HTTPS and the Lock Icon Faisal Karim Shaikh Slides by Dan Boneh.

Slides:



Advertisements
Similar presentations
1 IEEE Symposium on Security and Privacy, May 2009 Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang Microsoft Research Purdue University May 20 th, 2009.
Advertisements

Why Eve & Mallory Love Android
ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
HTTPS and the Lock Icon Dan Boneh. Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly) How to use HTTPS Integrating.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Dan Boneh Web security HTTPS and the Lock Icon. Dan Boneh Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly)
SSLstrip Stepan Shykerynets
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?
More Trick For Defeating SSL
SSL, HTTPS and the Lock Icon Borrowed from Dan Boneh & others.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
SSL Serguei Mokhov SOEN321, Fall Contents Background SET SSL –origins –protocol.
DNS and HTTPs ACN Presentation. Domain Names We refer to computers on the Internet (Internet hosts), by names like: sharda.ac.in These are called domain.
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
The OWASP Foundation Risks of Insecure Communication High likelihood of attack Open wifi, munipical wifi, malicious ISP Easy to exploit.
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Protected Extensible Authentication Protocol
Beware of Finer-Grained Origins
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Computer Science Public Key Management Lecture 5.
CSCI 6962: Server-side Design and Programming
Web Security Sankar Roy 1. Acknowledgement While preparing the presentation slides and the demo, I received help from Professor Eugene Vasserman Professor.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Secure Socket Layer (SSL)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Robust Defenses for Cross-Site Request Forgery CS6V Presented by Saravana M Subramanian.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
Ram Santhanam Application Level Attacks - Session Hijacking & Defences
1 Robust Defenses for Cross-Site Request Forgery Adam Barth, Collin Jackson, John C. Mitchell Stanford University 15th ACM CCS.
Integrating and Troubleshooting Citrix Access Gateway.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Can SSL and TOR be intercepted? Secure Socket Layer.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Lecture 16 Page 1 CS 236 Online Exploiting Statelessness HTTP is designed to be stateless But many useful web interactions are stateful Various tricks.
Session Management Tyler Moore CS7403 University of Tulsa Slides adapted in part or whole from Dan Boneh, Stanford CS155 1.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Web security HTTPS and the Lock Icon.
Web security HTTPS and the Lock Icon.
Avishai Wool Slides credit: Dan Boneh, John Mitchell
Practical Censorship Evasion Leveraging Content Delivery Networks
How to Check if a site's connection is secure ?
CS 142 Lecture Notes: Network Security
Using SSL – Secure Socket Layer
Web security HTTPS and the Lock Icon.
CS 142 Lecture Notes: Network Security
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
CS 142 Lecture Notes: Securing the Connection
CS 142 Lecture Notes: Network Security
Presentation transcript:

HTTPS and the Lock Icon Faisal Karim Shaikh Slides by Dan Boneh

Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly) How to use HTTPS Integrating HTTPS into the browser Lots of user interface problems to watch for

Threat Model: Network Attacker Network Attacker: Controls network infrastructure: Routers, DNS Passive attacker: only eavesdrops on net traffic Active attacker: eavesdrops, injects, blocks, and modifies packets Examples: Wireless network at Internet Café Internet access at hotels (untrusted ISP)

SSL/TLS overview Alice Enc m c Bob Dec c m PK Bob SK Bob Bob generates (SK Bob, PK Bob ) Alice: using PK Bob encrypts messages and only Bob can decrypt Public-key encryption:

Certificates How does Alice (browser) obtain PK Bob ? CA PK and proof “I am Bob” Browser Alice SK CA check proof issue Cert with SK CA : Bob’s key is PK choose (SK,PK ) Server Bob PK CA verify Cert Bob uses Cert for an extended period (e.g. one year) PK CA

Certificates: example Important fields:

Certificates on the web Subject’s CommonName can be: An explicit name, e.g. cs.stanford.edu, or A name with a wildcard character, e.g. *.stanford.edu or cs*.stanford.edu matching rules: IE8: “ * ” must occur in leftmost component, does not match “.” example: *.a.com matches x.a.com but not y.x.a.com FF4: “ * ” matches anything

Certificate Authorities Browsers accept certificates from a large number of CAs

Brief overview of SSL/TLS browser server SK client-hello server-hello + server-cert ( PK ) key exchange (several options) Finished cert client-key-exchange: E(PK, k) rand. k k HTTP data encrypted with KDF(k) Most common: server authentication only

Integrating SSL/TLS with HTTP  HTTPS Two complications Web proxies solution: browser sends CONNECT domain-name before client-hello (dropped by proxy) Virtual hosting: two sites hosted at same IP address. solution in TLS 1.1: SNI (RFC 4366) client_hello_extension: server_name=cnn.com implemented in FF2 and IE7 (vista) web proxy web server corporate network web server cert CNN cert FOX client-hello server-cert ???

Why is HTTPS not used for all web traffic? Slows down web servers Breaks Internet caching ISPs cannot cache HTTPS traffic Results in increased traffic at web site Incompatible with virtual hosting (older browsers)

HTTPS in the Browser

The lock icon: SSL indicator Intended goal: Provide user with identity of page origin Indicate to user that page contents were not viewed or modified by a network attacker In reality: Origin ID is not always helpful example: MUET is hosted at NEXUS.com.pk Many other problems (next few slides)

When is the (basic) lock icon displayed All elements on the page fetched using HTTPS (with some exceptions) For all elements: HTTPS cert issued by a CA trusted by browser HTTPS cert is valid (e.g. not expired) CommonName in cert matches domain in URL

The lock UI: help users authenticate site IE7:

The lock UI: help users authenticate site Firefox 3: (SSL) (no SSL)

The lock UI: help users authenticate site Firefox 3: clicking on bottom lock icon gives

The lock UI: Extended Validation (EV) Certs Harder to obtain than regular certs requires human lawyer at CA to approve cert request Designed for banks and large e-commerce sites Helps block “semantic attacks”:

A general UI attack: picture-in-picture Trained users are more likely to fall victim to this [JSTB’07]

HTTPS and login pages: incorrect version Users often land on login page over HTTP: Type site’s HTTP URL into address bar, or Google links to the HTTP page <form method="post" action=" View source:

HTTPS and login pages: guidelines General guideline: Response to should beRedirect:

Problems with HTTPS and the Lock Icon

1.Upgrade from HTTP to HTTPS 2.Semantic attacks on certs 3.Invalid certs 4.Mixed content HTTP and HTTPS on the same page 5.Origin contamination Weak HTTPS page contaminates stronger HTTPS page

1. HTTP  HTTPS upgrade Common use pattern: browse site over HTTP; move to HTTPS for checkout connect to bank over HTTP; move to HTTPS for login Easy attack: prevent the upgrade (ssl_strip) [Moxie’08]  Location: https ://...  Location: http ://... (redirect)  web server attacker SSLHTTP

Tricks and Details Tricks: drop-in a clever fav icon Details: Erase existing session and force user to login: ssl_strip injects “Set-cookie” headers to delete existing session cookies in browser. Number of users who detected HTTP downgrade: 0 

Defense: Strict Transport Security (STS) Header tells browser to always connect over HTTPS After first visit, subsequent visits are over HTTPS self signed cert results in an error STS flag is stored in non-volatile browser memory not deleted when user “clears private data” note: enables strong user tracking web server Strict-Transport-Security max-age=31 ⋅ 10 6 ;

2. Semantic attacks on certs International domains: xyz.cn Rendered using international character set Observation: chinese character set contains chars that look like “/” and “?” and “.” and “=” Attack: buy domain cert for *.badguy.cn setup domain called: note: single cert *.badguy.cn works for all sites Extended validation (EV) certs may help defeat this

[Moxie’08]

3. Invalid certs Examples of invalid certificates: expired: current-date > date-in-cert CommonName in cert does not match domain in URL unknown CA (e.g. self signed certs) Small sites may not want to pay for cert Users often ignore warning: Is it a misconfiguration or an attack? User can’t tell. Accepting invalid cert enables man-in-middle attacks (see )

Man in the middle attack using invalid certs Attacker proxies data between user and bank. Sees all traffic and can modify data at will. bank attacker ClientHello BankCertBadguyCert ServerCert (Bank) ServerCert (Badguy) GET bad cert warning! SSL key exchange k1k1 k1k1 k2k2 k2k2 HTTP data enc with k 1 HTTP data enc with k 2

Statistics 25% of active web sites support HTTPS (port 443) Only 3% of HTTPS sites have proper cert: For 97% of sites domain name does not match Common Name in cert Source: Qualys, June 2010

Firefox: Invalid cert dialog Firefox 3.0: Four clicks to get firefox to accept cert page is displayed with full HTTPS indicators

4. Certificate Issuance Woes Wrong issuance: 2011: Comodo RA hacked, issues certs for Gmail, Yahoo! Mail, and Hotmail. Rogue CA:  2009: Etisalat CA in UAE Signs software patch on behalf of RIM  PacketForensics: HTTPS MiTM for law enforcement (see also crypto.stanford.edu/ssl-mitm ) ⇒ enables eavesdropping w/o a warning in user’s browser

Possible solution: Perspectives [WAP’08] Firefox with Perspectives extension web site client-hello server-hello and cert notary Perspectives cert common or unique Browser can reject unique certs Perspectives root PK embedded in extension Problem: what if responder is unreachable?

5. Mixed Content: HTTP and HTTPS Page loads over HTTPS, but contains content over HTTP (e.g. ) IE7: displays mixed-content dialog and no SSL lock Firefox 3.0: displays `!’ over lock icon (no dialog by default) Both browsers: Flash swf file over HTTP does not trigger warning !! note: Flash can script the embedding page Safari: does not attempt to detect mixed content

Mixed Content: HTTP and HTTPS silly dialogs IE7: No SSL lock in address bar:

Mixed Content: HTTP and HTTPS Firefox 3.0: No SSL indicator in address bar Clicking on bottom lock gives:

Mixed content and network attacks banks: after login all content served over HTTPS Developer error: somewhere on bank site write Active network attacker can now hijack session Better way to include content: served over the same protocol as embedding page

An Example From an Online Bank … var so = new SWFObject(" http ://mfasa.chase.com/auth/device.swf",... network attacker can modify SWF file and hijack session (the site has been fixed)

6. Origin Contamination: an example safeLock: removes lock from top page after loading bottom page

7. Peeking through SSL Network traffic reveals length of HTTPS packets TLS supports up to 256 bytes of padding AJAX-rich pages have lots and lots of interactions with the server These interactions expose specific internal state of the page BAM! Chen, Wang, Wang, Zhang, 2010

Peeking through SSL: an example Vulnerabilities in an online tax application No easy fix Vulnerabilities in an online tax application No easy fix

Final note: the status Bar Trivially spoofable <a href=“ onclick=“this.href = ‘ PayPal

THE END