author | Christian Urban <christian dot urban at kcl dot ac dot uk> |
Mon, 29 Sep 2014 21:11:06 +0100 | |
changeset 186 | f7aa15984301 |
parent 185 | f10d905e947f |
child 227 | 7807863c4196 |
permissions | -rw-r--r-- |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
1 |
\documentclass{article} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
2 |
\usepackage{../style} |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
3 |
\usepackage{../langs} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
4 |
|
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
5 |
\lstset{language=JavaScript} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
6 |
|
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
7 |
\begin{document} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
8 |
|
167
d8657ff8cca1
typos
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
160
diff
changeset
|
9 |
\section*{Handout 1 (Security Engineering)} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
10 |
|
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
11 |
Much of the material and inspiration in this module is taken |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
12 |
from the works of Bruce Schneier, Ross Anderson and Alex |
159
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
13 |
Halderman. I think they are the world experts in the area of |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
14 |
security engineering. I especially like that they argue that a |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
15 |
security engineer requires a certain \emph{security mindset}. |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
16 |
Bruce Schneier for example writes: |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
17 |
|
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
18 |
\begin{quote} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
19 |
\it ``Security engineers --- at least the good ones --- see |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
20 |
the world differently. They can't walk into a store without |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
21 |
noticing how they might shoplift. They can't use a computer |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
22 |
without wondering about the security vulnerabilities. They |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
23 |
can't vote without trying to figure out how to vote twice. |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
24 |
They just can't help it.'' |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
25 |
\end{quote} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
26 |
|
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
27 |
\begin{quote} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
28 |
\it ``Security engineering\ldots requires you to think |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
29 |
differently. You need to figure out not how something works, |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
30 |
but how something can be made to not work. You have to imagine |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
31 |
an intelligent and malicious adversary inside your system |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
32 |
\ldots, constantly trying new ways to |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
33 |
subvert it. You have to consider all the ways your system can |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
34 |
fail, most of them having nothing to do with the design |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
35 |
itself. You have to look at everything backwards, upside down, |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
36 |
and sideways. You have to think like an alien.'' |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
37 |
\end{quote} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
38 |
|
159
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
39 |
\noindent In this module I like to teach you this security |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
40 |
mindset. This might be a mindset that you think is very |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
41 |
foreign to you---after all we are all good citizens and not |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
42 |
hack into things. I beg to differ: You have this mindset |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
43 |
already when in school you were thinking, at least |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
44 |
hypothetically, about ways in which you can cheat in an exam |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
45 |
(whether it is about hiding notes or looking over the |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
46 |
shoulders of your fellow pupils). Right? To defend a system, |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
47 |
you need to have this kind mindset and be able to think like |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
48 |
an attacker. This will include understanding techniques that |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
49 |
can be used to compromise security and privacy in systems. |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
50 |
This will many times result in insights where well-intended |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
51 |
security mechanisms made a system actually less |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
52 |
secure.\medskip |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
53 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
54 |
\noindent |
159
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
55 |
{\Large\bf Warning!} However, don’t be evil! Using those |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
56 |
techniques in the real world may violate the law or King’s |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
57 |
rules, and it may be unethical. Under some circumstances, even |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
58 |
probing for weaknesses of a system may result in severe |
160
4cbd6ca025e6
updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
159
diff
changeset
|
59 |
penalties, up to and including expulsion, fines and |
159
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
60 |
jail time. Acting lawfully and ethically is your |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
61 |
responsibility. Ethics requires you to refrain from doing |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
62 |
harm. Always respect privacy and rights of others. Do not |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
63 |
tamper with any of King's systems. If you try out a technique, |
77cf0362b87a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
158
diff
changeset
|
64 |
always make doubly sure you are working in a safe environment |
160
4cbd6ca025e6
updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
159
diff
changeset
|
65 |
so that you cannot cause any harm, not even accidentally. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
66 |
Don't be evil. Be an ethical hacker.\medskip |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
67 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
68 |
\noindent In this lecture I want to make you familiar with the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
69 |
security mindset and dispel the myth that encryption is the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
70 |
answer to all security problems (it is certainly often a part |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
71 |
of an answer, but almost always never a sufficient one). This |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
72 |
is actually an important thread going through the whole |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
73 |
course: We will assume that encryption works perfectly, but |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
74 |
still attack ``things''. By ``works perfectly'' we mean that |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
