|
    Check it Out!    
|
|
RideCamp@endurance.net
Re: RC: The Cookie Leak Security Hole in HTML Email messages
Thanks for the warning and explanation. I do web sites and have received
emails from web developer companies for instruction on how to use
cookies to their best ability for marketing-- now I know what they mean
by that. Any suggestions as to how we can shore up the leaks ourselves?
Bette
stepnout wrote:
>
> Remotely horse-related, even less endurance related except we shop
> online a lot:
>
> Horseshopping? Have cookies enabled on your browser? Getting any
> spam?
> Check this privacy busting bug that comes with email:
>
> http://www.tiac.net/users/smiths/privacy/cookleak.htm
>
> Sally (stepnout@swva.net)
>
> ---------------------------------------------------------------
>
> The Cookie Leak Security Hole in HTML Email messages
>
> ----------------------------------------------------------------------
>
> Richard M. Smith (smiths@tiac.net)
> November 30, 1999
>
> Since the invention of Web browser cookies by Netscape, the claim has
> always been made that they are anonymous and cannot be associated with
> any personal information unless someone provides this information.
>
> In this write-up, I will present a technique in which browser cookies
> can be matched to Email addresses without people's knowledge. The
> technique relies on a security hole that is present in both
> Microsoft's Internet Explorer browser and Netscape's Navigator
> browser. This technique can be used, for example, to allow a banner ad
> company to associate an Email address with a "anonymous" profile that
> has been created for a person as they surf the Web. Once a banner ad
> company has an Email address tied to a profile, they can provide a
> service to advertisers of customized ads in "junk" Email message.
> These ads can be based on profiles previously created from Web site
> visits. In addition, banner ad companies can offer the service of
> sending out "junk" Email messages to people who visit a particular Web
> site. This last service makes Web surfing much less private.
>
> First off, the syncing of an cookie to an Email address must be done
> in an Email message. It addition, it requires the message to be
> formatted as an HTML message and therefore the person receiving the
> message must be using an HTML-enabled Email reader. Most of the
> standard Email readers in use today, such as Outlook, Outlook Express,
> Netscape Messenger, and Eudora are HTML-enabled. Also, Web-based Email
> systems such as Hotmail and Yahoo Mail are HTML-enabled.
>
> The basic technique is for an HTML message to include a graphics in an
> HTML Email message that is loaded from a Web server belonging to a
> banner ad company. This graphics is specified using a standard HTML
> IMG tag. For example, this IMG tag will fetch a graphics named
> "SYNC.GIF" from a Web server belonging to MyBannerAds.com (a
> fictitious company):
>
> <img src="http://www.mybannerads.com/sync.gif>
>
> The tag can appear anywhere on the page, and the graphics file,
> SYNC.GIF, will be fetched and displayed when the Email address is
> read.
>
> In addition, if cookies are enabled in the Web browser and a cookie is
> present on the computer for mybannerads.com, the cookie will be sent
> to the www.mybannerads.com server with the HTTP GET request for the
> SYNC.GIF file. This is a bit surprising because most people assume
> that only Web pages can use cookies. However, because Web browsers are
> used to display HTML Email messages, cookies are also sent when Email
> messages are read. This represents a serious security hole in my
> opinion.
>
> So we have the graphics sending in the cookie to mybannerads.com, but
> how do we the Email address? The answer is actually very simple. The
> query string of the URL for the SYNC.GIF file can contain the Email
> address as a parameter: For example:
>
> <img src="http://www.mybannerads.com/sync.gif?email=john@doe.com>
>
> The key thing here is that the company sending out the Email message
> knows your Email address. They have to in order to send out the
> message. In addition, it is easy for them to create custom mail
> messages for each person that they send mail to.
>
> The final HTTP GET request then to fetch SYNC.GIF will look something
> like the following in Outlook:
>
> GET /sync.gif?email=john@doe.com HTTP/1.1
> Accept: */*
> Accept-Language: en-us
> Accept-Encoding: gzip, deflate
> User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt)
> Host: www.mybannerads.com
> Connection: Keep-Alive
> Cookie: id=943977050
>
> In Netscape Messenger, the GET request looks like:
>
> GET /sync.gif?email=john@doe.com HTTP/1.0
> Connection: Keep-Alive
> User-Agent: Mozilla/4.7 [en] (Win98; I)
> Host: www.mybannerads.com
> Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png
> Accept-Encoding: gzip
> Accept-Language: en
> Accept-Charset: iso-8859-1,*,utf-8
> Cookie: id=c643640a
>
> Both the Email address and cookie value is included in the Outlook and
> Messenger GET requests.
>
> When the GET request is processed by the MyBannerAds server. It first
> extracts the customer id number from the cookie and looks it up its
> database of "anonymous" profiles of Web surfers. Once it has located
> the profile, it then extracts the Email address from the URL query
> string, turning a once "anonymous" profile into an "identified"
> profile.
>
> So where does MyBannerAds get the Email addresses in first place to
> send out a message which includes the SYNC.GIF file? The answer is
> quite simple, they "rent" the Email addresses. Or more specifically,
> the rent space in junk Email messages that are already being sent out.
> The IMG tags typically take less than 100 bytes, so they can easily be
> embedded in messages that are part of any Email ad campaign that is
> using HTML Email messages.
>
> Another interesting question is what do users see on the screen for
> the SYNC.GIF file. The answer is nothing. The GIF file can be a 1-by-1
> image that is completely invisible. The technique of including
> invisible images in junk Email messages is already quite common today
> and they are used for the purpose of checking to see if a junk Email
> has been read or not.
>
> I've nicknamed these 1-by-1 GIFs "Web Bugs". They are also known as
> "clear GIFs" and "invisible pixels". More information about Web Bugs
> can be found at:
>
> http://www.tiac.net/users/smiths/privacy/wbfaq.htm
>
> Here is some examples of Web Bugs, that I've received in junk Email
> messages over the last few months:
>
> <img src="http://www.m0.net/m/logopen02.asp?
> vid=3&catid=370153037&email=SMITHS%40tiac.net" alt=" ">
>
> <!-- IBOM Tag -->
> <img SRC="http://bcaudit01.lodo.exactis.com/ibom.cgi?eid=677528&i=152565" WIDTH=1 HEIGHT=1>
> <!-- IBOM Tag End --->
>
> <img src="http://rsvp.rsvp0.net/servlet/footer/opened?
> &05zDAWEktlFioHksHiDJhtEa">
> (Email address is encrypted)
>
> You will notice that these Web Bugs look very similar to the IMG tag
> for the SYNC.GIF file used for syncing a cookie to an Email address.
> The only difference being that the Web Bugs being used today go back
> to the Email servicing company that sent out the Email message and not
> to a banner ad company. This means that the Email servicing companies
> already have the technology in place to send out GIF images to sync up
> cookies and Email addresses. The only change required is to generate a
> different server name in the Web Bug URLs.
>
> To sync up as many profiles as possible, a banner ad company would
> have to rent out space on many different mailing list. Many millions
> of messages would have to sent out for them to learn the Email
> addresses of a useful percentage of their profile database. However,
> given that the overhead of the GIF file tags is very low, it wouldn't
> be too difficult to rent space in many different Email lists.
>
> This technique also becomes extremely easy if a banner ad company is
> sending out the Email messages themselves because they've entered into
> the Email servicing business or have acquired a servicing company.
>
> In summary, the key point to look out for here is the technical
> progress in the banner ad business. If banner ad companies enter the
> Email servicing business they'll be putting themselves in a very good
> position to also know the identity of people who are surfing to Web
> sites. Using the technique I've outlined in this write-up, the Email
> servicing side of the business can easily provide Email addresses to
> the banner ad side of the business.
>
> This "progress" represents yet another step in the erosion of privacy
> on the Internet. The best solution to this problem, I believe, is a
> technical one. That is, Microsoft and Netscape should fix the security
> holes in their respective Web browser products that allow cookies to
> be sent out from HTML Email messages.
>
> References
>
> * How anonymous is the Web? USA Today, Dec. 2, 1999
> * The Web Bug FAQ
--
Bette Lamore
Whispering Oaks Arabians, Home of TLA Halynov
http://www.stormnet.com/~woa
I've learned that life is like a roll of toilet paper, the closer it
gets to the end, the faster it goes. Smell the roses!
|
    Check it Out!    
|
|
Home
Events
Groups
Rider Directory
Market
RideCamp
Stuff
Back to TOC