Secure Public Instant Messaging (IM): A Survey Mohammad Mannan Paul C. Van Oorschot Digital Security Group School of Computer Science Carleton University, Ottawa, Canada.

Download Report

Transcript Secure Public Instant Messaging (IM): A Survey Mohammad Mannan Paul C. Van Oorschot Digital Security Group School of Computer Science Carleton University, Ottawa, Canada.

Secure Public Instant Messaging
(IM): A Survey
Mohammad Mannan
Paul C. Van Oorschot
Digital Security Group
School of Computer Science
Carleton University, Ottawa, Canada
What’s This Talk About?


Do we need secure IM?
Do the current methods provide enough
security for IM?
Organization






Scope and background
What’s at stake?
Reasons why IM is insecure
Existing IM security mechanisms
Shortcomings
Concluding remarks
Scope


PC-to-PC (one-to-one) text messaging
Popular public and business IM




AOL, Yahoo!, and MSN Messenger, ICQ
Yahoo! Business Messenger, Reuters Messaging
third party clients (Trillian, IMSecure)
Out of scope



Short Messaging System(SMS)
Internet Relay Chat (IRC)
chat room/group chat
Background

IM is mainly used for –



exchanging text messages
tracking availability of a list of users
Recent statistics

Pew report 2004 –




42% Internet users use IM in the U.S.
growth rate of IM population: 29% (since 2000)
70% Internet users report using email more than IM
Ferris Report (business IM users)


10 million in 2002
182 million in 2007
IM Communications Model
IM Server
Client 1



Client 2
Client-server: presence, contact list and availability
management, message relay between users
Client-client: audio/video chat, file transfer
Authentication: password-based, sometimes use SSL
(Secure Socket Layer)
What’s at Stake?



Conversations (privacy and information
leakage)
Propagation vector for Internet worms,
viruses and Trojans
SPIM (IM spam) – Unsolicited commercial IMs

Radicati Group projections –




1.2 billion SPIMs in 2004 (5% of total IMs)
400 million in 2003
34.8 billion spam email messages in 2004
Compromised systems
Reasons why IM is insecure

“Insecure” connection




impersonation
replay
Sharing IM features with other applications
Exploitable URI (Uniform Resource Identifiers)
handlers aim, ymsgr

example: aim://addbuddy?mybuddy

attacks



buffer overflow
scripting attacks
Deceitful hyperlinks
Existing IM Security Mechanisms(1)

Built-in methods






launch anti-virus
explicit consent for add contact, file transfer,
presence info (not cryptographically protected)
new version and critical updates notification
prevents automated account creation
word filtering
password-protected settings etc.
Existing IM Security Mechanisms(2)

Third-party security solutions




AIM can make use of Class 2 digital certificates
IMSecure
Trillian
Why don't we use email security
solutions for IM?


Proprietary protocols
P2P connections
Shortcomings of Current Solutions




Anti-virus can check only limited file types
URL exploitations
Cost and maintenance burden of digital
certificates
SSL-based (corporate IM) solutions:



resource hungry
visible messages to server
limited threat model (end-points are trusted)
Weaknesses of IMSecure Model
User System
IM Client
Unprotected Messages
Read/Modify Messages
Malicious Program
IMSecure
Encrypted Messages
IM Server/
Others
Concluding Remarks





IM security is important
Current methods are insufficient
Can we use existing protocols to secure
IM?
User interface issues
Ongoing work in IETF (see also paper)
Thanks.
Paper:
http://www.scs.carleton.ca/~mmannan/publications/pst04.pdf
Presentation:
http://www.scs.carleton.ca/~mmannan/publications/pst04.ppt
Web References

Symantec: IM Worms Could Spread In Seconds, June 2004,
http://www.techweb.com/wire/story/TWB20040618S0007

Look out spam, here comes spim, Mar. 2004,
http://www.theregister.co.uk/2004/03/31/look_out_spam_here_comes

Microsoft warns of JPEG threat, Sep. 2004
http://www.macworld.co.uk/news/index.cfm?NewsID=9635&Page=1&
pagePos=2

National Cyber Security Alliance Perception Poll Release
http://www.staysafeonline.info/news/NCSAPerceptionPollRelease.pdf
Related Work



Much work on feature enhancement,
analysis
Secure Instant Messaging Protocol
Preserving Confidentiality against
Administrator, Kikuchi et al., March,
2004.
Threats to Instant Messaging, Symantec
Security Response, 2003.