Frank Hecker wrote:
I thought this was interesting:

http://media.timewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254369


The basic summary: AOL will try to block AOL members' attempts to connect to phishing sites, using a blacklist of suspected phishing sites provided by Cyota <http://www.cyota.com/>.


Some brief comments:

* In theory this approach is not dependent on any browser features, since at a minimum AOL as an ISP could just block connection attempts "in the cloud". However it may be that AOL is planning some special UI in the AOL client to support phishing-specific warning messages. The press release is not clear on whether this feature will work with non-AOL clients connecting through the AOL network.


The approach is also similar to that of Netcraft's
plugin and I think Trustbar and/or Comodo might have
similar intentions.


* This approach is also not dependent on SSL, much less on CA revocation of SSL certs. It's also presumably significant faster to detect and shutdown sites than an approach based on OCSP validation of certs, since IIRC the current state of OCSP is that the timeframe for revocation is driven by the schedule for issuance of CRLs, i.e., the results of an OCSP check are not necessarily any more up to date than the results of a CRL check.


The average basket of slave boxes was something like
10k for $500 .. these are scary numbers;  and it makes
me wonder just how one goes about shutting down a
distributed attack with any speed.  Even if you know
all the 10k IP numbers up front, I'd imagine your
router admins would have some rude things to say about
being asked to block so many.


* This approach is obviously analogous to anti-spam blacklists. Whether it will be more effective in practice than anti-spam blacklists is an open question; I can think of points both for and against this. However certainly anything that limits the expected lifetime of a phishing site is a good thing, and if browsers and other factors were to force phishing sites to use domain names (as opposed to IP addresses) and SSL certificates (even domain-validated ones) then this puts a minimum cost in place per phishing site to weigh against the expected revenue for the few hours a site might be up before being blocked.


I suspect that the blacklist provider will come under
serious attack, both in concert with phishing attacks,
and more strategically.  Do they have the werewithall
to be a single point of failure?



* It is interesting to contemplate Cyota or someone else offering an analogous service to individual users, e.g., implemented through an IE add-on or Firefox extension that does real-time checks of the blacklist.


This is more or less there with Netcraft's plugin,
has anyone tried it?

All in all, I am skeptical;  I think it moves the bar
up a few cm, but more steroids moves it down again, so
it's another short term fix like the 2 factor tokens
that are being sold now.  We'll see!  It's a free market
in security solutions.

iang
--
News and views on what matters in finance+crypto:
        http://financialcryptography.com/
_______________________________________________
Mozilla-security mailing list
[email protected]
http://mail.mozilla.org/listinfo/mozilla-security

Reply via email to