nighttalker
千年狐狸
千年狐狸
  • UID43
  • 注册日期2004-11-22
  • 最后登录2015-05-03
  • 发帖数2283
  • 经验40枚
  • 威望0点
  • 贡献值42点
  • 好评度0点
  • 社区居民
  • 忠实会员
阅读:11438回复:11

Mozilla.org对于IDN欺骗的官方答复,新的修补计划

楼主#
更多 发布于:2005-02-10 02:21
http://secunia.com/advisories/14209/
secunia又报告了一个新的漏洞,相信新闻媒体又将转载。这里向大家介绍一下:(Mozilla.org的官方答复附本文最后,更新日期为0214, Happy Vday;update: mozilla.org发布了新的修补计划,内容附文末,20050218)
原文如下:
VeriSign i-Nav Plug-In IDN Spoofing Security Issue
Secunia Advisory: SA14209 Print Advisory  
Release Date: 2005-02-09
Critical:
Moderately critical
Impact: Spoofing
Where: From remote
Solution Status: Unpatched
Software: VeriSign i-Nav Plug-In
Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.
Description:
Eric Johanson has reported a security issue in i-Nav Plug-In, which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar.

The problem is caused due to an unintended result of the IDN (International Domain Name) implementation, which allows using international characters in domain names.

This can be exploited by registering domain names with certain international characters that resembles other commonly used characters, thereby causing the user to believe they are on a trusted site.

Secunia has constructed a test, which can be used to check if your browser is affected by this issue:
http://secunia.com/multiple_browsers_idn_spoofing_test/

The issue has been confirmed in the last build of i-Nav Plug-In (downloaded 2005-02-09).

Solution:
Don't follow links from untrusted sources.

Manually type the URL in the address bar.

Provided and/or discovered by:
Originally described by:
Evgeniy Gabrilovich and Alex Gontmakher

Reported by:
Eric Johanson

Original Advisory:
http://www.shmoo.com/idn/homograph.txt

Other References:
The Homograph Attack:
http://www.cs.technion.ac.il/~gabr/pape ... graph.html
ICANN paper on IDN Permissible Code Point Problems:
http://www.icann.org/committees/idn/idn ... -paper.htm
Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.

测试页面如下:(测试地址在 http://secunia.com/multiple_browsers_idn_spoofing_test/
Multiple Browsers IDN Spoofing Test

Introduction

Eric Johanson has reported a security issue in multiple browsers, which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar.

Please see the test below for an example of how this vulnerability can be exploited.

Test Case / Demonstration

Click the link below in order to test whether or not your system is vulnerable. The test will open a new window, where the address bar writes "http://www.paypal.com/", but the page is actually displaying content from Secunia.

Test Your System
Test Now - Left Click On This Link

Result
You are vulnerable, if a new window is opened displaying a Secunia page, but the address bar is displaying "http://www.paypal.com/".

Credits
Originally described by:
Evgeniy Gabrilovich and Alex Gontmakher

Reported by:
Eric Johanson

What should you do?

Please view the appropriate Secunia advisory for information about how you can fix or mitigate the impact of this vulnerability. The Secunia advisory will be updated when the vendor issue patches.

View the Secunia advisory regarding your browser:
- [SA14166] OmniWeb
- [SA14154] Opera
- [SA14163] Mozilla / Firefox / Camino
- [SA14162] Konqueror
- [SA14165] Netscape
- [SA14164] Safari

意思是地址栏将会显示假的地址。

Update:仔细看了一下,新浪等地方都有解释伪造的机制是混淆某些字母的显示。不论如何,输入密码的时候(一般是和money有关的站点),一定注意网页加密情况和真实来源。简单的办法是“总是自己输入地址来登陆金融站点,而不要使用连接”, 这对任何浏览器都是一个有效的办法。
Update 2: 因为IE不支持国际代码的网络地址,所以只会返回空页面,Mozilla的开发者认为,这个问题需要国际域名解析委员会处理,他们应该禁止恶意欺骗的域名的注册。

Update3, 重要,以下的方法可以暂时禁用国际字符域名。直到问题有新的解决方案。
编辑compreg.dat.
文件地址在:
For windows
c:\Documents and Settings\$USER\Application Data\Mozilla\Firefox\Profiles\default.random\compreg.dat

For UNIX
~/.mozilla/firefox/default.random/compreg.dat

删除那些指向IDN的行, 一个for Linux, 2个for Windows.

样本如下:
{4byteshex-2byteshex-2byteshex-2byteshex-6byteshex},@mozilla.org/network/idn-service;1,,nsIDNService,rel:libnecko.so

此方法引自 http://www.dslreports.com/forum/remark, ... 9~start=20

Mozilla.org的官方答复如下:
After much discussion, <!-- e --><a href="mailto:staff@mozilla.org">staff@mozilla.org</a><!-- e --> and <!-- e --><a href="mailto:drivers@mozilla.org">drivers@mozilla.org</a><!-- e --> have agreed a short-term strategy for dealing with the recently-publicised issues relating to IDN and domain spoofing.

First off, we want to make it clear: we support Opera's position that this is a registrar/registry problem. These issues were known when IDN was proposed, guidelines were developed for avoiding the problem by restricting registrations, and the DNS registration organisations need to step up and implement them. (Certificate Authorities should also, as a simple matter of acting responsibly, not issue certs for domains which are part of a homographic block registered to two or more entities.)

However, we also have a duty to protect our users. So, in the mean time, the enableIDN preference will be set to "false" in Firefox 1.0.1 and Mozilla 1.8 beta, including all official localisations. An XPI will be made available to turn it on again; this XPI will make the risks of doing so clear. This means that by default, links to IDN domains which use the Unicode rather than the punycode form for the href will fail, and the browser will display any IDN domain visited in its raw form.

In the future (Firefox 1.1 and beyond) we hope to be able to turn IDN back on again. We may be able to find a way to turn it on selectively for those TLDs which have a demonstrable record of good practice - but we can't promise to do that. It partly depends on how much resource maintaining a white or black list would take. (To help with that decision, please tell me of any instances where the registration of two homographic domains to different entities has happened in TLDs other than .com.)

So if people want to see full, unrestricted IDN back in Mozilla and Firefox, the best way is to put pressure on the world's registrars and registries to fulfil their obligations to their customers - both domain owners and Internet users - and commit to implementing the ICANN guidelines.

大意如下:

经过讨论,staff@mozilla.org 和 <!-- e --><a href="mailto:drivers@mozilla.org">drivers@mozilla.org</a><!-- e --> 已经同意一个暂时的应对,以修补最近发布的IDN欺骗。

首先,我们希望说清楚,我们完全支持Opera的声明,这个问题属于域名注册的问题。这些问题都是国际域名(IDN)发布时已知的。也早已经提交了策略,以仔细审查来阻止恶意网址的注册。DNS注册委员会应该站出来实行这些策略(证书发行方也应该如此)。

不过我们同时有责任保护我们的用户的安全, 因此, 我们将会发布firefox 1.01和Mozilla 1.8B(以及所有地方化版本),这些版本中,enableIDN的键值会默认为“false”。会有一个XPI来打开这个设置。这意味着默认情况下,国际代码的域名将无法访问。

将来的版本(Firefox 1.1 and beyond),我们希望能够回到正常状态, 我们也许会考虑一些其他方法,但无法保证,主要取决于白名单策略是否过于麻烦。(要帮助的话,请通知我们那些域名有问题)

因此,如果大家希望完全正常的IDN功能重新出现在Mozilla和Firefox中的话,请向域名注册商们施加压力,告诉他们行使他们对用户的责任,告诉他们遵循ICANN的条款。


20050218更新:
mozilla.org宣布他们找到了新的修补方法,在之前的官方声明里,mozilla.org宣布将会在FX 1.0.1和Mozilla 1.8b中默认关闭对IDN的支持(用户可以自行打开)。但是最新的声明中,Mozilla.org宣布他们不会关闭对IDN的支持,对于利用不同语言字母相似而诱骗用户到假地址的漏洞,新版的fx和mozilla的修补方法是使用Punycode (http://en.wikipedia.org/wiki/Punycode )来显示地址。举个例子说 ”bücher.ch“ 会显示为 “xn--bcher-kva.ch”,这样避免了相似字母的混淆。
注意,这同样是一个短期计划,真正长期的方法还是希望域名注册商自己加强管理。
目前最新版本是:Firefox 37,  请各位注意升级保证安全。
hnstxx
千年狐狸
千年狐狸
  • UID1952
  • 注册日期2005-01-09
  • 最后登录2013-05-14
  • 发帖数4977
  • 经验10枚
  • 威望0点
  • 贡献值0点
  • 好评度0点
1楼#
发布于:2005-02-10 02:21
知道了,谢谢!
MM:你是个外表冷酷,内心却很甜蜜的男人。
melop
小狐狸
小狐狸
  • UID1650
  • 注册日期2005-01-02
  • 最后登录2006-01-26
  • 发帖数87
  • 经验10枚
  • 威望0点
  • 贡献值0点
  • 好评度0点
2楼#
发布于:2005-02-10 02:21
对,而且 paybal 里面的第二个 "a" 在中文系统里头的字体与
别的字体不同,很容易辨认。
欢迎光临我的小blog: http://blog.csdn.net/melop
渣滓
小狐狸
小狐狸
  • UID2388
  • 注册日期2005-01-20
  • 最后登录2005-02-10
  • 发帖数11
  • 经验10枚
  • 威望0点
  • 贡献值0点
  • 好评度0点
3楼#
发布于:2005-02-10 02:21
谢谢楼主
guoshuang
火狐狸
火狐狸
  • UID771
  • 注册日期2004-12-11
  • 最后登录2006-12-28
  • 发帖数134
  • 经验10枚
  • 威望0点
  • 贡献值0点
  • 好评度0点
4楼#
发布于:2005-02-10 02:21
不太理解原理?
melop:对,而且 paybal 里面的第二个 "a" 在中文系统里头的字体与
别的字体不同,很容易辨认。
回到原帖


