skip to main content
10.1145/1315245.1315254acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Dynamic pharming attacks and locked same-origin policies for web browsers

Published:28 October 2007Publication History

ABSTRACT

We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim's browser malicious Javascript, which then exploits DNS rebinding vulnerabilities and the name-based same-origin policy to hijack a legitimate session after authentication has taken place. As a result, the attack works regardless of the authentication scheme used. Dynamic pharming enables the adversary to eavesdrop on sensitive content, forge transactions, sniff secondary passwords, etc. To counter dynamic pharming attacks, we propose two locked same-origin policies for web browsers. In contrast to the legacy same-origin policy, which regulates cross-object access control in browsers using domain names, the locked same-origin policies enforce access using servers' X.509 certificates and public keys. We show how our policies help two existing web authentication mechanisms, client-side SSL and SSL-only cookies, resist both pharming and stronger active attacks. Also, we present a deployability analysis of our policies based on a study of 14651 SSL domains. Our results suggest one of our policies can be deployed today and interoperate seamlessly with the vast majority of legacy web servers. For our other policy, we present a simple incrementally deployable opt-in mechanism for legacy servers using policy files, and show how web sites can use policy files to support self-signed and untrusted certificates, shared subdomain objects, and key updates.

References

  1. Martin Abadi, T. Mark A. Lomas, and Roger Needham. Strengthening passwords. Technical Report 1997-033, SRC, September 1997.Google ScholarGoogle Scholar
  2. P. Akritidis, W. Y. Chin, V. T. Lam, S. Sidiroglou, and K. G. Anagnostakis. Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks. In Proceedings of the 16th USENIX Security Symposium, pages 323--338, August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Anti-phishing working group. http://www.antiphishing.org/.Google ScholarGoogle Scholar
  4. Bank of America Sitekey: Online banking security. http://www.bankofamerica/privacy/sitekey/.Google ScholarGoogle Scholar
  5. Stephen Bell. Invalid banking cert spooks only one user in 300. Computer World New Zealand, http://www.computerworld.co.nz/news.nsf/NL/-FCC8B6B48B24CDF2CC257002001%8FF73,May 2005.Google ScholarGoogle Scholar
  6. Sonia Chiasson, P. C. van Oorschot, and Robert Biddle. A usability study and critique of two password managers. In Proceedings of the 15th USENIX Security Symposium, pages 1--16, August 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Tyler Close. Petname tool. http://petname.mozdev.org/.Google ScholarGoogle Scholar
  8. Tyler Close. Waterken YURL. http://www.waterken.com/dev/YURL/httpsy/.Google ScholarGoogle Scholar
  9. Rachna Dhamija and J. D. Tygar. The Battle Against Phishing: Dynamic Security Skins. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), pages 77--88, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Rachna Dhamija, J. D. Tygar, and Marti Hearst. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 581--590, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Earthlink Toolbar Featuring ScamBlocker for Windows Users. http://www.earthlink.net/software/free/toolbar/.Google ScholarGoogle Scholar
  12. Carl Ellison, Chris Hall, Randy Milbert, and Bruce Schneier. Protecting secret keys with personal entropy. Future Generation Computer Systems, 16(4):311--318, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Alan O. Freier, Philip Karlton, and Paul C. Kocher. The SSL Protocol Version 3.0. http://wp.netscape.com/eng/ssl3/, 1996.Google ScholarGoogle Scholar
