Keys Leaking Through the Air At RSA 85
NumberField writes "The RSA Conference is underway in San Francisco. A theme among the opening speakers is that the attackers are winning, and even well-funded organizations like NASDAQ can't secure their networks reliably. The show floor is lively, but dominated by the typical firewalls and 'compliance solutions.' One interesting exception is a scary side-channel analysis demo in the Cryptography Research booth using GNU Radio to capture secret keys from various smartphones from about 10 feet away. (The method is related to early computer music using AM radio interference.)"
Where's TFA? (Score:1)
None of the links seem to be to anything very specific about the title issue ("keys leaking through the air")... was something mispasted in the submission?
I fucking hate summaries like this (Score:5, Insightful)
I fucking hate summaries with a half dozen links that don't seem to link to an article actually discussing the issue in the summary.
Why approved this shit?
Re: (Score:1)
The summary is the article.
Re:I fucking hate summaries like this (Score:4, Insightful)
Sounds like the poster is using slashdot to blog about what he is seeing at the RSA conference. There aren't good links because the data was originally presented in meatspace.
Re: (Score:1)
That's what Horton heard!
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Yeah. Really fucking stupid.
Re: (Score:2)
"Profanity is the crutch of the ignorant, but every once in a while you've got to talk to one of those ignorant motherfuckers..."
Re: (Score:2)
Why approved this shit?
With apologies to Abbott and Costello:
http://en.wikipedia.org/wiki/Abbott_and_Costello#.22Who.27s_on_First.3F.22
Re: (Score:2)
Why is the left fielder.
I Don't Know is on third base.
I Don't Give A Darn is the shortstop.
Re: (Score:2)
Posted by CmdrTaco on Wednesday February 16, @08:41AM from the patch-it-up dept
Byline too small for you?
HBGary Presentation? (Score:2)
Re: (Score:2)
Wondering how Arron Barr's presentation on Social Network went... Though I might post as "Anonymous Coward", but don't feel like having my door kicked in by the Fed's today.
Searched [rsaconference.com] the RSA11 sessions: his presentation is nowhere to be found.
Re: (Score:1)
He cancelled his presentation of course, but they still have a booth at the RSA conference. Feel free to drop in and say 'hi'.
Re: (Score:1)
http://www.hbgary.com/statement.htm [hbgary.com]
A group of aggressive hackers known as “Anonymous” illegally broke into computer systems and stole proprietary and confidential information from HBGary, Inc. This breach was in violation of federal and state laws, and stolen information was publicly released without our consent.
In addition to the data theft, HBGary individuals have received numerous threats of violence including threats at our tradeshow booth.
In an effort to protect our employees, customers and
Re: (Score:2)
The first step when you find yourself in a hole? Stop digging.
why on earth... (Score:3)
. are sensitive networks like NASDAQ even connected to the internet? There is a common fix for this issue called an AIR GAP. You simply physically disconnect the nternet from the sensitive technology, and then you work forward from there while always regarding the fundamental necessity of the air gap. It is, reckless and foolish considering the reality of the internet, to think you can connect and protect.
Re:why on earth... (Score:4, Informative)
Re: (Score:1)
This requires a simple data transfer through a sterile line with extremely simple data types, not a full on connection to the network.
Re: (Score:2)
Re:why on earth... (Score:4, Interesting)
Because all trade networks connect to each other now, and the internet is the cheapest way than building dedicated hardlinks to innerconnect to all stock exchanges. I doubt that any exchange would be willing to drop billions to build trans-atlantic/pacific data exchanges, unless something catastrophic happened. Plus it creates central points of weakness.
The internet 'routes around damage'.
Re: (Score:3)
Ideally, the networks should be on a backbone which can piggyback over Internet connections, but by using half-routers that already know each other and use preshared symmetric keys (so even if RSA is broken, the communication going across the pipe is still secure unless someone hacks the endpoint.)
The US government has learned this (NIPRNet and SIPRnet), maybe businesses need their own backbone that is separate from the Internet.
Re: (Score:3)
There is a middle ground between using the internet (where delivery is on a best effort basis and has no guarantees of anything) and laying your own submarine cables. Private international leased lines are readily available from a variety of vendors and are used extensively by financial institutions. They're available with various SLAs on contention, latency and uptime depending on how much you're willing to spend. Transatlantic routes are available surprisingly cheaply, as there is an abundance of bandwidt
Re: (Score:1)
Because all trade networks connect to each other now, and the internet is the cheapest way than building dedicated hardlinks to innerconnect to all stock exchanges. I doubt that any exchange would be willing to drop billions to build trans-atlantic/pacific data exchanges, unless something catastrophic happened. Plus it creates central points of weakness.
The internet 'routes around damage'.
Dedicated links are the only links which can be secured.
