Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
- 1 May 2009
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 347-359
- https://doi.org/10.1109/sp.2009.12
Abstract
HTTPS is designed to provide secure Web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adversary. This paper is motivated by our curiosity about whether such an adversary has been carefully examined when HTTPS is integrated into the browser/Web systems. We focus on a specific adversary named ldquopretty-bad-proxyrdquo (PBP). PBP is a malicious proxy targeting browserspsila rendering modules above the HTTP/HTTPS layer. It attempts to break the end-to-end security guarantees of HTTPS without breaking any cryptographic scheme. We discovered a set of vulnerabilities exploitable by a PBP: in many realistic network environments where attackers can sniff the browser traffic, they can steal sensitive data from an HTTPS server, fake an HTTPS page and impersonate an authenticated user to access an HTTPS server. These vulnerabilities reflect the neglects in the design of modern browsers - they affect multiple major browsers and a large number of Web sites. We believe that the PBP adversary has not been rigorously examined in the browser/Web industry. The vendors of the affected browsers have all confirmed the vulnerabilities reported in this paper. Most of them have patched or planned on patching their browsers. We believe the attack scenarios described in this paper may only be a subset of the vulnerabilities under PBP. Thus further (and more rigorous) evaluations of the HTTPS deployments in browsers appear to be necessary.Keywords
This publication has 5 references indexed in Scilit:
- ForcehttpsPublished by Association for Computing Machinery (ACM) ,2008
- An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanismPublished by Association for Computing Machinery (ACM) ,2007
- A Systematic Approach to Uncover Security Flaws in GUI LogicPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- The Emperor's New Security IndicatorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- The final nail in WEP's coffinPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006