lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bf0173120609081533y6d74ba4dm7c8b4d139419a3d0@mail.gmail.com>
Date: Sat, 9 Sep 2006 10:33:19 +1200
From: "Bojan Zdrnja" <bojan.zdrnja@...il.com>
To: "Hadmut Danisch" <hadmut@...isch.de>
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: RSA SecurID SID800 Token vulnerable by design

On 9/8/06, Hadmut Danisch <hadmut@...isch.de> wrote:
> Hi,
>
> I recently tested an RSA SecurID SID800 Token
> http://www.rsasecurity.com/products/securid/datasheets/SID800_DS_0205.pdf
>
>
> The token is bundled with some windows software designed to make
> user's life easier. Interestingly, this software provides a function
> which directly copies the current token code into the cut-and-paste
> buffer, when the token is plugged in into USB. This is weak by design.
>
> The security of these tokens is based on what RSA calls "two-factor
> user authentication": It takes both a secret (PIN) and the
> time-dependend Token-Code to authenticate. The security of the
> Token-Code depends on the assumption that the token is resistant
> against malware or intruders on the computer used for communication
> (web browser, VPN client,...).

I didn't play with the SID800 token (just have the SID700 token which
is practically the same, but doesn't have USB capabilities).
I'm not sure how difficult or easy it is to poll the token code off
the device. It would make sense to me that RSA thought of this and
that the communication between the polling application (the RSA
Authenticator Utility) and the token itself is encrypted (for example,
using some public/private encryption). If the RSA Authentication
Utility requires unique identification about the token used (it's
serial number, which is related to its seed) then it would be very
difficult to write another polling application for attack you
described. Impossible not, but difficult and it had to be very
targeted because if the same public/private encryption I mentioned was
used, an attacker would have to extract the public key from the
application in order to decrypt the token.

The easiest way to check what's going on is to use some of the USB
snooping tools which enable you to see what's going on to/from the USB
device - if you still have the token you can try doing this.

This all being said - the token can be used in an offline mode as
well, if the user want's a higher level of security, same as SID700.
There will be no "advanced" features and the user will have to type in
the OTP manually, but at least he can be sure that nothing can
compromise the token.

Cheers,

Bojan

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