Re: [http-auth] Tunisian/Syrian phishing attacks
Yaron Sheffer <yaronf@gmx.com> Sat, 11 June 2011 15:09 UTC
Return-Path: <yaronf@gmx.com>
X-Original-To: http-auth@ietfa.amsl.com
Delivered-To: http-auth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 719EE11E80AE for <http-auth@ietfa.amsl.com>; Sat, 11 Jun 2011 08:09:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DoxfYzTJC0V5 for <http-auth@ietfa.amsl.com>; Sat, 11 Jun 2011 08:09:01 -0700 (PDT)
Received: from mailout-eu.gmx.com (mailout-eu.gmx.com [213.165.64.42]) by ietfa.amsl.com (Postfix) with SMTP id 5046811E80B6 for <http-auth@ietf.org>; Sat, 11 Jun 2011 08:09:00 -0700 (PDT)
Received: (qmail invoked by alias); 11 Jun 2011 15:08:58 -0000
Received: from bzq-79-178-38-173.red.bezeqint.net (EHLO [10.0.0.5]) [79.178.38.173] by mail.gmx.com (mp-eu005) with SMTP; 11 Jun 2011 17:08:58 +0200
X-Authenticated: #63966379
X-Provags-ID: V01U2FsdGVkX1/GZ0wv8Y/Gj1bLQf5hqSRn+YJWljsvesydwRSE+E yHVHVG08DBB276
Message-ID: <4DF384FD.10804@gmx.com>
Date: Sat, 11 Jun 2011 18:08:45 +0300
From: Yaron Sheffer <yaronf@gmx.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.17) Gecko/20110414 Lightning/1.0b2 Thunderbird/3.1.10
MIME-Version: 1.0
To: http-auth@ietf.org
References: <mailman.214.1307403028.3017.http-auth@ietf.org>
In-Reply-To: <mailman.214.1307403028.3017.http-auth@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Y-GMX-Trusted: 0
Subject: Re: [http-auth] Tunisian/Syrian phishing attacks
X-BeenThere: http-auth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HTTP authentication methods <http-auth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/http-auth>, <mailto:http-auth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/http-auth>
List-Post: <mailto:http-auth@ietf.org>
List-Help: <mailto:http-auth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/http-auth>, <mailto:http-auth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Jun 2011 15:09:01 -0000
Hi Marsh, a bit of a late response, but I'd like to offer that these two attacks could in fact have been countered by a combination of several ideas that we're already familiar with. Let's assume the following: 1. Users are authenticated to Facebook with a password, using a zero-knowledge password protocol (ZKPP), with authentication at the TLS or the HTTP layer. 2. In any case, authentication is crypto-bound into the TLS-protected session (OK, let's assume Facebook sessions are TLS-protected...). 3. Passwords are stored in the browser's password manager. The browser doesn't "paste" the password into a form; rather, the browser only releases the password when going through the ZKPP. This is done behind the scenes, the user doesn't get to see the plaintext password or even a row of asterisks. 4. This is further hardened with an HSTS-like mechanism: only use this site if you can perform mutual authentication with it. 5. Also, users are trained *not* to enter their passwords explicitly, and will be suspicious when the see a "please enter your password" page. I suggest that this combination is well protected against phishing attacks, without having to rely on trusted JavaScript code or on fancy user interface elements. Thanks, Yaron > From: Marsh Ray<marsh@extendedsubset.com> > To: Nico Williams<nico@cryptonector.com> > Cc: http-auth@ietf.org > Subject: Re: [http-auth] [saag] re-call for IETF http-auth BoF > Message-ID:<4DED55C5.1010306@extendedsubset.com> > Content-Type: text/plain; charset=UTF-8; format=flowed > > On 06/06/2011 04:44 PM, Nico Williams wrote: >> But I'm afraid >> that the appearance of success will be enough to staunch progress in >> any other areas, so it may be a now-or-never situation for any >> alternatives other than JavaScript crypto APIs. > Don't worry about it, they're not going to work even that well. > > They wouldn't have stopped the government of Tunisia from MitMing > Facebook and inserting Javascript to modify the behavior of the page. > They wouldn't have stopped the government of Syria from using a BlueCoat > to perform SSL MitM on Facebook with a bogus self-signed cert either. > > Both governments were arresting and shooting their citizens and hacking > their Facebook credentials. Interestingly, Tunisia controls a trusted > root CA but didn't bother to use it. Syria doesn't control a widely > trusted CA, but doesn't seem to need it either. > > Sooner or later, people will tire of security theater. We can just try > to have the best options available when they do. > > - Marsh
- Re: [http-auth] Tunisian/Syrian phishing attacks Yaron Sheffer
- Re: [http-auth] Tunisian/Syrian phishing attacks Nico Williams
- Re: [http-auth] Tunisian/Syrian phishing attacks Yaron Sheffer