Protecting Your Website with Always on SSL
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Designing Secure Systems That People Can
15- SSL, PKIs, and Secure Communication Engineering & Public Policy Lorrie Cranor, Blase Ur, and Rich Shay March 3, 2015 05-436 / 05-836 / 08-534 / 08-734 Usable Privacy and Security 1 Today! • An introduction to SSL/TLS • An introduction to PKIs • Recent developments in this area • Usability issues • An activity to make it better 2 Overview • Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS) enable secure communication • Frequently encountered with web browsing (HTTPS) and more behind the scenes in app, VOIP, etc. 3 What we want to defend against • People snooping on our communications – The contents of what we’re sending – Session tokens (see, e.g., Firesheep) • Man-in-the-middle attacks – We want to authenticate that we are talking to the right site, not an imposter – Use certificates inside a public-key infrastructure 4 How we could obtain trust • Web of trust – People you already trust introduce you to people they trust – Can get complicated, doesn’t scale well – Less frequently seen in practice • Public-Key Infrastructure (PKI) – Certificates are issued by certificate authorities that bind cryptographic keys to identities 5 Public-Key Infrastucture • Binding of keys to identities can be done automatically or by humans 6 What does SSL look like to users? • Compare, e.g., the following: – https://www.google.com (normal certificate) – Go to Google images and then click on an image and see what happens (mixed content) – https://otalliance.org (EV certificate) 7 What does PKI look like to browsers? • Hundreds -
Preventing Session Hijacking Using Encrypted One-Time-Cookies
Preventing Session Hijacking using Encrypted One-Time-Cookies Renascence Tarafder Prapty 1, Shuhana Azmin 1 Md. Shohrab Hossain 1, Husnu S. Narman2 1Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Bangladesh 2Weisberg Division of Computer Science, Marshall University, Huntington, WV, USA Email: [email protected],[email protected], [email protected], [email protected] Abstract—Hypertext Transfer Protocol (HTTP) cookies are cryptography-based techniques to achieve cookie confidential- pieces of information shared between HTTP server and client to ity and integrity. However, each mechanism lacks in one aspect remember stateful information for the stateless HTTP protocol or another. The scheme described in [1] does not achieve or to record a user’s browsing activity. Cookies are often used in web applications to identify a user and corresponding authen- cookie confidentiality. In [3], the web server is required to ticated session. Thus, stealing a cookie can lead to hijacking an store one-time keys that lead to key management problems. authenticated user’s session. To prevent this type of attack, a In [2] and [4], a one-time key is encrypted by the web server’s cookie protection mechanism is required. In this paper, we have public key. As public key encryption is computationally expen- proposed a secure and efficient cookie protection system. We have sive, these schemes are not efficient. [5] proposes the use of used one time cookies to prevent attacker from performing cookie injection. To ensure cookie integrity and confidentiality, we have cache cookies as an alternative to cookies for authentication of encrypted sensitive information in the cookie. -
Security and Privacy Concerns of Internet Single Sign-On"
Security and Privacy Concerns of Internet Single Sign-On Risks and Issues as They Pertain to Liberty Alliance Version 1.0 Specifications Authors: Gary Ellison, Jeff Hodges, Susan Landau Date: 6 Sep 2002 Introduction As noted in ‘‘A Brief Introduction to Liberty,’’ for the man on the street, the lawyer in her office, the shopper or investor at home, identity on the Internet is a burdensome and off-putting process. There is one sign-on and password for the online book merchant, another for the corporate network and for each of its pieces --- the client’s private pages, the outsourced human resources office, the online travel agency --- yet another pair for accessing Lands End, still another for Bank of America. The same holds for business-to-business interactions. The result is a cumbersome user experience. The first challenge of Web services is a simple and secure identity mechanism, the second, and equally important, concern is privacy protection. Single sign-on and federated network identity (a system for binding multiple accounts for a given user) are key to solving these issues. A federated system allows businesses to manage their own resources including customer data. Federated network identity enables customers to retain some control over which companies have access to their own information [INTRO]. The Liberty Alliance was formed to deliver and support a federated network identity solution for the Internet, enabling single sign-on for consumers as well as business users in an open, federated way. The Liberty Alliance version 1.0 specifications (referred to as the Liberty Specifications or Liberty protocols throughout this document) clear the way for a user to have a seamless Internet experience and simplify the business of conducting business with multiple Web sites. -
