Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild

被引:0
|
作者
Trampert, Leon [1 ]
Stock, Ben [1 ]
Roth, Sebastian [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
关键词
Web Security; CSP Nonces; CSRF; Security Tokens;
D O I
10.1145/3607199.3607223
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to mitigate the effect of Web attacks, modern browsers support a plethora of different security mechanisms. Mechanisms such as anti-Cross-Site Request Forgery (CSRF) tokens or nonces in a Content Security Policy rely on a random number that must only be used once. Notably, those Web security mechanisms are shipped through HTML tags or HTTP response headers from the server to the client side. To decrease the server load and the traffic burdened on the server infrastructure, many Web applications are served via a Content Delivery Network (CDN), which caches certain responses from the server to deliver them to multiple clients. This, however, affects not only the content but also the settings of the security mechanisms deployed via HTML meta tags or HTTP headers. If those are also cached, their content is fixed, and the security tokens are no longer random for each request. Even if the responses are not cached, operators may re-use tokens, as generating random numbers that are unique for each request introduces additional complexity for preserving the state on the server side. This work sheds light on the re-usage of security tokens in the wild, investigates what caused the static tokens, and elaborates on the security impact of the non-random security tokens.
引用
收藏
页码:714 / 726
页数:13
相关论文
共 43 条
  • [1] Security and trust in open source security tokens
    Schink M.
    Wagner A.
    Unterstein F.
    Heyszl J.
    1600, Ruhr-University of Bochum (2021): : 176 - 201
  • [2] Signaling in the Market for Security Tokens
    Kreppmeier J.
    Laschinger R.
    Journal of Business Economics, 2023, 93 (9) : 1515 - 1552
  • [3] The next generation of USB security tokens
    Card Technol. Today, 2008, 6 (10-11):
  • [4] VAT Goes Virtual: Security Tokens
    Englisch, Joachim
    EC TAX REVIEW, 2022, 31 (05): : 232 - 237
  • [5] Toward available personal security tokens
    Ondrusch, S
    IEEE MICRO, 1996, 16 (03) : 15 - 15
  • [6] THE INTERSECTION OF SPORTS, SECURITY, AND CRYPTO FAN TOKENS
    Marinov, Georgi
    Kuleva, Milena
    STRATEGIES FOR POLICY IN SCIENCE AND EDUCATION-STRATEGII NA OBRAZOVATELNATA I NAUCHNATA POLITIKA, 2023, 31 (05): : 62 - 72
  • [7] On the Usability of Authenticity Checks for Hardware Security Tokens
    Pfeffer, Katharina
    Mai, Alexandra
    Ski, Adrian Dabrow
    Gusenbauer, Matthias
    Schindler, Philipp
    Weippl, Edgar
    Franz, Michael
    Krombholz, Katharina
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 37 - 54
  • [8] Threat modelling for security tokens in web applications
    De Cock, D
    Wouters, K
    Schellekens, D
    Singelee, D
    Preneel, B
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 183 - 193
  • [9] Smartcards - From security tokens to intelligent adjuncts
    Balacheff, B
    Van Wilder, B
    Chan, D
    SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 71 - 84
  • [10] Red Button and Yellow Button: Usable Security for Lost Security Tokens
    Goldberg, Ian
    Jenkinson, Graeme
    Llewellyn-Jones, David
    Stajano, Frank
    SECURITY PROTOCOLS XXIV, 2017, 10368 : 165 - 171