Sent from my mobile device

> On Apr 11, 2022, at 6:31 PM, Eric Rescorla <e...@rtfm.com> wrote:
> 
> 
> Note that a password manager is a partial mitigation here, at least if it's 
> tied into the browser and automatically fills in based on origin, much like 
> WebAuthn is.
> 
> -Ekr
> 
> 
>> On Mon, Apr 11, 2022 at 3:13 PM Richard Barnes <r...@ipv.sx> wrote:
>> Just to be clear:
>> 
>> * These "picture in picture" attacks have been around for years, as Ben 
>> points out.
>> * WebAuthn is not vulnerable, because its assertions are bound to the 
>> origin, and a phishing site can't access the correct origin.
>> * Anything that doesn't involve asymmetric cryptography will be replayable, 
>> and thus perishable, through this attack or others.
>> 
Thank you. From a different thread, I thought WebAuthn was vulnerable. 

Best regards,
Kathleen 
>> 
>>> On Mon, Apr 11, 2022 at 5:21 PM Kathleen Moriarty 
>>> <kathleen.moriarty.i...@gmail.com> wrote:
>>> Thank you, Ben.  Much appreciated. I’ll think about this a bit more and a 
>>> few others now are as well. 
>>> 
>>> Best regards,
>>> Kathleen 
>>> 
>>> Sent from my mobile device
>>> 
>>>>> On Apr 11, 2022, at 5:05 PM, Ben Schwartz <bem...@google.com> wrote:
>>>>> 
>>>> 
>>>> 
>>>> 
>>>>> On Mon, Apr 11, 2022 at 4:42 PM Kathleen Moriarty 
>>>>> <kathleen.moriarty.i...@gmail.com> wrote:
>>>>> 
>>>>> 
>>>>> Sent from my mobile device
>>>>> 
>>>>>>> On Apr 11, 2022, at 3:52 PM, Ben Schwartz <bem...@google.com> wrote:
>>>>>>> 
>>>>>> 
>>>>>> I think there may be a misunderstanding here.  According to my 
>>>>>> understanding, these attack pages do not need to contain any actual 
>>>>>> subresources from the SSO provider.  They simply provide a login UI that 
>>>>>> matches the appearance of the SSO login, in order to trick the user into 
>>>>>> entering their SSO credentials into an attacker-controlled tab.
>>>>>> 
>>>>>> This doesn't seem like something that can be fixed by the TLS working 
>>>>>> group.
>>>>> 
>>>>> Right, but maybe by people here who also work on the interfaces to where 
>>>>> credentials are stored?
>>>> 
>>>> This attack is on password-based security, so the credentials are stored 
>>>> in the user's head, and the user types them into an interface that they 
>>>> think is the SSO provider, but is in fact the attacker.  It's literally 
>>>> window-dressing on a standard old-fashioned phishing attack.  This page 
>>>> explains the technique: 
>>>> https://mrd0x.com/browser-in-the-browser-phishing-attack/
>>>>  
>>>>> It’s posed as a browser attack as that’s the current mechanism, but is 
>>>>> going after credentials to access SSO. I guess that could be replayed 
>>>>> later as well if only captured by this and doesn’t access the store, but 
>>>>> the article seems to say that the store is accessed.
>>>> 
>>>> That article appears to be an attempt to restate the original report on 
>>>> Ghostwriter published here: 
>>>> https://blog.google/threat-analysis-group/tracking-cyber-activity-eastern-europe/.
>>>>   It may be easier to understand the details from the original report.
>>>>  
>>>>> 
>>>>> Thanks for thinking about it,
>>>>> Kathleen 
>>>>> 
>>>>>> 
>>>>>>> On Mon, Apr 11, 2022 at 3:48 PM Kathleen Moriarty 
>>>>>>> <kathleen.moriarty.i...@gmail.com> wrote:
>>>>>>> This has to be dealt with at the container interface for non-browser 
>>>>>>> interfaces too, right?
>>>>>>> 
>>>>>>> If there are OASIS and W3C WebAuthn active participants, it would be 
>>>>>>> helpful to figure out the best place to deal with this issue.
>>>>>>> 
>>>>>>> Thank you and sorry for a second message.
>>>>>>> 
>>>>>>> Best regards,
>>>>>>> Kathleen
>>>>>>> 
>>>>>>>> On Mon, Apr 11, 2022 at 3:35 PM Kathleen Moriarty 
>>>>>>>> <kathleen.moriarty.i...@gmail.com> wrote:
>>>>>>>> Greetings!
>>>>>>>> 
>>>>>>>> In thinking about the attacks prompting for credentials to access SSO 
>>>>>>>> credentials in browsers, I am wondering if the fix is in the interface 
>>>>>>>> to each type of storage container for credentials, e.g. OASIS PKCS#11, 
>>>>>>>> W3C WebAuthn, and maybe OAuth if that has been hit as well by these 
>>>>>>>> attacks, called "Browser in the Browser". 
>>>>>>>> https://www.techrepublic.com/article/browser-in-the-browser-attacks-arise/
>>>>>>>>  
>>>>>>>> 
>>>>>>>> Is there a way in the browser for an organization to configure (or can 
>>>>>>>> there be in those interfaces) the only permitted addresses to prompt 
>>>>>>>> and allow access to the interface, so not just the password is needed? 
>>>>>>>>  It seems like the best place to fix it even though each organization 
>>>>>>>> would have to enter an allow list. The alternative would be deny lists 
>>>>>>>> of all the malicious sites performing this activity and that won't 
>>>>>>>> catch everything.
>>>>>>>> 
>>>>>>>> Is this being discussed already somewhere? Hopefully. Perhaps there 
>>>>>>>> are other ideas?
>>>>>>>> 
>>>>>>>> Thank you.
>>>>>>>> -- 
>>>>>>>> 
>>>>>>>> Best regards,
>>>>>>>> Kathleen
>>>>>>> 
>>>>>>> 
>>>>>>> -- 
>>>>>>> 
>>>>>>> Best regards,
>>>>>>> Kathleen
>>>>>>> _______________________________________________
>>>>>>> TLS mailing list
>>>>>>> TLS@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/tls
>>> _______________________________________________
>>> TLS mailing list
>>> TLS@ietf.org
>>> https://www.ietf.org/mailman/listinfo/tls
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to