skip to main content
10.1145/2736277.2741089acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Network-based Origin Confusion Attacks against HTTPS Virtual Hosting

Published:18 May 2015Publication History

ABSTRACT

We investigate current deployment practices for virtual hosting, a widely used method for serving multiple HTTP and HTTPS origins from the same server, in popular content delivery networks, cloud-hosting infrastructures, and web servers. Our study uncovers a new class of HTTPS origin confusion attacks: when two virtual hosts use the same TLS certificate, or share a TLS session cache or ticket encryption key, a network attacker may cause a page from one of them to be loaded under the other's origin in a client browser. These attacks appear when HTTPS servers are configured to allow virtual host fallback from a client-requested, secure origin to some other unexpected, less-secure origin. We present evidence that such vulnerable virtual host configurations are widespread, even on the most popular and security-scrutinized websites, thus allowing a network adversary to hijack pages, or steal secure cookies and single sign-on tokens. To prevent our virtual host confusion attacks and recover the isolation guarantees that are commonly assumed in shared hosting environments, we propose fixes to web server software and advocate conservative configuration guidelines for the composition of HTTP with TLS.

References

  1. S. Landau, "Highlights from making sense of Snowden, part II: What's significant in the NSA revelations," IEEE Security & Privacy, vol. 12, pp. 62--64, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  2. T. Dierks and E. Rescorla, "The Transport Layer Security Protocol Version 1.2," RFC 5246, 2008.Google ScholarGoogle Scholar
  3. E. Rescorla, "HTTP over TLS," RFC 2818, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. G. Paterson, T. Ristenpart, and T. Shrimpton, "Tag size does matter: attacks and proofs for the TLS record protocol," in ASIACRYPT, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Krawczyk, K. G. Paterson, and H. Wee, "On the security of the TLS protocol: a systematic analysis," in CRYPTO, 2013.Google ScholarGoogle Scholar
  6. K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P. Strub, "Implementing TLS with verified cryptographic security," in IEEE S&P, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Blake-Wilson, M. Nystrom, D. Hopwood, J. Mikkelsen, and T. Wright, "Transport Layer Security (TLS) Extensions," IETF RFC 3546, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Z. Durumeric, J. Kasten, M. Bailey, and J. A. Halderman, "Analysis of the HTTPS certificate ecosystem," in IMC, Oct. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Delignat-Lavaud, M. Abadi, M. Birrell, I. Mironov, T. Wobber, and Y. Xie, "Web PKI: closing the gap between guidelines and practices," in NDSS, Feb 2014.Google ScholarGoogle Scholar
  10. I. Fette and A. Melnikov, "The WebSocket protocol," RFC 6455, 2011.Google ScholarGoogle Scholar
  11. M. Zalewski, "Browser Security Handbook," Web: http://code.google.com/p/browsersec/, undated.Google ScholarGoogle Scholar
  12. J. Grossman, XSS Attacks: Cross-site scripting exploits and defense. Syngress, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Belshe and R. Peon, "The SPDY protocol," IETF draft-mbelshe-httpbis-spdy-00, 2012.Google ScholarGoogle Scholar
  14. Akamai Technologies, "Visualizing akamai," akamai.com/html/technology/dataviz3.html, 2014.Google ScholarGoogle Scholar
  15. J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu, "When HTTPS meets CDN: A case of authentication in delegated service," in IEEE S&P, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. I. Sysoev and B. Mercer, "How nginx processes requests," nginx.org/docs/http/requestprocessing.html, 2012.Google ScholarGoogle Scholar
  17. Apache Foundation, "Virtual host documentation," http://httpd.apache.org/docs/current/vhosts/, 2014.Google ScholarGoogle Scholar
  18. S. Stamm, B. Sterne, and G. Markham, "Reining in the web with content security policy," in WWW, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Hammer-Lahav, D. Recordon, and D. Hardt, "The OAuth 2.0 Authorization Protocol," IETF Draft, 2011.Google ScholarGoogle Scholar
  20. A. Barth, C. Jackson, and J. C. Mitchell, "Robust defenses for cross-site request forgery," in CCS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Bortz, A. Barth, and A. Czeskis, "Origin cookies: session integrity for web applications," in W2SP, 2011.Google ScholarGoogle Scholar
  22. R. Hansen and J. Sokol, "MitM DNS rebinding SSL wildcards and XSS," http://goo.gl/23Yt9l, 2010.Google ScholarGoogle Scholar
  23. M. Schloesser, B. Gamble, J. Nickel, C. Guarnieri, and H. D. Moore, "Project sonar: IPv4 SSL certificates," https://scans.io/study/sonar.ssl, 2013.Google ScholarGoogle Scholar
  24. Alexa Internet Inc., "Top 1,000,000 sites (updated daily)," http://goo.gl/OZdT6p, 2014.Google ScholarGoogle Scholar
  25. S. Pai, Y. Sharma, S. Kumar, R. M. Pai, and S. Singh, "Formal verification of oauth 2.0 using alloy framework," in CSNT. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S.-T. Sun and K. Beznosov, "The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems," in CCS. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C. Bansal, K. Bhargavan, and S. Maffeis, "Discovering concrete attacks on website authorization by formal analysis," in CSF. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. Akhawe, A. Barth, P. Lam, J. Mitchell, and D. Song, "Towards a formal foundation of web security," in CSF, 2010, pp. 290--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Belshe, R. Peon, and M. Thomson, "Hypertext transfer protocol version 2," 2012. {Online}. Available: http://tools.ietf.org/html/draft-ietf-httpbis-http2-14Google ScholarGoogle Scholar
