CRYPTO-GRAM, February 15, 2000
From
Bruce Schneier <schneier@counterpane.com>
Date
Tue, 15 Feb 2000 23:33:58 -0600
[: hacktivism :]
CRYPTO-GRAM
February 15, 2000
by Bruce Schneier
Founder and CTO
Counterpane Internet Security, Inc.
schneier@counterpane.com
http://www.counterpane.com
A free monthly newsletter providing summaries, analyses, insights, and
commentaries on computer security and cryptography.
Back issues are available at http://www.counterpane.com. To subscribe or
unsubscribe, see below.
Copyright (c) 2000 by Counterpane Internet Security, Inc.
** *** ***** ******* *********** *************
In this issue:
Distributed Denial-of-Service Attacks
New Chinese Cryptography Regulations
Counterpane Internet Security News
Publicizing Vulnerabilities
Counterpane -- Featured Research
News
Mitnick Case Yields New Crypto Twist
The Doghouse: X.com
Cookies
Comments from Readers
** *** ***** ******* *********** *************
Distributed Denial-of-Service Attacks
Suddenly, distributed denial-of-service (DDS) attacks are big news. The
first automatic tools for these attacks were released last year, and CERT
sent out an advisory in November. But the spate of high-profile attacks in
mid-February has put them on the front pages of newspapers everywhere.
Not much is new. Denial-of-service attacks have been going on for
years. The recent attacks are the same, only this time there is no single
source of the attack. We've seen these for years, too. The attacker first
breaks into hundreds or thousands of random insecure computers (called
"zombies") on the Internet and installs an attack program. Then he
coordinates them all to attack the target at the same time. The target is
attacked from many places at once; his traditional defenses just don't
work, and he falls over dead.
It's very much like the pizza delivery attack: Alice doesn't like Bob, so
she calls a hundred pizza delivery parlors and, from each one, has a pizza
delivered to Bob's house at 11:00 PM. At 11, Bob's front porch is filled
with 100 pizza deliverers, all demanding their money. It looks to Bob like
the pizza Mafia is out to get him, but the pizza parlors are victims
too. The real attacker is nowhere to be seen.
This sounds like a complicated attack on the Internet, and it is. But
unfortunately, it only takes one talented programmer with a poor sense of
ethics to automate and distribute the attacks. Once a DDS tool is publicly
available, an attacker doesn't need skill; he can use a simple
point-and-click interface to infect the intermediate sites, as well as to
coordinate and launch the attack. This is what's new: easy-to-use DDS
tools like Trin00 and Tribal Flood Network.
These attacks are incredibly difficult, if not impossible, to defend
against. In a traditional denial-of-service attack, the victim computer
might be able to figure out where the attack is coming from and shut down
those connections. But in a distributed attack, there is no single
source. The computer should shut down all connections except for the ones
it knows to be trusted, but that doesn't work for a public Internet site.
Other defenses also have problems. I've seen proposals that force the
client to perform an expensive calculation to make a connection. (RSA
pre-announced such a "solution.") This works against standard
denial-of-service attacks, but not against a distributed one. Large-scale
filtering at the ISPs can help, but that requires a lot of effort and will
reduce network bandwidth noticeably.
At least one report has suggested that a lack of authentication on the
Internet is to blame. This makes no sense. The packets did harm just by
the attempt to deliver them; whether or not they were authenticatable is
completely irrelevant. Mandatory authentication would do nothing to
prevent these attacks, or to track down the attackers.
There have been two academic conferences on DDS attacks in recent weeks,
and the general consensus is that there is no way to defend against these
attacks. Sometimes the particular bugs exploited in the DDS attacks can be
patched, but there are many that cannot. The Internet was not designed to
withstand DDS attacks.
Tracing the attacker is also incredibly difficult. Going back to the pizza
delivery example, the only thing the victim could do is to ask the pizza
parlors to help him catch the attacker. If all the parlors coordinated
their phone logs, maybe they could figure out who ordered all the pizzas in
the first place. Something similar is possible on the Internet, but it is
unlikely that the intermediate sites kept good logs. Additionally, it is
easy to disguise your location on the Internet. And if the attacker is in
some Eastern European country with minimal computer crime laws, a bribable
police, and no extradition treaties, there's nothing you can do anyway.
So far, these attacks are strictly denial-of-service. They do not affect
the data on the Web sites. These attacks cannot steal credit card numbers
or proprietary information. They cannot transfer money out of your bank
account to trade stocks in your name. Attackers cannot gain financially
from these attacks. Still, they are very serious. And it is certainly
possible that an attacker can use denial of service as a tool for a more
complicated attack that IS designed to steal something.
This is not to say that denial-of-service attacks are not real, or not
important. For most big corporations, the biggest risk of a security
breach is loss of income or loss of reputation, either of which is achieved
by a conspicuous denial-of-service attack. And for companies with more
mission- or life-critical data online, a DOS attack can literally put a
person's life at risk.
The real problem is that there are hundreds of thousands, possibly
millions, of innocent naive computer users who are vulnerable to
attack. They're using DSL or cable modems, they're always on the Internet
with static IP addresses, and they can be taken over and used as launching
pads for these (and other) attacks. The media is focusing on the mega
e-corporations that are under attack, but the real story is the individual
systems.
Similarly, the real solutions are of the "civic hygiene" variety. Just as
malaria was defeated in Washington, DC, by draining all the swamps, the
only real way to prevent these attacks is to protect those millions of
individual computers on the Internet. Unfortunately, we are building
swampland at an incredible rate, and securing everything is
impracticable. Even if personal firewalls had a 95% market penetration,
and even if they were all installed and operated perfectly, there would
still be enough insecure computers on the Internet to use for these attacks.
I believe that any long-term solution will involve redesigning the entire
Internet. Back in the 1960s, some people figured out that you could
whistle, click, belch, or whatever into a telephone and make the system do
things. This was the era of phone phreaking: black boxes, blue boxes,
Captain Crunch whistles. The phone company did their best to defend
against these attacks, but the basic problem was that the phone system was
built with "in-band signaling": the control signal and the data signal
traveled along the same wires. In the 1980s, the phone company completely
redesigned the phone system. For example SS7, or Signaling System 7, was
out-of-band. The voice path and data path were separated. Now it doesn't
matter how hard you whistle into the phone system: the switch isn't
listening. The attacks simply don't work. (Red boxes still work, against
payphones, by mimicking the in-band tones that count the coins deposited in
the phones.)
In the long term, out-of-band signaling is the only way to deal with many
of the vulnerabilities of the Internet, DDS attacks among
them. Unfortunately, there are no plans to redesign the Internet in this
way, and any such undertaking might be just too complicated to even consider.
Discussion of DDS attacks:
<http://staff.washington.edu/dittrich/talks/cert/>
CERT Advisory:
<http://www.cert.org/incident_notes/IN-99-07.html>
Tool to check if Tribal Flood Network or Trin00 is installed on your computer:
<http://www.nfr.net/updates/>
Tutorial on DOS attacks:
<http://www.hackernews.com/bufferoverflow/00/dosattack/dosattack.html>
Trin00 Analysis:
<http://staff.washington.edu/dittrich/misc/trinoo.analysis>
Tribal Flood Network Analysis:
<http://staff.washington.edu/dittrich/misc/tfn.analysis>
Stacheldraht Analysis:
<http://staff.washington.edu/dittrich/misc/stacheldraht.analysis>
Declan McCullagh's essay on the topic:
<http://www.wired.com/news/politics/0,1283,34294,00.html>
** *** ***** ******* *********** *************
New Chinese Cryptography Regulations
Claiming that they are trying to prevent state secrets from being stolen,
China has issued some strict Internet cryptography controls. First,
everyone who uses encryption has to register with the government and give
the details of what software they are using and the algorithm, users'
names, e-mail addresses, as well as the location of their
computers. Second, Chinese companies are prohibited from buying products
containing encryption software that was designed overseas. (So if a U.S.
software company wants to sell encryption in its product, it needs to rip
out whatever it has now and install something Chinese-made.)
This is a weird one, and I have a few observations. One, China is probably
afraid that foreign security products have back doors. This is possible,
and something that the U.S. has done before. But I don't see how enforcing
requirements on crypto algorithms help here. Back doors are usually much
more subtle than a broken crypto algorithm,
Two, this could easily be a prelude to key escrow. Certainly the first
step toward requiring people to give a copy of their encryption keys to the
government is to find out who is using encryption, and what kind.
Three, even by itself this information is useful for Chinese
espionage. Traffic analysis is a very difficult problem, and knowing who
is using encryption software (and where they are physically located) makes
it a lot easier to know who to target.
People with a lot more political expertise than I have said that this is
really nothing. China demanded that all fax machines be registered a
decade ago, and many didn't bother to comply.
<http://www.wired.com/news/print/0,1294,33910,00.html>
<http://www.usatoday.com/life/cyber/tech/cth217.htm>
<http://www.currents.net/newstoday/00/01/27/news6.html>
** *** ***** ******* *********** *************
Counterpane Internet Security News
Lots of excitement; still lots of secrecy. We're up to 45 employees and
still growing. If anyone knows of a good VP of Marketing who likes
commuting to San Jose, send him my way.
The Counterpane Web site has a new look. Visit it:
<http://www.counterpane.com>
Bruce Schneier is speaking at PC Forum, on March 15th:
<http://www.edventure.com/PC2000/>
** *** ***** ******* *********** *************
Publicizing Vulnerabilities
Last month I discussed publicity attacks, and the tendency of vendors to
hype security vulnerabilities as publicity for their products and
services. My essay generated a lot of commentary (see the end of the
article for some URLs). This is a complicated issue, with gray areas,
slippery slopes, and a lot of room for debate. My position has changed
over time. I'd like to revisit it.
There are really two issues here, intertwined. If someone discovers a
vulnerability in a product, should he quietly alert the vendor or should he
make it public? And when is a vulnerability important and when is it trivial?
The first issue involves some history.
In 1988, the Morris Worm illustrated how susceptible the Internet is to
attack. The Defense Advanced Research Projects Agency (DARPA) funded a
group to coordinate responses to these kinds of attacks, increase security
awareness, and generally do good things for Internet security. The group
is known as CERT -- more formally, the Computer Emergency Response Team --
and its response center is at Carnegie Mellon University in Pittsburgh.
Over the years CERT has acted as kind of a clearinghouse for security
vulnerabilities. People are supposed to send vulnerabilities they discover
to CERT. CERT then verifies that the vulnerability is real, quietly alerts
the vendor, and publishes the details (and the fix) once the vendor has
fixed the vulnerability.
This sounds good in theory, but worked less well in practice. There were
three main complaints. First, CERT got a lot of vulnerabilities reported
to it, and there were complaints about CERT being slow in verifying
them. Second, the vendors were slow about fixing the vulnerabilities once
CERT told them. Since CERT wouldn't publish until there was a fix, so
there was no real urgency to fix anything. And third, CERT was slow about
publishing reports even after the fixes were implemented.
The "full disclosure" movement was born out of frustration with this
process. Internet mailing lists like Bugtraq (begun in 1993) and NT
Bugtraq (begun in 1997) became forums for people who believe that the only
way to improve security is to understand and publicize the problems. This
was a backlash against the ivory tower attitude of CERT. As one hacker
wrote: "No more would the details of security problems be limited to closed
mailing lists of so-called security experts or detailed in long,
overwrought papers from academia. Instead, the information would be made
available to the masses to do with as they saw fit."
Today, many researchers publish vulnerabilities they discover on these
mailing lists, sometimes accompanied by press releases and the usual flurry
of factoids. The press trolls these mailing lists, and writes about the
vulnerabilities in the computer magazines: both paper-based and
online. (This is why there have been so many more press stories about
computer vulnerabilities over the past few years.) The vendors scramble to
patch these vulnerabilities as soon as they are publicized, so they can
write their own press releases about how quickly and thoroughly they fixed
things. The full disclosure movement is improving Internet security.
At the same time, hackers use these mailing lists to learn about
vulnerabilities and write attack programs (called "exploits"). Sometimes
the researchers themselves write demonstration exploits. Sometimes others
do. Some of these attacks are complicated; but as soon as someone writes a
point-and-click exploit, anyone can exploit the vulnerability.
Those against the full-disclosure movement argue that publishing
vulnerability details does more harm than good by arming the criminal
hackers with tools they can use to break into systems. Security is much
better served, they counter, by not publishing vulnerabilities in all their
gory details.
Full-disclosure proponents counter that this assumes that the researcher
who publicizes the vulnerability is always the first one to discover it,
which simply isn't true. Sometimes, vulnerabilities have been known by
attackers (sometimes passed about quietly in the hacker underground) for
months or years before the vendor ever found out. The sooner a
vulnerability is publicized and fixed, the better it is for everyone.
That's the debate in a nutshell: Is the benefit of publicizing an attack
worth the increased threat of the enemy learning about it? (In the
language of the intelligence community, this is known as the "equities
issue.") If vulnerabilities are not published, then the vendors are slow
(or don't bother) to fix them. But if the vulnerabilities are published,
then hackers write exploits to take advantage of them.
In general, I am in favor of the full-disclosure movement, and think it has
done a lot more to increase security than it has to decrease
it. Publicizing a vulnerability doesn't cause it to come into existence;
it existed even before it was publicized. Given that most vendors don't
bother fixing vulnerabilities that are not published, publicizing is the
first step towards closing that vulnerability. Punishing the publicizer
feels a lot like shooting the messenger; the real blame belongs to the
vendor that released software with the vulnerability in the first place.
The second issue -- the one that generated most of the discussion last
month -- involves the agenda of the researcher. Publishing a security
vulnerability is a play for publicity; the researcher is looking to get his
own name in the newspaper by successfully bagging his prey. The publicizer
often has his own agenda: he's a security consultant, or an employee of a
company that offers security products or services. This is especially true
if the vulnerability is publicized in a press release. Services like PR
Newswire and Business Wire are expensive, and no one would do it unless
they thought they were getting something in return.
All researchers are guilty of courting publicity. I am guilty of this. It
was fun when my Microsoft PPTP break hit the press. Calling the protocol
"kindergarten cryptography" was a hoot. On the other hand, I objected to
nCipher's publication of their key finding attack last month. The
differences are subtle and there's a lot of gray area, but here are my rules.
First, I am opposed to attacks that primarily sow fear. Publishing
vulnerabilities that there's no real evidence for is bad. Publishing
vulnerabilities that are more smoke than fire is bad. Publishing
vulnerabilities in critical systems that cannot be easily fixed and whose
exploitation will cause serious harm (e.g., the air traffic control system)
is bad.
Second, I believe in giving the vendor advance notice. CERT took this to
an extreme, sometimes giving the vendor years to fix the problem. I'd like
to see the researcher tell the vendor that he will publish the
vulnerability in a month, or three weeks (no fair giving the vendor just
seven days to fix the problem). Hopefully the vulnerability announcement
can occur at the same time as the patch announcement. This benefits
everybody. (Admittedly, I did not do this with Microsoft PPTP.)
Third, I believe that it is irresponsible, and possibly criminal, to
distribute exploits. Reverse-engineering security systems, discovering
vulnerabilities, and writing research papers about them benefits research;
it makes us smarter at designing secure systems. Distributing exploits
just make us more vulnerable. For example, Mixter is a German hacker who
wrote the Tribal Flood Network tool used in some of the distributed
denial-of-service attacks. I believe he has a lot to answer for. His
attack tool served no good. It enabled criminals and cost a lot of
companies a lot of money. Its existence makes networks less secure.
This is not clear-cut: there are tools that do both good and
bad. Vulnerability assessment tools can be used both to increase security,
and to break into systems. Remote administration tools look a lot like
Back Orifice. Publishing tools can also help; Microsoft has lied to the
press and denied that a published vulnerability is real, until an actual
exploit appeared.
I like Marcus Ranum's "be part of the solution, not part of the problem"
metric. Full disclosure is part of the solution. Convincing vendors to
fix problems is part of the solution. Sowing fear is part of the
problem. Handing computer weaponry to clueless teenagers is part of the
problem.
These are my opinions; they have changed over time, and are probably still
changing. I came to this field via cryptography. Cryptography is by
nature adversarial, even in the ivory towers of academia. Someone proposes
a new scheme: an algorithm, a protocol, a technique. Someone else breaks
it. A third person repairs it. And so on. It's all part of the fun, and
this is how I learned. I first came to network security with this
philosophy. But when it comes to fielded systems, things can get a lot
trickier. Publishing vulnerabilities can cause significant damage to
networks, and considerable pain and suffering for network
administrators. If an announcement, product, or exploit makes things
worse, it's bad. If it makes things better, it's good.
My original essay:
<http://www.counterpane.com/crypto-gram-0001.html#KeyFindingAttacksandPublic
ityAttacks>
One response:
<http://www.securityfocus.com/templates/forum_message.html?forum=2&head=754%
20&id=754>
A response to that response:
<http://www.securityfocus.com/templates/forum_message.html?forum=2&head=754%
20&id=789>
The discussion on SlashDot:
<http://slashdot.org/articles/00/01/17/0839211.shtml>
Marcus Ranum's essay on the topic:
<http://www.clark.net/pub/mjr/pubs/dark/>
See also the reader comments at the end of this issue.
** *** ***** ******* *********** *************
Counterpane -- Featured Research
"A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish"
Niels Ferguson, John Kelsey, Bruce Schneier, Doug Whiting
The Twofish AES submission document contains a partial chosen-key and a
related-key attack against ten rounds of Twofish without whitening, using
256-bit keys. This attack does not work; it makes use of a postulated
class of weak key pairs which has the S-box keys and eight successive round
keys equal, but no such pairs exist. In this report we analyze the
occurrence of this kind of weak key pair and describe how such pairs may be
used both to mount attacks on reduced-round Twofish and to find properties
of reduced-round Twofish that are not present in an ideal cipher. We find
that related-key and chosen-key attacks are considerably less powerful
against Twofish than was previously believed.
<http://www.counterpane.com/twofish-related.html>
** *** ***** ******* *********** *************
News
One of the nicer things about living in Minneapolis:
<http://www.ag.state.mn.us/home/files/news/pr_conspriv_011300.html>
GCHQ (the British NSA equivalent) is looking for recruits. Take the test
on their Web site.
<http://www.gchq.gov.uk/>
Various pundits have said that the government is still winning the crypto
battle as long as Windows is shipping without strong crypto. Guess what?
Microsoft has said that it would release Windows 2000 worldwide with strong
cryptography.
<http://www.wired.com/news/technology/0,1282,33745,00.html>
A brute-force machine for a combination lock:
<http://vv.carleton.ca/~neil/robotics/locraker.html>
Would you hire hackers? Some backlash to the @stake announcement:
<http://www.zdnet.com/enterprise/stories/security/news/0,7922,2420340,00.html>
Why security policies fail:
<http://www.cdc.com/solutions/whitepapers/Why_Security_Policies_Fail.pdf>
Another distributed attack against a 56-bit cipher, one called the
CS-Cipher. This one took 62 days on about 38,000 machines, and happened to
require searching 98% of the keyspace.
<http://www.wired.com/news/print/0,1294,33695,00.html>
Nice article on how easy it is to hack into Web sites:
<http://www.pcworld.com/current_issue/article/0,1212,14415,00.html>
The NSA has contracted with Secure Computing Corp. for a secure version of
Linux. Personally, I don't know if the Linux license allows the NSA to
make a secure version of the operating system if they are not going to
freely distribute the results.
<http://www.fcw.com/fcw/articles/web-nsalinux-01-17-00.asp>
The U.S. government and cyber crime:
<http://www.currents.net/newstoday/00/01/17/news4.html>
<http://www.fcw.com/fcw/articles/web-fbi-01-14-00.asp>
<http://www.computerworld.com/home/print.nsf/all/000111DBFE>
<http://washingtonpost.com/wp-srv/business/feed/a39572-2000jan13.htm>
The new export rules and the Bernstein case:
<http://www.wired.com/news/print/0,1294,33651,00.html>
In a nice piece of irony, the new U.S. crypto regulations will benefit
federal agencies:
<http://www.fcw.com/fcw/articles/web-export-01-14-00.asp>
Other commentary on the new encryption regulations:
<http://www.computerworld.com/home/print.nsf/all/000113DD42>
<http://www.usatoday.com/life/cyber/tech/cth136.htm>
New service monitors what radio station you're listening to:
<http://www.wired.com/news/technology/0,1282,33799,00.html?tw=wn20000125>
Windows 2000 has its first virus:
<http://www.computerworld.com/home/print.nsf/all/000113DD52>
and its first security holes:
<http://dailynews.yahoo.com/h/zd/20000130/tc/20000130748.html>
Remember, it hasn't even been released yet.
