The components that make up Internet Explorer are tightly integrated into the Windows environment, so making changes to them affects many other programs including Outlook (Express) and Windows Media Player. Be aware of the changes you make!
Even if you mistype an address you might fall into the hands of someone who has bad intentions. A simple example is the well known search engine of Google. If you mistype this as Goggle, you'll end up at a site for SpyBouncer...|
Every day, new security holes are found in Internet Explorer, so you should always keep Internet Explorer up-to-date, even if you use another browser like Opera or Firefox. By not updating you might leave holes to be used in other programs.
Another cause for trouble is active content. ActiveX controls and Java applets can bring the net to life, but they also introduce possible risks in that they will have programming errors that can be used maliciously.
USING SECURITY ZONES
Security zones are the first line of defense in Internet Explorer. There are four zones in a normal installation of Windows.
- Local Intranet - all sites behind the firewall. For home users this would mean the other computers in your household. These sites are usually given a high level of trust.
- Trusted sites - sites you have given your trust. These are given the highest trust, and is empty after you installed Windows.
- Restricted sites - sites you distrust. This zone is empty after the Windows installation as well.
- Internet - the rest...
There is a fifth zone in the form of My Computer, but this is normally not configurable. ActiveX controls that were installed on the computer by Windows run in this zone. The controls you download do not! Also URLs that reference files on your computer run in My Computer (files you save from the Internet continue to run in the security zone attached to that site though).
What does all this mean? If you install a program such as Adobe Acrobat, you download the installer from the Internet. When you run that file, it will run in the Internet Zone (provided you didn't put Adobe in the Restricted or Trusted Zone!). Once the program has been installed, when you start Acrobat it will run in My Computer. If Adobe also installed a file that will be opened by Internet Explorer, for example ReadMe.html, this will also run in My Computer.
With Windows XP SP-2, this zone now has the highest security level. Any content that uses Active Scripting or attempts to load an ActiveX Control is prevented from running unless the user explicitly allows it to be run by clicking the Information bar.
Because this can interfere with the operation of local running web applications, developers can add a Mark Of The Web to make files run in the Local Intranet zone instead of My Computer. For more information see http://msdn.microsoft.com.
To assign sites to zones or alter the configuration of their settings, open Internet Options by either choosing Tools within Internet Explorer or opening it from the Control Panel.
Configuring Local Intranet
After installation the Local Intranet Zone is set up to include the following site categories:
- All local sites which haven't been assigned to another zone. URLs without dots like http://localhost are considered a local site.
Note:
All addresses on the Internet are in fact 32-bit integer values, which are usually interpreted in the byte values. This is why you see addresses like 124.198.20.57. The four bytes that make up the address are 124, 198, 20 and 57. With the use of some math these four bytes can be reconstructed into a single number (in this case 2093356089). Hey! No more dots! Now it runs in the Local Intranet!
- All sites bypassing a proxy
- All files opened by a UNC path or My Network Places
To remove one or more of these categories from the Local Intranet, select Local Intranet on the "Security" tab of Internet Options and click "Sites...". Clear the appropriate checkboxes on the dialog and click OK.
ADDING AND REMOVING SITES FROM A ZONE
Select the zone you want to append the site to and click "Sites...". Type or copy and paste the site's URL into "Add this Web site to the zone:" box and click "Add". The site will appear in the "Web sites:" list box.
To remove a site select it in that list box and click "Remove".
Notes:
- Internet Explorer assumes the http protocol. Entering www.google.com is equivalent to http://www.google.com.
- "Require server verification (https:) for all sites in this zone" ensures that the zone you are entering is secured by SSL. This checkbox is selected in Trusted Sites. You can mix them by (un-)checking them when entering a site.
- Entering a full path to a page will add the complete site in the zone. Ergo, entering http://www.bbc.co.uk/doctorwho/characters/index.shtml will add http://www.bbc.co.uk to the list.
- If you use IP addresses directly they will not be the same as the name of the site. www.google.com will be different from 216.239.63.104. When you use IP addresses you will have to add both to the zone.
- To move a site from a zone to another you will have to delete it from the current zone and append it to the new zone.
Tips: Check your Trusted Zone periodically. Programs can add sites to the Trusted Zones and thereby give sites powers you don't want them to have!
Creating a Custom Security Zone
It could be that the default zones do not match what you need. If that happens, you can always create your own zone. Internet Explorer doesn't let you create a zone on your own, but you can create one relatively easily.
The zones are in the Registry in the key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones. This key has the following subkeys:
0) MyComputer
1) Local Intranet
2) Trusted sites
3) Internet
4) Restricted Sites
The simplest way to create a new zone is by exporting one of the keys with Registry Editor, changing it and importing the new key.
- If you're using Windows XP use System Restore to create a new restore point.
- Open the Registry Editor and navigate to HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2. It's best to clone either 2 (Trusted sites) or 4 (Restricted Sites). Other zones have properties that you don't want duplicated.
- Choose File, Export and save the selected key as a .reg file. Close Registry Editor.
- Locate the exported file and right-click on it. Choose Edit to open it in your editor of choice (by default that is Notepad).
After loading it will look like this:
REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4]
"1400"=dword:00000003
@=""
"DisplayName"="Restricted sites"
"Description"="This zone contains Web sites that can possibly damage you computer or data."
"Icon"="inetcpl.cpl#00004481"
"CurrentLevel"=dword:00000000
"MinLevel"=dword:00012000
"RecommendedLevel"=dword:00012000
"Flags"=dword:00000003
"1001"=dword:00000003
"1004"=dword:00000003
"1200"=dword:00000003
"1201"=dword:00000003
"1402"=dword:00000003
"1405"=dword:00000000
"1406"=dword:00000003
"1407"=dword:00000003
"1601"=dword:00000001
"1604"=dword:00000001
"1605"=dword:00000000
"1606"=dword:00000003
"1607"=dword:00000003
"1800"=dword:00000003
"1802"=dword:00000003
"1803"=dword:00000003
"1804"=dword:00000003
"1805"=dword:00000001
"1A00"=dword:00010000
"1A02"=dword:00000003
"1A03"=dword:00000003
"1C00"=dword:00000000
"1E05"=dword:00010000
"{AEBA21FA-782A-4A90-978D-B72164C80120}"=hex:1a,37,61,59,23,52,35,0c,7a,5f,20,\
17,2f,1e,1a,19,0e,2b,01,73,13,37,13,12,14,1a,15,39
"1A10"=dword:00000003
"{A8A88C49-5EB2-4990-A1A2-0876022C854F}"=hex:1a,37,61,59,23,52,35,0c,7a,5f,20,\
17,2f,1e,1a,19,0e,2b,01,73,13,37,13,12,14,1a,15,39
"1608"=dword:00000003
"1609"=dword:00000001
"1A04"=dword:00000003
"1A05"=dword:00000003
"1A06"=dword:00000003
"1206"=dword:00000003
"2001"=dword:00000003
"2004"=dword:00000003
- Edit the line that begins with [HKEY_CURRENT_USER changing the 4 to 5 at the end. You can use any number but 5 will do.
- Edit the "DisplayName" and "Description" to what you want.
- Change the "Icon" to something you'd like. This is the icon that will be displayed in the Internet Options dialog box.
- Edit "MinLevel" and "RecommendedLevel". MinLevel specifies the lowest security you can set for the zone without a warning prompt. RecommendedLevel is the default settings which will be set when you click on "Default Level".
The available levels are:
dword:00010000 Low
dword:00010500 Medium-low
dword:00011000 Medium
dword:00012000 High
- Edit the Flags line. This sets various properties for the zone. To set the Flags value, add the values from this table and convert them to hexadecimal notation.
The possible values are:
1 (0x01) Allow changes to custom settings
2 (0x02) Allow users to add sites to the zone
4 (0x04) Require https protocol
8 (0x08) Include sites that pass the proxy server
16 (0x10) Include sites not listed in other zones
32 (0x20) Do not show this zone in the Internet Options dialog
64 (0x40) Include the "Require Server verification (https:) for all sites listed in this zone" checkbox
128 (0x80) Treat UNC paths as Intranet connections.
The notations between brackets are the hexadecimal versions.
Example, to create a zone that lets you add sites and customize security you would make "Flags" look like this dword:00000003
A simple way to convert hexadecimal and decimal would be to use the Windows Calculator. Start Calculator (click on the Start menu, All Program, Accessories, Calculator) and make sure that you are looking at the scientific view by clicking View, Scientific. In the top left of the window there are four radiobuttons (Hex, Dec, Oct, Bin). By clicking these the value in the edit box will change to the equivalent amount.
- Save the edited file. And double-click it to import it into the Registry.
The other settings in the file specify various security settings. You can adjust them from Internet Options.
There are four default settings available:
Local Intranet - Medium-Low
Trusted sites - Low
Restricted sites - High
Internet - Medium
You can change the setting by moving the slider under "Security Level For This Zone". If you don't see a slider then there are custom settings active. To make it re-appear click on Default Level. Also note that settings applied to Trusted sites are more lenient than the ones applied to the Local Intranet! So, don't put sites in Trusted sites unless you trust them more than the machines on your own intranet!
I'm not discussing the various individual settings because they change from version to version. To change the settings for a selected zone, click Custom Level and fill in your preferences in the dialog box that shows up.
There are significant differences between Internet Explorer 5 and Internet Explorer 6. Settings for cookies have been removed. Internet Explorer 6 has a new tab (Privacy) where you can adjust your settings for cookies. Also, some of the settings for security have been tightened. Most settings are retained, but Java and scripting have been disabled in the Restricted sites, regardless of the previous settings.
ActiveX security settings
These are very restrictive by default because of the power of the controls.
- Automatic Prompting For ActiveX Controls: Determines whether users are prompted with the Information Bar before installing an ActiveX Control. If this setting is disabled the control will be handled as defined by other settings. If enabled it will show the Information Bar.
- Binary And Script Behaviors: Restricts binary and script behavior in Restricted Sites and Local Machine. Binary and script behaviors are compiled HTML components, Windows Script Components or COM components that are delivered from a website instead of on the client. The settings are as follows: Enabled allows all behaviors, Disabled prevents them and Administrator Approved allows behaviors for a list pre-approved by the System Administrator.
- Download Signed ActiveX Controls: Can you download controls which are signed? This means that you can assume that the control has not been tampered with; it does not mean the control doesn't have a harmful effect. Internet Explorer only downloads without a confirmation from sites in your Trusted sites-zone; consider changing this to Prompt for added security.
- Download Unsigned ActiveX Controls: Internet Explorer blocks downloading without a prompt in all zones but Trusted Sites. If you develop and/or test ActiveX controls, you might want to change this setting for the Local Intranet. Definitely, you don't download unsigned controls from outside sources though!
- Initialize And Script ActiveX Controls Not Marked As Safe: This determines whether Internet Explorer allows initialization and/or scripting for controls that does not have the "Safe for" signature. Unless you're testing controls there's no need to change this setting.
- Run ActiveX Controls And Plug-ins: Internet Explorer allows downloaded ActiveX controls and plugins to run in all zones but the Restricted Sites. You can change this option to allow only Administrator-approved controls to run. A Plug-in is an application to handle Internet content; an example would be Acrobat Reader, which is used to open .pdf-files from the Internet.
- Script ActiveX Controls Marked Safe For Scripting: This enables controls loaded with the
tag to interact with scripts. Only in Restricted Sites it is disabled. If you upgrade from Internet Explorer 5 to Internet Explorer 6, this is a setting which is not changed, so you might want to set it like that in Restricted Sites. Download Settings Java Security Settings
High Safety corresponds to the Java Sandbox. Medium Safety allows what High Safety allows plus Access Scratch Space (a place in your file system where the applet can create temporary files without full use of your system) and perform user directed file input/output. Low Safety additionally has: perform non user directed file input/output, execute other applications on your system, create and use dialog boxes, provide thread group access in the current execution context, open network connections with other computers, load libraries, make calls to Windows libraries (dll-files), create popups without the warning that the window was created by an applet, exit Microsoft VM, read/write in the Registry, print and create class loaders. In other words, under Low Safety a Java applet can become just as powerful as an ActiveX Control. When you take into account that Java asks permission for applets if the applet cannot do what it wants, you can safely set this to the High Safety. Miscellaneous Security Settings - Allow META REFRESH: A META REFRESH tag redirects you to a different server after a delay. Usually this is benign, and it's a service to redirect you to a new site after the website has been moved. - Allow Scripting Of Internet Explorer Webbrowser Control: Determines whether scripts can access the Webbrowser control that renders the content and interface of Internet Explorer. Scripting Security Settings User Authentication Settings
When Content Advisor finds the user going to a restricted page, it will issue a warning. Users who know the Supervisor password can bypass this and go to the site anyway. To install ICRA follow these steps:
By default Content Advisor blocks unrated pages because it has no way of knowing what the content is. When you go to an unrated page, you will be presented with a dialog saying you cannot view the page. You can enter the supervisor password and say whether this page is allowed or not. You can also use other programs to filter the content of pages, like Cyber Patrol and CYBERsitter.
Updating ActiveX Controls Deleting ActiveX Controls ActiveX Control Properties Safe For Initialization and Safe For Scripting Flags Permitting Only Administrator Approved ActiveX Controls To Run Inactivating an ActiveX Control
For more details about the security of Java Applets see Java Security Settings in this article.
You can configure the Internet Zone to prompt when a site wants to execute a script. And create a security zone with sites that you deem trustworthy. After the site has been proven to be benign, you add it to the newly created security zone, and it will run as normal. As an alternative you can use Jason Levine's Script Sentry (http://www.jasons-toolbox.com/scriptsentry.asp). Script Sentry allows you to run scripts without interruption, and display alerts when other scripts want to run. |
0 comments:
Post a Comment