|
|
Subscribe / Log in / New account

Security

The future of unencrypted web traffic

By Jake Edge
January 2, 2008

Hypertext transfer protocol (http) is the heart of the web, providing the means to retrieve content from remote servers. It is an unencrypted, text-based protocol which allows malicious intermediaries to snoop on and potentially modify the traffic. Unfortunately, internet service providers (ISPs) are getting increasingly bold in manipulating the traffic that they carry. This has lead some to call for the elimination of http, in favor of encrypted http (aka secure http or https).

An ISP is perfectly situated to gather an enormous amount of information about its users, their website preferences and habits (often called clickstream data). Some have reportedly been selling some of that data in a thinly-anonymized form to advertisers and others. As AOL's well-intentioned, but poorly implemented, release of search queries showed, it is rather easy to analyze this kind of data and pierce the anonymity, deriving the specific user.

Another recent ISP trick is to modify a retrieved web page to display other information – under the control of the ISP – which looks like it comes from the website itself. Canadian ISP Rogers Internet has been testing a system to add content to the Google homepage for their customers who are near their monthly bandwidth limits. There are also plans afoot for ISPs to use clickstream data to target advertising – though just where those ads would show up is far from clear.

This kind of manipulation is unlikely to be what internet users expect – to the extent they think about it all. The model folks tend to use is that of a phone company; we do not expect them to sell our call records to the highest bidder, nor do we give them license to modify our calls. Various telecommunications privacy laws protect that data, but those laws have not (yet) been applied to internet traffic. In addition, ISPs tend to have a monopoly or near-monopoly, which restricts alternative, less-intrusive ISPs from competing.

Fortunately, there are technical solutions possible in the internet realm that would be difficult or impossible to implement network-wide in the phone system. Encrypting website traffic will go a long way towards eliminating this kind of ISP abuse, though it is no panacea. As more of these kinds of privacy invasions occur, we should see more routine use of https by websites.

Currently, https is almost exclusively used for e-commerce transactions; typing in credit card numbers and the like. Authentication via username and password is another area that sees widespread encrypted pages. Sites may start to use https for their entire site to combat clickstream and page rewriting abuse – though there will still be some information leakage as the ISPs can still see what sites are being visited.

In order to make an https connection, the server must have a certificate with its public key. Typically those are signed by an authority recognized by browsers which allows the browser to authenticate that the certificate belongs to the host visited. Getting signed certificates is a bit cumbersome, costs some money, and they need to be renewed periodically – all of which adds up to a headache for a site, especially a small, non-commercial site, that wants to switch to using https. Self-signed certificates are an alternative, but because they are susceptible to man-in-the-middle attacks, browsers warn their users when they receive one.

Another problem with this approach is the extra processing required on the server to support encrypting each and every request. There is a non-trivial amount of extra work that must be done per request and cannot be cached. Sites that wish to avoid the problems that some ISPs are introducing will just have to bear that cost.

Pushing bits is not very glamorous, but that is really what one hires an ISP to do. Since they seem to be finding new and exciting ways to interfere with those bits – Comcast messing with BitTorrent traffic for example – internet users will have to find ways to thwart their schemes and encryption will be a big part of that effort. Using https site-wide is only one step, other services will also need to be protected from ISP abuse. What if an ISP started manipulating the results returned from DNS queries, perhaps routing some to a server they control?

Comments (32 posted)

LWN adds a Security index

LWN has added a new index to complement the existing Kernel index. The Security index covers security articles we have published since the start of 2007. Hopefully this will be a useful resource for our readers and, as always, we value your comments. Please send them to lwn-AT-lwn.net.

Comments (none posted)

New vulnerabilities

autofs: privilege escalation

Package(s):autofs CVE #(s):CVE-2007-6285
Created:December 21, 2007 Updated:January 14, 2008
Description: The default configuration for autofs 5 (autofs5) on Red Hat Enterprise Linux (RHEL) 4 and 5 does not specify the nodev mount option for the -hosts map, which allows local users to access "important devices" by operating a remote NFS server and creating special device files on that server.
Alerts:
Mandriva MDVSA-2008:009-1 autofs 2007-01-12
Mandriva MDVSA-2008:009 autofs 2007-01-11
Fedora FEDORA-2007-4707 autofs 2007-12-21
Fedora FEDORA-2007-4709 autofs 2007-12-21
Red Hat RHSA-2007:1177-01 autofs5 2007-12-20
Red Hat RHSA-2007:1176-01 autofs 2007-12-20

Comments (1 posted)

bind: insecure permissions

Package(s):bind CVE #(s):CVE-2007-6283
Created:December 21, 2007 Updated:July 10, 2008
Description: Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable permissions, which allows local users to perform unauthorized named commands, such as causing a denial of service by stopping named.
Alerts:
Fedora FEDORA-2008-6281 bind 2008-07-09
Red Hat RHSA-2008:0300-02 bind 2008-05-21
Fedora FEDORA-2008-0903 bind 2008-01-22
Fedora FEDORA-2007-4655 bind 2007-12-20
Fedora FEDORA-2007-4658 bind 2007-12-20

Comments (1 posted)

clamav: mystery vulnerability

Package(s):clamav CVE #(s):CVE-2007-6337
Created:December 31, 2007 Updated:January 22, 2008
Description: Clamav contains "an unspecified vulnerability" associated with the bzip2 decompression code.
Alerts:
Fedora FEDORA-2008-0115 clamav 2008-01-22
Fedora FEDORA-2008-0170 clamav 2008-01-22
SuSE SUSE-SR:2008:001 libexiv2 dvips libsndfile squid rsync clamav xen 2008-01-09
Mandriva MDVSA-2008:003 clamav 2007-01-08
Gentoo 200712-20 clamav 2007-12-29

Comments (1 posted)

exiftags: multiple vulnerabilities

Package(s):exiftags CVE #(s):CVE-2007-6354 CVE-2007-6355 CVE-2007-6356
Created:December 31, 2007 Updated:April 1, 2008
Description: From the Gentoo advisory: Meder Kydyraliev (Google Security) discovered that Exif metadata is not properly sanitized before being processed, resulting in illegal memory access in the postprop() and other functions (CVE-2007-6354). He also discovered integer overflow vulnerabilities in the parsetag() and other functions (CVE-2007-6355) and an infinite recursion in the readifds() function caused by recursive IFD references (CVE-2007-6356).
Alerts:
Debian DSA-1533-2 exiftags 2008-04-01
Debian DSA-1533-1 exiftags 2008-03-27
Gentoo 200712-17 exiftags 2007-12-29

Comments (none posted)

exiv2: integer overflow

Package(s):exiv2 CVE #(s):CVE-2007-6353
Created:December 21, 2007 Updated:October 15, 2008
Description: Integer overflow in exif.cpp in exiv2 library allows context-dependent attackers to execute arbitrary code via a crafted EXIF file that triggers a heap-based buffer overflow.
Alerts:
Ubuntu USN-655-1 exiv2 2008-10-15
Mandriva MDVSA-2008:119 exiv2 2007-06-19
Debian DSA-1474-1 exiv2 2008-01-23
Mandriva MDVSA-2008:006 exiv2 2007-01-10
SuSE SUSE-SR:2008:001 libexiv2 dvips libsndfile squid rsync clamav xen 2008-01-09
Gentoo 200712-16 exiv2 2007-12-29
Fedora FEDORA-2007-4591 exiv2 2007-12-20
Fedora FEDORA-2007-4551 exiv2 2007-12-20

Comments (none posted)

gallery2: multiple vulnerabilities

Package(s):gallery2 CVE #(s):CVE-2007-6685 CVE-2007-6686 CVE-2007-6687 CVE-2007-6688 CVE-2007-6689 CVE-2007-6690 CVE-2007-6691 CVE-2007-6692 CVE-2007-6693
Created:December 27, 2007 Updated:February 12, 2008
Description: Versions of the Gallery photo management application before 2.2.4 have the following vulnerabilities: (1) an unauthorized album creation and file upload, (2) a local file inclusion vulnerability, (3) several cross site scripting vulnerabilities, (4) a web-accessibility protection problem, (5) problems with checks for disallowed file extensions with file uploads, (6) missing permissions checks on GR commands, (7) several information disclosures, (8) an arbitrary URL redirection problem and (9) a proxied request weakness.
Alerts:
Gentoo 200802-04 gallery 2008-02-11
Fedora FEDORA-2007-4778 gallery2 2007-12-26
Fedora FEDORA-2007-4777 gallery2 2007-12-26

Comments (none posted)

