Educause Security Discussion mailing list archives
Re: Google ps over Androidj ib
From: "Doty, Timothy T." <tdoty () MST EDU>
Date: Tue, 29 Jun 2010 10:50:59 -0500
While this does make evident the access the provider has to your mobile device, what bothers me from a technical security standpoint is that this application had the ability to execute arbitrary code it downloaded from the Internet. In *principle* this should not be possible on the iPhone due to the strict limitation on scripting. The iPhone's security model is one of application review and limited privileges. The Android security model is one of strict sandboxing and user awareness of the general capabilities. Put that simply the Android model may not seem bad, but what it reminds me of was a software application that had "extensive granularity" -- 99 different items to toggle access on. But for the software to work you really had only three sets of permissions: full access to everything, read access to everything or no access at all. In the case of Android, requiring one privilege for an application ("Internet") is sufficient to cover a Trojan that downloads arbitrary code at a future date (when a vulnerability is discovered) to allow rooting of the mobile device. Somehow, it doesn't seem like "Internet" access is a good description for that capability. So a user installs the Trojan and if it was a reasonable application at all they would never question its utility. The researcher in the present case apparently made no serious attempt to create a cover application, but a bad guy would. I see this as an inherent flaw in the "caveat emptor" model espoused by Google. Not only does it put the onus on a user who most likely doesn't understand the issues, but it isn't accurately representing what potential threat an application represents. From the "pass the blame" perspective this isn't an issue and by not reviewing applications Google's process is much smoother (and presumably much quicker) than Apple's. But I don't see how it provides any security. Sure, iPhone applications are updated transparently from a user perspective with no meaningful insight into what the update actually means -- but the updated version has to pass the review process. Does Apple's review process provide any security? I think that is an open question at this time, but at least it's an open question as opposed to the ability of software to automatically and silently download arbitrary code to then execute. Does anyone really think there *won't* be some sort of privilege escalation vulnerability found in Android at some point? The same applies for the iPhone (and I'll point out the SMS bug), but the opportunity to exploit a local vulnerability seems (superficially at least) to be less on the iPhone than with Android. To put it another way, any Android application with the Internet privilege is a potential Trojan downloader. There does not appear to be such a large window with the iPhone. From this it would appear that this *is* a differentiating security factor between Android and iOS. (I'm not suggesting that it is the only or even the most important differentiating factor, but it does appear to me to be a significant security factor in environments with naïve users.) Tim Doty
-----Original Message----- From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of randy marchany Sent: Tuesday, June 29, 2010 9:40 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] Google ps over Androidj ibThe concern raised by this shouldn't stem from the fact that Googleremoved these apps without notice, but rather that your >users may have installed them in the first place and never known the implications (meaning they could be running rootkits without >your knowledge). If Google uses this power to remove applications that have known rootkit behavior, I don't think they'll get much >grief from me. Like most people, I would prefer this power not exist, but I wouldn't consider this particular example an abuse.The concern is that the phone provider has access to ANY file on the smart phone. Has this always been the case? Yep. It's just this article brings this ugly truth to the forefront. This has serious implications in the way we develop mobile/smart phone policies/procedures. If your institution's "sensitive" email/data will be stored on a smart phone (let's face it's a likely scenario) in the form of email attachments, files with passwords (the electronic equivalent of the sticky note), etc. then Google/Apple/Generic has potential access to that data. Yes, there might be license agreements about the Google's procedure for removing data from a smart phone but that process is not clear. I might have a file called "rootkits" on my smart phone device because my job is computer security. I don't want any phone provider to decide for me what should or shouldn't be on my phone. The "security because I know better" model that AV and other "preventive" security model is a reactive strategy and still results in compromises. Removing a suspicious app from their store (Apple store, Google store, etc.) is one thing and I'm in favor of that to some degree. Removing a "suspicious" app from my phone w/o my knowledge/permission/control is a completely different thing.And FWIW, Apple has much more draconian control over their apps, soif control over your device is something you value, then the Android is still a much better choice than an iPhone. I would say the iPhone is a better choice for people who specifically want others to control their experience and environment (including which apps you're allowed to run on your phone).This isn't a "android vs. iphone" conflict. It's a phone manufacturer/service provider vs. end-user/customer thing. This is similar to the "who owns the computer data on your car" conflict where car manufacturers say they own it and the car owner says it's mine. Who owns the data on a smart phone? Who has access to that data? Is end user privacy being "facebooked" by the phone manufacturers? We need to consider these new threats to our institutional data. -Randy Marchany ISO, VA Tech
Attachment:
smime.p7s
Description:
Current thread:
- Google power over Android randy marchany (Jun 28)
- Re: Google power over Android Stanclift, Michael (Jun 28)
- Re: Google power over Android Jones, Dan (Jun 28)
- Re: Google power over Android Charles Seitz (Jun 28)
- Re: Google power over Android Adam Carlson (Jun 28)
- Re: Google ps over Androidj ib Nick Gagliardi (Jun 29)
- Re: Google ps over Androidj ib randy marchany (Jun 29)
- Re: Google ps over Androidj ib Ozzie Paez (Jun 29)
- Re: Google ps over Androidj ib Doty, Timothy T. (Jun 29)
- Re: Google ps over Androidj ib Russell Fulton (Jun 29)
- Re: Google ps over Androidj ib Nick Gagliardi (Jun 29)
- Re: Google power over Android Dexter Caldwell (Jun 29)
- Re: Google power over Android Ozzie Paez (Jun 29)