caldav client vulnerable to SSL MITM attack
Using sslsniff/sslsplit it is possible to mount an SSL MITM attack using a self-signed, untrusted certificate to intercept traffic generated by a caldav account configured on a jolla device. This attack works against newly configured and existing caldav accounts using an https connection.
It has already been publicly noted that self-signed certificates "just work" so I consider this issue publicly known.
Tested on Sailfish OS 1.1.1.27 Vaarainjärvi.
Could you please elaborate whether every https-calDAV connection is vulnerable to MITM (so also regular server cert and then a self-signed cert as MITM) or whether this vector is only usable when the server uses a self-signed certificates itself?
sidv ( 2015-01-03 17:28:05 +0200 )editI've set up my caldav account before trying any MITM attacks so it should have been set up with the valid cert. While playing around with sslsniff I was asked to re-enter my password; maybe that changed some invisible setting regarding untrusted certs.
That said, this doesn't happen with mail accounts. Those correctly throw a "Certificate issue" error and don't send traffic when under attack. Unless proven otherwise assume that any caldav account is vulnerable.
Bluewind ( 2015-01-03 18:01:14 +0200 )edit@Bluewind thanks a lot for the clarification. This is indeed a freaking severe issue. I fear CardDAV may be just as affected. I hope we get a hotfix for this...
sidv ( 2015-01-03 19:44:26 +0200 )edit@sidv From a quick look at the code, CardDAV should not be affected. If you test it, please update and let us know.
I agree about the severity. I'll push to get this fixed quickly.
jbrooks ( 2015-01-03 23:35:10 +0200 )edit