Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Electronic Frontier Foundation Encryption Privacy Security The Internet Wireless Networking Your Rights Online

How To Protect Against Firesheep Attacks 208

Monday we mentioned Firesheep, a plug-in that trivializes ID spoofing on social networks. Since then various security researches have come out to suggest How to Protect Yourself against Firesheep Attacks (submitted by Batblue). Of course the advice is pretty obvious: Don't use free Wi-Fi, use SSL, or a VPN. It seems to me that the big sites should start by redirecting all non-SSL traffic to https automatically. If you want to be insecure, you'd have to explicitly state that you can't encrypt for some reason.
This discussion has been archived. No new comments can be posted.

How To Protect Against Firesheep Attacks

Comments Filter:
  • slashdot? (Score:1, Insightful)

    by Anonymous Coward on Wednesday October 27, 2010 @01:20PM (#34039572)

    Well geepers Mr. Taco how about https on slashdot?

  • slashdot's method (Score:5, Insightful)

    by Lord Ender ( 156273 ) on Wednesday October 27, 2010 @01:20PM (#34039584) Homepage

    Slashdot does the opposite. It redirects SSL connections to HTTP. They must want their users' accounts to be hijacked... and their privacy to be invaded.

  • by John Hasler ( 414242 ) on Wednesday October 27, 2010 @01:45PM (#34039942) Homepage

    I think it is the cost of the extra server load, not the cost of certificates that keeps FaceBook off https. After all, most of their users don't care about privacy (and I mean that they don't care, not that they "don't understand").

  • by fuzzyfuzzyfungus ( 1223518 ) on Wednesday October 27, 2010 @02:37PM (#34040646) Journal
    Given that transmissions from both the AP and the client are in the clear, and generally coming from a reasonably omnidirectional antenna, AP isolation on an open AP doesn't buy you very much.

    It does slightly inconvenience the attacker(since they need a NIC that will let them listen in promiscuous mode, and probably something closer to Wireshark than Firesheep, for all frames being transmitted about, rather than just connecting to the network and getting them for free, unswitched network style); but all the data are still flying around in the clear, subnet isolation or not.
  • by LordMyren ( 15499 ) on Wednesday October 27, 2010 @02:38PM (#34040678) Homepage

    1% of Google's CPU load.... that's 1% of the biggest collection of the largest data centers on the planet. Find a real metric for SSL cost, including any additional latency full end to end induces on each request, or GTFO.

    Conversely, people saying "it's expensive" should have some numbers as well. Both on cpu utilization, request latency, effects on http pipelining, &c &c &c. SSL has numerous "costs", including places where full end to end encryption is not permitted. Ultimately the argument that seals the deal is the last one: this is an authentication problem, a trivial MITM attack; that doesnt require end to end encryption, that just requires authentication (see: Kerberos). Cookies, by themselves, just happen to not cut it there.

  • by tepples ( 727027 ) <tepples.gmail@com> on Wednesday October 27, 2010 @02:40PM (#34040696) Homepage Journal

    It's best practice to always use SSL whenever possible, period.

    Which doubles the cost of hosting a personal web site. How do you plan to make the business case to hobbyists that an SSL certificate from a commercial CA and a dedicated IPv4 address* are worth the extra $50/yr on top of the $50/yr that they're already paying for a domain and budget shared web hosting?

    * Windows XP, BlackBerry, and iOS before 4 don't support the extension that allows name-based virtual hosting over SSL [wikipedia.org].

  • by Anonymous Coward on Wednesday October 27, 2010 @02:51PM (#34040846)

    So it's only a problem at places where a complete idiot set up the wireless.

    Or setup by a neckbearded script-kiddie in a coffee shop -- just because there's a properly adminned network doesn't mean you're connected to it.

  • by buchner.johannes ( 1139593 ) on Wednesday October 27, 2010 @03:00PM (#34040934) Homepage Journal

    I read that when Google switched Gmail over to HTTPS that their server load increased by 1%. Today's CPUs are blazingly fast. Why would you think that the server load would be an issue with encryption and decrypting all communication? A web site is largely about having a large enough Internet connection and a large and fast enough database to keep up with the Internet traffic. Those CPUs are mostly just sitting around twiddling their thumbs waiting for I/O.

    And what about their bandwidth usage?
    There is a well-thought out caching system in HTTP [mnot.net] -- implemented throughout the internet -- that saves a lot of bandwidth. You can kiss all this goodbye, and have every request come to your server. This also means akamai doesn't work, which many large sites rely on.

    The real solution for facebook and others would be to make large, static content, such as images, stylesheets available on another, cache-able domain, and not send cookies on this domain. The dynamic content -- and javascript -- should stay on the main domain and be encrypted.

    "Let's just encrypt everything all the time" is just a narrow-minded comment of an end-user.

  • by vadim_t ( 324782 ) on Wednesday October 27, 2010 @03:04PM (#34040994) Homepage

    last, maybe you have the budget to be running as many servers and to be hogging as much energy as you want, but what about all the mobile phone users connected to your site? is it acceptable that every single little AJAX interaction now has to go through the encryption/decryption straw on their 400 mhz oldschool mobile phone?

    Sure, why not? I tested mine, it can do aes-128 at 8MB/s. That may not seem like terribly fast, but it's faster than the ideal case for 3G (with the real world rate being considerably lower)

    My laptop (nothing especially impressive, chosen for battery time and not power) can do it at 90MB/s. My desktop does it at 250MB/s, and isn't terribly new either (Phenom II 940).

    what about places where, for various reasons, encryption is controlled or restricted? are we going to tell them no, unless you have full end to end encryption, you cant use the web?

    Yes? Because those places either have no access to anything modern anyway, or nobody cares about what the law says. Encryption is so common that many games like WoW use it.

    the hubris of "just throw more end to end encryption" at it is bullshit, rotten wrong incorrect bullshit. what we need is a cookie solution not susceptible to man in the middle attacks. anything else is irresponsible overkill, and ignorant to the real problem and diverse requirements and use cases of the web. authentication does not have to be tied to end to end encryption, at least thats my mangled crippled understanding of Kerberos.

    Why? You provide no good justification for it. The fact is that currently encryption is fast even on limited devices on cell phones, and on modern hardware doing full disk encryption amounts to a rounding error. Encryption is also easy to implement in hardware, where it gets even better performance.

    I don't understand why would it be "hubris" anyway. The way I see it, everything remotely possible should be encrypted, all the time. There's no good reason for random third parties to be looking at my packets anyway.

  • by John Hasler ( 414242 ) on Wednesday October 27, 2010 @03:35PM (#34041382) Homepage

    Y'know who could be, totally silently, Firesheeping every non-SSL login you make, and observing all the fun consumer data that advertisers will pay for? Your ISP...

    So what?

  • by TheoMurpse ( 729043 ) on Wednesday October 27, 2010 @11:21PM (#34045774) Homepage

    After all, most of their users don't care about privacy (and I mean that they don't care, not that they "don't understand").

    No, you asshat. We just don't care about certain things remaining private that you care about. You might as well say anyone who goes outside "does not care about privacy."

    I don't care if a corporation knows I like Ben Folds and have a friend who goes to MIT. I do care if a random person at Borders can log in as me and change my profile picture to Goatse or send a message to a friend insulting them subtly, so that it is not obvious that I was hacked.

This file will self-destruct in five minutes.

Working...