- From: Amir Herzberg <herzbea@macs.biu.ac.il>
- Date: Mon, 12 Jun 2006 16:18:55 +0300
- To: Dan Schutzer <dan.schutzer@fstc.org>
- CC: "'Amir Herzberg'" <herzbea@macs.biu.ac.il>, "'George Staikos'" <staikos@kde.org>, public-usable-authentication@w3.org, "'Alex Dvorkin'" <kaledan@chaoslands.com>, "'Ahmad Jbara'" <ahmad@netanya.ac.il>
Dan Schutzer wrote: > I agree with the observations made by George. When he says: > Hi Dan... These specific comments were actually mine (although I agreed with most of George's comments as well...). BTW, the `secure browsing mode` could also be appropriate for an FSTC experiment (or an experiment with a specific bank). On our own, we can implement, but it is hard for us to make an interesting experiment - so, we'll love to cooperate with FSTC or a specific Financial Institution (or webmail service) to do a really interesting experiment. Best, Amir Herzberg > Which motivates the following two solutions (any others?): > > 1. Avoid entry of sensitive data (passwords, credit card #, SSN, etc.) > into forms. Main technique is probably by a `wallet/password manager` > solution which (securely) stores the sensitive data and sends it only > via SSL to appropriate sites. We are integrating such solution with > TrustBar. > > 2. `Secure browsing mode`, in which browser is limited to trusted > content - certified by trusted authorities. Every figure, script and > executable - signed. It may sound crazy to people familiar with the > current contents of web sites, but is it really infeasible? We could > begin with a solution for banks and brokers, which are probably the most > critical targets. Initially, the solution may require user to use a > special (secure) browser for these sites - this will be a simple > recommendation that the banks & brokers can give to their customers. > There are some technicalities to solve here such as the separation > between script code and variables, which is one place where a W3C > standard may help. > > It also parallels physical world. I receive lots of mail, and I understand > that much of what I receive is untrustworthy, but it still does not stop me > from using the mail system. There are however certain types of > correspondence that require special treatment - e.g. registered, certified, > Fed Express, etc. If I get mail in this manner it can be treated > differently. > > -----Original Message----- > From: public-usable-authentication-request@w3.org > [mailto:public-usable-authentication-request@w3.org] On Behalf Of Amir > Herzberg > Sent: Monday, June 12, 2006 2:28 AM > To: George Staikos > Cc: public-usable-authentication@w3.org; Alex Dvorkin; Ahmad Jbara > Subject: Re: Secure Chrome (and secure browsing mode) > > > George Staikos wrote: > >> On Friday 09 June 2006 17:12, Hallam-Baker, Phillip wrote: >> >> >>> Without the ability to do a frameless popup the example shown simply >>> becomes a web browser with two sets of menu and status bars. The user >>> > will > >>> probably find this confusing but it is unlikely that they will be >>> > tricked. > >>> >>> >> This I'm not so sure about in terms of "unlikely that they will be >> > tricked", > >> but I do agree that once we axe the frameless popup, we will be in much >> better shape. >> >> > I wish I could agree that this will make tricking `unlikely` - this was > indeed our assumption with TrustBar. However in our experiments we found > that displaying site identification - even personalized - helps, but > there is still a significant fraction of failures to detect the > spoofing. BTW, I've presented this `attack` also in the workshop - with > the two menus. > > The results do indicate a significant improvement in detection rates > with improved (esp. personalized) security indicators - assuming these > are protected in the chrome of course. However, these results motivate > search for complementary measures, which will defend the user _without_ > depending on the user to notice the security indicators. Which, I > believe, is also what George is saying. > > The current focus by MS & Google/FF on `blacklisting` (following > NetCraft etc.), may be interpreted as a step towards automated defense; > i.e., in some of these solutions, the browser actually blocks the > suspect sites rather than expect users to notice. This is good, but > unfortunately, I am skeptical about the long-term value of blacklisting > against web spoofing/phishing. Spoofers can and will avoid blacklists; > it is only matter of time and market share (of blacklists) till spoofers > do this, resulting in another loss in credibility of secure e-commerce > solutions. And we'll need real solutions at this point anyway. > > Which motivates the following two solutions (any others?): > > 1. Avoid entry of sensitive data (passwords, credit card #, SSN, etc.) > into forms. Main technique is probably by a `wallet/password manager` > solution which (securely) stores the sensitive data and sends it only > via SSL to appropriate sites. We are integrating such solution with > TrustBar. > > 2. `Secure browsing mode`, in which browser is limited to trusted > content - certified by trusted authorities. Every figure, script and > executable - signed. It may sound crazy to people familiar with the > current contents of web sites, but is it really infeasible? We could > begin with a solution for banks and brokers, which are probably the most > critical targets. Initially, the solution may require user to use a > special (secure) browser for these sites - this will be a simple > recommendation that the banks & brokers can give to their customers. > There are some technicalities to solve here such as the separation > between script code and variables, which is one place where a W3C > standard may help. > >> >> >>> There are two parts to this group as I see it: >>> >>> 1) Work out how to make chrome secure >>> * Limitations on Javascript to prevent stomping >>> * Limitations on controls >>> * Ways of varying or customizing the interface >>> * etc. >>> >>> 2) Work out what information the user needs to see in the secure chrome >>> * Site info >>> * SSL conection status info / gogreen(TM) / letterhead >>> * ??? >>> >>> >> I think it's still spoofable, but perhaps addressable. I've seen some >> tactics in a few places where some sort of information well-known only to >> > the > >> user was placed in the chrome. While it did require the user to actively >> look at the chrome to make sure the information was valid, the information >> > > >> was not spoofable since it was impossible for a site to know what that >> information was (barring any security hole in the browser implementation). >> > > >> >> > Yes, and we have experiments which seem to validate the intuition that > such customized information makes it easier for users to detect spoofing. > >> Imagine a browser that had, in the tool/menu bar, "This is Phillip's >> browser." and a mini-picture of Phill's car. It uses real-estate, and >> > maybe > >> that's not the best implementation, but it's an example of placement of >> information in a secured area that indicates the probable authenticity of >> > the > >> window. I think that makes it much harder to spoof. >> >> > I think it _is_ a bit absurd, to allow frameless popup and then ask > users to to detect an identification of the `real` browser... The > principle should be `defend don't ask` - in particular you should impose > the control frame for all browser windows rather than ask users to > detect the `real` frame by the picture of his car... Although I do agree > it will have _some_ value. > > But a customized picture is a good way to identify a trusted site e.g. > your bank!! > > Cheers, Amir > > > > > > > > . > >
Received on Monday, 12 June 2006 13:19:54 UTC