Opera Fixes IDN Spoofing in Opera 8.0 Beta 2 17
Opera Watch writes "Opera has introduced a fix for the IDN spoofing security vulnerability in its latest beta version. The new version, Opera 8.0 beta 2, was released today on its FTP directory. No official announcement from Opera yet. Opera has created a white list for safe top-level domain names which include .no, .jp, .de, .se, .kr, .tw, .cn, .at, .dk, .ch, and .li. Sites not in the white list will show the encoded domain (with the IDN characters) in the URL field. The list is updated automatically when Opera checks for a new version."
Re:Why a whitelist? (Score:2)
Re:Why a whitelist? (Score:2)
But your point is valid. Many businesses set up contry-specific websites (e.g., amazon.co.uk), so those sites will be vulnerable to this spoofing for Opera users using local sites in those countries.
Re:Why a whitelist? (Score:2)
I agree that a whitelist is only a work-around, but if you only whitelist the countries who would be more likely to use UTF-8 for real sites with their own characterset (rather than to spoof other sites), it isn't too bad to use right now.
Re:Why a whitelist? (Score:2)
discussion @ opera.com (Score:3, Informative)
Need a standardised solution. (Score:1)
Why is this so hard to fix? (Score:2)
This way http://www.mïçrõft.c
Because... (Score:2)
Re:Because... (Score:2)
Trademarks exist for a reason...to prevent confusion for consumers. You are from Canada, so answer me this: would the Canadian government grant two trademarks that were otherwise identical except for one had a '
Re:Because... (Score:1)
Whitelists ignrore third-level domains. (Score:3, Interesting)
For example, ωωω.paypal.jp (using greek omega). This can be combined with a DNS cache attack.
-molo
Re:Whitelists ignrore third-level domains. (Score:1, Interesting)
If you're talking about making misleading third level domains under your own domain name, there's also no need to spoof anything. It's already possible to set up paypal.mydomain.com without having to resort to obscure character sets.
Re:Whitelists ignrore third-level domains. (Score:3, Insightful)
Say for example I'm a phisher and am trying this attack. I send my phishing spam to all of the earthlink.net accounts I have, using the IDN url. At the same time, I start a DNS cache poisoning atta