  14. Batya Friedman, David Hurley, Daniel C. Howe, Edward Felten, and Helen Nissenbaum. Users' conceptions of web security: A comparative study. In Proceedings of the Conference on Human Factors in Computing Systems - CHI '02 extended abstracts, pages 746--747, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Batya Friedman, David Hurley, Daniel C. Howe, Helen Nissenbaum, and Edward Felten. Users' conceptions of risks and harms on the web: A comparative study. In Proceedings of the Conference on Human Factors in Computing Systems - CHI '02 extended abstracts, pages 614--615, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kevin Fu, Emil Sit, Kendra Smith, and Nick Feamster. Dos and Don'ts of client authentication on the web. In 10th USENIX Security Symposium, pages 251--268, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Eran Gabber, Phillip B. Gibbons, Yossi Matias, and Alain J. Mayer. How to make personalized web browsing simple, secure, and anonymous. In Proceedings of Financial Cryptography (FC '97), pages 17--32, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Evgeniy Gabrilovich and Alex Gontmakher. The homograph attack. Communications of ACM, 45(2):128, February 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Simson Garfinkel. Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable. PhD thesis, Massachusetts Institute of Technology, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. David Goldsmith. How a 'Catch-22' Turns into a 'Shame on You'. http://isc.sans.org/diary.html?storyid=1230, March 2006.Google ScholarGoogle Scholar
  21. Anti-Phishing Working Group. Ebay - Update Your Account MITM attack. http://www.antiphishing.org/phishing_archive/05-03-05_Ebay/05-03-05_Eba%y.html.Google ScholarGoogle Scholar
  22. Princeton Secure Internet Programming Group. DNS attack scenario. http://www.cs.princeton.edu/sip/news/dns-scenario.html, February 1996.Google ScholarGoogle Scholar
  23. Peter Gutmann. Why isn't the Internet secure yet, dammit. In AusCERT Asia Pacific Information Technology Security Conference 2004, May 2004.Google ScholarGoogle Scholar
  24. J. Alex Halderman, Brent Waters, and Edward W. Felten. A convenient method for securely managing passwords. In Proceedings of the 14th International World Wide Web Conference, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Amir Herzberg and Ahmad Gbara. Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks. Cryptology ePrint Archive, Report 2004/155, 2004.Google ScholarGoogle Scholar
  26. Russell Housley, Warwick Ford, Tim Polk, and David Solo. Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile.http://tools.ietf.org/html/rfc3280, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, and Sy-Yen Kuo. Securing web application code by static analysis and runtime protection. In Proceedings of 13th international conference on World Wide Web (WWW'06), pages 40--52, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. ING direct privacy center. https://home.ingdirect.com/privacy/privacy_security.asp?s=newsecurityfe%ature.Google ScholarGoogle Scholar
  29. Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao,and Dan Boneh. Protecting Browsers from DNS Rebinding Attacks. In 14th ACM Conference on Computer and Communications Security (CCS '07), November 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Collin Jackson, Daniel R. Simon, Desney S. Tan, and Adam Barth. An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. In Proceedings of Usable Security (USEC '07), February 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Martin Johns. On XSRF and Why You Should Care. Talk at the PacSec 2006 conference, http://www.informatik.uni-hamburg.de/SVS/personnel/martin/psj06johns-e.%pdf,November 2006.Google ScholarGoogle Scholar
  32. Martin Johns. (Somewhat) breaking the same-origin policy by undermining DNS pinning. http://shampoo.antville.org/stories/1451301/, August 2006.Google ScholarGoogle Scholar
  33. Martin Johns. Using Java in anti DNS-pinning attacks. http://shampoo.antville.org/stories/1566124/, February 2007.Google ScholarGoogle Scholar
  34. Martin Johns and Justus Winter. RequestRodeo: Client Side Protection against Session Riding. In Proceedings of the OWASP Europe 2006 Conference, refereed papers track, Report CW448, pages 5--17. Departement Computerwetenschappen, Katholieke Universiteit Leuven, May 2006.Google ScholarGoogle Scholar
  35. Nenad Jovanovic, Engin Kirda, and Christopher Kruegel. Preventing cross site request forgery attacks. In Proceedings of the Second IEEE Conference on Security and Privacy in Communications Networks (SecureComm), August 2006.Google ScholarGoogle ScholarCross RefCross Ref
  36. Kanatoko. Anti-DNS Pinning (DNS Rebinding) + Socket in FLASH. http://www.jumperz.net/index.php?i=2&a=3&b=3, January 2007.Google ScholarGoogle Scholar
  37. Alan H. Karp. Site-specific passwords. Technical Report HPL-2002-39R1, HP Labs, 2002.Google ScholarGoogle Scholar