I'm not the only one who thinks Internet voting is a dumb idea. The
"California Internet Voting Task Force" agrees.
<http://www.ss.ca.gov/executive/ivote/>
This is the most clever piece of credit-card fraud I've seen in a long time:
<http://www.zdnet.com/zdnn/stories/news/0,4586,2427490,00.html?chkpt=zdhpnew
s01>
More information on the French smart card hack:
<http://www.msnbc.com/news/361936.asp>
<http://www.theregister.co.uk/000123-000005.html>
<http://www.parodie.com/english/smartcard.htm>
Someone is suing Yahoo for violating Texas's anti-stalking law by using
cookies to track computer users' every move without their consent:
<http://news.cnet.com/category/0-1005-200-1533164.html>
Twofish on the AS/400:
<http://www.news400.com/features/newmf/Article.cfm?ArticleID=13333>
Snake-oil alert. Remember, it is possible -- although unlikely -- that
this is as good as NEC's PR department makes it sound. But it will take
years to know.
<http://www.theregister.co.uk/000127-000025.html>
<http://www.cnn.com/2000/TECH/computing/01/24/nec.strong.encrypt/index.html>
Good summaries of the DVD break and deCSS. An important point is that DVDs
can be copied and pirated without using deCSS or any other decryption,
which certainly makes the original claim of "prevents piracy" look either
astoundingly ignorant or brazenly deceptive.
<http://www.fool.com/portfolios/rulemaker/2000/rulemaker000127.htm>
<http://www.latimes.com/news/comment/20000207/t000012301.html>
<http://linuxtoday.com/stories/16556.html>
Recently declassified NSA documents. 9 and 12 mention ECHELON:
<http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB23/index2.html>
General information:
<http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB23/index.html>
Worth reading. EPIC's testimony on digital infrastructure protection.
<http://www.epic.org/security/EPIC_testimony_0200.pdf>
House passes digital signature legislation:
<http://www.cnn.com/2000/TECH/computing/01/31/esignatures/>
France sues the U.S. and U.K. over ECHELON:
<http://www.the-times.co.uk/news/pages/tim/2000/02/10/timfgneur01007.html?999>
Former CIA director John Deutch brought classified information home on his
unsecured laptop.
<http://www.fcw.com/fcw/articles/2000/0131/web-security-02-04-00.asp>
<http://www.wired.com/news/print/0,1294,34105,00.html>
New vulnerabilities in e-commerce. Some shopping carts allow shoppers to
alter fields in HTML forms and URLs to alter prices of items they are buying.
<http://www.computerworld.com/home/print.nsf/all/000202E636>
<http://www.usatoday.com/life/cyber/nb/nb2.htm>
<http://www.theregister.co.uk/000203-000006.html>
** *** ***** ******* *********** *************
Mitnick Case Yields New Crypto Twist
When Kevin Mitnick was captured, federal agents seized two of his laptop
computers. Several files on those computers were encrypted. During
pre-trial discovery, the prosecution refused to give copies of the
encrypted files to the defense unless Mitnick gave them the key. The
defense argued that the Constitution required the government to turn over
any documents that might help Mitnick defend himself. The prosecution
argued that since they had no idea what was in the files, they could be
potentially dangerous. Unfortunately, the judge agreed with the prosecution.
<http://www.nytimes.com/library/tech/00/01/cyber/cyberlaw/28law.html>
** *** ***** ******* *********** *************
The Doghouse: X.com
A bank where you can withdraw money not just from your account, but from
anyone's account. My favorite quote from X.com's CEO: "I don't think a
mistake was made." Sadly, I believe him.
<http://www.zdnet.com/zdnn/stories/news/0,4586,2429999,00.html>
<http://www.currents.net/newstoday/00/01/31/news4.html>
<http://www.nytimes.com/library/tech/00/01/biztech/articles/28secure.html>
** *** ***** ******* *********** *************
Cookies
Cookies are a clever programming trick built into WWW browsers. Basically,
a cookie is a little bit of data that a Web server gives to a browser. The
browser stores the data on the user's computer, and returns it to the
server whenever the browser returns to the server. Cookies can do all
sorts of useful and good things. Unfortunately, they can also do all sorts
of useful bad things. First I'll explain how they work; then I'll talk
about the problems.
The WWW is basically a stateless protocol. This means that the server
doesn't know who you are from one click to the next. All the server does
is serve up Web pages. A browser asks for a Web page; the server gives it
to it. The server has no idea if this is the same browser as before or a
different browser, nor does it care. This works great for simple, static,
Web sites that just contain informational pages.
More complex Web sites are dynamic. Retail Web sites often have shopping
carts, which travel with you as you browse the site. Paid access
informational sites have usernames and passwords, which travel with you as
you go from page to page. (I would find it annoying to have to type my
username and password in every time I wanted to see another New York Times
article.) Cookies are a way to handle this.
Remember that the WWW protocols are stateless; there is no way for the
server to remember who you are from one mouse click to the next. By giving
the browser a cookie and then asking for it back, the server can remember
who you are. "Oh yes, you're user 12345657; this is your shopping
cart." Cookies allow the browser to add state to the WWW protocols. You
can think of them as a large distributed database, with pieces stored on
millions of browsers throughout user-land.
So far, so good. And mostly, cookies are good, if the server placing the
cookie plays by the rules. The server can set how long the cookie lasts
before it expires: a few days seems like a good number. A server can set
restrictions on who can access the cookie. They usually limit access to
servers in the same domain; this means that if your cookie comes from
random-merchant.com, than only random-merchant.com can access the cookie.
The problems come when they are abused. Some servers use cookies to track
users from site to site, and some use them to uncover the identity of the
user. Here's an easy example: there are companies that resell advertising
space on popular sites. DoubleClick is a company that does that; often the
ads you see are placed there by DoubleClick in arrangement with the
site. If you're browsing on sex-site.com, you're going to see a portion of
that window that comes from DoubleClick.com. DoubleClick.com gives you a
cookie. Later (that day, or maybe another day), when you're browsing on
CDNow.com, there might be another DoubleClick-placed ad. DoubleClick can
request the cookie from your browser and, because the cookie says that it
was created while you were visiting a sex site, send you targeted ads while
you're browsing CDNow. Because DoubleClick is on a bunch of commerce
sites, its cookies can be used to track you across all of those sites.
Even worse, if you type your e-mail address in at any of those sites and
DoubleClick gets it, DoubleClick can now attach an e-mail address to your
browsing habits. All it needs is for you to type that address in once --
that's ordering only one thing -- and it has it forever. (Or, for as long
as that cookie has not expired, which can be years.)
DoubleClick freely admits they collect data and use that data to target ads
to users, but until recently they denied building an identity
database. Two weeks ago, USA Today exposed their duplicity. They have
since admitted that they try to collect names and attach cookies to
off-line identities. The implications for private Web browsing are profound.
There's more. Sites can send you a cookie in e-mail that it can use to
identify you if you later visit that site with your browser. Here's how it
works: the site sends you a piece of HTML e-mail. (This implies you're
using an e-mail program that supports HTML messages, such as Microsoft's
Outlook and Outlook Express, Netscape Messenger, or Eudora.) The message
contains a URL to a graphic, which the site can use to send you a
cookie. Now, when you browse the site at some later date, the site can use
the cookie to link the browsing with the e-mail, and hence the e-mail
address. Supposedly this has been used by some sites to track Web surfers.
Some things cookies cannot do: Cookies cannot steal information from your
computer. A cookie is simply some data that the server gives the browser,
and the browser later returns. A cookie cannot grab your passwords or
files. (ActiveX, Java, and JavaScript are much more dangerous in this
regard.) Cookies cannot steal your credit card numbers.
The lesson here is that cookies are not bad, but there are some very
malevolent uses of them. There are ways in most browsers to turn cookies
off completely, and third-party programs that help you manage them
better. Managing is a better solution, since some Web sites refuse entry
to people who don't accept cookies.
"Opt out" of DoubleClick. They can't keep your personal information if you
tell them not to. DO THIS NOW.
<http://www.cdt.org/action/doubleclick.shtml>
Cookie blocking software:
<http://www.junkbusters.com/ht/en/cookies.html>
<http://www.ecst.csuchico.edu/~atman/spam/adblock.shtml>
Anonymous Web browsing:
<http://www.zeroknowledge.com>
Stories on DoubleClick's duplicity:
<http://www.usatoday.com/life/cyber/tech/cth211.htm>
<http://www.hackernews.com/arch.html?012600#1>
<http://news.cnet.com/news/0-1005-200-1531929.html?dtn.head>
Lawsuit against DoubleClick:
<http://www.wired.com/news/print/0,1294,33964,00.html>
CDT's testimony on online profiling:
<http://www.cdt.org/testimony/ftc/mulliganFTC.11.30.99.shtml>
** *** ***** ******* *********** *************
Comments from Readers
From: Andrew D. Fernandes <andrew@cryptonym.com>
Subject: Publicity Attacks
I have a couple of comments regarding your "Publicity Attack" article in
the January Crypto-Gram.
First, you insinuated that my company, Cryptonym, being a PKI vendor, had
somehow profited by publicizing the Microsoft/NSA issue. In fact, we
didn't make a penny off of the information. Heck, I couldn't sell you
anything even if I wanted to. We are at least a year from releasing any
products whatsoever -- products that will be fully open source -- and we
only take on a very limited amount of consulting.
We thought that we were doing the "Right Thing" by publicizing the fact
that all US companies wanting to export crypto software had to involve
themselves somehow with the NSA. It was never our intention to make money
off of our finding, and so far, we haven't.
Second, you discuss publicity attacks. Apparently, we cannot trust nCipher
or eEye to discuss security because they sell security products and
consulting. In fact, at the end of the Crypto-Gram is a note indicating
that we should be wary of claims about elliptic curves made by Alfred
Menezes because he has financial interest in Certicom. I think that this
is going too far.
Yes, perhaps nCipher and eEye (and maybe even Cryptonym) did a bad job
publicizing security holes. Maybe Alfred wants to fool everybody about the
security of elliptic curves for his own nefarious gain. But get real!
