|
View Poll Results: Should we post everything we know even if iRex can circumvent us again? | |||
Yes, the more we know, the stronger we get. |
![]() ![]() ![]() ![]() |
29 | 96.67% |
No, keep it closed and use it to gain broader knowledge first. |
![]() ![]() ![]() ![]() |
1 | 3.33% |
Voters: 30. You may not vote on this poll |
![]() |
|
Thread Tools | Search this Thread |
![]() |
#1 |
Uebermensch
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,583
Karma: 1094606
Join Date: Jul 2003
Location: Italy
Device: Kindle
|
Should we post everything we know even if iRex can circumvent us again?
I want to report here how you can actually communicate with the iDS server without the iLiad.
My only worry: giving out this information might make iRex try everything possible again to sabotage our newly gained knowledge. So what do you think we should do? --> It's a poll! |
![]() |
![]() |
![]() |
#2 |
Reborn Paper User
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,616
Karma: 15446734
Join Date: May 2006
Location: Que Nada
Device: iPhone8, iPad Air
|
Please be responsible.
![]() Advise Irex and leave it be... |
![]() |
![]() |
![]() |
#3 |
Fulfilled but not by iRex
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 932
Karma: 286846
Join Date: May 2006
Location: London
Device: Far too many
|
I agree with Yvanletterrible. I feel it's better that we are upfront in whats being done, than make it look like we are trying to hide things from them.
|
![]() |
![]() |
![]() |
#4 |
Reborn Paper User
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,616
Karma: 15446734
Join Date: May 2006
Location: Que Nada
Device: iPhone8, iPad Air
|
Better yet, find a way to secure the process and tell Irex.
You'll have a big place in our hearts ! ![]() Last edited by yvanleterrible; 08-23-2006 at 11:10 AM. |
![]() |
![]() |
![]() |
#5 |
Uebermensch
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,583
Karma: 1094606
Join Date: Jul 2003
Location: Italy
Device: Kindle
|
It's not really insecure in the way that your data could be compromised, since you'd still need your username and password to access individual information. But one thing you could do with it is, for instance, to download firmware upgrades to your PC.
|
![]() |
![]() |
![]() |
#6 |
Addict
![]() ![]() Posts: 261
Karma: 156
Join Date: Jul 2006
Device: iliad
|
Well, i think full disclosure makes it a fair game. And, in the end, we don't want to work against them, we'd just like to do, well, whatever we feel like doing, on this really sweet piece of hardware. (and without paying 75€ for every mistake - even if this makes it way more exciting)
But, on the other hand, if iRex doesn't play by the GPL rules, i don't see a reason why we should. ![]() What do you think about offering the non-disclosure against a reflash tool? Or a description how the engineers do it? Or just the information how you can boot it over ethernet? Hacking iDS isn't really something we should be interested in. |
![]() |
![]() |
![]() |
#7 | |
Uebermensch
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,583
Karma: 1094606
Join Date: Jul 2003
Location: Italy
Device: Kindle
|
Quote:
But if iDS is not interesting to us, I won't make the effort to describe further what I've discovered so far. And definitely no hard feelings ![]() |
|
![]() |
![]() |
![]() |
#8 | |
Addict
![]() ![]() Posts: 222
Karma: 110
Join Date: Jun 2006
Location: Malmo, Sweden
Device: iLiad, Sony PRS-505, Kindle Paperwhite & Oasis
|
Quote:
responsible vulnerability disclosure, which you can find on the net.. |
|
![]() |
![]() |
![]() |
#9 |
Unicoder
![]() Posts: 15
Karma: 10
Join Date: Aug 2006
Location: Sassuolo, Modena, Italy
Device: iRex iLiad
|
I don’t think it’s a security problem at all, as long as the username and password are not sent in the clear via the wireless connection. The iLiad must be simply opening some kind of data connection (FTP, scp, rsync?) to the iRex servers with your username and password, and the address of that FTP server must be hardcoded somewhere in the flashed-system of the iLiad.
TadW: I’m for full disclosure in this case, it doesn’t look like a very secret thing to hide, anyway. (BTW: hello, everyone, this is my first post on the MobileRead forum! I just got my iLiad yesterday and I love it!) |
![]() |
![]() |
![]() |
#10 | |
Member
![]() Posts: 20
Karma: 35
Join Date: Jul 2006
Device: iRex iLiad
|
Quote:
Last edited by Janus; 08-24-2006 at 03:32 AM. |
|
![]() |
![]() |
![]() |
#11 | |
Addict
![]() ![]() Posts: 222
Karma: 110
Join Date: Jun 2006
Location: Malmo, Sweden
Device: iLiad, Sony PRS-505, Kindle Paperwhite & Oasis
|
Quote:
If any of these parties would find that the information could be damaging in any way, it is a security problem, and disclosure should be kept to a minimum, at least until the problem has been verified to be imaginary, or, in other cases, corrected. A IDS login method, may, for instance, make it possible to do user and password guessing attacks. A well designed system would handle such things but I've seen too many ill-designed systems to believe in miracles. Could such an attack lock me out from receiving updates? If so, it's a security problem. There may also be protocol problems that may appear once a successful authentication has been done: publishing details may give greater exposure to such problems, and raise the risk for the data on the IDS system. If I wanted to prevent a security patch from reaching the iLiads out there, the IDS system is the system I would attack. Same thing if I wanted to send out my own content. If, by use of the information, the iLiad can be fooled into logging into a fake IDS server, it's still a security problem: iLiads should not accept unauthorized contents from the net -- it's probably a signature and certificate that's not being verified correctly. Could I attack a router or a DNS server, and inject false information (either route requests to the wrong server, or translate a domain name to the wrong IP address), I can attack all iLiads using that DNS server. Again, a security problem that is not under iRex's control, and usually is regarded as one of the main reasons for verifying signatures of downloaded system software. iRex is the primary interested part in this question: they should be told first, and in the form generally accepted as part of responsible disclosure. Anything else is simply irresponsible, as security ramifications seldom are obvious outside the main parties involved. |
|
![]() |
![]() |
![]() |
#12 |
Uebermensch
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,583
Karma: 1094606
Join Date: Jul 2003
Location: Italy
Device: Kindle
|
Please let me repeat: What I know is not a security problem, but it is the basic pattern how the iLiad communicates with the iDS server.
I would basically describe the protocol used. Think about all the Yahoo! IM chat clones out there. Are they a security threat to Yahoo? No. But they use the underlying Yahoo! IM protocol to establish connections through the Yahoo network. As ath pointed out, some people might start digging around the protocol to find possible security holes and exploits. But this is always the case when information is revealed. As soon as iRex will release the iLiad SDK and the source files, new information is out, and likewise people will examine these files for possible exploits. I don't see a reason to talk to the iRex guys, because it's nothing new to them - they should know best how the protocol works, and I have nothing else to add to it. Last edited by TadW; 08-24-2006 at 04:06 AM. |
![]() |
![]() |
![]() |
#13 |
Fully Converged
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 18,171
Karma: 14021202
Join Date: Oct 2002
Location: Switzerland
Device: Too many to count here.
|
Also look at our recent announcement regarding iRex to open up the specs for iDS.
|
![]() |
![]() |
![]() |
#14 | |
Addict
![]() ![]() Posts: 222
Karma: 110
Join Date: Jun 2006
Location: Malmo, Sweden
Device: iLiad, Sony PRS-505, Kindle Paperwhite & Oasis
|
Quote:
I passed my general concern on to iRex, and learned that they have no problems sleeping at nights over this; that extra piece of information makes the question a non-issue for me. I learned, as Alexander just has pointed out, they will release the information themselves, along with the SDK, reasonably soon. I underestimated iRex :-) -- I have no problems with that: then, I hate to learn that I overestimated anyone on a security matter. Last edited by ath; 08-24-2006 at 05:37 AM. |
|
![]() |
![]() |
![]() |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Sell iREX DR 1000S + iREX Flip book cover (and ZeroShock sleeve). | Uthred | Flea Market | 7 | 05-23-2010 07:28 AM |
IREX DR800SG 2.0 Beta feedback to IREX | sordie | iRex | 25 | 04-12-2010 04:19 PM |
do the softwares work on iRex Digital Reader as they do on iRex iLiad | HiSoC8Y | iRex | 1 | 07-02-2009 10:03 AM |
Easiest drm to circumvent | echoleaf | Workshop | 23 | 02-08-2009 10:58 PM |
iRex Digital Reader: Going to receive a review unit - post your questions | Adam B. | iRex | 80 | 10-18-2008 02:28 AM |