Tillbaka till svenska Fidonet
English   Information   Debug  
R20_ECHOPRES   0/35
R20_ESTAT   0/719
R20_FIDONETPROG...
...RAM.MYPOINT
  0/2
R20_FIDONETPROGRAM   0/22
R20_FIDONET   0/248
R20_FILEFIND   0/24
R20_FILEFOUND   0/22
R20_HIFI   0/3
R20_INFO2   2847
R20_INTERNET   0/12940
R20_INTRESSE   0/60
R20_INTR_KOM   0/99
R20_KANDIDAT.CHAT   42
R20_KANDIDAT   28
R20_KOM_DEV   112
R20_KONTROLL   0/13077
R20_KORSET   0/18
R20_LOKALTRAFIK   0/24
R20_MODERATOR   0/1852
R20_NC   76
R20_NET200   245
R20_NETWORK.OTH...
...ERNETS
  0/13
R20_OPERATIVSYS...
...TEM.LINUX
  0/44
R20_PROGRAMVAROR   0/1
R20_REC2NEC   534
R20_SFOSM   0/340
R20_SF   0/108
R20_SPRAK.ENGLISH   0/1
R20_SQUISH   107
R20_TEST   2
R20_WORST_OF_FIDONET   12
RAR   0/9
RA_MULTI   106
RA_UTIL   0/162
REGCON.EUR   0/2056
REGCON   0/13
SCIENCE   0/1206
SF   0/239
SHAREWARE_SUPPORT   0/5146
SHAREWRE   0/14
SIMPSONS   0/169
STATS_OLD1   0/2539.065
STATS_OLD2   0/2530
STATS_OLD3   0/2395.095
STATS_OLD4   0/1692.25
SURVIVOR   0/495
SYSOPS_CORNER   0/3
SYSOP   0/84
TAGLINES   0/112
TEAMOS2   0/4530
TECH   0/2617
TEST.444   0/105
TRAPDOOR   0/19
TREK   0/755
TUB   0/290
UFO   0/40
UNIX   0/1316
USA_EURLINK   0/102
USR_MODEMS   0/1
VATICAN   0/2740
VIETNAM_VETS   0/14
VIRUS   0/378
VIRUS_INFO   0/201
VISUAL_BASIC   0/473
WHITEHOUSE   0/5187
WIN2000   0/101
WIN32   0/30
WIN95   0/4277
WIN95_OLD1   0/70272
WINDOWS   0/1517
WWB_SYSOP   0/419
WWB_TECH   0/810
ZCC-PUBLIC   0/1
ZEC   4