75 |
we will assume encryption is a black box and, for example, |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
76 |
will not look at the underlying mathematics and break the |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
77 |
algorithms.\footnote{Though fascinating this might be.} |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
78 |
|
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
79 |
For a secure system, it seems, four requirements need to come |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
80 |
together: First a security policy (what is supposed to be |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
81 |
achieved?); second a mechanism (cipher, access controls, |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
82 |
tamper resistance etc); third the assurance we obtain from the |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
83 |
mechanism (the amount of reliance we can put on the mechanism) |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
84 |
and finally the incentives (the motive that the people |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
85 |
guarding and maintaining the system have to do their job |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
86 |
properly, and also the motive that the attackers have to try |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
87 |
to defeat your policy). The last point is often overlooked, |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
88 |
but plays an important role. To illustrate this lets look at |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
89 |
an example. |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
90 |
|
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
91 |
\subsubsection*{Chip-and-PIN is Surely More Secure?} |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
92 |
|
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
93 |
The questions is whether the Chip-and-PIN system used with |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
94 |
modern credit cards is more secure than the older method of |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
95 |
signing receipts at the till. On first glance the answer seems |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
96 |
obvious: Chip-and-PIN must be more secure and indeed improved |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
97 |
security was the central plank in the ``marketing speak'' of |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
98 |
the banks behind Chip-and-PIN. The earlier system was based on |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
99 |
a magnetic stripe or a mechanical imprint on the cards and |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
100 |
required customers to sign receipts at the till whenever they |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
101 |
bought something. This signature authorised the transactions. |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
102 |
Although in use for a long time, this system had some crucial |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
103 |
security flaws, including making clones of credit cards and |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
104 |
forging signatures. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
105 |
|
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
106 |
Chip-and-PIN, as the name suggests, relies on data being |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
107 |
stored on a chip on the card and a PIN number for |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
108 |
authorisation. Even though the banks involved trumpeted their |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
109 |
system as being absolutely secure and indeed fraud rates |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
110 |
initially went down, security researchers were not convinced |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
111 |
(especially the group around Ross Anderson). To begin with, |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
112 |
the Chip-and-PIN system introduced a ``new player'' into the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
113 |
system that needed to be trusted: the PIN terminals and their |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
114 |
manufacturers. It was claimed that these terminals were |
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
115 |
tamper-resistant, but needless to say this was a weak link in |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
116 |
the system, which criminals successfully attacked. Some |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
117 |
terminals were even so skilfully manipulated that they |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
118 |
transmitted skimmed PIN numbers via built-in mobile phone |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
119 |
connections. To mitigate this flaw in the security of |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
120 |
Chip-and-PIN, you need to be able to vet quite closely the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
121 |
supply chain of such terminals. This is something that is |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
122 |
mostly beyond the control of customers who need to use these |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
123 |
terminals. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
124 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
125 |
To make matters worse for Chip-and-PIN, in around 2009 Ross |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
126 |
Anderson and his group were able to perform man-in-the-middle |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
127 |
attacks against Chip-and-PIN. Essentially they made the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
128 |
terminal think the correct PIN was entered and the card think |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
129 |
that a signature was used. This is a kind of \emph{protocol |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
130 |
failure}. After discovery, the flaw was mitigated by requiring |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
131 |
that a link between the card and the bank is established at |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
132 |
every time the card is used. Even later this group found |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
133 |
another problem with Chip-and-PIN and ATMs which did not |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
134 |
generate random enough numbers (nonces) on which the security |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
135 |
of the underlying protocols relies. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
136 |
|
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
137 |
The problem with all this is that the banks who introduced |
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
138 |
Chip-and-PIN managed with the new system to shift the |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
139 |
liability for any fraud and the burden of proof onto the |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
140 |
customer. In the old system, the banks had to prove that the |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
141 |
customer used the card, which they often did not bother with. |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
142 |
In effect, if fraud occurred the customers were either refunded |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
143 |
fully or lost only a small amount of money. This |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
144 |
taking-responsibility-of-potential-fraud was part of the |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
145 |
``business plan'' of the banks and did not reduce their |
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
146 |
profits too much. |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
147 |
|
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
148 |
Since banks managed to successfully claim that their |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
149 |
Chip-and-PIN system is secure, they were under the new system |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
150 |
able to point the finger at the customer when fraud occurred: |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
151 |
customers must have been negligent losing their PIN and they |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
152 |
had almost no way of defending themselves in such situations. |
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
153 |
That is why the work of \emph{ethical} hackers like Ross |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
154 |
Anderson's group was so important, because they and others |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
155 |
established that the bank's claim that their system is secure |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
156 |
and it must have been the customer's fault, was bogus. In 2009 |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
157 |
the law changed and the burden of proof went back to the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
158 |
banks. They need to prove whether it was really the customer |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
159 |
who used a card or not. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
160 |
|
177
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
161 |
This is a classic example where a security design principle |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
162 |
was violated: Namely, the one who is in the position to |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
163 |
improve security, also needs to bear the financial losses if |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
164 |
things go wrong. Otherwise, you end up with an insecure |
46e581d66f3a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
176
diff
changeset
|
165 |
system. In case of the Chip-and-PIN system, no good security |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
166 |
engineer would dare to claim that it is secure beyond |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
167 |
reproach: the specification of the EMV protocol (underlying |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
168 |
Chip-and-PIN) is some 700 pages long, but still leaves out |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
169 |
many things (like how to implement a good random number |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
170 |
generator). No human being is able to scrutinise such a |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
171 |
specification and ensure it contains no flaws. Moreover, banks |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
172 |
can add their own sub-protocols to EMV. With all the |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
173 |
experience we already have, it is as clear as day that |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
174 |
criminals were bound to eventually be able to poke holes into |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
175 |
it and measures need to be taken to address them. However, |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
176 |
with how the system was set up, the banks had no real |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
177 |
incentive to come up with a system that is really secure. |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
178 |
Getting the incentives right in favour of security is often a |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
179 |
tricky business. From a customer point of view, the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
180 |
Chip-and-PIN system was much less secure than the old |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
181 |
signature-based method. The customer could now lose |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
182 |
significant amounts of money. |
173
9126c13a7d93
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
169
diff
changeset
|
183 |
|
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
184 |
\subsection*{Of Cookies and Salts} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
185 |
|
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
186 |
Lets look at another example which will help with |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
187 |
understanding how passwords should be verified and stored. |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
188 |
Imagine you need to develop a web-application that has the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
189 |
feature of recording how many times a customer visits a page. |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
190 |
For example in order to give a discount whenever the customer |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
191 |
has visited a webpage some $x$ number of times (say $x$ equal |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
192 |
$5$). There is one more constraint: we want to store the |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
193 |
information about the number of visits as a cookie on the |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
194 |
browser. I think, for a number of years the webpage of the New |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
195 |
York Times operated in this way: it allowed you to read ten |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
196 |
articles per month for free; if you wanted to read more, you |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
197 |
had to pay. My best guess is that it used cookies for |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
198 |
recording how many times their pages was visited, because if I |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
199 |
switched browsers I could easily circumvent the restriction |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
200 |
about ten articles. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
201 |
|
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
202 |
To implement our web-application it is good to look under the |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
203 |
hood what happens when a webpage is displayed in a browser. A |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
204 |
typical web-application works as follows: The browser sends a |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
205 |
GET request for a particular page to a server. The server |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
206 |
answers this request with a webpage in HTML (for our purposes |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
207 |
we can ignore the details about HTML). A simple JavaScript |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
208 |
program that realises a server answering with a ``hello |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
209 |
world'' webpage is as follows: |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
210 |
|
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
211 |
\begin{center} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
212 |
\lstinputlisting{../progs/ap0.js} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
213 |
\end{center} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
214 |
|
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
215 |
\noindent The interesting lines are 4 to 7 where the answer to |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
216 |
the GET request is generated\ldots in this case it is just a |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
217 |
simple string. This program is run on the server and will be |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
218 |
executed whenever a browser initiates such a GET request. You |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
219 |
can run this program on your computer and then direct a |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
220 |
browser to the address \pcode{localhost:8000} in order to |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
221 |
simulate a request over the internet. |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
222 |
|
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
223 |
|
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
224 |
For our web-application of interest is the feature that the |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
225 |
server when answering the request can store some information |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
226 |
on the client's side. This information is called a |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
227 |
\emph{cookie}. The next time the browser makes another GET |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
228 |
request to the same webpage, this cookie can be read again by |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
229 |
the server. We can use cookies in order to store a counter |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
230 |
that records the number of times our webpage has been visited. |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
231 |
This can be realised with the following small program |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
232 |
|
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
233 |
\begin{center} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
234 |
\lstinputlisting{../progs/ap2.js} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
235 |
\end{center} |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
236 |
|
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
237 |
\noindent The overall structure of this program is the same as |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
238 |
the earlier one: Lines 7 to 17 generate the answer to a |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
239 |
GET-request. The new part is in Line 8 where we read the |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
240 |
cookie called \pcode{counter}. If present, this cookie will be |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
241 |
send together with the GET-request from the client. The value |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
242 |
of this counter will come in form of a string, therefore we |
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
243 |
use the function \pcode{parseInt} in order to transform it |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
244 |
into an integer. In case the cookie is not present, we default |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
245 |
the counter to zero. The odd looking construction \code{...|| |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
246 |
0} is realising this defaulting in JavaScript. In Line 9 we |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
247 |
increase the counter by one and store it back to the client |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
248 |
(under the name \pcode{counter}, since potentially more than |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
249 |
one value could be stored). In Lines 10 to 15 we test whether |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
250 |
this counter is greater or equal than 5 and send accordingly a |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
251 |
specially grafted message back to the client. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
252 |
|
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
253 |
Let us step back and analyse this program from a security |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
254 |
point of view. We store a counter in plain text on the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
255 |
client's browser (which is not under our control). Depending |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
256 |
on this value we want to unlock a resource (like a discount) |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
257 |
when it reaches a threshold. If the client deletes the cookie, |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
258 |
then the counter will just be reset to zero. This does not |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
259 |
bother us, because the purported discount will just not be |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
260 |
granted. In this way we do not lose any (hypothetical) money. |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
261 |
What we need to be concerned about is, however, when a client |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
262 |
artificially increases this counter without having visited our |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
263 |
web-page. This is actually a trivial task for a knowledgeable |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
264 |
person, since there are convenient tools that allow one to set |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
265 |
a cookie to an arbitrary value, for example above our |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
266 |
threshold for the discount. |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
267 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
268 |
There seems to be no simple way to prevent this kind of |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
269 |
tampering with cookies, because the whole purpose of cookies |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
270 |
is that they are stored on the client's side, which from the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
271 |
the server's perspective is a potentially hostile environment. |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
272 |
What we need to ensure is the integrity of this counter in |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
273 |
this hostile environment. We could think of encrypting the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
274 |
counter. But this has two drawbacks to do with the key for |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
275 |
encryption. If you use a single, global key for all the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
276 |
clients that visit our site, then we risk that our whole |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
277 |
``business'' might collapse in the event this key gets known |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
278 |
to the outside world. Then all cookies we might have set in |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
279 |
the past, can now be decrypted and manipulated. If, on the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
280 |
other hand, we use many ``private'' keys for the clients, then |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
281 |
we have to solve the problem of having to securely store this |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
282 |
key on our server side (obviously we cannot store the key with |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
283 |
the client because then the client again has all data to |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
284 |
tamper with the counter; and obviously we also cannot encrypt |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
285 |
the key, lest we can solve an impossible chicken-and-egg |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
286 |
problem). So encryption seems to not solve the problem we face |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
287 |
with the integrity of our counter. |
169
2866fae8c1cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
168
diff
changeset
|
288 |
|
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
289 |
Fortunately, \emph{hash functions} seem to be more suitable |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
290 |
for our purpose. Like encryption, hash functions scramble data |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
291 |
in such a way that it is easy to calculate the output of a |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
