tech.lgbt is one of the many independent Mastodon servers you can use to participate in the fediverse.
We welcome all marginalized identities. This Mastodon instance is generally for folks who are LGBTQIA+ and Allies with an interest in tech work, academics, or technology in general.

Server stats:

2.9K
active users

I accidentally found another security vulnerability in fdroidserver whilst working on something related to IzzyOnDroid.

We warned them months ago but were ignored *sigh*

"Another fdroidserver AllowedAPKSigningKeys certificate pinning bypass"

openwall.com/lists/oss-securit

www.openwall.comoss-security - Another fdroidserver AllowedAPKSigningKeys certificate pinning bypass
Public

*sigh*

F-Droid now claims PoC 5a is not an "actionable security vulnerability" because "APKs signed by v1-only are not even installable on latest Android versions". This is false. As long as targetSdk < 30 (and e.g. the official F-Droid client has 29) they will install just fine. I even confirmed this by installing my PoC APK on Android 13-15 just in case, something they apparently neglected to bother with before making that claim.

Public

They are now claiming they can't use my patches as-is because of "code quality issues" (private apis). Which... applies to exactly one patch, the one they actually merged 8 months ago.

Because the only way to fix the vulnerability was to monkey patch androguard (and an updated version is still not available in Debian, nor has the Debian stable fdroidserver package received any patches, despite those packages being maintained by the F-Droid team, so that monkey patch is still needed).

They are also downplaying the impact by insisting this vulnerability is only a problem for third party repositories relying on fdroidserver; which even if true is showing a concerning disregard for the security of repositories of other projects relying on fdroidserver.

I have no words to describe how little remaining faith I now have in F-Droid's security and code review processes.

Public

I wrote an overview of the situation with the F-Droid certificate pinning bypasses (without technical details of the exploits themselves as that's covered by the README):

github.com/obfusk/fdroid-fakes

GitHubfdroid-fakesigner-poc/OVERVIEW.md at master · obfusk/fdroid-fakesigner-pocF-Droid Fake Signer PoC. Contribute to obfusk/fdroid-fakesigner-poc development by creating an account on GitHub.
Public

@obfusk it boggles my mind how fdroid is so respected and glorified when its just horribly ran and has massive issues they gloss over then patch later on and attack people who criticize them personally but dont respond to the actual points