


Tool Detects "In-Flight" Webpage Alterations 197
TheWoozle writes "In a follow-up to a recent story about ISPs inserting ads into web pages, the University of Washington security and privacy research group has teamed with the International Computer Science Institute (ICSI) to develop an online tool to help you identify if your ISP is inserting ads or otherwise modifying the web pages you request."
Should just block all ads, but... (Score:4, Interesting)
The hash gets calculated once for static content, which is usually the bulk of the traffic, no? So
not too big of a hit.
Browser sees content. Browser sees hash. Browser compares the two...
--
Censored [blogspot.com] by [blogspot.com] Technorati [blogspot.com] and now, Blogger too! [blogspot.com]
Frames (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Interesting)
Re: (Score:2, Interesting)
Re: (Score:2, Interesting)
Re: (Score:2, Interesting)
What if we just jail the billionaires who own the ISPs for altering the copyrighted content of web pages?
A 99.9999997183% decrease in salary for hours worked accompanied by a change in lovers from Big Boobs to Big Bubba might be just what the doctor ordered.
Re: (Score:2)
Browser sees content. Browser sees hash. Browser compares the two...gets an OK.
Re:Should just block all ads, but... (Score:4, Funny)
1.) Claim the hash is to protect the copyright on your site
2.) Sue any ISP that alters the site without permission under the DMCA
3.) ???
4.) Profit!
Re: (Score:2)
Couldn't the ISP just edit the contents of this well-known location you're looking for when you request it, however?
Maybe have it signed by a well-known certification authority, à la SSL?
Ok, but then you may ask, why not use SSL as it is? Answer: much less overhead (only one static file would need to be signed, and hash would only need to be computed once per static html file. And for dynamic files, computing a hash would presumably be much faster than encrypting&signing). And it could be made compatible with name-based virtual hosts too (which SSL is not...)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Insightful)
Re:Should just block all ads, but... (Score:5, Insightful)
MOVE TO ANOTHER PROVIDER TODAY.
Why should I do that if I don't know the ISP is modifying the web pages in flight? Maybe I need a tool that could somehow detect that? That would sure be useful. Oh wait...Isn't that what this discussion is about?
What ISPs do this? (Score:2)
Re: (Score:2, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
None! None whatsoever. No carrier would do that, because it would be unseemly.
[ARE YOUR SEEMS TOO TIGHT? YOU NEED ACME MAGIC WEIGHT LOSS SUPER DIET GINGER ROOT SUPPLEMENT!]
The dont add may be they can subtract? (Score:2)
Oh lord the confusion (Score:4, Interesting)
Re: (Score:2)
Re: (Score:2)
This isn't a derivative work, and thus something they can forbid, anymore than me taking the last half of one Harry Potter book and the first ha
Re:Oh lord the confusion (Score:4, Informative)
Re: (Score:2)
There is a chance of a problem is the ISP misrepresents their actions. If they claim the page looked like that before you've then got a lie which could damage the reputation of the page creator. But if you know they're doing it... I can sell you a book I put through a wood chipper.
UW and Good Tool (Score:2)
I like UW and their tools. I think they've done wonderful work. Paint.NET is fun, easy, and I love that they are still working on it.
Who/what is able add to your pages:
Re: (Score:2)
Re: (Score:2)
Damn, that's right. Oh, well. How do you get a WSU student off your front porch?
Just pay him for the damn pizza.
Next week on Slashdot (Score:5, Funny)
Re: (Score:2)
Caveat 2: Our integrity checking mechanism is not cryptographically secure. If a "party in the middle" were modifying web pages that you visit, it could modify our scripts as well. Instead, our mechanism acts as a "tripwire" that is likely to catch any party that is currently unaware of our experiment. In the future, we could create a huge number of variants on the JavaScript tripwire. This would make it more difficult for a "party in the middle" to reliably determine
Re: (Score:2)
Re: (Score:2)
all websites should be https, even if you have to roll your own SSL cert
If you're rolling your own certificate, and not pre-sharing it, then SSL is vulnerable to a man-in-the-middle attack. Most people shrug this off saying MITM attacks are hard to perform, but since the insertion of ads in this way is a MITM attack then that argument doesn't really wo
Re:Next week on Slashdot (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
Here is my paper:
Use SSL.
Thank you very much for coming. Join us for coffee and danishes in the back.
Re: (Score:2)
What makes this so tricky is that you can't trust ANYthing the ISP is sending to yo
Answers to questions in this thread (Score:5, Informative)
Feature request (Score:2)
Re: (Score:2)
That, or ISPs will work harder to defeat the detection.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The dirtier the ISP has to play to smuggle their ads in, the worse the backlash. Come on - some inserted ads are simply unethical. But if the ISP starts breaking into SSL connections and someone finds out (and they WILL), the ISP is in for a big lawsuit. They may even be committing fraud.
Not quite... (Score:4, Interesting)
As long as the actual API used by the Javascript is common enough that the ad-injectors can't recognize and block our code by keeing in on the API calls rather than the overall Javascript.
The proper solution, adding integrity checking to all HTTP, seems like its not happening.
Re: (Score:2)
Re: (Score:2)
True.
Sad, but true.
Re: (Score:2)
After all, encrypted traffic looks like a stream of random numbers to the ISP, right? Hard to modify.
Re: (Score:2)
Two problems:
Re: (Score:2, Funny)
What is your favorite flavor of ice cream?
Re:Answers to questions in this thread (Score:4, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
-
Re: (Score:2)
Because licking semi-frozen bovine lactate flavored with macerated orchid seed pods isnt weird ?
Re: (Score:2)
Re: (Score:3, Informative)
ANd click the link anyway, we want to have as many people try it as possible.
Re: (Score:2)
This is the 21st century where cryptography is common...
Re: (Score:2, Insightful)
I visit my banking site a couple times a week. I shop online a couple times a month. I read email online more commonly, but not *that* commonly from a web browser.
By contrast, I visit
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
Actually, our test page happens to answer these questions, to some extent.
All of our test pages are marked with "Pragma: no-cache" and "Cache-control: no-cache" in the HTTP response headers, but we're observing changes to the pages anyway.
Our integrity checking mechanism uses AJAX requests (XmlHttpRequests) to fetch the test page. ISPs can't distinguish between an AJAX request and a normal page request (i.e., they both look like normal HTTP requests), so they inject ads into both. However, we're
Re: (Score:3, Insightful)
Under normal circumstances AJAX and "normal" requests are the same; however, AJAX has a "setRequestHeader" parameter that can be used to set additional headers. This is significant in that HTTP/1.1 states:
You'v
Analyses (Score:3, Informative)
We are waiting for the Slashdot and DIGG deluges to pass, however, before we have a more detailed analysis.
Re: (Score:2)
Re: (Score:2)
Our initial goal is to not map the space completely, but to
1) Validate the tool operationally
2) Try to find some cases, and analyze those cases.
Also, I think the tech savvy might be MORE vulnerable, as it seems to be small ISPs which are doing this, not the big ones.
Re: (Score:3, Informative)
Re: (Score:2)
I agree that doing things cryptographically-authenticated would be a good thing (one could probably do a more lightweight opportunistic mechanism, myself and others at ICSI have an upcoming paper in HotSec on the possibility), but most people don't use https, and a lot of web sites don't SUPPORT https for many things.
Re: (Score:3, Informative)
If you self-sign, everyone gets a nag panel everytime they visit your web page. If you have verisign or someone else provide you with a certificate, it costs real money.
Also, the HTTPS handshake is expensive, figure ~.1 CPU second per visitor to handle the public key exchange, and it starts to add up. There is a reason why GOOGLE doesn't use https for gmail by default (you have to manually type in https://mail.google.com/ [google.com] to get gmail through SSL), the key
Re: (Score:2)
Apparently Google's standards have changed and they do not consider HTTPS too expensive anymore. I just typed in www.gmail.com and it redirected me to:
https://www.google.com/accounts/ServiceLogin?(MORE [google.com] JUNK CONTINUES)...
I had to try it.
Re: (Score:2)
The spyware vs MITM is harder to detect in general, this may be one of the suspicious cases we need to look at for.
Re: (Score:2)
Please don't post negative results! (Score:5, Informative)
No need for thousands of "All good in Kalamazoo" & "Up to date in Kansas City" posts.
Re: (Score:2)
A possible workaround (Score:5, Informative)
If you want to be stricter, encode your webpage content with base64 to make sure the ads don't intrude your precious content.
Re:A possible workaround (Score:5, Insightful)
Re: (Score:2)
Sounds like someone's being a cheapskate. Paid hosting can be had where you get your own virtual server for $1 a month, though a domain name is extra. For as little as that costs, it's almost not worth any time dicking around trying to counter your free host's means of hosting his site.
Re:A possible workaround (Score:4, Informative)
Re: (Score:2)
acronym nazi (Score:2)
Inserting Ads (Score:3, Funny)
Inline HTML Signatures (Score:2)
The XSS idea would be to have the ability to have multi-part responses from the web server. The browser would put the page together fr
Simple in principle (Score:2)
Step 1: Calculate md5sum of webpage, store in separate location.
Step 2: Include on the webpage some javascript to md5sum itself and compare this to md5sum in known location. Issue an alert if it differs.
Step 3: Profit!
Of course, this is awkward for dynamically generated pages and if the ISP is happy to mess around with the page to insert ads, they're probably also happy to mess around with any javascript which dete
What about upstream modification (Score:5, Funny)
This is the reason that we need to push for network neutrality [handsoff.org]. When the only choices are between a giant douche [summerseve.com] which alters content and a turd sandwich [panerabread.com] which alters content, the customer ends up screwed [lowes.com] in the end.
Re: (Score:2)
Not for nothing, but I'd imagine Sprint [sprint.com] would be more likely to insert an ad for Sprint [sprint.com] than an ad for Verizon [verizon.com].
Then again, maybe Verizon is your carrier... so maybe you would be directed to Sprint at Sprint [verizon.com].
Re: (Score:2)
Get your free 500 HOURS OF INTERNET [aol.com] today!
They WANT to be slashdotted (Score:3, Informative)
Old stuff. (Score:4, Interesting)
FWIW, seemed only one person noticed that the forbes page they loaded somehow had the company logos everywhere
I toyed with the idea of substituting ads with reminders (meeting at 2pm, or "you have been on slashdot for 2 hours!") and other more useful information.
Lastly, I don't think their naive hashing thing checks if you are altering the images - the content may remain unchanged, but linked to contents may change (they aren't checked from what I see), so it doesn't work for my scenario where different ads are substituted for the unaltered URL.
That said, I'm still curious on:
1) How many ISPs would bother modifying traffic from those 7 destinations they are testing.
2) What the various laws around the world say about this.
3) What those laws say about "sponsored internet access" where an ISP gives a cheaper package/plan where the ads are substituted with the ISPs advertisers with the risk of some corrupted info.
4) What those laws say about "streamlined internet access" where an ISP provides a package/plan where ads and other crap are removed (or modified) for their customer.
If it's happening near the client.. (Score:3, Insightful)
..why not just use SSL?
I can understand how this wouldn't help with hosting ISPs who insert ads into their own customers' pages, but if you're worried about your readers' ISPs modifying your pages, SSL seems like a no-brainer.
What's the downside? It can't still be CPU, can it? It's 2007 now, and processing power is ridiculously cheap/fast.
Re: (Score:2)
a) Certificates are a pain and cost $$$
b) CPU isn't free. It costs ~.1 CPU second to do an SSL handshake. This is actually a big-deal amount, there is a reason why Gmail defaults to http except for authentication.
Re: (Score:2)
Re: (Score:2)
Despite Moore's law, etc., the cost of RSA operations on general purpose CPUs is very high. Not a problem on the client side, but on the server side, one hardware accelerator could save you thousands of general purpose CPUs.
Re: (Score:2)
So I'm a little high on my
The bulk encryption is cheap, but thats another story.
Re: (Score:2)
This is on an old, 1GHz Athlon. The real time is quite high, but the machine is doing a few other things, so much of that is time spent on other tasks. Since the crypto is all done by SSH, not by a hardware device, it must be part of the 'user' time. This gives 0.066s on an old machine doing the client part of SSH. A decent server chip should be able to do the same thing in 0.01
Already Part of HTTPS? (Score:2)
Re: (Score:3, Informative)
Re:I've got a better method... (Score:4, Informative)
Re: (Score:2)
2. There are plenty of people who would never know: people who use adblocking software, for one. In any event, many commercial webpages are so overrun with advertising anyway, how would you know that one in the crowd was inserted by your ISP and not original to the page?
The subject doesn't make
Re: (Score:3, Informative)
Re: (Score:2)
Or maybe just the kind of moron who won't even RTFS.
Re: (Score:2)