什么意思?我怎么看不出来什么区别呢?这个原理我还是没看懂,谁解释一下...
puhongyi
千年狐狸
千年狐狸
  • UID3
  • 注册日期2004-11-20
  • 最后登录2012-03-29
  • 发帖数1116
  • 经验9枚
  • 威望2点
  • 贡献值38点
  • 好评度19点
5楼#
发布于:2005-02-10 02:21
Re: 不太理解原理?
guoshuang

什么意思?我怎么看不出来什么区别呢?这个原理我还是没看懂,谁解释一下...
回到原帖
nighttalker
千年狐狸
千年狐狸
  • UID43
  • 注册日期2004-11-22
  • 最后登录2015-05-03
  • 发帖数2283
  • 经验40枚
  • 威望0点
  • 贡献值42点
  • 好评度0点
  • 社区居民
  • 忠实会员
6楼#
发布于:2005-02-10 02:21
我们需不需要建立一个安全版呢?报道和分析所有出现的“漏洞”,因为比较重要,但是在这里置顶又觉得有些浪费顶部的空间。。。
目前最新版本是:Firefox 37,  请各位注意升级保证安全。
agan
火狐狸
火狐狸
  • UID393
  • 注册日期2004-11-30
  • 最后登录2005-08-02
  • 发帖数218
  • 经验10枚
  • 威望0点
  • 贡献值0点
  • 好评度0点
7楼#
发布于:2005-02-10 02:21
谢谢
fiag
管理员
管理员
  • UID1188
  • 注册日期2004-12-21
  • 最后登录2024-06-03
  • 发帖数4681
  • 经验686枚
  • 威望0点
  • 贡献值402点
  • 好评度51点
8楼#
发布于:2005-02-10 02:21
在 Firefox 1.0.1 中已经取消使用IDN了,IDN域名是用另一种替代的域名显示在地址栏。
nighttalker
千年狐狸
千年狐狸
  • UID43
  • 注册日期2004-11-22
  • 最后登录2015-05-03
  • 发帖数2283
  • 经验40枚
  • 威望0点
  • 贡献值42点
  • 好评度0点
  • 社区居民
  • 忠实会员
9楼#
发布于:2005-02-10 02:21
fiag:在 Firefox 1.0.1 中已经取消使用IDN了,IDN域名是用另一种替代的域名显示在地址栏。回到原帖

lol,那不是取消,只是改变了地址显示编码,IDN解析功能还是一样的。
目前最新版本是:Firefox 37,  请各位注意升级保证安全。
hnstxx
千年狐狸
千年狐狸
  • UID1952
  • 注册日期2005-01-09
  • 最后登录2013-05-14
  • 发帖数4977
  • 经验10枚
  • 威望0点
  • 贡献值0点
  • 好评度0点
10楼#
发布于:2005-02-10 02:21
nighttalker:我们需不需要建立一个安全版呢?报道和分析所有出现的“漏洞”,因为比较重要,但是在这里置顶又觉得有些浪费顶部的空间。。。回到原帖


举所有能举的东东表示支持!
MM:你是个外表冷酷,内心却很甜蜜的男人。
viewtheard
千年狐狸
千年狐狸
  • UID2383
  • 注册日期2005-01-20
  • 最后登录2024-06-09
  • 发帖数2017
  • 经验532枚
  • 威望1点
  • 贡献值412点
  • 好评度22点
  • 社区居民
  • 忠实会员
11楼#
发布于:2005-02-10 02:21
nighttalker:我们需不需要建立一个安全版呢?报道和分析所有出现的“漏洞”,因为比较重要,但是在这里置顶又觉得有些浪费顶部的空间。。。回到原帖


我支持,可以弄个投票来看看民意
My Technical Blog: http://art-technical.blogspot.com/
游客

返回顶部