Reply
Thread Tools
Posts: 40 | Thanked: 34 times | Joined on May 2009
#11
so here is the output of nmap to my n800 on a local network.

debsilver:/home/epilido# nmap -v -sS 192.168.1.115

Starting Nmap 4.68 ( http://nmap.org ) at 2009-09-07 18:04 EDT
Initiating ARP Ping Scan at 18:04
Scanning 192.168.1.115 [1 port]
Completed ARP Ping Scan at 18:04, 0.13s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 18:04
Completed Parallel DNS resolution of 1 host. at 18:04, 0.01s elapsed
Initiating SYN Stealth Scan at 18:04
Scanning Nokia-N8xxxxxxx (192.168.1.115) [1715 ports]
Discovered open port 22/tcp on 192.168.1.115
Completed SYN Stealth Scan at 18:05, 3.94s elapsed (1715 total ports)
Host Nokia-N8xxxxxxx (192.168.1.115) appears to be up ... good.
Interesting ports on Nokia-N8xxxxxxx (192.168.1.115):
Not shown: 1714 closed ports
PORT STATE SERVICE
22/tcp open ssh
MAC Address: 00:19:4Fxxxxxxxx (Nokia Danmark A/S)

Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 4.526 seconds
Raw packets sent: 1727 (75.984KB) | Rcvd: 1719 (79.070KB)


I installed ssh. This is by no means an indepth test but i do not find a bunch of open ports.....

The n800 was up and surfing google at the time
Epi
 

The Following 5 Users Say Thank You to epilido For This Useful Post:
Posts: 10 | Thanked: 1 time | Joined on Nov 2005
#12
Originally Posted by blivit View Post
My concern is that the N900 is designed to be always connected and it is a Linux system with all the standard security issues. It probably comes with a default root password with lots of open ports. Are users directed to change the root password? Or do users have to know that to do to protect their device?
Why on earth would an internet tablet (or a pure desktop machine for that matter) have any open ports or any services listening on such ports?!?!
 
brendan's Avatar
Posts: 531 | Thanked: 79 times | Joined on Oct 2006 @ This side of insane, that side of genius
#13
first and foremost, only "server" packages open ports and listen. "client" apps make outbound connections. if you install a server package, and start it, it will listen on the port that package is configured to listen on.

simply because a port is open and an agent is listening does not mean the device is insecure. your alarmist stance is not necessary. not every service is vulnerable to the myriad of issues that other OSes face.

moreover, i believe the iptables firewall is installed, and unless iptables is configured to allow a connection to the server that is listening on any given port, the connection will be rejected/denied based on the iptables policy.

remember, security is based on making the effort/risk cost more than the reward.
__________________
Nokia n800
OS 2008
Pharos iGPS 360-BT
ElmScan 5 BlueTooth
BlackBerry Bold (9000)
AT&T Wireless
 
Posts: 1,213 | Thanked: 356 times | Joined on Jan 2008 @ California and Virginia
#14
IMO, it is easier to "hack" the Palm Pre or the old iPhone (both had/have browser or email exploits) than the internet tablets. Yeah, if you go and stop iptables and change the root password to rootme or something, it might get hacked, but out of the box it is pretty locked down from the outside. If you have physical access to the machine, at least with the n810, its very simple to get root access.
__________________
----------------------------------------------------

www.ezschool.com - The best online educational experience.
 
javispedro's Avatar
Posts: 2,355 | Thanked: 5,249 times | Joined on Jan 2009 @ Barcelona
#15
Again, why iptables (iptables is much more than a firewall, but i'll treat it like one for the sake of this thread)?

There are no open ports!

This would be like trying to put a rock inside a safe (poor analogy ).

And, if I remember correctly, iptables is installed but not configured by default.
 
Posts: 2,802 | Thanked: 4,491 times | Joined on Nov 2007
#16
Originally Posted by epilido View Post
debsilver:/home/epilido# nmap -v -sS 192.168.1.115
This only scans a subset of TCP ports, for a more complete scan you should add "-p1-65535", and repeat for UDP ("-sU"). Alternatively you can use netstat on the device, if you trust that it hasn't already been compromised and a rootkit installed ;-)

On mine it currently says:
Code:
Nokia-N810-43-7:~# netstat -tln
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State
tcp        0      0 0.0.0.0:39500           0.0.0.0:*               LISTEN      
tcp        0      0 127.0.0.1:53            0.0.0.0:*               LISTEN      
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      
Nokia-N810-43-7:~# netstat -uln
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State
udp        0      0 127.0.0.1:53            0.0.0.0:*                           
udp        0      0 0.0.0.0:39400           0.0.0.0:*                           
udp        0      0 0.0.0.0:7275            0.0.0.0:*                           
udp        0      0 0.0.0.0:1900            0.0.0.0:*
  • 53/UDP & 53/TCP are dnsmasq and nothing to worry about since it only listens on loopback.
  • 22/TCP is openssh which of course isn't present in the default install.
  • 1900/UDP is the UPnP Simple Service Discovery Protocol (SSDP).
  • 7275/UDP is opened by /usr/sbin/supllistenerd.
  • 39500/TCP is an XMPP account.
  • 39400/UDP is a SIP account.

From the above list, the scariest one is 7275, since supllistenerd runs as root and it's a closed source component so can't be audited independently. Note that it's not in the default Diablo installation either though (comes from agps-ui).
 

The Following 2 Users Say Thank You to lma For This Useful Post:
benny1967's Avatar
Posts: 3,790 | Thanked: 5,718 times | Joined on Mar 2006 @ Vienna, Austria
#17
There's two questions here:

One is what might be called the "default security level"; for the average consumer, there'll be no root access, no open ports etc. (as far as I know).

The other thing is security on a broader, conceptual level given that this device is also a phone. I can have root access. I can have all sorts of services running and open all ports. I can install software from sources the community here doesn't even know about.
While all of this is my responsibility (and therefore my problem) as far as my own device is concerned, it may cause troubles once some malware interacts with the cellular part.

So: Is there any special security built around the cellular part of the device? Or would it be accessible like anything else and could I, say, run a cron job that calls all of my contacts at 3:40am?
 
HangLoose's Avatar
Posts: 319 | Thanked: 289 times | Joined on Sep 2009 @ Lisboa, Portugal
#18
No UAC?!?
C'mon... Nothing like "The phone wants your permission to get HangLoose's call. To continue type the administrator password."

Tsk, maaan... half the fun is OVER.
 
barry99705's Avatar
Posts: 641 | Thanked: 27 times | Joined on Apr 2007
#19
Originally Posted by HangLoose View Post
No UAC?!?
C'mon... Nothing like "The phone wants your permission to get HangLoose's call. To continue type the administrator password."

Tsk, maaan... half the fun is OVER.
Heh, "Windows has detected a left mouse click, click OK to continue."
__________________
Just because you are online, doesn't mean you don't have to form a full sentence.


SEARCH! It's probably already been answered.
 
HangLoose's Avatar
Posts: 319 | Thanked: 289 times | Joined on Sep 2009 @ Lisboa, Portugal
#20
Originally Posted by barry99705 View Post
Heh, "Windows has detected a left mouse click, click OK to continue."
It would be funny if it would not be so sad :P
 
Reply


 
Forum Jump


All times are GMT. The time now is 21:32.