Everybody in this field -- including you and Counterpane -- has strong
monetary ties to the industry, therefore everything everybody says has to
be taken in context. These financial ties do not mean that a company's
advice or press releases cannot be trusted. Taking advice about
cryptography is no different than taking advice from your lawyer. You have
to know how your lawyer will benefit from you taking their advice.
But I think it's presumptuous to imply that we lack professional integrity
if you disagree with us. For instance, why are you advising people to use
RSA over ECC? Why not ElGamal or Authenticated Diffie-Hellman? After all,
RSA is patented, while ElGamal and ADH are not... Wait! Does Counterpane
hold any shares of RSA?! Could Counterpane be making money by advising
people that ECC isn't as good as RSA?
I certainly hope not. I don't agree with your ECC vs. RSA advice (and
neither does Alfred Menezes). However, I do believe in you and your
company's professional integrity.
From: Geoff Thorpe <geoff@eu.c2.net>
Subject: nCipher's Key-Finding Attack
I was interested to read your thoughts on the nCipher-announced
key-scanning attacks. As someone who works for a company that produces an
open-source based secure web-server I would have as much temptation as
anyone to play down the importance of such attacks -- especially as the
desired inference seems to be that the web-server can't be secure unless
one shells out on hardware crypto too! However, I feel it's dangerous to
disregard what the underlying work may have to tell us about our security
and configurations, regardless of whether or not that involves taking it to
the extent that press release may like us to (which is to conclude hardware
crypto is the solution to the problem).
I do generally agree with the sentiment that these key-scanning attacks
aren't nearly as sensational as the press might like (or be led) to believe
-- key scanning is nothing new and this work has simply sped it up quite a
bit, and there are only very specialized kinds of web-server usage where
these attacks can be mounted against a server that has been set up
competently. However it is incompetently set up web-servers that are
mostly likely to be discussed to illustrate and justify attacks so we're
best to look under the hood to see what we can take and what we can discard
from all this.
IMHO, the research behind the announcement is legitimate and worthy of a
look -- if for no other reason, to get a more healthy respect for
key-protection. In particular, the research uses some interesting ideas on
scanning large blocks of data for areas of high-entropy before using more
refined search techniques to track down actual keys in the "haystack". It
rather effectively illustrates why one must have a keen eye for scenarios
where unencrypted private keys lie in any media subject to brute-force
scanning, no matter how impossibly resource intensive the scanning attacks
may at first appear. The research in question illustrates how a large
hard-disk could be scanned quite quickly to search out a private key that
may lie in it (e.g., a swap partition, a core dump, etc.). Everyone knows
an unencrypted private key is always a target -- but the research gives
some considerable warning to those who might have previously thought 1
private key in 2 Gb of data was too difficult a thing to find.
Also, the attack has at least led us to consider situations where this kind
of attack is or is not an issue rather than allowing hackers to do it for
us. The truth is that this family of attacks, at least in the case of
web-servers, is only a serious threat for multi-hosting servers that run
multiple virtual hosts in the same web-server application that is running a
secure virtual host (and does not use any setuid on the web-server child
processes). In that scenario, an administrator who can upload and activate
native (e.g., CGI) programs in their virtual host can not only scan for and
find their own private key (if they have one), but also the private keys of
any other loaded virtual hosts running in the same processes (or as the
same user). By attaching to a running process (as debuggers do) or using
some "/proc"-style mechanism to get direct access to a process's virtual
memory, you can begin your scanning as you would on a regular file. There
are not many servers running in scenarios like this (where an
"administrator" can compromise anyone except him/her-self), but the
research has at least allowed to us to consider exactly who is and isn't
vulnerable (helping the former, and providing some peace-of-mind to the
latter) before the lessons are learnt the hard way.
From: Nicko van Someren <nicko@ncipher.com>
Subject: Re: Key Finding
First, I would like to point out a significant inaccuracy in your
report. You state in the penultimate paragraph that "[the] nCipher release
included a hacker tool". This is incorrect. We have built a tool that
efficiently finds SSL server keys and we have shown it to a limited number
of web server vendors, but we have NEVER released the code; nor do we have
any intention of doing so.
On the broader issue of what you call "publicity attacks," I feel I must
defend nCipher's issuance of a press release on this topic. An essential
aspect of developing security solutions is finding the weaknesses in
existing systems, and when those weaknesses are found it is reasonable to
let those who will be affected know. After making the theoretical attacks
known in February 1999, we found that many web server vendors felt that the
attacks were impractical and ignored the issue. Thus we went on to prove
the practicality of these attacks and let the server vendors have the
details of our new results. We then went on to let the rest of the world know.
While you are right to say that nCipher has some interest in the results of
this research, it is rare for any company to carry out research without
having some interest in the results.
We stand by our stance that publication of potential modes of attack is
preferable to obscuring them and allowing them to be employed on an
unsuspecting world.
From: ruth@innocent.com
Subject: Radio Pirates
The "Radio pirates" story originated in New Scientist, where for all I know
it was told in a more balanced way, and probably had a side panel
explaining RDS technology and the reason for this vulnerability.
RDS (Radio Data System) lets consumer radios decode a low bit rate digital
signal from compatible FM broadcasts. This signal can include a station ID
(such as "BBC R4" or "KISS FM", and various other info, but there is also
an additional feature which drivers can switch on at their option called TP
(Traffic Programme) which switches to local stations when they are
broadcasting a travel update.