It's worth it.
And no, it doesn't necessarily give you a single point of failure, or "central points of wekaness" any more than the internet does.
The worst case scenario for losing electronic trading is small delay in trades going through, thus killing off high frequency trading and forcing people to INVEST.
This would be a GOOD THING.
Re: (Score:2)
Oh I believe that dedicated links are worthwhile. The only question is what will happen, and how much money will be spent later. I'd call it human nature myself.
As for a central point of weakness? Sure. All you need to do is look at past incidents where some ship(whether cargo/fisherman/idiot) dredges along and kills net access to 1/3 of the worlds population, or limits it.
Re: (Score:2)
What is the problem with high frequency trading?
I'm an investor, it provides more liquidity.
It doesn't change the value of the stock, it at most causes slight minor price swings, which, with the use of limit orders doesn't affect me.
Re: (Score:3)
. are sensitive networks like NASDAQ even connected to the internet?
So you can get up to date stock quotes from yahoo, instead of waiting for them in the news paper?
So you can log into your bank or brokerage and buy and sell shares of something?
So brokers, fund managers, and so on can do the same, all in real-time from their offices around the world?
Air gapping the stock exchange would be pretty inconvenient for pretty much anyone who deals with it at all.
Re: (Score:1)
Air gapping the stock exchange would be pretty inconvenient for pretty much anyone who deals with it at all.
The use of Telepathy Control Protocol over Idiotic Precogs would solve this in a blink.
Too bad the BoA seems to hold some patents on it - they used it to register in advance some domain names, so the rumors have it.
(*duck*)
Re: (Score:2)
Re: (Score:2)
Air gapping it might be inconvenient, but it will make the market a whole lot better for you and me
We can make the market a whole lot better for you and me without throwing the baby out with the bathwater.
Being connected to the internet isn't the problem. If they pulled the nasdaq of the net and institutional traders simply dialed into it on dedicated T1/fiber lines totally air-gapped from the Internet it would have all the problems it has now... and it would take a broker charging $100+ per trade to execut
Re: (Score:2)
Re: (Score:2)
But you can do that without the disconnecting option, so you are throwing out the baby (low commission trading) with the bathwater (high frequency trading).
Re: (Score:3)
I don't even mind high frequency trading. What I mind is them getting to see stuff before others and act on it.
http://www.nytimes.com/2009/07/24/business/24trading.html [nytimes.com]
http://www.nytimes.com/imagepages/2009/07/24/business/0724-webBIZ-trading.ready.html [nytimes.com]
http://www.nytimes.com/2009/08/05/business/05flash.html [nytimes.com]
Go ahead, send your orders as fast as you want. But being able to see other people's orders AND cancel your orders accordingly before the rest of the market gets them is cheating.
Re: (Score:2)
Which can be removed without removing low commission changing.
Re: (Score:2)
But liquidity goes down.
I'm a buy and hold invester, I don't really care about HFT. I still don't understand how HFT hurts me?
Doesn't it just increase volume thereby letting my trades complete more efficiently.
I still get the shares I want at the price I want.
Re: (Score:2)
Actually it's not common for exchanges to offer connectivity in via the internet except perhaps for low-traffic connections for integration testing and suchlike. The unpredictability of the internet makes it impossible for them to guarantee the service levels that are demanded. The constant stream of pricing updates can run into the gigabits per second depending on what you're subscribed to. If you're big enough to be trading directly on the exchange, the cost of the leased lines and/or colocation next to t
Re: (Score:2)
But those with the connections aren't likely to air gap them from the rest of their network.
Re: (Score:2)
If you're big enough to be trading directly on the exchange, the cost of the leased lines and/or colocation next to the exchange (latency is everything) is easy to swallow.
And as long as those leased lines and co-located servers are connected to the internet... ...Then the exchanges are connected to the internet.
Re: (Score:3)
Hmmm... Okay, but all the other servers that have to talk to it *are* connected to the internet. I know because I've set servers up before in their primary data center.
So even if you keep all the NASDAQ servers on a private network only, you still have all the entry points from the physical ethernet drops throughout the data center going into all the cages (several thousands of them) of people routing orders onto NASDAQ.
So when Joe Brokerage or John Trading Shop gets compromised, it's only a hop away to t
Re: (Score:1)
didn 't you read the summary?
the "air gap" has been closed within 10 feet of a person even/especially on the busy, crowded, everybody's-holding-a-palmtop NASDAQ floor.
Re: (Score:1)
Hooray! Someone else finally recognizes the printer attack as the ultimate way to pirate the entire network!
Any HTML exploit to a vulnerable browser attached to a network and it's game over for the world. Firewalls, IDS, LAN, VLAN, virtual machine, blah blah blah doesn't matter. If the system on which you use a web browser has access to a shared printer then you may as well operate under the assumption that some teen in Bangkok already has access to everybodies' ATM cards.
Re: (Score:2)
An ad for RSA? (Score:2)
wtf is this article - is there actual content anywhere or is it an ad for the RSA conference?
Some background (Score:5, Informative)
I'm sorry that there's no direct article for this submission, and I'm not certain who submitted it, but as an employee of CRI and one of the designers of the demo, I'd like to give you some details about what's going on.
At CRI we have a lab full of what I consider to be cool equipment, and what's more, some spare time to look at things. We specialize in side-channel analysis and we asked ourselves: what sort of side-channel leaks might be present in consumer PDAs? We took a USRP(1) interface that we had lying around and started investigating the RF emanations of a few of the devices we had easily on hand. We coded some simple cryptographic applications and were surprised at how quickly we were able to find ways to demodulate the various signals in the device in a way that revealed the bits of the secret keys being used.
We are indeed using GNURadio for the demo. It's been very helpful because it makes rapid prototyping very easy. We use gnuradio-companion to set up the signal processing blocks (mostly AM demodulation) and to set up a simple UI that helps us tune into the right carrier frequencies in real-time during the demo. The rest of the demo involves using our own custom waveform viewer to look at the demodulated signal and show visitors how we can analyze the signal on the screen and extract the key bits that were used during the encryption/decryption process on the device.
Re: (Score:2)
mostly AM demodulation
Amplitude Modulation demodulation?
The avg person won't think twice about it, but us pedants can't help it.
That aside, I'm not surprised that consumer software is blabbing its secrets all over the airwaves.
Even for companies who spend millions on security Q&A for their software, they still manage to find new and innovative ways to screw it up.
Re: (Score:3, Insightful)
What's wrong with demodulating an amplitude modulated signal? How would you have phrased it differently without losing information?
Re: (Score:1)
Maybe he'd prefer the term Amplitude Modem?
Re:side-channel analysis (Score:2)
Re: (Score:2)
"I'm not sure I buy it. Sure you could detect signals eminating from a smart phone, but decifering them into something coherent? Really? That's pretty awesome if it can be done, but where are the details about what devices you used and what exactly you did?"
That is completely in line what I've seen done during side channel attacks on various kind of devices - for me it is not hard to believe at all. Besides that, I used to listen to radio tuned to my MSX computer. It wasn't long until you could find out by
Shielding (Score:1)
Couldn't you design the assemblies so the boards could be conformal coated with a dialectic layer and them potted with a RF absorbing layer and then a grounded layer as not be able to pick up the emissions in the first place.
Re: (Score:1)
Couldn't you design the assemblies so the boards could be conformal coated with a dialectic layer and them potted with a RF absorbing layer and then a grounded layer as not be able to pick up the emissions in the first place.
I suppose you could, but it'd really ruin your reception. As long as you have the need for a functioning antenna connected to the device, stray signals will be received as well as transmitted. Not to mention that your idea would increase the build cost in a way that most manufacturers would deem "unnecessary".
TPM (Score:2)
Re: (Score:2)
These side-channel attacks have been known for years; the TPM guys know them too, and have likely at least made attempts to stymie them.
Re: (Score:2)
You may leave that "likely" out. Most of these TPA modules are modified smart card chips, and they certainly provide security against DPA attacks. The problem is that most general purpose CPU's do not. This becomes more of a problem if this chip is a low frequency, highly mobile RISC chip, I suppose.
Re: (Score:1)
The interesting thing about this is that the security protections in SC chips would be triviial to port to a larger IC CPU; you're get a bit of performance loss, but randomizing the pipelining would probably be enough for simple protection.
So what you'd see is not too much cost involved in adding the protection, but a minor performance hit. Seems to me the Mobile market (where chips are usually underclocked anyway) would be the perfect market to start implementing this in. Gaming PCs probably don't need t
We used to play the disk channel on an IBM 1130 (Score:2)
Gee, this takes me back. The IBM 1130 (actually IIRC a later clone) had a 'Winchester' (IBM model 3030) washingmachine-sized drive with a 5 HP stepping motor to drive the arm, and removable 5 MB disk packs. Somebody back in the mists of history figured out that if you put a transistor radio on top of the console in the right place, the disk controller signals that drove the stepping motor made enough EMI to generate an AM radio signal. So they wrote an assembler program that could play different songs ac
Re: (Score:2)
Correcting myself - The disk drive was not model 30-30. It was probably the IBM 1311 [wikipedia.org]. You can read the history [wikipedia.org] of how these got called "Winchesters".
Re: (Score:2)
... or the IBM 2311 [wikipedia.org]. Sigh... Note to self: do the research before you hit 'Submit'. :P