Settings

Theme

Man-in-the-middle attack on Mobile Facebook possible due to lack of HSTS header

gist.github.com

39 points by nelse 12 years ago · 7 comments

Reader

pmh 12 years ago

It's important to note that even if the HSTS header was present on the mobile site, the exploit would still be possible since many mobile browsers do not support HSTS[1].

[1]http://michael-coates.blogspot.com/2013/09/security-capabili...

ancarda 12 years ago

>We are slowly rolling out HSTS across the entirety of Facebook's infrastructure. The fact that m.facebook.com does not send this header currently is by design.

Why not? For browsers that don't support HSTS, the header will be ignored. For those that do support it, the end-user gets better security. Is there a feasible reason for not enabling it everywhere? My guess would be so Facebook can disable SSL for certain browsers?

matt_heimer 12 years ago

I don't get this header. Wouldn't the man-in-the-middle that is using something like sslstrip also be able to strip out any header they choose to?

  • daeken 12 years ago

    Yes, this is the case, but only in the first request. As soon as an HTTP user agent gets such an HSTS header, it will only communicate via HTTPS until max-age expires.

    • davis_m 12 years ago

      Only if the browser supports HSTS. Many do not, especially mobile browsers.

elwell 12 years ago

Useful post simply for bringing attention to HSTS; of which, I've never heard.

Sami_Lehtinen 12 years ago

I think marking cookies secure only is more important than hsts, but if both lack, then it's quite bad thing.

Btw. There are many sites like this out there. So this isn't news actually. There are even more sites which lack https completely.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection