Re: HTTPS Only 3.1 (Detailed Analysis, Browser Security, Open Source, Python)

2016-03-26 Thread Kevin Chadwick
> On Thu, 24 Mar 2016, Kevin Chadwick  wrote:
> > BTW, only allowing Javascript to come from the primary domain over SSL
> > would be a far saner idea, but lets see you get that past Google,
> > facebook and all the other tracking sites?  
> 
> It's possible with content security policy[1][2], but completely
> optional and up to the webmaster (custom header sent by the server).
> Google etc are actually pushing for it.
> 
> [1]: https://en.wikipedia.org/wiki/Content_Security_Policy
> [2]: https://developer.mozilla.org/en-US/docs/Web/Security/CSP

Please, you think that says anything about Google, it doesn't even say
anything about a few Google developers? Google generally works in teams
of four by the way apparently.

Yes I have that enabled on my sites as there is NO javascript at all
but that is next to useless as my sites aren't problem sites.

The noscript extension for firefox appears to increase firefox's
startup use of memory by more than the xombrero browser uses on startup!

Here's a question or two. Why can you not clear any content on browser
shutdown on chrome but can in comodos version called chromodo.

Why are the chrome javascript controls next to useless and hitting
enable has no effect on video sites that try to ensure adverts have
been run?

I could throw in why google are adverse to firewalls but that would
open up more trolling.

I have nothing against Google btw but some of their software design
decisions are as bad as Apples engineering.

Anyway, non of this has anything to do with OpenBSD as I doubt libressl
and it's CA ability would be the chosen solution to any OpenBSD
security problems when there is OpenSSH available and many of the
developers meet regularly enough. So I assume the developers would
agree that it would be good if https everywhere nonsense wasn't brought
up on this list again please.

-- 

KISSIS - Keep It Simple So It's Securable



Re: HTTPS Only 3.1 (Detailed Analysis, Browser Security, Open Source, Python)

2016-03-24 Thread Kamil CholewiƄski
On Thu, 24 Mar 2016, Kevin Chadwick  wrote:
> BTW, only allowing Javascript to come from the primary domain over SSL
> would be a far saner idea, but lets see you get that past Google,
> facebook and all the other tracking sites?

It's possible with content security policy[1][2], but completely
optional and up to the webmaster (custom header sent by the server).
Google etc are actually pushing for it.

[1]: https://en.wikipedia.org/wiki/Content_Security_Policy
[2]: https://developer.mozilla.org/en-US/docs/Web/Security/CSP



Re: HTTPS Only 3.1 (Detailed Analysis, Browser Security, Open Source, Python)

2016-03-24 Thread Kevin Chadwick
> Now, let's look at threats:
> 1. Man in the middle - it's fixed.
> 2. Phishing always requires the browser to load attacker's website, so it's 
> permanently dead here.
> 3. Drive-by Download - dead(if applied strictly, unable to download the 
> executable)
> 4. Clickjacking - dead(attacker's web page is unreachable)
> 5. Address Spoofing - dead too(just unable to load the fake content)
> 6. XSS - almost dead(for attacker, the XSS vulnerability has to be GET, 
> because POST requires attacker's HTML)
> 7. CSRF - almost dead(for attacker, the CSRF vulnerability has to be GET, and 
> modern web applications simply don't do 
> important things in GET, because it can be bookmarked etc, too dangerous)

BTW, only allowing Javascript to come from the primary domain over SSL
would be a far saner idea, but lets see you get that past Google,
facebook and all the other tracking sites?

-- 

KISSIS - Keep It Simple So It's Securable



Re: HTTPS Only 3.1 (Detailed Analysis, Browser Security, Open Source, Python)

2016-03-24 Thread Kevin Chadwick
> To secure browser which is very fragile, the approach of HTTPS Only 3.1 is 
> exceptionally simple:

Please help make widespread browsers "Simple" firefox now takes > 200M
mem without any tabs open and chrome is > 70M to download.

Xombrero uses 30-45 M of mem

> 1. Only HTTPS URLs(no other protocols)
> 2. Whitelist of domains(anything outside of whitelist is blocked)
> 
> Now, let's look at threats:
> 1. Man in the middle - it's fixed.
> 2. Phishing always requires the browser to load attacker's website, so it's 
> permanently dead here.
> 3. Drive-by Download - dead(if applied strictly, unable to download the 
> executable)
> 4. Clickjacking - dead(attacker's web page is unreachable)
> 5. Address Spoofing - dead too(just unable to load the fake content)
> 6. XSS - almost dead(for attacker, the XSS vulnerability has to be GET, 
> because POST requires attacker's HTML)
> 7. CSRF - almost dead(for attacker, the CSRF vulnerability has to be GET, and 
> modern web applications simply don't do 
> important things in GET, because it can be bookmarked etc, too dangerous)
> 

So you want to avoid attacks caused by people who don't know what they
are doing with making DDOS more effective and the most widespread
attack that affects everyone??

> URLs:
> Project Home Page: https://www.httpsonly.net/View Source Code: 
> https://www.httpsonly.net/source/
> Kind Regards,
> 
> I'm not the owner of this software, just wanted to share the idea. Have a
> nice day!

I assume you are a Troll. Please don't be a Troll, Thankyou.

-- 

KISSIS - Keep It Simple So It's Securable



HTTPS Only 3.1 (Detailed Analysis, Browser Security, Open Source, Python)

2016-03-23 Thread HTTPS Only
Hello all! http://seclists.org/fulldisclosure/2016/Mar/77 HTTPS Only 3.1
(Detailed Analysis, Browser Security, Open Source, Python)



From: David Leo 
Date: Wed, 23 Mar 2016 01:58:43 -0700



To secure browser which is very fragile, the approach of HTTPS Only 3.1 is 
exceptionally simple:
1. Only HTTPS URLs(no other protocols)
2. Whitelist of domains(anything outside of whitelist is blocked)

Now, let's look at threats:
1. Man in the middle - it's fixed.
2. Phishing always requires the browser to load attacker's website, so it's 
permanently dead here.
3. Drive-by Download - dead(if applied strictly, unable to download the 
executable)
4. Clickjacking - dead(attacker's web page is unreachable)
5. Address Spoofing - dead too(just unable to load the fake content)
6. XSS - almost dead(for attacker, the XSS vulnerability has to be GET, because 
POST requires attacker's HTML)
7. CSRF - almost dead(for attacker, the CSRF vulnerability has to be GET, and 
modern web applications simply don't do 
important things in GET, because it can be bookmarked etc, too dangerous)

URLs:
Project Home Page: https://www.httpsonly.net/View Source Code: 
https://www.httpsonly.net/source/
Kind Regards,

I'm not the owner of this software, just wanted to share the idea. Have a
nice day!