libera/#maemo/ Saturday, 2023-04-15

KotCzarnymaxd: nope, its full unlock, thats why the 70000usd reward07:57
KotCzarnyit bypasses you all android lock screens, and you can use the phone normally08:02
MaxdamantusKotCzarny: pretty sure it will only be unlocking phone that is "locked" as in on the lock screen.08:09
Maxdamantusnot "locked" as in just booted, hasn't had pin yet.08:09
KotCzarnyyup, its just that, full unlock at boot08:10
KotCzarnyif you have spare android phone try it08:10
Maxdamantusso what? Android is programmed to brute force the encryption key?08:10
Maxdamantusthe pin is used as part of the encryption key.08:10
Maxdamantusat least in my version of Android (11).08:10
KotCzarnyits like those complicated locks that unlock on the single wire signal08:10
KotCzarnykey stores can have multiple entries to unlock08:11
Maxdamantusso what entry is used to recover the masker key in this case?08:12
Maxdamantuss/masker/master/08:12
KotCzarnyi would guess so08:13
MaxdamantusI'm asking what entry would be used.08:13
KotCzarnybut since its only my guess, it would require checking personally08:14
MaxdamantusUnless they're storing a plaintext entry that allows the master key to be recovered just from data that's already decrypted (outside of the /user directory), it's not going to allow you to decrypt the device.08:14
MaxdamantusThe CVE only talks about a "lockscreen bypass"08:15
Maxdamantusie, the state that the phone gets in after you've booted and decrypted it, then you soft lock it.08:16
Maxdamantusyou need to enter the pin on boot in order to generate some entry in the kernel keyring that allows the /user directory to be read (since it's encrypted using fscrypt).08:17
KotCzarnyare all androids encrypted by default or one has to enable it specifically?08:42
KotCzarnys/all/all recent/08:46
Maxdamantusafaik they're all encrypted at two levels. there's a key which is used for block-level encryption (ie, dm-crypt) which I think is meant to be derived from some sort of measured boot mechanism (so using something similar to a TPM, where the key is derived without user input). There's also filesystem-level encryption, where there's a master key stored inside a file called something like08:52
Maxdamantus"/data/unencrypted/encryption_key".08:52
Maxdamantusthat "encryption_key" file should be encrypted using the device PIN, and it gets added to the kernel keyring so that files in /data/user can be read.08:53
Maxdamantusit's possible to not have a device PIN, in which case presumably the "encryption_key" file is either unencrypted, or it's encrypted using some dummy password.08:54
KotCzarnythis is the original story about it: https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/09:15
KotCzarnyciting: 'It was a fresh boot, and instead of the usual lock icon, the fingerprint icon was showing. It accepted my finger, which should not happen, since after a reboot, you must enter the lock screen PIN or password at least once to decrypt the device.'09:16
KotCzarnyso it might be the case if you just hotswap the sim card09:19
KotCzarnywhich is possible in phones nowadays09:20
KotCzarnylong time ago sim was hidden under the battery09:20
MaxdamantusHmm.. maybe they add an additional option for decrypting the master key using a previously used SIM PIN.09:28
* Maxdamantus hasn't tried using a SIM PIN.09:29
Maxdamantusit would be interesting to know if the "chapter 1" issue works with unknown SIM cards.09:30
MaxdamantusHmm.. after enabling the SIM lock pin, it did indeed seem to rewrite the encryption key file.09:57
Maxdamantusso maybe it adds it as a secondary policy.09:59
Maxdamantusthough I'm not able to unencrypt ("unlock" after boot) the phone with the SIM PIN, so I'm not sure what it actually updated.10:02
Maxdamantusactually, I don't know if it rewrote the "encrypted_key" file. I misinterpreted the timestamp, since it's in 1971 for some reason.10:06
Maxdamantusoh right, nothing actually got unlocked in "chapter 1".10:36
Maxdamantusthey said that it got stuck saying "Pixel is starting...", presumably because the lockscreen mechanism was meant to be dismissed, but the device wasn't unencrypted yet.10:37
Maxdamantusso yeah, my initial understanding seems to be correct. if the device is off, the data is encrypted at rest, and can only be unencrypted using the device PIN (not SIM PIN or SIM PUK)10:38
KotCzarnyyou might be right10:39
KotCzarnystill, hotswap simcard can fully unlock once it was initially unlocked by user10:40
KotCzarnyand if patch level is older than september 2022 or so10:40
MaxdamantusI guess it's fixed on my phone, since I wasn't able to reproduce either issue, though I'm confused about the timeline.10:43
KotCzarnyfix only came in sept 202210:44
MaxdamantusI'm using OxygenOS rather than plain Android, though it says the "Android security update" is 2022-07-01.10:44
KotCzarnymaybe they fixed it on their own10:44
Maxdamantusmaybe. looks like I last updated on Oct 31.10:46
sicelovoice calls work now on n900 in maemo leste, with clear audio10:46
siceloearly stages, but great achievement10:47
KotCzarnysicelo: niiiice10:49
hexnewbieGreat news11:13
KotCzarnyhttps://www.olx.pl/d/oferta/obudowa-pc-rack19-solidna-wytrzymala-CID99-IDTO2EC.html?reason=seller_profile13:10
KotCzarnyciekawe co w srodku13:10
KotCzarnydarn, wrong window13:11

Generated by irclog2html.py 2.17.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!