Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-12-02 Thread Steven Bellovin

On Dec 2, 2011, at 5:26 27PM, Jeffrey Walton wrote:

> On Sun, Nov 27, 2011 at 3:10 PM, Steven Bellovin  wrote:
>> Does anyone know of any (verifiable) examples of non-government enemies
>> exploiting flaws in cryptography?  I'm looking for real-world attacks on
>> short key lengths, bad ciphers, faulty protocols, etc., by parties other
>> than governments and militaries.  I'm not interested in academic attacks
>> -- I want to be able to give real-world advice -- nor am I looking for
>> yet another long thread on the evils and frailties of PKI.
>> 
> "In July 2009, Benjamin Moody, a United-TI forum user, published the
> factors of a 512-bit RSA key used to sign the TI-83+ series graphing
> calculator",
> http://en.wikipedia.org/wiki/Texas_Instruments_signing_key_controversy.

Right.  I have five examples.  Apart from that one, there is:

The (alleged) factoring of 512-bit keys in code-signing certificates

The apparent use of WEP-cracking by the Gonzalez gang.  While we don't
know for sure that they did that, the Canadian Privacy Commissioner's
report said that TJX used WEP, and one of the indictments said that
Christopher Scott broke in to their wireless net.

The GSM interceptor.  I'm not using that one because the products I see
are (nominally) aimed at government use, and while I'm sure many have
been diverted I don't have any documented cases of them being used by
the private sector.  (For all of the reports about phone hacking by
Murdoch's companies, I've seen no reports of cell phone eavesdropping to
get the modern equivalent of, say, http://en.wikipedia.org/wiki/Squidgygate
or Camillagate.)

http://www.wired.com/threatlevel/2011/07/hacking-neighbor-from-hell/ --
someone who *really* wanted revenge on his neighbors.  Given that his
offenses were discovered to include child pornography, he was sentenced
to 18 years.


--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-12-02 Thread Jeffrey Walton
On Sun, Nov 27, 2011 at 3:10 PM, Steven Bellovin  wrote:
> Does anyone know of any (verifiable) examples of non-government enemies
> exploiting flaws in cryptography?  I'm looking for real-world attacks on
> short key lengths, bad ciphers, faulty protocols, etc., by parties other
> than governments and militaries.  I'm not interested in academic attacks
> -- I want to be able to give real-world advice -- nor am I looking for
> yet another long thread on the evils and frailties of PKI.
>
"In July 2009, Benjamin Moody, a United-TI forum user, published the
factors of a 512-bit RSA key used to sign the TI-83+ series graphing
calculator",
http://en.wikipedia.org/wiki/Texas_Instruments_signing_key_controversy.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-30 Thread Jon Callas

On Nov 29, 2011, at 8:33 PM, Ilya Levin wrote:

> On Tue, Nov 29, 2011 at 5:52 PM, Jon Callas  wrote:
> 
>> But the other one is Drew Gross's observation. If you think like an 
>> attacker, then you're a fool to worry about the crypto.
> 
> While generally true, this is kind of an overstatement. I'd say that
> if you think like an attacker then crypto must be the least of your
> worries.  But you still must worry about it.
> 
> I've seen real life systems were broken because of crypto combined
> with other thins. Well, I broke couple of these in old days (whitehat
> legal stuff)
> 
> For example, the Internet banking service of the bank I would not name
> here was compromised during a blind remote intrusion simulating
> exercise because of successful known plaintext attack on DES. Short
> DES keys together with key derivation quirks and access to ciphertext
> made the attack very practical and very effective.
> 
> Again, I'm not arguing with Drew Gross's observation. It is just a bit
> extreme to say it like this.

Let me try to restate what I was saying, because I think the point is getting 
lost in the words.

If I were an attacker who wanted to compromise your computers, I would not 
attack your crypto. I would attack your software. Even if what I wanted to do 
was ultimately to get to your crypto, I wouldn't mount a cryptanalytical 
attack, I'd attack your system. That's it.

We are seeing this in the real world now. The targeted malware that the German 
government has to compromise Skype is not cryptanalysis, it is a systems-level 
attack that then gets at the crypto.

Robert Morris gave the famous advice, "first, check for plaintext." I'm just 
saying that checking first for Flash today's equivalent.

Jon

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-30 Thread Thierry Moreau

Ilya Levin wrote:

On Tue, Nov 29, 2011 at 5:52 PM, Jon Callas  wrote:


But the other one is Drew Gross's observation. If you think like an attacker, 
then you're a fool to worry about the crypto.


While generally true, this is kind of an overstatement. I'd say that
if you think like an attacker then crypto must be the least of your
worries.  But you still must worry about it.

I've seen real life systems were broken because of crypto combined
with other thins. Well, I broke couple of these in old days (whitehat
legal stuff)

For example, the Internet banking service of the bank I would not name
here was compromised during a blind remote intrusion simulating
exercise because of successful known plaintext attack on DES. Short
DES keys together with key derivation quirks and access to ciphertext
made the attack very practical and very effective.



Indeed, single-length DES cracking for attacking electronic payment 
networks is the other instance (along with the TI software signature 
public key factorization) of a "production" crypto attack. Both are 
based on brute force against short key material.


It is not verifiable because a) the perpetrators needed no publicity to 
benefit, and b) the financial institutions were upgrading electronic 
payment gear to triple-DES (suddenly at a faster than usual pace which 
could raise suspicion, at least in my mind), and also preferred less 
publicity.


I had some form of confirmation (that the attack scenario occurred) by 
the way the triple-DES upgrade project success has been described by a 
bank technology specialist who would have been aware of the incident(s).


- Thierry Moreau


Again, I'm not arguing with Drew Gross's observation. It is just a bit
extreme to say it like this.

Best regards,
Ilya

---
http://www.literatecode.com


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-29 Thread Ilya Levin
On Tue, Nov 29, 2011 at 5:52 PM, Jon Callas  wrote:

> But the other one is Drew Gross's observation. If you think like an attacker, 
> then you're a fool to worry about the crypto.

While generally true, this is kind of an overstatement. I'd say that
if you think like an attacker then crypto must be the least of your
worries.  But you still must worry about it.

I've seen real life systems were broken because of crypto combined
with other thins. Well, I broke couple of these in old days (whitehat
legal stuff)

For example, the Internet banking service of the bank I would not name
here was compromised during a blind remote intrusion simulating
exercise because of successful known plaintext attack on DES. Short
DES keys together with key derivation quirks and access to ciphertext
made the attack very practical and very effective.

Again, I'm not arguing with Drew Gross's observation. It is just a bit
extreme to say it like this.

Best regards,
Ilya

---
http://www.literatecode.com
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-29 Thread Steven Bellovin

On Nov 29, 2011, at 7:44 AM, d...@geer.org wrote:

> 
> Steve/Jon, et al.,
> 
> Would you say something about whether you consider key management
> as within scope of the phrase "crypto flaw?"  There is a fair
> amount of snake oil there, or so it seems to me in my line of
> work (reading investment proposals and the like) -- things like
> secure boot devices that, indeed, are encrypted but which have the
> decryption key hidden on the device (security through obscurity).
> That's just an example; don't pick on it, per se.  But to repeat,
> is key management within scope of the phrase crypto flaw?
> 
It's a grey area for my purposes.  DRM is out completely; that's
something that can't work.  I'm looking for situations where (a) it's
easy for someone who knows the field to say, "idiots -- if they'd
done XXX instead of YYY, there wouldn't be a flaw", and (b) there
was a real-world consequence of the failure, and not just someone
saying "gotcha!"  Leaving out key management entirely, like WEP did,
would qualify under (a) but not (b).  


--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Non-governmental exploitation of crypto flaws?

2011-11-29 Thread Ed Stone
Possibly like NSA warrantless hoovering (ex: the San Francisco splitter), this 
mailman "feature" is not used to evil ends and is no worry.

Alternatively, privacy may be more vulnerable to simple user oversights than 
short keys.

On Nov 28, 2011, at 9:27 PM, cryptography-requ...@randombit.net wrote:

> Date: Mon, 28 Nov 2011 20:40:45 -0500
> From: Steven Bellovin 
> To: Crypto discussion list 
> Subject: Re: [cryptography] Non-governmental exploitation of crypto
>   flaws?
> Message-ID: 
> Content-Type: text/plain; charset=us-ascii
> 
> 
> On Nov 28, 2011, at 8:03 PM, Nico Williams wrote:
> 
>> The list is configured to set Reply-To.  This is bad, and in some
>> cases has had humorous results.  I recommend the list owners change
>> this ASAP.
> 
> 
> Agree, strongly.  The mailman documentation agrees with us.  I'm on the
> verge of unsubscribing on the grounds that the list is a privacy violation
> in action.
> 
>   --Steve Bellovin, https://www.cs.columbia.edu/~smb

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-29 Thread dan

Steve/Jon, et al.,

Would you say something about whether you consider key management
as within scope of the phrase "crypto flaw?"  There is a fair
amount of snake oil there, or so it seems to me in my line of
work (reading investment proposals and the like) -- things like
secure boot devices that, indeed, are encrypted but which have the
decryption key hidden on the device (security through obscurity).
That's just an example; don't pick on it, per se.  But to repeat,
is key management within scope of the phrase crypto flaw?

--dan

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-29 Thread Jean-Philippe Aumasson
Just my 2.373 cents:

I recently gave a talk entitled "Cryptanalysis vs. reality" that
covers the issues discussed in the present thread. The slides:
http://131002.net/data/talks/hashdays11_slides.pdf


On Tue, Nov 29, 2011 at 10:52 AM, Jon Callas  wrote:
>
> On Nov 27, 2011, at 12:10 PM, Steven Bellovin wrote:
>
>> Does anyone know of any (verifiable) examples of non-government enemies
>> exploiting flaws in cryptography?  I'm looking for real-world attacks on
>> short key lengths, bad ciphers, faulty protocols, etc., by parties other
>> than governments and militaries.  I'm not interested in academic attacks
>> -- I want to be able to give real-world advice -- nor am I looking for
>> yet another long thread on the evils and frailties of PKI.
>
> Steve, it's hard to know how to answer that, really. I often quote Drew 
> Gross, "I love crypto, it tells me what part of the system not to bother 
> attacking." I'd advise anyone wanting to attack a system that they should 
> look at places other than the crypto. Drew cracked wise about that to me in 
> 1999 and I'm still quoting him on it.
>
> If you look at the serious attacks going on of late, none of them are crypto, 
> to the best of my knowledge, anyway. The existing quote-quote APT attacks are 
> simple spear-phishing at best. A number of them are amazingly simplistic.
>
> We know that the attack against EMC/RSA and SecureID was done with a vuln in 
> a Flash attachment embedded in an Excel spreadsheet. According to the best 
> news I have heard, the Patient Zero of that attack had had the infected file 
> identified as bad! They pulled it out of the spam folder and opened it 
> anyway. That attack happened because of a security failure on the device that 
> sits between the keyboard and chair, not for any technology of any sort.
>
> There are also a number of cases where suspects or convicted criminals in the 
> hands of powerful governments along with their encrypted data have not had 
> their crypto broken. Real world evidence says that if you pick a reasonably 
> well-designed-and-implemented cryptosystem (like PGP or TrueCrypt) and 
> exercise good OPSEC, then your crypto won't be broken, even if you're up 
> against the likes of First World TLAs.
>
> I have, however, hidden many details in a couple of phrases above, especially 
> the words "exercise good OPSEC."
>
> If we look at it from the other angle, though, one of the cautionary tales 
> I'd tell, along with a case study is the TI break. The fellow who did it 
> announced on a web board that  equals  times 
> . People didn't get it, so he wrote it out in hex. They still 
> didn't get it, and he pointed out that the very long number could be found in 
> a certain certificate. The other people on the board went through all of 
> Kubler-Ross's stages in about fifteen posts. It's hilarious to read. The 
> analyst said that he'd sieved the key on a single computer in -- I remember 
> it being about 80 days, but it could be 60ish. Nonetheless, he just went and 
> did it.
>
> On the one hand, he broke the crypto. But on the other hand, we had all known 
> that 512-bit numbers can be quasi-easily factored. It was a shock, but not a 
> surprise.
>
> Another thing to look at would be the cryptanalysis of A5/n over the years. 
> Certainly, there's been brilliant cryptanalysis on those ciphers. But it's 
> also true that the people who put them in place willfully avoided using 
> ciphers known to be strong. It is as if they built their protocols so that 
> they could hack them but they presumed we couldn't. We proved them wrong. 
> Does that really count as cryptanalysis as opposed to puncturing arrogance?
>
> If you want to look at protocol train wrecks, WEP is the canonical one. But 
> that one had at its core the designers cheaping out on the crypto so that the 
> hardware could be cheaper. I think it is a good exercise to look the mistakes 
> in WEP, but a better one is to look at creating something significantly more 
> secure within the same engineering constraints. You *can* do better with 
> about the same constraints, and there are a number of ways to do it, even.
>
> I can list a number of oopses of lesser degrees, where someone took 
> reasonable components and there were still problems with it. But I really 
> don't think that's what you're asking for, either.
>
> The good news we face today is that there really isn't any snake oil any 
> more. If there is anything that we can be proud of as a discipline, it's that 
> the problems we face are genuine mistakes as opposed to genuine or malicious 
> not understanding the problem.
>
> The bad news is that there are two major problems left. One is mis-use of 
> otherwise mostly okay protocols. Users picking crap passwords is the most 
> glaring example of this. There are a number of well-tested cryptosystems out 
> there that are nearly universally used badly.
>
> But the other one is Drew Gross's observation. If you think like an attacker, 
> then

Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-29 Thread Jon Callas

On Nov 27, 2011, at 12:10 PM, Steven Bellovin wrote:

> Does anyone know of any (verifiable) examples of non-government enemies
> exploiting flaws in cryptography?  I'm looking for real-world attacks on
> short key lengths, bad ciphers, faulty protocols, etc., by parties other
> than governments and militaries.  I'm not interested in academic attacks
> -- I want to be able to give real-world advice -- nor am I looking for
> yet another long thread on the evils and frailties of PKI.

Steve, it's hard to know how to answer that, really. I often quote Drew Gross, 
"I love crypto, it tells me what part of the system not to bother attacking." 
I'd advise anyone wanting to attack a system that they should look at places 
other than the crypto. Drew cracked wise about that to me in 1999 and I'm still 
quoting him on it.

If you look at the serious attacks going on of late, none of them are crypto, 
to the best of my knowledge, anyway. The existing quote-quote APT attacks are 
simple spear-phishing at best. A number of them are amazingly simplistic. 

We know that the attack against EMC/RSA and SecureID was done with a vuln in a 
Flash attachment embedded in an Excel spreadsheet. According to the best news I 
have heard, the Patient Zero of that attack had had the infected file 
identified as bad! They pulled it out of the spam folder and opened it anyway. 
That attack happened because of a security failure on the device that sits 
between the keyboard and chair, not for any technology of any sort.

There are also a number of cases where suspects or convicted criminals in the 
hands of powerful governments along with their encrypted data have not had 
their crypto broken. Real world evidence says that if you pick a reasonably 
well-designed-and-implemented cryptosystem (like PGP or TrueCrypt) and exercise 
good OPSEC, then your crypto won't be broken, even if you're up against the 
likes of First World TLAs.

I have, however, hidden many details in a couple of phrases above, especially 
the words "exercise good OPSEC."

If we look at it from the other angle, though, one of the cautionary tales I'd 
tell, along with a case study is the TI break. The fellow who did it announced 
on a web board that  equals  times . People didn't get it, so he wrote it out in hex. They still didn't 
get it, and he pointed out that the very long number could be found in a 
certain certificate. The other people on the board went through all of 
Kubler-Ross's stages in about fifteen posts. It's hilarious to read. The 
analyst said that he'd sieved the key on a single computer in -- I remember it 
being about 80 days, but it could be 60ish. Nonetheless, he just went and did 
it.

On the one hand, he broke the crypto. But on the other hand, we had all known 
that 512-bit numbers can be quasi-easily factored. It was a shock, but not a 
surprise. 

Another thing to look at would be the cryptanalysis of A5/n over the years. 
Certainly, there's been brilliant cryptanalysis on those ciphers. But it's also 
true that the people who put them in place willfully avoided using ciphers 
known to be strong. It is as if they built their protocols so that they could 
hack them but they presumed we couldn't. We proved them wrong. Does that really 
count as cryptanalysis as opposed to puncturing arrogance?

If you want to look at protocol train wrecks, WEP is the canonical one. But 
that one had at its core the designers cheaping out on the crypto so that the 
hardware could be cheaper. I think it is a good exercise to look the mistakes 
in WEP, but a better one is to look at creating something significantly more 
secure within the same engineering constraints. You *can* do better with about 
the same constraints, and there are a number of ways to do it, even.

I can list a number of oopses of lesser degrees, where someone took reasonable 
components and there were still problems with it. But I really don't think 
that's what you're asking for, either.

The good news we face today is that there really isn't any snake oil any more. 
If there is anything that we can be proud of as a discipline, it's that the 
problems we face are genuine mistakes as opposed to genuine or malicious not 
understanding the problem. 

The bad news is that there are two major problems left. One is mis-use of 
otherwise mostly okay protocols. Users picking crap passwords is the most 
glaring example of this. There are a number of well-tested cryptosystems out 
there that are nearly universally used badly.

But the other one is Drew Gross's observation. If you think like an attacker, 
then you're a fool to worry about the crypto. Go buy a few zero days, instead. 
But that's only if you don't want to be discovered afterwards. If you don't 
care, there are so many unpatched systems out there that scattershotting 
well-crafted spam with a Flash exploit works just fine.

What I'm really saying here is that in the chain of real security, crypto is 
not the weak link. It's the strong 

Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Ben Laurie
On Tue, Nov 29, 2011 at 1:03 AM, Nico Williams  wrote:
> The list is configured to set Reply-To.  This is bad, and in some
> cases has had humorous results.  I recommend the list owners change
> this ASAP.

IMO its good. So there.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Peter Gutmann
Steven Bellovin  writes:

>I'm writing something where part of the advice is "don't buy snake oil
>crypto, get the good stuff".

I wrote about this back in 2002 in "Lessons Learned in Implementing and
Deploying Crypto Software", we've gone from straight snake oil to second-
order snake oil, good algorithms applied badly (the stuff I've seen people do
with RSA, DH, AES, ...).  So figuring out what "the good stuff" is (or at
least spotting the bad stuff and declaring everything else to be good) isn't
nearly as easy as it used to be.

>[SIGINT] So -- is there a real threat that people have to worry about?

I doubt it.  Put another way, if you're paranoid about the MIB then you
probably have more problems than crypto can deal with.

>The claim has been made in the foxit blog, but as noted it's not verified,
>merely asserted.

Having discussed it with the Fox-IT person, I'm pretty convinced now that it
was indeed a factorisation attack.  OTOH there are some really, really strange
things surrounding how it was done, I'll try and get a summary written when I
get time.

>Again, we all know how bad it is, but has it really been used?

So now we're really getting more into philosophical rather than technical
discussions.  Is a system with gaping security holes that's so profoundly
uninteresting to attackers that no-one even bothers looking at it (SCADA) more
secure than one that's been designed and implemented relatively securely but
that's such a tempting target that unreasonable amounts of effort are expended
attacking it (Windows)?  And who are your attackers?  If it's random
china^H^H^Hbogeymen then you need to worry about SCADA, if it's the entire
world's cybercrime industry then you need to worry about Windows and forget
SCADA because you can monetise the former and not the latter.

So to quote Ian Grigg, WYTM (What's Your Threat Model)?  I could put a DOS box
on the Internet (assuming I could find a TCP stack for it) and it'd remain
safe because no-one would ever target that.

Peter.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread James A. Donald

On 2011-11-28 2:00 PM, Peter Gutmann wrote:

Steven Bellovin  writes:


Does anyone know of any (verifiable) examples of non-government enemies
exploiting flaws in cryptography?


Could you be a bit more precise about what "flaws in cryptography" covers?  If
you mean exploiting bad or incorrect implementations of crypto then there's so
much that I barely know where to start, if it's actual cryptanalytic attacks
on anything other than toy crypto (homebrew ciphers, known-weak keys, etc)
then there's very little around.


The various wifi breaks are reasonably described as actual cryptanalytic 
attacks.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Lucky Green
On 2011-11-28 14:56, Steven Bellovin wrote:
> 
> On Nov 27, 2011, at 11:00 49PM, Peter Gutmann wrote:
> 
>> Steven Bellovin  writes:
>>
>>> Does anyone know of any (verifiable) examples of non-government enemies
>>> exploiting flaws in cryptography?
[...[
>For GSM, is there
> something I can footnote about these kits?

Steve,
There is a boatload of GSM interception gear on the market and has been
for over 10 years that performs cryptanalytical attacks on GSM's A5/1
and A5/2 ciphers.

Fire up your favorite search engine and look for "passive GSM
interceptor". Indeed, there are subscribers to this mailing list that
sell commercial GSM interception gear that performs cryptanalytical attacks.

--Lucky Green
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Jon Callas
>> 
>>> WEP?  Again, we all know how bad it is, but has it really been used?
>>> Evidence?
>> 
>> Yes, WEP was a confirmed vector in the Gonzales TJX hack:
>>> http://www.jwgoerlich.us/blogengine/post/2009/09/02/TJ-Maxx-security-incident-timeline.aspx
>> 
>> http://en.wikipedia.org/wiki/TJX_Companies#Computer_systems_intrusion
> 
> Ah --- I'll check.  I knew they attacked WiFi; I didn't recall that they'd
> cracked WEP.  Thanks.

I don't believe the TJX attack cracked WEP. I believe that the post-hack 
auditors identified WEP as a weak point, but the attackers got in through an 
easily-cracked network. By easily cracked I mean something like a stupid 
password or unsecured. The attackers were not sophisticated.

Jon

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Steven Bellovin

On Nov 28, 2011, at 8:03 PM, Nico Williams wrote:

> The list is configured to set Reply-To.  This is bad, and in some
> cases has had humorous results.  I recommend the list owners change
> this ASAP.


Agree, strongly.  The mailman documentation agrees with us.  I'm on the
verge of unsubscribing on the grounds that the list is a privacy violation
in action.

--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Nico Williams
The list is configured to set Reply-To.  This is bad, and in some
cases has had humorous results.  I recommend the list owners change
this ASAP.

Nico
--
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Marsh Ray

On 11/28/2011 06:52 PM, Steven Bellovin wrote:


On Nov 28, 2011, at 6:58 PM, Marsh Ray wrote:


On 11/28/2011 04:56 PM, Steven Bellovin wrote:


I'm writing something where part of the advice is "don't buy snake
oil crypto, get the good stuff".  By "good" I mean well-accepted
algorithms (not "proprietary for extra security!"), and protocols
that have received serious analysis.  I also want to exclude
too-short keys.



But -- honesty requires that I define the threat model.  We *know*
why NSA wanted short keys in the 1990s, but most folks are not being
targeted by, and hence don't have
a major worry.


But where's the evidence of that claim?


For which claim?  That most folks aren't being targeted by major SIGINT
agencies?  I suspect that it's the converse that needs proving.


Is there a distinction being made here? How fine is it?

"Targeted" may imply that someone has your name on a finite sized list 
somewhere.


On the other hand, some percentage of your traffic (or metadata about 
it) are likely being intercepted, archived, and indexed for later 
searching. We know Google, Facebook, and every sleazy ad server network 
on the internet does this. We know Syria does this, their BlueCoat logs 
were uploaded the other day. We know the US government believes in 
warrantless wiretapping and has at least one wiring closet in US telcos.


We could call this "non-targeted surveillance". But given the searching 
and retrieval capabilities today (e.g., Palantir's glowing review in the 
WSJ the other day), is this still a useful distinction?


Just asking questions out loud here.


If you are a tech, aerospace, or military company in
the West, you would should expect state-sponsored adversaries to rattle
your doorknobs on a regular basis.


Right.  And if you manufacture paper clips or sell real estate, you're
not in that category.


One would certainly think so.

But surely the Malaysian Agricultural Research and Development Institute 
did not realize it was painting a target on itself when some IT staffer 
requested the code signing flag be set on their cert request for 
anjungnet.mardi.gov.my.

( http://www.f-secure.com/weblog/archives/2269.html )


I do note that none of the news stories about cyberattacks from China have
mentioned crypto.  EIther it's not part of the attack -- my guess -- or
Someone doesn't want attention called to weak crypto.


With all the vulnerable Adobe client software out there they probably 
have more hack targets than they can possibly handle.



Funny, that one sounds to me like a failed model. This idea of keeping
secrets locked in a plastic box while simultaneously selling it to
millions of consumers has failed every time it has been tried.


I don't follow.  TI put a public key into their devices, and used the
private key to sign updates.


Yes that makes more sense then.


That's a perfectly valid way to use
digital signatures, even if I think their threat model was preposterous.
If they had used 1024-bit keys it wouldn't have been an issue.


Right, it likely would have fallen to some other issue.


If we can't get clarification, perhaps we can obtain some samples of the
malware and confirm it ourselves.


How?  Private keys are private keys; the fact that they exist somewhere
says nothing about how they were obtained.


The question remaining in my mind was: was this batch of signed malware 
found in the wild by F-Secure really signed with a set of exclusively 
512 bit keys?


- Marsh
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Steven Bellovin

On Nov 28, 2011, at 7:58 PM, Steven Bellovin wrote:

> 
> On Nov 27, 2011, at 11:00 PM, Peter Gutmann wrote:
> 
>> Steven Bellovin  writes:
>> 
>>> Does anyone know of any (verifiable) examples of non-government enemies
>>> exploiting flaws in cryptography?
>> 
>> Could you be a bit more precise about what "flaws in cryptography" covers?  
>> If 
>> you mean exploiting bad or incorrect implementations of crypto then there's 
>> so 
>> much that I barely know where to start, if it's actual cryptanalytic attacks 
>> on anything other than toy crypto (homebrew ciphers, known-weak keys, etc) 
>> then there's very little around.  If it's something else, you'd have to let 
>> us
>> know where the borders lie.
>> 
> Private reply. ...

Very private, I see...  I thought I triple-checked the To: line...

Will someone *please* fix this !@#$%^& mailing list and make it *not* install
a Reply-To line?


--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Steven Bellovin

On Nov 27, 2011, at 11:00 PM, Peter Gutmann wrote:

> Steven Bellovin  writes:
> 
>> Does anyone know of any (verifiable) examples of non-government enemies
>> exploiting flaws in cryptography?
> 
> Could you be a bit more precise about what "flaws in cryptography" covers?  
> If 
> you mean exploiting bad or incorrect implementations of crypto then there's 
> so 
> much that I barely know where to start, if it's actual cryptanalytic attacks 
> on anything other than toy crypto (homebrew ciphers, known-weak keys, etc) 
> then there's very little around.  If it's something else, you'd have to let us
> know where the borders lie.
> 
Private reply.  I'm writing a new book on security; let me know if you want to
see the preface and ToC.  Right now, I'm working on the crypto chapter.  So --
in a book that stresses realistic security and paying attention to threat 
models,
what do I tell folks about petroleum herpetology?  Passwords are a different 
chapter;
so is process.  DRM is out of scope for this book.  But I don't really want to
advertise it this far in advance of completion at best, it will be released 
about a
year from now, and that's *if* I can finish it by May or June.


--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Steven Bellovin

On Nov 28, 2011, at 6:58 PM, Marsh Ray wrote:

> On 11/28/2011 04:56 PM, Steven Bellovin wrote:
>> 
>> I'm writing something where part of the advice is "don't buy snake
>> oil crypto, get the good stuff".  By "good" I mean well-accepted
>> algorithms (not "proprietary for extra security!"), and protocols
>> that have received serious analysis.  I also want to exclude
>> too-short keys.
> 
>> But -- honesty requires that I define the threat model.  We *know*
>> why NSA wanted short keys in the 1990s, but most folks are not being
>> targeted by, and hence don't have
>> a major worry.
> 
> But where's the evidence of that claim?

For which claim?  That most folks aren't being targeted by major SIGINT
agencies?  I suspect that it's the converse that needs proving.
> 
> AFAICT there is evidence of widespread wiretapping in the world. From
> extra equipment closets in AT&T buildings to "Carnivore" AKA "Omnivore"
> NSA programs. That's to say nothing of someone traveling
> internationally. If you are a tech, aerospace, or military company in
> the West, you would should expect state-sponsored adversaries to rattle
> your doorknobs on a regular basis.

Right.  And if you manufacture paper clips or sell real estate, you're
not in that category.  

I do note that none of the news stories about cyberattacks from China have
mentioned crypto.  EIther it's not part of the attack -- my guess -- or 
Someone doesn't want attention called to weak crypto.
> 
> Furthermore, some of the largest distributed supercomputers in the world
> are botnets or on-line game systems now. The days of Western
> intelligence agencies having unambiguously greater brute-force
> capabilities than "The Bad Guys^TM" are drawing to a close. The
> purported RSA factorization is a sign of that.
> 
>> So -- is there a real threat that people have to worry about?  The TI
>> example is a good one, since it's fully verified.
> 
> Funny, that one sounds to me like a failed model. This idea of keeping
> secrets locked in a plastic box while simultaneously selling it to
> millions of consumers has failed every time it has been tried.

I don't follow.  TI put a public key into their devices, and used the
private key to sign updates.  That's a perfectly valid way to use
digital signatures, even if I think their threat model was preposterous.
If they had used 1024-bit keys it wouldn't have been an issue.
> 
>> The claim has been made in the foxit blog, but as noted it's not
>> verified, merely asserted.
> 
> If we can't get clarification, perhaps we can obtain some samples of the
> malware and confirm it ourselves.

How?  Private keys are private keys; the fact that they exist somewhere
says nothing about how they were obtained.
> 
>> WEP?  Again, we all know how bad it is, but has it really been used?
>> Evidence?
> 
> Yes, WEP was a confirmed vector in the Gonzales TJX hack:
>> http://www.jwgoerlich.us/blogengine/post/2009/09/02/TJ-Maxx-security-incident-timeline.aspx
> 
> http://en.wikipedia.org/wiki/TJX_Companies#Computer_systems_intrusion

Ah --- I'll check.  I knew they attacked WiFi; I didn't recall that they'd
cracked WEP.  Thanks.
> 
> 
>> Did anyone use the TLS renegotiate vulnerability?
> 
> I have spoken with pentesters who has used it successfully. Not on your 
> typical web site.

RIght -- not what I was asking about.
> 
> 
>> Password guessing doesn't count...
> 
> How about dictionary attacks and rainbow tables then?
> 
> I heard it stated somewhere that an Apple product was using PBKDF2 with
> a work factor of 1. Does that count?


There's a separate section on bad passwords...

Thanks.

--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Marsh Ray

On 11/28/2011 05:58 PM, Marsh Ray wrote:


I heard it stated somewhere that an Apple product was using PBKDF2
with a work factor of 1. Does that count?


Follow-up.

It was Blackberry, not Apple:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3741


Vulnerability Summary for CVE-2010-3741 Original release
date:10/05/2010 Last revised:07/19/2011 Source: US-CERT/NIST
Overview

The offline backup mechanism in Research In Motion (RIM) BlackBerry
Desktop Software uses single-iteration PBKDF2, which makes it easier
for local users to decrypt a .ipd file via a brute-force attack.
Vulnerability Summary for CVE-2010-3741 Original release
date:10/05/2010 Last revised:07/19/2011 Source: US-CERT/NIST
Overview

The offline backup mechanism in Research In Motion (RIM) BlackBerry
Desktop Software uses single-iteration PBKDF2, which makes it easier
for local users to decrypt a .ipd file via a brute-force attack.



http://www.infoworld.com/t/mobile-device-management/you-can-no-longer-rely-encryption-protect-blackberry-436

> [Elcomsoft]

In short, standard key-derivation function, PBKDF2, is used in a
very strange way, to say the least. Where Apple has used 2,000
iterations in iOS 3.x, and 10,000 iterations in iOS 4.x, BlackBerry
uses only one.


Via http://en.wikipedia.org/wiki/PBKDF2#BlackBerry_vulnerability .


- Marsh
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Marsh Ray

On 11/28/2011 04:56 PM, Steven Bellovin wrote:


I'm writing something where part of the advice is "don't buy snake
oil crypto, get the good stuff".  By "good" I mean well-accepted
algorithms (not "proprietary for extra security!"), and protocols
that have received serious analysis.  I also want to exclude
too-short keys.



But -- honesty requires that I define the threat model.  We *know*
why NSA wanted short keys in the 1990s, but most folks are not being
 targeted by, and hence don't have
a major worry.


But where's the evidence of that claim?

AFAICT there is evidence of widespread wiretapping in the world. From
extra equipment closets in AT&T buildings to "Carnivore" AKA "Omnivore"
NSA programs. That's to say nothing of someone traveling
internationally. If you are a tech, aerospace, or military company in
the West, you would should expect state-sponsored adversaries to rattle
your doorknobs on a regular basis.

Furthermore, some of the largest distributed supercomputers in the world
are botnets or on-line game systems now. The days of Western
intelligence agencies having unambiguously greater brute-force
capabilities than "The Bad Guys^TM" are drawing to a close. The
purported RSA factorization is a sign of that.


So -- is there a real threat that people have to worry about?  The TI
example is a good one, since it's fully verified.


Funny, that one sounds to me like a failed model. This idea of keeping
secrets locked in a plastic box while simultaneously selling it to
millions of consumers has failed every time it has been tried.


The claim has been made in the foxit blog, but as noted it's not
verified, merely asserted.


If we can't get clarification, perhaps we can obtain some samples of the
malware and confirm it ourselves.


WEP?  Again, we all know how bad it is, but has it really been used?
 Evidence?


Yes, WEP was a confirmed vector in the Gonzales TJX hack:

http://www.jwgoerlich.us/blogengine/post/2009/09/02/TJ-Maxx-security-incident-timeline.aspx


http://en.wikipedia.org/wiki/TJX_Companies#Computer_systems_intrusion

> number of affected customers had reached 45.7 million [9] and has

prompted credit bureaus to seek legislation requiring retailers to
be responsible for compromised customer information saved in their
systems. In addition to credit card numbers, personal information
such as social security numbers and driver's license numbers from
451,000 customers were downloaded by the intruders. The breach was
possible due to a non-secure wireless network in one of the stores.




Is anyone using BEAST?


Not to my knowledge.


Did anyone use the TLS renegotiate vulnerability?


I have spoken with pentesters who has used it successfully. Not on your 
typical web site.


And it's still out there.
For example, the "Ultra High Secure Password Generator":
https://www.grc.com/passwords.htm

Every one is completely random (maximum entropy) without any pattern,
and the cryptographically-strong pseudo random number generator we
use guarantees that no similar strings will ever be produced again.
Also, because this page will only allow itself to be displayed over a
snoop-proof and proxy-proof high-security SSL connection, and it is
marked as having expired back in 1999, this page which was custom
generated just now for you will not be cached or visible to anyone
else.


Qualys reports that site as vulnerable to CVE-2009-3555 (it accepts
unsolicited insecure TLS renegotiation) and gives it a grade "D" overall:
https://www.ssllabs.com/ssldb/analyze.html?d=grc.com


A lot of the console and DRM breaks were flaws in the concept, rather
than the crypto.


I agree there's such a thing as "proper" and "improper" crypto. But it
also seems a bit unhelpful to draw the boundaries so carefully that the
commonly broken stuff is subsequently defined out of bounds. If you
divorce it completely from actual usable implementations, people will
find the advice so impractical that they will be susceptible to the very
snake oil we wish to denounce.


Password guessing doesn't count...


