Re: Let's be paranoid about CSS (cascaded style sheet) as an application data integrity attack vector!

2008-09-09 Thread nico
On Tue, Sep 09, 2008 at 01:52:30PM -0500, Thierry Moreau wrote:
> Here is a simple exploit which alters the ietf.org main page. Insert the 
> following four lines
>
> [...]
>
> to the file /usr/lib/firefox/res/html.css
>
> [...]
>
> OK, this requires root access because the Linux community is generally 
> security-conscious. But you should see the general idea: paranoia leads me 
> to think of an adversary who would threatens application integrity (such as 
> the above) without leaving much trace of computer system penetration.
>
> [...]
>
> Does anybody have any tip about how to mitigate this vulnerability, with 
> minimal assumptions about the client web browser?

As the service provider you have little choice but to assume local
security on the client side IF you want to allow clients that you don't
control (and you don't really have a choice about _that_; most SPs don't
anyways).

I don't see how to mitigate all possible attacks you can imagine that
involve a compromised client.

> The habit of storing css style information in various style sheets files 
> separate from the HTML contents is worrysome as each stylesheet retrieval 
> operation is a potential attack vector.

You could say the same thing about AJAX, ...  This train left the
station long ago, and I was on it then along with everyone else.

Nico
-- 

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: once more, with feeling.

2008-09-09 Thread James A. Donald

Peter Gutmann wrote:
Unfortunately I think the only way it (and a pile of other things as well) may 
get stamped out is through a multi-pronged approach that includes legislation, 
and specifically properly thought-out requirements rather than big-business- 
bought legislation like UCITA/UCC or easily-circumvented recommendations like 
the FFIEC ones (the banks quickly discovered that by redefining "two-factor 
auth" to mean "twice as much one-factor auth" they could meet the requirements 
without having to do anything to improve security).


The average cryptographic expert finds it tricky to set up something 
that is actually secure.  The average bureaucrat could not run a pie 
stand.  Legislation and so forth requires wise and good legislators and 
administrators, which is unlikely.


Visualize Obama, McCain, or Sarah Palin setting up your network 
security.  Then realize that whoever they appoint as Czar in charge of 
network security is likely to be less competent than they are.




I'm saying that under the influence of "Zero Day Threat" by Byron Acohido and
Jon Swartz, which looks at some of the financial and credit-reporting industry
practices that make identity fraud possible.  If you haven't read this
already, go and get it now, apart from the annoyingly frequent context-
switching between threads (one every few pages instead of the more usual one
per chapter) it's a very scary read.  Given what it reveals about how the US
financial/credit reporting industry works it should really be subtitled "We're
all going to die", since there's no obvious handbrake mechanism present in the
system to slow down identity theft - the rate-limiting step is the fact that
the crooks simply can't use all the stolen identities they have, not any
security measures that may be present.  If you don't believe me, visit any of
the hits from the following search:

  http://www.google.com/search?q=fullz+dumps

(that's the easiest way to demo the problem to the masses without requiring
people to learn to read cyrillic first :-).

Yup, we're all going to die.


So that there becomes a directly attributable financial impact to the sites
that deploy in that way.


The "financial impact" point is the key word, at the moment it's cheaper and
easier for the banks/credit reporting companies to be non-compliant/insecure
than it is for them to be secure.  I'm not sure that the browser is the most
effective way to hit them over this though.

Discuss :-).

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Bletchley Park restoration

2008-09-09 Thread Jerrold Leichter

[Moderator's note: I posted on this earlier, but I really do want to
see Bletchley Park maintained... :) --Perry]

IBM and PGP have donated $100,000 to help restore and maintain  
Bletchley Park as a museum.  This money is intended to get others  
involved - millions more will be needed.


Details:

http://news.bbc.co.uk/2/hi/technology/7604762.stm

-- Jerry


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: More US bank silliness

2008-09-09 Thread Florian Weimer
* Peter Gutmann:

> On a semi-related topic, it'd be interesting to get some discussion about FF3 
> removing the FF2 SSL indicators of the padlock and (more visibly) the 
> background colour-change for the URL bar when SSL is active and replacing it 
> with a spoof-friendly indicator that's part of the favicon, i.e. part of the 
> attacker-controlled content.

To keep this in perspective, note that you could disable the location
bar altogether in FF2 (and that default changed in FF3), so the FF3
approach is actually an improvement.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Let's be paranoid about CSS (cascaded style sheet) as an application data integrity attack vector!

2008-09-09 Thread Thierry Moreau

Dear security experts:

Suppose I want to use the HTML syntax and a plain web browser as a user 
interface for a secure application. By "secure", I mean, among other 
things, that the application service provider is confident that the user 
sees the HTML contents without integrity vulnerabilities. Of course, 
https is the only allowed protocol for reaching this web page, and the 
only protocol present in any link from this page to a next one.



I am now concerned about the default and implicit style sheets that the 
web browser uses for HTML content rendering.



Here is a simple exploit which alters the ietf.org main page. Insert the 
following four lines


a[title="IETF Secretariat"]:before
{content: "Don't trust the "}
a[title="IETF Secretariat"]:after
{content: " for anything security-critical."}

to the file /usr/lib/firefox/res/html.css

then restart the Mozilla Firefox and bingo, the itef.org main page is 
subrepticiously changed. I.e. the link to "IETF Secretariat" is canged 
to "Don't trust the IETF Secretariat for anything security-critical."



OK, this requires root access because the Linux community is generally 
security-conscious. But you should see the general idea: paranoia leads 
me to think of an adversary who would threatens application integrity 
(such as the above) without leaving much trace of computer system 
penetration.



This attack vector is trivial based on the HTML markup language 
philosophy - the above "exploit" merely alters default settings in a 
parameter specifications language (css) having a fine grained 
expressivity potential. CSS is about what the user sees when HTML 
contents is displayed on a media (typically a web browser.



Does anybody have any tip about how to mitigate this vulnerability, with 
minimal assumptions about the client web browser?



The basic idea would be to "patch" any default setting (that could alter 
the user display ...) in the CSS specifications with explicit parameter 
setting associated with the HTML contents. In the above case, the IETF 
can protect itself with the following HTML markup text near the 
beginning of the file:


:before{content:""}:after{content:""}


The habit of storing css style information in various style sheets files 
separate from the HTML contents is worrysome as each stylesheet 
retrieval operation is a potential attack vector.



Thanks in advance. More specifically, with the hope that paranoia can 
sometimes be a productive state of mind, I remain paranoid-ly grateful 
for your answers.



--

- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, Qc
Canada   H2M 2A1

Tel.: (514)385-5691
Fax:  (514)385-5900

web site: http://www.connotech.com
e-mail: [EMAIL PROTECTED]


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: once more, with feeling.

2008-09-09 Thread dan

Peter Gutmann writes, in part:
-+
 | ... - the rate-limiting step is the fact that
 | the crooks simply can't use all the stolen identities
 | they have, not any security measures that may be present.
 | ...


To my knowledge, you are correct.  It seems that the
price of stolen credentials (on the black market) is
falling, which, as with the street price of heroin, would
tend to indicate that the opposition is winning.

I have a slide for this somewhere (not on this machine)
and will dig it up if needed, but the disparity between
actual crime and a naive estimate of the opportunity for
crime seems to be widening.  If correct, then such a
disparity would either indicate that our countermeasures
are winning -or- the predators are leaving prey on the
field.  I'm sadly of the opinion that it is the latter.

In their Internet Security Threat Report, Symantec used
to publish the number of bots detected.  The last one of
those I have at hand showed a leveling out of the number
found de novo per unit interval (per month).  Again, this
permits two interpretations; on the one hand, we are winning
in that we are preventing the problem from worsening while
on the other hand it can be read to mean that as fast as
we remove bots from hosts that other hosts are botted
and, as such, the supply of bots being stable implies
that it is easy enough to replace them that the lost of
an individual host does not slow down our opposition.
What does (in the Symantec graphs) vary is the variance
of in-and-out-flow, but not the fraction that are botted.
This would tend to strengthen the argument that any
periodic sweep of bots off networks is compensated
for relatively quickly.  In public health, widely
varying incidence (new infection rate) but stable
prevalence (infected fraction) tends to indicate
a high degree of infectability and not a particularly
effective immune response.  We see this in a way in
the AIDS data -- every advance in treatability seems
to be followed by increases in risky behavior while
prevalence remains to a degree stable.

This idea of replacement of cured machines by infected
machines seems corroborated in a different way as well.
The opposition seems to have lately decided that the
advantages of stealth outway the advantages of persistence,
which is to say that in-core-only infection is now the
preferred mechanism and not writing to disk so as to
preserve infected status through a reboot cycle.  If
this is correct, then it signals that the opposition
can replace machines lost through reboot easily enough
that the availability of penetrated machines can be
better enhanced through making infections harder to
find (latent, in medical parlance) than through making
a once penetrated machine stay penetrated as to do the
latter you have to expose yourself to periodic clean-up
of that which is persistent (on disk).

For anyone looking ahead, the interaction between this
phenomenon (if it is indeed a phenomenon) and the growing
role of virtual machines should be of intense interest.

Inferentially yours,

--dan

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


US firms donate $100,000 to help save Bletchley Park

2008-09-09 Thread Perry E. Metzger

Excerpt:

   The Americans have joined the campaign to save Bletchley Park, the
   home of code breaking during the Second World War, as well as of
   Britain's computing heritage, with IBM and computer security
   specialist PGP already pledging 57,000 pounds (about $100,000) to
   secure the facility's future.

   The donation will help restore exhibits at the National Museum of
   Computing in Bletchley Park[...]

http://www.eetimes.com/rss/showArticle.jhtml?articleID=210600420

-- 
Perry E. Metzger[EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: once more, with feeling.

2008-09-09 Thread Peter Gutmann
Darren J Moffat <[EMAIL PROTECTED]> writes:

>I believe the only way both of these highly dubious deployment practices will
>be stamped out is when the browsers stop allowing users to see such web pages.

Unfortunately I think the only way it (and a pile of other things as well) may 
get stamped out is through a multi-pronged approach that includes legislation, 
and specifically properly thought-out requirements rather than big-business- 
bought legislation like UCITA/UCC or easily-circumvented recommendations like 
the FFIEC ones (the banks quickly discovered that by redefining "two-factor 
auth" to mean "twice as much one-factor auth" they could meet the requirements 
without having to do anything to improve security).

I'm saying that under the influence of "Zero Day Threat" by Byron Acohido and
Jon Swartz, which looks at some of the financial and credit-reporting industry
practices that make identity fraud possible.  If you haven't read this
already, go and get it now, apart from the annoyingly frequent context-
switching between threads (one every few pages instead of the more usual one
per chapter) it's a very scary read.  Given what it reveals about how the US
financial/credit reporting industry works it should really be subtitled "We're
all going to die", since there's no obvious handbrake mechanism present in the
system to slow down identity theft - the rate-limiting step is the fact that
the crooks simply can't use all the stolen identities they have, not any
security measures that may be present.  If you don't believe me, visit any of
the hits from the following search:

  http://www.google.com/search?q=fullz+dumps

(that's the easiest way to demo the problem to the masses without requiring
people to learn to read cyrillic first :-).

Yup, we're all going to die.

>So that there becomes a directly attributable financial impact to the sites
>that deploy in that way.

The "financial impact" point is the key word, at the moment it's cheaper and
easier for the banks/credit reporting companies to be non-compliant/insecure
than it is for them to be secure.  I'm not sure that the browser is the most
effective way to hit them over this though.

Discuss :-).

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


"usable security" at www.usable.com

2008-09-09 Thread Alan Barrett
www.usable.com has launched a new password management service intended
to make it easy to login to participating web sites.  However, I don't
see any details of the protocols or algorithms.  In particular, I don't
see any mention of whether or not the system even attempts to prevent
people with access to the servers at usable.com from having the ability
to impersonate users of the service.

--apb (Alan Barrett)

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: More US bank silliness

2008-09-09 Thread Peter Gutmann
Sebastian Krahmer <[EMAIL PROTECTED]> writes:

>This reminds me the most weird SSL related error message I have ever seen and
>which is there since ages:
>
>https://www.fbi.gov
>
>Beside that the certificate is wrong :-)

That's an artefact of the SSL MITM that Akamai performs for sites that are
hosted via their service (and up until Kevin Fu pointed out that this was a
problem, any random site you want as well).  You usually don't see this
though, so it's indicative of a configuration error somewhere...

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Student hacker exposes Carleton U cash, ID card security holes

2008-09-09 Thread rgb
Student hacker exposes Carleton U cash, ID card security holes

http://www.cbc.ca/canada/ottawa/story/2008/09/08/ot-security-080908.html

"A Carleton University student has revealed that he stole data containing
e-mail passwords, financial data and library account information from 32
students at the university in order to expose security holes in the system.

The card's design for both financial and identification purposes and its
"inadequate safeguards against information leakage" could lead to identity or
financial fraud, said the 20-year-old student of the Ottawa university in a
document e-mailed to the victims Sunday evening under the alias Kasper
Holmberg."

...

There's a few inconsistencies in this story, first claiming that this student
is from one university in Ottawa, Ontario, then the other, except that Ottawa
University is in Ottawa, Kansas while the University of Ottawa is in Ottawa,
Ontario.  CBC should have been able to get those mundane details right so who
knows about the other details...

As usual, the institution involved missed the point...

slainte mhath, RGB

-- 
Richard Guy Briggs   --  ~\-- ~\
--  \___   o \@   @   Ride yer bike!
Ottawa, ON, CANADA  --  Lo_>__M__\\/\%__\\/\%
Vote! -- _GTVS6#790__(*)__(*)(*)(*)_

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: once more, with feeling.

2008-09-09 Thread Cat Okita

On Mon, 8 Sep 2008, Adam Shostack wrote:

What makes now the perfect time to address an issue which has been
present for quite soem time?


I'd turn that question around, and ask what makes now such a bad time to
address an issue that's been present (and not addressed) for quite some
time... ?

Surely the recent DNS fiasco was enough of an illustration of the merits
of not worrying about something that's been a well known issue for ages...

cheers!
==
"A cat spends her life conflicted between a deep, passionate and profound
desire for fish and an equally deep, passionate and profound desire to
avoid getting wet.  This is the defining metaphor of my life right now."

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]