Simon Willison’s Weblog

Subscribe
Atom feed for security

490 items tagged “security”

2007

Two months with Ruby on Rails. Good rant—covers both the good and the bad. The first complaint is the lack of XSS protection by default in the template language. Django has the same problem, but the solution was 90% there when I saw Malcolm at OSCON.

# 9th October 2007, 12:23 pm / rails, django, python, ruby, xss, security

The Storm Worm. Bruce Schneier describes the Storm Worm, a fantastically advanced piece of malware that’s been spreading for nearly a year and is proving almost impossible to combat. Its effects are virtually invisible but infected machines are added to a multi-million machine botnet apparently controlled by anonymous Russian hackers.

# 6th October 2007, 12:25 am / malware, bruce-schneier, botnets, hackers, security, storm, worm

Rails 1.2.4: Maintenance release. “Session fixation attacks are mitigated by removing support for URL-based sessions”—I’ve always hated URL-based sessions; I’d be interested to hear if their removal from Rails causes legitimate problems for anyone.

# 5th October 2007, 11:42 pm / rails, sessions, sessionfixation, security

Amazon makes you lie to log off (via) Amazingly, the only way to sign out of Amazon these days is to use the “If you’re not XXX, click here” link—the traditional “sign out” link has quietly vanished.

# 2nd October 2007, 1:19 pm / amazon, security, signout, usability, infoworld

Cronto. I saw a demo of this the other day—it’s a neat anti-phishing scheme that also protects against man in the middle attacks. It works using challenge/response: an image is shown which embeds a signed transaction code; the user then uses an application on their laptop or mobile phone to decode the image and enters the resulting code back in to the online application.

# 2nd October 2007, 1:14 am / phishing, cronto, security, maninthemiddle, signing, challengresponse, openid

Designing for a security breach

User account breaches are inevitable. We should take that in to account when designing our applications.

[... 545 words]

Currently WebRunner applications share cookies with other WebRunner applications, but not with Firefox. WebRunner uses its own profile, not Firefox's profile. There is a plan to allow WebRunner applications to create their own, private profiles as well.

Mark Finkle

# 30th September 2007, 4:08 pm / cookies, firefox, csrf, mark-finkle, webrunner, sitespecificbrowsers, security

WebRunner 0.7—New and Improved. A simple application for running a site-specific browser for a service (e.g. Twitter, Gmail etc). This is a great idea: it isolates your other browser windows from crashes and also isolates your cookies, helping guard against CSRF attacks.

# 27th September 2007, 1:55 pm / webrunner, security, csrf, browsers, twitter, gmail, xulrunner, sitespecificbrowsers

Google GMail E-mail Hijack Technique. Apparently Gmail has a CSRF vulnerability that lets malicious sites add new filters to your filter list—meaning an attacker could add a rule that forwards all messages to them without your knowledge.

# 27th September 2007, 10:29 am / gmail, security, google, csrf, vulnerability

A typical phishing email will have a generic greeting, such as 'Dear User'. Note: All PayPal emails will greet you by your first and last name.

PayPal's Phishing Guide

# 22nd September 2007, 2:33 pm / phishing, email, paypal, doh, security

HTTPOnly cookie support in Firefox. Five years after the bug was filed, HTTPOnly cookie support has gone in to the Mozilla 1.8 branch. This is a defence in depth feature that has been in IE for years—it lets you set cookies that aren’t available to JavaScript, and hence can’t be hijacked in the event of an XSS flaw.

# 6th September 2007, 6:27 am / httponly, brad-fitzpatrick, firefox, security, ie, mozilla, javascript

E-Voting Ballots Not Secret; Vendors Don’t See Problem. “You know things are bad when questions about a technical matter like security are answered by a public-relations firm.”

# 20th August 2007, 3:19 pm / evoting, security, pr, edfelten

VeriSign’s SeatBelt OpenID plugin for Firefox. The first good example of browser integration for OpenID. It catches phishing attempts by watching out for rogue OpenID consumers that don’t redirect to the right place.

# 17th August 2007, 5:37 pm / openid, verisign, seatbelt, firefox, security, plugins

Bruce Schneier interviews Kip Hawley. The head of the Transportation Security Administration in conversation with one of his most eloquent critics.

