New Software Secures Data when Owners Walk Away 304
Makarand writes "Leave an operating laptop unattended on your desk and your sensitive data
is accessible to anyone who gets hold of it. To limit this risk many users
configure their systems to fall into a "sleep" mode after a period of inactivity
and ask for a password before the system can be awakened. This constant re-authentication
proves to be a headache for many users. Now a Professor and his
graduate student at at the University of Michigan have come up with a system
called
Zero-Interaction Authentication (ZIA),
described in this article in The Age,
to protect data on mobile devices.
The system works by starting to encrypt data
the moment the owner walks away from the system. The owners wear a token with
a encrypted wireless link with the laptop. If the token moves out of range the ZIA
re-encrypts all data within 5 seconds.
If the cryptographic token moves within range the system decrypts the information for the
owner.
The token, which could take many forms, is currently a wristwatch with a processor
running Linux designed by IBM."
wouldn't it make more sense (Score:4, Interesting)
I'm not an expert in encryption, but I have had serveral security related dongles and all of them were a pain in the arse.
it would seem that there are technologies (I've read about) that can return specific information passively when hit with specific radio frequencies. Wouldn't these be more easily used than a powered device like a watch?
Anyone else know more about these technologies?
Re:wouldn't it make more sense (Score:3, Informative)
Re:wouldn't it make more sense (Score:2, Interesting)
I think that my thought was that the
(hypothetical) passive device return a different
signal dependant on the signal recieved, not
simply the same one each time.
The more I think about it, the more it sounds
like such an action would require an
"active" (ie powered) device to accomplish
this.
but since I don't understand how RFIDs work
at all, the question still stands... could
it work with a passive (non-powered) device?
Re:wouldn't it make more sense (Score:3, Insightful)
Re:wouldn't it make more sense (Score:4, Informative)
Re:wouldn't it make more sense (Score:3, Interesting)
I don't know much about RFID's, but I think you're probably right. Here's a question: wouldn't it be possible to capture someone else's EZ-Pass ID then and then replay it? If it is possible, how come no one has (apparently) done it?
I think the key take-away from this article is not so much its implementation as the idea: 1. the mobile device somehow identifies its owner, 2. when the owner is not around, then the mobile device becomes useless.
If RFID's aren't the way to accomplish (1), then people in the future just need to think about the way to accomplish it in a different way.
Man in the middle attack (Score:5, Insightful)
A possible solution is to generate a second low powered signal from the laptop; this signal would be generated from nothing more than some strongly encrypted hash, and most certainly be an AM signal. The nice thing about strong encryption is that it should be pretty much indistinguishable from random noise, so the this signal would be indistinguishable from background noise.
Then you have the frequency the signal is broadcasted on randomly shuffled based on the current time. The laptop and the token are time-synced (not a problem, most decent cryptographic tokens are time-synced anyway), so the token is always listening on the correct frequency.
At this point you have the correct waveform, although its amplitude will depend on your distance from the device. Every tenth of a second, or something, normalise the signal based on the RMS power, then compare the input signal based on what you compute it should be (you know the secret, so you can also compute the hash).
To fool this system you have to replicate the exact signal as it bounces around frequencies. Since it's bouncing around frequencies you can't just repeat the signal you're recieving on a specific frequency, since that won't matter. Further, for each part of the signal you repeat, you'll be off in intensity by a certain amount based on the frequency you're tuning into relative to the frequency its actually being transmitted at, and unless you can exactly predict the pattern you your error will vary. You can't track the frequency since you'd need to break the encryption. Really, this is nothing more than frequency scrambling that's been used by the military to secure communication for years, used in a slightly different way.
I'm sure there are other ways to solve the problem. So yes, it could be a problem if it wasn't taken into consideration, but it is a solvable problem.
Re:wouldn't it make more sense (Score:3, Insightful)
Which is why most users would just leave the dongle next to the PC with the sticky note that has all of their passwords on it.
User's need to be in the habit of locking the workstation when they leave it. A good IT department will audit this (at least for the users that reside in the office... that goes for plain-view passwords, etc) and penalize users who do not (give them a slow POS or something with a ton of dead pixels). Soon, it will be a subconscious task that is performed before the PC is left. Add a hard drive password (laptop only?) or a drive encryption mechanism (like Safeguard [utimaco.com] and the data is more secure than it would be with a dongle.
Re:wouldn't it make more sense (Score:2)
Re:wouldn't it make more sense (Score:5, Insightful)
People will carry their key with them if it's required to do everything they want to do away from their desk too.
Re:wouldn't it make more sense (Score:5, Funny)
Re:wouldn't it make more sense (Score:5, Funny)
I used to have great fun with people who did this at a previous job where the majority of machines were Sun/Linux. One guy constantly left his machine logged in, so I'd sneak over and drop the security on his X server (xhost +), then have great fun randomly opening apps on his machine across the room. Since he was a hardcore Windows man (he was working as a Perl programmer, and didn't have any interest in the operating system) he had no idea what was going on.
Oh yeah, I also set up a cron job to open Netscape, pointed at the famous goatcx site at lunch every day on his machine for a while...
Re:wouldn't it make more sense (Score:3, Funny)
Re:wouldn't it make more sense (Score:5, Interesting)
One of my major peeves is the RFID card that gets me into work every morning. In certain stores, my RFID card returns a code that sets off their RF tag detectors at the door. Usually I remember, pull out my wallet, and hold it over my head while walking through. Once I forgot at Fleet Farm (basically a giant general store, like Home Depot with tractor parts) and I set off the alarm. Of course someone came to visit me, and it was especially embarrassing because I was wearing a big coat and didn't buy anything. She handed me a little piece of cardboard called a "Schlage Shield" and said to put it in my wallet. No more alarm.
Worked great, except that opening the door at work involved putting down my coffee, laptop, and lunch to get out the RF card (instead of conveniently pressing my butt against the door). So I took it out, and promptly set off a Barnes & Noble alarm. No one seemed to care, so I just pulled out my wallet and walked through with the wallet over my head again.
ANYWAY...the point is that RFID tags are barely more secure than keeping a post-it note with an access code.
I am curious exactly what my card claims to be on the store scanners....
And the whole article is a duplicate.
Re:wouldn't it make more sense (Score:3, Interesting)
If I read you right, you're talking about passive RF stuff, like in those bigassed Honda keys.
They use RF generated from the car (ping!) to generate just enough electricity to de/encrypt a response (pong!). Viola! (sic)
I guess it's more like a transformer coil than RF, but what the hoo.
Re:wouldn't it make more sense (Score:5, Funny)
Dude, you're definitely wearing your dongle in the wrong place!
It'll be a movie plot element within 3 years. (Score:2)
Re:It'll be a movie plot element within 3 years. (Score:3, Funny)
I know... call it The Key
Interesting article/research project (Score:5, Insightful)
Re:Interesting article/research project (Score:5, Funny)
finger print authentication. Its a lot easier to replace a stolen device than a stolen finger.
Re:Interesting article/research project (Score:3, Interesting)
Not necessarily [counterpane.com].
Re:Interesting article/research project (Score:2, Funny)
Re:Interesting article/research project (Score:2, Funny)
Re:Interesting article/research project (Score:2)
Re:Interesting article/research project (Score:2)
Re:Interesting article/research project (Score:2, Funny)
Are you Eric Raymond?
Sounds like smartcards (Score:3, Insightful)
Re:Sounds like smartcards (Score:2, Insightful)
Re:Sounds like smartcards (Score:2, Insightful)
Would that be the J R R Token (Score:4, Funny)
Vulnerable to brute force cracking (Score:5, Funny)
Re:Vulnerable to brute force cracking (Score:2, Funny)
Sounds like fun... (Score:2)
hmmm... (Score:3, Interesting)
Sure, its not foolproof, but who wants to wear an identifying token?
Re:hmmm... (Score:5, Funny)
Re:hmmm... (Score:2, Funny)
Four whiskeys later, and you've locked yourself out of your computer for the next 8 hours.
This would ruin pr0nsurfing as we know it....
Re:hmmm... (Score:2)
Non-PDF version (Score:2, Informative)
Something's missing (Score:5, Interesting)
What happens if you take your watch off and leave it next to the computer? It never encrypts!
Worse yet---what happens if your watch gets stolen? Now you can't get at your data! Better make sure you get the Casio [casio.com] watch option instead of the Breitling [breitling.com]. No one would want to steal a Casio POS, so you should be safe.
Re:Something's missing (Score:3, Interesting)
<sigh> No, that isn't the point at all. The technology is intended to stop the problem of people walking away from their computers ("I'm sure I'm only going to be away for a minute" -- gets dragged into a five hour meeting...) without locking them first.
The article even says that it was designed for use by people who are already using passwords, but are bothered by the inconvenience of having to lock the computer, and reenter the password every time they are called away for a few seconds. Not because they don't want to remember a password, but because it's a hassle to have to enter it all the time.
you call THAT secure? (Score:2, Funny)
Your security is nothing compared to that!!!!!
is currently a wristwatch with.... (Score:2)
Soon to be a chip implanted in your hand.
Don't forget the barcode on the forehead!
I'd much rather computers go wearable than implantable...
Use my technique (Score:4, Interesting)
To be perfectly honest, I just can't bring myself to respect anyone who would leave a $4,000 laptop with supposedly top-secret information on it sitting out on a cafeteria table or something while they go sit in the bathroom and read the paper.
Just stick with portable USB drives. They're cheap, efficient, fast, and more secure than any fly-by-night research project out there right now.
Re:Use my technique (Score:4, Insightful)
Re:Use my technique (Score:4, Funny)
I think you had a typo.
What you meant to say was
"and can be LOST at the gym, in the car, at work, at home, swiming, hiking, biking, etc.
hmmm... (Score:2)
hmmm....we have a watch, it obviously has some sort of wi-fi networking if it can keep in touch with the computer. How long until someone is assasinated by launching a DoS attack against his watch? It may not kill, but at least cripple as the watch burns its way through the flesh as the poor NIC on it is overloaded.....
Re:hmmm... (Score:2)
When i was working on it (2 summers ago, so a while back) we got bluetooth working decently well, in that one could give a talk w/ slides and control the slides w/ the watch's thumbwheel.
For Regular Business Users? (Score:2)
Ehhh... (Score:2)
At any rate, my question is "When will this be used to make smart guns?"
Re:Ehhh... (Score:2)
facial recognition (Score:2)
Short of growing a beard before you get back to the laptop it'd be a cheap workable solution.
Then you don't have to remember/wear some crazy ass security dongle.
Is it really so hard? (Score:5, Interesting)
Re:Is it really so hard? (Score:4, Insightful)
Re:Is it really so hard? (Score:4, Interesting)
I thought dell lattitudes did this? (Score:2)
I had a crackhead friend bring me one of these recently asking if I could make it work. I spent about 10 minutes reading posts about the hardware lockout and figured out it wouldn't happen without him calling dell. It was of questionable origin and he did not want to do that.
He then insisted on leaving it at my house for two fucking weeks insisting that i'm a computer genius and I could figure it out, despite the documention I had read.
Two weeks later he came back accusing me of being too lazy to have a look at it. Isn't that just the way it goes when you're the computer fixit guy?
Encrypts the data? (Score:3, Interesting)
What does it actually encrypt? All sensitive data? I doubt it could do that in 5-6 seconds. Also, how do you decrypt the data if you lose your key? Or what if you fire the employee and don't get the key back? How will you get the data, then? Is there a back door for sysadmins?
Re:Encrypts the data? (Score:2)
It probably encrypts your passwords.txt so that the thief of the laptop can not compromize your *other* accounts including that porn site one... :) Dunno about the decryption part happening in 5 seconds though... undelete?
Or maybe it is really smart and it keeps both copies of your data -- encrypted and unencrypted. The second you walk away the unencrypted copy is erased
Re:Encrypts the data? (Score:2)
Re:Encrypts the data? (Score:2)
Re:Encrypts the data? (Score:2)
Jeez, just use on-the-fly encryption already (Score:3, Informative)
Use a program like Scramdisk [clara.net] or the commercial version Drivecrypt [drivecrypt.com]. Keep all of your critical files on the encrypted partition. When you leave your desk, activate the screenserver with a keystroke.
Unless someone knows your password, you're safe. If they reboot, the encrypted disk is inaccessible.
What's the big deal?
You missed the point entirely (Score:2)
Really, this is nothing new. People have been using physical tokens for authentication for years (although usually for the added security value). In this case the token is being used to increase convenience, not security direclty (although the end goal being to improve security indirectly), which is what makes it different.
Of course, if you are the kind of person who'd leave your watch next to your laptop when you go to the bathroom, I'd recommend against using this. ;)
Practical? (Score:2)
How fast will this encrypt/decrypt data? I probably have well over a gig's worth of 'sensitive' documents and data on my laptop, stored in various directories (and unfortunately the approved OS at work is winblows). Encrypting will not take mere seconds.
More often than not, when I'm not at my desk I'm a few cubicles away working with other co-workers. Sometimes I'm not away from my desk for more than 10-15 seconds. Right now if I suspect I'll be gone from my desk for a while, and it's not in plain view, I'll turn on my screensaver (password locked) with a touch of 2 keys. This system sounds like it will arbitrarilly start encrypting my data as soon as I'm outside a specified range. If I'm away for just 15-20 seconds, this seems very impractical. Not to mention other things, like forgetting the transmitter at home (how many of us have forgotten our work passes at home once or twice?), having the battery die, etc.... On such occasions you'd be totally locked out from accessing your own data.
No thanks, this seems way too impractical for my taste. Move along, there's nothing to see here.
New technology only changes the attack mechanism (Score:3, Insightful)
It's very comprehensive, and it addresses many aspects of the social and technological attacks.
In my mind, the weak link here is clearly the watch. Watch technology isn't very complicated (read: very big), and how many designs could their possibly be? If one knows where the hardware information is located, a system replacement under the face, and you've got some issues. How many people wear watches to bed at night? Or in the shower? Difficult, but possible
A quick couple of replacements, and you have a watch that has a short range transmitter also transmitting the information that you'd need to dissolve the encryption link, and maybe begin a traditional man-in-the-middle attack. Once you see what cards the watch is holding, shouldn't the rest of the exchange be trivial?
While this is a great mechanism for an encryption scheme, what attacks are there against the physical and social component? These are the items of which spy thrillers are made, and will probably (hopefully) never come into play.
All in all, an excellent read from the UMich folk, and they have my applause.
--jaybonci
Re:New technology only changes the attack mechanis (Score:2)
The watch is running Linux; how many possible programs can there be? More than there are particles in the universe...
There are lots of challenge/response identification schemes that run nicely on my old 200 Mhz PII box that would be very hard to crack with current technology, so I would have faith in that part of the system.
Fry the Cache (Score:2)
Re:Fry the Cache (Score:2)
Damnit I need a smoke.
Weakest Link (Score:2)
To save my hand... (Score:5, Funny)
Re:To save my hand... (Score:3, Funny)
Why to use an active device (Score:2, Informative)
If the password is received and is correct, the computer stays in public mode. IF the password is incorrect: either
So the laptops locks up until you start to use it and the watch recived a timed ping, or you initiate the send from the laptop.
This system provided user authentication and data security, the two main points of a secure system.
Dongles revisited (Score:4, Insightful)
Great, something else to buy. My fingers are cheaper and I'm not one of the people who has a problem logging in with a password. Why should I fork out cash for this?
Re:Dongles revisited (Score:2, Informative)
I think its a good idea espicaly if it expands I'd like to see other devices use the same key. You could start your car, buy a coffe, walk in the (locked) parking entrence at work, open your office, and log in your computer all with a password you entered in your watch when you woke up.
I like it - beats the hell our of attaching a dongle into the back of my computer to use the encyclopedia bratianica. (way back when)
Re:Dongles revisited (Score:3, Informative)
Here is one possible reason.
If this device (or a similar device) is able to encrypt your hard drive then it would be an effective combat against some of the more intrusive aspects of the patriot act. In that legislation there are clauses that allow the FBI to enter your home when you are not in and bug your place and place trojans in your computer while you are not home and without letting you know about it.
My point is that automatically encrypting your hard drive is more effective then having a password protected system especially if that encryption is done with huge keys that are stored on the watch.
The golden rule is broken (Score:2, Insightful)
I was taught that once someone has physical access to a system, it's game over with regards to security.
In other words, the authentication system will only deter, not stop unauthorized access. How about just taking the laptop with you?
Flushing sound heard as user backs away (Score:2)
Only the men with get this joke..
Or! Use it in the opposite direction... (Score:2, Funny)
Or tag the girlfriend and always hide the pr0n!
ZIA Redux (Score:5, Informative)
As much as I enjoy the free publicity, this has been posted on slashdot before. [slashdot.org]
To correct a serious error that appears in this article and in the nytimes article this was cribbed from: The system was NEVER run on the IBM watch. We mentioned it as a possibility and somehow it was taken as fact.
I welcome the comments on the work, however remember that the world of university research is often more forward looking than the commercial world. That is our job!
A question (Score:3, Interesting)
Lost tokens? (Score:3, Interesting)
I'm a netadmin for some not-very-savvy users, and if I couldn't restore access to their data just by resetting their password then they are all in trouble.
This is an issue for a lot of encryption solutions, not just this one. Is there a master key list somewhere than can be used to recover encrypted files or volumes or at least recreate the encryption key device? How long would that take? (This opens another discussion over security of the master list and key-changing and reencryption procedures for lost and stolen tokens.)
And what if the device gets stolen? I have a security token that requires a PIN in conjunction with its security (both the PIN and device are needed for access), but in the case of this article the whole point seems to be to avoid entering a password or PIN.
Sounds like a nice idea. (Score:5, Insightful)
For now I will continue to dream and maybe even write a book entitled "2085" by Ali Orwell.
Re:Sounds like a nice idea. (Score:2)
Re:Sounds like a nice idea. (Score:2)
Erm...brute force? (Score:3, Interesting)
On another note, this reminds me of the plan to put RFIDs in the new high-denomination Euro-notes. Something like takes all the effort of guesing who to mug: emit the signal, and anytime you get a response, you know the guys's packing a high-value Eruo-note.
Still... (Score:2, Insightful)
Seems Like They're Doing It The Hard Way (Score:2)
Breaks an important rule (Score:4, Insightful)
Something you have
Something you know
Something you are
Anything that relies on just one of these catagories is going to be significantly easier to break than one the follows the rules. Most commercial security these days is based on something you know (password) and nothing more. Good security systems require all three, biometrics, password, and a physical token. biometrics are suseptible to advanced attacks but thing like thermal imaging for skull structure combined with retinal imaging is pretty close to unbreakable. Passwords are notoriously lacking because passwords strong enough to be secure are difficult for most people to remember so they end up either weak or written down. As for token systems other than smart cards and the IBM watch I have not seen many implementations out there.
Biometrics are flawed (Score:3, Interesting)
The fundamental problem with biometrics is that you can't change your keys. You have a set of fingerprints, retinal patterns, DNA sequences that are really pretty damn hard to change.
Biometrics can only work with strong physical security to ensure that the tests aren't being compromised (i.e., someone hacking the device).
To steal your password I have to look over your shoulder, and once done you can change it. To steal your authentication token, I have to pick your pockets, and once done you can get a new one. But I can pull your fingerprints from anything you touch, and you'll have a much, much harder time changing those.
Biometrics are often portrayed as the panacea for authentication, but of the three 'seomthing you X', it's really the weakest. Haven't we learned yet that there's no such thing as a silver bullet?
Use in hospitals (Score:2)
Great combination opportunities ? (Score:2)
"you want an www.ibm.com/we/own/joo or a www.bank.com/all/your/base/is/in/my/pocket?"
Existing measures are overlooked (Score:2)
What headache...? (Score:2, Informative)
Vulnerability already discovered! (Score:4, Funny)
Hehe gotta love the spelling (Score:2)
Don't mean to be a grammar nazi, but... from the don't-lost-your-watch dept
Is that poor grammar, or just hedging their bets? The alternative is to misspell "lose" as "loose," which is definite grammar nazi fodder :)
Security-wise, this is still a PASSWORD issue (Score:3, Insightful)
People will still use stupid passwords. GONG!. They'll use the same letter conventions that 99% of the population uses. I guarantee that one guy with a high-end laptop could walk through an office and guess 99% of the passwords within a few minutes. Or maybe they'll guess 1% and get the temp's password. Good enough, access to the internal network is almost always sufficient to own the rest of the network.
There is no technology that will override stupidity.
Been here before (Score:3, Interesting)
There are a lot of questions (privacy etc) about those other uses, but a system which gives you multiple returns from the single cost of wearing some kind of ID is much more likely to be adopted than a single dongle for a single job.
repeat article (Score:5, Informative)
The original is here [slashdot.org]. At least they waited some weeks before reposting it.
Re:repeat article (Score:2, Interesting)
This is why I like slashdot... an interesting story comes along, & I miss it...
A few days, weeks, or sometimes hours later it's reposted and I catch it on its second run.
Makes me wonder how many interesting articles I really do miss...
Re:Airport? (Score:2)
Re:mmm, mmm good (Score:2)
On the other end of the spectrum, you want to avoid what I see at work... I use 12+ different Oracle databases which expire in uneven rotations (# includes dev/test/production), an NT account, SAP software payroll account, and if I want to work off-campus, they're now giving out these RSA fob-number-generators, where you have to enter the 8 digit number generated every minute (and synchronized to the base station) into the VPN software you use to dial in. Not exactly the most user-friendly authentication system.