  30. A. Parsovs, "Practical issues with TLS client certificate authentication," in NDSS, 2014.Google ScholarGoogle Scholar
  31. M. Dietz, A. Czeskis, D. Balfanz, and D. S. Wallach, "Origin-bound certificates: a fresh approach to strong client authentication," in Usenix Security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Pironti, and P.-Y. Strub, "Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS," in IEEE S&P. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. C. Evans and C. Palmer, "Certificate pinning extension for HSTS," 2011. {Online}. Available: http://tools.ietf.org/html/draft-evans-palmer-hsts-pinning-00Google ScholarGoogle Scholar
  34. C. Meyer and J. Schwenk, "SoK: Lessons learned from SSL/TLS attacks," in Information Security Applications, ser. LNCS. Springer, 2014, pp. 189--209. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu, "When HTTPS meets CDN: A case of authentication in delegated service," in IEEE Symposium on Security & Privacy 2014 (Oakland'14). IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. B. Moeller and A. Langley, "TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks," Internet Draft (v.01), 2014.Google ScholarGoogle Scholar
  37. R. Wang, S. Chen, and X. Wang, "Signing me onto your accounts through Facebook and Google: A traffic-guided security study of commercially deployed single-sign-on web services," in IEEE S&P, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. D. Fett, R. Kusters, and G. Schmitz, "An expressive model for the web infrastructure: definition and application to the BrowserID SSO system," in IEEE S&P, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis, "Language-based defenses against untrusted browser origins," in Usenix Security, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. C. Bansal, K. Bhargavan, and S. Maffeis, "Discovering concrete attacks on website authorization by formal analysis," in CSF, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. M. Marlinspike, "More tricks for defeating SSL in practice," Black Hat USA, 2009.Google ScholarGoogle Scholar
  42. J. Hodges, C. Jackson, and A. Barth, "HTTP Strict Transport Security (HSTS)," IETF RFC 6797, 2012.Google ScholarGoogle Scholar
  43. J. Selvi, "Bypassing http strict transport security."Google ScholarGoogle Scholar
  44. C. Jackson, A. Barth, A. Bortz, W. Shao, and D. Boneh, "Protecting browsers from DNS rebinding attacks," TWEB, vol. 3, no. 1, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. S. Son and V. Shmatikov, "The hitchhiker's guide to DNS cache poisoning," in SecureComm, 2010.Google ScholarGoogle Scholar
  46. D. Dagon, M. Antonakakis, P. Vixie, T. Jinmei, and W. Lee, "Increased DNS forgery resistance by 0x20-bit encoding: security via leet queries," in CCS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. N. Karapanos and S. Capkun, "On the effective prevention of TLS man-in-the-middle attacks in web applications," in Usenix Security, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. C. Soghoian and S. Stamm, "Certified lies: setecting and defeating government interception attacks against SSL," in FC, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. C. Karlof, U. Shankar, J. D. Tygar, and D. Wagner, "Dynamic pharming attacks and locked same-origin policies for web browsers," in CCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov, "The most dangerous code in the world: validating SSL certificates in non-browser software," in ACM CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. D. Akhawe, B. Amann, M. Vallentin, and R. Sommer, "Here's my cert, so trust me, maybe? understanding TLS errors on the web," in WWW, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. T. Duong and J. Rizzo, "Here come the XOR ninjas," White paper, Netifera, 2011.Google ScholarGoogle Scholar
  53. J. Rizzo and T. Duong, "The CRIME attack," in EKOparty Security Conference, vol. 2012, 2012.Google ScholarGoogle Scholar
  54. B. Beurdouche, K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, and J. K. Zinzindohoue, "A messy state of the union: taming the composite state machines of TLS," in IEEE S&P, 2015.Google ScholarGoogle Scholar
  55. B. Laurie, "Certificate transparency," Commun. ACM, vol. 57, no. 10, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. D. Basin, C. Cremers, T. H.-J. Kim, A. Perrig, R. Sasse, and P. Szalachowski, "ARPKI: Attack resilient public-key infrastructure," in CCS, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Network-based Origin Confusion Attacks against HTTPS Virtual Hosting

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        WWW '15: Proceedings of the 24th International Conference on World Wide Web
        May 2015
        1460 pages
        ISBN:9781450334693

        Copyright © 2015 Copyright is held by the International World Wide Web Conference Committee (IW3C2)

        Publisher

        International World Wide Web Conferences Steering Committee

        Republic and Canton of Geneva, Switzerland

        Publication History

        • Published: 18 May 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        WWW '15 Paper Acceptance Rate131of929submissions,14%Overall Acceptance Rate1,899of8,196submissions,23%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader