I recently composed a layman’s description of Firesheep and the dangers it brings for my coworkers. Here is for those of you who also need to explain it to others who are low on the geek quotient:
This is an important security announcement for anyone who uses your laptop/iPad at coffee shops and other places with open wifi networks to surf the web.
If you are on an open wifi network and use a website that does not use https your login can be easily hijacked by anyone on the same wifi network.
What this means:
If you sit down at a coffee shop and use Facebook, Facebook sends a cookie (a bit of info identifying you as you). A nefarious person at the same coffee shop can snatch this cookie using a new hacker tool called Firesheep and immediately hijack your session pretending to be you on Facebook. Once they have access to your Facebook they can easily get the password, which is why it is recommended not to use the same password for all websites. Firesheep also works for any website that does not use https for login like Twitter, Amazon, yahoo, etc.
- Wifi Networks that are NOT secure: any open wifi that does not use a password, this includes networks that only use a browser password like many coffee shop wifi networks
- Wifi Networks that are secure: any WEP/WPA encrypted network.
- Sites that are NOT secure: any site that uses only http can be hijacked (Facebook, Twitter, Myspace, Flickr, Amazon, Yahoo, Yelp, Windows Live, NY Times, CNET, etc.)
- Sites that are secure: sites that use https encryption for everything are safe from being hijacked (bank and credit card sites, paypal,
*Gmail may not be secure even with HTTPS. I’ve been told that it leaks the cookies possibly due to chat.
Open wifi networks have always been unsecure in this way but there hasn’t been a tool this easy to use before. The new tool Firesheep is so simple an 8 year old can hack your account. It should be noted that even WEP/WPA networks are not truly secure but they are at least secure from Firesheep (WPA2 Enterprise is a better solution).
How to be safe from being hijacked:
Obviously avoiding open wifi networks protects from all this, but if you are on a open wifi there are other ways:
- The best solution is to use VPN. Firesheep cannot hijack your session if you are using VPN! This creates a secure tunnel to the web which goes through the UCSF network and works regardless of what browser you are using. It also protects all your traffic including email/etc.
- Another solution is to force https encryption on sites using a browser plugin: this only works for Chrome and Firefox and while effective this breaks aspects of some sites such as Facebook’s chat, and Google maps. Also it is not always secure either as Facebook sends a lot of stuff unsecurely even if you force https.
- Chrome browser plugin KB SSL Enforcer download here
- Firefox browser plugin HTTPS Everywhere https-everywhere
- Another solution is to use a SOCKS Proxy and SSH tunnel, which is too geektastically complicated to go into here.
- new_tool_automates_webmail (this news article says it works on gmail. This is wrong.)