Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Protecting against unintentional regressions to cleartext traffic in your Android apps

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Protecting against unintentional regressions to cleartext traffic in your Android apps


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com

Posted by Alex Klyubin, Android Security team

[Cross-posted from the Android Developers Blog]

When your app communicates with servers using cleartext network traffic, such as HTTP, the traffic risks being eavesdropped upon and tampered with by third parties. This may leak information about your users and open your app up to injection of unauthorized content or exploits. Ideally, your app should use secure traffic only, such as by using HTTPS instead of HTTP. Such traffic is protected against eavesdropping and tampering.

Many Android apps already use secure traffic only. However, some of them occasionally regress to cleartext traffic by accident. For example, an inadvertent change in one of the server components could make the server provide the app with HTTP URLs instead of HTTPS URLs. The app would then proceed to communicate in cleartext, without any user-visible symptoms. This situation may go unnoticed by the app’s developer and users.

Even if you believe your app is only using secure traffic, make sure to use the new mechanisms provided by Android Marshmallow (Android 6.0) to catch and prevent accidental regressions.

Block cleartext traffic in production

To protect the installed base of your app against regressions to cleartext traffic, declare android:usesCleartextTraffic=”false” attribute on the application element in your app’s AndroidManifest.xml. This declares that the app is not supposed to use cleartext network traffic and makes the platform network stacks of Android Marshmallow block cleartext traffic in the app. For example, if your app accidentally attempts to sign in the user via a cleartext HTTP request, the request will be blocked and the user’s identity and password will not leak to the network.

You don’t have to set minSdkVersion or targetSdkVersion of your app to 23 (Android Marshmallow) to use android:usesCleartextTraffic. On older platforms, this attribute is simply ignored and thus has no effect.

Please note that WebView does not yet honor this feature.

And under certain circumstances cleartext traffic may still leave or enter the app. For example, Socket API ignores the cleartext policy because it does not know whether the data it transmits or receives can be classified as cleartext. Android platform HTTP stacks, on the other hand, honor the policy because they know whether traffic is cleartext.

Google AdMob is also built to honor this policy. When your app declares that it does not use cleartext traffic, only HTTPS-only ads should be served to the app.

Third-party network, ad, and analytics libraries are encouraged to add support for this policy. They can query the cleartext traffic policy via the NetworkSecurityPolicy class.

Detect cleartext traffic during development

To spot cleartext traffic during development or QA, StrictMode API lets you modify your app to detect non-TLS/SSL traffic and then either log violations to system log or crash the app (see StrictMode.VmPolicy.Builder.detectCleartextNetwork()). This is a useful tool for identifying which bits of the app are using non-TLS/SSL (and DLTS) traffic. Unlike the android:usesCleartextTraffic attribute, this feature is not meant to be enabled in app builds distributed to users.

Firstly, this feature is supposed to flag secure traffic that is not TLS/SSL. More importantly, TLS/SSL traffic via HTTP proxy also may be flagged. This is an issue because as a developer, you have no control over whether a particular user of your app may have configured their Android device to use an HTTP proxy. Finally, the implementation of the feature is not future-proof and thus may reject future TLS/SSL protocol versions. Thus, this feature is intended to be used only during the development and QA phase.

Declare finer-grained cleartext policy in Network Security Config

Android N offers finer-grained control over cleartext traffic policy. As opposed to android:usesCleartextTraffic attribute, which applies to all destinations with which an app communicates, Android N’s Network Security Config lets an app specify cleartext policy for specific destinations. For example, to facilitate a more gradual transition towards a policy that does not allow cleartext traffic, an app can at first block accidental cleartext only for communication with its most important backends and permit cleartext to be used for other destinations.

Next Steps

It is a security best practice to only use secure network traffic for communication between your app and its servers. Android Marshmallow enables you to enforce this practice, so give it a try!

As always, we appreciate feedback and welcome suggestions for improving Android. Contact us at security@android.com. HTTPS, Android-Security

...













๐Ÿ“Œ Protecting against unintentional regressions to cleartext traffic in your Android apps


๐Ÿ“ˆ 99.72 Punkte

๐Ÿ“Œ Protecting against unintentional regressions to cleartext traffic in your Android apps


๐Ÿ“ˆ 99.72 Punkte

๐Ÿ“Œ Protecting against unintentional regressions to cleartext traffic in your Android apps


๐Ÿ“ˆ 99.72 Punkte

๐Ÿ“Œ Protecting against unintentional regressions to cleartext traffic in your Android apps


๐Ÿ“ˆ 99.72 Punkte

๐Ÿ“Œ Unintentional DOS Attack against Car-Door Openers


๐Ÿ“ˆ 35.33 Punkte

๐Ÿ“Œ Unintentional DOS Attack against Car-Door Openers


๐Ÿ“ˆ 35.33 Punkte

๐Ÿ“Œ Protecting Data in Apps and Protecting Apps from Data - ASW #92


๐Ÿ“ˆ 32.43 Punkte

๐Ÿ“Œ Report: California Gun Data Breach Was Unintentional


๐Ÿ“ˆ 27.96 Punkte

๐Ÿ“Œ What Are the Ways to Respond to an Unintentional HIPAA Violation?


๐Ÿ“ˆ 27.96 Punkte

๐Ÿ“Œ [papers] Protecting apps against Jailbreaking and Rooting


๐Ÿ“ˆ 23.58 Punkte

๐Ÿ“Œ Guardsquare ThreatCast: Protecting mobile apps against suspicious activities and malicious users


๐Ÿ“ˆ 23.58 Punkte

๐Ÿ“Œ Effectively Protecting Your Users Against Ransomware & Zero-Day Exploits - Danny Jenkins - BH2020


๐Ÿ“ˆ 22.92 Punkte

๐Ÿ“Œ Scale Your SOC: Protecting Against Browser-Based Threats - Matt Ashburn - BSW #193


๐Ÿ“ˆ 22.92 Punkte

๐Ÿ“Œ 3 Strategies For Protecting Your Network Against DNS Hijacking


๐Ÿ“ˆ 22.92 Punkte

๐Ÿ“Œ 5 Tips for protecting your connected vehicle against Cyberattacks


๐Ÿ“ˆ 22.92 Punkte

๐Ÿ“Œ Fighting Regressions with Benchmarks in CI (Android Dev Summit '19)


๐Ÿ“ˆ 22.51 Punkte

๐Ÿ“Œ FSX-P3Dv4 Installer 2.0.1.231 HTTP Traffic Cleartext information disclosure


๐Ÿ“ˆ 22.17 Punkte

๐Ÿ“Œ Example of Cleartext Cobalt Strike Traffic (Thanks Brad), (Mon, Apr 12th)


๐Ÿ“ˆ 22.17 Punkte

๐Ÿ“Œ FSX-P3Dv4 Installer 2.0.1.231 HTTP Traffic Cleartext Information Disclosure


๐Ÿ“ˆ 22.17 Punkte

๐Ÿ“Œ CVE-2021-35246 | SolarWinds ETS 2020.2.6 HF4 Network Traffic cleartext transmission


๐Ÿ“ˆ 22.17 Punkte

๐Ÿ“Œ Schneider Electric PowerLogic PM800 Network Traffic cleartext transmission


๐Ÿ“ˆ 22.17 Punkte

๐Ÿ“Œ Schneider Electric PowerLogic PM800 Network Traffic cleartext transmission


๐Ÿ“ˆ 22.17 Punkte

๐Ÿ“Œ Protecting Chrome Traffic with Hybrid Kyber KEM


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ F5 Silverline Shape Defense: Protecting websites from the rising tide of fake internet traffic


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Google and Android have your back by protecting your backups


๐Ÿ“ˆ 21.57 Punkte

๐Ÿ“Œ Android Clickfraud Apps Randomly Disguise as Other Apps To Fake Genuine Traffic


๐Ÿ“ˆ 20.54 Punkte

๐Ÿ“Œ USN-2917-2: Firefox regressions


๐Ÿ“ˆ 19.99 Punkte

๐Ÿ“Œ USN-2917-3: Firefox regressions


๐Ÿ“ˆ 19.99 Punkte

๐Ÿ“Œ USN-2917-2: Firefox regressions


๐Ÿ“ˆ 19.99 Punkte

๐Ÿ“Œ Krita 3.3.1 Brings Fixes for Important Regressions to the Digital Painting App


๐Ÿ“ˆ 19.99 Punkte

๐Ÿ“Œ 2017 retrospective: The year of the {NITB split, regressions}


๐Ÿ“ˆ 19.99 Punkte

๐Ÿ“Œ Linus Torvalds on regressions


๐Ÿ“ˆ 19.99 Punkte

๐Ÿ“Œ Linus perception about Regressions


๐Ÿ“ˆ 19.99 Punkte

matomo