Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

AT&T Identifies Widespread Security Hole - In Locks 498

__roo writes "The New York Times has an article [free registration required] about a researcher at AT&T Labs Research who has discovered a little-known vulnerability in many locks that lets a person create a copy of the master key for an entire building by starting with any key from that building, and it requires little more than a file and a few key blanks."
This discussion has been archived. No new comments can be posted.

AT&T Identifies Widespread Security Hole - In Locks

Comments Filter:
  • by mrpuffypants ( 444598 ) <mrpuffypants@gm a i l . c om> on Thursday January 23, 2003 @08:51AM (#5142301)
    so now Master is going to have to release patches and hotfixes?

    "Hey steve, check out my new lock!"

    "pffft, is it v.3.21.7?"

    "no"

    "that's like an invite for key kiddies and 1337 crackers"
  • by fistynuts ( 457323 ) on Thursday January 23, 2003 @08:53AM (#5142308)
    How did you post that message then?
  • Of course.. (Score:0, Funny)

    by tomknight ( 190939 ) on Thursday January 23, 2003 @08:56AM (#5142318) Journal
    ..it's all Microsoft's fault.

    Tom.

  • by Anonymous Coward on Thursday January 23, 2003 @08:57AM (#5142321)
    And eye will own your barbies!#()!)(% PHEYUR!!! this is a sig line this is a sig line this is a sig line
  • by angelsdescent ( 627539 ) on Thursday January 23, 2003 @08:59AM (#5142327)

    In the cert advisory, The Microsoft Corporation are quoted "Those who upgrade to Windows XP Service Pack One should be unaffected by this exploit"

    :-)
  • by Anonymous Coward on Thursday January 23, 2003 @08:59AM (#5142328)
    http://www.crypto.com/papers/
  • by Anonymous Coward on Thursday January 23, 2003 @09:05AM (#5142350)
    Slashdot keeps the bad speller...err...bad-spellerified.
  • by icantblvitsnotbutter ( 472010 ) on Thursday January 23, 2003 @09:08AM (#5142363)
    In this case, the information appears to have made its way already to the computer underground. The AT&T alert to law enforcement officials said that a prepublication version of the paper distributed privately by Mr. Blaze for review last fall had been leaked onto the Internet,
    though it has not been widely circulated.


    Well, I think we've fixed that little problem...
  • by Talisman ( 39902 ) on Thursday January 23, 2003 @09:13AM (#5142378) Homepage
    "...a little-known vulnerability in many locks..."

    Yeah, until now.

    Talisman
  • by HermDog ( 24570 ) on Thursday January 23, 2003 @09:17AM (#5142397)
    I must have missed the CERT advisory. Which Linux distros are affected? OpenBSD, of course, is not vulnerable as long as you use the default installation inside the welded safe.
  • security (Score:5, Funny)

    by v(*_*)vvvv ( 233078 ) on Thursday January 23, 2003 @09:25AM (#5142428)
    This is hilarious.

    I mean, anyone can break a window and jump right in!!

    We can call that a "backdoor", and the plywood to cover them "patches".

  • by grahamlee ( 522375 ) <(moc.geelmai) (ta) (maharg)> on Thursday January 23, 2003 @09:29AM (#5142450) Homepage Journal

    Xerox PARC have issued an advisory stating that any combination lock can be "cracked" by a malicious terrorist with a finger. Due to the digital [sigh...] nature of this crime, it is now illegal to own a finger under the terms of the DMCA and patriotic Americans are being asked to remove all their fingers in a show of solidarity. U.S. President, George W. Bush, is said to be having some difficulty removing his finger from his arse. £:-)

    BTW did the original story remind anyone else of the safe-cracking chapter in "Surely you're joking, Mr. Feynman"?

  • by stud9920 ( 236753 ) on Thursday January 23, 2003 @09:37AM (#5142487)
    "...a little-known vulnerability in many locks..."
    Yeah, until now.
    You do not actually believe ./ folks read the article, do you ?
  • by Lethyos ( 408045 ) on Thursday January 23, 2003 @09:37AM (#5142491) Journal
    I think that the manufacturer of the locks should sue AT&T under the DMCA for exposing weaknesses in an access control device. Furthermore, AT&T are terrorists for releasing this sensitive security information to the Net before other sites using the same locks are able to correct the vulnerability. I demand that the perpetrators that discovered the weakness with these locks be sentenced to life in prison. We can't have these hackers running free, finding security holes and disrupting national security!
  • by account_deleted ( 4530225 ) on Thursday January 23, 2003 @09:45AM (#5142538)
    Comment removed based on user account deletion
  • by Bob9113 ( 14996 ) on Thursday January 23, 2003 @09:51AM (#5142576) Homepage
    A Schlage employee, on condition of anonymity, said that they were consulting with their legal team on the feasibility of invoking the DMCA against Matt Blaze and AT&T. "Schlage locks are frequently used as a technological measure to protect copyrighted materials. By trafficking in information which allows the compromise of these locks, Mr. Blaze and AT&T are clearly violating the Digital Millenium Copyright Act."
  • by Anonymous Coward on Thursday January 23, 2003 @10:02AM (#5142636)
    You must have low self-esteem to believe that everybody else in the world knows the same things you do.
  • by sg_oneill ( 159032 ) on Thursday January 23, 2003 @10:04AM (#5142656)
    No it was a "crack" that went around more in underground circles.

    It didn't come to attention till a spate of Office buildings found the safe hidden and the words "Ownzed by l337 b3rgl@rz!!!" spraypainted in foyers.

    I believe Scotland yard are preparing a deb update.
  • by slothbait ( 2922 ) on Thursday January 23, 2003 @10:29AM (#5142798)
    Ah that guide was great fun back in high school. How did that guy running for president get flyers in the faculty bulleting board? Simple says I, Ninjas!
    The MIT guide mentions the file down master key trick, that was 1991.

    With this new article I may have to try again, the last time I tried to do something with the a master key at my university I ended up matching the right pattern for the key that pulled the cylinder (used to change the lock). It was not fun to explain why my dorm lock had 'magically' come out of my door to the Office of the Physical Plant.
    Lesson learned don't pick your own nose if it is exposed, err locks I mean locks.
  • by aburnsio.com ( 213397 ) on Thursday January 23, 2003 @10:39AM (#5142842)
    Kevin's only been on the net a few days now, and look what happens!

    No need to "Free Kevin" anymore... he's got the master key!

    "No, Officer, I didn't steal the key to the prison, I didn't take any hostages, all I had to do to get out was use this file here that Randall sent me in a Perl 6.0 Birthday Cake..."

  • by mav[LAG] ( 31387 ) on Thursday January 23, 2003 @10:46AM (#5142891)
    5) insert key2, rinse, lather repeat.

    So all we have to do is be on the lookout for suspicious looking characters with soapsuds still in their hair?

    *duck* - the rest of your points well taken.
  • by Hellkitten ( 574820 ) on Thursday January 23, 2003 @11:18AM (#5143095)

    Well as en evil overlord you should know that it's always preferable to get the key to the restroom, make a master key, and then copy the plans of the good guys without them ever knowing

    You break down the door and steal the plans: they change the plans and install stronger door. That's a vicious circle

    You make a master key and steal their plan, they know nothing, plan stays the same, locks stays the same. You screw their plan over without letting on you know it, then next week when they have a new plan you go get that too.

    pff evil overlords these days, no respect for finesse. You should be EvlUndrLrd instead

    And no Occams razor doesn't apply, "Out of two possible explanations the simplest one is most likely to be true". You seem to be thinking along the lines of "Out of two methods of breaking and entering, the simplest one has to be better" which may not be true depending on the situation

    Compare the time it takes to make a master key and enter 100 rooms to the time to break down 100 doors

  • In fact ... (Score:3, Funny)

    by A nonymous Coward ( 7548 ) on Thursday January 23, 2003 @12:03PM (#5143352)
    ... this is the vaunted back door or front door exploit ... side doors too.
  • by Anonymous Coward on Thursday January 23, 2003 @12:56PM (#5143795)
    Let's not forget that with a little social engineering you can get the same results. When I was in High School I obtained the master keys for both the Middle School and the High School, even had the alarm codes at one time. It's all about who you know (or sleep with).


    So did you sleep with the principal, or the janitor? :-)
  • by AftanGustur ( 7715 ) on Thursday January 23, 2003 @01:02PM (#5143842) Homepage


    The method as described on other comments, is just brilliant.. But there is one problem that nobody has mentioned..

    How do you get the blanks ?
    You see, with master-key systems the keys have other shapes than ordinary keys (often a mirror pattern if you look at the end of the key, so ordinary keys won't fit in master locks) Keys in master-key systems are often also a little longer than ordinary keys.

    And Joe sixpack just can't walk into any hardware store and ask for the blanks.. The hardware store has limited numbers (if any at all) and has to get the paper-certificate that was delivered with the key-system, before they will cut you a new copy.

    And, no, just bringing the master key to them and asking for a copy doesn't work (I already tried that ;-)

  • by Starman9x ( 634099 ) on Thursday January 23, 2003 @02:03PM (#5144343) Homepage Journal
    looking for scratches at various heights is an ANALOG process -- the DIGITAL millenium crap doesn't apply :)

  • by Reziac ( 43301 ) on Thursday January 23, 2003 @02:20PM (#5144521) Homepage Journal
    But just wait til they plug the analog hole ;)
  • by Obfuscant ( 592200 ) on Thursday January 23, 2003 @02:31PM (#5144630)
    ...cut the hilt off so that the key will go in too far to work.

    This is still too dangerous, since they can see that you cut off the hilt and they can just compare your key to theirs (if they have a master of their own.)

    Much better to cut the key backwards -- that is, the cut normally at the end appears next to the hilt, etc. Unless the master is symmetrical, they won't be able to compare it to theirs, and it won't work when they try it.

    Of course, you'll have to insert it from the back of the lock to use it, but that's a minor inconvenience compared to prison time.

  • by commodoresloat ( 172735 ) on Thursday January 23, 2003 @09:13PM (#5147551)
    I brute forced the lock on my dorm room door when I was in college. It took a few tries, but I kicked and kicked until the door broke open.

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...