{"id":1770,"date":"2009-09-09T08:46:55","date_gmt":"2009-09-09T07:46:55","guid":{"rendered":"http:\/\/www.itwriting.com\/blog\/1770-o2-router-attack-shows-danger-of-staying-logged-in.html"},"modified":"2009-09-09T08:46:55","modified_gmt":"2009-09-09T07:46:55","slug":"o2-router-attack-shows-danger-of-staying-logged-in","status":"publish","type":"post","link":"https:\/\/www.itwriting.com\/blog\/1770-o2-router-attack-shows-danger-of-staying-logged-in.html","title":{"rendered":"O2 router attack shows danger of staying logged in"},"content":{"rendered":"<p>Concerned about web security? One thing that may prove more valuable than any amount of supposed security software (anti-virus and the like) is the simple good practice of logging out of web sites at the end of each session.<\/p>\n<p>Here\u2019s the reason. Let\u2019s say you are logged into some site \u2013 could be Facebook, or Google, or the <a href=\"http:\/\/www.guardian.co.uk\/technology\/blog\/2009\/sep\/08\/o2-router-remote-hacking-broadband\" target=\"_blank\">admin screen on your router<\/a>, and you\u2019ve left checked the option that says \u201ckeep me logged in\u201d. Then you visit some other site. The vast majority of web pages today run JavaScript code in the background, and these scripts execute on your computer, not on the web server. What if one of those scripts sends a request to a site where you are logged in? The request comes from your computer, so it looks like you to the web site. If you are unlucky, the script will be able to perform any action you could perform, but without your awareness \u2013 such as changing your password, or reading confidential information.<\/p>\n<p>For this hack to work, a couple of things need to have gone wrong:<\/p>\n<p>1. You are running a malicious script. This implies that the site you are visiting has been hacked, or has a vulnerability such as forum software which allows users to post content that might trigger a script. Even a link to an image in a forum post might be sufficient.<\/p>\n<p>2. The site where you are logged in doesn\u2019t make any additional checks on the source of the script. Although it is running on your computer, the HTTP request generally includes referrer data, revealing the URL of the page from which the script came. By checking this value, the site can figure out that there is something wrong. Another idea is to have unpredictable URLs for sensitive data.<\/p>\n<p>Still, you\u2019ll notice that neither of these things are under your control, whereas generally the option to log out of a site is under your control. Even that might not always be true &#8211; a developer could code a site without an option to log out \u2013 but that is unusual.<\/p>\n<p>The O2 attack <a href=\"http:\/\/www.guardian.co.uk\/technology\/blog\/2009\/sep\/08\/o2-router-remote-hacking-broadband\" target=\"_blank\">referenced above<\/a> exploits this flaw to get into your router admin, if you are running an O2-supplied broadband router. It is a huge vulnerability, since if the router is re-configured a wide range of further attacks are possible. One example is DNS poisoning, where familiar URLs might take you to malicious destinations. It could also disable firewall protection and redirect external requests to one of your home or small business PCs \u2013 very nasty.<\/p>\n<p>Here\u2019s a couple of things that will improve security:<\/p>\n<p>1. Don\u2019t use the broadband supplier\u2019s equipment, if it is not entirely under your control. Use your own; turn off universal pnp, change the admin password, don\u2019t stay logged into the admin.<\/p>\n<p>2. Don\u2019t stay logged into any site which matters. Even sites which don\u2019t appear to matter can be a security risk, if they expose passwords or security questions that you use elsewhere, for example. Personally I always log out of Facebook, Google and Twitter, for example, even though sites like these should be aware of the risks and be coded appropriately \u2013 they mostly are, but <a href=\"http:\/\/www.theregister.co.uk\/2008\/05\/23\/facebook_xss_flaw\/\" target=\"_blank\">mistakes<\/a> <a href=\"http:\/\/status.twitter.com\/post\/95332007\/update-on-stalkdaily-com-worm\" target=\"_blank\">happen<\/a>.<\/p>\n<p>Unfortunately many sites encourage you to stay logged in, because it reduces the friction of using the site. Still, there are compromises which work. I notice with <a href=\"http:\/\/www.amazon.co.uk\" target=\"_blank\">Amazon<\/a> for example, that it uses cookies to give you personalized information even when not logged in, but displays password prompts with boring regularity for actions that spend money \u2013 though Amazon also advises you to <a href=\"http:\/\/www.amazon.co.uk\/gp\/help\/customer\/display.html?nodeId=1093784\" target=\"_blank\">log out completely if using a public or shared computer<\/a>. <\/p>\n<div style=\"padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:74d2fb6b-b093-489e-b20c-a2b5597397f4\" class=\"wlWriterEditableSmartContent\">Technorati Tags: <a href=\"http:\/\/technorati.com\/tags\/security\" rel=\"tag\">security<\/a>,<a href=\"http:\/\/technorati.com\/tags\/google\" rel=\"tag\">google<\/a>,<a href=\"http:\/\/technorati.com\/tags\/facebook\" rel=\"tag\">facebook<\/a>,<a href=\"http:\/\/technorati.com\/tags\/o2\" rel=\"tag\">o2<\/a>,<a href=\"http:\/\/technorati.com\/tags\/twitter\" rel=\"tag\">twitter<\/a>,<a href=\"http:\/\/technorati.com\/tags\/xss\" rel=\"tag\">xss<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Concerned about web security? One thing that may prove more valuable than any amount of supposed security software (anti-virus and the like) is the simple good practice of logging out of web sites at the end of each session. Here\u2019s the reason. Let\u2019s say you are logged into some site \u2013 could be Facebook, or &hellip; <a href=\"https:\/\/www.itwriting.com\/blog\/1770-o2-router-attack-shows-danger-of-staying-logged-in.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">O2 router attack shows danger of staying logged in<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,36,75,90,96],"tags":[],"class_list":["post-1770","post","type-post","status-publish","format-standard","hentry","category-facebook","category-google","category-security","category-twitter","category-web-authoring"],"_links":{"self":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/1770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=1770"}],"version-history":[{"count":0,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/1770\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=1770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=1770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=1770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}