Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Dell: How to kill that web security hole we put in your laptops, PCs (oh goodie it's going away)
The Register ^ | Nov 24, 2015 | Chris Williams

Posted on 11/24/2015 6:55:10 PM PST by dayglored

Dell has published a guide on how to remove the web security backdoor it installed in its Windows laptops and desktop PCs.

This confirms what we all know by now – that Dell was selling computers with a rather embarrassing hole it in their defenses.

New models from the XPS, Precision and Inspiron families include a powerful root CA certificate called eDellRoot, which puts the machines' owners at risk of identity theft and banking fraud.

The self-signed certificate is bundled with its private key, which is a boon for man-in-the-middle attackers: for example, if an affected Dell connects to a malicious Wi-Fi hotspot, whoever runs that hotspot can use Dell's cert and key to silently decrypt the victims' web traffic. This would reveal their usernames, passwords, session cookies and other sensitive details, when shopping or banking online, or connecting to any other HTTPS-protected website.

Stunningly, the certificate cannot be simply removed: a .DLL plugin included with the root certificate reinstalls the file if it is deleted. One has to delete the .DLL – Dell.Foundation.Agent.Plugins.eDell.dll – as well as the eDellRoot certificate.

Dell has posted information [.docx] on how to do this properly, and future machines will not include the dangerous root CA cert. A software update process will run from November 24 that will remove the certificate automatically from machines, we're told.

(Excerpt) Read more at theregister.co.uk ...


TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: dell; security; windows; windowspinglist
That's very nice.
1 posted on 11/24/2015 6:55:10 PM PST by dayglored
[ Post Reply | Private Reply | View Replies]

To: dayglored; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
How to get rid of the blasted thing ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

2 posted on 11/24/2015 6:55:52 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Justifiable lawsuit.


3 posted on 11/24/2015 6:56:33 PM PST by TheTimeOfMan (Cruz / West 2016)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TheTimeOfMan
> Justifiable lawsuit.

I'm sure Dell's lawyers are producing great quantities of little green apples when they visit the corporate restroom.

4 posted on 11/24/2015 6:58:40 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 3 | View Replies]

To: dayglored

Dude, I’m still not buying a Dell.


5 posted on 11/24/2015 7:04:54 PM PST by Tolerance Sucks Rocks (Democrats and GOP-e: a difference of degree, not philosophy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rocksblues

BFL


6 posted on 11/24/2015 7:13:48 PM PST by rocksblues (The Obama administration the most unlawful, corrupt administration in US history.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
Dell has a SECOND cert problem, as of today:

http://www.computerworld.com/article/3008521/security/a-second-dangerous-dell-root-certificate-discovered.html

7 posted on 11/24/2015 7:30:27 PM PST by TChad
[ Post Reply | Private Reply | To 1 | View Replies]

To: TChad
Yep, thread on the second cert was posted yesterday, actually.

http://www.freerepublic.com/focus/f-chat/3364271/posts

8 posted on 11/24/2015 7:39:04 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 7 | View Replies]

To: dayglored
Yep, thread on the second cert was posted yesterday, actually.

Sorry.

9 posted on 11/24/2015 7:39:55 PM PST by TChad
[ Post Reply | Private Reply | To 8 | View Replies]

To: TChad
No, no, don't apologize. This info needs to get out to people who might not know. I appreciate your pinging me on it.

The only reason for not posting another thread on it tonight is that I've posted a lot of Windows Ping List threads already and I don't want to burn people out. :-)

If this issue continues to grow, I may need to do a thread that collects all the various existing threads, pings, etc. in one place.

Please, feel free to alert me to things of interest. I depend on hearing about stuff. Thanks!

10 posted on 11/24/2015 7:45:30 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 9 | View Replies]

To: dayglored

bfl


11 posted on 11/25/2015 2:37:42 AM PST by ImNotLying
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Is this vulnerability only for Dell units running a Windows OS?


12 posted on 11/25/2015 6:07:00 AM PST by Bloody Sam Roberts (Democracy is not freedom. Democracy is simply majoritarianism. It is incompatible with real freedom.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
Dell: How to kill that web security hole we put in your laptops

Does it work better than a bare metal OS reinstall? Is it as trustworthy? If not, who cares?

13 posted on 11/25/2015 7:59:12 AM PST by Still Thinking (Freedom is NOT a loophole!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bloody Sam Roberts
> Is this vulnerability only for Dell units running a Windows OS?

I believe so. I haven't heard anything regarding this problem that relates to any other OS.

14 posted on 11/25/2015 7:26:39 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 12 | View Replies]

To: Still Thinking
> Does it work better than a bare metal OS reinstall? Is it as trustworthy? If not, who cares?

If you have the option of doing a fresh install, and don't mind the reconfig and re-update required, I personally would do that.

OTOH, if the fresh install is done with a Dell supplied copy of Windows, I would be leery, even if it isn't already part of the install package, you'll have to watch for a special update that delivers the problem.

15 posted on 11/25/2015 7:29:13 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 13 | View Replies]

To: dayglored

I think I’d probably just use a generic copy compatible with the license number that came with the PC, rather than an OEM-supplied version.


16 posted on 11/25/2015 7:37:56 PM PST by Still Thinking (Freedom is NOT a loophole!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Still Thinking
> I think I’d probably just use a generic copy compatible with the license number that came with the PC, rather than an OEM-supplied version.

Sometimes that will work, other times not. The OEM license Key Code that came with the computer may be specific to the OEM version of Windows. It may even have code that checks that it's on hardware made by that particular OEM.

17 posted on 11/25/2015 7:51:04 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 16 | View Replies]

To: dayglored

Well, that’s what I meant. Use the OEM version of Windows (but not a copy provided by your specific OEM), then it should work with an OEM serial number but not have the stuff you’re trying to get rid of. I had no idea there were brand-specific serial numbers. Is that what you’re saying?


18 posted on 11/25/2015 9:41:06 PM PST by Still Thinking (Freedom is NOT a loophole!)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Still Thinking
> I had no idea there were brand-specific serial numbers. Is that what you're saying?

The key codes are generated by a Microsoft algorithm and assigned either individually to users, or in batches to OEMs. They're not random -- they have a certain encoded pattern that is kept extremely secret. With the algorithm you can generate valid key codes to your heart's content, but the shady programs that claim to be able to do so are of course wildly illegal.

The CD/DVD usually has the code for ALL versions (Home, Home Prem, Pro, Ultimate, etc.) and the key code enables one or another of those versions during installation. Encoded in the key code is the type or types of Windows versions it is valid for. The key may also encode things about certain features that are enabled on a given model of computer it's associated with.

A given OEM (say, Dell or Toshiba) generally customizes a generic OEM release of Windows with their own crapware and features, and puts their label on the CD/DVD. The key codes that unlock that customized release are usually specific to that OEM.

So in that sense it is sort of "brand-specific", but OEMs re-brand and cross-brand so it's not always easy to track.

Caveat: the above is a loose, generic description of the process as it was a few years ago. It may have changed since, especially since Win10 is now a download rather than a supplied CD/DVD in most cases...

19 posted on 11/26/2015 7:09:06 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 18 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson