Perimeter
6/20/2011
10:43 PM
Taher Elgamal
Taher Elgamal
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Leaps Of Faith

Mobile is more secure than the browser realm because most mobile transactions are conducted through applications, not the browser

Certificates and SSL use a proven, time-honored cryptographic protocol that most of us benefit from every day. Still, phishing attacks do occur; bad guys continue to use fake forms that trick users into providing sensitive information. The protocols are by no means responsible for these events, but they do get blamed, largely because an act of trust was committed through the browser, and certificates and SSL are directly involved in determining who the browser trusts.

So who should the browser trust?

This is a question we asked about 15 years ago when we were developing SSL, and it’s still relevant. Just as it was back then, the browser today is the client through which the world accesses websites, and no one wants to restrict access to sites, especially trusted ones.

So what we are facing is a compromise between security and functionality, one that allows users to trust whomever they wish, but delivers warnings in a pop-up window if the certificate they’re about to accept comes from an unknown source. If they wish to go ahead and trust it, then they may proceed -- and the fact is that nearly everyone ignores the pop-up warning and clicks through, behaving as if they trust most sites they approach.

It’s this assumption of trust, not the SSL protocol, that is responsible for the success of phishing attacks and identity theft. In fact, when SSL is used in the back-end and in server-to-server connections, it is literally not possible to connect to the wrong place. Because this use of SSL relies on mutual authentication, one simply does not see the kinds of security issues that crop up when individual users in charge of the decision to trust or not trust a certificate.

Similarly -- and this might come as a surprise -- from a security standpoint, the mobile realm is far more secure than the browser realm, because most mobile transactions are conducted through applications, not browsers. With mobile apps, for instance, the certificates are already built in -- they don’t allow the user to trust any random site and click “Yes” to a pop-up window that should genuinely give them pause. They don’t force the user to wonder who the browser should trust, because it’s not a browser.

The pop-up “warning” window that makes certificate trust a user option was, frankly, the wrong decision. We didn’t spend enough time thinking about how to give the browser an absolutely trusted certificate, and how to eliminate the need for the user to take frequent leaps of faith with random sites.

Will those who blame certificates and SSL for phishing attacks be silenced when every transaction has its own dedicated application, and the browser is relegated to a “stand-by” app for when no dedicated app is available? I believe many of us are already previewing this phishing-free future as we access the Web via smartphones, and rely more and more on a wide range of applications that have come of age since the debut of the app stores some years back.

Recognized in the industry as the "inventor of SSL," Dr. Taher Elgamal led the SSL efforts at Netscape. He also wrote the SSL patent and promoted SSL as the Internet security standard within standard committees and the industry. Dr. Elgamal invented several industry and government standards in data security and digital signatures area, including the DSS government standard for digital signatures. In addition to serving on numerous corporate advisory boards, Dr. Elgamal is the Chief Security Officer at Axway, a global provider of multi-enterprise solutions and infrastructure. He holds a Ph.D. and M.S. in Computer Science from Stanford University. View more of his blog posts here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

CVE-2014-3372
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the CCM reports interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq90589.

CVE-2014-3373
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the CCM Dialed Number Analyzer interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCup92550.

CVE-2014-3374
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the CCM admin interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq90582.

CVE-2014-3375
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the CCM Service interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq90597.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.