27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

URL, such as https://www.organizati<strong>on</strong>.org/, but then redirect them to another URL, such as<br />

https://www.secure-organizati<strong>on</strong>.org/. A user redirected to https://www.secured-organizati<strong>on</strong>.org/<br />

may not notice the attack.<br />

Using Secure C<strong>on</strong>necti<strong>on</strong>s (i.e., HTTPS) for Logins, which Allows Users to Verify that the<br />

Server Certificates are Valid and Associated with a Legitimate <strong>Web</strong> Site—Modern browsers will<br />

notify a user if the DNS name does not match the <strong>on</strong>e provided by the certificate, but some pharming<br />

sites could have a legitimate certificate. 40<br />

Ensuring User Awareness of the Dangers of Pharming Attacks and How to Avoid Them—<br />

Pharming is a recent phenomen<strong>on</strong>; many users may not know to watch for pharming attacks.<br />

Verifying Third-Party Host Resoluti<strong>on</strong>—A number of vendors provide third-party <strong>Web</strong> browser<br />

plug-ins 41 that support matching the Internet Protocol (IP) address of a <strong>Web</strong> site against a previously<br />

verified “good” IP address, providing users with a warning if the <strong>Web</strong> site is suspicious.<br />

Using Pre-Shared Secrets—Pre-shared secrets can be used to prevent pharming attacks. A comm<strong>on</strong><br />

implementati<strong>on</strong> of pre-shared secrets is to have authorized users set up certain questi<strong>on</strong>s and answers<br />

that <strong>on</strong>ly they should know. In additi<strong>on</strong>, the <strong>Web</strong> site provides each user with a specific image<br />

and/phrase that <strong>on</strong>ly it and the user knows. Subsequently, when a user logs in to the <strong>Web</strong> site, the<br />

user is asked <strong>on</strong>e of the secret questi<strong>on</strong>s. If the user answers correctly, he or she is presented with the<br />

secret image/phrase and <strong>on</strong>ly then asked for a password. Since a pharming site would not know those<br />

pre-shared secrets and be able to resp<strong>on</strong>d accordingly, it should be recognizable as a malicious site.<br />

The main disadvantage of using pre-shared secrets is that user acceptance may be low because of the<br />

work involved to set up the secrets and log into a site. Moreover, some users might not recognize the<br />

missing data and use the pharming site anyway.<br />

Many of the techniques used to prevent phishing attacks—particularly in commercial offerings—are<br />

relevant to preventing pharming attacks. As with anti-phishing soluti<strong>on</strong>s, when c<strong>on</strong>templating antipharming<br />

measures, it is important to c<strong>on</strong>sider the type of informati<strong>on</strong> being hosted <strong>on</strong> the <strong>Web</strong> site. <strong>Web</strong><br />

sites with little or no sensitive informati<strong>on</strong> may not need to implement more advanced or costly antipharming<br />

measures. <strong>Web</strong> sites storing PII should str<strong>on</strong>gly c<strong>on</strong>sider implementing more robust antipharming<br />

measures. Requiring str<strong>on</strong>g authenticati<strong>on</strong> can greatly reduce the risk of successful phishing<br />

and pharming attacks.<br />

6.4 <strong>Securing</strong> Active C<strong>on</strong>tent and C<strong>on</strong>tent Generati<strong>on</strong> Technologies<br />

In the early days of the <strong>Web</strong>, most sites presented textual, static HyperText Markup Language (HTML)<br />

pages. No interactivity occurred between the user and <strong>Web</strong> site bey<strong>on</strong>d the user clicking <strong>on</strong> hyperlinks.<br />

So<strong>on</strong> thereafter, various types of interactive elements were introduced that offered users new ways to<br />

40<br />

41<br />

In January 2001, VeriSign issued two Class 3 code-signing certificates to an individual claiming to be a Microsoft employee<br />

(http://www.microsoft.com/technet/security/bulletin/ms01-017.mspx). With TLS certificates available at less than $20 with<br />

little or no background check, it is becoming increasingly easier for attackers to acquire valid TLS certificates. While it is<br />

possible for Certificate Authorities (CA) to revoke certificates, most browsers are not c<strong>on</strong>figured to perform certificate<br />

revocati<strong>on</strong> list checking. Secti<strong>on</strong> 7.5 provides more informati<strong>on</strong> about TLS.<br />

A plug-in is a program that works in c<strong>on</strong>juncti<strong>on</strong> with a <strong>Web</strong> browser to enhance the browser’s capabilities. A browser<br />

typically prompts the user to download a new plug-in when c<strong>on</strong>tent is encountered that requires functi<strong>on</strong>ality bey<strong>on</strong>d the<br />

browser’s existing capabilities.<br />

6-8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!