TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Crack in Internet's foundation of trust allows HTTPS session hijacking

162 pointsby aspratleyover 12 years ago

7 comments

gaunabover 12 years ago
So for this to work, an attacker needs to be a Man In The Middle, and get the attacked client to execute some malicious Javascript, which in turn crafts requests to a target site which uses TLS and SPDY. The MITM intercepts and compares the encrypted and compressed payload for recurring patterns that result when using DEFLATE. By playing with the crafted requests, he can e.g. guess cookie values that were added by the browser to the request (as many XSS attacks work) by comparing the lengths of the encrypted payloads.<p>See <a href="http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/" rel="nofollow">http://security.blogoverflow.com/2012/09/how-can-you-protect...</a> for technical details.<p>This seems to be a very basic attack, wondering why this attack vector wasn't publicly known much earlier...
评论 #4517538 未加载
评论 #4515451 未加载
评论 #4517941 未加载
评论 #4518393 未加载
hendrik-xdestover 12 years ago
Ah, so that's why Google removed TLS compression with Chrome as discussed here: <a href="http://news.ycombinator.com/item?id=4510829" rel="nofollow">http://news.ycombinator.com/item?id=4510829</a>
dumbdumbdumbover 12 years ago
1. User disables Javascript<p>2. User's browser cannot automatically request resources (e.g. via img src tag). Either user prefers to download images manually (e.g. as text-based browser allow) or because he has fine-grained control over his name lookups (e.g. a managed HOSTS file or authoritative nameserver on localhost). User request the resources he wants specifically (how many would deliberately choose to download an ad?). He does not leave download choices to browser authors and web developers.<p>3. User's browser does not advertise compression support. User does not allow web pages to issue HTTP requests e.g. via Javacript. User downloads JSON directly and parses it to obtain the desired resource URL's.<p>4. User has no desire to compress HTTP headers. User is not interested in SPDY.<p>What if someone has automated this sort of common sense approach so that it's so simple your grandmother would find it easy to use?<p>Would this make security consultants, browser authors and web developers upset?
pestaaover 12 years ago
Could this be worked around with some added random-length non-redundant data so that the 3rd party can draw no conclusions from the varying responses?<p>Of course this works as long as the additional deceit doesn't defeat the advantages of compression and even then it still feels like security through obscurity.
评论 #4515439 未加载
评论 #4515450 未加载
colinmarcover 12 years ago
I don't see how this attack would work on SPDY, unless you could add arbitrary headers to the request. CRIME works because the entire request is compressed together, whereas in SPDY the header block is compressed separately.
评论 #4518524 未加载
protobluffersover 12 years ago
I never liked SPDY to begin with. It always seemed to be gratuitously promoting a "new" protocol when many of the speed gains can be had from simply paying better attention to existing protocols, e.g. using pipelining for multiple resources from the same domain. A lot of the "slowness" of the web comes from ignorance and laziness, not lack of capable protocols. It was disturbing how much mindshare SPDY seemed to be getting just based on hype.<p>And TLS always seemed like a replacement for SSL, when what's really needed are _alternatives_ to the SSL model, not a GNU clone that proclaims it can do the same or better.<p>This is just my opinion. I apologise if it offends anyone.<p>Fortunately there are alternatives. You just have to look beyond the hype.
评论 #4518317 未加载
评论 #4518300 未加载
评论 #4518431 未加载
评论 #4518320 未加载
peterwwillisover 12 years ago
What I hate about this vuln is there's no practical fix for many web servers because there was never an option to disable the TLS compression. They're rushing to backport those options now. The good thing is it seems the top three browsers don't even use TLS compression [anymore].