I want to bring everyone's attention to our paper -- "Automated Password
Extraction Attack on Modern Password Managers" (attached in this email).
This is still a working copy and we can use some useful feedback :)

Thanks,

On Sun, Apr 15, 2012 at 11:21 PM, Tanvi Vyas <ta...@mozilla.com> wrote:

> There are some great ideas here.  I think we should create a feature page
> for at least #1&2 and add it to the Security Roadmap.  I also think we can
> do #5.
>
> To go into detail...
>
>
> On 4/11/12 12:54 AM, Jesse Ruderman wrote:
>
>> 1) If a site sends an STS header, and the user has any data (cookies,
>> passwords, etc) that are not https-only, immediately mark that data as
>> https-only. (This helps if a site uses STS, but the user's privacy
>> settings cause the password storage to outlive the STS storage.)
>>
> If a site is marked STS but a website (or by a user with ForceTLS), then
> there is no reason to have http data for that site.
>
>
>  2) When clearing history, retain the STS bit if any other data
>> associated with the site is retained. For example, in the common case
>> of clearing all history other than passwords, retain the STS bits for
>> sites that have passwords stored. (This accomplishes roughly the same
>> thing as #1.)
>>
> If we are saving data from the site that can be used for fingerprinting
> anyway, retaining the STS bit shouldn't cause any further fingerprinting
> issues.
>
>
>  3) If you have a password stored for http, and you log into the same
>> site using https, move the password to https-only. (This helps if a
>> site moves from http to https, but does not set STS.)
>>
> This doesn't really work.  Twitter and Facebook have login on both http
> and https pages.  So sometimes the users password will be auto-filled and
> sometimes it won't.  Hence, I think this proposal is out.
>
>
>  4) If an identical password is stored for both any http site and any
>> https site, stop autofilling it on the http site. Instead, provide a
>> way for users to instruct the browser to fill it in (e.g. an infobar).
>>
> I don't think this is going to fly either.  Users will constantly get this
> infobar on the http versions of facebook and twitter.
>
>> 5) If an identical password is stored for both any http site and any
>> https site, and it is not used on the http site for 16 months, expire
>> the http version. (This helps in cases where the hostname has changed,
>> e.g. from mail.google.com to www.google.com, and the security level
>> has also changed.)
>>
> Sounds good.
>
>
>  6) When connected to an untrusted wireless network, don't fill in
>> passwords.
>>
> We aren't sure what networks are trusted vs untrusted.  Instead of
> starting with a heuristic that tries to guess this, what if we start off
> with including an "network untrusted" mode in Firefox.  When a user enables
> this mode, passwords aren't auto-filled and inactive tabs aren't allowed to
> send/receive requests.  This way, when I connect to wifi at an
> airport/hotel and have 3 windows open with 10 tabs each, there are no http
> requests going out from any of the tabs except for the 1 active tab I'm
> using.  The user is aware they are using the active tab and is aware of
> what websites they are visiting via http (and hence which cookies they are
> exposing).
>
> (Whenever I connect to an untrusted network, I first turn firefox to work
> offline mode.  Then connect to the network and vpn in.  Once I'm vpn'ed, I
> take firefox off work offline mode.  This way, no requests are sent with my
> cookies from one of my open tabs before I have a chance to vpn.  Yes, I
> know I am paranoid).
>
>
>> 7) When connected to an untrusted wireless network, refuse to make any
>> insecure connections. If the user really wants to open an insecure
>> search result, they can open it in a separate browsing session.
>>
> I also don't think this will fly.
>
>
> Adding 8 from Justin Dolske:
> 8)
>
>>
>> One additional mitigation: refuse to autofill within iframes. Bulk
>> harvesting would seem harder (or at least slower) if an attacker if
>> forced to cause new windows/tabs to open. Well, maybe... I guess if
>> you're allowing page modifications, one just needs a window.onload
>> handler to navigate to the next site on the list. [Insert side
>> discussion here about stealing login-cookies from site's you're already
>> logged into.]
>>
>>  What if a site allows login via an iframe widget (ex: twitter had a
> widget that did this a little more than a year ago, and maybe still does).
>  This would break all sites that have their login form in an iframe.
>
> ~Tanvi
>
>
> ______________________________**_________________
> dev-security mailing list
> dev-security@lists.mozilla.org
> https://lists.mozilla.org/**listinfo/dev-security<https://lists.mozilla.org/listinfo/dev-security>
>



-- 
-Eric
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to