Settings

Theme

The UDID leak is a privacy catastrophe

corte.si

119 points by gnufs 14 years ago · 51 comments

Reader

wamatt 14 years ago

After reading this, I'm still a bit confused as to why this is a catastrophe?

Should we change our paypal passwords? Or worry about getting more spam? etc Why should an end user (eg my mom) care?

I'm not saying there aren't serious repercussions, just having a hard time seeing exactly what they are.

  • cortesi 14 years ago

    Have a quick read through the posts linked in the article this story points to. I show that using just a UDID, you could access the user's geolocation, games they played, private messages and friends lists on many of the affected social networks, and in some cases (which affected millions of users) completely take over Twitter and Facebook accounts. This is with _just_ a UDID. Some of the companies I notified a year ago are still vulnerable today. And remember, I only looked at social gaming networks - small slice of the app ecosystem. I know that there are similar systemic issues in many other places. So yes, this is definitely a catastrophe.

    Unfortunately, there's just not much an ordinary user can do. There's no way for a user to tell if an app accesses and broadcasts their UDID (if you're an expert you can use mitmproxy or a similar tool), and certainly no way to tell if the UDID is being used safely. I would recommend de-linking your social media accounts from all apps unless you know they're safe, but that's the kind of drastic advice that people tend not to take.

    • wamatt 14 years ago

      Thanks for that. Not super worried about people knowing my location or games I played :p

      However, this is of interest:

      >and in some cases (which affected millions of users) completely take over Twitter and Facebook accounts

      How is that possible? Are we going to see mass defacements/malware links or other bad stuff on Twitter and Facebook as a result?

      Also what is meant by 'take over'? Surely it doesn't mean from a UDID alone, a hacker could log into that associated account with full permissions?

      I'm assuming any scripted attack would only have the permissions that any other FB/Twitter app has, and could be blocked in App settings if it started doing 'bad stuff'?

      • cortesi 14 years ago

        I found vulnerabilities in two social gaming networks that let you take control of people's Facebook and Twitter accounts using _just_ the UDID. I never published the details of these vulnerabilities, but you can find an official acknowledgement from at least one of these companies (Chillingo of Angry Birds fame) in this WSJ piece:

        http://blogs.wsj.com/digits/2011/09/19/privacy-risk-found-on...

        • samfoo 14 years ago

          By "Take control of..." you mean "act with the permissions of the app", I assume? I can't see how Angry Birds the app would ever have full control over my Facebook account unless there's a catastrophic vuln. in the Facebook API.

        • TylerE 14 years ago

          Angry Birds was made by Rovio, not Chillingo.

          Chillingo is a publisher of 3rd rate knockoffs.

          • cortesi 14 years ago

            Chillingo is the publisher of the original Angry Birds, and it's their social network (which is integrated with Angry Birds and therefore on millions of devices) that had the vulnerability.

    • api 14 years ago

      I think this proves that Apple's UDIDs are a horrible, insecure system. That is a privacy catastrophe.

      • zmb_ 14 years ago

        Not really. The UDID itself is not a "horrible, insecure system", it's just a unique identifier. It's the app developers who came up with the horrible, insecure systems due to how they used the UDID.

        The problem is that the developers do not understand how to engineer secure systems. Take away the UDID and their systems will still be broken, just in a different way.

        • mistercow 14 years ago

          That said, it does pose an interesting question as to what Apple could have done to prevent this eventuality. One possibility would have been not to expose a global device ID to developers, but instead to generate a per-app (or maybe per-developer-key) ID. That would have made such a leak extremely difficult, and would have isolated the damage to whatever vulnerabilities were present in a single app.

          You're right that these developers would have made something broken regardless of whether this problem existed, but Apple should try not to give them enough rope to hang themselves. What's fascinating is that "globally visible unique identifier" turns out to be just enough rope.

api 14 years ago

No, the UDID is a privacy catastrophe.

  • mtgx 14 years ago

    UDID is a few years old is it not? It's surprising it took people this long to figure this out.

    • sigzero 14 years ago

      Apple has been telling devs to move away from it for a least a year.

      • ebbv 14 years ago

        Yeah and there was an outcry over that, and nobody saying "Good decision." As Microsoft learned in the '90s, when you're on top nobody's going to do anything but rip on you.

  • eridius 14 years ago

    No more so than, say, a MAC address. The problem wasn't UDID, it's what people were doing with it.

prof_hobart 14 years ago

Given that the UDID has been deprecated in iOS5 and Apple are now rejecting apps that use it, I'd be interested to see what level of actual vulnerability there is these days.

dekz 14 years ago

> If your UDID is contained in the list, take a minute to help us identify the traitor that did give your information to the FBI without any your agreement and without warrant !

Wouldn't it also be useful to gather information about who WASN'T on the list and what Apps they have? Maybe device type as well.

  • jordanthoms 14 years ago

    Seeing as this is only 1 million sampled from a claimed 12 million list, that wouldn't be that useful since it's possible their UUID is just on the other part of the list.

  • evan_ 14 years ago

    > identify the traitor that did give your information to the FBI

    Interesting use of the word "traitor" to mean "person who cooperates with the Government".

  • FredericJ 14 years ago

    The device type is given in the leak

ganley 14 years ago

If I don't play games, much less belong to any social gaming networks, does this affect me at all?

  • bornhuetter 14 years ago

    Indirectly it affects all of us.

    • _cbdev 14 years ago

      *that have iDevices.

      • bornhuetter 14 years ago

        It affects anyone who lives in a society that is being tracked by their government.

        It may be a good thing that the FBI can better track criminals, but if it is used to track political dissidents or to monitor foreign or unpopular companies it should be a concern for us all.

        I'm not saying this is happening now, but we should be wary of going down that path.

      • technoslut 14 years ago

        Remember that this was just one agent's computer. We shouldn't forget too quickly about the Carrier IQ fiasco.

FredericJ 14 years ago

If you've been exposed take some time to help us identify who gave this UDID's to the FBI. (Already working with 3 exposed device owners) http://news.ycombinator.com/item?id=4473833

  • cortesi 14 years ago

    Sorry, I don't think this strategy is workable. Consider - 74% of apps I tested sent the UDID to one or more upstream servers. Furthermore, Flurry alone received UDIDs from 15% of apps I tested. That's just one aggregator, and they surely have nearly 100% of UDIDs on file. The APNS tokens narrow it down somewhat, but not too much. It's also not at at all clear that there is a single source involved - this could be an amalgamation of a number of sources.

    See this post for the source of these figures:

    http://corte.si/posts/security/apple-udid-survey/index.html

DenisM 14 years ago

A quick reminder for iOS developers:

Apple has provided a number of replacements for UDID, that address some of the UDID uses without it being as much of a privacy problem. It's all still under NDA, so I posted my summary on the Apple's developer forums (iOS developer login required): https://devforums.apple.com/message/723147

david_shaw 14 years ago

Has anyone verified that this UDID leak isn't just the old "Goatse Security" leak re-branded? I'm not saying I have any evidence to that, but it seems strange that the "ownage" document didn't mention anything about how the hack was done.

Along those lines, has there been any talk of the attack vector? To get a list like this, it would seem that AT&T (as was the case with "Goatse Security") or Apple would need to be compromised to get this list.

  • patdennis 14 years ago

    They did mention the vulnerability they used

    During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of "NCFTA_iOS_devices_intel.csv" turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts. no other file on the same folder makes mention about this list or its purpose.

  • cortesi 14 years ago

    Weev's AT&T adventure had nothing to do with UDIDs, and involved only about 100k records.

robbiep 14 years ago

If you disallow an app from sending you push notifications, will it still have your UDID/Device ID? Or if you never enable it, does the app & app server never get it?

  • objclxt 14 years ago

    Push notifications don't use the UDID. They use a different token. UDIDs can be requested without user consent by applications, although that functionality is supposedly deprecated from iOS 5 onwards.

panacea 14 years ago

That ended ubruptly and without much in the way of resolution?

  • cortesi 14 years ago

    Yes, sorry - I'm on the road at the moment, and wrote that in a rush. Part of the problem is that there's not much users can do at this stage. The ecosystem of companies that use and abuse UDIDs is fragmented, and each service that relies on UDIDs for identification or authentication can have its own unique problems. I guess it would be possible to start aggressively releasing a list of services that users should close their accounts on, but that would also be a shopping list for bad guys out to take advantage of this situation.

gmac 14 years ago

The post adds approximately nothing to the headline.

It's also worth noting that Apple has deprecated the UDID, and new and updated apps are no longer able to access it.

nodesocket 14 years ago

Forgive me if I am mistaken, but don't all you need is a UDID to send a push message to a device? I.E. via Urban Airship.

  • sgman 14 years ago

    No, you need a push token, which is a combination of device id and app id, and is only generated when the user authorizes the app for remote notifications. Additionally, you need a certificate on the server that is authorized to send messages to that app id.

ideawave 14 years ago

The server is really slow, is this being run an an FBI laptop? (asking for people to upload their UDID)

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection