<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Google Data &#187; Chris Evans</title>
	<atom:link href="/author/chris-evans/feed/" rel="self" type="application/rss+xml" />
	<link>https://googledata.org</link>
	<description>Everything Google: News, Products, Services, Content, Culture</description>
	<lastBuildDate>Tue, 25 Oct 2011 23:56:45 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.2.1</generator>
		<item>
		<title>An update on attempted man-in-the-middle attacks</title>
		<link>https://googledata.org/google-online-security/an-update-on-attempted-man-in-the-middle-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=an-update-on-attempted-man-in-the-middle-attacks</link>
		<comments>https://googledata.org/google-online-security/an-update-on-attempted-man-in-the-middle-attacks/#comments</comments>
		<pubDate>Tue, 30 Aug 2011 03:59:00 +0000</pubDate>
		<dc:creator>Chris Evans</dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=9d5153fbab7044a5e77ddc56d3c2fb6e</guid>
		<description><![CDATA[Posted by Heather Adkins, Information Security Manager

Today we received reports of attempted SSL man-in-the-middle (MITM) attacks against Google users, whereby someone tried to get between them and encrypted Google services. The people affected were ...]]></description>
			<content:encoded><![CDATA[<span class="byline-author">Posted by Heather Adkins, Information Security Manager</span>
<br />
<br />Today we received reports of attempted SSL man-in-the-middle (MITM) attacks against Google users, whereby someone tried to get between them and encrypted Google services. The people affected were primarily located in Iran. The attacker used a fraudulent SSL certificate issued by DigiNotar, a root certificate authority that should not issue certificates for Google (and has since revoked it).
<br />
<br />Google Chrome users were protected from this attack because Chrome was able to <a href="http://blog.chromium.org/2011/06/new-chromium-security-features-june.html">detect</a> the fraudulent certificate.
<br />
<br />To further protect the safety and privacy of our users, we plan to disable the DigiNotar certificate authority in Chrome while investigations continue. Mozilla also <a href="http://blog.mozilla.com/security/2011/08/29/fraudulent-google-com-certificate/">moved quickly</a> to protect its users. This means that Chrome and Firefox users will receive alerts if they try to visit websites that use DigiNotar certificates. Microsoft also has <a href="http://blogs.technet.com/b/msrc/archive/2011/08/29/microsoft-releases-security-advisory-2607712.aspx">taken prompt action</a>.
<br />
<br />To help deter unwanted surveillance, we recommend that users, especially those in Iran, keep their web browsers and operating systems up to date and pay attention to web browser security warnings.
<br />
<br /><i><b>Update</b> Aug 30:</i> Added information about Microsoft's response.
<br />
<br /><i><b>Update</b> Sept 3:</i> Our top priority is to protect the privacy and security of our users. Based on the findings and decision of the Dutch government, as well as conversations with other browser makers, we have decided to reject all of the Certificate Authorities operated by DigiNotar. We encourage DigiNotar to provide a complete analysis of the situation.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-386783284323132943?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/an-update-on-attempted-man-in-the-middle-attacks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Trying to end mixed scripting vulnerabilities</title>
		<link>https://googledata.org/uncategorized/trying-to-end-mixed-scripting-vulnerabilities/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=trying-to-end-mixed-scripting-vulnerabilities</link>
		<comments>https://googledata.org/uncategorized/trying-to-end-mixed-scripting-vulnerabilities/#comments</comments>
		<pubDate>Thu, 16 Jun 2011 18:37:00 +0000</pubDate>
		<dc:creator>Chris Evans</dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=987a0330048c18858459b4a88294cb99</guid>
		<description><![CDATA[Posted by Chris Evans and Tom Sepez, Google Chrome Security TeamA “mixed scripting” vulnerability is caused when a page served over HTTPS loads a script, CSS, or plug-in resource over HTTP. A man-in-the-middle attacker (such as someone on the same ...]]></description>
