Re: ACTION-231 OPEN Start a discussion about including descriptions of the information divulged to websites by user-agents

The email information isn't something sent by the browser, at least  
not directly - inspecting the source code of the tool that builds  
these pages ( http://ha.ckers.org/mr-t ) it appears that they are  
taking advantage of some gmail/mhtml information disclosure setup.   
It doesn't work for me in Minefield (FF3 build) or FF2, so I can't  
really shed more light than that.  It looks like there are commented  
out sections of the script that tried similar things with msn/yahoo,  
so I suspect the site rides the exploits-of-the-month.

Cheers,

J

---
Johnathan Nightingale
Human Shield
johnath@mozilla.com



On 13-Jun-07, at 8:42 AM, Mary Ellen Zurko wrote:

>
> Interesting thought Bill.
>
> My initial reaction to looking through the data is, what the heck  
> is email doing in information that's given in the clear to every  
> web site. Am I misreading it? I would have thought best practice  
> would be to encode any personal information (and for me, and in the  
> days of spam, my email is personal) in cookies. Can anyone explain  
> that one?
>
>
>           Mez
>
> Mary Ellen Zurko, STSM, IBM Lotus CTO Office       (t/l 333-6389)
> Lotus/WPLC Security Strategy and Patent Innovation Architect
>
>
>
> "Doyle, Bill" <wdoyle@mitre.org>
> Sent by: public-wsc-wg-request@w3.org
> 06/12/2007 12:07 PM
>
> To
> "Johnathan Nightingale" <johnath@mozilla.com>, <public-wsc-wg@w3.org>
> cc
> Subject
> RE: ACTION-231 OPEN Start a discussion about including descriptions  
> of the information divulged to websites by user-agents
>
>
>
>
>
> Thx!
>
> All good points. Just putting the information out to generate  
> discussion and see if something can be done to improve security  
> posture.
>
> Yes, the same info that is used by web sites to make things work is  
> used by malicious web sites to compromise the environment. One  
> though is that "safe" modes of operation could also limit data that  
> is exposed or available.
>
> Appreciate the response.
>
> Bill D.
>
>
> From: Johnathan Nightingale [mailto:johnath@mozilla.com]
> Sent: Tuesday, June 12, 2007 11:15 AM
> To: Doyle, Bill
> Subject: Re: ACTION-231 OPEN Start a discussion about including  
> descriptions of the information divulged to websites by user-agents
>
> I don't dispute that this information goes out, nor that it does so  
> largely without users' knowledge.  My questions for any would-be  
> recommendation of this type are:
>
> a) Can limiting this information be done in any way without  
> breaking the web?  Plugins announcing their presence, user agent  
> strings, referrer strings, and javascript support are all pieces of  
> information that web sites frequently want to know, and that our  
> users, by interacting with those sites, probably don't want to see  
> broken.  I wouldn't want a recommendation included that we know, on  
> its face, that browser vendors won't implement.
>
> b) Even in the absence of explicit disclosure (e.g. http headers  
> describing the user agent and its software environment) there are a  
> variety of fingerprinting attacks that can be used to determine  
> this type of information (e.g. trying some recent javascript  
> construct, and watching for errors, trying to set a cookie and then  
> reloading to see if it stuck.)  Would conformance require  
> countermeasures here too?  Are such things even possible?
>
> c) Aside from limiting the disclosure itself which is maybe not  
> even what is envisioned, can *informing* the user of these things,  
> most of which, by definition, are computerspeak, lead them to make  
> better decisions?  We have it as a goal to reduce the number of  
> situations where trust decisions have to be made by the user, but  
> this would seem to introduce a new one.  That's not immediately  
> inappropriate, if it's a decision that was being badly made for  
> them before now, but I would be interested to hear more about how  
> we make this something users can understand.
>
> That's not intended to be stop-energy - just discussion points.
>
> Cheers,
>
> Johnathan
>
> ---
> Johnathan Nightingale
> Human Shield
> johnath@mozilla.com
>
>
>
> On 11-Jun-07, at 4:41 PM, Doyle, Bill wrote:
>
> In the current user agent environment, security details and privacy  
> information can be extracted by a web site without the user’s  