292 |
hash function from the input. But it is hard (i.e.~practically |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
293 |
impossible) to calculate the input from knowing the output. |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
294 |
Therefore hash functions are often called \emph{one-way |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
295 |
functions}\ldots you cannot go back from the output to the |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
296 |
input (without some tricks, see below). There are several such |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
297 |
hashing function. For example SHA-1 would hash the string |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
298 |
\pcode{"hello world"} to produce the hash-value |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
299 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
300 |
\begin{center} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
301 |
\pcode{2aae6c35c94fcfb415dbe95f408b9ce91ee846ed} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
302 |
\end{center} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
303 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
304 |
\noindent Another handy feature of hash functions is that if |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
305 |
the input changes only a little, the output changes |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
306 |
drastically. For example \pcode{"iello world"} produces under |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
307 |
SHA-1 the output |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
308 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
309 |
\begin{center} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
310 |
\pcode{d2b1402d84e8bcef5ae18f828e43e7065b841ff1} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
311 |
\end{center} |
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
312 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
313 |
\noindent That means it is not predictable what the output |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
314 |
will be from just looking at input that is ``close by''. |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
315 |
|
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
316 |
We can use hashes in our web-application and store in the |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
317 |
cookie the value of the counter in plain text but together |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
318 |
with its hash. We need to store both pieces of data in such a |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
319 |
way that we can extract them again later on. In the code below |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
320 |
I will just separate them using a \pcode{"-"}, for example |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
321 |
|
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
322 |
\begin{center} |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
323 |
\pcode{1-356a192b7913b04c54574d18c28d46e6395428ab} |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
324 |
\end{center} |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
325 |
|
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
326 |
\noindent for the counter \pcode{1}. If we now read back the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
327 |
cookie when the client visits our webpage, we can extract the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
328 |
counter, hash it again and compare the result to the stored |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
329 |
hash value inside the cookie. If these hashes disagree, then |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
330 |
we can deduce that the cookie has been tampered with. |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
331 |
Unfortunately, if they agree, we can still not be entirely |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
332 |
sure that not a clever hacker has tampered with the cookie. |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
333 |
The reason is that the hacker can see the clear text part of |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
334 |
the cookie, say \pcode{3}, and also its hash. It does not take |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
335 |
much trial and error to find out that we used the SHA-1 |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
336 |
hashing function and then the hacker can graft a cookie |
180
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
337 |
accordingly. This is eased by the fact that for SHA-1 many |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
338 |
strings and corresponding hash-values are precalculated. Type, |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
339 |
for example, into Google the hash value for \pcode{"hello |
a95782c2f046
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
179
diff
changeset
|
340 |
world"} and you will actually pretty quickly find that it was |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
341 |
generated by input string \pcode{"hello world"}. Similarly for |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
342 |
the hash-value for \pcode{1}. This defeats the purpose of a |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
343 |
hashing function and thus would not help us with our |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
344 |
web-applications and later also not with how to store |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
345 |
passwords properly. |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
346 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
347 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
348 |
There is one ingredient missing, which happens to be called |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
349 |
\emph{salts}. Salts are random keys, which are added to the |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
350 |
counter before the hash is calculated. In our case we must |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
351 |
keep the salt secret. As can be see in Figure~\ref{hashsalt}, |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
352 |
we need to extract from the cookie the counter value and its |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
353 |
hash (Lines 19 and 20). But before hashing the counter again |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
354 |
(Line 22) we need to add the secret salt. Similarly, when we |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
355 |
set the new increased counter, we will need to add the salt |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
356 |
before hashing (this is done in Line 15). Our web-application |
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
357 |
will now store cookies like |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
358 |
|
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
359 |
\begin{figure}[p] |
178
13c6bd6e3477
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
177
diff
changeset
|
360 |
\lstinputlisting{../progs/App4.js} |
176
5336ad2fd3fa
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
175
diff
changeset
|
361 |
\caption{\label{hashsalt}} |
175
4ebc97e6fdf0
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
174
diff
changeset
|
362 |
\end{figure} |
169
2866fae8c1cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
168
diff
changeset
|
363 |
|
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
364 |
\begin{center}\tt |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
365 |
\begin{tabular}{l} |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
366 |
1 + salt - 8189effef4d4f7411f4153b13ff72546dd682c69\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
367 |
2 + salt - 1528375d5ceb7d71597053e6877cc570067a738f\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
368 |
3 + salt - d646e213d4f87e3971d9dd6d9f435840eb6a1c06\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
