Web Browser Developers Work Together on Security 203
JRiddell writes "Security developers for the four major browsers recently met together to discuss Web security. The meeting, hosted by Konqueror's George Staikos, looked at future plans to combat the security risks posed by phishing, ageing encryption ciphers and inconsistent SSL Certificate practise. IE 7 is one of the first browsers to implement some of the ideas discussed such as colour coding location bars and an anti-phishing database." From the article: "The first topic and the easiest to agree upon is the weakening state of current crypto standards. With the availability of bot nets and massively distributed computing, current encryption standards are showing their age. Prompted by Opera, we are moving towards the removal of SSLv2 from our browsers. IE will disable SSLv2 in version 7 and it has been completely removed in the KDE 4 source tree already."
Don't use self-signed certs. (Score:5, Interesting)
Most of the time, this isn't exposed to customers, but employees of the organization are trained to ignore the "This certificate was not issued by a trusted authority," warnings, and I fear such people will take away that that box with all of its technobabble is one they should ignore at all times. That box is a last line of defense against an encrypted connection that isn't trustworthy... and I think this is a step forward to the point where browsers will refuse to give SSL encryption without SSL authentication succeeding.
Re:Don't use self-signed certs. (Score:5, Insightful)
Re:Don't use self-signed certs. (Score:3, Interesting)
Re:Don't use self-signed certs. (Score:4, Insightful)
Self-signed certificates can be very useful for a situation where you want *more* security than plain unencrypted HTTP, but don't want to pay money for it. If you wanted to have SSL encryption on a LAN, but the server's hostname is not a real hostname on the internet, I don't think you even *could* get a real CA-signed cert for it. Self-signed certs fill a real void when it's not possible to simply use real CA-signed certs. We can't just ignore that.
Re:Don't use self-signed certs. (Score:2)
I'm not sure how this is worse than SSH.
Re:Don't use self-signed certs. (Score:3, Interesting)
People have been doing it for years.
It's not a good general purp
Re:Don't use self-signed certs. (Score:2)
Re:Don't use self-signed certs. (Score:2)
Not necessarily (see GPG webs of trust). But sure, if I trust a root server as an introducer then I trust anything they sign.
That still doesn't change the fact that if even if I trust (say) Verisign, I have to pay them to sign a cert for me. Whereas I can trust myself, sign my certs for internal use for free, and verify fingerprints as I connect. Even for some semipublic applications it could be a reasonable course of action to dist
Re:Don't use self-signed certs. (Score:2)
Also, this is impossible in the scenario I outlined unless the attacker can create valid keys matching your fingerprints (in which case your cryptographic hash function is inadequate and there are likely to be much more effective attacks at his disposal independent of whether you're using keys signed by a CA or not).
Re:Don't use self-signed certs. (Score:2)
Certainly, it's just a component of the browser, and some support this feature already.
Re:Don't use self-signed certs. (Score:2)
Re: Don't use self-signed certs. (Score:2)
Re: Don't use self-signed certs. (Score:2)
Re:Don't use self-signed certs. (Score:2)
Self-signed certs aren't the problem, and you shouldn't train users to ignore warning boxes either. If you're goin
Re:Don't use self-signed certs. (Score:2)
And for good reason; it's simply not necessary. Users don't notice if the site has SSL or if it's at the wrong URL; why bother with faking a SSL cert and poisoning a DNS cache when you can just get one for russianhacker.com and send spam telling people to visit you at that site?
Re:Don't use self-signed certs. (Score:5, Insightful)
In those cases where that is sufficient, the introduction of authentication only muddies the overall value and importance of clean authentication. For example, I use TLS for SMTP mail delivery, but with a self-signed cert. This is because I don't particularly care about being intercepted, only that the casual sniffer of traffic between us will get nothing. For anything more sensitive, I don't trust SMTP anyway, no matter how encrypted and authenticated it might be.
The same goes for LDAP. I tried to set up LDAP between my home and work for the purpose of sharing some contact info. I wanted to encrypt and filter traffic so that only I could access it, but didn't really care about it so strongly that I was willing to buy a cert. However, I still had to hack the client to accept the self-signed cert. Why? What possible value to the user (me) is there in that?
Re:Don't use self-signed certs. (Score:3, Insightful)
The problem is that encryption without authentication is really not secure as you'd be vulnerable to a man in the middle attack. Even in the examples you described, a man in the middle could present you with a self-signed certificate, and if you just click "yes" to accept a self-signed cert all the time, you possibly wouldn't notice, unless you routinely check the key fing
Re:Don't use self-signed certs. (Score:2)
I agree completely. Consider how many transactions happen over the internet with a web site you don't know at all:
Note that the purpose of a certificate
Re:Don't use self-signed certs. (Score:2)
Re:Don't use self-signed certs. (Score:2)
More to the point: how are browsers stopping this? (Score:2)
A screen full of technobabble isn't enough. A warning that the site is suspicious, as used for other dodgy sites, is better.
Re:Don't use self-signed certs. (Score:2)
That would be bad. My people run home webservers for their own personal use. Using authentication is neccessary if, like me, you have a large mp3 collection on the web. If you use authentication, then you really ought to use encryption. I've looked into getting a proper cert, but it's extremely expensive and a recurring fee. It's just not worth it. A lot of people use SSL
Re:Don't use self-signed certs. (Score:2)
CACert is a start, but unfortunately at this point in time no browsers include thei
SSLv2? (Score:2)
Re:SSLv2? (Score:5, Informative)
http://wp.netscape.com/eng/ssl3/ssl-toc.html [netscape.com]
Re:SSLv2? (Score:2)
Or the later draft-freier-ssl-version3-02 [netscape.com]
Those drafts, and more stuff, is linked to from the Netscape SSLv3 page [netscape.com].
There's also RFC 2256 [ietf.org] for TLS 1.0.
Re:SSLv2? (Score:2, Informative)
Re:SSLv2? (Score:2)
Replacement. (Score:5, Informative)
You know what would really help... (Score:4, Interesting)
Re:You know what would really help... (Score:2)
Re:You know what would really help... (Score:4, Insightful)
Actually, the trade-off you'll be making is more like execution speed and resource usage for apparent safety in terms of lack of buffer overflows.
This is not a good trade-off to make. Experienced programmers working with C and C++ will know of the buffer overflow issues, especially if they've been bitten by it before. A similar one is failure to null out a string before using it, risking problems when the string you want to put in the variable is not null-terminated.
Basically, if you remember to do a few simple things (fgets() instead of gets(), strncpy() instead of strcpy(), memset(), just to name a few), you can actually avoid a lot of these issues. Make these things habits, and it will not become an issue.
Re:You know what would really help... (Score:3, Insightful)
Re:You know what would really help... (Score:4, Insightful)
Any explanation as to *why* this isn't actually being done then? Because, as I stated, people keep *saying* this as if repeating it makes it true. Yet the reality in the field is that buffer overflows from C/C++ code is the number one source of security flaws. This claim is like saying that "people would die of fewer heart attacks if they would eat healthy foods". Um, yeah... sadly not many actually eat healthy. Clearly, not many "experienced programmers" are putting your advice to practice either. So I will take code bloat and speed hits for the sake of not being a subscriber to the buffer overflow of the month club.
Re:You know what would really help... (Score:2)
Jesus christ you people irritate me.
Re:You know what would really help... (Score:2)
Mind you, I happen to like C# and Java. Just not for everything.
--S
Re:You know what would really help... (Score:5, Insightful)
1. There is a huge "backlog" of sloppy coding that is either exposed through changes in higher layers, or simply not discovered until now.
2. Many of the web browser vulnerabilities lately (and historically, in IE especially) have not been related to overflowing a buffer. They have more been along the lines of fooling the browser or the user of it that you are in a different security context than you really are. That is possible to do in any language. It just takes a single instance of a piece of code doing something "on behalf of" something with a lower security privilege, like just about anything done in a browser. There are techniques for sandboxing and walling this in, but enforcing something like the logic for when to allow scripting/DOM access between frames in a web browser is not something very well suited to the Java (or .NET, for that matter) security model. You simply have to do the hard work and do it right.
So, in the specific space of browsers, I think that the issue of the language used is not very relevant. What IS relevant is to use a sound design, where the security decisions are made by some components, not all over the place. Componentization, no matter if it's done by XUL/Javascript or by encapsulation into COM/ActiveX are both examples of this. In practice, the execution of the previous have been better than the latter.
Another point would be that moving towards Java or some other VM with interoperability issues, at least when you get into directly calling other code in-process, will force you to rewrite bad C/C++ code. I don't know if that's a bug or a feature. It would rule out buffer overflows, but it would also mean a gigantic, untested, new code base.
Re:You know what would really help... (Score:2, Interesting)
I am not saying this will happen soon, but when you purchase a home PC from Dell and it comes with a base configuraton of a 64bit processor and a 2gig mem chip I doubt the cost of even the slow Java VM would make much of a difference to the avg user.
C will probably never die though, what else are we susposed to write those OSs and VMs with? :)
Java is useless to me. (Score:2)
I tried to install Java on my computer. I gave up when I discovered that Sun won't let me install it directly. I have to make special effort to agree to their license. FreeBSD-ports cannot include it directly. I can deal with it, but it isn't worth the bother.
However things get worse when you are not a personal user. At work we are interested in an open-source project written in Java, but because of the license we cannot use it. (We want to ship it as part of an embedded system, the only way to i
Re:You know what would really help... (Score:2)
What gets me is, why are these known "gotcha"s allowed to continue to draw breath? As soon as the vulnerability is discovered, it should not get past any new release of a compiler, no matter what warning level. To heck with backwards compatibility: if my code uses a known vulnerability, it is broken and I should fix it.
A bad programmer (Score:2)
A few security holes I've found:
A system where you can gamble online credits, you bet n credits, and a number between 1 and 5 was generated, if you guessed the number, you would win 4 times your bet, otherwise you lose your bet, maximum winnings of 100 credits a day. I bet -1000000000 credits, so when I lost I gained 4000000000 credits. (which errored out and dumped me to a command prompt, from which I could read/edit the password file)
Re:A bad programmer (Score:2)
Re:A bad programmer (Score:3, Insightful)
And you think these guys would have done *better* in C/C++? Surely a bad coder can wreck any project. However, Java or C# allow a *competent* programmer to avoid *by default* many pitfalls that a C/C++ programmer must remain on guard for. C/C++ has its use, but I believe it is selected for projects where it isn't a requirement to have low level access to the OS and memory management.
where bet has not been bounds check
One real simple way to start. (Score:2, Insightful)
I guess thats correct (Score:2, Insightful)
I like how this person uses "one of the first" in a positive sense.
Re:I guess thats correct (Score:2)
Re:I guess thats correct (Score:2)
Which is troublesome because Microsoft proposes to use yellow as a warning color. Standards, people, you're getting together to make standards.
Re:I guess thats correct (Score:2)
There'll still be unused Firefox users for a while, but if three colors are used on a scale, I agree with IE 7 here and would like them to come across as natural to novice users.
Re:I guess thats correct (Score:2)
Re:I guess thats correct (Score:2)
Re:I guess thats correct (Score:5, Funny)
From what I can read here its undoubtably the best browser I've never tried, and (god willing) it will stay that way for many years.
Microsoft participation (Score:5, Interesting)
Re:Microsoft participation (Score:2)
It's not quite the same as meeting with open source projects, but it's a start.
Re:Microsoft participation (Score:3, Insightful)
confusing color shemes (Score:5, Interesting)
Re:confusing color shemes (Score:3, Insightful)
Re:confusing color shemes (Score:5, Insightful)
Clearly yellow (gold) is the de facto standard for "secure" and IE7 is just plain wrong to use green instead, and make gold mean something bad.
Re:confusing color shemes (Score:4, Insightful)
The same for Konqueror, but it does not really mater that much. In this case the IE7 approach makes more sense, so they agree to change it. Besides calling yellow the de-facto standard is not correct, as de-facto would be what IE5 and IE6 uses.
Re:confusing color shemes (Score:2)
Anyway, I'm guessing that is what the FF people were thinking when they first implemented it- basically that yellow is pretty well standardized as "look at me!" colors. However, after having a rational discussion with anybody in their right might, you should be
Re:confusing color shemes (Score:4, Insightful)
Re:confusing color shemes (Score:2, Funny)
Re:confusing color shemes (Score:2)
The colour coding implies that colour x means safe. What happens when the ability to display colour x is compromised?
I can imagine the average user now:
"Well, the site is green after all, so it must be safe."
Having computers make judgements is a serious problem in general, but especially in security situations. I know the best method of showing the user everything that is known and letting them make a decision for themselves doesn't work very well in the field.
Re:confusing color shemes (Score:2)
What if they instead used a popup message? A hack could disable the popup, or change the message.
An icon? The icon could be changed by a hack too.
Since I think we've seen no special browser exploits this way recently besides the Mozilla XUL skin exploit, I don't think this is such a big deal, especially for browsers not implementing online installable skins.
Re:confusing color shemes (Score:2)
More importantly, it has for something like a year and a half; same with Camino (uses different code to do it, didn't get it automatically from the Fx update that introduced it).
Memo to submitter: when "one of the first" means "fourth or fifth in a field of about six", you need to find a different phrase, or stop accepting paychecks with Ballmer's signature on them.
p
On the other end.... (Score:3, Insightful)
Phishing (Score:2, Insightful)
We need a none geek term for this, something that is clear and easily understandable. "Malicious Websites" or an "Identity Theft Filter" just not phishing.
Re:Phishing (Score:2)
Hay, You're absolutely right! And I also think that world hunger is caused by a nutritional deficit awareness gap, in which the adequate expectations paradigm failed to be impacted by the proactivity focused information enabling solution.
Free market self-regulation (Score:4, Interesting)
The security enhancements we'll see that come out of these (and future) discussions will help all users yet also increase competitiveness in other areas. We didn't need a Congress or government body to force regulations, they're occurring out of customer need.
Note that government could create regulations but we all know that those regulations come too late and can never adapt to current and future ever-changing needs.
I read a great article [lewrockwell.com] today about the historical growth of the Net because of the lack of regulations and taxes.
Confusion (Score:5, Interesting)
Many users have significant problems when anything changes in their computer experience; my father for example. I tried moving him over to Firefox so that he could stay away from spyware et al, but he couldn't make the move because he couldn't navigate the user interface anymore. This man is no dullard either. He taught me to program when I was 8, has a PhD in (if I remember correctly) biology, pharmacology, or physics, teacheds microbiology, and is an associate dean at world-class university. For all of his smarts, he has had problems with computers ever since he was weened off of DOS and onto Windows 3.1. After many years of training he's finally to the point where he can work successfully in an evironment as long as nothing ever changes.
Skip ahead to Windows XP service pack 2. Automatic updates are now on. He's been trained to allow the updates to happen, but only after I get a phone call asking me if they're ok. Unfortunately, updating sometimes means that I have to spend an hour or so teaching how to burn cds, how to switch between home/work networks, how to play music, etc. at regular intervals. I rue Microsoft not for their lax security (well, not just for their lax security), but for their ever present desire to "upgrade" their interfaces to make them "easier."
At his work they upgrade computers relatively often. The day will come when he will have to call me each time he goes to a website with the "wrong" color.
Re:Confusion (Score:2)
Re:Confusion (Score:5, Funny)
My kids are sick and tired about hearing about my stories from grad school. There are only so many things you can do with liquid nitrogen to stave of the bordom of collecting data. They know all my rubber nail in 2x4, frozen cricket (they really do stop chirping if they are cold enough) & exploding pop bottle stories (a 2 liter plastic bottle with a few tens of milliliters of LN will completely vaporize if you put on the cap and wait for the LN to evaporate. It leaves a cloud of frozen water vapor too.) By now, you probably understand why they are sick of my stories.
Re:Confusion (Score:2)
We need a Knoppix Live CD over here! STAT!!!
Re:Confusion (Score:2)
I say leave him with Windows, if that's what he's most comfortable in. Personally, I would do my best to lock down his machine other ways-- forget about automatic updates; u
Re:Confusion (Score:2)
hell, give him w3m, links or some similar cli browser and presto...
Re:Confusion (Score:2)
Re:Confusion (Score:2)
Would you rather have him call when the location bar is a funny color, or simply never get the call until his bank account is wiped out?
Not new ideas. (Score:3, Informative)
Do they mean like in the Netcraft anti-phishing toolbar [netcraft.com]?
Re:Not new ideas. (Score:2)
Err....four? (Score:3, Insightful)
OK, now how many of you had Konqueror as one of the 4?
C'mon--I like Konqueror as much as the next user, but beyond IE and Firefox there are a large number of minor browsers out there. Mozilla, obviously, unless you lump that with Firefox as I do. Then probably Opera. And then, what, Safari? Konqueror is maybe 6th or 7th. So how "cross browser" is this?
Re:Err....four? (Score:2)
Re:Err....four? (Score:5, Informative)
There's four major rendering engines. Trident (Internet Explorer on Windows), Gecko (Mozilla, Firefox, etc), Presto (Opera), and KHTML (Konqueror, Safari, Omniweb, etc).
Konqueror is important because it's the original branch of the KHTML rendering engine, used in a number of browsers, throughout KDE, and sitting on the desktops of millions of Apple users as part of Safari.
So while it's slightly inaccurate to say that Konqueror is one of the four major web browsers, what was meant, and what is actual fact, is that Konqueror's rendering engine is one of the four major rendering engines.
Encryption is not the problem (Score:3, Interesting)
The threats that browsers need to address is the fact that their *users* and their user's *environments* are being attacked. Phishing attacks don't target weak encryption protocols. Heck, most don't even bother setting up an SSL-enabled phishing site, because people don't look for encrypted sessions in general. Phishing attacks target the user by attempting to fool the person into believing that they are at the actual site. Ask yourself - would your mother know that chase-online-banking.com is not the real address for Chase's online system? (Phishing trends show that phishers are increasingly using name-based attacks, as opposed to an IP-based URL).
