US-CERT Cyber Security Tip ST05-016 -- Understanding Internationalized Domain Names

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

			Cyber Security Tip ST05-016
		Understanding Internationalized Domain Names

   You may have been exposed to internationalized domain names (IDNs)
   without realizing it. While they typically do not affect your browsing
   activity, IDNs may give attackers an opportunity to redirect you to a
   malicious web page.

What are internationalized domain names?

   To  decrease  the amount of confusion surrounding different languages,
   there is a standard for domain names within web browsers. Domain names
   are included in the URL (or web address) of web site. This standard is
   based  on  the Roman alphabet (which is used by the English language),
   and  computers convert the various letters into numerical equivalents.
   This  code  is  known as ASCII (American Standard Code for Information
   Interchange).  However, other languages include characters that do not
   translate  into this code, which is why internationalized domain names
   were introduced.

   To  compensate for languages that incorporate special characters (such
   as  Spanish,  French  or  German)  or  rely  completely  on  character
   representation  (such  as Asian or Arabic languages), a new system had
   to  be  developed.  In this new system, the base URL (which is usually
   the  address  for  the  home  page)  is dissected and converted into a
   format  that  is  compatible  with  ASCII.  The  resulting  URL (which
   contains  the  string  "xn--"  as well as a combination of letters and
   numbers)  will  appear in your browser's status bar. In newer versions
   of many browsers, it will also appear in the address bar.

What are some security concerns?

   Attackers  may  be  able to take advantage of internationalized domain
   names  to  initiate  phishing attacks (see Avoiding Social Engineering
   and  Phishing Attacks for more information). Because there are certain
   characters  that  may  appear  to be the same but have different ASCII
   codes  (for  example, the Cyrillic "a" and the Latin "a"), an attacker
   may  be  able  to  "spoof"  a  web  page  URL.  Instead  of going to a
   legitimate  site, you may be directed to a malicious site, which could
   look  identical  to  the real one. If you submit personal or financial
   information  while  on  the malicious site, the attacker could collect
   that information and then use and/or sell it.

How can you protect yourself?

     * Type  a  URL  instead  of  following  a link - Typing a URL into a
       browser  rather  than  clicking  a link within a web page or email
       message  will  minimize  your  risk.  By  doing this, you are more
       likely  to  visit the legitimate site rather than a malicious site
       that substitutes similar-looking characters.
     * Keep  your browser up to date - Older versions of browsers made it
       easier  for  attackers  to  spoof  URLs,  but  most newer browsers
       incorporate  certain  protections.  Instead  of displaying the URL
       that  you  "think" you are visiting, most browsers now display the
       converted URL with the "xn--" string.
     * Check  your  browser's  status bar - If you move your mouse over a
       link  on  a  web page, the status bar of your browser will usually
       display  the  URL  that the link references. If you see a URL that
       has  an unexpected domain name (such as one with the "xn--" string
       mentioned above), you have likely encountered an internationalized
       domain name. If you were not expecting an internationalized domain
       name or know that the legitimate site should not need one, you may
       want to reconsider visiting the site. Browsers such as Mozilla and
       Firefox include an option in their security settings about whether
       to  allow the status bar text to be modified. To prevent attackers
       from taking advantage of JavaScript to make it appear that you are
       on a legitimate site, you may want to make sure this option is not
       enabled.
     _________________________________________________________________

     Authors: Mindi McDowell, Will Dormann, Jason McCormick
     _________________________________________________________________

     Produced 2005 by US-CERT, a government organization.
 
     Note: This tip was previously published and is being re-distributed 
     to increase awareness. 
   
     Terms of use
  
     <http://www.us-cert.gov/legal.html>
   
     This document can also be found at
  
     <http://www.us-cert.gov/cas/tips/ST05-016.html>
  
 
     For instructions on subscribing to or unsubscribing from this
     mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
     
     
     

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBSJoNF3IHljM+H4irAQIvswf/dPOOUL6aphVQIWtLiEHpxTMVWd4e8wyJ
7kYVbjrR3vYtgQKLYaYHOZ309YdykL9ONiRGx1RuVPuvi+QX2r8btK8qkfSTzoqs
4c6GvcL1GxNKFYW7krld6QirJ2zxAr7pp7Hh8Ima/VdojTUT9a+fdBg/sNsRdjSK
DgROd8GLgvucPOO+D0BUlQSLl8i/86Phsi+lGypZ3ZtZ6oXVvaa0M0dUhdyh5lVP
47i4q/dv5hMAUQvTZH2y4E4XKMVjEHXBV0xo3WVL8FQYY4pWNijjaIDvP3E5wwwo
oVUWmsf8fYiVUoLXtTKu94wQndCinvtg5pLZ5TxODuKYvDNULYOrEw==
=CccZ
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux