Software Privdog worse than Superfish

Hanno's Blog

Monday, February 23. 2015

Software Privdog worse than Superfish


Trackbacks

Weblog: siliconangle.com
Tracked: Feb 23, 05:43
Weblog: www.ghacks.net
Tracked: Feb 23, 08:28
Weblog: gigaom.com
Tracked: Feb 23, 15:07
Weblog: www.zdnet.de
Tracked: Feb 23, 17:53
Weblog: the-digital-reader.com
Tracked: Feb 23, 20:16
Weblog: blog.gslin.org
Tracked: Feb 24, 06:34
Weblog: www.itproportal.com
Tracked: Feb 24, 07:32
Weblog: computerrelatedsolutions.wordpress.com
Tracked: Feb 24, 09:04
Weblog: stewilliams.com
Tracked: Feb 24, 12:32
Weblog: itnerd.wordpress.com
Tracked: Feb 24, 14:50
Weblog: threatpost.com
Tracked: Feb 24, 15:50
Weblog: www.kejianet.cn
Tracked: Feb 25, 03:15
So PrivDog wants to protect your privacy - by sending data home in clear text
tl;dr PrivDog will send webpage URLs you surf to a server owned by Adtrust Media. This happened unencrypted in cleartext HTTP. This is true for both the version that is shipped with some Comodo products and the standalone version from the PrivDog webpage.
Weblog: Hanno's blog
Tracked: Feb 25, 23:00
Weblog: www.michiganstandard.com
Tracked: Feb 26, 10:01
Malware Spoofing HTTPS(2月26日,修正・追記あり)
「Lenovo は何をやらかしたのか」から改題し,修正・追記しています。(2月26日)
Weblog: Baldanders.info
Tracked: Feb 26, 12:36
Weblog: threatpost.ru
Tracked: Feb 28, 21:23
Weblog: nakedsecurity.sophos.com
Tracked: Mar 02, 13:04
Weblog: threatpost.com
Tracked: Mar 02, 18:21
Weblog: www.entrust.com
Tracked: Mar 03, 18:16
Weblog: ontechcomputing.wordpress.com
Tracked: Mar 31, 19:17
Weblog: www.entrust.com
Tracked: Apr 06, 15:26
How Kaspersky makes you vulnerable to the FREAK attack and other ways Antivirus software lowers your HTTPS security
Lately a lot of attention has been payed to software like Superfish and Privdog that intercepts TLS connections to be able to manipulate HTTPS traffic. These programs had severe (technically different) vulnerabilities that allowed attacks on HTTPS connect
Weblog: Hanno's blog
Tracked: Apr 26, 19:50
More TLS Man-in-the-Middle failures - Adguard, Privdog again and ProtocolFilter
In February the discovery of a software called Superfish caused widespread attention. Superfish caused a severe security vulnerability by intercepting HTTPS connections with a Man-in-the-Middle-certificate. The certificate and the corresponding private ke
Weblog: Hanno's blog
Tracked: Aug 13, 00:45
Superfish 2.0: Dangerous certificate on Dell laptops breaks encrypted HTTPS-connections
tl;dr Dell laptops come preinstalled with a root certificate and a corresponding private key. That completely compromises the security of encrypted HTTPS connections. I've provided an online check, affected users should delete the certificate. It seems
Weblog: Hanno's blog
Tracked: Nov 23, 17:39

Comments
Display comments as (Linear | Threaded)

"(with some trickery you can do something similar on Superfish/Komodia, too)"

No trickery needed whatsoever. All you need is a WiFi Pineapple with the SSLSplit infusion and this is what bothers me the most. It's quite possible real bad guys have been MitMing Superfish and other products from Komodia or that use Comodia without even trying. For what it's worth, I had the original discovery on what Komodia was doing with the SAN but held off on a full write-up, rather I posted a bit of a heads-up to HN while I worked with the vendor:

https://news.ycombinator.com/item?id=9078536
#1 Patch Eudor (Homepage) on 2015-02-23 02:56 (Reply)
Heh, recently we were looking for ssl certificates and I specifically recommended against comodo because I heard bad things about it. Looks like I was right :D
#2 yetihehe on 2015-02-23 09:53 (Reply)
Many people are using Comodo Firewall, which provides better security than Windows Firewall.
On the late 2014 update(if I remember correctly), Comodo start installing PrivDog to
Comodo Firewall's user computer without notice.

If you're ignoring(or blocking) comodo update(>= v7), you are safe from stupid
dog unless you install it separately.
v6 and older are safe to use.

So, Privdog affects many PCs... more than Lenovo scandal I guess.
Let's see other people yell to comodo developers on the "Comodo Forum"...
#3 Impurist (Homepage) on 2015-02-23 12:15 (Reply)
Also antiviur Avast is doing the same [http://security.stackexchange.com/questions/72535/avast-https-scanning]
#4 deadmail on 2015-02-23 13:56 (Reply)
What Avast is doing is not the same. They generate a cert on every installation and they verify server certs.

I still think this is a bad approach, but it is not as severely broken as Superfish/Privdog. It does for example circumvent HPKP.
#4.1 Hanno (Homepage) on 2015-02-23 13:59 (Reply)
Comodo only 'ships' this service / plugin as part of the Chromium browser, and it's transparent to the user as a plugin - it can be disabled.

It doesn't turn your existing browser into an SSL accepting / root signing certificate troll!

If you use Comodo services, it does not mean you're suddenly susceptible to this attack. I'd air on the side of safety and not use the Comodo Chromium browser though - at least until Comodo release their own response to the threat.
#5 webwolf on 2015-02-23 16:31 (Reply)
I used to use and trust Comodo products. I no longer trust your products because of what I have read about PrivDog [all iterations]
#6 R Crook on 2015-02-23 18:12 (Reply)
bof
I stopped using comodo firewall some years ago.
found it a wonderfull firewall, strong versus attack, efficent user interface, really nice rules regulation and so on.
Then I had to uninstall the old version to install the new.
The uninstall broke my hard disk.
And I don't mean I had to format.
I had to change the hard disk since it burned some clusters.
Now, this was some seven uears ago, I think.
I'm sure they did clean up their uninstaller.
Still I will never use that firewall ever again.
#6.1 lillo on 2015-04-05 01:15 (Reply)
I no longer trust any of Comodo's products. I've used their firewall software on few of my PCs based on recommendation by certain websites. I never liked the software to begin with but thought it was giving me better protection than the built-in windows firewall. I always had a nagging feeling as to how they are making money. Anyway I got rid of their software since some of it's behavior didn't sit well with me. I convinced a couple of my relatives and friends to do the same.
#7 Jules Verne on 2015-02-23 19:09 (Reply)
I remember the time when the internet was pure and clean, in it's virgen like days.
Now it's more like a tramp, that screws you over, takes your money and leaves you with a bad feeling.

Oh, and you keep comming back, of cource.
.-(
#8 But now these days are gone on 2015-03-01 13:30 (Reply)
It's not only Comodo which is practicing that method.
Avast, BitDefender, Kaspersky, ESET, Dr. Web, Symantec -- some vendors that you will notice if you analyze it. Do not point a finger at one but at many.
#9 denamtiod on 2015-03-07 00:55 (Reply)
Scheint so als würde deine Testseite superfish.tlsfun.de nicht mehr richtig funktionieren? Übrigens nebenbei: der HKPK bug in Arch Linux wurde vor wenigen Tagen behoben. Diesen Kommentar gerne löschen bzw. nicht freischalten.
#10 H on 2015-04-07 16:31 (Reply)

Add Comment

E-Mail addresses will not be displayed and will only be used for E-Mail notifications.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

 
 

About

This blog is written by Hanno Böck. Unless noted otherwise, its content is licensed as CC0.

You can find my web page with links to my work as a journalist here.

I am also publishing a newsletter about climate change and decarbonization technologies.

The blog uses the free software Serendipity and is hosted at schokokeks.org.

Hanno on Mastodon | Contact / Imprint | Privacy / Datenschutz