NNSquad - Network Neutrality Squad

NNSquad Home Page

NNSquad Mailing List Information

 


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ NNSquad ] New Android Phone (Falsely) Accused of Containing a "Malicious Root Kit"



   New Android Phone (Falsely) Accused of Containing a "Malicious Root Kit"

                http://lauren.vortex.com/archive/000764.html


Greetings.  An article published yesterday is mischaracterizing the
situation with Android and the new T-Mobile (HTC) G2 by claiming
the phone includes a "malicious root kit" -- a very scary (but
false) assertion ( http://bit.ly/c80Dzs ).

This sort of hyperbole does nobody any good.  Here are the facts as I
understand them.

First, it's important to know that while Android is an open source
operating system, it does not require (as far as I know) that any
given hardware manufacturer (or cell phone carrier) permit user
modifications of the OS itself.  In fact, carriers and manufacturers
have considerable latitude regarding the degree to which they wish to
"lock down" their hardware.

And indeed, most Android phones to date have been locked down to one
degree or another, resulting in various tricks being used to bypass
those locks to allow rooting (for installation of custom OS builds
[ROMs], etc.)  But the point is that most Android phones did not come
out of the box with the ability to openly install such modifications
(the N1 can be viewed as an exception).

Now, I really *like* rooted Android phones.  I want to have complete
control over my phone whenever possible -- just like PCs.  I still use
a very long-in-the-tooth Android G1 that is on its last legs -- I
rooted it way back and I run the "CyanogenMod" custom ROM (which I
highly recommend).

What's going on with the G2 (essentially the HTC Vision, it appears)
is that initial experimentation suggests that HTC is using a firmware
rewrite system to replace "/system" mods with the "official" firmware
upon reboot. It is too early in the hacking process for anyone to
state definitively that this mechanism will not be defeated -- it's
fascinating how many ways cryptographic signature locks can be
"incompletely" implemented.

If the G2 is actually using this kind of firmware protection system,
it will be very similar to modern TiVos, which employ a (very
difficult but not impossible to replace) PROM chip to create a "chain
of trust" that eradicates attempts to modify the system.  Obviously,
the likelihood of a practical "chip replacement" solution (as far as
most potential users are concerned) for devices at the cell phone
integration level is fairly small -- but I would dare not say
impossible.

The good news is that "temporary" root access on the G2 has been
achieved -- the problem is that associated system changes get wiped
the next time the phone is started.  Temporary root may however be
adequate for running of certain programs that need root access for
best functionality (like backup programs) -- though much more is
indeed required for the running of alternative system builds.

This trend toward locked-down systems is being driven both by support
concerns (users who have screwed up their "unlocked" devices may still
want support, want to return for refunds, etc.) and by security
concerns.

Note that the latter issue in particular is reportedly already being
discussed by Intel and others in terms of creating CPUs and systems
for PCs that would operate in the context of cryptographically-signed
software, potentially bringing a similar level of lock to the PC world
(at least in theory).

Personally, I find this trend to be very disturbing.  It has serious
negative implications for user freedom and (perhaps surprisingly to
some observers) major negative implications for privacy and security
as well -- since users will no longer necessarily be able to run the
OSes and applications of their choice, vetted to their own standards
against security and privacy exploits.

In any case, I am unsure if I'd be willing to use an unrooted G2 on a
routine basis -- but the calculus on this score can be different
depending on expected usage patterns and other factors for any given
individual.  I don't necessarily expect the same level of modification
friendliness on a cell phone as on a PC -- even if I'd prefer them to
be similar in this respect, all else being equal.

But calling what's apparently going on with the G2 a "malicious root
kit" is simply wrong.  We can use the Wikipedia definition of
"rootkit" for now, which is on the mark:

   "A rootkit is software that enables continued privileged access to a
    computer, while actively hiding its presence from administrators by
    subverting standard operating system functionality or other
    applications."

This clearly does not apply to the G2's OS protection system as
currently understood.  In fact, one could argue that the G2 may have
implemented an "anti-rootkit" -- since the mechanism appears designed
to prevent the installation of "nonstandard" OS functionality by
protecting the "official" code from modification.

So let's try to at least keep this discussion in the realm of reality.
I don't like locked-down systems.  I like user choice.  I'd prefer the
G2 be fully modifiable, and I'm (wait for it ...) "rooting for it to
be rooted."

But it's inappropriate to be referring to the G2's (or TiVo's, for
that matter) OS protection systems by the term "malicious root 
kits" -- and the use of such inaccurate terminology in such cases 
does not advance the cause of user software freedom.

Even when -- especially when -- we disagree with a technology policy
approach, it's very important that we attempt to avoid hyperbole and
less than rigorously accurate statements -- both of which can be used
by others as weapons against our points of view.

--Lauren--
Lauren Weinstein (lauren@vortex.com)
http://www.vortex.com/lauren
Tel: +1 (818) 225-2800
Co-Founder, PFIR (People For Internet Responsibility): http://www.pfir.org
Co-Founder, NNSquad (Network Neutrality Squad): http://www.nnsquad.org
Founder, GCTIP (Global Coalition for Transparent Internet Performance): 
   http://www.gctip.org
Founder, PRIVACY Forum: http://www.vortex.com
Member, ACM Committee on Computers and Public Policy
Lauren's Blog: http://lauren.vortex.com
Twitter: https://twitter.com/laurenweinstein
Google Buzz: http://bit.ly/lauren-buzz