Sniffer Hijacks SSL Traffic From Unpatched IPhones 94
CWmike writes "Almost anyone can snoop the secure data traffic of unpatched iPhones and iPads using a recently-revised nine-year-old tool, a researcher said as he urged owners to apply Apple's latest iOS fix. If iOS devices aren't patched, attackers can easily intercept and decrypt secure traffic — the kind guarded by SSL, which is used by banks, e-tailers and other sites — at a public Wi-Fi hotspot, said Chet Wisniewski, a security researcher with Sophos. 'This is a nine-year-old bug that Moxie Marlinspike disclosed in 2002,' Wisniewski told Computerworld on Wednesday. On Monday, Marlinspike released an easier-to-use revision of his long-available 'sslsniff' traffic sniffing tool. 'My mother could actually use this,' he said."
Re:never been used my ass (Score:5, Informative)
You can't check the User Agent without feeding them the fake SSL cert first, since it's in the encrpted data.
You could of course default pass along everything and only act as a man in the middle for https requests from a device that you've already intercepted an HTTP request from to determine it's of the right flavor. But that does make it ever so slightly more difficult.
Re:How can they patch this? (Score:4, Informative)
No, you're thinking of SSLstrip [thoughtcrime.org] which methodically strips HTTPS references. This is a different attack [thoughtcrime.org], where the client accepts certificates signed by any certificate that has a valid chain
3G Owners are SCREWED (Score:5, Informative)
3G owners can't upgrade past 4.2.1. Looks like they are SOL! Thanks Apple!
Re:Breaks Jailbreak (Score:2, Informative)
Jailbreaking does not magically leave your phone wide open for attack.