How about dictionary attacks and rainbow tables then?

I heard it stated somewhere that an Apple product was using PBKDF2 with
a work factor of 1. Does that count?

- Marsh
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Steven Bellovin

On Nov 27, 2011, at 11:00 49PM, Peter Gutmann wrote:

> Steven Bellovin  writes:
> 
>> Does anyone know of any (verifiable) examples of non-government enemies
>> exploiting flaws in cryptography?
> 
> Could you be a bit more precise about what "flaws in cryptography" covers?  
> If 
> you mean exploiting bad or incorrect implementations of crypto then there's 
> so 
> much that I barely know where to start, if it's actual cryptanalytic attacks 
> on anything other than toy crypto (homebrew ciphers, known-weak keys, etc) 
> then there's very little around.  If it's something else, you'd have to let us
> know where the borders lie.
> 
I'm writing something where part of the advice is "don't buy snake oil crypto,
get the good stuff".  By "good" I mean well-accepted algorithms (not 
"proprietary
for extra security!"), and protocols that have received serious analysis.  I 
also
want to exclude too-short keys.  But -- honesty requires that I define the 
threat
model.  We *know* why NSA wanted short keys in the 1990s, but most folks are not
being targeted by , and hence don't have a
major worry.  So -- is there a real threat that people have to worry about?  The
TI example is a good one, since it's fully verified.  The claim has been made in
the foxit blog, but as noted it's not verified, merely asserted.  WEP?  Again, 
we
all know how bad it is, but has it really been used?  Evidence?  For GSM, is 
there
something I can footnote about these kits?  Is anyone using BEAST?  Did anyone
use the TLS renegotiate vulnerability?  A lot of the console and DRM breaks were
flaws in the concept, rather than the crypto.  Password guessing doesn't 
count...


--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Joachim Strömbergson
Aloha!

On 2011-11-27 21:10 , Steven Bellovin wrote:
> Does anyone know of any (verifiable) examples of non-government enemies
> exploiting flaws in cryptography?  I'm looking for real-world attacks on
> short key lengths, bad ciphers, faulty protocols, etc., by parties other
> than governments and militaries.  I'm not interested in academic attacks
> -- I want to be able to give real-world advice -- nor am I looking for
> yet another long thread on the evils and frailties of PKI.

How about  Wep0ff and friends that break WEP? AFAIK used in the wild by
curious individuals.

http://www.darknet.org.uk/2007/01/wep0ff-wireless-wep-key-cracker-tool/
http://wepcrack.sourceforge.net/

-- 
Med vänlig hälsning, Yours

Joachim Strömbergson - Alltid i harmonisk svängning.

Kryptoblog - IT-säkerhet på svenska
http://www.strombergson.com/kryptoblog




signature.asc
Description: OpenPGP digital signature
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread Peter Gutmann
ianG  writes:

>To be fair to Steve, although we've been bandying the term "toy crypto" and
>cousins around for a while, we haven't really defined it.  It's a bit like
>american pornography, we know it when we see it.

Oh, I wasn't really worried about that, but more things like whether bypassing
the Xbox bootloader crypto by sniffing the Hypertransport bus with a homebrew
LDT bus tap counts as an attack on crypto or not.  What about glitching a
smart card?  Timing attack on a MAC comparison?  ...

Peter.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread ianG

On 28/11/11 07:10 AM, Steven Bellovin wrote:

Does anyone know of any (verifiable) examples of non-government enemies
exploiting flaws in cryptography?  I'm looking for real-world attacks on
short key lengths, bad ciphers, faulty protocols, etc., by parties other
than governments and militaries.


I'd suggest:

1.  GSM.  The phones were first cracked by Lucky Green back in 1998 as 
an academic demo, and a few years back I heard it was possible to buy 
crack devices.  I didn't follow up, but the existance of kits would 
indicate there was a market for paparrazi or minute-theft or PIs.


2.  chip & pin.  Look at the Cambridge lab work.  They've been involved 
in some legal cases, and there might be some verified crunches in there.



I'm not interested in academic attacks
-- I want to be able to give real-world advice -- nor am I looking for
yet another long thread on the evils and frailties of PKI.


Yeah.

If you are doing research to document the state of real breaches, that 
would be valuable info.



iang
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-28 Thread ianG

On 28/11/11 15:00 PM, Peter Gutmann wrote:

Steven Bellovin  writes:


Does anyone know of any (verifiable) examples of non-government enemies
exploiting flaws in cryptography?

Could you be a bit more precise about what "flaws in cryptography" covers?  If
you mean exploiting bad or incorrect implementations of crypto then there's so
much that I barely know where to start, if it's actual cryptanalytic attacks
on anything other than toy crypto (homebrew ciphers, known-weak keys, etc)
then there's very little around.  If it's something else, you'd have to let us
know where the borders lie.




To be fair to Steve, although we've been bandying the term "toy crypto" 
and cousins around for a while, we haven't really defined it.  It's a 
bit like american pornography, we know it when we see it.


iang
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Solar Designer
On Mon, Nov 28, 2011 at 06:06:45PM +1300, Peter Gutmann wrote:
> Solar Designer  writes:
> 
> >Here are some examples of 512-bit RSA keys factored:
> 
> Right, but that doesn't say anything about what happened here. [...]

Sure.  I was not arguing with you, but rather I thought I'd provide some
more and better examples (better in terms of certainty that the
factoring actually took place) for Steve's original request.

Alexander
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Peter Gutmann
Solar Designer  writes:

>Here are some examples of 512-bit RSA keys factored:

Right, but that doesn't say anything about what happened here.  In every other 
case we know of in which malware has been signed by CA-issued certs, the keys 
were either stolen or, more rarely, bought using stolen credentials.  Given 
that you can get certs and keys for free from your botnet (a single months' 
data from the Kneber botnet alone, a single instance of a Zeus-based botnet, 
had over two thousand private keys and certs), you can't use the Politician's 
Fallacy to claim that the keys used in this case were obtained by factoring.  
They may have been, but they could just as easily have been stolen, and in 
every other instance where this has occurred in the past they've been stolen 
or fraudulently obtained.  Until there's a web interface that the bad guys can 
click on that, when fed a cert, gives them the private key a few seconds 
later, you're not going to beat the convenience of a straightforward 
kleptographic attack.

Peter.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Solar Designer
On Mon, Nov 28, 2011 at 04:57:03PM +1300, Peter Gutmann wrote:
> Marsh Ray  writes:
> 
> >* Here's an example of RSA-512 certificates being factored and used to sign
> >malware:
> >http://blog.fox-it.com/2011/11/21/rsa-512-certificates-abused-in-the-wild/
> 
> That's an example of *claims* of 512-bit keys being factored, with the
> thinking being "everyone knows 512-bit keys are weak, the certs used 512-bit
> keys, therefore they must have got them by factoring".  Unfortunately this
> doesn't explain how they go the 1024-bit and longer keys that were also used
> in the attack.

Here are some examples of 512-bit RSA keys factored:

http://en.wikipedia.org/wiki/Texas_Instruments_signing_key_controversy
http://www.schneier.com/blog/archives/2009/09/texas_instrumen.html
http://www.ticalc.org/archives/news/articles/14/145/145154.html

http://www.ticalc.org/archives/news/articles/14/145/145273.html

http://www.elcomsoft.com/news/127.html
http://www.prweb.com/releases/quicken/backdoor/prweb534367.htm

As far as I'm aware, these are real (not just claims).

Alexander
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Peter Gutmann
Steven Bellovin  writes:

>Does anyone know of any (verifiable) examples of non-government enemies
>exploiting flaws in cryptography?

Could you be a bit more precise about what "flaws in cryptography" covers?  If 
you mean exploiting bad or incorrect implementations of crypto then there's so 
much that I barely know where to start, if it's actual cryptanalytic attacks 
on anything other than toy crypto (homebrew ciphers, known-weak keys, etc) 
then there's very little around.  If it's something else, you'd have to let us
know where the borders lie.

Peter.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Peter Gutmann
Marsh Ray  writes:

>* Here's an example of RSA-512 certificates being factored and used to sign
>malware:
>http://blog.fox-it.com/2011/11/21/rsa-512-certificates-abused-in-the-wild/

That's an example of *claims* of 512-bit keys being factored, with the
thinking being "everyone knows 512-bit keys are weak, the certs used 512-bit
keys, therefore they must have got them by factoring".  Unfortunately this
doesn't explain how they go the 1024-bit and longer keys that were also used
in the attack.

That's not to say they weren't obtained in this manner, but with nothing more
than the Politician's Fallacy as supporting evidence there's nothing to
indicate they didn't just steal them like everyone else does.

Peter.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Peter Gutmann
Landon Hurley  writes:

>So would the recent $200 hardware break of hdmi encryption.

HDCP was a social, political, and economic fail, not necessarily a crypto
fail. I certainly don't want to denigrate the work that the guys the the Ruhr
Uni did, but you've been able to buy commercial HDCP strippers for years for a
few tens of dollars.  Here's an article on this that I wrote a few years ago
but never posted because I wasn't sure whether shining too much light on their
existence would be a good thing.

-- Snip --

Digital Macrovision scrubbers

Some years ago you could buy video signal stabilisers (still sold today) which
were useful for cleaning up video signals that had, for example, a noisy
black-level signal that screws up your receiver's AGC and a poor sync signal
that causes sync loss in your receiver.  Well, that was the official story in
any case, in practice they had one and only one purpose and that was to remove
Macrovision when feeding the signal to a VCR or some equivalent device (most
TV sets weren't affected by the above so there was no need to "stabilise" the
signal).

The digital equivalent of the video signal stabiliser is the HDMI splitter.
These take an input HDMI signal (with HDCP if present) and output an HDMI or
DVI signal, not necessarily with HDCP present.  HDCP strippers have been
around for awhile, initially they were explicitly advertised and sold as such
(which made their manufacturers obvious targets for reprisals) but now as HDMI
becomes commoditised we're seeing the predictable flood of cheap Chinese-made
HDMI splitters and repeaters that, um, forget to turn on HDCP on the output.

I recently got a chance to play with a fairly new model that a friend of mine
had bought for some work that his company is doing.  He's a professional video
producer and had been having problems with being prevented from editing his
own content by HDCP (cue my recent shortcomings-of-DRM analysis :-).  For an
unrelated reason he'd needed to feed an HDMI signal to two different editing
devices and so bought (in his words) "the cheapest, nastiest no-name HDMI
splitter I could find".

When he hooked it up to his video-editing gear he was surprised to see that
although he was feeding it input with HDCP, the output was clear of HDCP (one
of the advantages of having access to multi-thousand dollar video editing
equipment is that you get a lot more info than just a blank or noise-filled
screen).  He's since performed a series of tests on it with a range of gear
(including, for example, sending BluRay output to a non-HDCP DVI monitor that
normally results in no content being displayed) and it works just fine.

So what's inside this thing?  The entire content is just a basic board with a
bunch of HDMI splitter chips and an all-in-one 8051 to control them, probably
a $10 BOM for the lot.  The splitters are 1->2 devices and you can cascade
them, so to get 1->4 you use 1->2 and then 2->4 with a tree of three chips.
8-way just adds one more stage.

Looking at the datasheets for them, everything in these chips is software-
controlled.  In this case they just cleared the HDCP_ENC_OUT bit in a control
register and there was no more HDCP on the output.  In fact the cascade nature
of operation of these devices practically requires this, in order to avoid
running an HDCP setup for each link in the cascade (which according to Silicon
Image's FAQ can take up to five or six seconds per link, so for a three-level
cascade you're looking at up to 15s delay between changing the HDMI "channel"
and actually seeing any output from the box) so of necessity you need to turn
off HDCP for the links inside the box, with the result that you've got plain
HDMI running between the individual devices even if the output did still have
HDCP enabled.

Even if the firmware in the controller didn't already disable HDCP it'd be a
fairly simple patch to flip the required single bit in the control register
write in order to disable it.  In addition the keys are stored in external
EEPROMs (since putting EEPROM cells onto VLSI chips is a royal pain to do) so
you can grab the HDCP keys off those (they're supposedly encrypted, but lots
of vendors have made claims like this in the past, whether they really are is
still being investigated).  Heck, if you were really lazy and didn't want to
patch the software you could insert an ATtiny into the I2C control line (which
is used for controlling the HDMI chips from the 8051) and rewrite any accesses
to the HDCP registers so that it's disabled, the entire control code in the
ATtiny would be:

  while 1
read I2C command from input;
if( bit pattern == "store data Y to register X" )
  flip bit in data Y;
write I2C command to output;

(hmm, modchips for HDMI... I claim dibs on hacking next year's Defcon badge to
do this!).  Anyway, back to this specific device, it really is "the cheapest,
nastiest no-name HDMI splitter", the circuit board looks like it's been
assembled by Stevie Wonder, I've fou

Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Sandy Harris
On Mon, Nov 28, 2011 at 4:10 AM, Steven Bellovin  wrote:
> Does anyone know of any (verifiable) examples of non-government enemies
> exploiting flaws in cryptography?  I'm looking for real-world attacks on
> short key lengths, bad ciphers, faulty protocols, etc., by parties other
> than governments and militaries.  I'm not interested in academic attacks
> -- I want to be able to give real-world advice -- nor am I looking for
> yet another long thread on the evils and frailties of PKI.

Ross Anderson
http://www.cl.cam.ac.uk/~rja14/
has a classic paper "Why cryptosystems fail" based on analyzing
failures in banking systems. Mostly not the stuff you mention,
but poor management. He has a bunch of related papers too.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Solar Designer
On Sun, Nov 27, 2011 at 10:14:48PM +0100, Florian Weimer wrote:
> ... attacks on malware encryption schemes by the AV industry.

A curious example of this is poor crypto in the original Back Orifice,
where, if I recall correctly, some IDS products would try to crack the
encryption key in real time to detect BO traffic on non-standard ports
or to confirm that traffic on the standard port is indeed BO.

http://en.wikipedia.org/wiki/Back_Orifice
http://www.iss.net/security_center/reference/vuln/BackOrifice.htm

"No false negatives are known for this signature. RealSecure can detect
BackOrifice traffic on all ports, with any password."

I actually optimized the algorithm myself at the time (based on a less
optimal implementation by a friend of mine), just for fun.  IIRC, I got
it to run in under 100 ms worst-case on my 533 MHz Alpha (which felt
like a very fast machine).  It did not actually have to try all keys, but
it could skip over entire blocks of known-wrong keys (PRNG seed values).

Oh, I found this optimization (turns out I still have a copy of the code):

  for (key = 2531011UL; key < 2531011UL + 0xCDCBUL * 214013UL; key += 
214013UL) {
diff = (match0 - (key & 0xFFUL)) & 0xFFUL;
if ((diff -= 0x1L) > 0)
  key += diff / 214013UL * 214013UL;
else if (match0 == (key & 0xFFUL)) {
  hold = key;
  pos = 1;
  while (1) {
if (match[pos] != ((hold = hold * 214013UL + 2531011UL) & 0xFF))
  break;
pos++;
if (pos == MAGICSTRINGLEN)
  return (key - 2531011UL) / 214013UL;
  }
}
  }

(Hmm, appears to run in under 3 ms on a current 2.5 GHz CPU.  Must have
been something like 15 ms to 30 ms on the Alpha, then.)

Many of the integer variables are 64-bit here.  IIRC, it's this line:
  key += diff / 214013UL * 214013UL;
that skipped blocks of keys.  There's further room for optimization here
(even this one line could be written better), but it was just an
unreleased hack.  As I mentioned above, others did presumably the same
thing for at least one commercial product.  Or maybe they used a table
lookups based algorithm.  IIRC, the seed value was 32-bit, which is too
small for real crypto anyway, but it could be large enough to make
real-time detection by IDS impractical at the time if key-skipping and
table lookups were not possible.

Indeed, this was not real crypto in many other aspects as well.

Alexander
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Tom Ritter
On 27 November 2011 20:10, Steven Bellovin  wrote:
> Does anyone know of any (verifiable) examples of non-government enemies
> exploiting flaws in cryptography?  I'm looking for real-world attacks on
> short key lengths, bad ciphers, faulty protocols, etc., by parties other
> than governments and militaries.  I'm not interested in academic attacks

The Padding Oracle attack enabled real-world attacks on both common
(DotNetNuke) and proprietary .Net and JSF web applications, as well as
CAPTCHAs.  Based on emails I've seen, this was widely exploited
online.

The BEAST attack on TLS was demonstrated practically, but wasn't
exploited widely AFAIK, which is the same case for the MD5-colliding
CA cert.

The console hacking scene may have more examples besides the PS3 break
mentioned by Marsh.  XBox 360 was rooted using a glitch attack to make
a hash comparison fail:
http://www.free60.org/Reset_Glitch_Hack
This may not be what you're looking for, but inducing a fault to
bypass a cryptographic check is at least on the same street.

Several "encrypted" hard drives are crappy implementations.  This one:
http://www.h-online.com/security/features/Cracking-budget-encryption-746225.html
was broken after discovering its encryption was just a matrix
multiplication.  I'd say this is actually farther from crypto than the
fault attack.

The Debian Weak Key bug produced many exploitable scenarios, although
I'm not sure if there are public tales of one being actively
exploited.

There was also a presentation in the last three years about practical
crypto attacks on web applications.   I believe it had two examples,
one of which was a crappy RNG in the password reset mechanism of a
popular web framework.  I can't for the life of me find it after
searching for 30 minutes though.  (There was another recently I
believe around a timing attack on string comparisons but that's not
really crypto.)

-tom
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Florian Weimer
* Steven Bellovin:

> Does anyone know of any (verifiable) examples of non-government enemies
> exploiting flaws in cryptography?

DeCSS and subsequent DRM failures (including modchips), L0phtcrack,
the IMSI catcher*, some Elcomsoft products (particularly those better
than brute force), attacks on WEP, debit card skimming*, attacks on
malware encryption schemes by the AV industry.

All these have been productized in some form or other, which suggests
that some sort of "enemy exploitation" exists in this context.

* depending on your definition of cryptography
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Marsh Ray

Steven Bellovin  wrote:

Does anyone know of any (verifiable) examples of non-government
enemies exploiting flaws in cryptography?  I'm looking for
real-world attacks on short key lengths, bad ciphers, faulty
protocols, etc., by parties other than governments and militaries.
I'm not interested in academic attacks


Here are some ideas. I can probably run down some specific details and 
references if you need them:


* Cases of breached databases where the passwords were hashed and maybe 
salted, but with an insufficient work factor enabling dictionary attacks.


* NTLMv1/MSCHAPv1 dictionary attacks.

* NTLMv2/MSCHAPv2 credentials forwarding/reflection attacks.

* Here's an example of RSA-512 certificates being factored and used to 
sign malware:

http://blog.fox-it.com/2011/11/21/rsa-512-certificates-abused-in-the-wild/



On 11/27/2011 02:23 PM, Landon Hurley wrote:

-BEGIN PGP SIGNED MESSAGE- Hash: SHA512
GSM and the Kaos club expert would be a good example.


...and non-academic researchers would seem to be an important category.

* There's the fail0verflow break of the specific use of
ECC in the Sony PlayStation 3.
http://www.theregister.co.uk/2010/12/30/ps3_jailbreak_hack/

The copy protection industry would seem fertile ground for this sort of 
example.



So would the recent $200 hardware break of hdmi encryption.


* http://aktuell.ruhr-uni-bochum.de/pm2011/pm00386.html.en
As I read it the HDMI master key was leaked, perhaps by an insider, in 
2010. The $200 hardware was basically an implementation of the protocol 
using that key.


* Last but not least, there's DeCSS. The DVD consortium was dumb enough 
to distribute the decryption key in a software player where it could be 
examined so maybe it's not a crypto break like you're looking for. On 
the other hand, having a single symmetric key for a mass-produced 
consumer distribution channel certainly counts as a faulty protocol.



-- I want to be able to give real-world advice -- nor am I looking

for yet another long thread on the evils and frailties of PKI.


Say, anyone looked at the Bitcoin prices lately? :-)

- Marsh
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Landon Hurley
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

GSM and the Kaos club expert would be a good example. So would the recent $200 
hardware break of hdmi encryption.

Steven Bellovin  wrote:

>Does anyone know of any (verifiable) examples of non-government enemies
>exploiting flaws in cryptography?  I'm looking for real-world attacks
>on
>short key lengths, bad ciphers, faulty protocols, etc., by parties
>other
>than governments and militaries.  I'm not interested in academic
>attacks
>-- I want to be able to give real-world advice -- nor am I looking for
>yet another long thread on the evils and frailties of PKI.
>
>
>   --Steve Bellovin, https://www.cs.columbia.edu/~smb
>
>
>
>
>
>___
>cryptography mailing list
>cryptography@randombit.net
>http://lists.randombit.net/mailman/listinfo/cryptography

Mathematics is the part of science you could continue to do if you woke up one 
morning and the universe was gone.
-BEGIN PGP SIGNATURE-
Version: APG v1.0.8
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=7GPe
-END PGP SIGNATURE-

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Non-governmental exploitation of crypto flaws?

2011-11-27 Thread Steven Bellovin
Does anyone know of any (verifiable) examples of non-government enemies
exploiting flaws in cryptography?  I'm looking for real-world attacks on
short key lengths, bad ciphers, faulty protocols, etc., by parties other
than governments and militaries.  I'm not interested in academic attacks
-- I want to be able to give real-world advice -- nor am I looking for
yet another long thread on the evils and frailties of PKI.


--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography