New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 764485 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner:
Last visit 15 days ago
Closed: Sep 2017
Cc:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 3
Type: Bug



Sign in to add a comment

Security: Investigate if Chrome is susceptible to Bluetooth SSP attack

Project Member Reported by ejcaruso@chromium.org, Sep 12 2017

Issue description

Breakout from  issue 764425 .

See the SMP section of https://drive.google.com/file/d/0B7tynhulKyCYamp0Q3FoamJ1TFk/view for more details.

The doc does not call this out as something which is exploitable on its own but it's worth verifying that the auto-accept logic does what we expect so we're not caught by surprise later.
 
Cc: keta...@chromium.org ejcaruso@chromium.org bhthompson@chromium.org josa...@chromium.org groeck@chromium.org dmitrygr@google.com
Labels: Security_Impact-Stable Security_Severity-Medium
Setting tentative impact-stable / severity-medium under the assumption that we might allow short term pairings, but exploitation requires another bug.
Cc: nettesh...@google.com
Cc: mcchou@chromium.org
Cc: r...@chromium.org
Looks like all of this auto-accept logic would be in Chrome and would be one of the various implementations of device::BluetoothDevice::PairingDelegate::AuthorizePairing. It doesn't look like we do much auto-accepting here, and it seems like we don't take the IO caps into effect at all at this point, so we're almost certainly not going to have the same issues as Android or Windows are shown to have in the paper.

BluetoothHostPairingController and BluetoothControllerPairingController auto-reject all pairing requests. The BluetoothNotificationController asks the user to accept or reject pairings. HIDDetectionScreen auto-accepts but has a comment saying this should never be reached; perhaps to be safe we should NOTREACHED() here, or at least log an error. BluetoothApiPairingDelegate sends out an event, but that can only be seen by users of the private API, so that should be fine.

+rkc@ to keep me honest here. :P

Summary: Security: Investigate if Chrome is susceptible to Bluetooth SSP attack (was: Security: Investigate if BlueZ is susceptible to SSP attack)

Comment 6 by r...@chromium.org, Sep 12 2017

Yes, Chrome specifically does not accept any auto-pairing due to security reasons. A pairing delegate can be provided by the private API but AFAIK it isn't being used to auto-pair by any app "anymore".

It used to be used by GVC to auto-pair with the remote app during their restricted fishfood but this does not seem to be the behavior anymore.

Status: WontFix (was: Assigned)
Cool, I think we avoided this particular issue then. Thanks Rahul!
Project Member

Comment 8 by sheriffbot@chromium.org, Dec 20 2017

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment