Point-and-Click Gmail Hacking Shown at Black Hat 260
not5150 writes "Using Gmail or most other webmail programs over an unsecured access point just got a bit more dangerous. At Black Hat Robert Graham, CEO of errata security, showed how to capture and clone session cookies very quickly over connections without encryption. He even hijacked a shocked attendee's Gmail account in the middle of his presentation. 'While Ou was typing, Graham was running Ferret and sniffing all the cookies that were being sent from Ou's laptop and Google. Graham then clicked on Ou's IP address and Gmail page, complete with Ou's recently sent message on the screen. We photographed both Graham's and Ou's laptop at that time and posted it to the picture gallery. You'll see that the contents are exactly the same.'"
Slow News day? (Score:5, Insightful)
Re: (Score:2, Interesting)
Re:Slow News day? (Score:5, Interesting)
Re:Slow News day? (Score:5, Insightful)
Re:Slow News day? (Score:5, Insightful)
This is Google we're talking about. They can take it.
I mean, seriously, even an old 200 mhz Linux box set up as a server can do crypto at wire speed (100 mbit ethernet). I'm sure it takes them more cycles to spellcheck it for you.
"Not entirely secure" is not the same thing as "useless".
Consider: The majority of most websites are mostly served as plain HTML over HTTP. Is it still "useless" for me to admin mine using SSH instead of unsecured FTP? I think not.
The point I am making here is, if your communications with Gmail are unencrypted, it makes it possible for someone to not only intercept the content of the message, but alter it -- they could, in fact, hijack your whole session, gain access to your archived mail, and send mail pretending to be you. All of this is theoretically possible with that SMTP connection between Gmail and another mailserver, but it's also insanely difficult to get anywhere close to what you can get by hijacking the session.
And there's even a point to encrypting it, as opposed to just signing it. Well, two points, actually:
I mean, I tend to agree with you somewhat -- I only really do email from the one machine that has my GPG key, and I wouldn't use Gmail for more than backup. I don't see much point to webmail, because I never login to anything from a computer that isn't my own, because I don't like exposing myself to keyloggers.
But even if it can't be very secure, why make it even less secure than it can be?
Re: (Score:2)
Re:Slow News day? (Score:4, Informative)
Essentially, if you enter via http://mail.google.com/ [google.com] Google remembers this and encrypts only the login process and then reverts back to plain text. If you enter via https://mail.google.com/ [google.com] your session remains encrypted throughout.
Re: (Score:2)
I mean, yeah, some people might not care about security, but that's no reason to make the default inherently insecure. At the very least, they could have the first view not actually show the contents of the inbox, so when you log in insecurely by mistake, you can switch to secure without actually compromising anything.
But it IS
Re: (Score:2)
That makes it easy to connect the right way. It doesn't take long to type by hand either.
Re:Slow News day? (Score:5, Informative)
Another Extension (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Bottom line (Score:5, Informative)
It's more of an indictment of Google than anything, because they default to unencrypted HTTP rather than HTTPS, and most users won't know that they can go to https://mail.google.com/mail/ [google.com] to force smarter behavior.
Re:Bottom line (Score:5, Informative)
Re: (Score:2)
Dsniff / Monkey in the middle attacks [monkey.org]
Re:Slow News day? (Score:5, Informative)
Re:Slow News day? (Score:4, Interesting)
Worrying.
Re: (Score:2, Interesting)
Cain does it that way . The user does get a notification that the certificate is untrusted , but most people will just allow it anyway ( otherwise they can't use the webpage ) .
Re:Slow News day? (Score:4, Informative)
Re: (Score:2)
Ciphers and key exchange mechanisms are discrete. (Score:2)
that depends on what SSL ciphersuite your browser negotiated. Some SSL ciphersuite support DHE keying. For others, the client generates a random key, encrypts it with the server's public key, and sends it to the server.
Huh? I know TLS theoretically supports other key transfer mechanisms than diffie-hellman, but the last time I checked there wasn't anything else actually implemented, it's just a future compatibility mechanism. I haven't studied SSL since TLS came out, but I don't remember there being any way to avoid diffie-hellman in SSL at all.
I think you'll need to provide some corroborating evidence, my friend. Care to point to a section in the spec where it says you can skip secure key exchange, or post some code,
Re: (Score:3, Informative)
Re: (Score:2)
As some other posters said, this is absolutely not true and it hasn't been true since asymmetric cryptography and secure key exchanges where discovered.
However, if the hacker was able to set himself up as a proxy between the computer and the network (by using ARP spoofing, for instance), he could substitute his own certificate for Google's, decrypt the traffic, read it, and then forward it to Gmail (that is, a man-in-the-middle attack). This takes way more work, and there will be a popup that says "This c
Re: (Score:3, Interesting)
And I try to educate everyone I know about handling certificate warnings. They are all worried about Internet insecurity, and I tell them their connection (assuming they have a clean systems) WILL be
Could be fixed easily by Google. Shame. (Score:3, Insightful)
Re: (Score:2, Informative)
Re:Could be fixed easily by Google. Shame. (Score:4, Informative)
I fail to see how the average person, as usual, being lax about their security is in any way Google's fault. This was something I found immediately, just because I won't check my email without a secure connection.
Re:Could be fixed easily by Google. Shame. (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Could be fixed easily by Google. Shame. (Score:5, Insightful)
Yes, but... (Score:2)
Re: (Score:2)
If you thought anything else, you were out of your fricking mind...I
Re: (Score:2)
Unbelievable. Secure by default is not a nice feature, it is the ONLY option when properly engineering something. Free or otherwise. If you think otherwise, then you're doing a grave disservice to your users. Anyway, I'm looking forward to quoting this thread in future security discussions. Evidently, security isn't as important these days, or, it isn't if you're Google.
Oh come on. (Score:2)
Re: (Score:2)
Re: (Score:2)
It's not Google's fault... (Score:4, Funny)
Re: (Score:2, Informative)
Even if there are others with the same problem doesn't give you excuse to ignore the problem.
Re: (Score:2)
Better yet, it proves out my premise that services such as these shouldn't be used for anything mission/business critical- PERIOD.
Well...Duh. (Score:2)
Personally, I can't imagine using a non-guaranteed service for anything "mission-critical". If your mission relies on someone else's beta service, your business is in trouble.
Re: (Score:2)
There are times I wonder about this generation. We don't really want to accept that we're responsible for much of anything. Suppose the Internet had been around fifty or sixty years ago. Ask your parents: would they expect to be mollycoddled by their ISPs and free services? I know my father wouldn't have
Re:Could be fixed easily by Google. Shame. (Score:4, Interesting)
The point is, security is more than just "what's available." It also has to be about how good the defaults are. The technical community cried foul when Microsoft included a firewall in Windows XP but didn't have it turned on by default, and we complained so much that in SP2 Microsoft finally changed the default.
I agree that security is ultimately the responsibility of the user, but they should not have to seek out secure settings and turn them all on one by one. The default mode for any network-enabled program should be Secure. If the user needs Insecure, then they should have to change a setting to make it so. Spam should be opt-in, security should be opt-out. Anything else is unfair to the user.
Re: (Score:2, Informative)
Re: (Score:3, Interesting)
Re: (Score:2)
lthough I guess I don't have much to worry about since we don't use wireless in our home.
Re: (Score:2)
https://www.google.com/ig [google.com]
and
https://mail.google.com/mail/ [google.com]
Re: (Score:2)
Re: (Score:2)
Maybe because you can simply tie the session to the client IP adress and verify it during each request, which puts an end to the hijacking.
Re: (Score:2)
Re: (Score:2)
Not with NAT, which is typically when you are most vulnerable (i.e. a shared wireless network).
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
Re: (Score:2)
Good reason to install Better GMail! (Score:4, Informative)
Re:Good reason to install Better GMail! (Score:5, Informative)
Re: (Score:2)
Correct me if I'm wrong but (Score:5, Informative)
Re:Correct me if I'm wrong but (Score:5, Insightful)
Re: (Score:3, Interesting)
Security is an application-layer problem. (Score:4, Insightful)
I agree with the latter recommendation about using SSL, but saying 'secure your wireless AP' doesn't do a lot to help the many public wifi locations; I think it's unhealthy to ever assume that a wireless connection will be secure. As more wireless networks are rolled out, and more people get laptops with built-in wireless and traipse happily from home to their local coffeeshop, where they're sharing an IP and an unencrypted connection with many untrusted users, opportunities for sniffing and hijacking are only going to become more common.
As users demand more portability, security and authentication need to be moved (and kept) up at the application layer, and not simply assumed as part of the datalink or physical layers.
Security and the "mobile office" (Score:2)
A few days ago my business partners and I were in some podunk town not far from Sacramento for a demonstration. The morning demonstration went well, but the potential customer was cool to buying, and so was kind of short. So there we were, all three of us, in some foreign town around lunch time. We found an ice cream shop that served sandwiches and had a wifi hotspot.
So we whipped out our laptops, took over a table, ordered some
Re: (Score:2)
Using WEP is just as bad as not using any security on your AP. If someone is savvy enough to sniff wireless traffic then they are savvy enough to crack your 128 bit WEP key in 10 minutes.
Re: (Score:2)
Re:Correct me if I'm wrong but (Score:4, Informative)
Re: (Score:2)
AOL dial-up which is relatively popular in USA (yea..) does this. Every request is on a different IP. Which is why many people don't do this.
It gets complex: you can not apply this fix to IP-ranges on AOL you know are used for dial-up. I also check the exact user agent string, of co
Firefox (Score:2)
I'm going to look for the Firefox extension now...
O RLY? (Score:2)
But the openness of your wireless network really isn't their problem. You don't blame the banks if you shout your PIN out while you're at the ATM, do you? Or, more aptly, you don't blame the bank if you trust your ATM card and PIN to some stranger in a coffee shop.
It isn't Google's responsibility to secure your connection end-to-end. It's far more reasonable to think that it
Not the network's job. (Score:3, Insightful)
An application like Gmail should be treating all network connections as though they're unencrypted Wifi (or hubbe
Re: (Score:2)
Having an open wireless network in the least of your troubles, I chance of someone in your area stiffing your packets in very small. The chance of someone stiffing your packets across the public internet is much higher.
I have an open wireless network, but all communication of a sensitive matter is transfered over HTTP or SSH, I really don't care if random people stiff my packets and read my slashdot.
Always use https://gmail.google.com (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
ssl and gmai. (Score:2)
Re: (Score:2, Insightful)
Re: (Score:2)
I don't know, I'm hesitant to believe that the decision to default to non-SSL connections in GMail resulted from some sort of ethical deliberation. It was probably just a matter of "we'd need to buy $X worth of hardware to support all our users connecting over SSL, so we don't see the benefit in providing this unless the customers really begin to demand it". In other words, just business as usual.
Re: (Score:2)
Same reason the entire web isn't SSL by default. It takes a considerable amount of CPU compared with unencrypted web traffic.
Easy fix (Score:3, Informative)
use gmail over https (Score:2, Informative)
Accessing http://gmail.google.com/ [google.com] will redirect you to a secure page for login, but after that you're back in plain text. If you start at https://gmail.google.com/ [google.com] then afaik the rest of your gmail session runs over SSL.
Make it default to https (Score:4, Informative)
#
# Actual snippet from my Apache configuration
# Some details have been changed to protect the innocent
# And some details have been changed to protect the guilty
#
# The virtual host "secure.mydomain.co.uk" cannot be accessed
# by http; only by https.
#
# The insecure port
<VirtualHost 10.11.12.13:80>
ServerName secure.mydomain.co.uk
DocumentRoot
<Directory
RedirectMatch ^/[^iI]
# In this directory is a page with a dire warning
# that https is required to access this server.
# NB. To avoid creating an infinite loop, we never
# redirect if request begins with I or i.
</Directory>
</VirtualHost>
# The secure port
<VirtualHost 10.11.12.13:443>
SSLEngine on
</VirtualHost>
Re: (Score:2)
Re: (Score:3)
Re: (Score:2, Funny)
Wow, you guys are getting quick. One minute for a denialist to chime in. I'm impressed.
Re: (Score:2)
Re: (Score:2)
Truly, an ingenious troll.
Re: (Score:2)
If the former, I have to say, it's a well-played troll. If the latter, it would be nice if you got off your ass and made whatever devastating point you're so coyly alluding to.
rofl (Score:2)
Re: (Score:2)
oh wait, it isn't.
trolling today, are we?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Yes, it is. (Score:5, Insightful)
1) It's being done to Gmail, a service provided by People Who Should Know Better.
2) There is now a tool that allows any script kiddie to do it, meaning that it's no longer a theoretical exploit; it's something that your next-door neighbor is going to be doing to you (or your slightly less-technically-savvy family/friends) if you don't take precautions.
#2 is probably most significant, since it's really what's going to cause #1 to change. Sometimes, producing a GUIed, Windows-based exploit tool is the fastest way to get a problem fixed, because it's the easiest way to turn an academic argument into a real-world security issue that will get resources thrown at it. (Of course, it may also land you in jail.)
Re:psh (Score:5, Funny)
Re:thank god... (Score:4, Funny)
a Blackhat attendee not using a VPN? (Score:2)
Please. Those guys are supposed to be security wizards! And now one of them is caught using plain HTTP to access gmail? I hope they laughed hard at him. Even securety noobs like me know when to use HTTP and HTTPS.
Um...the really smart people aren't using https. They're using http/https via VPN or SSH tunnel to a more trusted network.