Viktor 669 Опубликовано Январь 14, 2013 Nokia mobile devices redirect Web requests to Nokia-owned proxy servers where header information including credentials are stored in clear text, putting anything from banking sessions to social media accounts at risk, a researcher claims. India-based researcher Gaurang Pandya, an infrastructure security architect with Unisys Global Services, said Nokia is performing the equivalent of a man-in-the-middle attack on Web traffic from the Nokia browser embedded in the phone. Pandya tested his work on the Nokia Asha 302 handset running the Series 40 operating system Источник Поделиться сообщением Ссылка на сообщение Поделиться на другие сайты
Viktor 669 Опубликовано Январь 15, 2013 Update: Just upgraded my Nokia browser, the version now is 2.3.0.0.48, and as expected there is a change in HTTPS behaviour. There is a good news and a bad news. The good news is with this browser,they are no more doing Man-In-The-Middle attack on HTTPS traffic, which was originally the issue, and the bad news is the traffic is still flowing through their servers. This time they are tunneling HTTPS traffic over HTTP connection to their server. Details are given below.This time again we had browsed https://www.google.com, and found that again DNS requests are sent for Nokia/Ovi servers and this time it was “cloud13.xpress.nokia.com”. Up on receiving DNS reply, a HTTP tunnel is eshtablished between Mobile device and their cloud server and HTTPS traffic is tunneled over that HTTP tunnel. Источник Поделиться сообщением Ссылка на сообщение Поделиться на другие сайты