How To Secure A Website With A Password Protected Login Process (Www.Siphone)



Similar documents
Security 1 / 43

Barracuda Spam Firewall

Getting Started Guide Unix Platform

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015

More Details About Your Spam Digest & Dashboard

Correlation and Phishing

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Network Security - ISA 656 Security

How do I share a file with a friend or trusted associate?

ing from The E2 Shop System address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Filter User Guide

Anti-Phishing Best Practices for ISPs and Mailbox Providers

An Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

A D M I N I S T R A T O R V 1. 0

Setup Corporate (Microsoft Exchange) . This tutorial will walk you through the steps of setting up your corporate account.


How to Manage Spam and Junk

NoSpam Anti-Spam Service End User Guide

Update Instructions

e-shot Unique Deliverability

FILTERING FAQ

SCORECARD MARKETING. Find Out How Much You Are Really Getting Out of Your Marketing

Advanced Security Methods for efraud and Messaging

Intercept Anti-Spam Quick Start Guide

WEBMAIL USER MANUAL AN INTRODUCTION TO WLINK WEBMAIL. Table of content:

eprism Security Suite

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Comprehensive Anti-Spam Service

Network Security Protocols

Malicious Mitigation Strategy Guide

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information

Malware Monitoring Service Powered by StopTheHacker

Protect your brand from phishing s by implementing DMARC 1

eprism Security Suite

Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) x125

Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ)

turbosmtp New Dashboard Handbook

DomainKeys Identified Mail DKIM authenticates senders, message content

Migration Manual (For Outlook 2010)

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Practical guide for secure Christmas shopping. Navid

Migration Manual (For Outlook Express 6)

Roaring Penguin User Guide

Dealing with spam mail

SonicWALL Security Quick Start Guide. Version 4.6

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v

Smart E-Marketer s Guide

Malware Monitoring Service Powered by StopTheHacker

Managing Junk Mail. About the Junk Mail Filter

How to Use Red Condor Spam Filtering

DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!

Using Voltage Secur

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

PORTLANDDIOCESE.ORG - How to Connect Table of Contents

Cloud Services. Anti-Spam. Admin Guide

Security Fort Mac

Spam, Spam and More Spam. Spammers: Cost to send

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Tutorial Details Product Demonstrated: X-301 Estimated Completion Time: 15 minutes

ModusMail Software Instructions.

Barracuda Spam Firewall Users Guide. How to Download, Review and Manage Spam

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010

Webinar: Reputation Services The first line of defense. July 26, 2005

PORTLANDDIOCESE.ORG - How to Connect Table of Contents

Using etoken for Securing s Using Outlook and Outlook Express

DMA s Authentication Requirement: FAQs and Best Practices

Firewall Testing Methodology W H I T E P A P E R

Introduction Configuration & Spam Detection WinWare Webmail Accounts Account Notes Definitions...

Information Security Basic Concepts

Protecting Your Organisation from Targeted Cyber Intrusion

How To Ensure Your Is Delivered

MXSweep Hosted Protection

DKIM Enabled Two Factor Authenticated Secure Mail Client

Web Server-Side Security

How to make the s you Send from Outlook 2003 appear to Originate from different Addresses

USER GUIDE WWPass Security for (Outlook) For WWPass Security Pack 2.4

Personal Spam Solution Overview

Update Instructions

Configuration Information

Migration Project Plan for Cisco Cloud Security

Recognizing Spam. IT Computer Technical Support Newsletter

Security 8.0 User Guide

Using McAfee Quarantine Manager

anomaly, thus reported to our central servers.

Marketing Tips. From M R K Development

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

Identity Management. Audun Jøsang University of Oslo. NIS 2010 Summer School. September

Deploying Layered Security. What is Layered Security?

Marketing Glossary of Terms

SPAM-What To Do SUMMERSET COMPUTER CLUB

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

HGC SUPERHUB HOSTED EXCHANGE / 2007 SMART PANEL USER GUIDE

Security - DMARC ed Encryption

isecur User Guide for iphone

DST . Product FAQs. Thank you for using our products. DST UK

Top 40 Marketing Terms You Should Know

Transcription:

Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography ICDCS 07/07/2006 Amir Herzberg Computer Science Department, Bar Ilan University http://amirherzberg.com 04/05/06 http://amirherzberg.com 1

Internet Most Visible Threats Spam Lots of junk email Mostly illegal Breaks email But not just via email Spoofing Fake sites, email, etc. Steal passwords, Breaks e-commerce Phishing Spam leading to spoofed site

Can Crypto, Secure Protocols Help? Strong, provably-secure schemes, protocols Schemes: encryption, signatures, Computation of any function Protocols: SSL, IP-Sec, S/MIME, But: E-mail crypto (S/MIME etc.) rarely used Definitely not against spam SSL/TLS used but spoofing, phishing thrives Why? Can t crypto help? Good question Our topic, actually

Outline of rest of lecture Why users use spoofed sites? Short answer: mostly bad usability Usability improvements and beyond (crypto!) Spam and phishing solutions Why they fail? How crypto should help Accountability for e-lies (spoofing, malware, ads) Secure protocols for accountability, penalties

Typical Web Login Process Security mechanisms: Username Password SSL (encrypt password) Simple to use Any problems?

Problem 1: Site Uses SSL Incorrectly Invokes SSL only on clicking `Log On` Login form itself not protected Spoofed form: Looks the same But sends PW to attacker! Many other such sites PayPal, Bank of America, MS hotmail/passport See my `Hall of Shame` See FSTC report

Problem 2: Users DO NOT... Notice SSL indicators (padlock, https) E.g., few suspect Chase s site Trust based on content e.g., padlock in page... Notice URL in wrong domain Wrong domain login: http://bankofamerica.reo.com Most do not detect wrong domain and no SSL! And: sites can hide location bar, put fake instead Use only trusted CAs Users do not know what is a CA Users allow sites with bad certificate, or new CA http://amirherzberg.com 7

What went wrong? How to fix? `PKI is too complex` Did we give it a chance? `Users are too dumb` Did we give them a chance? First step: fix the User Interface! TrustBar: site identification indicator Default: name/logo and `Identified by` <CA> Users know whom they depend on Customized: user-selected logo/icon/name Petname http://amirherzberg.com 8

TrustBar: Default Identification Identified by not `CA`!! Identify site by logo or name Identify CA by logo or name Visible: SSL vs. No-SSL Compare to `regular` padlock http://amirherzberg.com 9

IEv7: Partial Adoption Mandatory, fixed location bar Color coded: red (phishing), green (`good` SSL) `Blacklist` approach [new addresses are cheap] Contains padlock and name for SSL site: Name alternates with `Identified by` <CA>: But: only for `extended validation certificates` http://amirherzberg.com 10

Experiments: Compare ID Indicators 70 Classical SSL (no ID) ID from certificate User selects ID 60 50 40 30 20 10 0 Throughput Goodput Error %

Conclusions from Experiments Adding site identification helps User-selected identification even better But: significant error rates!! Expect higher error rates in `real life` Why high error rates? Users trust content of site Is this stupid or what? Secure usability rule: Defend, don t ask Block attacks, don t ask user to help That s the role of defense forces, isn t it? How?? Single click logon (don t enter password) Default blocking mode & accountability - using crypto!!

Single-Click Logon Idea: avoid entry of password by user Cannot steal password if user does not enter it! Improved usability Trivial to use: must click site identifier (logo) User cannot enter, submit password via site!! http://amirherzberg.com 13

Safe-Surf Mode (Block by Default) Defending login process is not enough E.g., does not block malware Proposal: safe-surf mode: allow only legit pages Display only rated, signed content Initially, only e-banking future: everything rated, signed! Ratings: This script/executable does not contain malware This image does not contain any logo or trademark This page contains only content owned by Foo.com Inc. This video is rated PG-13 Ensure correct ratings by reputation or penalties Punish e-lies by crypto protocols http://amirherzberg.com 14

Outline of rest of lecture Why users use spoofed sites? Short answer: mostly bad usability Usability improvements and beyond (crypto!) Spam and phishing solutions Why they fail? How crypto should help Accountability for e-lies (spoofing, malware, ads) Secure protocols for accountability, penalties Only highlights - no time today

`Isn t content filtering good enough?` Content filtering blocks most spam By email client (e.g. Thunderbird, Outlook) By mail server (e.g. spamassasin) But filtering is expensive (computationally) is unreliable fails against adaptive adversary Spammers are very adaptive Short messages (`Bob, see this link: xxx.com`) Learn from captured messages, feedback Phishing: messages emulate authentic text!!

Accountability Spam Solutions Most spam solutions use accountability: Accept only `accountable` messages Punish `accountable party` if message was spam Often, `accountable party`=outgoing mail server Validate `accountability` by Sending mail server s (SMTP-sender) IP address SMTP-sender-IP vs. SPF record SPF record of mail-from/helo/pra domain Signature on email, e.g. DKIM DKIM: signature format, key of domain stored in DNS How to punish accountable spammers?

Punishing Accountable Spammers Blacklist (block) `bad` servers Problem: easy, cheap to change `name` (IP addr) Whitelist known, trusted servers Spammers and unknown delayed, filtered Problem: unfair to new correspondents Common problem: `all or nothing` approach Very few servers block all users of AOL, gmail Using reputation / accreditation services Spammers reported, `punished` by service How can recipient be sure penalties are right? How can service validate complaints?

Secure Penalties and Resolutions General automated resolution and penalty mechanism For spam Mail with incorrect `label` (e.g. `not commercial`) For phishing Mail with false sender identification For spoofed/scam sites Sites with misleading/harmful content And other goals, e.g. P2P fairness (no free riders) How? Use trusted resolution authority (RA) and payment service Sign pledge: content, label (`no ad`), RA, penalty amount Victim sends pledge to RA, receives signed resolution Trusted payment service receives pledge + resolution

Secure Resolution and Penalty Protocol Alice (attacker?) Bob (victim?) Req. certified check :<x$,bob,a.v> Payment Service Resolution Authority cert=x$,bob,a.v, Sign PS (x$,bob,a.v) cert, pledge=sign A.s (y$,msg,label,ra) Omitted: - Specifications - Details (e.g. timestamps) - Analysis - Additional scenarios (e.g. multiple payment servers) pledge, label r=sign RA (pledge, resolution) pledge, r

Conclusions We should protect `average` Net users Usability and accountability are keys Specific proposals: Site Identification Indicators (customizable) Single-click logon Safe-Surf mode (allow only rated content) Secure resolution and penalty protocol Validation is critical Serious usability studies (hard ) Modular analysis and proofs of security http://amirherzberg.com 21