This Week in HTML 5 – Episode 7
Welcome back to "This Week in HTML 5," where I'll try to summarize the major activity in the ongoing standards process in the WHATWG and W3C HTML Working Group.
Work continued this week on Web Forms 2, but I'm going to hold off on that until next week. And in case you missed it, Ian Hickson gave a tech talk on HTML 5, including live demos of some features recently implemented in nightly browser builds.
The big news this week is the disclosure of a vulnerability that researchers have dubbed "clickjacking." To understand it, start with Giorgio Maone's post, Clickjacking and NoScript. Giorgio is the author of the popular NoScript extension for Firefox. In its default configuration, NoScript protects against this vulnerability on most sites in most situations; you can configure it to defeat the attack entirely, but only at the cost of usability and functionality.
Of course, most web users do not run Firefox, and fewer still run NoScript, so web developers still need to be aware of it. Michal Zalewski's post, Dealing with UI redress vulnerabilities inherent to the current web, addresses some possible workarounds:
window.top != windowto inhibit rendering, or override
- Requiring non-trivial reauthentication (captcha, password reentry) on all UI actions with any potential for abuse. Although this is acceptable for certain critical operations, doing so every time a person adds Bob as a friend on a social networking site, or deletes a single mail in a webmail system, is very impractical.
Worried yet? Now let's turn to the question of what browser vendors can do to mitigate the vulnerability. Michal offers several proposals. It is important to realize that none of these proposals have been implemented yet, so don't go rushing off to your text editor and expecting them to do something useful.
- Create a HTTP-level (or HTTP-EQUIV) mechanism along the lines of "X-I-Do-Not-Want-To-Be-Framed-Across-Domains: yes" that permits a web page to inhibit frame rendering in potentially dangerous situations.
- Add an on-by-default mechanism that prevents UI actions to be taken when a document tries to obstruct portions of a non-same-origin frame. By carefully designing the mechanism, we can prevent legitimate uses (such as dynamic menus that overlap with advertisements, gadgets, etc) from being affected, yet achieve a high reliability in stopping attacks.
- Enforce a click-to-work mechanism (resembling the Eolas patent workaround) for all cross-domain IFRAMEs.
- Rework everything we know about HTML / browser security models to make it possible for domains and pages to specify very specific opt-in / opt-out policies for all types of linking, referencing, such that countering UI redress attacks would be just one of the cases controlled by this mechanism.
To this list, Colin Jackson added two more suggestions:
- New cookie attribute: The "httpOnly" cookie flag allows sites to put restrictions on how a cookie can be accessed. We could allow a new flag to be specified in the Set-Cookie header that is designed to prevent CSRF and "UI redress" attacks. If a cookie is set with a "sameOrigin" flag, we could prevent that cookie from being sent on HTTP requests that are initiated by other origins, or were made by frames with ancestors of other origins. In a CSRF or "UI redress" attack scenario, it will appear as though the user is not logged in, and thus the HTTP request will be unable to affect the user's account.
- New HTTP request header: Browser vendors seem to be moving away from "same origin restrictions" towards "verifiable origin labels" that let the site decide whether two security origins trust each other. ... [I]nstead of making it an "X-I-Do-Not-Want-To-Be-Framed-Across-Domains: yes" HTTP response header, make it an "X-Ancestor-Frame-Origin: http://www.evil.com" HTTP request header. This header could be a list of all the origins that are ancestors of the frame that triggered the request. If the site decides it does not like the ancestor frame origin it could reject the request. This could be added as a property of MessageEvent as well to detect client-side-only UI redress attacks.
This last approach moves us down a slippery slope towards site security policies for IFRAMEs and embedded content, similar to the Flash security model that allows trusted sites to access cross-domain resources. In practice, Flash crossdomain.xml files have a number of problems, and such an approach would still only cover a fraction of the possible use cases.
