> Research Library > Symantec Corporation > Spoofing Server-Server Communication: How You Can Prevent It
 

Spoofing Server-Server Communication: How You Can Prevent It

White Paper Published By: Symantec Corporation
Symantec Corporation
Published:  Oct 03, 2013
Type:  White Paper
Length:  14 pages

Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.

One of the core problems described by Marlinspike is the ability to embed null characters in the common name field of a certificate, designating a domain name. This can be used to trick software, web browsers for example, into recognizing a domain name different from the complete field name. The result is that software, and users, are misled as to the actual domain with which they are communicating. One of the core problems described by Marlinspike is the ability to embed null characters in the common name field of a certificate, designating a domain name. This can be used to trick software, web browsers for example, into recognizing a domain name different from the complete field name. The result is that software, and users, are misled as to the actual domain with which they are communicating.



Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee