Re: RSA SecurID SID800 Token vulnerable by design

2006-09-18 Thread Daniel Carosone
On Sat, Sep 16, 2006 at 11:40:55PM -0500, Travis H. wrote:
> This looks mildly interesting:
> http://www.projectblackdog.com/product.html

Yes, a friend lent me one of these to play with a while ago, they're
really quite cool. Lots of interesting possibilities - which was
entirely the point of the original development version.

> I guess it uses an autorun file on Windows; I wonder whether most systems
> allow you to effectively launch X.  

Yes. The usb client port starts up emulating a usb mass storage CDROM
device, and uses autorun to load a usb-ethernet driver and several
other bits of software onto the windows box to help it get further.

The irony is, of course, that this shouldn't work at all on a properly
secured machine (though you could still try and launch the program
manually if the lockdown had only gone as far as disabling autorun).
The very thing it relies on to work smoothly could also have been
abused to install keyloggers and other nasties on the desktop that
will sink the security of the device, or at least of the user session.

> The docs say it connects via ethernet over USB, so you're
> effectively a thin X client.

Pretty much; it offers a samba share to the host to run this and other
programs from.

It uses a cute covert-channel trick to switch to this mode.  It starts
up emulating a CD.  The autorun software on the CD (and the linux
hotplug script equivalent) have the task of passing some
configuration/environment information through to the blackdog.  The
first of these is a network address range for the private 'lan'
between them.  On the filesystem is a directory, with four
subdirectories, inside each of which are 256 files, 0-255.  The
autorun tool picks a network range, then reads one file from each
directory in order to 'tap out' the network address.  When this
happens, the blackdog disconnects from the usb and reconnects, this
time emulating a usb ethernet corresponding to the driver that was
prepared earlier, and things continue from there over this network.

> Good idea, still vulnerable to software surveillance and host OS.

Yeah, and physical keyloggers and similar tampering too, pretty much
unavoidable.

The important thing, though, is to keep in mind the separation between
the device/platform, and the default application. Plenty of alternate
applications, including potentially malicious ones, might not be
bothered by these concerns.

> No display.

There was a newer commercial variant due for imminent release about
the time I was looking at the device.  It had a more purpose-specific
software image, some extra flash/ram, and a small screen.  It had also
lost something in the process, I think the card reader for extra local
storage, in favour of a smaller case and a network storage concept.

--
Dan.

pgpC43zA4Zxo8.pgp
Description: PGP signature


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-17 Thread Travis H.

On 9/15/06, Daniel Carosone <[EMAIL PROTECTED]> wrote:

But let's not also forget that these criticisms apply approximately
equally to smart card deployments with readers that lack a dedicated
pinpad and signing display.


This looks mildly interesting:
http://www.projectblackdog.com/product.html
I guess it uses an autorun file on Windows; I wonder whether most systems
allow you to effectively launch X.  The docs say it connects via ethernet
over USB, so you're effectively a thin X client.  Nice that it's open-source.

Good idea, still vulnerable to software surveillance and host OS.
No display.

This looks more interesting:

http://fingergear.com/bio_computer_on_a_stick.php

This has a display, a fingerprint reader, runs Linux, has many common apps
(office-compatible suite), IM, etc.  More relevant to the list, it has a OTP
generator, so this is effectively a security token.

See:
http://fingergear.com/faq1.php#4

Unfortunately, it looks like you can't reimage it without wiping
everything, and then you lose the OS.  I hope you can get a modifiable
OS image and install it just as one would save data to the USB drive,
but it could be impossible.


The worst cost for these more advanced methods may be in user
acceptance: having to type one or more things into the token, and then
the response into the computer.  A USB connected token could improve
on this by transporting the challenge and response, displaying the
challenge while leaving the pinpad for authentication and approval.


I wonder if the ubiquitous fingerprint reader could replace the need
for lots of buttons; controls tend to be the most expensive and fragile
part of electronic devices.

I wonder why nobody has an open-source cell phone that does voice
recognition yet.  That would seem to be the ideal solution, wouldn't
it?  You're already carrying one around, and you have a keypad for
dialing (can be used for PIN), LCD panel for output, and if you have
a fingerprint reader, enough juice to perform some crypto, and a USB
or bluetooth connector (for storage and communication) it'd be perfect.
--
"On the Internet noone knows you're a dog - except Bruce Schneier."
Unix "guru" for rent or hire -><- http://www.lightconsulting.com/~travis/
GPG fingerprint: 9D3F 395A DAC5 5CCC 9066  151D 0A6B 4098 0C55 1484

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-17 Thread Paul Zuefeldt
I wouldn't dispute any of the arguments made in the original or subsequent 
posts on this topic pointing out that the programmatic interface to the 
device opens a security hole. But I think it needs to be said that this is 
only in the environment where trojans, etc., can infiltrate the machine. 
Acknowledged... this is probably in 99.99% of the applications.


But in defense of the product, there are server-to-server type applications 
that don't involve a human which wouldn't be able to provide this style of 
two-factor authentication without a programmatic interface. And without 
hardward-based security solutions for these types of systems, they are 
vulnerable to compromise of keys and secrets by administrators. With a 
little physical security and isolation from the types of use that put them 
at risk for trojans, etc., the security hole under fire doesn't really 
exist. These systems do gain more security... by providing a device that 
doesn't allow an administrator to walk away with the secrets.


Maybe server-to-server applications weren't really the intended market for 
this particular product, but the point is that you need to be careful with 
blanket criticisms.


Regards,
Paul Zufeldt 



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-15 Thread Daniel Carosone
On Thu, Sep 14, 2006 at 02:48:54PM -0400, Leichter, Jerry wrote:
> | The problem is that _because there is an interface to poll the token for
> | a code across the USB bus_, malicious software can *repeatedly* steal new
> | token codes *any time it wants to*.  This means that it can steal codes
> | when the user is not even attempting to authenticate
>
> I think this summarizes things nicely.

Me too.  While less emphatic, my reaction to Vin's post was similar to
Thor's.. that it seemed to at least miss, if not bury, this point.

But let's not also forget that these criticisms apply approximately
equally to smart card deployments with readers that lack a dedicated
pinpad and signing display.  For better or worse, people use those to
unlock the token with a pin entered on the host keyboard, and allow
any authentication by any application during a 'session', too.

> Pressing the button supplies exactly the confirmation of intent that
> was lost.

And further, a token that includes more buttons (specifically, a
pinpad for secure entry of the 'know' factor) is vulnerable to fewer
attacks, and one that permits a challenge-response factor for specific
transaction approval is vulnerable to fewer again (both at a cost).
Several vendors have useful offerings of these types.

The worst cost for these more advanced methods may be in user
acceptance: having to type one or more things into the token, and then
the response into the computer.  A USB connected token could improve
on this by transporting the challenge and response, displaying the
challenge while leaving the pinpad for authentication and approval.

But the best attribute of tokens is they neither use nor need *any*
interface other than a user interface. Therefore:

 * it works anywhere with any client device, like my phone. I choose
   my token model and balance user overhead according to my needs.

 * it is simple to analyse.  How would you ensure the above ideal
   hypothetical USB token really couldn't be subverted over the bus?

By the time you've given up that benefit, and done all that analysis,
and dealt with platform issues, perhaps you might as well get the
proper pinpad smartcard it's starting to sound like, and get proper
signatures as well, rather than using a shared-key with the server.

--
Dan.


pgpotlLAwVOtZ.pgp
Description: PGP signature


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-14 Thread Leichter, Jerry
| The problem is that _because there is an interface to poll the token for
| a code across the USB bus_, malicious software can *repeatedly* steal new
| token codes *any time it wants to*.  This means that it can steal codes
| when the user is not even attempting to authenticate
I think this summarizes things nicely.  Moving to a higher level of
abstraction:  With a traditional token, if the correct value has been
entered, we can reasonably assume intent on the part of the human
being in possession of the token to identify himself, and thus take
responsibility for some set of actions.  With the additional "something
you know" password associated with the token, we can further reasonably
assume that the person in possession of the token is in fact the person
who has the right to possess that token.*

In the case of a software-readable USB token, *neither* assumption is
reasonable.  The resulting authentication is very different in kind.

| It is noteworthy that a token that requires *any* kind of intervention
| by the user -- even something as simple as a press of a button on the
| token which illuminates when the host presents the token-code request --
| is invulnerable to such an attack...
Pressing the button supplies exactly the confirmation of intent that
was lost.  (However, it can't get you to the assumptions about "the
right person" having possession of the token.  The fingerprint scanning
technologies that one sees in some USB drives today would probably be
reasonable for that purpose - not that one has much information about
their false positive rates or how hard they really are to attack.
I don't know what the costs are, however - low enough for ~$100 drives,
maybe not low enough for an ID token.)

-- Jerry

* Yes, there are attacks that render these assumptions invalid.
Nothing is perfect.


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-14 Thread Thor Lancelot Simon
On Wed, Sep 13, 2006 at 10:23:53PM -0400, Vin McLellan wrote:
> 
[... a long message including much of what I can only regard as
 outright advertising for RSA, irrelevant to the actual technical
 weakness in the SID800 USB token that Hadmut described, and which
 Vin's message purportedly disputes.  It would be nice if, when confronted
 with such a "response" in the future, the moderator of this list would
 return it to its author with the requirement that the marketeering be
 stripped out before the actual content be forwarded to this list!  I
 have snipped everything irrelevant to my own response. ... ]

> None of these features -- none of the SID800's cryptographic 
> resources -- were of apparent interest to Mr. Danisch. He ignored 
> them all when he denounced the SID800 as "vulnerable by design."

As well he should have, because they are utterly irrelevant to the
genuine design flaw which he pointed out, and which Vin seeks to
minimize (by burying it in irelevancies?) here.

> What particularly disturbs Mr. D is one option among in the SID800 
> SecurID features which allows RSA's local client software to poll and 
> retrieve a single OTP from the token when the SID800 is plugged into 
> the PC's USB port.  Given the potential for malicious malware to 
> invade and take control of any Windows PC -- malware that can seize 
> and misuse both the user's PIN and an OTP fresh from the USB bus -- 
> it was irresponsible, Danisch suggests, for RSA to make such a option 
> available to its customers.

And so it was.  Vin simply handwaves away the fact that if RSA's client
software can poll the token and retrieve the current OTP, so can any
malicious software running on the host to which the token is attached.

It is not correct to suggest that perhaps this could be done only once,
when the token were first plugged in to the host system's USB port,
because USB *by design* allows the host to cut and restore power to
devices under software control, so that the SID800 can, even if it
somehow is intended to only allow token retrieval "once upon plug-in
and once only" (something Vin seems to imply, but does not directly
state) simply be repeatedly tricked into thinking that it has just been
plugged in.

> In the second version of the SID800 -- an option selectable by local 
> management pre-purchase, and burnt into the token's USB firmware by 
> RSA -- the user can select a menu in which he instructs the SecurID 
> to load one OTP token-code directly into the paste buffer, presumably 
> for immediate use. Since internal access to the SecurID's OTP via the 
> USB bus makes it a potential target for "malware or intruders on the 
> computer," claimed Mr. Danisch, "This is weak by design."  I beg to 
> differ. Effective IT security is about an appropriate balance, not 
> walls of iron or stone.

"Good cooking is about full-bodied flavor, not wire rope or persian
kittens"; but let's leave the irrelevant analogy aside and stick to the
facts that seem to be discussed here, I suppose.

Vin claims that the user "instructs the SecureID to load one OTP
token-code directly into the paste buffer".  This is a very, very odd
claim, because it implies that the user communicates directly with a
USB peripheral and "instructs" _the peripheral_ to autonomously "load"
a token-code -- some bytes -- into an area in host memory that is used
by the host operating system's user interface.  We should note that,
unlike Firewire, USB *does not include a mechanism by which a
peripheral on the bus may initiate a DMA transfer into the memory of
the host system that is the master of the bus* so clearly what Vin
claims cannot be strictly true.  What, then, should we think that it
likely means?  I think he must mean something like this:

  "The user instructs the RSA-supplied application code running on the
   host system to retrieve one token code from the SecureID across the
   USB bus, and place that retrieved token code into the paste buffer."

If that is not what Vin means, I think that he should respond and say
exactly what he does mean, in a way that does not make reference to
mythical properties that USB peripherals do not have.

Now, consider what it means that it is even _possible_ for the RSA-
supplied application to retrieve a token code from the SID800 in this
way.  It means that by, at worst, cutting and restoring power to the
USB port in question, malicious software can retrieve *a new, current
token code* *any time it wants to do so*.  In other words, while, with
traditional SecureID tokens, it is possible for malicious software to
steal token codes typed by the user into a compromised host system _when
the user types them_, and by engaging in a man-in-the-middle scheme
impersonate the intended target system to the user _that once_ (since
SecureID token codes can not be used twice), this new system does, in
fact, open up the gaping new security hole Hamisch claims it does:

   With this USB-connected token, malicious software on the 

Re: RSA SecurID SID800 Token vulnerable by design

2006-09-14 Thread Vin McLellan


On Cryptography, and in several other online forums, Hadmut Danisch 
<[EMAIL PROTECTED]>, a respected German information security analyst, 
recently published a harsh critique of one optional feature in the 
SID800, one of the newest of the six SecurID authentication tokens -- 
some with slightly different form-factors, others with additional 
security functions -- sold by RSA.  It's raised quite a stir, and I'd 
like to respond.


A personal authentication token, by classical definition, must be 
physical, personal, and difficult to counterfeit.  The most popular 
implementations in computer security move the calculation of a 
pseudo-random authentication code -- a so-called "One-Time Password," 
or OTP-- off an employee's PC and into a hand-held hardware fob, 
small enough to be attached to a personal key chain.


RSA's mainstay token, the SID700 SecurID -- millions of which are 
used in over 20,000 enterprise installations worldwide, including 
many government agencies and financial institutions -- use AES (the 
US cryptographic standard) to process Current Time and a 128-bit 
token-specific secret to generate and continuously display a series 
of 6-8 digit (or alphanumeric) OTP "token-codes" which change every 
60-seconds, and remain valid only for a couple of minutes.


In practice, a RSA authentication server can then independently 
calculate the token-code that is appearing on a specific SecurID at 
this particular moment; compare that against an OTP submitted by a 
pre-registered user, and validate a match.  RSA, which first 
introduced the SecurID in 1987, has always insisted on the necessity 
of "two-factor authentication" (2FA), where a remote RSA 
authentication server must validate both a SecurID token-code 
(evidence of "something held") and a user-memorized PIN or password 
("something known.")


A stolen password can be reused indefinitely to masquerade as the 
legitimate user, often with the victim wholly unaware. A 
token-generated OTP, valid only briefly, is a far more robust 
authenticator.  With 2FA, if a SecurID is stolen or lost, it still 
can't be used to obtain illicit access to protected resources without 
the second secret: the user's memorized PIN or password.


The elegant simplicity of the traditional SecurID -- and patents on 
the mechanism by which the "drift" in each individual SecurID's 
internal clock is tracked by the RSA authentication server -- has 
allowed RSA's "time-synched" SecurID to dominate the market niche for 
hand-held OTP authentication devices for 20 years.


In a typical installation, anyone seeking to log on to a protected PC 
or network, or to access restricted online resources, must manually 
type in the OTP currently displayed on the SecurID -- as well as his 
memorized PIN or password -- to have his identity and access 
privileges validated. Network applications handle the combined 
SecurID "pass-code" like any long traditional password. The link 
between the user and the RSA infrastructure is often, but not always, 
an encrypted VPN channel. That's a local decision. Data exchanges 
between the RSA agent  and RSA authentication server -- which 
typically means between one of the 350-odd "SecurID-aware" network 
applications and the RSA Authentication Manager, using RSA's own 
protocol -- are always fully encrypted.


Mr. Danisch is an admirer of the classic SecurID (SID700), RSA's 
traditional hand-held token. His ire is directed at one of the two 
new hybrid SecurID designs that RSA has recently offered in an 
attempt to respond to new requirements in the boisterous and 
rapidly-evolving market for what's called "strong authentication."


With the nascent prospect of a new billion-dollar market in consumer 
authentication for financial services boosted by US federal 
regulatory initiatives, RSA announced the SecurID Signing Token, the 
SID900. The SecurID Signing Token still has a time-synched OTP, but 
RSA added a keypad and a challenge/response function which 
successively authenticates the user, the remote server, and a 
specific financial transaction, before the transaction (e.g., a funds 
transfer) is executed.


On the other side of the market -- where again US laws and federal 
regulatory initiatives have boosted demand for internal controls and 
more accountability measures in enterprise IT -- RSA has introduced 
the SID800, another hybrid SecurID, to meet the requirements of 
organizations that want to move into a full public key infrastructure (PKI.)


The SID800 SecurID is a multi-function authentication and 
cryptographic device that combines, in a single DPA-resistant token, 
the mobility and availability of the classic hand-held SecurID, as 
well as a "smart chip" that implements v2.1.1 Java tech (essentially 
a "virtual smart card") in a USB format. It looks like a slightly 
smaller version of the classic SecurID key fob, with a USB plug 
jutting out at one end. It can carry up to seven X.509 digital 
certificates for PKI, as well as

Re: RSA SecurID SID800 Token vulnerable by design

2006-09-10 Thread Anne & Lynn Wheeler

Lance James wrote:

Agreed, and since my research is focused on online banking I can see
yours and my point, either way, SecurID should not be the only concept
for dependence.


as i've mentioned serveral times, in the mid-90s, the x9a10 financial 
standards working group was given the task of preserving the integrity 
of the financial infrastructure for all retail payments. the result was 
x9.59 standard

http://www.garlic.com/~lynn/x959.html#x959

which specified (end-to-end) authenticated transaction (and a business 
rule that account numbers used in x9.59 transactions could not be used 
in non-authenticated transactions) ... recent, related post:
http://www.garlic.com/~lynn/aadsm25.htm#24 DDA cards may address the UK 
Chip&Pin woes


part of the issue was with the actual transactions being signed and 
running end-to-end ... and account numbers no longer vulnerable to 
"naked" exploits ... it was no longer necessary to hide the account 
number (as countermeasure to prevent fraudulent "replay attack" 
transactions).

http://www.garlic.com/~lynn/subpubkey.html#harvest

the issue then became end-point attacks; either the originating 
end-point or the authorizing end-point. most infrastructure have had the 
authorizing end-points pretty well armored for some time. that primarily 
leaves vulnerabilities at the originating end-point.


part of the EU finread terminal work was to close off some of the 
originating end-point vulnerabilities.

http://www.garlic.com/~lynn/subpubkey.html#finread

basically an independent, secure token terminal with its own display and 
key-entry. the transactions is forwarded from the end-point to the 
finread terminal ... the finread terminal displays a summary of the 
transaction details ... and passes it to the token for digital signing. 
any pin-entry (for two-factor authentication ... token "something you 
have" and pin-entry "something you know") is performed at the finread 
terminal (minimizing any pin evesdropping and associated pin replay 
attack exploits).


while session encryption is useful for confidentiality and privacy of 
the operations ... a lot of existing session encryption is primarily 
because existing transactions don't have end-to-end armored 
authentication ... leaving various pieces of information involved in the 
actual transaction naked and vulnerable to various kinds of replay attacks.


the x9.59 standards approach was to provide end-to-end armoring of the 
actual transactions ... eliminating numerous kinds of replay 
vulnerabilities and some of the man-in-the-middle attacks

http://www.garlic.com/~lynn/subpubkey.html#mitm

... independent of any possible use of authentication for session purposes

note that while it isn't part of the x9.59 standard ... the standard was 
carefully crafted such that end-point environments like the EU finread 
would be allowed to also sign transactions.


the issue is that the responsible authorization end-point frequently 
will be doing risk assessment  (especially involving financial 
transactions). it is easy to see that a eu finread terminal provides a 
much higher integrity digital signing environment that many personal 
computers (for instance, virus software than log the entered pin and 
replay it to a connected hardware token w/o the person's knowledge) ... 
it is useful to have some knowledge about the transaction originating 
environment when doing risk assessment.


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-09 Thread Sean W. Smith
One can have a lot of fun with key-wielding tokens, especially on  
Windows.  See:


J. Marchesini, S.W. Smith, M. Zhao.
"Keyjacking: the Surprising Insecurity of Client-side SSL."
Computers and Security.
4 (2): 109-123. March 2005.
http://www.cs.dartmouth.edu/~sws/pubs/msz05.pdf


--Sean





Sean W. Smith   [EMAIL PROTECTED]  www.cs.dartmouth.edu/~sws/
Department of Computer Science, Dartmouth College, Hanover NH USA




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-09 Thread Hadmut Danisch
On Fri, Sep 08, 2006 at 11:31:28AM -0700, Lance James wrote:

> SecurID should not be the only concept for dependence.


Yeah, however, it is a smart device which provides a reasonable level
of security in a very simple and almost foolproof way (I know a case
where the users complained that it did not work. They had to be told
not to type in the serial number engraved at the backside, but the
number displayed on the LCD...). 

It's a pity to see it weakened without need to.


regard
Hadmut


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-09 Thread Lance James
Hadmut Danisch wrote:
> Hi Lance,
> 
> On Fri, Sep 08, 2006 at 10:26:45AM -0700, Lance James wrote:
>> Another problem from what I see with Malware that steals data is the
>> formgrabbing and "on event" logging of data. Malware can detect if
>> SecureID is being used based on targeted events, example: Say HSBC
>> (Hypothetical example, not targeting HSBC) has two-factor logins in
>> place, the problem with this is that it is vulnerable to session riding
>> and trojan-in-the-middle attacks anyway, because the minute the user
>> logs in, the malware could launder money out (unless transaction auth is
>> in place, which in most cases it's not), or they could pharm the user
>> with a fake website that resolves as HSBC but they go in within the time
>> frame of that token being valid and have access. Either way, however you
>> cut it, SecureID/Two-Factor User auth is not protected against malware,
>> period.
> 
> 
> Partly agreed. These kinds of attacks I usually teach in my
> workshops. 
> 
> However, in all of these cases the attacker has to be online in the
> moment you are logging in and you experience any failure, e.g. can't
> login or something like that. 
> 
> But with the SID800 malware could silently sit in the background and
> pass token codes to the attacker even if you do not login at this
> moment. E.g. it could wait until you have logged in (or out) and grap
> the next token code.
> 
> Furthermore, the attack you described presumes that the attacker knows
> where you want to login. But when you could use the current token code
> as an indicator for searching login data in the input stream, then you
> can find new places to login, e.g. your company VPN access point.
> 
> While the attack you describe is more important for banking, the USB
> attack is more against company logins.
> 

Agreed, and since my research is focused on online banking I can see
yours and my point, either way, SecurID should not be the only concept
for dependence.
> regards
> Hadmut
> 
> 
> 


-- 
Best Regards,
Lance James
Secure Science Corp.
http://www.securescience.net

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-09 Thread Hadmut Danisch
Hi Lance,

On Fri, Sep 08, 2006 at 10:26:45AM -0700, Lance James wrote:
> 
> Another problem from what I see with Malware that steals data is the
> formgrabbing and "on event" logging of data. Malware can detect if
> SecureID is being used based on targeted events, example: Say HSBC
> (Hypothetical example, not targeting HSBC) has two-factor logins in
> place, the problem with this is that it is vulnerable to session riding
> and trojan-in-the-middle attacks anyway, because the minute the user
> logs in, the malware could launder money out (unless transaction auth is
> in place, which in most cases it's not), or they could pharm the user
> with a fake website that resolves as HSBC but they go in within the time
> frame of that token being valid and have access. Either way, however you
> cut it, SecureID/Two-Factor User auth is not protected against malware,
> period.


Partly agreed. These kinds of attacks I usually teach in my
workshops. 

However, in all of these cases the attacker has to be online in the
moment you are logging in and you experience any failure, e.g. can't
login or something like that. 

But with the SID800 malware could silently sit in the background and
pass token codes to the attacker even if you do not login at this
moment. E.g. it could wait until you have logged in (or out) and grap
the next token code.

Furthermore, the attack you described presumes that the attacker knows
where you want to login. But when you could use the current token code
as an indicator for searching login data in the input stream, then you
can find new places to login, e.g. your company VPN access point.

While the attack you describe is more important for banking, the USB
attack is more against company logins.

regards
Hadmut




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: RSA SecurID SID800 Token vulnerable by design

2006-09-09 Thread Lance James
Hadmut Danisch wrote:
> Hi,
> 
> I recently tested an RSA SecurID SID800 Token
> http://www.rsasecurity.com/products/securid/datasheets/SID800_DS_0205.pdf
> 
> 
> The token is bundled with some windows software designed to make
> user's life easier. Interestingly, this software provides a function
> which directly copies the current token code into the cut-and-paste
> buffer, when the token is plugged in into USB. This is weak by design.
> 
> The security of these tokens is based on what RSA calls "two-factor
> user authentication": It takes both a secret (PIN) and the
> time-dependend Token-Code to authenticate. The security of the
> Token-Code depends on the assumption that the token is resistant
> against malware or intruders on the computer used for communication
> (web browser, VPN client,...).

Hi Hadmut,

Another problem from what I see with Malware that steals data is the
formgrabbing and "on event" logging of data. Malware can detect if
SecureID is being used based on targeted events, example: Say HSBC
(Hypothetical example, not targeting HSBC) has two-factor logins in
place, the problem with this is that it is vulnerable to session riding
and trojan-in-the-middle attacks anyway, because the minute the user
logs in, the malware could launder money out (unless transaction auth is
in place, which in most cases it's not), or they could pharm the user
with a fake website that resolves as HSBC but they go in within the time
frame of that token being valid and have access. Either way, however you
cut it, SecureID/Two-Factor User auth is not protected against malware,
period.

> 
> However, if the Token Code can be read over the USB bus, this
> assumption does not hold. A single attack on the PC where the token is
> plugged in would compromise both the PIN (e.g. with a keylogger) and
> the token itself (e.g. writing a daemon which continuously polls the
> token and forwards the token in real time to a remote attacker.
> 
> Ironically this could make an attack even easier: If some malware
> simultaneously monitors the token and the keyboard, it is much easier
> to detect that the keystrokes are actually related to some login
> procedure:
> 
> Whenever the 6-digit token code appears in the keyboard or
> cut-and-paste input stream, you can be pretty sure that in a sliding
> window of about the last 100-200 keystrokes both the PIN and the
> address of the server to login is contained. Makes it really easy to
> automatically detect secrets in the input stream.
> 
> Thus, two different authentication methods are together weaker than
> each single one.
> 
> regards
> Hadmut
> 
> -
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
> 


-- 
Best Regards,
Lance James
Secure Science Corp.
http://www.securescience.net

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]