You can read the full thread for all the gory details and back-and-forth among browser vendors (Maciej Stachowiak works on WebKit, Robert O'Callahan works on Firefox) and other interested parties. As Maciej notes, user experience may suffer: "[Under proposal #3] iGoogle widgets would become disabled if scrolled partially off the top of the page under your proposal. And even if scrolled back into view, would remain disabled for a second. With possibly a jarring visual effect, or alternately, no visual indication that they are disabled. Hard to decide which is worse." As Rob notes, any solution will also need to deal with IFRAMEs styled with opacity:0, related attacks using some little-known (but widely supported) capabilities of SVG, and possibly other vectors that the world collectively hasn't figured out yet. If you're getting a mental image of the game "Whack-a-Mole," you're not alone.
addons.mozilla.org download page for NoScript in an IFRAME on his own page on
noscript.net, sets the IFRAME to "opacity:0" (an attack vector that Robert O'Callahan specifically warned about), scrolls the embedded
addons.mozilla.org page to the top corner of its "Add to Firefox" button, and sets the z-index of the IFRAME to 100. Thus, the IFRAME is floating (due to "z-index:100") invisibly (due to "opacity:0") over Giorgio's own "Install Now" button (due to the positioning of the IFRAME element itself). When you think you're clicking the button on
noscript.net you are actually clicking the button on
addons.mozilla.org. What's the difference? By default, Firefox treats
addons.mozilla.org as a trusted download site, so it immediately pops up the extension installation dialog instead of blocking the installation with an infobar saying "Firefox prevented this site (noscript.net) from installing software on your computer." From a user experience standpoint, this is great -- one less click to download and install an extension. From a security standpoint, this is incredibly scary -- the end user has no idea they're interacting with a third-party site.
Ian Hickson, the editor of HTML 5, weighed in with his opinion:
I would like feedback from browser vendors on this topic, ideally in the form of experimental implementations. Personally I think the idea of disabling the contents of a cross-origin iframe that has been partially obscured or rendered partially off-screen is the best idea, but whether we can adopt it depends somewhat on whether browser vendors are willing to adopt it and implement it. It requires no standards changes to implement.
Tune in next week for another exciting episode of "This Week in HTML 5."
Thanks for explaining how the install button trick works, I couldn’t find better words 🙂
Would you mind to fix the NoScript link above (it’s relative rather than absolute and goes 404)?
[…] Pilgrim, in his latest episode on This Week in HTML 5, got into an interesting topic indeed: clickjacking. The big news this week is the disclosure of a […]
@Giorgio: fixed, thanks.
Is anybody even sure that the term “clickjacking” as used by Mr. Hansen and Mr. Grossman refers to the same thing as the UI Redress vulnerability?
Mr. Maone has certainly done an excellent bit of deduction from available information. However, I wonder if it might be prudent to wait to propose solutions to “clickjacking” until the original researchers tell us exactly what “clickjacking” is. UI Redress may only be part of it.
Of course, that’s not to say UI Redress isn’t a legitimate concern on its own, and I appreciate your efforts to find a solution to it.
[…] The WHATWG Blog Please leave your sense of logic at the door, thanks! « This Week in HTML 5 – Episode 7 […]
[…] up on last week’s article on clickjacking, the security researcher who discovered (and named) it has posted details of his discovery. Short […]
I use Firefox as my default browser and was warming to Chrome until I found out about the security vulnerabilities. As an “On the outside” computer user, I am sorry that I do not have any more good ideas than the things that follow. I hope that this little bit will help even a little bit.
I am using a Pavilion xf145 with XP Home and I have installed SP2.
My Windows firewall is disabled and I use Zone Alarm Free, AVG (free) and Ad-Aware Anniversary Edition (free.)
Some people drive vehicles with manual transmissions and all the gauges, but most folks drive a vehicle with “Check Engine” light. I think that the people that have found out about the problem and made their way to your blog care about the way their clicks are handled, and I for one do not mind using NoScript to block stuff. The way that it works is really manual and requires a lot of time to filter the stuff that you are unfamiliar with. If NoScript could be easier to work with, like say Zone Alarm, that could be a possible answer to the problem.
If this was a waste of space, I apologize for that and you can delete it. If it helped I am happy to be of service.
[…] the subject of clickjacking, Microsoft announces IE8 Security Part VII: ClickJacking Defenses, which relies on web authors to […]
[…] interested in ClickJacking solutions, I’d recommend reading Mark Pilgrim’s summary of recent ClickJacking discussion in the HTML 5 working group and joining in the […]