[16654] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: AOL Help : About =?ISO-8859-1?Q?AOL=AE_PassCode?=

daemon@ATHENA.MIT.EDU (Joerg Schneider)
Thu Jan 6 19:51:33 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 06 Jan 2005 11:44:02 +0100
From: Joerg Schneider <js@joergschneider.com>
To: Florian Weimer <fw@deneb.enyo.de>
Cc: Ian G <iang@systemics.com>, cryptography@metzdowd.com,
	cypherpunks@al-qaeda.net
In-Reply-To: <87pt0k6dn1.fsf@deneb.enyo.de>

Florian Weimer wrote:
> I think you can forward the PassCode to AOL once the victim has
> entered it on a phishing site.  Tokens =E0 la SecurID can only help if

Indeed.

> the phishing schemes *require* delayed exploitation of obtained
> credentials, and I don't think we should make this assumption.  Online
> MITM attacks are not prevented.

So, PassCode and similar forms of authentication help against the=20
current crop of phishing attacks, but that is likely to change if=20
PassCode gets used more widely and/or protects something of interest to=20
phishers.

Actually I have been waiting for phishing with MITM to appear for some=20
time (I haven't any yet - if somebody has, I'd be interested to hear=20
about), because it has some advantages for the attacker:

* he doesn't have to bother to (partially) copy the target web site

* easy to implement - plug an off-the-shelf mod_perl module for reverse=20
proxy into your apache and add 10 minutes for configuration. You'll find =

the passwords in the log file. Add some simple filters to attack PassCode=
=2E

* more stealthy, because users see exactly, what they are used to, e.g.=20
for online banking they see account balance etc. To attack money=20
transfers protected by PassCode, the attacker could substitute account=20
and amount and manipulate the server response to show what was entered=20
by user.


Assuming that MITM phishing will begin to show up and agreeing that=20
PassCode over SSL is not the solution - what can be done to counter=20
those attacks?

Mutual authentication + establishment of a secure channel should do the=20
trick. SSL with client authentication comes to my mind...



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post