> permission or knowledge. The user agent environmentand many privacy  
> details are readily available to a web site. The information can  
> used to support the compromise of a user’s security posture in  
> several ways; two methods are included below.
> 1.        The operating environment details (e.g. User Agent info.  
> Plug-ins, Email addresses) can be presented back to a user in order  
> to make a malicious web site appear friendly such as a previously  
> visited site or a site trying to help the user. A malicious site  
> can use this information to further compromise of the user’s  
> security posture by making the user make incorrect downstream  
> security decisions.
> a.        Links to update software or software to fix operating  
> environment that actually contain additional malware.
> b.        Email (gained by the site) can be used to send to the  
> user links that need to be immediately acted upon. The email  can  
> be designed to further confuse the user and gain additional privacy  
> information or account details.
> 2.        A web site can make use of critical flaws in the User  
> Agent environment that can lead to complete compromise of the users  
> operating environment allowing remote code execution. A malicious  
> web site can compromise the users operating environment without any  
> user interaction besides taking the initial link that lead them to  
> the site. Exploits include the following components.
> a.        Plug-ins
> b.        User Agent itself
> Sample operating environmentand user agent detailsgiven to a web  
> site is listed below.Information with bold x was valid information  
> determined by a web site but blocked from further distribution.  
> Because application and version information is provided by User  
> Agent to a web site, a malicious web site can determine if it has a  
> exploit that matches any of the user agent software components and  
> proceed to compromise the user agent if a match is found.
> Environmental variables:
> HTTP_ACCEPT = */*
> HTTP_ACCEPT_LANGUAGE = en-us
> HTTP_CACHE_CONTROL = max-age=259200
> HTTP_CONNECTION = keep-alive
> HTTP_USER_AGENT = Mozilla/4.0 (compatible; MSIE 6.0; Windows NT  
> 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
> HTTP_VIA = 1.0 xxxxx.xxx.xxx:80 (squid/2.5.STABLE6)
> HTTP_X_FORWARDED_FOR = xxx.xx.xxx.xx
> REMOTE_ADDR = xx.xxx.xx.xx
> REMOTE_PORT = xxxxx
> REQUEST_METHOD = GET
> SERVER_PROTOCOL = HTTP/1.0
> Derived Information:
> It appears you are not using Tor
> Your Gmail Email Address: xxx@xxx.com
> Your Real Email Address: undefined
> Browser detection:
> IE7.0 not detected
>
> JavaScript Version: 1.3
> Browser type: Microsoft Internet Explorer
> User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;  
> SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
> System Language: en-us
> Cookies Enabled: true
> Application Version: 4.0 (compatible; MSIE 6.0; Windows NT 5.1;  
> SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
> Platform: Win32
> Application Code Name: Mozilla
> Application Minor Version: ;SP2;
> On line: true
> Application Code Name: Mozilla
> Java Enabled: true
> Your Intranet IP:
> Currently using Internet Explorer and it is your default browser.
> Firefox plugin detection: <atta269b.gif>
> JavaScript variables:
> Window width = 1001
> Window height = 557
> Available Screen Height = 960
> Available Screen Width = 1280
> Color Depth = 32
> Plug-ins
> Plugin_Flash
>  Version 9 (Version 9,0,28,0)
> Plugin_Flash
>  Version 9 (Version 9,0,28,0)
> Plugin_FlashVerEx  9,0,28,0
> Plugin_Director
>  Not installed
> Plugin_DirectorVerEx
> Plugin_QuickTime
>  Not determinable. Either QT is not installed or a version prior to  
> 4.1.1 is installed.
> Plugin_QuickTimeVerEx
> Plugin_Acrobat
>  Installed (Version 8.0.0)
> Plugin_AcrobatVerEx
>  8.0.0
> Plugin_RealPlayer
>  RealPlayer 10 installed (build 6.0.12.1483)
> Plugin_RealPlayerBuild
>  6.0.12.1483
> Plugin_MediaPlayer
>  Installed (Version 10.0.0.4036)
> Plugin_MediaPlayerVerEx
>  10.0.0.4036
> Plugin_Flip4Mac
>  Not installed
> Plugin_JavaVer
>  Not tested
> Plugin_iPIXViewer
>  Not installed
> Plugin_SVGViewer
>  Not installed
> Plugin_CrystalReports
>  Not installed
> Plugin_Viewpoint
>  Not installed
> Plugin_Authorware
>  Not installed
> Plugin_Mapguide
>  Not installed
> Plugin_Citrix
>  Not installed
> Plugin_Custom
>  Not installed
>
>
>
>
>
>

Received on Wednesday, 13 June 2007 13:47:15 UTC