Firefox extension protects against man-in-the-middle attacks
New software helps guide users to safe Web sites and away from malicious sites, without being confused by an error message Firefox displays for many Web sites that don't pay third-parties to verify their security.
Researchers at Carnegie Mellon University have released an extension for Firefox 3 that can protect wireless network users from so-called "man-in-the-middle" attacks.
The software, dubbed "Perspectives," is available for download for free.
Perspectives also protects against, which translates Web addresses into numerical IP addresses, said Dave Andersen, a computer science professor at Carnegie Mellon who was an adviser on the Perspectives project.
In an attack on the DNS system, someone typing in a legitimate Web address could be redirected to a malicious site without knowing it. Perspectives would pop up a warning to the Web surfer that the site they are going to is suspicious.
In general, Perspectives is designed to guide Web surfers away from malicious sites. It also is designed to assure surfers when they visit sites that are safe but which Firefox warns about because the sites are not paying a third-party Certificate Authority, such as VeriSign, to authenticate the sites and instead are using "self-signed" digital certificates, also known as keys.
Signing up with a Certificate Authority can be expensive and time-consuming, so some sites prefer to do it themselves, Andersen said. If they do, Firefox penalizes them by displaying an error message that says the browser is unable to verify that the site can be trusted.
The messages leave Web surfers confused and they may either avoid a legitimately safe site or get used to automatically accepting certificates with the warning and inadvertently trust a malicious site at some point.
"The fear is that the Firefox policy will force some sites to use Certificate Authorities but will make others not use any security at all," Andersen said.
The Perspectives software queries servers around the Internet that Andersen has set up as notary-type nodes and asks them to verify the certificate they see for the Web site sought and to verify what certificate they have historically seen for that site. If the computers are in agreement on those questions, the surfer is sent directly to the site. If there is disagreement on those questions, the browser displays a warning to the Web surfer that the site is suspicious.
"The average (Internet) user probably wouldn't see one of these attacks in a given year," Andersen said when asked how severe the problem is. "But, an unlucky user in an airport or some convention where there happened to be a bad guy (lurking on the network) would definitely be vulnerable."