CFA/Security-Notes: Difference between revisions
< CFA
Jump to navigation
Jump to search
m (→Pain Points) |
|||
| Line 106: | Line 106: | ||
== Pain Points == | == Pain Points == | ||
* Users ignore security indicators and click through warning dialogs (analogy is "whack-a-mole"); focus is on completing tasks | * Users ignore security indicators and click through warning dialogs (analogy is "whack-a-mole"); focus is on completing tasks | ||
** | ** Security indicators are out of the way and hard to interpret; terminology is confusing | ||
*** Security UI needs to be clear and simple | *** Security UI needs to be clear and simple | ||
*** In certain situations, it may help if the browser makes a decision for the user while still offering the user another option | *** In certain situations, it may help if the browser makes a decision for the user while still offering the user another option | ||
Revision as of 16:58, 24 July 2007
« Comparative Feature Analyses
« Security Research
Purpose
Examine a bunch of browsers, existing Firefox Add-ons, and web services to generate a report that describes:
- Which capabilities each has
- A summary of where each is different/unique
- Some conclusions about which aspects seem most innovative and interesting that we might want to consider for Firefox
Research
General capabilities
Malware Detection
- Cross-domain barriers - prevent script on webpages from interacting with content from the other domains or windows; protects against malware by helping prevent malicious websites from manipulating flaws in other websites (IE)
- Protection from Spyware - notification whenever downloading or installing software (FF2)
- Download actions - ability to disable handling and downloading of certain file types (FF brainstorm)
- Extension installation - one click to permanently add site to whitelist (FF brainstorm)
- Virus/Malware protection - integrate sandboxing feature like Sandboxie; integrate virus scanning and malware protection for retrieved content/files (FF brainstorm)
- Protected Mode - runs in isolation from other applications in the OS. Restricts exploits and malware from writing to any location beyond Temporary Internet Files without explicit user consent (IE7)
- Warn me when sites try to install add-ons (FF)
- Prevent malware attacks in real-time with behavior-based profiling algorithms (Finjan SecureBrowsing FF extension, Haute Secure)
- Prevent malware attacks using virtual machine techniques (GreenBorder)
Anti-Phishing
- Highlight URL domain name in address bar (in FF3)
- Address bar protection - every window, including pop-ups, will show you an address bar (IE)
- AJAX - ability to disable AJAX on certain sites; notify user if asynchronous calls are being made on user's behalf (FF brainstorm)
- Phishing Protection - warn users of suspected forgery (phishing) sites, and offer to take user to search page to find the real website they were looking for (FF brainstorm)
- Make it easier to report phishing sites
- Implement phishing filter that learns automatically; integrate w/ PhishTank
- Blacklisting
- Whitelisting
- Security status bar - color-coded notifications appear next to the address bar to notify user of website security and privacy settings. Address Bar turns green for websites bearing new High Assurance certificates (IE7, VeriSign EV Green Bar FF Extension)
- FirePhish - uses Open Phishing DB to provide user with info and tools to protect against phishing attacks (FF extension)
- Blinking-red warning when entering high-risk phishing-suspected sites
- Green frame around location bar when entering sites on your safe list
- International domain name anti-spoofing - notifies user when visually similar characters in the URL are not expressed in the same language (IE)
- openID - decentralized single sign-on system that is possibly vulnerable to phishing attacks
- Tell me if the site I'm visiting is a suspected forgery (FF)
- Check using a downloaded list of suspected sites
- Check by asking Google about each site I visit
- Surf by IP protection (FF brainstorm)
- Disallow visiting sites by IP address (IP anywhere in URL)
- Allow local LAN IPs
- iTrustPage - anti-phishing tool that prevents users from filling out suspicious web forms, and suggests corresponding legitimate form (FF extension)
Content Enabling
- NoScript - allows JavaScript, Java and other executable content to run only from trusted domains of your choice (FF extension)
- Enable plug-ins (Safari)
- Block flash animations (Camino)
- Load images automatically (FF)
- Enable Java (FF)
- Click to run applets (Omniweb)
- Enable JavaScript (FF)
- YesScript - JavaScript blacklist (FF extension)
- Allow scripts to: (FF)
- Move or resize existing windows
- Raise or lower windows
- Disable or replace context menus
- Hide the status bar
- Change status bar text
- Reorder windows (OmniWeb)
- Block pop-up windows (FF)
- Block web advertising (Camino)
- Adblock Plus - block ads and banners on webpages (FF extension)
Cookies
- Accepting cookies (FF)
- Exceptions (FF)
- Show cookies/cookie manager (FF)
- Discard when quitting (FF)
- Only from the current site (OmniWeb)
Passwords
- Remember passwords for sites (FF)
- Exceptions
- Show passwords
- Use a master password (FF)
- Change master password
Warning Messages
- Secure Defaults/No Security Pop-ups - remove security pop-ups because users are trained to click on the default button to complete their task. Use secure defaults instead, and only provide notifications at the top of the browser (FF brainstorm)
- Fix my settings - instantly reset internet security settings to "medium-high" default by clicking option in Information Bar. The browser warns user with Information Bar when current security settings may put you at risk. The bar continues to remind you as long as settings remain unsafe. Internet Control Panel highlights critical items in red when they are unsafely configured. (IE7)
- Bookmarklets - warn users when attempting to bookmark javascript code (FF brainstorm)
- Show a warning dialog when (FF)
- I am about to view an encrypted page.
- I am about to view a page that uses low-grade encryption
- I leave an encrypted page for one that isn't encrypted
- I submit information that's not encrypted
- I'm about to view an encrypted page that contains some unencrypted information
- Warn when sending form data by email (iCab)
Encryption (Protocols and Certificates)
- Lock icon - provides detailed information about the site's security certificate (in FF)
- Digital signature information - provides more information about the publisher of a program and whether the program is digitally signed (IE Screenshot)
- Use SSL 3.0 Protocol (FF)
- Use SSL 2.0 Protocol (Flock)
- Use TLS 1.1 Protocol (Opera)
- Use TLS 1.0 Protocol (FF)
- Certificate options (FF)
Other
- Automated update - always checks to see if you're running the latest version, and notifies you when a security update is available (FF)
Pain Points
- Users ignore security indicators and click through warning dialogs (analogy is "whack-a-mole"); focus is on completing tasks
- Security indicators are out of the way and hard to interpret; terminology is confusing
- Security UI needs to be clear and simple
- In certain situations, it may help if the browser makes a decision for the user while still offering the user another option
- Security UI must balance obviousness with unintrusiveness, convey clarity in reasonable size, and reflect complexity with simplicity - talk to Jonathan Nightingale
- Security indicators are out of the way and hard to interpret; terminology is confusing
Browsers to investigate
- Firefox 2
- Camino
- Flock
- iCab
- IE 7
- Maxthon
- Netscape
- OmniWeb
- Opera
- Safari
- SeaMonkey
- Shiira
Add-ons to investigate
Firefox
- Adblock
- NoScript
- CookieCuller
- CookiePie
- VeriSign EV Green Bar Extension
- FirePhish Anti-Phishing Extension
- PhishTank SiteChecker
- Finjan SecureBrowsing
- iTrustPage
- YesScript - JavaScript blacklist
Safari
Web services/apps to investigate
Desktop apps to investigate
- Haute Secure - prevent malware attacks in real-time with behavior-based profiling algorithms
- GreenBorder - prevents malware attacks using virtual machine techniques