Hi Chris, hi all,

let me say, I can see a missing link here which would be nice to solve.

Btw. another example coming to mind would be the connection with external payment services or increasing number of references to cloud based services (where it is not sure that a.com is indeed using b.com). E.g. e-commerce sites linking to paypal or Mastercard / Visa vericode (or whatever they call it) directly out of the e-commerce site...

Some improvement in the trust chain could indeed be valuable here.

Having said that, if another WG is already working in this area - Jeff mentioned dbound - then my recommendation would be to take the work there. WEBSEC is about to be closed, we are only waiting for the final release of our last document.

Best regards, Tobias




On 14/01/15 00:44, Jeffrey Walton wrote:
Is this a security problem? I think so.
Yes. Knowing the relationship would be helpful in a security context.

I have a few ideas on how this could be improved/implemented.
Dbound is poking and prodding at related issues. And they are
finalizing their charter now. You might consider reading some of the
recent posts and commenting.

https://www.ietf.org/mailman/listinfo/dbound.

Jeff

On Mon, Jan 12, 2015 at 2:18 PM, Chris Hartmann <[email protected]> wrote:
1) Bob trusts and does personal business with a.com.

2) a.com forms a business relationship with b.com to perform a
business function on its behalf (payment processor, blog, whatever).
The landing page is b.com/a

3) Bob visits b.com/a and notices that the page claims to be
affiliated and owned by a.com

4) How can Bob, in absolute terms, trust that b.com/a is affiliated
and a delegated service by a.com? (say, prior to submitting sensitive
information)

Is this a security problem? I think so.

We’ve all had to make this decision one time or another on weak
inferences and correlations. I’d imagine Phishers don’t mind at all
that there is an inability for the common internet user (looking at
you grandma) to make the judgement call on web service affiliations.
They’ve been conditioned with the best practice of looking at the
address bar (and perhaps the DNS namespace) along with the lock icon
to indicate trustworthiness, which may actually help the attacker in
their act of misdirection. Inter-domain relationships model business
relationships and trust. If web users could be armed with a new
“sense” which proves these legitimate relationships (say
cryptographically) then perhaps they would have more reason to be
skeptical of those who cannot prove their affiliation. I’m not saying
we can take human judgement completely out of the equation, but why
not have a tool to help anchor this commonly needed and risky
correlation.

Eg:

5) https://c.com/a is a bad guy and claims the same thing as b.com/a .
Now who to trust becomes a research project. (But c.com has the https
lock icon, doesn’t that count for anything: NO)


Use case a) Tim submits a payment to a redcross.org Paypal donation
page he found via his favorite search engine. It was a scam. (We can
argue a violation of "best practices" here, but that is besides the
point)


I suppose phishing isn’t the only example. It could apply to any case
where you want to logically group the identity of one entity across
many domain boundaries owned by different parties. (eg. A popular band
has many web points of presence for fans, etc). This same mechanism
could “certify” that these web assets are under one umbrella, although
they don’t exist under one domain hierarchy.

Should we solve this? Is it solved already? Could use help gelling or
junking this idea.

I have a few ideas on how this could be improved/implemented.

Cheers,

_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to