 
4DOS   0/134
ABORTION   0/7
ALASKA_CHAT   0/506
ALLFIX_FILE   0/1313
ALLFIX_FILE_OLD1   0/7997
ALT_DOS   0/152
AMATEUR_RADIO   0/1039
AMIGASALE   0/14
AMIGA   0/331
AMIGA_INT   0/1
AMIGA_PROG   0/20
AMIGA_SYSOP   0/26
ANIME   0/15
ARGUS   0/924
ASCII_ART   0/340
ASIAN_LINK   0/651
ASTRONOMY   0/417
AUDIO   0/92
AUTOMOBILE_RACING   0/105
BABYLON5   0/17862
BAG   135
BATPOWER   0/361
BBBS.ENGLISH   0/382
BBSLAW   0/109
BBS_ADS   0/5290
BBS_INTERNET   0/507
BIBLE   0/3563
BINKD   0/1119
BINKLEY   0/215
BLUEWAVE   0/2173
CABLE_MODEMS   0/25
CBM   0/46
CDRECORD   0/66
CDROM   0/20
CLASSIC_COMPUTER   0/378
COMICS   0/15
CONSPRCY   0/899
COOKING   28783
COOKING_OLD1   0/24719
COOKING_OLD2   0/40862
COOKING_OLD3   0/37489
COOKING_OLD4   0/35496
COOKING_OLD5   9370
C_ECHO   0/189
C_PLUSPLUS   0/31
DIRTY_DOZEN   0/201
DOORGAMES   0/2031
DOS_INTERNET   0/196
duplikat   6000
ECHOLIST   0/18295
EC_SUPPORT   0/318
ELECTRONICS   0/359
ELEKTRONIK.GER   1534
ENET.LINGUISTIC   0/13
ENET.POLITICS   0/4
ENET.SOFT   0/11701
ENET.SYSOP   33809
ENET.TALKS   0/32
ENGLISH_TUTOR   0/2000
EVOLUTION   0/1335
FDECHO   0/217
FDN_ANNOUNCE   0/7068
FIDONEWS   23559
FIDONEWS_OLD1   0/49742
FIDONEWS_OLD2   0/35949
FIDONEWS_OLD3   0/30874
FIDONEWS_OLD4   0/37224
FIDO_SYSOP   12847
FIDO_UTIL   0/180
FILEFIND   0/209
FILEGATE   0/212
FILM   0/18
FNEWS_PUBLISH   4208
FN_SYSOP   41525
FN_SYSOP_OLD1   71952
FTP_FIDO   0/2
FTSC_PUBLIC   0/13587
FUNNY   0/4886
GENEALOGY.EUR   0/71
GET_INFO   105
GOLDED   0/408
HAM   0/16054
HOLYSMOKE   0/6791
HOT_SITES   0/1
HTMLEDIT   0/71
HUB203   466
HUB_100   264
HUB_400   39
HUMOR   0/29
IC   0/2851
INTERNET   0/424
INTERUSER   0/3
IP_CONNECT   719
JAMNNTPD   0/233
JAMTLAND   0/47
KATTY_KORNER   0/41
LAN   0/16
LINUX-USER   0/19
LINUXHELP   0/1155
LINUX   0/22013
LINUX_BBS   0/957
mail   18.68
mail_fore_ok   249
MENSA   0/341
MODERATOR   0/102
MONTE   0/992
MOSCOW_OKLAHOMA   0/1245
MUFFIN   0/783
MUSIC   0/321
N203_STAT   902
N203_SYSCHAT   313
NET203   321
NET204   69
NET_DEV   0/10
NORD.ADMIN   0/101
NORD.CHAT   0/2572
NORD.FIDONET   189
NORD.HARDWARE   0/28
NORD.KULTUR   0/114
NORD.PROG   0/32
NORD.SOFTWARE   0/88
NORD.TEKNIK   0/58
NORD   0/453
OCCULT_CHAT   0/93
OS2BBS   0/787
OS2DOSBBS   0/580
OS2HW   0/42
OS2INET   0/37
OS2LAN   0/134
OS2PROG   0/36
OS2REXX   0/113
OS2USER-L   207
OS2   0/4786
OSDEBATE   0/18996
PASCAL   0/490
PERL   0/457
PHP   0/45
POINTS   0/405
POLITICS   0/29554
POL_INC   0/14731
PSION   103
R20_ADMIN   1117
R20_AMATORRADIO   0/2
R20_BEST_OF_FIDONET   13
R20_CHAT   0/893
R20_DEPP   0/3
R20_DEV   399
R20_ECHO2   1379
Möte R20_INTERNET, 12940 texter
 lista första sista föregående nästa
Text 5582, 192 rader
Skriven 1999-08-11 06:47:01 av Eddy L O Jansson (2:206/233.0)
   Kommentar till text 5577 av Henrik Schröder (2:201/128.9)
Ärende: Kakmonstret.
====================

HS> För vad? Vad är så hemskt som kan hända om du tar emot kakor? Vad
HS> kan kakor göra som du inte tycker om?


                                      "Cookies are inherently evil.
                                       Just say no to cookies."
                                                  - Randal Schwartz

The mechanism for 3rd party cookies has been criticized because
of its implications for user privacy.  With the cooperation of
many websites, 3rd party cookies are used to monitor the surfing
habits of users.  However repugnant this may seem, it stems
from the legitimate function of HTTP, namely the willingness
of your browser to accept IMG tags as "instructions" of where
to connect.  But consider the security implications of a malicious
abuse of this mechanism.

While I am unwilling to go as far as Randal about cookies in general,
I am beginning to conclude that "3rd party" cookies really are evil.
Unfortunately, you cannot just say 'no' to 3rd party cookies.  In
both Netscape Communicator and MS Internet Explorer, there is no way
to turn off all 3rd party cookie activity (unless you disable cookies
entirely).  Communicator will let you refuse to *accept* these
cookies but will not control their divulgence.

IMHO, the unauthorized divulgence of 3rd party cookies makes up the
other half of their "evil" equation.  This is particularly true when
a cookie is used as a kind of weak authentication token.  (At
least one E-commerce site will let you charge to a user's credit
card by merely presenting the correct persistent cookie.  I won't
give their name publicly because, hey, it's a jungle out there ;-)

The active attacks presented below show that an arbitrary HTTP cookie
of the attacker's choosing can literally be *demanded* from a browser
any time its user surfs.  Under certain circumstances, HTTPS cookies
can be stolen.  These secure cookies are at best, only as secure as
the weakest mode of SSL *ever* used by the browser. This may be very
different from the mode of SSL enabled when the user *intends* to
send a secure cookie.

Stealing HTTP Cookies
---------------------

A single web page may make connections to several sites in order to
retrieve all of its graphical hypertext media.  Thus, typing a single
URL

        http://www.acme.com/

may spawn many connections to graphics.acme.com, each resulting from
IMG tags of the form

        <IMG src="http://graphics.acme.com/foo.jpg">.

The graphics.acme.com site could make use of cookies in order to
provide dynamic images tailored to the user's preferences.  This
example has every appearance of being legitimate, but the implicit
trust placed by the browser in the HTTP response could be
unwarranted.  A malicious adversary could actively modify the HTML to
include a false IMG tag such as

        <IMG src="http://e-commerce.widgetstore.com/hrule.jpg">

forcing the unsuspecting browser to send its Widget Store cookie out
into the Internet.  The attacker -- acting as an "intruder in the
middle" -- steals the the cookie of choice from user's browser.  With

   TARGET_URL = http://e-commerce.widgetstore.com/hrule.jpg,

and

   server = any legitimate server (e.g. home.netscape.com),

the main stages of this attack are depicted below:

            GET ...
   browser  --------------------------------------> intruder

            GET ...
   intruder --------------------------------------> server

            <html>...</html>
   server   --------------------------------------> intruder

            <html>...<img src=TARGET_URL></html>
   intruder --------------------------------------> browser

            Cookie: foo=bar; ...
   browser  --------------------------------------> intruder
            (intended for TARGET_URL)

            forged TARGET_URL resource
   intruder --------------------------------------> browser


Note that it is not necessary for the intruder to stand
in between the browser and the server corresponding
to TARGET_URL.  That is just the easiest way for the intruder
to go undetected.


Stealing HTTPS Cookies
----------------------

By definition, HTTPS cookies are never sent without SSL protection.
However, variants of our attack to steal HTTP cookies could be
designed to exploit SSL weaknesses.

Suppose your Widget Store E-Commerce cookie is secure and its server
supports 128-bit encryption.  On the other hand, suppose that Al's
Shitty Mortgage Company supports only 40-bit encryption and only SSL
version 2.  You don't like 40-bit SSLv2, but you are willing to drop
your guard temporarily in order to connect to Shitty Mortgage and get
Al's latest interest rate.

Throughout this section, the target cookie is the Widget Store
E-Commerce cookie with SSL URL

   TARGET_URL = https://e-commerce.widgetstore.com/hrule.jpg

Also take,

   server     = any http server (e.g. Netscape home)
   target     = e-commerce.widgetstore.com

We assume that the small horizontal rule image (common to many servers)
is available from Widget Store and can be added to any HTML without
being noticed.  The following attack combines our HTTP cookie
stealing with the well-known ciphersuite rollback attack (see [WS96])
in which an SSLv2 session is forced into 40-bit mode.  The attacker
actively acquires the desired cookie encrypted with an unknown 40-bit
key.  After a couple hours of exhaustive search, the plaintext cookie
is recovered.

   intruder: Wait for browser to drop to 40-bit SSLv2 and
             connect to server  (listen to Al's traffic).

            GET ...
   browser  --------------------------------------> intruder

            GET ...
   intruder --------------------------------------> server

            <html>...</html>
   server   --------------------------------------> intruder

            <html>...<img src=TARGET_URL></html>
   intruder --------------------------------------> browser

            Ciphersuite rollback attack: browser
            & target establish 40-bit session key, k.
   browser  <-------------> intruder <------------> target

            {Cookie: foo=bar; ...}_k
   browser  --------------------------------------> intruder

            {Cookie: foo=bar; ...}_k
   intruder --------------------------------------> target

            {hrule.jpg}_k
   target   --------------------------------------> intruder

            {hrule.jpg}_k
   intruder --------------------------------------> browser


Note that because the intruder cannot easily determine the 40-bit
session key in real time, she must remain in the loop and wait to
conduct a brute-force search off-line.

References
----------

[CKY1] Persistent State HTTP Cookies, Netscape Communications,
       URL: http://www.netscape.com/newsref/std/cookie_spec.html

[CKY2] D. Kristol, L. Montulli, HTTP State Management Mechanism,
       RFC 2109, 1997.

[W3C]  World Wide Web Consortium Security FAQ,
       URL:  http://www.w3.org/Security/Faq/.

[WS96] D. Wagner, B. Schneier, "Analysis of the SSL 3.0 Protocol",
       1996, URL: http://www.counterpane.com/ssl.html.

John Pliam
pliam@ima.umn.edu
http://www.ima.umn.edu/~pliam

---
 * Origin:  (2:206/233)