369 |
4 + salt - 5b9e85269e4461de0238a6bf463ed3f25778cbba\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
370 |
...\\ |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
371 |
\end{tabular} |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
372 |
\end{center} |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
373 |
|
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
374 |
\noindent These hashes allow us to read and set the value of |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
375 |
the counter, and also give us confidence that the counter has |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
376 |
not been tampered with. This of course depends on being able |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
377 |
to keep the salt secret. Once the salt is public, we better |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
378 |
ignore all cookies and start setting them again with a new |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
379 |
salt. |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
380 |
|
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
381 |
There is an interesting and very subtle point to note with |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
382 |
respect to the New York Times' way of checking the number |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
383 |
visits. Essentially they have their `resource' unlocked at the |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
384 |
beginning and lock it only when the data in the cookie states |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
385 |
that the allowed free number of visits are up. As said before, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
386 |
this can be easily circumvented by just deleting the cookie or |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
387 |
by switching the browser. This would mean the New York Times |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
388 |
will lose revenue whenever this kind of tampering occurs. The |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
389 |
quick fix to require that a cookie must always be present does |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
390 |
not work, because then this newspaper will cut off any new |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
391 |
readers, or anyone who gets a new computer. In contrast, our |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
392 |
web-application has the resource (discount) locked at the |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
393 |
beginning and only unlocks it if the cookie data says so. If |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
394 |
the cookie is deleted, well then the resource just does not |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
395 |
get unlocked. No mayor harm will result to us. You can see: |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
396 |
the same security mechanism behaves rather differently |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
397 |
depending on whether the ``resource'' needs to be locked or |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
398 |
unlocked. Apart from thinking about the difference very |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
399 |
carefully, I do not know of any good ``theory'' that could |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
400 |
help with solving such security intricacies in any other way. |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
401 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
402 |
\subsection*{How to Store Passwords Properly?} |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
403 |
|
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
404 |
While admittedly quite silly, the simple web-application in |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
405 |
the previous section should help with the more important |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
406 |
question of how passwords should be verified and stored. It is |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
407 |
unbelievable that nowadays systems still do this with |
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
408 |
passwords in plain text. The idea behind such plain-text |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
409 |
passwords is of course that if the user typed in |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
410 |
\pcode{foobar} as password, we need to verify whether it |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
411 |
matches with the password that is already stored for this user |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
412 |
in the system. Why not doing this with plain-text passwords? |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
413 |
But doing this verification in plain text is really a bad |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
414 |
idea. Unfortunately, evidence suggests it is still a |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
415 |
widespread practice. I leave you to think about why verifying |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
416 |
passwords in plain text is a bad idea. |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
417 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
418 |
Using hash functions, like in our web-application, we can do |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
419 |
better. They allow us to not having to store passwords in |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
420 |
plain text for verification whether a password matches or not. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
421 |
We can just hash the password and store the hash-value. And |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
422 |
whenever the user types in a new password, well then we hash |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
423 |
it again and check whether the hash-values agree. Just like |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
424 |
in the web-application before. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
425 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
426 |
Lets analyse what happens when a hacker gets hold of such a |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
427 |
hashed password database. That is the scenario we want to |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
428 |
defend against.\footnote{If we could assume our servers can |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
429 |
never be broken into, then storing passwords in plain text |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
430 |
would be no problem. The point, however, is that servers are |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
431 |
never absolutely secure.} The hacker has then a list of user names and |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
432 |
associated hash-values, like |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
433 |
|
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
434 |
\begin{center} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
435 |
\pcode{urbanc:2aae6c35c94fcfb415dbe95f408b9ce91ee846ed} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
436 |
\end{center} |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
437 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
438 |
\noindent For a beginner-level hacker this information is of |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
439 |
no use. It would not work to type in the hash value instead of |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
440 |
the password, because it will go through the hashing function |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
441 |
again and then the resulting two hash-values will not match. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
442 |
One attack a hacker can try, however, is called a \emph{brute |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
443 |
force attack}. Essentially this means trying out exhaustively |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
444 |
all strings |
181
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
445 |
|
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
446 |
\begin{center} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
447 |
\pcode{a}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
448 |
\pcode{aa}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
449 |
\pcode{...}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
450 |
\pcode{ba}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
451 |
\pcode{...}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
452 |
\pcode{zzz}, |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
453 |
\pcode{...} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
454 |
\end{center} |
a736a0c324a3
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
180
diff
changeset
|
455 |
|
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
456 |
\noindent and so on, hash them and check whether they match |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
457 |
with the hash-values in the database. Such brute force attacks |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
458 |
are surprisingly effective. With modern technology (usually |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
459 |
GPU graphic cards), passwords of moderate length only need |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
460 |
seconds or hours to be cracked. Well, the only defence we have |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
461 |
against such brute force attacks is to make passwords longer |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
462 |
and force users to use the whole spectrum of letters and keys |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
463 |
for passwords. The hope is that this makes the search space |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
464 |
too big for an effective brute force attack. |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
465 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
466 |
Unfortunately, clever hackers have another ace up their |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
467 |
sleeves. These are called \emph{dictionary attacks}. The idea |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
468 |
behind dictionary attack is the observation that only few |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
469 |
people are competent enough to use sufficiently strong |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
470 |
passwords. Most users (at least too many) use passwords like |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
471 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
472 |
\begin{center} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
473 |
\pcode{123456}, |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
474 |
\pcode{password}, |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
475 |
\pcode{qwerty}, |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
476 |
\pcode{letmein}, |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
477 |
\pcode{...} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
478 |
\end{center} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
479 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
480 |
\noindent So an attacker just needs to compile a list as large |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
481 |
as possible of such likely candidates of passwords and also |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
482 |
compute their hash-values. The difference between a brute |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
483 |
force attack, where maybe $2^{80}$ many strings need to be |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
484 |
considered, a dictionary attack might get away witch checking |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
485 |
only 10 Million (remember the language English ``only'' |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
486 |
contains 600,000 words). This is a drastic simplification for |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
487 |
attackers. Now if the attacker knows the hash-value of a |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
488 |
password is |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
489 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
490 |
\begin{center} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
491 |
\pcode{5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
492 |
\end{center} |
179
1cacbe5c67cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
178
diff
changeset
|
493 |
|
185
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
494 |
\noindent then just a lookup in the dictionary will reveal that the |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
495 |
plain-text password was \pcode{password}. What is good about this |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
496 |
attack is that the dictionary can be precompiled in the ``comfort of |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
497 |
the hacker's home'' before an actual attack is launched. It just needs |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
498 |
sufficient storage space, which nowadays is pretty cheap. A hacker |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
499 |
might in this way not be able to crack all passwords in our database, |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
500 |
but even being able to crack 50\% can be serious damage for a large |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
501 |
company (because then you have to think about how to make users to |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
502 |
change their old passwords---a major hassle). And hackers are very |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
503 |
industrious in compiling these dictionaries: for example they |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
504 |
definitely include variations like \pcode{passw0rd} and also include |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
505 |
rules that cover cases like \pcode{passwordpassword} or |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
506 |
\pcode{drowssap} (password reversed).\footnote{Some entertaining rules |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
507 |
for creating effective dictionaries are described in the book |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
508 |
``Applied Cryptography'' by Bruce Schneier (in case you can find it |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
509 |
in the library), and also in the original research literature which |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
510 |
can be accessed for free from |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
511 |
\url{http://www.klein.com/dvk/publications/passwd.pdf}.} |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
512 |
Historically, compiling a list for a dictionary attack is not as |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
513 |
simple as it might seem. At the beginning only ``real'' dictionaries |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
514 |
were available (like the Oxford English Dictionary), but such |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
515 |
dictionaries are not ``optimised'' for the purpose of passwords. The |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
516 |
first real hard data about actually used passwords was obtained when a |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
517 |
company called RockYou ``lost'' 32 Million plain-text passwords. With |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
518 |
this data of real-life passwords, dictionary attacks took |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
519 |
off. Compiling such dictionaries is nowadays very easy with the help |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
520 |
of off-the-shelf tools. |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
521 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
522 |
These dictionary attacks can be prevented by using salts. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
523 |
Remember a hacker needs to use the most likely candidates |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
524 |
of passwords and calculate their hash-value. If we add before |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
525 |
hashing a password a random salt, like \pcode{mPX2aq}, |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
526 |
then the string \pcode{passwordmPX2aq} will almost certainly |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
527 |
not be in the dictionary. Like in the web-application in the |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
528 |
previous section, a salt does not prevent us from verifying a |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
529 |
password. We just need to add the salt whenever the password |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
530 |
is typed in again. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
531 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
532 |
There is a question whether we should use a single random salt |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
533 |
for every password in our database. A single salt would |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
534 |
already make dictionary attacks considerably more difficult. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
535 |
It turns out, however, that in case of password databases |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
536 |
every password should get their own salt. This salt is |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
537 |
generated at the time when the password is first set. |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
538 |
If you look at a Unix password file you will find entries like |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
539 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
540 |
\begin{center} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
541 |
\pcode{urbanc:$6$3WWbKfr1$4vblknvGr6FcDeF92R5xFn3mskfdnEn...:...} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
542 |
\end{center} |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
543 |
|
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
544 |
\noindent where the first part is the login-name, followed by |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
545 |
a field \pcode{$6$} which specifies which hash-function is |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
546 |
used. After that follows the salt \pcode{3WWbKfr1} and after |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
547 |
that the hash-value that is stored for the password ( which |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
548 |
includes the salt). I leave it to you to figure out how the |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
549 |
password verification would need to work based on this data. |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
550 |
|
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
551 |
There is a non-obvious benefit of using a separate salt for |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
552 |
each password. Recall that \pcode{123456} is a popular |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
553 |
password that is most likely used by several of your users |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
554 |
(especially if the database contains millions of entries). If |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
555 |
we use no salt or one global salt, all hash-values will be the |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
556 |
same for this password. So if a hacker is in the business of |
186
f7aa15984301
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
185
diff
changeset
|
557 |
cracking as many passwords as possible, then it is a good idea |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
558 |
to concentrate on those very popular passwords. This is not |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
559 |
possible if each password gets its own salt: since we assume |
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
560 |
the salt is generated randomly, each version of \pcode{123456} |
184
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
561 |
will be associated with a different hash-value. This will |
55968b3205cc
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
183
diff
changeset
|
562 |
make the life harder for an attacker. |
182
681e35f6b0e4
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
181
diff
changeset
|
563 |
|
185
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
564 |
Note another interesting point. The web-application from the previous |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
565 |
section was only secure when the salt was secret. In the password |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
566 |
case, this is not needed. The salt can be public as shown above in the |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
567 |
Unix password file where is actually stored as part of the password |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
568 |
entry. Knowing the salt does not give the attacker any advantage, but |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
569 |
prevents that dictionaries can be precompiled. While salts do not |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
570 |
solve every problem, they help with protecting against dictionary |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
571 |
attacks on password files. It protects people who have the same |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
572 |
passwords on multiple machines. But it does not protect against a |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
573 |
focused attack against a single password and also does not make poorly |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
574 |
chosen passwords any better. Still the moral is that you should never |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
575 |
store passwords in plain text. Never ever.\medskip |
174
e2180cead443
updated handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
173
diff
changeset
|
576 |
|
185
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
577 |
\noindent |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
578 |
If you want to know more about passwords I recommend viewing some |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
579 |
youtube videos from the PasswordCon(ference) which takes place each |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
580 |
year. The book by Bruce Schneier about Applied Cryptography is also |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
581 |
recommendable, though quite expensive. Clearly, passwords are a |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
582 |
technology that comes to the end of its usefulness, because brute |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
583 |
force attacks become more and more powerful and it is unlikely that |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
584 |
humans get any better in remembering (securely) longer and longer |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
585 |
passwords. The big question is which technology can replace |
f10d905e947f
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
184
diff
changeset
|
586 |
passwords\ldots |
158
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
587 |
\end{document} |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
588 |
|
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
589 |
%%% Local Variables: |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
590 |
%%% mode: latex |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
591 |
%%% TeX-master: t |
702fea7754eb
added handouts
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
592 |
%%% End: |