  38. John Kelsey, Bruce Schneier, Chris Hall, and David Wagner. Secure applications of low-entropy keys. Lecture Notes in Computer Science, 1396:121--134, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. V. Benjamin Livshits and Monica S. Lam. Finding security vulnerabilities in Java applications using static analysis. In Proceedings of the 14th USENIX Security Symposium, pages 271--286, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Uriel Maimon. Universal Man-in-the-Middle Phishing Kit - why is this even news? http://www.rsa.com/blog/entry.asp?id=1160.Google ScholarGoogle Scholar
  41. Chris Masone, Kwang-Hyun Baek, and Sean Smith. WSKE: Web Server Key Enabled Cookies. In Proceedings of Usable Security (USEC), February 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Adam Megacz. XWT Foundation Advisory: Firewall circumvention possible with all browsers. http://www.megacz.com/research/papers/sop.txt, July 2002.Google ScholarGoogle Scholar
  43. Microsoft. Better Website Identification and Extended Validation Certificates in IE7 and Other Browsers. http://blogs.msdn.com/ie/archive/2005/11/21/495507.aspx.Google ScholarGoogle Scholar
  44. Microsoft. Mitigating cross-site scripting with HTTP-only cookies. http://msdn.microsoft.com/workshop/author/dhtml/httponly_cookies.asp.Google ScholarGoogle Scholar
  45. Microsoft. Microsoft security bulletin MS01-017: Erroneous VeriSign-issued digital certificates pose spoofing hazard. http://www.microsoft.com/technet/security/Bulletin/MS01-017.mspx, March 2001.Google ScholarGoogle Scholar
  46. Mozilla Bugzilla bug 149943 - Princeton-like exploit may be possible. https://bugzilla.mozilla.org/show_bug.cgi?id=149943.Google ScholarGoogle Scholar
  47. Mozilla Bugzilla bug 162871 - DNS: problems with new DNS cache ("pinning" forever). https://bugzilla.mozilla.org/show_bug.cgi?id=162871.Google ScholarGoogle Scholar
  48. Mozilla Bugzilla bug 205726 - nsDnsService rewrite. https://bugzilla.mozilla.org/show_bug.cgi?id=205726.Google ScholarGoogle Scholar
  49. Mozilla Bugzilla bug 245609 - Mozilla not getting certificate issuer from Authority Information Access CA Issuers, June 2004.Google ScholarGoogle Scholar
  50. mozilla.dev.security. VeriSign Class 3 Secure Server CA http://groups.google.com/group/mozilla.dev.security/browse_thread/threa%d/6830a8566de24547/0be9dea1c274d0c5, March 2007.Google ScholarGoogle Scholar
  51. mozilla.org. The same-origin policy. http://www.mozilla.org/projects/security/components/same-origin.html.Google ScholarGoogle Scholar
  52. Netcraft anti-phishing toolbar. http://toolbar.netcraft.com/.Google ScholarGoogle Scholar
  53. Gunter Ollmann. The pharming guide. http://www.ngssoftware.com/papers/ThePharmingGuide.pdf.Google ScholarGoogle Scholar
  54. Stefano Di Paola and Giorgio Fedon. Subverting Ajax. In 23rd Chaos Communication Congress, December 2006.Google ScholarGoogle Scholar
  55. Bryan Parno, Cynthia Kuo, and Adrian Perrig. Phoolproof phishing prevention. In Proceedings of Financial Cryptography (FC '06), February 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Washington Post. Citibank Phish Spoofs 2-Factor Authentication. http://blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoof%s_2factor_1.html.Google ScholarGoogle Scholar
  57. Washington Post. Not Your Average Phishing Scam. http://blog.washingtonpost.com/securityfix/2007/01/not_your_average_ama%zon_phishi.html.Google ScholarGoogle Scholar
  58. PTFB Pro. http://www.ptfbpro.com/.Google ScholarGoogle Scholar
  59. Venugopalan Ramasubramanian and Emin Gun Sirer. Perils of transitive trust in the Domain Name System. In Proceedings of the Internet Measurement Conference (IMC), October 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Nicholas Rosasco and David Larochelle. How and why more secure technologies succeed in legacy markets: Lessons from the success of SSH. In Proceedings of the Second Annual Workshop on Economics and Information Security, May 2003.Google ScholarGoogle Scholar
  61. Jim Roskind. Attacks against the netscape browser. Invited talk, RSA conference, April 2001.Google ScholarGoogle Scholar
  62. Blake Ross, Collin Jackson, Nicholas Miyake, Dan Boneh, and John C. Mitchell. Stronger password authentication using browser extensions. In Proceedings of the 14th USENIX Security Symposium, pages 17--32, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Stefan Santesson and Russell Housley. Internet X.509 Public Key Infrastructure Authority Information Access Certificate Revocation List (CRL) Extension. http://www.ietf.org/rfc/rfc4325.txt, December 2005.Google ScholarGoogle Scholar
  64. Stuart Schechter, Rachna Dhamija, Andy Ozment, and Ian Fischer. Emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Security Space and E-Soft. Secure Server Survey. http://www.securityspace.com/s_survey/sdata/200704/certca.html, May 2007.Google ScholarGoogle Scholar
  66. Rajiv Shah and Christian Sandvig. Software Defaults as De Facto Regulation: The Case of the Wireless Internet. In The 33rd Research Conference on Communication, Information, and Internet Policy, September 2005.Google ScholarGoogle Scholar
  67. Christopher Soghoian and Markus Jakobsson. A Deceit-Augmented Man In The Middle Attack Against Bankof America's SiteKey Service. http://paranoia.dubfire.net/2007/04/deceit-augmented-man-in-middle-atta%ck.html, April 2007.Google ScholarGoogle Scholar
  68. Josh Soref. DNS: Spoofing and Pinning. http://viper.haque.net/~timeless/blog/11/.Google ScholarGoogle Scholar
  69. Spoofstick. http://www.spoofstick.com/.Google ScholarGoogle Scholar
  70. Sid Stamm, Zulfikar Ramzan, and Markus Jakobsson. Drive-by pharming. Technical Report 641, Indiana University Computer Science, December 2006.Google ScholarGoogle Scholar
  71. Win Treese and Eric Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. http://tools.ietf.org/html/rfc4346, 2006.Google ScholarGoogle Scholar
  72. Alex Tsow. Phishing with consumer electronics - malicious home routers. In Models of Trust for the Web Workshop at the 15th International World Wide Web Conference (WWW2006), May 2006.Google ScholarGoogle Scholar
  73. Alex Tsow, Markus Jakobsson, Liu Yang, and Susanne Wetzel. Warkitting: the drive-by subversion of wireless home routers. Journal of Digital Forensic Practice, 1(3), November 2006.Google ScholarGoogle ScholarCross RefCross Ref
  74. Vanguard security center. https://flagship.vanguard.com/VGApp/hnw/content/UtilityBar/SiteHelp/Sit%eHelp/SecurityCenterOverviewContent.jsp.Google ScholarGoogle Scholar
  75. VeriSign. Licensing VeriSign Certificates Securing Multiple Web Server and Domain Configurations. http://www.verisign.com/static/001496.pdf, June 2005.Google ScholarGoogle Scholar
  76. VivilProject. List of public DNS servers.Google ScholarGoogle Scholar
  77. Min Wu, Robert C. Miller, and Simson Garfinkel. Do security toolbars actually prevent phishing attacks? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 601--610, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Min Wu, Robert C. Miller, and Greg Little. Web wallet: Preventing phishing attacks by revealing user intentions. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), pages 102--113, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Yichen Xie and Alex Aiken. Static detection of security vulnerabilities in scripting languages. In Proceedings of the 15th USENIX Security Symposium, pages 179--192, August 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Wei Xu, Sandeep Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of the 15th USENIX Security Symposium, pages 121--136, August 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Yahoo sign-in seal. http://security.yahoo.com/.Google ScholarGoogle Scholar
  82. Eileen Ye and Sean Smith. Trusted paths for browsers. In Proceedings of the 11th USENIX Security Symposium, pages 263--279, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Ka-Ping Yee and Kragen Sitaker. Passpet: Convenient password management and phishing protection. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), pages 32--43, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Tatu Ylonen. SSH - secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, pages 37--42, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Jim Youll. Fraud vulnerabilities in SiteKey security at Bank of America. cr-labs.com/publications/SiteKey-20060718.pdf, July 2006.Google ScholarGoogle Scholar
  86. Yue Zhang, Serge Egelman, Lorrie Faith Cranor, and Jason Hong. Phinding phish: Evaluating anti-phishing tools. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007), February 2007.Google ScholarGoogle Scholar

Index Terms

  1. Dynamic pharming attacks and locked same-origin policies for web browsers

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
      October 2007
      628 pages
      ISBN:9781595937032
      DOI:10.1145/1315245

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 October 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      CCS '07 Paper Acceptance Rate55of302submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader