SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
SOMA:
Mutual Approval for Included
  Content On Web Pages

       Terri Oda, Glenn Wurster,
    P. C. van Oorschot, Anil Somayaji
SOMA


               Same Origin Mutual Approval

               Tighten the JavaScript Same
                  Origin policy to prevent
                  additional attacks
               Extension to web browsers
                       – Obey simple policies set by
                          site operators




http://flickr.com/photos/kenturamon/168978666/         2
Same Origin Policy

 All JavaScript code has full access to:
     – Run/Overwrite all other JavaScript code
     – Read/Write to other content from the document origin
 Same Origin Policy restricts access to content from
    other domains




                                                              3
Same Origin Policy

 Same Origin policy restricts read and modify access
 Fetching of content is unrestricted


   Content                     Permissions
    Type       Fetch    Read     Modify Execute   Display
 Images         YES      SO        SO      NO       YES
 HTML           YES      SO        SO      NO       YES
 JavaScript     YES      SO       YES      YES      NO
 Audio/Video    YES    Plugin Dependant    NO       YES




                                                            4
Sample Web Attack




                    5
Inclusions




Inclusions allowed with Same Origin        Inclusions allowed with SOMA

                                                                          6
SOMA Manifests

1. A file on the origin domain (/soma-manifest)
2. Lists domains approved by origin site


                    Possible Manifest States
                           (given by site A)
Server Response                  Meaning              Symbol
No Manifest                  All sites approved        AAB
B in Manifest             Content from B allowed       AAB
B not in Manifest        Content from B not allowed    ACB


For some domain B


                                                               7
SOMA Approvals

1. Script on content provider site (/soma-approval)
2. Responds to approval requests
        – Based on origin page domain


               Possible Approval Responses
                              (by site B)
Server Response                  Meaning                    Symbol
File Not Found               All sites approved              BBA
YES                   Can include content into A's page      BBA
NO                  Can NOT include content into A's page    BDA

For some domain A


                                                                     8
SOMA Message Flow

 Originating                                                       Remote
                                  Web Browser
Web Server A                                                     Web Server B

          Request Page
        Request Manifest
         Return Manifest
           Return Page

               If A wants to include        Request Approval
               content from B (and
               B is in A's manifest)   Approval Response (YES/NO)


                   If B returns YES         Request Content
                                                Return Content



                                                                                9
Cross Site Scripting

 Any script can include other scripts (from any site)
 Inclusion blocked by SOMA Manifest




                                                         10
Unrestricted Outbound Communication

 Any script can read content from the document origin
 Transmission blocked by SOMA Manifest




                                                   11
Cross Site Request Forgery

 A script can make requests to any domain
 Request blocked by SOMA Approval




                                             12
Bandwidth Stealing

 A document can include content from anywhere
 Inclusion blocked by SOMA Approval




                                                 13
SOMA Prototype

 Mozilla Firefox 2 Add-on
     – also compatible with Firefox 3
     – can be downloaded and tried out
           – http://ccsl.carleton.ca/software/soma
 Fully backwards compatible
     – current websites appear unchanged
 Stops attacks discussed earlier
 Icon in statusbar indicates that SOMA is running




                                                     14
Screenshot of Prototype




                          15
Deployment

 Need:
     – minor modifications to browser
            – Mozilla SOMA Add-on implementation code is 12k
     – policy on origin & content providers (ideally)
            – some protection if either side provides policy
 Requires some additional network overhead
     – fetch manifest from origin
     – fetch approval from each content provider before
         fetching content
 Deployment is incremental


                                                               16
Performance

 Approvals overhead:
     – adds one additional round trip
     – estimated additional page load time is 5.58%
     – estimate probably overstated:
           – We used average content response size: 10459 bytes
           – soma-approval response size: 4 bytes (0.1% overhead)
                  • independent of site complexity
 Manifest size:
     – checked front page of top 500 Alexa sites
     – average: 5.45 domains per site (5.3 stdev)



                                                                    17
Complementary Work:
Existing Code Injection Prevention

     Do careful input checking
         – risk of interactions with web page
         – difficult to do well
         – done by web programmer in source code

     Detect known code injection attacks
         – XSS, CSRF, SQL Injection
         – risk of false positives/missing new attacks
         – can be done by 3rd party tool
            • eg: web application firewalls



                                                    18
Complementary Work:
                   Mashups

 A mashup is a web application
  which combines information and
  code from different sources
 There has been work on ways to
  make them more secure
  – better separation between components
  – communication between different contexts
 Mashup work focuses on interactions within the page
  – SOMA focuses on interactions with external servers
 Requires use of tools by skilled web developers


                                                         19
Related Work:
Tahoma and Flash

 Tahoma [Cox 2006]
     – SOMA Manifest for VM's




 Flash's crossdomain.xml
    – SOMA approvals for Flash




                                 20
Related Work:
       Mozilla's Content Security Policy

 First version (“Site Security Policy”) similar to SOMA
 Most recent version has only manifest
     – Does not protect against cross site request forgery
 Other major differences:
     – policy is per-resource
     – more complex syntax required




                                                             21
SOMA Benefits

1. Incrementally deployable (with incremental benefit)
2. No configuration/usage burden on end users
3. Required changes/configuration are done by site
operators
4. Changes are relatively simple to
understand and easy to implement
5. Gives server operators the ability
to specify which sites can interact
with their content

