Hello,
> On Jun 13, 2015 4:28 AM, "Michael Catanzaro" < [email protected] > wrote:
> > On Fri, 2015-06-12 at 15:49 -0700, Andrew Lutomirski wrote:
> > > >
> > > But that's not even right. Suppose you have a captive portal that
> > > wants you to log in via your Google account. It can send you do
> > > https://accounts.google.com , and your browser can verify the
> > > certificate and show you an indication that the connection is secure.
> > > Then you really can safely enter your password.
> >
> > Hmmm, I didn't realize legitimate portals might take you to the public
> > Internet.
> I think I've seen this in airports and in some hotel chains.
Yes; sadly, many “legitimate portals” (easily 50% of the airport hotspots I
have encoutered in Europe) are pretty much attackers.
In particular, many of them want to bypass hotspot detection so that the log in
screen does not appear in the sandboxed hotspot sign-on browser; by now it is a
pretty standard feature of business access points to have a “bypass hotspot
detection” checkbox. (For iOS, this has reportedly been done by recognizing an
unique User-Agent used for the hotspot check; not sure about Android.)¹
They want to use the regular, unsandboxed, browser so that
* password autofill works
* credit card number autofill works
* your Facebook login state is available to that you can easily “like” the
hotspot provider (I’m not entirely sure but I think I did already see “like our
page for 15 minutes of free internet” in a public hotspot)
* your advertising tracking cookies transfer (for better targeting of ads
on the hotspot login page, or so that you can be marked “visited airport $ABC”
and related ads can be targeted at you in the future)
What would dnssec-trigger do if an attacker^Wlegitimate hotspot provider
deliberately let the hotspot probe lookup and connection through, but kept
redirecting everything else?
Mirek
¹ You can guess what this does to any applications which use unauthenticated
HTTP to download data in the background: all that data suddenly becomes the
hotspot login page and the application may not realize there is anything
suspect about it.
--
devel mailing list
[email protected]
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct