0 - #fefe lesen lohnt sich heute mal wieder besonders. setzt euch lieber auf den boden, damit ihr nicht vom stuhl fallt. oder meinetwegen aufs klo

scy, (edited ) to Germany
@scy@chaos.social avatar

Interesting. Apparently, both #Hetzner's and #Linode's German datacenters were used to #MitM connections to jabber.ru servers hosted there. There's a detailed postmortem here:
https://notes.valdikss.org.ru/jabber.ru-mitm/

I'd take these allegations with a grain of salt. But I must say that MitM'ing with a #LetsEncrypt certificate and then forgetting to renew it, leading to discovery, sounds like the most German law enforcement thing ever.

via https://devco.social/@ripienaar/111268338360338392

#Germany #Russia #jabberRU #jabber_ru

scy,
@scy@chaos.social avatar

@matthegap Hm. Valid point actually.

scy,
@scy@chaos.social avatar

A very good (but also pretty long) post on how this attack could have possibly been detected and probably been mitigated:
https://www.devever.net/~hl/xmpp-incident

via https://chaos.social/@lasagne/111273031750419721

#Hetzner #Linode #MitM

ge0rg, (edited ) to random
@ge0rg@chaos.social avatar

Detailed and credible looking report of on an server hosted at in Germany: https://notes.valdikss.org.ru/jabber.ru-mitm/

Looks like a transparent bridge was deployed in front of the actual server, obtained dedicated certificates from and MitMed all incoming client connections since July. It was discovered because the LE certificate expired 🤦

juliank,
@juliank@mastodon.social avatar

@ge0rg This is disturbing and could easily be fixed on the letsencrypt side by requiring a challenge from the client that initiates the dv, for example:

On first DV, submit TOTP secret to client, client then sends a TOTP each time it does a new request for the same domain.

But I suppose Let's Encrypt may as well be a Trojan horse whose hidden agenda is to turn end to end encryption into end to edge encryption.

ge0rg,
@ge0rg@chaos.social avatar

@juliank
The weak point of TOTP is recovery after token loss. You don't want your domain burned forever with LE, and LE doesn't know anything about you for any reasonable manual recovery process. And if they did, it could still be gamed.

The CAA with accounturi approach I linked earlier in the thread is a good trade off, that just nobody knows about.

BishopFox, to random

FinServ orgs prioritize #cloud vulnerabilities as their top cyber #threat driving #offensivesecurity investments (45%), followed by preventing #DDoS attacks (36%) and #MiTM attacks (28%). Get more insight into #offsec as it pertains to #financialservices in our report with the #PonemonInstitute.

https://bfx.social/46Tzo9G

ankit_anubhav, to Cybersecurity

Box.com hosting a page which goes to Cloudflare protected #MITM / #AITM #phishing

As usual, the whole trust on corporate URLs is going down big time. I have seen abuses on Microsoft,LinkedIn,Notion,Box and Zoho in a matter of couple of days.

#Cybersecurity #Infosec

hxxps[://]app[.]box[.]com/s/dzgbby3z63ofzqiunq749m9hfiv5qp3g

ankit_anubhav, to Cybersecurity

#AITM #MITM phishing hosted on notion. If you have kept notion in some whitelist do reconsider.

hxxps[://]vigorous-harbor-449[.]notion[.]site/CONFIDENTIAL-DOCUMENT-b6e34d5a4532410598073a639f23fec3

#phishing #cybersecurity #infosec

cc @da_667 @GossiTheDog

image/png

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • everett
  • magazineikmin
  • mdbf
  • thenastyranch
  • khanakhh
  • rosin
  • Youngstown
  • ethstaker
  • slotface
  • modclub
  • kavyap
  • DreamBathrooms
  • Durango
  • provamag3
  • ngwrru68w68
  • InstantRegret
  • tacticalgear
  • GTA5RPClips
  • cubers
  • normalnudes
  • osvaldo12
  • tester
  • anitta
  • cisconetworking
  • megavids
  • Leos
  • lostlight
  • All magazines