As for attacking the environment, keyloggers and malware in general are exploding in popularity. Again, this is not a problem with the encryption protocols used for securing sessions, rather it's the user's environment being attacked. One must remember that browsers don't run in a vacuum - they have a user and an environment. Using 256-bit AES encryption is great, nifty, and cool, but if my mother's computer has a keylogger installed and I decide to do some e-banking while visiting for the holidays, well then I've got a problem.
People need to re-evaluate security in the context of which these applications are run, and stop thinking that simply increasing keylength or swapping cipher algorithms will solve the problem. It won't. Our problem is that security isn't usable, it isn't intuitave, and untill we make it so we will continue to have these problems.
Phishing database really efficient? (Score:3, Interesting)
A database of unimportant entries is not going to do any good.
I figure that Microsoft will have to keep a staff of around a dozen people day and night checking out each one of these flagged URLs as soon as the URLs come in, or otherwise it is not going to be very effective.
Re:Phishing database really efficient? (Score:3, Interesting)
Plagarism? (Score:5, Informative)
Copied from here [kde.org]?
SteveM
Re:Suggestion (Score:5, Insightful)
Re:Suggestion (Score:2)
So go to the bank (or phone them if you trust that) and request a copy of the fingerprint. I'm sure you'll get blank stares, but banks seem to be somewhat aware of security, so maybe it will catch on.
Re:Suggestion (Score:2)
Re:Suggestion (Score:2)
Re:Suggestion (Score:2)
You have just as much assurance on the first load as you do with the current system with a CA-issued cert. The critical difference, is that thenceforth you have perfect assurance with Petnames that you are dealing with the same entity as you were originally. You don't have that guarantee with CAs.
Re:Suggestion (Score:2)
Re:Suggestion (Score:2)
I'm not sure if the browser would warn you if it changed (to a different cert still signed by a CA), but it certainly won't warn you if your first visit to the site you get a spoofed cert...
Re:Suggestion (Score:5, Informative)
A. Is the domain name on the address bar the one you want? (example: citibank.com)
B. Did the page come up without any errors from the web browser?
If your DNS server was compromised, B will not be true. If you're taken to some site that may or may not have been issued a valid cert by Verisign, but is definitely NOT citibank.com, A will not be true.
If A and B are true, you have successfully connected to citibank.com over an encrypted channel, end of story. Whether you want to trust the company on the other end is totally up to you, but now you know for sure who you're dealing with.
Re:Suggestion (Score:2, Informative)
Not quite. If A and B are true, you have successfully connected to a computer claiming to be citibank's website at citibank.com using a certificate issued by someone to "prove" it. Of course, https://web.da-us.citibank.com/ [citibank.com] (the site I get when I hit login) has a certificate issued by VeriSign, and we know how well they verify the identify of people requesting certificates [microsoft.com].
Re:Suggestion (Score:2)
What you're describing would involve a third party obtaining a cert with a CN of citibank.com. For all their faults, Verisign would not issue a cert with the same CN to two different organizations.
Now, if Verisign issued a cert to some scammer with a company with the same organization name "CitiBank" with the CN citi-bank.com and citlbank.com, or whatever, that's a differen
Re:Suggestion (Score:2)
Not in the real world it doesn't. If the issuing company is, for example, full of mindless drones who are paid to issue certificates as quickly as possible, then they will - and do - occasionally issue the wrong certificate. IE, they will give Joe Bloggs a certificate saying that he is Citibank.
Certificates do nothing to fix human error at the issuer end and even leaving that a
Re:Suggestion (Score:3, Insightful)
If you get a self-issued cert, how do you know it's the right cert? Do they mail it to you pgp-encrypted? Read the fingerprint over the phone?
Re:Suggestion (Score:3, Insightful)
You know you are at the bank machine at the right location, so you trust that it's correct and isn't going to screw you, when in fact, you just passed your card through a card reader, and there's a camera watching you type in your PIN.
IMO, it's a real life phishing attack. The security implications are almost identical.
Re:Four major browsers?! (Score:2)
You can pick the order
Re:Nice ideas, but... (Score:5, Insightful)
NOTHING has really changed for firefox if they go for YELLOW/GOLD for SSL sites with bad / unverified SSL certificates.
YELLOW is the current SSL state in firefox for ANY secure site.
GREEN is a new additional SSL state for sites with trusted CAs.
This is actually quite good as all users can be taught to treat the YELLOW ones with some caution. Either because they are using an older browser version that doesn't support the GREEN or the site is not properly verified.
I really don't see the problem. It seems like a sensible way to introduce the change.