			<content:encoded><![CDATA[<span class="byline-author">Posted by Chris Evans and Tom Sepez, Google Chrome Security Team</span><br /><br />A “mixed sc<span >ripting” vulnerability is caused when a page served over HTTPS loads a script, CSS, or plug-in resource over HTTP. A man-in-the-middle attacker (such as someone on the same wireless network) can typically intercept the HTTP resource</span> load and gain full access to the website loading the resource. It’s often as bad as if the web page hadn’t used HTTPS at all.<br /><br />A less severe but similar problem -- let’s call it a “mixed display” vulnerability -- is caused when a page served over HTTPS loads an image, iFrame, or font over HTTP. A man-in-the-middle attacker can again intercept the HTTP resource load but normally can only affect the appearance of the page.<br /><br />Browsers have long used different indicators, modal dialogs, block options or even click-throughs to indicate these conditions to users. If a page on your website has a mixed scripting issue, Chromium will currently indicate it like this in the URL bar:<br /><br /><a href="http://3.bp.blogspot.com/-kxHM-rEzNaU/TfqIqJmearI/AAAAAAAAIJg/01SwJ_T_PqQ/s1600/https1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="82" src="http://3.bp.blogspot.com/-kxHM-rEzNaU/TfqIqJmearI/AAAAAAAAIJg/01SwJ_T_PqQ/s400/https1.png" style="cursor: move;" width="243" /></a><br /><br />And for a mixed display issue:<br /><br /><a href="http://4.bp.blogspot.com/-k-oSX8-CxmM/TfqIpwNsC5I/AAAAAAAAIJY/avmMj1u2FXY/s1600/https2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="82" src="http://4.bp.blogspot.com/-k-oSX8-CxmM/TfqIpwNsC5I/AAAAAAAAIJY/avmMj1u2FXY/s400/https2.png" width="243" /></a><br /><br />If any of the HTTPS pages on your website show the cross-out red https, there are good reasons to investigate promptly:<br /><ul><li>Your website won’t work as well in other modern browsers (such as IE9 or FF4) due to click-throughs and ugly modal dialogs.</li><li>You may have a security vulnerability that could compromise the entire HTTPS connection.</li></ul>As of the first Chromium 14 canary release (14.0.785.0), we are trialing blocking mixed scripting conditions by default. We’ll be carefully listening to feedback; please leave it on <a href="https://code.google.com/p/chromium/issues/detail?id=81637">this Chromium bug</a>.<br /><br />We also added an infobar that shows when a script is being blocked:<br /><br /><div style="text-align: center;"><a href="http://3.bp.blogspot.com/-DO9bA_NOFjQ/TfqIpU7Zb8I/AAAAAAAAIJI/ePLB8p3algc/s1600/blocked+%25281%2529.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-DO9bA_NOFjQ/TfqIpU7Zb8I/AAAAAAAAIJI/ePLB8p3algc/blocked+%25281%2529.png" width="500" /></a></div><br />As a user, you can choose to reload the website without the block applied. Ideally, in the longer term, the infobar will not have the option for the user to bypass it. Our experience shows that some subset of users will attempt to “click through” even the scariest of warnings -- despite the hazards that can follow.<br /><br /><b>Tools that can help website owners</b><br />If Chromium’s UI shows any mixed content issues on your site, you can try to use a couple of our developer tools to locate the problem. A useful message is typically logged to the JavaScript console (Menu -&gt; Tools -&gt; JavaScript Console):<br /><br /><div style="text-align: center;"><a href="http://1.bp.blogspot.com/-YxIUhcyEcJE/TfqIpr7-1uI/AAAAAAAAIJQ/pfFpAqN1PdU/s1600/mixedscriptconsole.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-YxIUhcyEcJE/TfqIpr7-1uI/AAAAAAAAIJQ/pfFpAqN1PdU/mixedscriptconsole.png" width="500" /></a></div><br />You can also reload the page with the “Network” tab active and look for requests that were issued over the http:// protocol. It’s worth noting that the entire origin is poisoned when mixed scripting occurs in it, so you’ll want to look at the console for all tabs that reference the indicated origin. To clear the error, all tabs that reference the poisoned origin need to be closed. For particularly tough cases where it’s not clear how the origin became poisoned, you can also <a href="http://www.chromium.org/for-testers/enable-logging">enable debugging to the command-line console</a> to see the relevant warning message.<br /><br />The latest Chromium 13 dev channel build (13.0.782.10) has a command line flag: <b>--no-running-insecure-content</b>. We recommend that website owners and advanced users run with this flag, so we can all help mop up errant sites. (We also have the flag <b>--no-displaying-insecure-content</b> for the less serious class of mixed content issues; there are no plans to block this by default in Chromium 14).<br /><br />The Chromium 14 release will come with an inverse flag: --allow-running-insecure-content, as a convenience for users and admins who have internal applications without immediate fixes for these errors.<br /><br />Thanks for helping us push website security forward as a community. Until this class of bug is stamped out, Chromium has your back.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-196134317956426840?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/trying-to-end-mixed-scripting-vulnerabilities/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using apc (User agent is rejected)
Database Caching 1/15 queries in 0.008 seconds using apc
Object Caching 398/427 objects using apc

Served from: googledata.org @ 2011-10-25 20:51:46 -->