ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 6262 Spring 2009
Advertisements

Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Why Eve & Mallory Love Android
Browser Security Modes Alex Crowell and James Kasten.
HTTPS and the Lock Icon Dan Boneh. Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly) How to use HTTPS Integrating.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
THE CASE FOR PREFETCHING AND PREVALIDATING TLS SERVER CERTIFICATES Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh Presented by:
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
The OWASP Foundation Risks of Insecure Communication High likelihood of attack Open wifi, munipical wifi, malicious ISP Easy to exploit.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
The Inconvenient Truth about Web Certificates Jean-Pierre Hubaux Joint work with N. Vratonjic, J. Freudiger and V. Bindschaedler Work presented at WEIS.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Beware of Finer-Grained Origins
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
The Inconvenient Truth about Web Certificates Nevena Vratonjic Julien Freudiger Vincent Bindschaedler Jean-Pierre Hubaux June 2011, WEIS’11.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
By Swapnesh Chaubal Rohit Bhat. BEAST : Browser Exploit Against SSL/TLS Julianno Rizzo and Thai Duong demonstrated this attack.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Towards a Formal Foundation of Web Security devdatta akhawe / adam barth / peifung eric lam john mitchell / dawn song.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cookies Set a cookie – setcookie() Extract data from a cookie - $_COOKIE Augment user authentication script with a cookie.
Psiphon Program By Amine Moubtasim.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Reliability & Desirability of Data
Robust Defenses for Cross-Site Request Forgery CS6V Presented by Saravana M Subramanian.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
JavaScript, Fourth Edition
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Robust Defenses for Cross-Site Request Forgery
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Robust Defenses for Cross-Site Request Forgery Adam Barth, Collin Jackson, John C. Mitchell Stanford University 15th ACM CCS.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Ethical Hacking: Hacking GMail. Teaching Hacking.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cross-site request forgery Collin Jackson CS 142 Winter 2009.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Utkarsha MishraCOMPSCI 725 David Silver, Suman Jana, Eric Chen, Collin Jackson, and Dan Boneh. “Password Managers: Attacks and Defenses.” In Proceedings.
Lecture 16 Page 1 CS 236 Online Exploiting Statelessness HTTP is designed to be stateless But many useful web interactions are stateful Various tricks.
Session Management Tyler Moore CS7403 University of Tulsa Slides adapted in part or whole from Dan Boneh, Stanford CS155 1.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Secure Software Confidentiality Integrity Data Security Authentication
How to Check if a site's connection is secure ?
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Automatic and Precise Client-Side Protection against CSRF Attacks
Welcome and thank you for choosing SharkGate
Riding Someone Else’s Wave with CSRF
Web Security Advanced Network Security Peter Reiher August, 2014
Presentation transcript:

ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth

Network Attacks •Eavesdrop or corrupt network traffic –Wireless networks –ISP –Pharming •Defense: HTTPS –Protects passwords –Use “Secure” cookies to protect session

HTTPS Errors •Intentional errors –Prevent passive attacks •Unintentional errors –Expired certs –Wrong cert installed •Misconfiguration or attack? –Browser doesn’t know –User doesn’t know

Threat Model •Active network attacker –Controls the network –Has a valid CA certificate for attacker.com –Does not have a valid CA certificate for bank.com •User –Clicks through certificate errors –Only types bank password at –If applicable, uses 2-factor auth (e.g. SiteKey) correctly

Proposal: ForceHTTPS •Site sets a “ForceHTTPS” cookie –Opts in to strict error processing –Not interested in compatibility –Treat errors as an attack, not a misconfiguration •Specification: –Non-HTTPS connections redirect to HTTPS –HTTPS errors treated as fatal –Importing non-HTTPS content (mixed content) fails

Case Study: PayPal •Wants to host entire website over HTTPS –HTTP redirects to HTTPS –User may arrive by typing " –Links pointing to HTTP –Cert errors on some dark corners… –Strong desire to prevent mixed content

Case Study: Bank of America •Separate domain for logged-in users •Session identifier stored in “Secure” cookie •Second factor stored in “Secure” cookie •Wants to prevent phishing, pharming

Case Study: Gmail •Login form always over HTTPS •Imperfect web developers

Use of non-Secure Cookies •Mail available over both HTTP and HTTPS •New account, always visited over HTTPS •Compromised by passive network attacker

Implementation •Firefox extension –Available for download at forcehttps.com –Monitors all network connections –Blocks connections with cert errors for sites that opt-in –Blocks mixed content for sites that opt-in •User-enabled protection –ForceHTTPS enabled for known-compatible sites –Safer Gmail at security conferences

Eliminating Mixed Content •Users can enable ForceHTTPS for any site –Few sites work perfectly “out of the box” –Logs mixed content errors to developer console –Found many issues with real sites just by browsing –Want to extend to combine with a web app scanner

Trick: Scheme Relative URLs •Mixed content is hard to avoid –Often host same content over HTTP and HTTPS –Only want to pay for HTTPS when needed •Omit the scheme •Works in all browsers

Related Work: Firefox 3 •Firefox 3 – Four clicks –User override harder –Controversial balance •Security •Compatibility –Low-security sites •Harder to use –High-security sites •User can still override •How will users react?

Related Work: WSKE •Web Server Key-Enabled Cookies –Secure cookies only sent for same TLS key –Intended to secure the user’s second-factor cookie

Related Work: Locked SOP •Augment same-origin policy with cert info –“Broken” HTTPS page can’t script valid HTTPS page •Importing libraries ignore scripting policy – –User clicks through cert error for paypalobjects.com –Real PayPal imports script from paypalobjects.com –Attacker runs script as “unbroken” PayPal Sites cannot safely use, CSS, SWF, etc

Conclusions •Browsers trade off security for compatibility –High-security sites want more security –Browser can be stricter if sites opt-in –Simple kind of “content restriction” •ForceHTTPS –“Please enable strict HTTPS error processing” –Strong threat model, difficult to get mechanism right –More details in the paper •Denial of service, error recovery, cookie integrity, privacy, etc