[3964] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Javascript and Security

daemon@ATHENA.MIT.EDU (Geoffrey Leeming)
Mon Jan 13 06:52:52 1997

To: Jacob Rose <jacob@whiteshell.com>, www-security@ns2.rutgers.edu
From: Geoffrey Leeming <geoffrey@indiciis.com>
Date: Mon, 13 Jan 1997 10:01:37 +0100
Errors-To: owner-www-security@ns2.rutgers.edu

At 03:33 PM 11/1/97 +0100, you wrote:
>Perhaps the thing to do would be to build an uncopyable symbol on the top
>level of a site with a statement that indicates that that symbol should be
>visible throughout the site, and if it goes away, security may have been
>breached.  A java applet that talks to the server might be one way.
>Another might be to use server pushes.  Any ideas on how it could be done?

It's a very nice idea: not only would it provide a useful security function,
but it would also give that important impression of security to the user
that is so helpful in building up a culture of security.

HOWEVER, (you knew that was coming, didn't you?) it might not be that feasible.

One potential web-spoofing attacks is to route page requests through the
attacker's site, so that any security-relevant information can be picked up
en route.

So if person A wants to get to www.real-site.com, the attacker perverts a
link to point to www.attacker's-site.com:www.real-site.com.

(This of course only works if you're following page-embedded links or if the
attacker can get at your bookmarks file.)

So any information that www.real-site.com sends out, including the
uncopyable symbol, gets passed on to the user, even though the attacker has
not copied anything from the target site.




Geoffrey Leeming     0171 592 3007 - Office Direct Dial
Consultant           0171 836 0567 - Fax
Indicii Salus Ltd.   0956 844 168  - Mobile


home help back first fref pref prev next nref lref last post