Just why is this a "Good illustration of the hidden vulnerabilities in
digital systems"? Even if you believed the misleading articles from the
BBC which says that "radio stays tuned in until ... the driver switches off
the RDS feature," you'd still realise that this system degrades nicely to
ordinary FM radio service at the push of a button. Actually those reports
are an exaggeration, all the RDS car radios I've ever seen had a button
labelled "TP", which when pressed enables or disables just the traffic
programme service. This leaves all the other benefits of RDS intact.
I cannot think of a mechanism that would permit radios to identify and
ignore pirate TP signals, without going to fully fledged DAB (as the UK
inevitably will in the next decade anyway)? Offering an optional additional
service which is subject to a potential DOS doesn't seem like such a
vulnerability to me.
From: anonymous
Subject: French Smart Card Break
in the December 15, 1999 issue of Crypto-Gram, you wrote:
> A French engineer succeeded in factoring the 640-bit
> RSA key stored in the chip on the card (all French
> "CB" credit cards have had a chip since 1990).
What is clearly established [agreed by Serge Humpich and the Groupement des
Cartes Bancaires in court] is that Humpich made some counterfeit Smart
Cards, with incremental account numbers, and used them to buy metro tickets
in an automatic machine, as a demonstration to the Groupement. This is
basically what he is charged for. The judge is expected to release a
verdict on February 25, 2000. A summary (in French) of the audience is at
<http://www.legalis.net/legalnet/actualite/affairehumpish/pagehumpish.htm>
>From several sources, including Humpich himself on a TV show and this
audience report, he was trying to sell his expertise to the Groupement,
through a lawyer in an attempt to remain anonymous.
The 640-bit claim originated in the "Pirate Mag" magazine (also known for
promoting the idea that PGP has a backdoor). They have an interview
<http://www.acbm.com/pirates/num_05/interview.html> of Serge Humpich where
he claims:
- He broke a "fairly solid 96 digits code" [i.e. 320 bits] used by the
Groupement for the "CB" credit cards, with details consistent with an RSA
signature scheme with simple redundancy.
- He made a spectacular demonstration to experts, factoring some special
format 640-bit public modulus, guessing the factors had been chosen close
to the square root of the modulus and with some special properties. He is
clear his method does not work in a general case. He makes no explicit
claim 640-bit signatures are used in the counterfeit Smart Cards. I failed
to find any independent confirmation of a 640-bit factorization by Humpich,
or even any other statement attributed to Humpich that he ever factored a
640-bit RSA key.
Based on undeniable evidence that the Groupement des Cartes Bancaires
originally used a systemwide 321 bits public key, and the lack of evidence
of wider keys in general use as of early 1999, many believe that the card
fraud Humpich demonstrated is a combination of:
- Factoring the systemwide public modulus of 321 bits, which corresponding
secret key is used at card issuance to produce a static 320-bit RSA
signature held in the card, certifying the 16 digits card number and expiry
date; this static signature being checked by POSTs as a simple off-line
validation of the card.
- Making working Smart Cards holding counterfeit card number, expiry date,
and signature thereof.
<http://humpich.com/>, a recent Web site on the case with sources
apparently close to Serge Humpich, describes how he factored a 321-bit key
in 1997, citing the classical MPQS factoring algorithm, modest computing
resources, and a Japanese program. They present 640-bit keys as a
reasonable choice the Groupement des Cartes Bancaires could have made, but
did not.
The same Web site contains on-line scans of publications where French
expert Louis C. Guillou, known to be involved in the design of the Smart
Card system used by the Groupement des Cartes Bancaires, warns as early as
1988 [in French] then again in 1990 [in English] that the 320 bit key then
in still-experimental use by CB is obsolete.
<http://humpich.com/LCguillou_AnnTelecom_No43_1988.jpg>
<http://humpich.com/SmartCard19900810-2.jpg>
It could be that Humpich demonstrated he can break an obsolete system,
tried to make money out of it, and as a retaliation is being sued using
whatever legal means available.
Make your own opinion.
** *** ***** ******* *********** *************
CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on computer security and cryptography.
To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
blank message to crypto-gram-subscribe@chaparraltree.com. To unsubscribe,
visit http://www.counterpane.com/unsubform.html. Back issues are available
on http://www.counterpane.com.
Please feel free to forward CRYPTO-GRAM to colleagues and friends who will
find it valuable. Permission is granted to reprint CRYPTO-GRAM, as long as
it is reprinted in its entirety.
CRYPTO-GRAM is written by Bruce Schneier. Schneier is founder and CTO of
Counterpane Internet Security Inc., the author of "Applied Cryptography,"
and an inventor of the Blowfish, Twofish, and Yarrow algorithms. He served
on the board of the International Association for Cryptologic Research,
EPIC, and VTW. He is a frequent writer and lecturer on computer security
and cryptography.
Counterpane Internet Security, Inc. is a venture-funded company bringing
innovative managed security solutions to the enterprise.
http://www.counterpane.com/
Copyright (c) 2000 by Counterpane Internet Security, Inc.
[: hacktivism :]
[: for unsubscribe instructions or list info consult the list FAQ :]
[: http://hacktivism.tao.ca/ :]