SESSION RIDING a Widespread Vulnerability in Today's Web Applications
Whitepaper SESSION RIDING A Widespread Vulnerability in Today's Web Applications Thomas Schreiber, SecureNet GmbH, Dec 2004 SecureNet GmbH - Münchner Technologiezentrum - Frankfurter Ring 193a - D-80807 München www.securenet.de - [email protected] - Phone +49/89/32133-600 Whitepaper – Session Riding SecureNet GmbH – 2 T ABLE OF C ONTENTS 1 Abstract .............................................................................................................................3 2 What is Session Riding?.......................................................................................................3 3 How Session Riding Works ..................................................................................................4 3.1 How Cookies and Session IDs work................................................................4 3.2 The Threat............................................................................................................5 3.3 Where is the Vulnerability? ................................................................................6 3.4 Non-form-based Authentication Methods......................................................6 3.5 Summary ...............................................................................................................7 4 What makes things even worse...........................................................................................7 4.1 Vulnerable GET-Requests .................................................................................7 4.1.1 The IMG-Tag ............................................................................................7 -
Server Side Protection Against Cross Site Request Forgery Using CSRF
ol chn ogy Te & Gupta and Gola, J Inform Tech Softw Eng 2016, 6:3 n S o o ti ft a w a m r r e o f DOI: 10.4173/2165-7866.1000182 E Journal of n n I g f i o n l e a e n r r i n u g o J ISSN: 2165-7866 Information Technology & Software Engineering Research Article Open Access Server Side Protection against Cross Site Request Forgery using CSRF Gateway Jaya Gupta* and Suneeta Gola College of Science & Engineering, Department of Computer Engineering, India Abstract The E-Commerce and Social Media has become the new identity for millions of users across the globe. Ease of services for Shopping, Travel, Internet Banking, Social Media, chat and collaboration Apps etc. have become part of one’s life where these identities have name, media content, confidential notes, business projects and credit cards. Convenience and connections brings the ease of connectivity and services so does come the concerns related to unauthorized usage and fraudulent transactions that could be lead to loss of money, time, emotions and even life. Web defacement, fake accounts, account hijacking, account lock and unavailability of services has become a common online news and distress for many. There are different Web Attacks and exploits that have sprung up with time and usage for different type of illegal actions performed everyday online. Cross Site Request Forgery Attack is one of the Web top 10 exploited attacks for the past 5 years (Source OSWAP) which can maliciously exploit online services, where unauthorized actions are performed by the fraudulent user on behalf of a trusted and authenticated account for website. -
Certificate Authority – Registration Authority (Verifies Cert Requests) – Validation Authority (Handles Revocation)
11. Trust on the Web Blase Ur and David Cash February 5th, 2020 CMSC 23200 / 33250 Overview • Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS) enable secure communication • Frequently encountered with web browsing (HTTPS) and more behind the scenes in app, VOIP, etc. What we want to defend against • People snooping on our communications – The contents of what we’re sending – Session tokens (see, e.g., Firesheep) • Person-in-the-middle attacks – We want to authenticate that we are talking to the right site, not an imposter – Use certificates inside a public-key infrastructure How we could obtain trust • Web of trust – People you already trust introduce you to people they trust – Can get complicated, doesn’t scale well – Infrequently seen in practice • Public-Key Infrastructure (PKI) – Certificates are issued by certificate authorities that bind cryptographic keys to identities Public-Key Infrastucture • Binding of keys to identities – Certificate authority – Registration authority (verifies cert requests) – Validation authority (handles revocation) Image from Wikimedia Foundation What does SSL look like to users? • Compare, e.g., the following: – https://www.google.com (normal certificate) – Go to Google images and then click on an image and see what happens (mixed content) – https://www.thawte.com (EV certificate) What does SSL look like to users? (From Felt et al. SOUPS 2016) How does PKI look to browsers? • Hundreds of trusted certificate authorities – Certificate authorities (CAs) sign the certificates binding -
Understanding Flaws in the Deployment and Implementation of Web Encryption
Understanding Flaws in the Deployment and Implementation of Web Encryption Suphannee Sivakorn Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2018 © 2018 Suphannee Sivakorn All rights reserved ABSTRACT Understanding Flaws in the Deployment and Implementation of Web Encryption Suphannee Sivakorn In recent years, the web has switched from using the unencrypted HTTP protocol to using encrypted communications. Primarily, this resulted in increasing deployment of TLS to mitigate information leakage over the network. This development has led many web service operators to mistakenly think that migrating from HTTP to HTTPS will magically protect them from information leakage without any additional effort on their end to guar- antee the desired security properties. In reality, despite the fact that there exists enough infrastructure in place and the protocols have been “tested” (by virtue of being in wide, but not ubiquitous, use for many years), deploying HTTPS is a highly challenging task due to the technical complexity of its underlying protocols (i.e., HTTP, TLS) as well as the complexity of the TLS certificate ecosystem and this of popular client applications suchas web browsers. For example, we found that many websites still avoid ubiquitous encryption and force only critical functionality and sensitive data access over encrypted connections while allowing more innocuous functionality to be accessed over HTTP. In practice, this approach is prone to flaws that can expose sensitive information or functionality tothird parties. Thus, it is crucial for developers to verify the correctness of their deployments and implementations. -
A Secure Framework for Iot Smart Home by Resolving Session
Global Journal of Computer Science and Technology: G Interdisciplinary Volume 20 Issue 2 Version 1.0 Year 2020 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online ISSN: 0975-4172 & Print ISSN: 0975-4350 A Secure Framework for IoT Smart Home by Resolving Session Hijacking By Fozilatoon Humaira, Md Sanju Islam, Sanjida Akter Luva & Md Bayazid Rahman Notre Dame University Abstract- IoT is a blessing in the field of information and technology. It is developing and deploying day by day. It is working for our betterment in the section of home, environment, retail, security, factory, industry, agriculture, education, energy, healthcare, and so on. In the Smart Home section, there are a numerous inventions. Vast analysis and working can be possible if needed. We have worked with session hijacking and implement it in our Smart Home Prototype. This paper represents the basic concept of IoT in Smart Home with Security like Session Hijacking. Keywords: IoT, internet of things, smart home, session regeneration, security, session hijacking. GJCST-G Classification: K.6.5 ASecureFrameworkforIoTSmartHomebyResolvingSessionHijacking Strictly as per the compliance and regulations of: © 2020. Fozilatoon Humaira, Md Sanju Islam, Sanjida Akter Luva & Md Bayazid Rahman. This is a research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. A Secure Framework for IoT Smart Home by Resolving Session Hijacking Fozilatoon Humaira α, Md Sanju Islam σ, Sanjida Akter Luva ρ & Md Bayazid Rahman Ѡ Abstract- IoT is a blessing in the field of information and Table 1: Internet of Things Applications Ranking [7] technology. -
Session Hijacking and the Cloud Mentor: Ming Chow
Casey Gowrie COMP116 Final Project Session Hijacking and the Cloud Mentor: Ming Chow Table of Contents Abstract ....................................................................................................................................... 3 1. Introduction .......................................................................................................................... 4 1.1 What Is The Cloud? .................................................................................................................... 4 1.2 The “Cloud Multiplier Effect” .................................................................................................. 4 1.3 Session Hijacking ....................................................................................................................... 5 2. To the Community .............................................................................................................. 6 3. How a Session Hijacking Attack Happens ................................................................... 6 4. Detection and Defenses .................................................................................................... 7 4.1 Detection ....................................................................................................................................... 8 4.1.1 Existing Methods .................................................................................................................................. 8 4.1.2 Proposed Models ................................................................................................................................. -
Lecture 26: Web Security 1 Web Application 2 Session Hijacking
CS5430 { System Security Spring 2018 Lecture 26: Web Security May 2, 2018 Instructor: Eleanor Birrell 1 Web Application The Internet plays an integral role in modern life. Typical Americans spend hours each day online1 interacting with a variety of web applications. These applications have access to a wide range of valuable and/or sensitive information about users and their behav- iors, including financial data, medical data, social interactions, and behavior patterns. Unfortunately, security vulnerabilities are still common, and web applications are the target of frequent attacks and compromises. Today's class will focus on some common attack strategies|cross-site scripting (XSS), session hijacking, cross-site request forgery (CSRF), and SQL injection (SQLi)|and how to secure a web application against (or at least mitigate) these types of attacks. 2 Session Hijacking The most common vulnerability in modern web applications is session hijacking. Session hijacking exploits a feature the Hypertext Transfer Protocol (HTTP) over which websites are served. HTTP, by design, is stateless: a client sends a HTTP request and the server sends the corresponding HTTP response.2 However, many applications require state in order to function, for example, an application with user accounts should remember that a particular user already logged in. Session state is commonly implemented with HTTP cookies.3 Cookies are small pieces of data (strings) sent by the server and stored at the client; they are associated with a particular domain and path, and the browser sends attaches the cookie to the header of all HTTP requests that match that domain and path. Cookies are extremely common because they are very useful; cookies can be used to implement stateful web applications, content personalization, and user tracking. -
Security Risks of Using Wi-Fi Hotspot: Secure Socket Layer (Ssl) Under Breach Attack
SECURITY RISKS OF USING WI-FI HOTSPOT: SECURE SOCKET LAYER (SSL) UNDER BREACH ATTACK Mentor: Ming Chow Hao Wan [email protected] Table of Contents 1. Introduction .......................................................................................................................... 3 1. Definition .................................................................................................................. 3 2. Problem With Wi-Fi Hotspot ...................................................................................... 3 2. Service to community ............................................................................................................ 5 3. Action Item ........................................................................................................................... 7 1. SSL............................................................................................................................. 7 2. BREACH attack ........................................................................................................... 9 4. Conclusion .......................................................................................................................... 13 5. Supplementary material ...................................................................................................... 14 6. References .......................................................................................................................... 15 1 Abstract The last decade has witnessed a significant improvement of mobility -
Whatsapp Security and Role of Metadata in Preserving Privacy
WhatsApp security and role of metadata in preserving privacy Nidhi Rastogi, James Hendler Rensselaer Polytechnic Institute, Troy, NY, USA [email protected] [email protected] Abstract: WhatsApp messenger is arguaBly the most popular moBile app availaBle on all smart-phones. Over one billion people worldwide for free messaging, calling, and media sharing use it. In April 2016, WhatsApp switched to a default end-to-end encrypted service. This means that all messages (SMS), phone calls, videos, audios, and any other form of information exchanged cannot Be read By any unauthorized entity since WhatsApp version 2.16.2 (released April 2016). In this paper we analyze the WhatsApp messaging platform and critique its security architecture along with a focus on its privacy preservation mechanisms. We report that the Signal Protocol, which forms the Basis of WhatsApp end-to-end encryption, does offer protection against forward secrecy, and MITM to a large extent. Finally, we argue that simply encrypting the end-to-end channel cannot preserve privacy. The metadata can reveal just enough information to show connections Between people, their patterns, and personal information. This paper elaborates on the security architecture of WhatsApp and performs an analysis on the various protocols used. This enlightens us on the status quo of the app security and what further measures can be used to fill existing gaps without compromising the usability. We start By descriBing the following (i) important concepts that need to be understood to properly understand security, (ii) the security architecture, (iii) security evaluation, (iv) followed By a summary of our work.