• Hey Guest. Check out your NeoGAF Wrapped 2025 results here!

Homograph attacks - Firefox users take note!

Status
Not open for further replies.

Priz

Member
I was just sent this:
Subject: browser security: homograph attack

sample:

http://www.shmoo.com/idn/

The urls look like www.paypal.com, but view the source and
there's an alternate character being used for the letter "a".

In the far future, we'll have unicode domain names.
Until then, disable it in FireFox/Mozilla:

about:config
networking.enableIDN=FALSE
From the IDN advisory on the page, it looks like the attendees of Shmoocon '05 were made aware of this.

Just passing it along.
 
iapetus said:
It saps your ability to follow links and read simple articles.

OH MY GOD! YOU MIGHT BE INFECTED!


Pfft, that article is not simple. I need MSN-style reporting to simplify things today.

So, basically, homographs + Firefox= bad. Now, I guess I'm screwed. I'm turning in my computer....right after I download this midget porn.
 
I disabled IDNs in about:config in latest Firefox, closed and restarted the browser, and that spoof still works...
 
Marconelly said:
I disabled IDNs in about:config in latest Firefox, closed and restarted the browser, and that spoof still works...

Give it another go, the spoof no longer works on my system.
 
Thanks for the heads up...also, your Guu (of Hale Nochi Guu (sp?) I'm guessing) avatar is cool, it made me lol.
 
Spoofed URL still loads after the config edit in 1.0, although the real URL is visible in the status bar.

Edit: The SpoofStick extension does not work. :(
 
I find it really funny watching a couple of MS drones in mags and conferences trying to proove how dangerous firefox is, while IE probably has a couple of billion security holes more than firefox.
 
Are you guys changing network.enableIDN or networking.enableIDN?

I changed network.enableIDN to FALSE and when I click on the "paypal" link it tells me that it can't be found. Before doing this, the link worked.
 
aoi tsuki said:
Spoofed URL still loads after the config edit in 1.0, although the real URL is visible in the status bar.

Edit: The SpoofStick extension does not work. :(

Maybe I'm just special.

The thing you have to change is network.enableIDN. "Networking" doesn't show up in my list.
 
Marconelly said:
That's what I've changed. Spoof still works. The one naz posted also works.

Maybe I have to restart the computer?
Try it, but it should take effect immediately. Slashdot posters have done the same, as well as clearing the cache. It's unsettling to think that an option like this isn't working correctly.
 
I'm using FireFox 1.0 and the workaround *works* for me.

Are you sure you're clicking on the PayPal links on the example page and not the one in the article? (I made the same mistake at first).
 
TheOMan said:
I'm using FireFox 1.0 and the workaround *works* for me.

Are you sure you're clicking on the PayPal links on the example page and not the one in the article? (I made the same mistake at first).
Funny, i toggled the setting (without leaving the config page) and it works now. i don't know what was happening when i originally posted. i tried everything, short of restarting XP.
 
So this is mainly an issue if you click a link at some "unfriendly" web page?

A rule I use in web browsing is: Going anywhere secure, either type it in yourself or use a bookmark on your browser you know is safe.

Knowing a lot of the scams out there, I don't think there's any way I could convince myself to click a link for somewhere like paypal and then actually enter my login info.
 
Good thing there are easy fixes like this. Some of the phishing spammers are getting so good at spoofing the e-mails. My sister gave up her paypal & ebay info to one (she's running lots of hockey card auctions these days and was worried they were going to really shut down her account) and only after sending it, she called to ask me why they asked for both bits of info.

I showed her how to look at the address. With this, she'd still think it was legit and give away her info AGAIN.
 
Status
Not open for further replies.
Top Bottom