author | Christian Urban <christian dot urban at kcl dot ac dot uk> |
Thu, 15 Oct 2015 01:41:33 +0100 | |
changeset 406 | 0516bffd3f5f |
parent 383 | 3e1a2c8ed980 |
child 431 | 4b53f83c070c |
permissions | -rw-r--r-- |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
1 |
\documentclass{article} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
2 |
\usepackage{../style} |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
3 |
\usepackage{../langs} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
4 |
|
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
5 |
\lstset{language=JavaScript} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
6 |
|
366
34a8f73b2c94
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
365
diff
changeset
|
7 |
|
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
8 |
\begin{document} |
383
3e1a2c8ed980
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
381
diff
changeset
|
9 |
\fnote{\copyright{} Christian Urban, 2014, 2015} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
10 |
|
167
d8657ff8cca1
typos
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
160
diff
changeset
|
11 |
\section*{Handout 1 (Security Engineering)} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
12 |
|
366
34a8f73b2c94
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
365
diff
changeset
|
13 |
|
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
14 |
Much of the material and inspiration in this module is taken |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
15 |
from the works of Bruce Schneier, Ross Anderson and Alex |
159
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
16 |
Halderman. I think they are the world experts in the area of |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
17 |
security engineering. I especially like that they argue that a |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
18 |
security engineer requires a certain \emph{security mindset}. |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
19 |
Bruce Schneier for example writes: |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
20 |
|
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
21 |
\begin{quote} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
22 |
\it ``Security engineers --- at least the good ones --- see |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
23 |
the world differently. They can't walk into a store without |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
24 |
noticing how they might shoplift. They can't use a computer |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
25 |
without wondering about the security vulnerabilities. They |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
26 |
can't vote without trying to figure out how to vote twice. |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
27 |
They just can't help it.'' |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
28 |
\end{quote} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
29 |
|
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
30 |
\begin{quote} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
31 |
\it ``Security engineering\ldots requires you to think |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
32 |
differently. You need to figure out not how something works, |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
33 |
but how something can be made to not work. You have to imagine |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
34 |
an intelligent and malicious adversary inside your system |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
35 |
\ldots, constantly trying new ways to |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
36 |
subvert it. You have to consider all the ways your system can |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
37 |
fail, most of them having nothing to do with the design |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
38 |
itself. You have to look at everything backwards, upside down, |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
39 |
and sideways. You have to think like an alien.'' |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
40 |
\end{quote} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
41 |
|
159
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
42 |
\noindent In this module I like to teach you this security |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
43 |
mindset. This might be a mindset that you think is very |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
44 |
foreign to you---after all we are all good citizens and not |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
45 |
hack into things. I beg to differ: You have this mindset |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
46 |
already when in school you were thinking, at least |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
47 |
hypothetically, about ways in which you can cheat in an exam |
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
48 |
(whether it is by hiding notes or by looking over the |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
49 |
shoulders of your fellow pupils). Right? To defend a system, |
381
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
50 |
you need to have this kind of mindset and be able to think like |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
51 |
an attacker. This will include understanding techniques that |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
52 |
can be used to compromise security and privacy in systems. |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
53 |
This will many times result in insights where well-intended |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
54 |
security mechanisms made a system actually less |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
55 |
secure.\medskip |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
56 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
57 |
\noindent |
159
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
58 |
{\Large\bf Warning!} However, don’t be evil! Using those |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
59 |
techniques in the real world may violate the law or King’s |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
60 |
rules, and it may be unethical. Under some circumstances, even |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
61 |
probing for weaknesses of a system may result in severe |
160
4cbd6ca025e6
updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
159
diff
changeset
|
62 |
penalties, up to and including expulsion, fines and |
159
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
63 |
jail time. Acting lawfully and ethically is your |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
64 |
responsibility. Ethics requires you to refrain from doing |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
65 |
harm. Always respect privacy and rights of others. Do not |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
66 |
tamper with any of King's systems. If you try out a technique, |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
67 |
always make doubly sure you are working in a safe environment |
160
4cbd6ca025e6
updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
159
diff
changeset
|
68 |
so that you cannot cause any harm, not even accidentally. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
69 |
Don't be evil. Be an ethical hacker.\medskip |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
70 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
71 |
\noindent In this lecture I want to make you familiar with the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
72 |
security mindset and dispel the myth that encryption is the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
73 |
answer to all security problems (it is certainly often a part |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
74 |
of an answer, but almost always never a sufficient one). This |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
75 |
is actually an important thread going through the whole |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
76 |
course: We will assume that encryption works perfectly, but |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
77 |
still attack ``things''. By ``works perfectly'' we mean that |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
78 |
we will assume encryption is a black box and, for example, |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
79 |
will not look at the underlying mathematics and break the |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
80 |
algorithms.\footnote{Though fascinating this might be.} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
81 |
|
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
82 |
For a secure system, it seems, four requirements need to come |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
83 |
together: First a security policy (what is supposed to be |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
84 |
achieved?); second a mechanism (cipher, access controls, |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
85 |
tamper resistance etc); third the assurance we obtain from the |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
86 |
mechanism (the amount of reliance we can put on the mechanism) |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
87 |
and finally the incentives (the motive that the people |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
88 |
guarding and maintaining the system have to do their job |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
89 |
properly, and also the motive that the attackers have to try |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
90 |
to defeat your policy). The last point is often overlooked, |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
91 |
but plays an important role. To illustrate this lets look at |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
92 |
an example. |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
93 |
|
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
94 |
\subsubsection*{Chip-and-PIN is Surely More Secure?} |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
95 |
|
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
96 |
The questions is whether the Chip-and-PIN system used with |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
97 |
modern credit cards is more secure than the older method of |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
98 |
signing receipts at the till. On first glance the answer seems |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
99 |
obvious: Chip-and-PIN must be more secure and indeed improved |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
100 |
security was the central plank in the ``marketing speak'' of |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
101 |
the banks behind Chip-and-PIN. The earlier system was based on |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
102 |
a magnetic stripe or a mechanical imprint on the cards and |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
103 |
required customers to sign receipts at the till whenever they |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
104 |
bought something. This signature authorised the transactions. |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
105 |
Although in use for a long time, this system had some crucial |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
106 |
security flaws, including making clones of credit cards and |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
107 |
forging signatures. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
108 |
|
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
109 |
Chip-and-PIN, as the name suggests, relies on data being |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
110 |
stored on a chip on the card and a PIN number for |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
111 |
authorisation. Even though the banks involved trumpeted their |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
112 |
system as being absolutely secure and indeed fraud rates |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
113 |
initially went down, security researchers were not convinced |
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
114 |
(especially not the group around Ross Anderson). To begin with, |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
115 |
the Chip-and-PIN system introduced a ``new player'' into the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
116 |
system that needed to be trusted: the PIN terminals and their |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
117 |
manufacturers. It was claimed that these terminals were |
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
118 |
tamper-resistant, but needless to say this was a weak link in |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
119 |
the system, which criminals successfully attacked. Some |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
120 |
terminals were even so skilfully manipulated that they |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
121 |
transmitted skimmed PIN numbers via built-in mobile phone |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
122 |
connections. To mitigate this flaw in the security of |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
123 |
Chip-and-PIN, you need to be able to vet quite closely the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
124 |
supply chain of such terminals. This is something that is |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
125 |
mostly beyond the control of customers who need to use these |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
126 |
terminals. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
127 |
|
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
128 |
To make matters worse for Chip-and-PIN, around 2009 Ross |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
129 |
Anderson and his group were able to perform man-in-the-middle |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
130 |
attacks against Chip-and-PIN. Essentially they made the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
131 |
terminal think the correct PIN was entered and the card think |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
132 |
that a signature was used. This is a kind of \emph{protocol |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
133 |
failure}. After discovery, the flaw was mitigated by requiring |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
134 |
that a link between the card and the bank is established at |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
135 |
every time the card is used. Even later this group found |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
136 |
another problem with Chip-and-PIN and ATMs which did not |
383
3e1a2c8ed980
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
381
diff
changeset
|
137 |
generate random enough numbers (cryptographic nonces) on which |
3e1a2c8ed980
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
381
diff
changeset
|
138 |
the security of the underlying protocols relies. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
139 |
|
381
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
140 |
The overarching problem with all this is that the banks who |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
141 |
introduced Chip-and-PIN managed with the new system to shift |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
142 |
the liability for any fraud and the burden of proof onto the |
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
143 |
customer. In the old system, the banks had to prove that the |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
144 |
customer used the card, which they often did not bother with. |
381
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
145 |
In effect, if fraud occurred the customers were either |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
146 |
refunded fully or lost only a small amount of money. This |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
147 |
taking-responsibility-of-potential-fraud was part of the |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
148 |
``business plan'' of the banks and did not reduce their |
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
149 |
profits too much. |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
150 |
|
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
151 |
Since banks managed to successfully claim that their |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
152 |
Chip-and-PIN system is secure, they were under the new system |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
153 |
able to point the finger at the customer when fraud occurred: |
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
154 |
customers must have been negligent losing their PIN and |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
155 |
customers had almost no way of defending themselves in such |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
156 |
situations. That is why the work of \emph{ethical} hackers |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
157 |
like Ross Anderson's group was so important, because they and |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
158 |
others established that the banks' claim that their system is |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
159 |
secure and it must have been the customer's fault, was bogus. |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
160 |
In 2009 the law changed and the burden of proof went back to |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
161 |
the banks. They need to prove whether it was really the |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
162 |
customer who used a card or not. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
163 |
|
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
164 |
This is a classic example where a security design principle |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
165 |
was violated: Namely, the one who is in the position to |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
166 |
improve security, also needs to bear the financial losses if |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
167 |
things go wrong. Otherwise, you end up with an insecure |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
168 |
system. In case of the Chip-and-PIN system, no good security |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
169 |
engineer would dare to claim that it is secure beyond |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
170 |
reproach: the specification of the EMV protocol (underlying |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
171 |
Chip-and-PIN) is some 700 pages long, but still leaves out |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
172 |
many things (like how to implement a good random number |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
173 |
generator). No human being is able to scrutinise such a |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
174 |
specification and ensure it contains no flaws. Moreover, banks |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
175 |
can add their own sub-protocols to EMV. With all the |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
176 |
experience we already have, it is as clear as day that |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
177 |
criminals were bound to eventually be able to poke holes into |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
178 |
it and measures need to be taken to address them. However, |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
179 |
with how the system was set up, the banks had no real |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
180 |
incentive to come up with a system that is really secure. |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
181 |
Getting the incentives right in favour of security is often a |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
182 |
tricky business. From a customer point of view, the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
183 |
Chip-and-PIN system was much less secure than the old |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
184 |
signature-based method. The customer could now lose |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
185 |
significant amounts of money. |
173
9126c13a7d93
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
169
diff
changeset
|
186 |
|
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
187 |
\subsection*{Of Cookies and Salts} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
188 |
|
355
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
189 |
Let us look at another example which will help with understanding how |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
190 |
passwords should be verified and stored. Imagine you need to develop |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
191 |
a web-application that has the feature of recording how many times a |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
192 |
customer visits a page. For example in order to give a discount |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
193 |
whenever the customer has visited a webpage some $x$ number of times |
381
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
194 |
(say $x$ equals $5$). There is one more constraint: we want to store |
355
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
195 |
the information about the number of visits as a cookie on the |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
196 |
browser. I think, for a number of years the webpage of the New York |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
197 |
Times operated in this way: it allowed you to read ten articles per |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
198 |
month for free; if you wanted to read more, you had to pay. My best |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
199 |
guess is that it used cookies for recording how many times their pages |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
200 |
was visited, because if I switched browsers I could easily circumvent |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
201 |
the restriction about ten articles.\footnote{Another online media that |
619073c37649
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
336
diff
changeset
|
202 |
works in this way is the Times Higher Education |
381
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
203 |
\url{http://www.timeshighereducation.co.uk}. It also seems to |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
204 |
use cookies to restrict the number of free articles to five.} |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
205 |
|
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
206 |
To implement our web-application it is good to look under the |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
207 |
hood what happens when a webpage is displayed in a browser. A |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
208 |
typical web-application works as follows: The browser sends a |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
209 |
GET request for a particular page to a server. The server |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
210 |
answers this request with a webpage in HTML (for our purposes |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
211 |
we can ignore the details about HTML). A simple JavaScript |
325
48c6751f2173
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
312
diff
changeset
|
212 |
program that realises a server answering with a ``Hello |
48c6751f2173
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
312
diff
changeset
|
213 |
World'' webpage is as follows: |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
214 |
|
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
215 |
\begin{center} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
216 |
\lstinputlisting{../progs/ap0.js} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
217 |
\end{center} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
218 |
|
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
219 |
\noindent The interesting lines are 4 to 7 where the answer to |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
220 |
the GET request is generated\ldots in this case it is just a |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
221 |
simple string. This program is run on the server and will be |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
222 |
executed whenever a browser initiates such a GET request. You |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
223 |
can run this program on your computer and then direct a |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
224 |
browser to the address \pcode{localhost:8000} in order to |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
225 |
simulate a request over the internet. |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
226 |
|
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
227 |
|
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
228 |
For our web-application of interest is the feature that the |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
229 |
server when answering the request can store some information |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
230 |
on the client's side. This information is called a |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
231 |
\emph{cookie}. The next time the browser makes another GET |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
232 |
request to the same webpage, this cookie can be read again by |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
233 |
the server. We can use cookies in order to store a counter |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
234 |
that records the number of times our webpage has been visited. |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
235 |
This can be realised with the following small program |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
236 |
|
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
237 |
\begin{center} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
238 |
\lstinputlisting{../progs/ap2.js} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
239 |
\end{center} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
240 |
|
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
241 |
\noindent The overall structure of this program is the same as |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
242 |
the earlier one: Lines 7 to 17 generate the answer to a |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
243 |
GET-request. The new part is in Line 8 where we read the |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
244 |
cookie called \pcode{counter}. If present, this cookie will be |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
245 |
send together with the GET-request from the client. The value |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
246 |
of this counter will come in form of a string, therefore we |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
247 |
use the function \pcode{parseInt} in order to transform it |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
248 |
into an integer. In case the cookie is not present, we default |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
249 |
the counter to zero. The odd looking construction \code{...|| |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
250 |
0} is realising this defaulting in JavaScript. In Line 9 we |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
251 |
increase the counter by one and store it back to the client |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
252 |
(under the name \pcode{counter}, since potentially more than |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
253 |
one value could be stored). In Lines 10 to 15 we test whether |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
254 |
this counter is greater or equal than 5 and send accordingly a |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
255 |
specially grafted message back to the client. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
256 |
|
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
257 |
Let us step back and analyse this program from a security |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
258 |
point of view. We store a counter in plain text on the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
259 |
client's browser (which is not under our control). Depending |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
260 |
on this value we want to unlock a resource (like a discount) |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
261 |
when it reaches a threshold. If the client deletes the cookie, |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
262 |
then the counter will just be reset to zero. This does not |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
263 |
bother us, because the purported discount will just not be |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
264 |
granted. In this way we do not lose any (hypothetical) money. |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
265 |
What we need to be concerned about is, however, when a client |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
266 |
artificially increases this counter without having visited our |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
267 |
web-page. This is actually a trivial task for a knowledgeable |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
268 |
person, since there are convenient tools that allow one to set |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
269 |
a cookie to an arbitrary value, for example above our |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
270 |
threshold for the discount. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
271 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
272 |
There seems to be no simple way to prevent this kind of |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
273 |
tampering with cookies, because the whole purpose of cookies |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
274 |
is that they are stored on the client's side, which from the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
275 |
the server's perspective is a potentially hostile environment. |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
276 |
What we need to ensure is the integrity of this counter in |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
277 |
this hostile environment. We could think of encrypting the |
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
278 |
counter. But this has two drawbacks to do with the keys for |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
279 |
encryption. If you use a single, global key for all the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
280 |
clients that visit our site, then we risk that our whole |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
281 |
``business'' might collapse in the event this key gets known |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
282 |
to the outside world. Then all cookies we might have set in |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
283 |
the past, can now be decrypted and manipulated. If, on the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
284 |
other hand, we use many ``private'' keys for the clients, then |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
285 |
we have to solve the problem of having to securely store this |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
286 |
key on our server side (obviously we cannot store the key with |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
287 |
the client because then the client again has all data to |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
288 |
tamper with the counter; and obviously we also cannot encrypt |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
289 |
the key, lest we can solve an impossible chicken-and-egg |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
290 |
problem). So encryption seems to not solve the problem we face |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
291 |
with the integrity of our counter. |
169
2866fae8c1cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
168
diff
changeset
|
292 |
|
336
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
293 |
Fortunately, \emph{cryptographic hash functions} seem to be |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
294 |
more suitable for our purpose. Like encryption, hash functions |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
295 |
scramble data in such a way that it is easy to calculate the |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
296 |
output of a hash function from the input. But it is hard |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
297 |
(i.e.~practically impossible) to calculate the input from |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
298 |
knowing the output. This is often called \emph{preimage |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
299 |
resistance}. Cryptographic hash functions also ensure that |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
300 |
given a message and a hash, it is computationally infeasible to |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
301 |
find another message with the same hash. This is called |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
302 |
\emph{collusion resistance}. Because of these properties hash |
383
3e1a2c8ed980
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
381
diff
changeset
|
303 |
functions are often called \emph{one-way functions}: you |
336
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
304 |
cannot go back from the output to the input (without some |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
305 |
tricks, see below). |
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
306 |
|
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
307 |
|
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
308 |
|
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
309 |
|
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
310 |
|
3cb200fa6d6a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
325
diff
changeset
|
311 |
There are several such |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
312 |
hashing function. For example SHA-1 would hash the string |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
313 |
\pcode{"hello world"} to produce the hash-value |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
314 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
315 |
\begin{center} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
316 |
\pcode{2aae6c35c94fcfb415dbe95f408b9ce91ee846ed} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
317 |
\end{center} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
318 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
319 |
\noindent Another handy feature of hash functions is that if |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
320 |
the input changes only a little, the output changes |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
321 |
drastically. For example \pcode{"iello world"} produces under |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
322 |
SHA-1 the output |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
323 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
324 |
\begin{center} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
325 |
\pcode{d2b1402d84e8bcef5ae18f828e43e7065b841ff1} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
326 |
\end{center} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
327 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
328 |
\noindent That means it is not predictable what the output |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
329 |
will be from just looking at input that is ``close by''. |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
330 |
|
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
331 |
We can use hashes in our web-application and store in the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
332 |
cookie the value of the counter in plain text but together |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
333 |
with its hash. We need to store both pieces of data in such a |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
334 |
way that we can extract them again later on. In the code below |
383
3e1a2c8ed980
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
381
diff
changeset
|
335 |
I will just separate them using a \pcode{"-"}. For the |
3e1a2c8ed980
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
381
diff
changeset
|
336 |
counter \pcode{1} for example |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
337 |
|
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
338 |
\begin{center} |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
339 |
\pcode{1-356a192b7913b04c54574d18c28d46e6395428ab} |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
340 |
\end{center} |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
341 |
|
383
3e1a2c8ed980
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
381
diff
changeset
|
342 |
\noindent If we now read back the |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
343 |
cookie when the client visits our webpage, we can extract the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
344 |
counter, hash it again and compare the result to the stored |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
345 |
hash value inside the cookie. If these hashes disagree, then |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
346 |
we can deduce that the cookie has been tampered with. |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
347 |
Unfortunately, if they agree, we can still not be entirely |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
348 |
sure that not a clever hacker has tampered with the cookie. |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
349 |
The reason is that the hacker can see the clear text part of |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
350 |
the cookie, say \pcode{3}, and also its hash. It does not take |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
351 |
much trial and error to find out that we used the SHA-1 |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
352 |
hashing function and then the hacker can graft a cookie |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
353 |
accordingly. This is eased by the fact that for SHA-1 many |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
354 |
strings and corresponding hash-values are precalculated. Type, |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
355 |
for example, into Google the hash value for \pcode{"hello |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
356 |
world"} and you will actually pretty quickly find that it was |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
357 |
generated by input string \pcode{"hello world"}. Similarly for |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
358 |
the hash-value for \pcode{1}. This defeats the purpose of a |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
359 |
hashing function and thus would not help us with our |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
360 |
web-applications and later also not with how to store |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
361 |
passwords properly. |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
362 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
363 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
364 |
There is one ingredient missing, which happens to be called |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
365 |
\emph{salts}. Salts are random keys, which are added to the |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
366 |
counter before the hash is calculated. In our case we must |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
367 |
keep the salt secret. As can be see in Figure~\ref{hashsalt}, |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
368 |
we need to extract from the cookie the counter value and its |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
369 |
hash (Lines 19 and 20). But before hashing the counter again |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
370 |
(Line 22) we need to add the secret salt. Similarly, when we |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
371 |
set the new increased counter, we will need to add the salt |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
372 |
before hashing (this is done in Line 15). Our web-application |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
373 |
will now store cookies like |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
374 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
375 |
\begin{figure}[p] |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
376 |
\lstinputlisting{../progs/App4.js} |
365
942205605c30
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
358
diff
changeset
|
377 |
\caption{A Node.js web-app that sets a cookie in the client's |
942205605c30
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
358
diff
changeset
|
378 |
browser for counting the number of visits to a page.\label{hashsalt}} |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
379 |
\end{figure} |
169
2866fae8c1cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
168
diff
changeset
|
380 |
|
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
381 |
\begin{center}\tt |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
382 |
\begin{tabular}{l} |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
383 |
1 + salt - 8189effef4d4f7411f4153b13ff72546dd682c69\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
384 |
2 + salt - 1528375d5ceb7d71597053e6877cc570067a738f\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
385 |
3 + salt - d646e213d4f87e3971d9dd6d9f435840eb6a1c06\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
386 |
4 + salt - 5b9e85269e4461de0238a6bf463ed3f25778cbba\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
387 |
...\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
388 |
\end{tabular} |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
389 |
\end{center} |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
390 |
|
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
391 |
\noindent These hashes allow us to read and set the value of |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
392 |
the counter, and also give us confidence that the counter has |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
393 |
not been tampered with. This of course depends on being able |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
394 |
to keep the salt secret. Once the salt is public, we better |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
395 |
ignore all cookies and start setting them again with a new |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
396 |
salt. |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
397 |
|
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
398 |
There is an interesting and very subtle point to note with |
383
3e1a2c8ed980
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
381
diff
changeset
|
399 |
respect to the 'New York Times' way of checking the number |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
400 |
visits. Essentially they have their `resource' unlocked at the |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
401 |
beginning and lock it only when the data in the cookie states |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
402 |
that the allowed free number of visits are up. As said before, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
403 |
this can be easily circumvented by just deleting the cookie or |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
404 |
by switching the browser. This would mean the New York Times |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
405 |
will lose revenue whenever this kind of tampering occurs. The |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
406 |
quick fix to require that a cookie must always be present does |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
407 |
not work, because then this newspaper will cut off any new |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
408 |
readers, or anyone who gets a new computer. In contrast, our |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
409 |
web-application has the resource (discount) locked at the |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
410 |
beginning and only unlocks it if the cookie data says so. If |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
411 |
the cookie is deleted, well then the resource just does not |
383
3e1a2c8ed980
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
381
diff
changeset
|
412 |
get unlocked. No major harm will result to us. You can see: |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
413 |
the same security mechanism behaves rather differently |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
414 |
depending on whether the ``resource'' needs to be locked or |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
415 |
unlocked. Apart from thinking about the difference very |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
416 |
carefully, I do not know of any good ``theory'' that could |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
417 |
help with solving such security intricacies in any other way. |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
418 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
419 |
\subsection*{How to Store Passwords Properly?} |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
420 |
|
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
421 |
While admittedly quite silly, the simple web-application in |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
422 |
the previous section should help with the more important |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
423 |
question of how passwords should be verified and stored. It is |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
424 |
unbelievable that nowadays systems still do this with |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
425 |
passwords in plain text. The idea behind such plain-text |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
426 |
passwords is of course that if the user typed in |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
427 |
\pcode{foobar} as password, we need to verify whether it |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
428 |
matches with the password that is already stored for this user |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
429 |
in the system. Why not doing this with plain-text passwords? |
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
430 |
Unfortunately doing this verification in plain text is really |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
431 |
a bad idea. Alas, evidence suggests it is still a |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
432 |
widespread practice. I leave you to think about why verifying |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
433 |
passwords in plain text is a bad idea. |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
434 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
435 |
Using hash functions, like in our web-application, we can do |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
436 |
better. They allow us to not having to store passwords in |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
437 |
plain text for verification whether a password matches or not. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
438 |
We can just hash the password and store the hash-value. And |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
439 |
whenever the user types in a new password, well then we hash |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
440 |
it again and check whether the hash-values agree. Just like |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
441 |
in the web-application before. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
442 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
443 |
Lets analyse what happens when a hacker gets hold of such a |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
444 |
hashed password database. That is the scenario we want to |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
445 |
defend against.\footnote{If we could assume our servers can |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
446 |
never be broken into, then storing passwords in plain text |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
447 |
would be no problem. The point, however, is that servers are |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
448 |
never absolutely secure.} The hacker has then a list of user names and |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
449 |
associated hash-values, like |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
450 |
|
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
451 |
\begin{center} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
452 |
\pcode{urbanc:2aae6c35c94fcfb415dbe95f408b9ce91ee846ed} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
453 |
\end{center} |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
454 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
455 |
\noindent For a beginner-level hacker this information is of |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
456 |
no use. It would not work to type in the hash value instead of |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
457 |
the password, because it will go through the hashing function |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
458 |
again and then the resulting two hash-values will not match. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
459 |
One attack a hacker can try, however, is called a \emph{brute |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
460 |
force attack}. Essentially this means trying out exhaustively |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
461 |
all strings |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
462 |
|
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
463 |
\begin{center} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
464 |
\pcode{a}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
465 |
\pcode{aa}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
466 |
\pcode{...}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
467 |
\pcode{ba}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
468 |
\pcode{...}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
469 |
\pcode{zzz}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
470 |
\pcode{...} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
471 |
\end{center} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
472 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
473 |
\noindent and so on, hash them and check whether they match |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
474 |
with the hash-values in the database. Such brute force attacks |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
475 |
are surprisingly effective. With modern technology (usually |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
476 |
GPU graphic cards), passwords of moderate length only need |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
477 |
seconds or hours to be cracked. Well, the only defence we have |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
478 |
against such brute force attacks is to make passwords longer |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
479 |
and force users to use the whole spectrum of letters and keys |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
480 |
for passwords. The hope is that this makes the search space |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
481 |
too big for an effective brute force attack. |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
482 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
483 |
Unfortunately, clever hackers have another ace up their |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
484 |
sleeves. These are called \emph{dictionary attacks}. The idea |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
485 |
behind dictionary attack is the observation that only few |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
486 |
people are competent enough to use sufficiently strong |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
487 |
passwords. Most users (at least too many) use passwords like |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
488 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
489 |
\begin{center} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
490 |
\pcode{123456}, |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
491 |
\pcode{password}, |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
492 |
\pcode{qwerty}, |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
493 |
\pcode{letmein}, |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
494 |
\pcode{...} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
495 |
\end{center} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
496 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
497 |
\noindent So an attacker just needs to compile a list as large |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
498 |
as possible of such likely candidates of passwords and also |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
499 |
compute their hash-values. The difference between a brute |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
500 |
force attack, where maybe $2^{80}$ many strings need to be |
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
501 |
considered, is that a dictionary attack might get away with |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
502 |
checking only 10 Million words (remember the language English |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
503 |
``only'' contains 600,000 words). This is a drastic |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
504 |
simplification for attackers. Now, if the attacker knows the |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
505 |
hash-value of a password is |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
506 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
507 |
\begin{center} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
508 |
\pcode{5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
509 |
\end{center} |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
510 |
|
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
511 |
\noindent then just a lookup in the dictionary will reveal |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
512 |
that the plain-text password was \pcode{password}. What is |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
513 |
good about this attack is that the dictionary can be |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
514 |
precompiled in the ``comfort of the hacker's home'' before an |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
515 |
actual attack is launched. It just needs sufficient storage |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
516 |
space, which nowadays is pretty cheap. A hacker might in this |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
517 |
way not be able to crack all passwords in our database, but |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
518 |
even being able to crack 50\% can be serious damage for a |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
519 |
large company (because then you have to think about how to |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
520 |
make users to change their old passwords---a major hassle). |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
521 |
And hackers are very industrious in compiling these |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
522 |
dictionaries: for example they definitely include variations |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
523 |
like \pcode{passw0rd} and also include rules that cover cases |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
524 |
like \pcode{passwordpassword} or \pcode{drowssap} (password |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
525 |
reversed).\footnote{Some entertaining rules for creating |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
526 |
effective dictionaries are described in the book ``Applied |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
527 |
Cryptography'' by Bruce Schneier (in case you can find it in |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
528 |
the library), and also in the original research literature |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
529 |
which can be accessed for free from |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
530 |
\url{http://www.klein.com/dvk/publications/passwd.pdf}.} |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
531 |
Historically, compiling a list for a dictionary attack is not |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
532 |
as simple as it might seem. At the beginning only ``real'' |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
533 |
dictionaries were available (like the Oxford English |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
534 |
Dictionary), but such dictionaries are not optimised for the |
381
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
535 |
purpose of cracking passwords. The first real hard data about |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
536 |
actually used passwords was obtained when a company called |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
537 |
RockYou ``lost'' at the end of 2009 32 Million plain-text |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
538 |
passwords. With this data of real-life passwords, dictionary |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
539 |
attacks took off. Compiling such dictionaries is nowadays very |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
540 |
easy with the help of off-the-shelf tools. |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
541 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
542 |
These dictionary attacks can be prevented by using salts. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
543 |
Remember a hacker needs to use the most likely candidates |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
544 |
of passwords and calculate their hash-value. If we add before |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
545 |
hashing a password a random salt, like \pcode{mPX2aq}, |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
546 |
then the string \pcode{passwordmPX2aq} will almost certainly |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
547 |
not be in the dictionary. Like in the web-application in the |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
548 |
previous section, a salt does not prevent us from verifying a |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
549 |
password. We just need to add the salt whenever the password |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
550 |
is typed in again. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
551 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
552 |
There is a question whether we should use a single random salt |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
553 |
for every password in our database. A single salt would |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
554 |
already make dictionary attacks considerably more difficult. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
555 |
It turns out, however, that in case of password databases |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
556 |
every password should get their own salt. This salt is |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
557 |
generated at the time when the password is first set. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
558 |
If you look at a Unix password file you will find entries like |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
559 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
560 |
\begin{center} |
288
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
561 |
\pcode{urbanc:$6$3WWbKfr1$4vblknvGr6FcDeF92R5xFn3mskfdnEn...$...} |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
562 |
\end{center} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
563 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
564 |
\noindent where the first part is the login-name, followed by |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
565 |
a field \pcode{$6$} which specifies which hash-function is |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
566 |
used. After that follows the salt \pcode{3WWbKfr1} and after |
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
567 |
that the hash-value that is stored for the password (which |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
568 |
includes the salt). I leave it to you to figure out how the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
569 |
password verification would need to work based on this data. |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
570 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
571 |
There is a non-obvious benefit of using a separate salt for |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
572 |
each password. Recall that \pcode{123456} is a popular |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
573 |
password that is most likely used by several of your users |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
574 |
(especially if the database contains millions of entries). If |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
575 |
we use no salt or one global salt, all hash-values will be the |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
576 |
same for this password. So if a hacker is in the business of |
186
f7aa15984301
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
185
diff
changeset
|
577 |
cracking as many passwords as possible, then it is a good idea |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
578 |
to concentrate on those very popular passwords. This is not |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
579 |
possible if each password gets its own salt: since we assume |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
580 |
the salt is generated randomly, each version of \pcode{123456} |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
581 |
will be associated with a different hash-value. This will |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
582 |
make the life harder for an attacker. |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
583 |
|
227
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
584 |
Note another interesting point. The web-application from the |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
585 |
previous section was only secure when the salt was secret. In |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
586 |
the password case, this is not needed. The salt can be public |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
587 |
as shown above in the Unix password file where it is actually |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
588 |
stored as part of the password entry. Knowing the salt does |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
589 |
not give the attacker any advantage, but prevents that |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
590 |
dictionaries can be precompiled. While salts do not solve |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
591 |
every problem, they help with protecting against dictionary |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
592 |
attacks on password files. It protects people who have the |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
593 |
same passwords on multiple machines. But it does not protect |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
594 |
against a focused attack against a single password and also |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
595 |
does not make poorly chosen passwords any better. Still the |
7807863c4196
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
186
diff
changeset
|
596 |
moral is that you should never store passwords in plain text. |
262
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
597 |
Never ever. |
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
598 |
|
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
599 |
\subsubsection*{Further Reading} |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
600 |
|
379
11f5f86bf956
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
370
diff
changeset
|
601 |
A readable article by Bruce Schneier on ``How Security Companies Sucker Us with |
312
c913fe9bfd59
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
291
diff
changeset
|
602 |
Lemons'' |
c913fe9bfd59
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
291
diff
changeset
|
603 |
|
c913fe9bfd59
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
291
diff
changeset
|
604 |
\begin{center} |
c913fe9bfd59
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
291
diff
changeset
|
605 |
\url{http://archive.wired.com/politics/security/commentary/securitymatters/2007/04/securitymatters_0419} |
c913fe9bfd59
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
291
diff
changeset
|
606 |
\end{center} |
c913fe9bfd59
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
291
diff
changeset
|
607 |
|
c913fe9bfd59
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
291
diff
changeset
|
608 |
\noindent |
291
18b726d2b67c
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
288
diff
changeset
|
609 |
A slightly different point of view about the economies of |
18b726d2b67c
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
288
diff
changeset
|
610 |
password cracking: |
288
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
611 |
|
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
612 |
\begin{center} |
325
48c6751f2173
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
312
diff
changeset
|
613 |
\url{http://xkcd.com/538/} |
288
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
614 |
\end{center} |
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
615 |
|
365
942205605c30
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
358
diff
changeset
|
616 |
\noindent If you want to know more about passwords, the book |
942205605c30
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
358
diff
changeset
|
617 |
by Bruce Schneier about Applied Cryptography is recommendable, |
942205605c30
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
358
diff
changeset
|
618 |
though quite expensive. There is also another expensive book |
942205605c30
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
358
diff
changeset
|
619 |
about penetration testing, but the readable chapter about |
942205605c30
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
358
diff
changeset
|
620 |
password attacks (Chapter 9) is free: |
262
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
621 |
|
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
622 |
\begin{center} |
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
623 |
\url{http://www.nostarch.com/pentesting} |
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
624 |
\end{center} |
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
625 |
|
379
11f5f86bf956
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
370
diff
changeset
|
626 |
\noindent Even the government recently handed out some |
11f5f86bf956
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
370
diff
changeset
|
627 |
advice about passwords |
11f5f86bf956
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
370
diff
changeset
|
628 |
|
11f5f86bf956
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
370
diff
changeset
|
629 |
\begin{center} |
11f5f86bf956
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
370
diff
changeset
|
630 |
\url{http://goo.gl/dIzqMg} |
11f5f86bf956
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
370
diff
changeset
|
631 |
\end{center} |
11f5f86bf956
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
370
diff
changeset
|
632 |
|
381
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
633 |
\noindent Here is an interesting blog-post about how a group |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
634 |
``cracked'' efficiently millions of bcrypt passwords from the |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
635 |
Ashley Madison leak. |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
636 |
|
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
637 |
\begin{center} |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
638 |
\url{http://goo.gl/83Ho0N} |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
639 |
\end{center} |
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
379
diff
changeset
|
640 |
|
262
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
641 |
\noindent Clearly, passwords are a technology that comes to |
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
642 |
the end of its usefulness, because brute force attacks become |
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
643 |
more and more powerful and it is unlikely that humans get any |
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
644 |
better in remembering (securely) longer and longer passwords. |
57269d9931da
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
227
diff
changeset
|
645 |
The big question is which technology can replace |
288
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
646 |
passwords\ldots |
358
8787c16bc26e
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
355
diff
changeset
|
647 |
\medskip |
8787c16bc26e
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
355
diff
changeset
|
648 |
|
8787c16bc26e
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
355
diff
changeset
|
649 |
\noindent |
8787c16bc26e
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
355
diff
changeset
|
650 |
A recent research paper about surveillance using cookies is |
8787c16bc26e
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
355
diff
changeset
|
651 |
|
8787c16bc26e
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
355
diff
changeset
|
652 |
\begin{center} |
8787c16bc26e
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
355
diff
changeset
|
653 |
\url{http://randomwalker.info/publications/cookie-surveillance-v2.pdf} |
8787c16bc26e
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
355
diff
changeset
|
654 |
\end{center} |
8787c16bc26e
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
355
diff
changeset
|
655 |
|
288
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
656 |
|
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
657 |
\end{document} |
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
658 |
|
370
ddac52c0014c
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
366
diff
changeset
|
659 |
%%% fingerprints vs. passwords (what is better) |
ddac52c0014c
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
366
diff
changeset
|
660 |
https://www.youtube.com/watch?v=VVxL9ymiyAU&feature=youtu.be |
ddac52c0014c
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
366
diff
changeset
|
661 |
|
ddac52c0014c
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
366
diff
changeset
|
662 |
%%% cookies |
ddac52c0014c
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
366
diff
changeset
|
663 |
http://randomwalker.info/publications/cookie-surveillance-v2.pdf |
288
fd4bf1a2d38d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
263
diff
changeset
|
664 |
|
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
665 |
|
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
666 |
%%% Local Variables: |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
667 |
%%% mode: latex |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
668 |
%%% TeX-master: t |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
669 |
%%% End: |