# 7th August 2007, 3:23 pm / bruce-schneier, interview, kip-hawley, security, tsa

(somewhat) breaking the same-origin policy by undermining dns-pinning. This is the best technical explanation of the DNS rebinding attack I’ve seen. The linked demo worked for me in Safari but not in Camino.

# 2nd August 2007, 12:53 pm / dnsrebinding, camino, safari, security, samedomain

Your browser is a tcp/ip relay. Thoroughly nasty new(ish) attack that breaks the same-domain policy and allows intranet content to be stolen by a malicious site. Using virtual hosts (hence requiring the Host: header) is the best known protection.

# 2nd August 2007, 12:53 pm / arturbergman, dnsrebinding, samedomain, security

Side-Channel Attacks and Security Theatre. “In order to mount most of these attacks the attacker must be local [...] every good security person knows that if your attacker has the ability to run stuff on your machine, it is game over, so why are we even caring about these attacks?”

# 2nd August 2007, 12:30 pm / ben-laurie, security, sidechannel, openssl, securitytheatre

E-Trade financial tried using a RSA fob as a second factor of authentication, but as of their 11/07/06 financial report their fraud losses continue to increase. That said, they considered this program a success because users indicated they feel safer and are more likely to provide assets.

Usable Security

# 20th July 2007, 10:31 am / usablesecurity, etrade, rsa, rsafob, security, usability, securitytheatre

CSRF Redirector. Smart tool for testing CSRF vulnerabilities, by Chris Shiflett.

# 18th July 2007, 7:45 am / chris-shiflett, csrf, security

Anyone who recently downloaded GreaseMonkey scripts from userscripts.org should check their scripts. I haven’t confirmed this, but this Jyte claim suggests that userscripts.org was hacked and cookie stealing code inserted in to some of the scripts. UPDATE: Not hacked; just bad scripts submitted through the regular process.

# 7th July 2007, 10:43 pm / greasemonkey, jyte, security, userscripts

Safari Beta 3.0.1 for Windows. A nice fast turnaround on fixes for security flaws in the beta.

# 14th June 2007, 9:56 am / security, safari, apple, patch

Safari for Windows, 0day exploit in 2 hours (via) Once again, down to handling of alternative URL protocol schemes.

# 12th June 2007, 1:30 pm / 0day, security, windows, safari, apple

Security Breach. A statement from Dreamhost.

# 8th June 2007, 8:16 am / security, dreamhost, hosting

Firefox promiscuous IFRAME access bug. Lets malicious sites “display disruptive or misleading contents in the context of an attacked site” and intercept keystrokes! The demo worked in Camino 1.5 as well. Avoid using Gecko-based browsers until this is patched?

# 6th June 2007, 10 am / michal-zalewski, camino, firefox, security, iframes

Gaping holes exposed in fully-patched IE 7, Firefox (via) Michal Zalewski released a new Firefox 2.0 vulnerability in addition to the IE cookie stealing one.

# 6th June 2007, 9:57 am / firefox, ie, michal-zalewski, security

IE vulnerability allows cookie stealing. Full exploit against the same-domain cookie origin policy, so malicious sites can steal cookies from elsewhere. Avoid using IE until this is patched.

# 6th June 2007, 9:53 am / ie, security, samedomain, cookies

Massive Dreamhost hack, WordPress not to blame

On mezzoblue, Dave Shea reports that someone had modified every index.php and index.html file on his site to include spam links at the bottom of the page, hidden inside a <u style="display: none;">. Dozens of other people in his comments reported the same thing happening to their sites.

[... 279 words]

Unsettling. Sounds like there might be a massive scripted hack going on against out of date WordPress installs on Dreamhost. Check your site. See also discussion in the comments attached to this post.

# 5th June 2007, 9:16 pm / dave-shea, dreamhost, hosting, php, security, spam, wordpress

Top XSS exploits by PageRank. Yahoo!, MSN, Google, YouTube, MySpace, FaceBook all feature.

# 29th May 2007, 10:07 pm / yahoo, msn, google, youtube, facebook, xss, pagerank, security