Ian G wrote, On 2009-03-22 16:01 PDT:

> Man in the Browser.  It is a term that seems to have caught on to 
> describe what happens when the browser is taken over by malware, and it 
> owns the interface.  To solve the security problems that arises in 
> online banking is more challenging, which is where the Europeans moved to.

Thanks.  I don't know why that abbreviation didn't come to mind before.

> This is one of those cases where dire predictions of doom & gloom did 
> not come to pass, *but* the European banks (generally, not all) put in 
> place enough to mitigate it.  

What have they done?  How do they stop, or detect, MITB?

> As the problem didn't surface to any great extent in the USA, there is
> dispute as to whether it doesn't really exist, or whether there are just
> easier pickings elsewhere, and it's coming sometime.

MITBs certainly exist.  There's a company that bills itself as being the
"Nielsen ratings of the Internet" (more than one, I'm sure).  They get
volunteers to install their software, and thereafter their software gets a
copy of every bit received by the volunteers' browsers.  They formerly used
an MITM proxy (which, to their credit, even proclaimed itself as the MITM
proxy when you connected to it :) and installed their own root CA cert in
your browser, but that drew too much attention from certain quarters (ahem)
so they switched to MITB.  This MITB only works in IE, or did so the last
time I checked, so it gets less attention around here.  :)

> So (in a sense you will be familiar) SSL is often "blamed" for all sorts 
> of problems in online banking.  This is somewhat fair because SSL was 
> originally pushed for the purpose of protecting transactions.  

(or protecting anything else that went through the secure pipe against
certain threats defined in that threat model.)

> This simplistic view is extremely difficult to push past because those
> that support SSL won't ever say "don't use SSL for that"

Certainly SSL (the protocol) is not mutually exclusive with other
technologies that have different scope than protecting transport
connections.  For example, I use S/MIME over TLS daily.  I wouldn't say
"Don't use TLS for secure email", but I would readily say (and have said)
"Don't use TLS *exclusively* (and nothing else) for secure email".

> and meanwhile, SSL is still pushed as the way to do security for online
> transactions.

Secure online transactions need secure pipes.  They may also need other
things.  I would say that secure pipes are necessary, but may not be
sufficient for all needs.

> So its existence has an effect of blocking any accurate discussions.
> Which is sort of rationalised at different levels.

I'll grant that the industry has just so much manpower to devote to all
these issues, and has prioritized secure transport ahead of other things, to
the delay of those other things.  I wish I could say that secure transport
is finally becoming ubiquitous and trouble free, (as, say, TCP has become)
so that the industry could get on to other matters, but alas
there are still too many products that don't get it right.

You may know and/or recall that, back in the mid 90's when https and SSL
took off (in the browser market) largely because the number one browser
of that time backed it, there was another competing proposal for securing
web communications.  It was based on securing the data, not the connection,
and its design had the property that its evidence of authenticity survived
the transport connection's termination.  It was called shttp (which had an
unfortunate pronunciation) and was championed by Eric K Rescorla, who is
today the co-chair of the TLS working group (IINM).  So, it can truly be
said that the success of TLS did reduce the effort being expended on
alternative approaches.

Maybe it's time for a resurrection of shttp?

> (By SSL, here, I do not mean the protocol, I mean the whole secure 
> browsing experience.  For the protocol I prefer the term TLS.  But 
> that's just me.)

Please do find another term for "the secure browsing experience".  SSL
and TLS are both names for versions of the same protocol.

>> The problem has been that people who wanted a different model kept
>> wishing SSL had the model they wanted, and hating SSL for not having
>> the model they wanted, rather than inventing the thing they wanted.
>> TLS does not hold them back, except perhaps psychologically.
> 
> Exactly, like that!  That's what we want to hear.  So when any other 
> model is presented, the people who support the SSL model will hopefully 
> refrain from trashing the alternates :)

Once people state clearly that they're trying to solve a different problem
than transport level security (secure pipes), they'll probably get HELP
from some of the TLS folks who are bored with TLS now.  The people who get
resistance are those who keep trying to turn TLS into something other than
secure pipes.  I wonder if EKR is still interested in shttp.

I think TLS folks do not push TLS as the solution where it doesn't fit.
TLS folks will be the first to tell you that TLS is not the solution to
secure email, for example.  They will be quick to point people who are
trying to secure their email in the direction of S/MIME.  Of course,
S/MIME and TLS are not mutually exclusive.  I use them together every day.

When the NSS team was pressed into service for a time as the secure AIM
team, back in ~2001, we devised a hybrid in which S/MIME was used to secure
the instant messages, and TLS was used for file transfer. The entire
solution featured end-to-end security.  Even TLS was end-to-end, with no
decryption and re-encryption in the middle.  The user's same cert served
as both his S/MIME cert and his TLS server and client cert.  The important
identity element was not his DNS name but rather his "screen name", but an
email address would also suffice.  Each technology was used where it fit the
problem.

But the need for secure pipes in the Web isn't going away soon.

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to