Re: Surveillance, secrecy, and ebay

2008-07-27 Thread Sherri Davidoff
Matt Blaze wrote:
 Once sensitive or personal data is captured, it stays around forever,
 and the longer it does, the more likely it is that it will end up
 somewhere unexpected.

Great point, and a fundamental lesson-of-the-moment for the security
industry. To take it one step further: The amount of sensitive
information an organization stores is roughly proportional to the number
of data leaks it initiates. We already know that information wants to
be free, and if you keep information around, sooner or later, it's going
to leak out. (There's probably some mathematical way to describe this
relationship.)

Rather than expecting companies to keep data totally secure and then
send apologetic letters when it gets lost, perhaps we should start
taxing companies in proportion to the amount of sensitive information
they store, and use that tax to assist victims of identity theft. This
would have the double benefit of giving companies immediate incentive to
reduce the amount of information they store, and would also provide
appropriate public funding for incident recovery.

Sherri


-- 
http://philosecurity.org


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: cleartext SSH, Truecrypt, etc passwords in memory

2008-07-27 Thread Sherri Davidoff
Peter Gutmann wrote:
 So was this a case of recover data from an active app's memory image
 (not surprising) or recover data after the app has exited
 (surprising, at least for the crypto apps)?

For this paper, I specifically examined the case where memory was dumped
while the applications were still active. The snapshots were taken up to
45 minutes after the passwords were entered. (See Appendix A for the
full testing procedure.)  Given that users keep applications such as
SSH, Truecrypt, email, etc open for a significant percentage of time
that they use their systems, I do think it's important for applications
to zero sensitive data immediately after it is used rather than waiting
until the process is closed. Also, as you point out, there were
passwords such as SSH and root which were retained outside of the
application's memory.

I also did some preliminary experiments to test whether passwords
remained in memory after the applications were closed. However, I
decided to wait until the Princeton/EFF/Wind River folks released their
memory dumper code before analyzing this in detail. As described in the
paper, there are now annoying limitations on access to /dev/mem in
Linux, so I thought it would be best to approach this particular
question by getting a full memory image using cold boot techniques.

As a next step, it would be great to follow the same procedure, but
image all of memory after the applications have been closed. Using Jake
Appelbaum and co's newly released memory imaging tools would probably be
an easy way to get full memory dumps from any OS:

http://citp.princeton.edu/memory/code/

Based on your feedback, I've updated section 2 and the abstract to clarify:

http://philosecurity.org/pubs/davidoff-clearmem-linux.pdf

Thanks for your comments,

Sherri


-- 
http://philosecurity.org

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


cleartext SSH, Truecrypt, etc passwords in memory

2008-07-25 Thread Sherri Davidoff
Hello all. During the past few months, I've been poking around Linux
memory and consistently finding cleartext login, SSH, email, IM,
Truecrypt and root passwords. I've just finished a paper which includes
detailed location and context information for each password. Given the
recent buzz about cold boot memory dumping, it seems the risk associated
with cleartext passwords in memory has increased.

You can find the paper here:

http://philosecurity.org/research/cleartext-passwords-linux/

There are also a couple snippets of process memory up there for folks to
play with. Thought this might be of interest to folks on this list.

Sherri


-- 
http://philosecurity.org




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: cold boot attacks on disk encryption

2008-02-21 Thread Sherri Davidoff
As soon as I heard about this research I had to try it out. My laptop 
(Thinkpad) has an encrypted Truecrypt partition.  I quickly made a 
modified bootable DSL usb memory dumper, powered the machine down, 
waited a minute, dumped memory, and found that I could recover passwords 
from multiple prior reboots. I was able to recover my Truecrypt password 
even if the volume was not mapped at the time of reboot, as well as GPG 
passwords, SSH passwords, etc etc. It was really easy.


During physical pentests, when I grab an encrypted laptop from an 
office, my clients usually respond that the laptop was encrypted and 
the data was therefore safe. That's not necessarily true, of course, but 
we don't have the time during these engagements to test out the security 
of the encryption products/implementation, and neither do most attackers.


Now attackers (or customs) just have to grab a live laptop, plug in a 
USB memory dumper and power cycle the system in order to obtain a 
dictionary of likely passwords and potentially recover encryption keys. 
Presumably tools to to accomplish this will soon be found in the wild 
and will become accessible to attackers with even low levels of 
technical skill.


I imagine this will eventually have a big impact on the way 
organizations respond to stolen mobile device incidents. With the 
current technology, if a laptop or mobile device is on when it's stolen, 
companies will need to assume that the data is gone, regardless of 
whether or not encryption products have been deployed.


Anyone familar with the laws in the arena? Are there regulations which 
require reporting only if data on a stolen device is not encrypted?


Sherri



Ali, Saqib wrote:

interesting paper. but i fail to see how this could be deadly (as
the author puts it) to the disk encryption products.

This methods requires the computer to be recently turned-on and unlocked.

So the only way it would work is that the victim unlocks the disks
i.e. enter their preboot password and turn off the computer and
immediately handover (conveniently) the computer to the attacker so
that the attacker remove the DRAM chip and store in nitrogen. And the
attacker has to do all this in less then 2 seconds :) If the
attacker is standing right next to the victim, why even let the victim
turn-off the unlocked computer

Or am I missing something?



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2007-12-31 Thread Sherri Davidoff
Anne  Lynn Wheeler wrote:
 Virtualization still hot, death of antivirus software imminent, VC says
 http://www.networkworld.com/news/2007/121707-crystal-ball-virtualization.html

Interesting how virtualization seems to imply safe in the public
mind (and explicitly in that article) right now I'm sure with the
increasing use of virtualization, we'll start to see more VMware-aware
malware and virtual machine escapes in the wild. Another example of
putting many, many eggs in the same basket.

Here's a good article about the first public VMware escape, which
Intelguardians demonstrated at SANSFIRE this summer:
(Note: I'm biased, having worked on this project.)
http://www.pauldotcom.com/2007/07/

What boggles my mind is that despite this, the DoD has still decided to
rely on virtualization software to keep classified and unclassified info
on the same physical systems:
http://www.internetnews.com/storage/article.php/3696996

Sherri



Anne  Lynn Wheeler wrote:
 re:
 Storm, Nugache lead dangerous new botnet barrage
 http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1286808,00.html
 
 from above:
 
 The creators of these Trojans and bots not only have very strong software 
 development and testing skills, but also clearly know how security vendors 
 operate and how to outmaneuver defenses such as antivirus software, IDS and 
 firewalls, experts say. They know that they simply need to alter their code 
 and the messages carrying it in small ways in order to evade signature-based 
 defenses. Dittrich and other researchers say that when they analyze the code 
 these malware authors are putting out, what emerges is a picture of a group 
 of skilled, professional software developers learning from their mistakes, 
 improving their code on a weekly basis and making a lot of money in the 
 process.
 
 ... snip ...
 
 ... and somewhat related
 
 Virtualization still hot, death of antivirus software imminent, VC says
 http://www.networkworld.com/news/2007/121707-crystal-ball-virtualization.html
 
 from above:
 
 Another trend Maeder predicts for 2008 is, at long last, the death of 
 antivirus software and other security products that allow employees to 
 install and download any programs they'd like onto their PCs, and then 
 attempt to weed out the malicious code. Instead, products that protect 
 endpoints by only allowing IT-approved code to be installed will become the 
 norm.
 
 ... snip ...
 
 and post about dealing with compromised machines
 http://www.garlic.com/~lynn/2007u.html#771 folklore indeed
 
 mentioning sophistication in other ways:
 
 Botnet-controlled Trojan robbing online bank customers
 http://www.networkworld.com/news/2007/121307-zbot-trojan-robbing-banks.htm
 
 from above:
 
 If the attacker succeeds in getting the Trojan malware onto the victim's
 computer, he can piggyback on a session of online banking without even
 having to use the victim's name and password. The infected computer
 communicates back to the Trojan's command-and-controller exactly which
 bank the victim has an account with. It then automatically feeds code
 that tells the Trojan how to mimic actual online transactions with a
 particular bank to do wire transfers or bill payments
 
 ... snip ...
 
 there have been some number of online banking countermeasures for
 specific kinds of system compromises  like keyloggers ... but they
 apparently didn't bother to get promises from the crooks to only limit
 the kinds of attacks to those exploits.
 
 some related comments on such compromised machines
 http://www.garlic.com/~lynn/aadsm27.htm#66 2007: year in review
 http://www.garlic.com/~lynn/aadsm28.htm#0 2007: year in review
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-06 Thread Sherri Davidoff

Reminds me of the White Knight from Alice in Wonderland, who doesn't
understand his threat model, and doesn't know how to effectively use
his tools:

`I see you're admiring my little box,' the Knight said in a friendly
tone. `It's my own invention -- to keep clothes and sandwiches in. You
see I carry it upside-down, so that the rain ca'n't get in.'

`But the things can get out,' Alice gently remarked. `Do you know the
lid's open?

`I didn't know it,' the Knight said, a shade of vexation passing over
his face. `Then all the things must have fallen out! And the box is no
use without them.''  
...

`You see,' he went on after a pause, `it's as well to be provided for
every-thing. That's the reason the horse has all those anklets round
his feet.'

`But what are they for?' Alice asked in a tone of great curiosity.

`To guard against the bites of sharks,' the Knight replied. `It's an
invention of my own.'

Full text from the chapter:
http://www.sabian.org/Alice/lgchap08.htm

alien


Perry E. Metzger writes:
We already have the term snake oil for a very different type of bad
security idea, and the term has proven valuable for quashing such
things. We need a term for this sort of thing -- the steel tamper
resistant lock added to the tissue paper door on the wrong vault
entirely, at great expense, by a brilliant mind that does not
understand the underlying threat model at all.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]