                                                         22
Thanks!

 Carleton Computer Security Laboratory:
     – http://ccsl.carleton.ca
 SOMA Firefox Add-On (and more info):
     – http://ccsl.carleton.ca/software/soma




                                               23

Mais conteúdo relacionado

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

SOMA: Mutual Approval for Included Content On Web Pages

  • 1. SOMA: Mutual Approval for Included Content On Web Pages Terri Oda, Glenn Wurster, P. C. van Oorschot, Anil Somayaji
  • 2. SOMA  Same Origin Mutual Approval  Tighten the JavaScript Same Origin policy to prevent additional attacks  Extension to web browsers – Obey simple policies set by site operators http://flickr.com/photos/kenturamon/168978666/ 2
  • 3. Same Origin Policy  All JavaScript code has full access to: – Run/Overwrite all other JavaScript code – Read/Write to other content from the document origin  Same Origin Policy restricts access to content from other domains 3
  • 4. Same Origin Policy  Same Origin policy restricts read and modify access  Fetching of content is unrestricted Content Permissions Type Fetch Read Modify Execute Display Images YES SO SO NO YES HTML YES SO SO NO YES JavaScript YES SO YES YES NO Audio/Video YES Plugin Dependant NO YES 4
  • 6. Inclusions Inclusions allowed with Same Origin Inclusions allowed with SOMA 6
  • 7. SOMA Manifests 1. A file on the origin domain (/soma-manifest) 2. Lists domains approved by origin site Possible Manifest States (given by site A) Server Response Meaning Symbol No Manifest All sites approved AAB B in Manifest Content from B allowed AAB B not in Manifest Content from B not allowed ACB For some domain B 7
  • 8. SOMA Approvals 1. Script on content provider site (/soma-approval) 2. Responds to approval requests – Based on origin page domain Possible Approval Responses (by site B) Server Response Meaning Symbol File Not Found All sites approved BBA YES Can include content into A's page BBA NO Can NOT include content into A's page BDA For some domain A 8
  • 9. SOMA Message Flow Originating Remote Web Browser Web Server A Web Server B Request Page Request Manifest Return Manifest Return Page If A wants to include Request Approval content from B (and B is in A's manifest) Approval Response (YES/NO) If B returns YES Request Content Return Content 9
  • 10. Cross Site Scripting  Any script can include other scripts (from any site)  Inclusion blocked by SOMA Manifest 10
  • 11. Unrestricted Outbound Communication  Any script can read content from the document origin  Transmission blocked by SOMA Manifest 11
  • 12. Cross Site Request Forgery  A script can make requests to any domain  Request blocked by SOMA Approval 12
  • 13. Bandwidth Stealing  A document can include content from anywhere  Inclusion blocked by SOMA Approval 13
  • 14. SOMA Prototype  Mozilla Firefox 2 Add-on – also compatible with Firefox 3 – can be downloaded and tried out – http://ccsl.carleton.ca/software/soma  Fully backwards compatible – current websites appear unchanged  Stops attacks discussed earlier  Icon in statusbar indicates that SOMA is running 14
  • 16. Deployment  Need: – minor modifications to browser – Mozilla SOMA Add-on implementation code is 12k – policy on origin & content providers (ideally) – some protection if either side provides policy  Requires some additional network overhead – fetch manifest from origin – fetch approval from each content provider before fetching content  Deployment is incremental 16
  • 17. Performance  Approvals overhead: – adds one additional round trip – estimated additional page load time is 5.58% – estimate probably overstated: – We used average content response size: 10459 bytes – soma-approval response size: 4 bytes (0.1% overhead) • independent of site complexity  Manifest size: – checked front page of top 500 Alexa sites – average: 5.45 domains per site (5.3 stdev) 17
  • 18. Complementary Work: Existing Code Injection Prevention  Do careful input checking – risk of interactions with web page – difficult to do well – done by web programmer in source code  Detect known code injection attacks – XSS, CSRF, SQL Injection – risk of false positives/missing new attacks – can be done by 3rd party tool • eg: web application firewalls 18
  • 19. Complementary Work: Mashups  A mashup is a web application which combines information and code from different sources  There has been work on ways to make them more secure – better separation between components – communication between different contexts  Mashup work focuses on interactions within the page – SOMA focuses on interactions with external servers  Requires use of tools by skilled web developers 19
  • 20. Related Work: Tahoma and Flash  Tahoma [Cox 2006] – SOMA Manifest for VM's  Flash's crossdomain.xml – SOMA approvals for Flash 20
  • 21. Related Work: Mozilla's Content Security Policy  First version (“Site Security Policy”) similar to SOMA  Most recent version has only manifest – Does not protect against cross site request forgery  Other major differences: – policy is per-resource – more complex syntax required 21
  • 22. SOMA Benefits 1. Incrementally deployable (with incremental benefit) 2. No configuration/usage burden on end users 3. Required changes/configuration are done by site operators 4. Changes are relatively simple to understand and easy to implement 5. Gives server operators the ability to specify which sites can interact with their content 22
  • 23. Thanks!  Carleton Computer Security Laboratory: – http://ccsl.carleton.ca  SOMA Firefox Add-On (and more info): – http://ccsl.carleton.ca/software/soma 23