IMHO, there should be some effort to try to prevent this sort of attack.  The
gist of the attack is that private keys can be recovered by reading a process's
memory.  I haven't really researched the preventive measures.

Noel




Minor Huffman
01/14/2000 05:33 PM

To:   WDC-WG Champions, WDC-WG Security and Single Login, AD Research
cc:
Subject:  FW: Major Flaw In Secure Web Server Technology Uncovered  (Document
      link not converted)





Pierre-Jean Crouy
01/14/2000 11:26 AM

To:   Minor Huffman@JPMORGAN
cc:
Subject:  Major Flaw In Secure Web Server Technology Uncovered

              Major Flaw In Secure Web Server Technology Uncovered

 CAMBRIDGE, ENGLAND, Newsbytes via NewsEdge Corporation : A group of key IT
 security specialists have uncovered, what they say is, a major security failing
 with modern so-called secure Web server software from Microsoft [NASDAQ:MSFT],
 Netscape [NYSE:AOL], and Apache.

 Until now, they say, it was believed that security information called "private
 keys" could not be found in the memory systems of a server and compromised.

 Back In February, 1999, Dr. Nicko van Someren, chief technology officer of
 nCipher, and Dr. Adi Shamir of the Weizmann Institute in Israel - the co-
 inventor of the RSA encryption system - described their initial findings at the
 Financial Cryptography '99 conference.

 The researchers' discovery introduces the possibility that any user with the
 capability to execute software on a company's e-commerce server could quickly
 locate cryptographic keys that would allow access to secure information ranging
 from PC data to credit card numbers.

 Dr. Nikko van Someren told Newsbytes that, to date, this security flaw means
 that current secure Web server software from the three industry majors -
 Microsoft, Netscape and Apache - is vulnerable to attack by someone with a
 degree of knowledge of how the secure keys operate.

 "The solution to this isn't to hide the keys elsewhere in some other form on
 the server. It's to move the keys off the server altogether and hold them in a
 separate system," he said.

 To this end, nCipher has developed a package that it is offering free to
 organizations which are affected by the security loophole.

 "We are also offering a secure system to hold the keys," van Someren said,
 adding that pricing on the firm's security system to beat the security flaw,
 sells for between $4,000 and $17,000.

 NCipher's latest findings, along with a discussion of best practices in Web
 server security, are outlined in a new white paper entitled "Protecting
 Commercial Secure Web Servers from Key-Finding Threats," which has been
 published on the firm's Web site at http://www.ncipher.com/keyfinding.html .

 In the paper, nCipher describes the security threat in which an unauthorized
 intruder can find and use a private key in a cryptographic security scheme to
 access confidential company and customer information on a commercial e-commerce
 Web site.

 The paper also describes the preventative measures that IT and security
 professionals can take to guard against these so-called  "key-finding" attacks.

 Van Someren said that security vendors must be constantly on the lookout for
 potential vulnerabilities in order to develop more powerful preventative
 systems, as well as to guide organizations on how to establish and follow best
 practice security standards.

 "The use of dedicated key management hardware in e-commerce systems can vastly
 improve the standard of security achieved, since it has been demonstrated that
 techniques employing software alone are inadequate," he said.

 NCipher says that, typically, in a commercial secure Web server, private keys
 are encrypted and stored within the server, where they must be decrypted before
 being used.

 Once decrypted into plain-text, the key is vulnerable to the "key- finding"
 attack. But since a key is only a few hundred bytes long and the storage space
 of the server may be tens of gigabytes, conventional reasoning argues that an
 intruder is unlikely to ever find the key.

 However, finding a key is easier than originally thought, the firm says, since
 the keys to the type of cryptographic systems used in secure Web servers are
 unusual numbers with specific mathematical properties, making it possible for
 an intruder to identify them.

 NCipher says that, when carrying out a "key-finding" attack, the intruder needs
 to look only for these special characteristics and be able to read the memory
 of an existing Web server process.

 The firm adds that, once the intruder has found the key, gained permission to
 read the memory where it is stored and copied the key, the Web server and its
 customers are defenseless.

 In addition, although the intruder would most likely be an insider, there are
 scenarios in which the intruder could also be an outsider.

 Either way, nCipher says that an intruder who is successful using this attack
 compromises the organization's e-commerce security, and Web sites must ensure
 that it is never allowed to occur.

 Furthermore, the firm says, the loss of the private key to a secure Web server
 allows all past transactions to be decoded. Any information processed through
 that Web server, and previously thought secure, cannot be considered so any
 longer.

 Van Someren said that, as well as developing the solution to the Web server's
 security shortcomings, his team have been working with the companies whose
 software is affected to ensure that future releases of their Web servers are
 immune to such attacks.

 "In this way, as well as highlighting the problem and offering solutions to
 existing users, we are stopping it happening to users  who install these
 packages in future," he said.

 nCipher's Web site is at http://www.ncipher.com .

 Reported by Newsbytes.com, http://www.newsbytes.com .

 (20000113/Press Contact: Alex van Someren, nCipher +44-1223-723600 /WIRES PC,
 ONLINE, BUSINESS/)

 <<Newsbytes -- 01-13-00>>

 [01-13-00 at 18:15 EDT, Copyright 2000, Newsbytes News Network, File:
 n0113503.0by]

Entire contents (C) 2000 by INDIVIDUAL, Inc., 8 New England Executive Park West,
Burlington, MA 01803







Reply via email to