Apple’s Safari, released for the Windows platform in June 2007, is the second newest browser on Windows, behind Google’s Chrome. (Naturally, Apple’s browser also runs on OS X, and on iPhone and iPod Touch devices in a mobile edition.) Safari leads the pack in anti-phishing filtering and pop-up blocking, but it also has many security weaknesses.
Safari can be freely downloaded from Apple’s Web site, and it is offered as a default option through Apple’s Software Update program, which is installed with other Apple software, including iTunes and QuickTime. Although thesafari, iphone, apple, browser, security default Safari install is easy for end-users to unselect from Software Update, many critics assail Apple for installing potentially unwanted software during a process they believe should be used exclusively for patches and upgrades. Other observers counter that Apple’s automatically pushing an opt-out product is a perfectly legitimate way to offer a free browser alternative.
The Safari installer also installs a service called Bonjour, which allows Apple programs to advertise themselves and discover other Bonjour-compatible programs on the local network. Bonjour is used to automatically configure printers, hunt for file sharing opportunities, and find instant messaging peers, and it allows Safari to discover additional Web pages on the local network. In general, most security experts are wary of auto-discovery programs like Bonjour, and Bonjour itself has been involved in at least three known exploits. Bonjour is not essential to Safari’s functionality and can be disabled.
The Safari executable is not User Account Control (UAC)-aware on Windows Vista computers, but Vista automatically elevates permissions for the install because the word “setup” is in the name; this could pose a problem if Vista’s heuristics detection functionality is disabled. On Windows Vista, Safari runs as a single process (Safari.exe) with DEP (Data Execution Prevention) disabled, a security negative shared only by Opera; ASLR (Address Space Layout Randomization) enabled; and file system and registry virtualization enabled, all with a MIC (Mandatory Integrity Control) level of Medium. In comparison, the rendering processes of both Internet Explorer and Google Chrome run with the more secure MIC setting of Low. Apple’s Software Update checks for Safari patches once a week using a Task Scheduler job.
Safari always automatically prompts for approval before downloading files, and in doing so, it prevents some high-risk files from being executed before downloading. Safari also has good default cookie control. It is the only browser among those I tested to prevent all third-party cookie writes by default, which is a nice privacy bonus.
On Mac OS X systems, Safari’s passwords are protected by Apple’s Keychain password management system. But even on Windows, Safari’s locally stored passwords are well protected. As in Internet Explorer, stored Web site passwords are never displayed. However, Safari takes last place in remote password handling, passing only 2 of 21 tests on the Password Manager Evaluator Web site.
Settings and ciphers
An optional menu called Develop (which replaces the previous Debug menu option) can be added to the menu bar to speed up Web page development testing, but it also has significant global security impacts. The Develop menu allows the user to quickly open a current Web page in another installed Web browser or to change User Agent strings on the fly (to see how the change affects Web page rendering). Installed plug-ins can be viewed — but not managed — via an option under Safari’s Help menu.
Safari is weaker than its competitors in several areas regarding digital certificates and SSL/TLS (Secure Sockets Layer/Transport Layer Security) traffic. Initially, in SSL/TLS negotiations, TLS with RSA and weak 128-bit RC4 keys are offered first and second in the cipher order. Worse, ECC (Elliptical Curve Cryptography), AES (Advanced Encryption Standard), and 256-bit keys are never offered as potential cipher choices; further, MD5 is offered first and more frequently than SHA-1, when it should be the other way around. It would seem that Apple hasn’t been paying attention to crypto developments over the last few years.
Safari does warn of invalid digital certificates, but it isn’t nearly as “in your face” as the other top browsers. It warns only once with a small pop-up message, whereas competitors alter the entire Web page with red or multicolored warnings. Come to think of it, maybe Safari has it right: better to display one warning than many for a single problem. But then Safari, unlike all its competitors, fails to point out Extended Validation (EV) certificates or, as Internet Explorer and IE do, to highlight the true domain name, making it more difficult to tell phishing sites from the real thing.
Hunting and phishing
When Safari was first released, Apple touted the new browser as a secure alternative to Internet Explorer. As with all Internet Explorer alternatives, Safari’s lack of native support for ActiveX controls does provide users with some protection. Safari’s strong anti-phishing filters are also a plus.
But security is not Safari’s strong point. Unfortunately, 26 separate vulnerabilities have been announced since March 2008, one-third of which would allow complete system access. Plus, there simply isn’t a lot of security granularity to Safari. Security-minded users will have to decide if Safari’s poor cipher support, lack of security zones, and absence of enterprise features for mass deployment and control can be overcome by its aesthetic benefits.