Note that a password manager is a partial mitigation here, at least if it's tied into the browser and automatically fills in based on origin, much like WebAuthn is.
-Ekr On Mon, Apr 11, 2022 at 3:13 PM Richard Barnes <r...@ipv.sx> wrote: > Just to be clear: > > * These "picture in picture" attacks have been around for years, as Ben > points out. > * WebAuthn is not vulnerable, because its assertions are bound to the > origin, and a phishing site can't access the correct origin. > * Anything that doesn't involve asymmetric cryptography will be > replayable, and thus perishable, through this attack or others. > > > On Mon, Apr 11, 2022 at 5:21 PM Kathleen Moriarty < > kathleen.moriarty.i...@gmail.com> wrote: > >> Thank you, Ben. Much appreciated. I’ll think about this a bit more and a >> few others now are as well. >> >> Best regards, >> Kathleen >> >> Sent from my mobile device >> >> On Apr 11, 2022, at 5:05 PM, Ben Schwartz <bem...@google.com> wrote: >> >> >> >> >> On Mon, Apr 11, 2022 at 4:42 PM Kathleen Moriarty < >> kathleen.moriarty.i...@gmail.com> wrote: >> >>> >>> >>> Sent from my mobile device >>> >>> On Apr 11, 2022, at 3:52 PM, Ben Schwartz <bem...@google.com> wrote: >>> >>> >>> I think there may be a misunderstanding here. According to my >>> understanding, these attack pages do not need to contain any actual >>> subresources from the SSO provider. They simply provide a login UI that >>> matches the appearance of the SSO login, in order to trick the user into >>> entering their SSO credentials into an attacker-controlled tab. >>> >>> This doesn't seem like something that can be fixed by the TLS >>> working group. >>> >>> >>> Right, but maybe by people here who also work on the interfaces to where >>> credentials are stored? >>> >> >> This attack is on password-based security, so the credentials are stored >> in the user's head, and the user types them into an interface that they >> think is the SSO provider, but is in fact the attacker. It's literally >> window-dressing on a standard old-fashioned phishing attack. This page >> explains the technique: >> https://mrd0x.com/browser-in-the-browser-phishing-attack/ >> >> >>> It’s posed as a browser attack as that’s the current mechanism, but is >>> going after credentials to access SSO. I guess that could be replayed later >>> as well if only captured by this and doesn’t access the store, but the >>> article seems to say that the store is accessed. >>> >> >> That article appears to be an attempt to restate the original report on >> Ghostwriter published here: >> https://blog.google/threat-analysis-group/tracking-cyber-activity-eastern-europe/. >> It may be easier to understand the details from the original report. >> >> >>> >>> Thanks for thinking about it, >>> Kathleen >>> >>> >>> On Mon, Apr 11, 2022 at 3:48 PM Kathleen Moriarty < >>> kathleen.moriarty.i...@gmail.com> wrote: >>> >>>> This has to be dealt with at the container interface for non-browser >>>> interfaces too, right? >>>> >>>> If there are OASIS and W3C WebAuthn active participants, it would be >>>> helpful to figure out the best place to deal with this issue. >>>> >>>> Thank you and sorry for a second message. >>>> >>>> Best regards, >>>> Kathleen >>>> >>>> On Mon, Apr 11, 2022 at 3:35 PM Kathleen Moriarty < >>>> kathleen.moriarty.i...@gmail.com> wrote: >>>> >>>>> Greetings! >>>>> >>>>> In thinking about the attacks prompting for credentials to access SSO >>>>> credentials in browsers, I am wondering if the fix is in the interface to >>>>> each type of storage container for credentials, e.g. OASIS PKCS#11, W3C >>>>> WebAuthn, and maybe OAuth if that has been hit as well by these attacks, >>>>> called "Browser in the Browser". >>>>> https://www.techrepublic.com/article/browser-in-the-browser-attacks-arise/ >>>>> >>>>> >>>>> Is there a way in the browser for an organization to configure (or can >>>>> there be in those interfaces) the only permitted addresses to prompt and >>>>> allow access to the interface, so not just the password is needed? It >>>>> seems like the best place to fix it even though each organization would >>>>> have to enter an allow list. The alternative would be deny lists of all >>>>> the >>>>> malicious sites performing this activity and that won't catch everything. >>>>> >>>>> Is this being discussed already somewhere? Hopefully. Perhaps there >>>>> are other ideas? >>>>> >>>>> Thank you. >>>>> -- >>>>> >>>>> Best regards, >>>>> Kathleen >>>>> >>>> >>>> >>>> -- >>>> >>>> Best regards, >>>> Kathleen >>>> _______________________________________________ >>>> TLS mailing list >>>> TLS@ietf.org >>>> https://www.ietf.org/mailman/listinfo/tls >>>> >>> _______________________________________________ >> TLS mailing list >> TLS@ietf.org >> https://www.ietf.org/mailman/listinfo/tls >> > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls