Comments on: How can you protect yourself from CRIME, BEAST’s successor? http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/ The Security Stack Exchange Blog Sat, 06 Feb 2016 05:11:22 +0000 hourly 1 https://wordpress.org/?v=4.5.6 By: Thrawn http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-9167 Tue, 25 Sep 2012 00:24:06 +0000 http://security.blogoverflow.com/?p=839#comment-9167 There’s a 10-year-old Firefox RFE that could go a long way toward fixing the JavaScript security model:

https://bugzilla.mozilla.org/show_bug.cgi?id=38933

The gist of it is: any time a cross-site request is going to be sent to a site where you have cookies and/or HTTP AUTH, you get a warning dialog, and can choose to strip the cookies/auth from the request, or block it altogether, and remember your decision for next time.

]]>
By: Frank Breedijk (Seccubus) http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-9008 Fri, 21 Sep 2012 08:46:53 +0000 http://security.blogoverflow.com/?p=839#comment-9008 If you fear the POST request cannot be done, this will also work via a GET request:

GET /fake.jpg?sessionid=abcd HTTP/1.1 etc…

Trigger by: On a malicous site

And you can use javascript on the malicous site to

]]>
By: David-Sarah Hopwood http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-8721 Tue, 11 Sep 2012 20:47:38 +0000 http://security.blogoverflow.com/?p=839#comment-8721 I’m not certain, but I think that SPDY over TLS (http://en.wikipedia.org/wiki/SPDY) may be vulnerable to this attack, even if TLS compression is disabled. SPDY does header compression, and I don’t think it’s necessary to the attack that the compression be at the TLS level. I have not studied the details of how SPDY uses compression contexts, though.

]]> By: Caleb http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-8692 Tue, 11 Sep 2012 10:54:20 +0000 http://security.blogoverflow.com/?p=839#comment-8692 Way to roll Security.SE folks! Great info both on the specifics of current issues but clearly explained in a way that is useful to keep in mind for other scenarios as well.

]]> By: CodesInChaos http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-8687 Tue, 11 Sep 2012 08:59:24 +0000 http://security.blogoverflow.com/?p=839#comment-8687 The annoying thing about this attack is that it’s not limited to TLS. It applies in many situations where content from mixed sources is compressed together. So pretty much any protocol that allows chosen plaintext attacks with compression needs to be reviewed.

  • HTTP compression with XSRF tokens, as bobince already noticed
  • Possibly SPDY header compression
  • SSH probably has similar issues
]]>
By: Krzysztof Kotowicz http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-8685 Tue, 11 Sep 2012 08:35:32 +0000 http://security.blogoverflow.com/?p=839#comment-8685 @xorninja – I improved the algorithm and now it sort of works. Results vary, but usually at least the first 8 characters are detected.

https://gist.github.com/3696912

]]>
By: albino http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-8672 Tue, 11 Sep 2012 07:24:13 +0000 http://security.blogoverflow.com/?p=839#comment-8672 Cross domain posts are perfectly possible.

]]> By: roryalsop http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-8671 Tue, 11 Sep 2012 07:16:03 +0000 http://security.blogoverflow.com/?p=839#comment-8671 It looks like this assumption is correct – Chromium disabled TLS compression on August 3rd: https://chromiumcodereview.appspot.com/10825183

Also Firefox, Chrome and Safari send ClientHello without advertising compression support – they silently removed it one month ago

Looks like Thomas is spot on with this one!

]]>
By: xorninja http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-8670 Tue, 11 Sep 2012 06:34:32 +0000 http://security.blogoverflow.com/?p=839#comment-8670 Hmm I tried this idea, but it didn’t work very well. Some code for those who want to play: http://pastebin.com/qZdNYgfr

Still a nice idea, though!

]]>
By: D.W. http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/#comment-8669 Tue, 11 Sep 2012 05:11:17 +0000 http://security.blogoverflow.com/?p=839#comment-8669 Can you explain why you expect the POST request cannot be done in real life?

I presume you’re familiar with the fact that any page can trigger a POST (even to some other domain entirely), and have a great deal of control over the contents of the POST body. See, e.g., http://security.stackexchange.com/q/8099/971 and http://security.stackexchange.com/q/19330/971

Therefore, I don’t immediately see anything that would prevent this attack. But maybe you’ve spotted something I’m missing?

]]>