Перейти к содержанию
Viktor

Nokia HTTPs Traffic Proxied, Data Stored in Clear Text

Recommended Posts

Viktor
Nokia mobile devices redirect Web requests to Nokia-owned proxy servers where header information including credentials are stored in clear text, putting anything from banking sessions to social media accounts at risk, a researcher claims. India-based researcher Gaurang Pandya, an infrastructure security architect with Unisys Global Services, said Nokia is performing the equivalent of a man-in-the-middle attack on Web traffic from the Nokia browser embedded in the phone. Pandya tested his work on the Nokia Asha 302 handset running the Series 40 operating system

Источник

Поделиться сообщением


Ссылка на сообщение
Поделиться на другие сайты
Viktor

Update:

Just upgraded my Nokia browser, the version now is 2.3.0.0.48, and as expected there is a change in HTTPS behaviour. There is a good news and a bad news. The good news is with this browser,they are no more doing Man-In-The-Middle attack on HTTPS traffic, which was originally the issue, and the bad news is the traffic is still flowing through their servers. This time they are tunneling HTTPS traffic over HTTP connection to their server. Details are given below.

This time again we had browsed https://www.google.com, and found that again DNS requests are sent for Nokia/Ovi servers and this time it was “cloud13.xpress.nokia.com”. Up on receiving DNS reply, a HTTP tunnel is eshtablished between Mobile device and their cloud server and HTTPS traffic is tunneled over that HTTP tunnel.

Источник

Поделиться сообщением


Ссылка на сообщение
Поделиться на другие сайты

×