WebApp Sec mailing list archives

RE: Authenticating a web server


From: "Imperva Application Defense Center" <adc () imperva com>
Date: Sun, 28 Mar 2004 16:54:23 +0200

The Verisign Logo can be faked as much wanted. It is just an indication
for the real security practice taken in the regard of the Web Server's
authenticity.

Assuming you are connecting to the serverin SSL, you are supposed to
receive a certificate from the server. This certificate holds the
server's identify, and must match the server's FQDN. This certificate,
should be signed by someone you trust (e.g. VeriSign). This signature
can be verified against the certificate (containing the public key) of
VeriSign.

All this, assumes of course, that you DO trust VeriSign, and their
manual verification procedures (such as phone calls, personal
identification, etc.), and that you were able to get VeriSign's
certificate in a secure manner (no man in the middle possible attack).


Personally I believe that relying on headers is very insecure, as an
attacker that wishes to fake your server, will have an easy time forging
the headers as well.

Sincerely,

--
Ofer Maor
Application Defense Center Manager
Imperva
http://www.imperva.com/adc


-----Original Message-----
From: Amit Sharma [mailto:amit.sharma () linuxwaves com] 
Sent: Sunday, March 28, 2004 4:05 PM
To: webappsec () securityfocus com
Subject: Authenticating a web server




Hi list,



Was wondering what are the various ways for authenticating a web server.
By this, I mean, how do I know if I am talking to the rite server and
not any phony website?



Option # 1

To my understanding, we can verifying the identity of the server if it
has a a certificate seal on its website. Something similar to what is
issued by verisign. But then, to me, it doesn't look like a full proof
solution since the security logo that verisign provides and provides
links to, can also be made phony. Do verisign people patrol for phony
logos of their security seal?





Option # 2

How about storing the header ( HTTP/HTTPS ) information of the web
server such as the web server version and other specific details which
do not change quite often for authenticating purpose. This can be used
to cross check with the header info. of a phony website claiming to be
the original one. Typically, attackers building phony websites just
duplicate the look and feel of the original website without actually
bothering about modifying the header information as well. 



am sure there must be better ways for authenticating a web server. Would
like to have some expert comments from Web Application Security gurus.



Gracias,

Amit



---

Whoops! There are still thousands of nuclear weapons in the world




Current thread: