• 2 Posts
  • 1.51K Comments
Joined 3 years ago
cake
Cake day: June 16th, 2023

help-circle

  • Yeah I have a dedicated IoT wifi network for those types of random devices. They are isolated, so any device on that particular network cant talk to any other device. If they must communicate with each other, I will set up firewall rules between the two, but wont let them access anything else on the network.

    If they need internet access, you can rate limit their speed to like 1kb/s and set their dns resolver to a pi hole to keep tabs on where they are phoning home to and block accordingly.

    If you can configure that devices TTL, set it low to like 4 or 5, and increase by 1 if its having trouble reaching the necessary destination. Also, block access to outside countries, as you probably aren’t needing remote management from the foreign motherlands.










  • the part that we’re arguing against isn’t that a microsoft signing key would have fixed the problem, it’s

    I didn’t say a Microsoft signing key is required. Im saying Microsoft requires that you go out and obtain a signed certificate that proves your identity as a developer.

    this update mechanism already exists: it’s the reason the hijack was possible. whatever the technical process behind the scenes is irrelevant… that is how it currently works; it’s not a “what if”

    The update mechanism was successful hijacked because integrity checks and authentication checks were not properly in place. Notepad++ even said that they moved hosting providers after this happened to them.

    Per https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/

    adding signing into that existing process without any 3rd party involvement is both free, and very very easy

    Can you point out an existing open source application that runs on Windows that only uses GPG signatures?




  • The gpg sig method works great on other operating systems that aren’t Windows or MacOS, but Windows and MacOS do not use that method to verify the authenticity of developer’s certificates.

    The update mechanism works fine, but you will not be able to execute the binary on a Windows or MacOS system. The OS will not allow it to run without it being signed.

    The malicious actor would not be able to drag and drop their malware in without the Notepad++ certificate. The signature wouldn’t match.

    The certificate is not only doing authentication of the developer, but it is also doubling as an integrity check to make sure the code hasn’t been modified.