{"id":7523,"date":"2015-11-29T11:19:40","date_gmt":"2015-11-29T19:19:40","guid":{"rendered":"http:\/\/www.podfeet.com\/blog\/?p=7523"},"modified":"2015-11-29T11:29:29","modified_gmt":"2015-11-29T19:29:29","slug":"edellroot-dell-fiasco","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2015\/11\/edellroot-dell-fiasco\/","title":{"rendered":"eDellRoot &#8211; Dell&#8217;s Certificate Fiasco"},"content":{"rendered":"<h4>What Happened:<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2015\/11\/dell_logo.png\" alt=\"Dell logo with a red scary line through it\" title=\"dell_logo.png\" border=\"0\" width=\"226\" height=\"223\" style=\"float:right;\" \/><\/p>\n<ul>\n<li>This week it emerged  that Dell started rolling out an updated version of it&#8217;s <em>Dell Foundation Services<\/em> software (or crapware as I call it) that comes with a root certificate that gets installed into Windows. The certificate shows up in the <em>Windows Certificate Manager<\/em> as <code>eDellRoot<\/code>.<\/li>\n<li>Initially it was thought it only affected laptops sold since August, then it emerged that it was on Desktops too, and the last shoe to drop was that the cert was also being pushed to people with older Dell computers via updates to the Dell software.<\/li>\n<li>This root cert is installed <strong>with its &#8216;PRIVATE&#8217; key<\/strong>, and all computers have certs with <strong>the same private key<\/strong>, and the password &#8216;protecting&#8217; that private key is <code>dell<\/code>.<\/li>\n<li>A second, similar cert was found later in the week also from Dell called <code>DSDTestProvider<\/code>.<\/li>\n<p><!--more--><\/p>\n<li>The second cert is not pre-installed on Dells, but comes along for the ride when ever a user installs the <em>Dell System Detect<\/em> support tool, which Dell support often ask users to do. Dell say: <em>&#8220;The impact from Dell System Detect is limited to customers who used the &#8216;detect product&#8217; functionality on our support site between October 20 and November 24, 2015&#8221;<\/em><\/li>\n<li>Reports also emerged that <em>Dell Foundation Services<\/em> can be tricked into revealing a Dell&#8217;s unique <em>service tag<\/em> to any website.<\/li>\n<\/ul>\n<h4>What The Bad Root Certs Mean:<\/h4>\n<ul>\n<li>It is trivial for attackers to get a copy of the private key (it can be extracted from any affected Dell, and it is now all over the internet) and issue fraudulent TLS certs for any website on the planet. All Dell computers with the <code>eDellRoot<\/code> cert installed will see these fraudulent certs as valid &#8211; effectively removing all the protection HTTPS should provide, and rendering every secure website on the planet insecure.<\/li>\n<li>Dell did not even apply limitations to this cert, so, it can be used for <strong>everything<\/strong> a cert can be used for, not just HTTPS &#8211; e.g. it can be used for creating fake S\/MIME email certs, fake VPN certs, and even fake code signing certs. Basically, everything that relies on the PKI (public key infrastructure) is insecure on an infested Dell.<\/li>\n<li>Bottom Line &#8211; if your computer has the <code>eDellRoot<\/code> cert installed, every single website on the planet is insecure, every single VPN is insecure, every single signed and\/or encrypted email is insecure, basically, everything that relies on the PKI (Public Key Infrastructure) is insecure for you.<\/li>\n<\/ul>\n<h4>Comparisons to Lenovo&#8217;s SuperFish Debacle:<\/h4>\n<ul>\n<li>Lenovo&#8217;s motivations were different &#8211; they installed an utterly insecure root certificate to advertise at you, while Dell say they did it to make customer support easier.<\/li>\n<li>However, why they did what they did is irrelevant &#8211; both made the same blunder, and both torpedoed their users security in the same way. The only small difference is that Dell&#8217;s cert is even more powerful than SuperFish&#8217;s one, so Dell managed to make the same mistake just that little bit worse.<\/li>\n<\/ul>\n<h4>What the Service Tag Disclosure Bug Means:<\/h4>\n<ul>\n<li>The service tag is unique to each computer, so having it available to websites makes it the absolute ultimate cookie &#8211; a unique ID for your computer that you cannot change that follows you everywhere you go on the net.<\/li>\n<li>Privacy is impossible if websites can access your service tag.<\/li>\n<\/ul>\n<h4>You have a Dell &#8211; now what?<\/h4>\n<ul>\n<li>There are many free testers to check if you have the dodgy certs (the tests have to be done from IE or Chrome, not from FireFox) &#8211; e.g. <a href=\"https:\/\/edell.tlsfun.de\" target=\"_blank\" >edell.tlsfun.de<\/a><\/li>\n<li>Dell have released removal instructions (as a DocX file instead of a web page) &#8211; <a href=\"https:\/\/dellupdater.dell.com\/Downloads\/APP009\/eDellRootCertRemovalInstructions.docx\" target=\"_blank\" >dellupdater.dell.com\/Downloads\/APP009\/eDellRootCertRemovalInstructions.docx<\/a><\/li>\n<li>Dell have also released a removal tool (I don&#8217;t know if it does both certs &#8211; better to do the removal manually IMO) &#8211; <a href=\"https:\/\/dellupdater.dell.com\/Downloads\/APP009\/eDellRootCertFix.exe\" target=\"_blank\" >dellupdater.dell.com\/Downloads\/APP009\/eDellRootCertFix.exe<\/a><\/li>\n<li>My advice is to un-install all the Dell crapware on your computer &#8211; personally, I do a full nuke-and-pave of all PCs because all manufacturers put crap on Windows PCs, and I don&#8217;t trust any of them. Once the Dell rubbish is removed, then remove the certs. (if you remove the certs first they may be put back by the apps before they get killed.)<\/li>\n<\/ul>\n<h4>Links:<\/h4>\n<ul>\n<li>Dell&#8217;s Official Response: <a href=\"http:\/\/en.community.dell.com\/dell-blogs\/direct2dell\/b\/direct2dell\/archive\/2015\/11\/23\/response-to-concerns-regarding-edellroot-certificate\" target=\"_blank\" >en.community.dell.com\/dell-blogs<\/a><\/li>\n<li>Ars Technica&#8217;s report in the service tag disclosure problem: <a href=\"http:\/\/arstechnica.com\/security\/2015\/11\/pcs-running-dell-support-app-can-be-uniquely-idd-by-snoops-and-scammers\/\" target=\"_blank\" >arstechnica.com\/security\/2015\/11\/pcs-running-dell-support-app-can-be-uniquely-idd-by-snoops-and-scammers<\/a><\/li>\n<li>Naked Security&#8217;s write-up of this mess: <a href=\"http:\/\/nakedsecurity.sophos.com\/2015\/11\/25\/dell-installs-risky-superfish-style-security-certificates-heres-what-to-do\/\" target=\"_blank\" >nakedsecurity.sophos.com\/2015\/11\/25\/dell-installs-risky-superfish-style-security-certificates-heres-what-to-do<\/a><\/li>\n<li>Brian Krebs&#8217; write-up of this mess: <a href=\"http:\/\/krebsonsecurity.com\/2015\/11\/security-bug-in-dell-pcs-shipped-since-815\/\" target=\"_blank\" >krebsonsecurity.com\/2015\/11\/security-bug-in-dell-pcs-shipped-since-815<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What Happened: This week it emerged that Dell started rolling out an updated version of it&#8217;s Dell Foundation Services software (or crapware as I call it) that comes with a root certificate that gets installed into Windows. The certificate shows up in the Windows Certificate Manager as eDellRoot. Initially it was thought it only affected [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,1],"tags":[],"class_list":["post-7523","post","type-post","status-publish","format-standard","hentry","category-blog-posts","category-podcasts"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/7523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=7523"}],"version-history":[{"count":7,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/7523\/revisions"}],"predecessor-version":[{"id":7539,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/7523\/revisions\/7539"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=7523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=7523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=7523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}