New Controversy over Black Hat Presentation 144
uniquebydegrees writes "InfoWorld is reporting about a new controversy swirling around a planned presentation at Black Hat Federal in Washington D.C. this week. Security researcher Chris Paget of IOActive will demo an RFID hacking tool that can crack HID brand door access cards. HID Corp., which makes the cards, is miffed and is accusing IOActive of patent infringement over the presentation, recalling the legal wrangling over Michael Lynn's presentation of a Cisco IOS hole at Black Hat in 2005. Black Hat's Jeff Moss says they're standing by their speaker. A news conference is scheduled for tomorrow AM." Update: 02/27 20:10 GMT by Z :InfoWorldMike wrote with a link to story saying that the presentation has been pulled from the slate for Black Hat, as a result of this pressure.
Ooh! Ooh! (Score:4, Funny)
Re: (Score:1)
Security through hat-scurity (Score:3, Funny)
Moo (Score:1)
This may generate as much interest as Darwin's debate.
Learn something new every day... (Score:2)
I thought when reading this, that it was some kind of bad typo or misprint, then I looked up to see if posit [reference.com] was really a word.
Turns out it was. Geez...learn something new every day, even on /.
What hack? (Score:4, Interesting)
So what is this "hack"? Recording and replaying the serial is nothing new.
Re:What hack? (Score:5, Interesting)
Re: (Score:1)
If its really only RFID with a number sent out, then the system is broken by design.
If you check out possibilities, a public key system identifying with the "house PKI" would be about the only way to get along in a somehow safe way.
Re: (Score:2)
At least with the RFID system, if you try to brute force the door it can disable access and call the cops after a certain number of failures. You can try keys off a ring, or pick at a physical lock all day as long as nobody happens to see you.
Pretty much just like a key. (Score:3, Insightful)
And with a huge false sense of security. Oh, and it costs a lot more.
So, exactly what's the benefit again? Aside from the fact that employees can act all cool, by waving their badges at a sensor instead of sticking a metal piece in the door?
Re: (Score:2)
They're not about additional security over traditional keys. They're about convenience. If anybody gets a false sense of security from these devices, it's because they didn't do their homework. The fact of the matter is though, that even with the flaws that are
Re: (Score:2)
If you're the target of a determined and specific attack neither system will hold up, but with prox keys you're vulnerable to more casual attacks of opportunity. (Once the equipment to clone cards becomes widespread, anyway.)
The key management advantage for cards is huge, though,
Re: (Score:2)
Is that really true though? It doesn't seem to me that you'd need any more specialized equipment to copy a physical key from an image (especially if you can get your hands on a blank, which isn't hard) than it
Re: (Score:2)
Actually, no. You just need a cloner to record and replay the signal. It's cloners - such as what's described in TFA - that make attacks-of-opportunity a viable threat. And it's this threat that - while pretty unlikley - drove me to crypto-enabled cards.
See, I work in a medical clinic with several primary care docs. They're over at the hospital quite often, doing rounds and whatnot. The hospital uses HID prox badges (so far as I know) f
Re:What hack? 100% Right (Score:3, Interesting)
I'm not smart enough to do it, but a very interesting project for those with the talent would be building a hardware device to spoof cards and brute force access control systems like most parking structures and numerous physical building access control systems. I'm not aware of an
Re:What hack? 100% Right (Score:5, Informative)
Re: (Score:2)
Even if it doesn't, halfway competent security staff would notice the attempt right away. One of the guys here showed me how their monitoring system works once - any time someone uses an invalid card (whether it's deactivated or just doesn't have access to that door) or the door is held open too long, or anything else out of the ordinary happens, the security cameras take snapshots
Re: (Score:2)
Re:What hack? (Score:5, Interesting)
If this is just a tool to clone HID Prox cards, then it's nothing new... but it'll make me look good to my boss. (Sweet!)
If it's a tool to spoof iClass readers then it's new, a pretty big deal, and I just wasted a few thousand bucks. (Boo!)
Re: (Score:1)
Something you know
Something you have
Something you are
Re: (Score:2, Informative)
Clearly someone got their Security+ cert recently.
Something you know
Would be the PIN
Something you have
Would be the RFID card
Something you are
Is generally a biometric device confirmation
Any one of the above is normally relatively trivial to crack, as you add the others the difficuly goes up exponentially.
The best systems use all 3.
The Sproggg
In other words... (Score:5, Informative)
Patent = No Hacking (Score:4, Funny)
I'm convinced.
Re:Patent = No Hacking (Score:4, Funny)
They have a patent. Therefore, no one can break their security. It would be illegal.
It's also ironic that the US Patent & Trademark Office uses HID cards on their doors...
A circular protection that can not be broken
Re: (Score:2)
1. duplicate a working card.
2. open door to the patent office.
3. profit!
"The end justifies the means." - Sophocles
Re: (Score:2)
I think that qualifies as "broken by design".
Can't break what's already broken though...
So if it ain't broke, don't- Uh, gimme a moment here... I think- Oh, oww! My head...
Dictionary police (Score:2)
I'll tell you what's ironic. Rebar!
Re: (Score:2)
Re: (Score:2)
Giving a demo or publishing a paper is in NO WAY a patent violation. If he were building and selling a device that relied on the patent,
Re: (Score:2)
HID has its head in the sand (Score:5, Interesting)
Re: (Score:3, Interesting)
You really wouldn't want to encourage peopl
Re: (Score:3, Interesting)
I think the solution is just to issue everyone a metallic container, which slips over the card and covers the portion of it that contains the antenna. Maybe you could even design one that would reveal (through a clear front) the name and picture of the bearer, but cover the back of the card and keep it from being read.
How about just use magnetic stripe cards? The only way to read it is to physically slide it through a reader.. if you have to 'open' your RFID card to get the reader to recoginize it, then it's just as simple to slide it through a reader on the wall, but probably much cheaper.
Yes, RFID is cool and all, but in a lot of ways people are using it as solution to a problem that doesn't exist.
They're starting to put it in credit cards, which just makes no sense to me at all. Instead of sliding it through a reader
Re: (Score:2, Interesting)
It's common now for cell phone cases to have magnetic flaps on them. The only reaso
Re:HID has its head in the sand (Score:5, Insightful)
You know, in fifteen years of carrying a credit card, I have never had one fail. The high-coercivity mag stripe cards are darn near indestructible. By contrast, the low-coercivity cards that they use at some hotels... I've had them just suddenly fail on the third or fourth use and have to be reprogrammed multiple times in a single night (and about the fifth time I had the same card reprogrammed, they tossed it in a trash can and programmed a fresh one for me, which never failed again).
Put simply, low-coercivity cards suck, but high-coercivity cards are pretty solid. Just don't cut corners on your card programmers and you'll be fine.
Re: (Score:2)
But I think they're still using swipe
Re: (Score:3, Insightful)
Re:HID has its head in the sand (Score:4, Informative)
Several companies already make RFID blocking wallets. Presumably something similar could easily be designed for ID badges. I don't know for sure, but the wallets are probably lined in a way to make it act like a Faraday cage [wikipedia.org]. Here are examples of RFID blocking wallets:
Re: (Score:2)
Security is not a product (Score:4, Insightful)
Security through Risibility? (Score:5, Funny)
> HID has sent a letter to IOActive, a security consulting firm, accusing Chris Paget, IOActive's
> director of research and development, of possible patent infringement over a planned presentation,
> "RFID for beginners," on Wednesday, a move that could lead to legal action should the talk go
> forward, according to Jeff Moss, founder and director of Black Hat.
I, for one, take comfort in the fact that HID Corp can sue anyone that breaks into my workplace after cloning my security card.
Re: (Score:3, Interesting)
Re: (Score:2)
I assume it reports random numbers (Score:2, Insightful)
countermeasures: use longer ident numbers when programming the things. put a GOOD camera above the door or use an IR detector and if somebody stays at the door for a minute, the guard should use the intercom and ask them if they want to sleep in another doorway, or if they need to talk to a sheriff's deputy.
moral: relying on any one layer of security is no security if somebody really wants in. multiple levels and somebody awake someplace who cares will fix
Re: (Score:1)
Retains the number, and spits it back out.
Reporting random numbers usually wouldn't work, as many access control systems will disable the reader after a pre-configured number of invalid attempts.
As well, if this system is monitored, invalid card reads would litter the screen of an operator or guard station.
Your other points about adding more layers of security are all dead on though.
Re: (Score:3, Interesting)
countermeasures: use longer ident numbers when programming the things.
Or do what the devices already do: have at least a second's worth of delay between them, log invalid access attempts, and have the reader beep each time a card's signal is detected.
Slashdotters tend to be very arrogant about this sort of stuff. Did it occur to you that most of these concerns are obvious, and are both understood by security professionals and have been addressed to some degree?
Example: even if you can clone the card
after the building is taken down, that is (Score:3, Interesting)
"hey, pard, where's your badge today?" costs nothing. adds 60,000 security persons to the force. even if half of them are just going through the motions day in and day out, it can stop a lot of riders.
Re: (Score:2)
It is impractical to expect any significant number of employees to actually follow through on such plan, regardless of corporate policy.
Re: (Score:2)
don't let anybody pretend to be your shadow flitting by as the door closes
One place I worked (early 90's) had powered revolving doors triggered by a card swipe, and there was barely room for one to get through the door. But the swipes were on podiums about 18 inches from the door, and the door started moving pretty quick, so you had to be ready to jump into the door before it started moving. The system tracked you as in or out, so if you swiped and didn't make it in, you had to explain what happened to a human guard.
Responsibility? (Score:5, Insightful)
This blows me away. Rather than taking the responsibility for having a flawed security system, rather than having the responsibility as a company to say "Hey, yeah we know about this and we are going to fix it after 15 years," the company accuses the security researcher of a lack of responsibility for "revealing" how to exploit these systems. I feel like bizarro world has become the real world when I read these kind of comments.
Re: (Score:2)
Asked why HID hasn't addressed the issue in more recent proximity card systems, after knowledge of RFID threats became common, Carroll said that doing so would cause "major upheaval" among customers.
I can just picture this attitude at work:
ME: Hey Boss, big security whole in our servers. We will have to start patching immediately. Might take several days.
MANAGER: No, it's too much work for your team and it will upset the users. Go home, sleep well and we can look at this later.
Next day...
DIRECTOR: Let me introduce your new manager....
Re: (Score:3, Interesting)
Even Better -- Re:Responsibility? (Score:1)
Apparently the "major upheaval" necessary to bring their product's security up to snuff is less desirable than the "major upheaval" that would occur if the currently poor security were exploited in a headline-grabbing, stock-price-swatting incident. Perhaps their risk-analysis number-crunchings have been tain
Re: (Score:2)
Allow me to quote some snippets from TFA to answer your questions and show how HID is behaving:
Patent Infringment? (Score:1, Redundant)
Re: (Score:2)
Re: (Score:2)
2MPA2C*
*(too much prior art to cite)
New RFID to Secure HID, Passports, ID and CreditC (Score:1)
Re:New RFID to Secure HID, Passports, ID and Credi (Score:1)
Oh, and BTW, ImmuneID's website sucks. It's pure flash and resizes my browser. On that basis alone I would not buy your product nor recommend it to any of my customers.
Re: (Score:2)
Re: (Score:1)
Re:New RFID to Secure HID, Passports, ID and Credi (Score:2)
It seems like it's major feature is a 'safety' that keeps it from broadcasting or receiving, unless activated by skin contact. In other words, an on/off switch. Not a bad idea, but you could just as easily take a regular passive card, and put it into a metal case, and then take it out when it needs to be used.
Many people keep their cards in carrier-cases anyway (because they need to be remov
Best Part (Score:1)
You go DT, I mean, um, Jeff.
How do you violate a patent by speaking? (Score:1, Insightful)
Re: (Score:2)
Nothing to stock an individual using a patent to build a one-off.
Re: (Score:2)
"(a) Except as otherwise provided in this title, whoever without authority makes, uses, offers to sell, or sells any patented invention, within the United States or imports into the United States any patented invention during the term of the patent therefor, infringes the patent." (emphasis mine)
From: here [cornell.edu]
Not that I think HID's whinge has any merit whatsoever. Hell, even the first amendment should protect someone demonstrating a prototype cracking tool for the purposes of showing
Re: (Score:1)
...will demo an RFID hacking tool...
Presumably demonstrating (actually using) the tool would utilize what HID Corp. has patented. And you can't do that without some prearranged agreement with the IP owner. BTW here is a list of HID Corp. patents: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PT O2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.h tm&r=0&f=S&l=50&d=PTXT&RS=AN%2Fhid&Refine=Refine+S earch&Refine=Refine+Search&Query=an%2F(hid+AND+cor poration) [uspto.gov]
Re: (Score:2)
Using tool: okay
Showing others how to use the tool: still okay
Selling the tool: not okay.
At this point, I'd say he's in the clear unless he's selling the tools or the schematics (though you probably can sell the schematics, since you apparently can sell access to the Patent database.) You actually have to make something and sell it to violate a patent - personal use is just fine.
Re: (Score:1)
A true blackhat wouldn't (Score:1)
Re: (Score:2)
Litigation vs. Inteligent Implementation (Score:5, Insightful)
Unless he's selling this.... (Score:2)
Keep our secret (Score:2)
(No thoughts about what it might do to their customer's profits after a few break-ins.)
Proximity vs RFID (Score:5, Informative)
Its really odd to hear them mention you'd need to bring the card up to 2-3 inches to the reader, when they keep talking about RFID.
Its clearly proximity.
Also the fool on the video mentions this as if its new, numerous websites mention how to do this and have for years.
Proximity has its draw backs and EVERYONE knows this.
Which is why HID HAS addressed it with new products. HID iClass readers. 13.56mhz, with Encryption between the card and the reader. After 2 roll-overs of public to private encryption keys, you no longer can just read the card with any reader you actually need to know the private key.
So:
RFID not what they are talking about.
RFID
RFID should not be used for access control (unlocking doors from 5 feet a way... seriously...)
Proximity vulnerable (nothing new)
HID iClass (13.56mhz proximity with Encryption) HID has a solution (makes me wonder why they never mention it though...)
Disclaimer: I don't work for HID, but I'm a Sales Engineer for an Access Control company and we use HID readers or our own which are also Proximity.
Re: (Score:2)
What does that mean? Is there a paper online somewhere that describes the scheme?
Re: (Score:2, Informative)
Basicaly, using the iClass readers, there is a basic encryption key between the card and the reader.
Using a special card, a reader can be programmed with a NEW key.
The reader now accepts the old (public key) and new (Private key).
When an old card is presented to such a reader, the cards key changes to the private key after negotiation.
After a while, you reprogram the readers to a SECOND private key.
Now that reader ONLY accepts Private key
Proximity vs RFID vs What? (Score:2)
From your description, not REX (Score:2)
Still, the system could not have been motion or heat activated. The locks didn't open when a customer entered the hallway on the way to the restroom; they only opened for employees (who were all wearing badges, so I assumed that had something to do with it).
Thanks again.
Re: (Score:2)
Yes, the badges these guys wore were quite t
Sitting down now compromises security (Score:1)
> Kathleen Carroll, a spokeswoman for HID's Government Relations group acknowledged that a letter was sent to IOActive but that it did not mention patent infringement. She said that the company has long been aware that its proximity cards are vulnerable to hacking but does not believe that the cards are as vulnerable as Paget suggests.
> "For someone to be able to surreptitiously read a card, they'd have to get within two or three inches and get into the same plane as the card," Carroll said.
O
Re: (Score:1)
Sigh.
The demo is cancelled.... (Score:5, Informative)
http://news.com.com/Black+Hat+talk+on+RFID+access
Gah (Score:2)
"I don't like it when really big companies throw their weight around," Jeff Moss, founder of Black Hat conferences, said on the Tuesday conference call. "This threatens the whole conference business."
What are you thinking, Jeff?
In 2005, you canceled a presentation because you received a legal threat from Cisco. You demonstrated to any company out there, that if they don't want a presentation to happen, all they need to do is send a scary warning on some official letterhead, and Black Hat will cancel the p
Re: (Score:2, Interesting)
Faraday Covers (Score:1)
http://www.pcworld.com/article/id,120292-page,1/ar ticle.html [pcworld.com]
From article: "Texas Instruments, a major manufacturer of RFID chips, confirmed that a properly designed cover could block the RFID signal.
'Stitching a metal web into the cover creates a Faraday cage,' says V.C. Kumar, manager for emerging markets at TI. 'It kills the RFID signal.'"
I'm
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
And, considering harmonics do trigger these cards, one would want broad absorption.
RFID should just be PART of Security (Score:3, Informative)
What you have - your ID badge/card
What you know - the PIN associated with that card
Who you are - a fingerprint/retinal scan/etc to be used with that card
The point is, ok, someone figured out how to easily clone RFID enabled "access cards". Is it the manufacturer's fault that many places rely SOLELY on those badges for their perimiter/access control? If your facility is truly "secure", there should be at LEAST the requirement of a PIN typed in along with a card swipe as well as cameras, physical security, and other standard procedures. If your facility's management has opted to rely on the cards as the only means of controlling who enters and when, then blame that same management if a problem happens. The term "security" is very subjective. What might pass for your average office building would never pass at a serious Datacenter or other Critical Facility.
Cant he just apply for a new patent ? (Score:1)
Must be free to highlight problems (Score:2, Insightful)
With the Department of Homeland Security expected to release the Real ID regulations very soon and dictate what type of machine readable technology will be in every drivers' license and whether it will contain RFID chips, and the Department of State starting to roll out RFID-embedded passports, it is partic
You don't even need the hardware... (Score:2)
The thing is, you don't even need the hardware. All you need is a reader to read the number of the card, which you can do through a pocket, and get the 36 bit number. Then you can just ORDER a card or keyfob on line! You can't do that with a brass key, a legit locksmith wo
Re: (Score:2)
Sorta.
Restricted keys, like the Medeco M3, won't be duplicated without a lot of paperwork and permission from the company who distributes the keys (even if you have the original key on you). Unrestricted keys--like, say, my house key--are duplicated by reputable locksmiths all the time. Just go to one and ask for a code cut of a specific blank.
How does this infringe? (Score:3, Informative)
This is some of the most contemptible saber-rattling -- and caving -- I've seen this year.
Retaliation (Score:2)
Take the bastards down, and anyone else who waves an attorney as an attempt to restrict knowledge.
If I had the opportunity (Score:2)
And the last page would have a "you're number one" on the bottom.
Thank you, HID, now we KNOW who to avoid (Score:2)
However, the RIGHT thing would have been to engage those people and see what could be improved. The WRONG thing to do is to abuse the legal system to prevent a public presentation - it simply draws more attention to the flaws and, more importantly, it offers a crystal clear illustration of the companies' attitude to a breach: they run away.
Or, let me translate this: their action spells in bright letters not to even THINK of relying on HID to
Funny defense... (Score:2)
In short, I don't think you can prevent someone from giving a talk about your patented technology.
Subject (Score:2)