Ganglia: cross-site scripting

Package(s):ganglia CVE #(s):
Created:December 21, 2007 Updated:January 2, 2008
Description: Ganglia is a scalable, real-time monitoring and execution environment with all execution requests and statistics expressed in an open well-defined XML format. The Ganglia web frontend is vulnerable to cross-site scripting.
Alerts:
Fedora FEDORA-2007-4584 ganglia 2007-12-20
Fedora FEDORA-2007-4562 ganglia 2007-12-20

Comments (none posted)

imlib: denial of service

Package(s):imlib CVE #(s):CVE-2007-3568
Created:December 28, 2007 Updated:January 2, 2008
Description: The _LoadBMP function in imlib 1.9.15 and earlier allows context-dependent attackers to cause a denial of service (infinite loop) via a BMP image with a Bits Per Page (BPP) value of 0.
Alerts:
Fedora FEDORA-2007-4561 imlib 2007-12-28
Fedora FEDORA-2007-4594 imlib 2007-12-28

Comments (none posted)

kernel: information leak, denial of service

Package(s):linux-2.6 CVE #(s):CVE-2007-6206 CVE-2007-6417
Created:December 21, 2007 Updated:September 1, 2010
Description: Blake Frantz discovered that when a core file owned by a non-root user exists, and a root-owned process dumps core over it, the core file retains its original ownership. This could be used by a local user to gain access to sensitive information. (CVE-2007-6206)

Hugh Dickins discovered an issue in the tmpfs filesystem where, under a rare circumstance, a kernel page maybe improperly cleared, leaking sensitive kernel memory to userspace or resulting in a DoS (crash). (CVE-2007-6417)

Alerts:
SUSE SUSE-SA:2010:036 kernel 2010-09-01
Red Hat RHSA-2008:0787-01 kernel 2009-01-05
Red Hat RHSA-2009:0001-01 kernel 2009-01-08
CentOS CESA-2008:0885 kernel 2008-09-25
Red Hat RHSA-2008:0885-01 kernel 2008-09-24
SuSE SUSE-SA:2008:032 kernel 2008-07-07
SuSE SUSE-SA:2008:030 kernel 2008-06-20
Mandriva MDVSA-2008:112 kernel 2007-06-12
CentOS CESA-2008:0211 kernel 2008-05-07
Red Hat RHSA-2008:0211-01 kernel 2008-05-07
Mandriva MDVSA-2008:086 kernel 2008-04-15
Debian DSA-1503-2 kernel-source-2.4.27 2008-03-06
Debian DSA-1504 kernel-source-2.6.8 2008-02-22
Debian DSA-1503 kernel-source-2.4.27 2008-02-22
Ubuntu USN-578-1 linux-source-2.6.15 2008-02-14
SuSE SUSE-SA:2008:007 kernel 2008-02-12
Mandriva MDVSA-2008:044 kernel 2008-02-12
rPath rPSA-2008-0048-1 kernel 2008-02-08
SuSE SUSE-SA:2008:006 kernel 2008-02-07
Ubuntu USN-574-1 linux-source-2.6.17/20/22 2008-02-04
Red Hat RHSA-2008:0055-01 kernel 2008-01-31
Red Hat RHSA-2008:0089-01 kernel 2008-01-23
Debian DSA-1436-1 linux-2.6 2007-12-20

Comments (none posted)

mt-daapd: multiple vulnerabilities

Package(s):mt-daapd CVE #(s):CVE-2007-5825 CVE-2007-5824
Created:December 31, 2007 Updated:September 1, 2008
Description: From the Gentoo advisory: nnp discovered multiple vulnerabilities in the XML-RPC handler in the file webserver.c. The ws_addarg() function contains a format string vulnerability, as it does not properly sanitize username and password data from the "Authorization: Basic" HTTP header line (CVE-2007-5825). The ws_decodepassword() and ws_getheaders() functions do not correctly handle empty Authorization header lines, or header lines without a ':' character, leading to NULL pointer dereferences (CVE-2007-5824).
Alerts:
Debian DSA-1597-2 mt-daapd 2008-08-30
Debian DSA-1597-1 mt-daapd 2008-06-12
Gentoo 200712-18 mt-daapd 2007-12-29

Comments (none posted)

mysql: denial of service

Package(s):mysql-dfsg-5.0 CVE #(s):CVE-2007-6304
Created:December 21, 2007 Updated:April 7, 2008
Description: Philip Stoev discovered that the the federated engine of MySQL did not properly handle responses with a small number of columns. An authenticated user could use a crafted response to a SHOW TABLE STATUS query and cause a denial of service.
Alerts:
Gentoo 200804-04 mysql 2008-04-06
SuSE SUSE-SR:2008:003 java, nss_ldap, cairo, geronimo, moodle, SDL_image, python, mysql, nx, xemacs 2008-02-07
Mandriva MDVSA-2008:028 mysql 2007-01-29
Mandriva MDVSA-2008:017 mysql 2008-01-19
Debian DSA-1451-1 mysql-dfsg-5.0 2008-01-06
Ubuntu USN-559-1 mysql-dfsg-5.0 2007-12-21

Comments (none posted)

peercast: buffer overflow

Package(s):peercast CVE #(s):CVE-2007-6454
Created:December 28, 2007 Updated:May 21, 2008
Description: A heap-based buffer overflow in the handshakeHTTP function in servhs.cpp in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SOURCE request.
Alerts:
Debian DSA-1583-1 gnome-peercast 2008-05-20
Gentoo 200801-22:02 peercast 2008-01-30
Debian DSA-1441-1 peercast 2007-12-28

Comments (none posted)

syslog-ng: denial of service

Package(s):syslog-ng CVE #(s):CVE-2007-6437
Created:December 31, 2007 Updated:January 21, 2008
Description: The syslog-ng daemon does not properly handle messages containing an unterminated time stamp, resulting in the dereferencing of a NULL pointer and subsequent crash.
Alerts:
Fedora FEDORA-2008-0523 syslog-ng 2008-01-16
Fedora FEDORA-2008-0559 syslog-ng 2008-01-16
Debian DSA-1464-1 syslog-ng 2008-01-15
Gentoo 200712-19 syslog-ng 2007-12-29

Comments (1 posted)

typo3-src: SQL injection

Package(s):typo3-src CVE #(s):CVE-2007-6381
Created:December 28, 2007 Updated:January 2, 2008
Description: SQL injection vulnerability in the indexed_search system extension in TYPO3 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
Alerts:
Debian DSA-1439-1 typo3-src 2007-12-28

Comments (none posted)

wireshark: multiple vulnerabilities

Package(s):wireshark CVE #(s):CVE-2007-6111 CVE-2007-6112 CVE-2007-6113 CVE-2007-6115 CVE-2007-6116 CVE-2007-6119
Created:December 21, 2007 Updated:January 2, 2008
Description: Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector. (CVE-2007-6111)

Buffer overflow in the PPP dissector Wireshark 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. (CVE-2007-6112)

Wireshark 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP packet. (CVE-2007-6113)

Buffer overflow in the ANSI MAP dissector for Wireshark 0.99.5 to 0.99.6, when running on unspecified platforms, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown vectors. (CVE-2007-6115)

The Firebird/Interbase dissector in Wireshark 0.99.6 allows remote attackers to cause a denial of service (infinite loop or crash) via unknown vectors. (CVE-2007-6116)

The DCP ETSI dissector in Wireshark 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors. (CVE-2007-6119)

Alerts:
Fedora FEDORA-2007-4690 wireshark 2007-12-21
Fedora FEDORA-2007-4590 wireshark 2007-12-20

Comments (none posted)

wireshark: lots of dissector vulnerabilities

Package(s):wireshark CVE #(s):CVE-2007-6111 CVE-2007-6112 CVE-2007-6113 CVE-2007-6114 CVE-2007-6115 CVE-2007-6116 CVE-2007-6117 CVE-2007-6118 CVE-2007-6119 CVE-2007-6120 CVE-2007-6121 CVE-2007-6438 CVE-2007-6439 CVE-2007-6441 CVE-2007-6450 CVE-2007-6451
Created:December 31, 2007 Updated:February 22, 2008
Description: Wireshark has disclosed another long list of dissector vulnerabilities; see this advisory for details.
Alerts:
SuSE SUSE-SR:2008:004 xdg-utils, clamav, wireshark, pcre 2008-02-22
Red Hat RHSA-2008:0058-01 wireshark 2008-01-21
Red Hat RHSA-2008:0059-01 wireshark 2008-01-21
Mandriva MDVSA-2008:001-1 wireshark 2007-01-08
rPath rPSA-2008-0004-1 tshark wireshark 2008-01-03
Debian DSA-1446-1 wireshark 2008-01-03
Mandriva MDVSA-2008:1 wireshark 2007-01-02
Gentoo 200712-23 wireshark 2007-12-30

Comments (1 posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2008, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds