On Jul 11, 2013, at 7:51 PM, Trevor Perrin <[email protected]<mailto:[email protected]>> wrote:
But even if we restrict our solution to HTTPS, I don't see how ChannelID helps a problem like the BEAST and CRIME attacks. In both cases, the issue is the scoping of cookie use. An attacker's web page or script can cause the UA to send requests of the attacker's choosing to a server. This has nothing to do with TLS - this in an HTTP behavior. ChannelID solves this problem. The goal of BEAST, CRIME, or other forms of cookie theft is to steal a *usable* cookie. With ChannelID, the channel-bound cookie that an attacker might steal is unusable. True, but I believe that the fact that attackers are able to get the UA to send arbitrary requests to a server and have them bless this request with their cookie is bad enough. I can demonstrate this with a real world example. This is from a real firewall appliance. I won't mention names, except to say that it is not from my company (otherwise I would be too embarrassed to post this to a public mailing list. This firewall had a web-based management interface protected with HTTPS. The pages would have all kinds of buttons, each button had a name pretty similar to the text on the button, and clicking the buttons would cause a GET request like this: GET /mainpage.html?button=something,field1="", field2="". So I recorded some traffic (it was HTTPS, so I had to use a browser add-on to record it), and got this: * GET /maingage.html?button=shutdown caused the firewall to power-off. * GET /mainpage.html?button=unload caused the firewall to unload policy, so that it didn't enforce policy or do IPsec or anything a router wouldn't do. So I tried opening another browser tab, and loading an HTML document that said <img src="https://myfw/mainpage.html?button=shutdown"> Yes, the firewall powered down, and if I had used "unload" instead of "shutdown" that would be the end of enforcing a security policy. Now, granted, this is epic levels of cluelessness. But Channel-bound cookies don't save the administrator of this firewall. Only changing the rules around "blessing" requests with cookies can help. I'm all in favor of binding to TLS or MAC-ing the requests, but I think we need those in addition to making cookie behavior secure, not instead of. Having re-read draft-balfanz, that draft only has a TLS extension. Section 7.1 is only an example of how that extension can be used. If we really wanted a channel-bound cookie, we'd need a different document that specified channel-bound cookies. So we'd need someone two write such a draft. Yoav
_______________________________________________ websec mailing list [email protected] https://www.ietf.org/mailman/listinfo/websec
