Top Banner
Password Managers: Attacks and Defenses David Silver Suman Jana Dan Boneh Stanford University Eric Chen Collin Jackson Carnegie Mellon University Usenix Security 201 8/21/14
32

Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Dec 15, 2015

Download

Documents

Deon Lykes
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Password Managers:Attacks and Defenses

David Silver Suman Jana Dan Boneh

Stanford University

Eric Chen Collin Jackson Carnegie Mellon University

Usenix Security 20148/21/14

Page 2: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

A tool for…

2

Convenience? Security?

Goal: Both!

Page 3: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Password Manager Workflow

3

Password Manager

Save manually entered

password

Autofill username and

password

Topic of this talk

Page 4: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Manual Autofill

4

Page Load

User Interaction

Page 5: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Automatic Autofill

5

Page Load

Convenient…but hard to make secure

User Interaction

Page 6: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Should we autofill?

6

Automatic Autofill Corner Cases

Page 7: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Should we autofill?The contestants

7

Browser-based:

Chrome 34 Firefox 29 Safari 7.0 IE 11

Android

Browser

4.3Third-party:

LastPass2.0

NortonIdentitySafe 2014

1Password4.5

KeePass 2.24

Keeper7.5

Page 8: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Should we autofill?Different form action

<form action=“http://evil.com”>

8

HTTPS

Automatic Autofill:

At Save: Now:

<form action=“login.php">

Alternatively, what if action is changed by JavaScript after

autofilling?

form.action = “http://evil.com”

Page 9: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Should we autofill?Different form action

<form action=“http://evil.com">

9

HTTPS

Alternatively, what if action is changed by JavaScript after

autofilling?

form.action = “http://evil.com”

Automatic Autofill:

At Save: Now:

<form action=“login.php">

Page 10: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Should we autofill?Click through HTTPS warning

10

Automatic Autofill:

Page 11: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Should we autofill?iFrame not same-origin with parent

11

Automatic Autofill:

Page 12: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

12

Sweep AttacksStealing multiple passwords without user interaction

Page 13: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Threat Model: Coffee-shop Attacker

13

1. 2.

Save Passwordfor b.com

Goal: Trick password manager into revealing b.com’s password

Browse a.com

Page 14: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Obligatory Food Example

14

Page 15: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Redirect Sweep Attack on HTTP Login Page

15

GET papajohns.com

REDIRECT att.com

GET att.com

att.com

GET papajohns.com

papajohns.com

+ attacker JS

automatic

autofillatt.com

password stolen!

Page 16: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

16

Redirect Sweep Attack Demo (Fast)

http://youtu.be/n0xIiWl0pZo

Page 17: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

17

Redirect Sweep Attack Demo (Slow)

http://youtu.be/qiiSuIE79No

Page 18: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

HTTP Login Pages

18

Alexa Top 500*

Login Pages 408 —

Load Login Page over HTTP(submit over HTTP or HTTPS)

194 47%

*as of October 2013

• HTTP pages trivially vulnerable to code injection by coffee shop attacker

• att.com vulnerable because it loads login page over HTTP

• (even though it submits over HTTPS)

Page 19: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Attacking HTTPS

• XSS Injection

• Active Mixed Content

• Trick user into clicking through HTTPS warning

19

Page 20: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Other sweep attacks (see paper)

20

• iFrame sweep attack

• Window sweep attack

Page 21: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Sweep AttacksVulnerability

Automatic

Manual

21

Vulnerable

Not Vulnerable

Page 22: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Defending against sweep attacks

22

Page 23: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Defense #1: Manual Autofillas secure as manual entry

• Fill-and-Submit• Still just one click for the user

23

Page Load

Less convenient?

Page 24: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Manual Entry Manual Autofill

Can we do better?

Security

24

Page 25: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Defense #2: Secure Fillingmore secure than manual entry

• Don’t let JavaScript read autofilled passwords

• Let form submit only if action matches action when password was saved

• (Site must submit form using HTTPS)

• Prototype implementation in Chromium (~50 lines)

25

Page 26: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Manual Entry Secure Filling

Security

More secure than manual entry

26

Page 27: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

AJAX

• 10 sites out of Alexa Top 50* use AJAX to submit password forms

• Workarounds

• Submit form in iFrame

• Create browser SendPwd API

27*as of October 2013

Page 28: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Disclosure

• Disclosed results to password vendors

• Warning when autofilling HTTPS passwords on HTTP pages

• Don't automatically autofill passwords in iFrames not same-origin with parent

28

Page 29: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Conclusions• Automatic autofill has lots of corner cases

• Sweep Attacks: steal passwords without any user interaction

• Defenses

• Require user interaction before filling passwords

• Secure Filling

• Just as convenient for user but much more secure

29

Page 30: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

Questions?

30

Page 31: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

HTTP Login Pages

31

Alexa Top 500*

Login Pages 408 —

Load over HTTP, submit over HTTPS 71 17%

Load and submit over HTTP 123 30%

Load over HTTP 194 47%

*as of October 2013

Page 32: Password Managers: Attacks and Defenses David SilverSuman JanaDan Boneh Stanford University Eric ChenCollin Jackson Carnegie Mellon University Usenix Security.

What about strength checkers?

• Only needed on registration forms

• Use JavaScript to read password field

• Don’t conflict with secure filling - password managers shouldn’t be filling existing passwords on registration forms

32