9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
* Re: [9fans] Re: secret stuff
@ 2002-06-16 14:08 presotto
  2002-06-16 14:19 ` Jim Choate
  0 siblings, 1 reply; 25+ messages in thread
From: presotto @ 2002-06-16 14:08 UTC (permalink / raw)
  To: 9fans

[-- Attachment #1: Type: text/plain, Size: 126 bytes --]

I'll wait till miller says something.  If you
design his system for him to be crackable, then
you're guaranteed to be right.

[-- Attachment #2: Type: message/rfc822, Size: 4839 bytes --]

From: Jim Choate <ravage@ssz.com>
To: 9fans@cse.psu.edu
Subject: Re: [9fans] Re: secret stuff
Date: Sun, 16 Jun 2002 00:10:43 -0500 (CDT)
Message-ID: <Pine.LNX.3.96.1020615235612.1158y-100000@einstein.ssz.com>


On Sat, 15 Jun 2002 presotto@plan9.bell-labs.com wrote:

> Perhaps calling this a smart card is too charged?
>
> I don't know what miller meant but I thought
> the smart card would be running the same
> PAK protocol that a remote secstore server would.
> You'ld just be taking via 9P over a local bus rather than
> via TCP over the net.  You could
> snoop the conversation but it wouldn't be any different
> than snooping the conversation to a secstore running
> elsewhere on the network.  I really don't understand
> this ``mount it (and make an image - probably in less
> than 10 minutes).''  Was this predicated on the card
> just looking like a file system full of secrets?

Under Styx-in-a-Box my Minstorms robot shows up as a directory with
various devices listed as files. One can then use simple scripts and a
list of device commands/codes and with simple cat and pipe style features
create a quite interesting Lego based robot. I understood him to mean that
the card would provide some services exported from the smart cards memory
as a file system using something like Styx. This implies a deamon.

Such a deamon can be cracked or subverted. In fact, I don't even need the
smart card. All I need is a description of the protocol, a tap (ie MITM),
time, computing power, and luck (lots if the protocol is good) to attack
such a systems security. So it's really a poor example for what we're
talking about.

What I had in mind was such that we hood the smart card to a dumb terminal
via a short serial cable and a network cable. The entire system, network
stack, etc. is stored on the card. One uses some sort of mechanism to
prevent the card from being directly put into debug mode (eg have the card
disable the debug features through write only RAM). The point of the
exercise has two targets. Unless you hit both you've a hole in your
bucket; Data, Program. The question becomes "How does one get data out of
the card with enough coherence to understand what is being computed?"

The point is to 'glitch' the appropriate registers into a mode thay
normaly would not be in. There are other attacks based on the
architecture-geometry-geography relationship between the logical function
of a cpu and the physical arrangement of those components. That is where
high intensity optical attacks, voltage jitter (over, under, spike,
pulsed, whatever they think up next week), rf skin effect forcing a charge
bleed to occur, etc.

> The keystroke attack is certainly there both with and without the
> smartcard, they're unrelated.

It depends, does the card generate the various certificates or does it
take one and execute a process on it? The first is much more secure than
the second, but has a timing issue related to certificates at both ends
matching - a framing issue (ie consider a dropped packet w/ one
cert/packet).

> If you only type it in at boot time
> keystroke attacks are less likely, no app code running.

A keylogger isn't a program.


 --
    ____________________________________________________________________

              When I die, I would like to be born again as me.

                                            Hugh Hefner
     ravage@ssz.com                                         www.ssz.com
     jchoate@open-forge.org                          www.open-forge.org

    --------------------------------------------------------------------

^ permalink raw reply	[flat|nested] 25+ messages in thread
* Re: [9fans] Re: secret stuff
@ 2002-06-17 11:33 Richard Miller
  0 siblings, 0 replies; 25+ messages in thread
From: Richard Miller @ 2002-06-17 11:33 UTC (permalink / raw)
  To: 9fans

Jim Choate <ravage@ssz.com> says:

> ...
> 'smart card' used in a generic sense like it was used in the original post
> is handwaving and nothing more, ...

My original post (for which I am humbly and heartily sorry) asked what I thought
to be an innocent question:

> For standalone Plan 9 users not served by an auth server, would
> it make sense to have a secstore server running on a smart card?

Presotto suggested an alternative:

> Running it on a hand held would also be a reasonable idea.

I followed with the claim which I think is the one being disputed:

> The advantage of a smart card is tamper-resistance.  How do you know someone
> hasn't borrowed your ipaq and installed a doctored version of secstored or
> secuser?

In this context, I did mean to make a generic reference to a class of devices
which tend to be called smartcards here in England, chipcards in the rest of
Europe, IC cards in Japan and so on.  Maybe there's another term in the US.
Anyway the implication (which I perhaps should have made more explicit) is that
any smart card is less susceptible to physical tampering than a normal general-
purpose PC, because there are fewer points of access for getting data out and
illicit programs in.  I expect most of us are aware of the principles if not
the details of physical attacks on smart cards, and it's commonsense to expect
that some cards are better hardened against these than others.  But if I want
to get at the data on a PC's disk or a bitsy's flash memory I wouldn't expect
to need a nitric acid bath and an electron microscope.  In my experience, if
you have physical access to a PC there are various ways to get it to load
privileged code of your choice, which are not authenticated or cryptographically
secured; and failing that you can generally get the storage devices out with
a humble screwdriver and move them to a more hospitable PC.  I'd be surprised
to hear of any smart card with comparable ease of access.  Like any security
measure it's a question of raising the cost of attack rather than eliminating
any possibility.

Now, let's look at Jim Choate's generic claims about smart cards:

> So the mount would be insecure, in that anyone who has the card could
> mount it (and make an image - probably in less than 10 minutes).

and

> Smart Cards have the same problem as PDA's, if you lose physical control
> you lose your security. If anybody ever gets the card for 10 or more
> minutes they can image the card and then at their leisure take a crack at
> it.

Even if we assume that "anybody ever" means a team of experienced smart card
engineers with a lab full of expensive equipment, I am curious to know where
the precise figure of 10 minutes comes from when nobody has said what
particular card they are referring to.  Is this handwaving too?

It wouldn't be helpful to identify the card I'm using because it's not on
the market yet.  But to be concrete, suppose we choose IBM's JCOP 20/16 as
a typical multiapplication card with a JavaCard 2.1.1 VM and a reasonable
security+crypto library.  If I load one up with a password file controlled
by a simple server applet, and send it to Mr Choate along with a description
of the protocol, will he volunteer to "image" the card and tell 9fans what's
in the file (I'll even store the passwords in cleartext) and how long it took?

-- Richard



^ permalink raw reply	[flat|nested] 25+ messages in thread
* Re: [9fans] Re: secret stuff
@ 2002-06-17  2:21 David Gordon Hogan
  0 siblings, 0 replies; 25+ messages in thread
From: David Gordon Hogan @ 2002-06-17  2:21 UTC (permalink / raw)
  To: 9fans

> > I was obviously not alone in understanding your words
> > in this way, nor in finding it an interesting claim. The fact that
> > you also said other things is not something I recall denying.
>
> Simply because a majority interprets something doesn't make it so. The
> majority used to believe blacks and women were sub-male, don't make it
> right. I am completely unimpressed with pleas to authority or majority.
> If that's the best you got, you got nothing.

So what you're saying is that you don't want to be judged
by how some `majority' interprets you?



^ permalink raw reply	[flat|nested] 25+ messages in thread
[parent not found: <20020616160013.24019.43455.Mailman@psuvax1.cse.psu.edu>]
* Re: [9fans] Re: secret stuff
@ 2002-06-16 22:27 Russ Cox
  2002-06-17  1:58 ` Jim Choate
  0 siblings, 1 reply; 25+ messages in thread
From: Russ Cox @ 2002-06-16 22:27 UTC (permalink / raw)
  To: 9fans

I'm not sure Stephen Wolfram would agree
with your invocation of the Second Law of
Thermodynamics in this particular context.

Russ



^ permalink raw reply	[flat|nested] 25+ messages in thread
* Re: [9fans] Re: secret stuff
@ 2002-06-16 19:05 Richard Miller
  2002-06-16 19:51 ` Jim Choate
  0 siblings, 1 reply; 25+ messages in thread
From: Richard Miller @ 2002-06-16 19:05 UTC (permalink / raw)
  To: 9fans

Wow.  This is what happens when you think out loud in 9fans.

I think I was careful to say that smart cards were tamper-resistant
not tamper-proof.  If my secstore lives on a PC it can be compromised
by anyone who happens along with a boot disk.  If I keep it on a smart
card it will take a bit more work to get into.  That seems to me like
an incremental improvement.  I mentioned the idea in 9fans to see if
anyone else would think so too.

The idea of using 9P is to have something at a higher level than
ISO 7816-3 APDU protocol for talking to multiple services on a card.
This seems a simpler approach than implementing a subset of IP on
the card (as, for example, Andy Tanenbaum's group have done).  The
files which appear when the card is mounted are channels to
active programs rather than passive chunks of memory; individual
channels can be authenticated and encrypted as appropriate for
each service.  In particular the secstore channel would use the
pak protocol, exactly as before.

If you're going to mount a physical attack on the card, I can't
see that the communication protocol with the host is likely to make
much difference.  Patterns of computation and memory access in
the applet on the card are much more vulnerable to side-channel
leakage of information.

I'm sorry I haven't got a "system" to describe and defend.  It's
just a notion for a project -- partly to build something that I
think might be useful, and partly to demonstrate some of the ideas
of Plan 9 to my colleagues.

-- Richard



^ permalink raw reply	[flat|nested] 25+ messages in thread
* Re: [9fans] Re: secret stuff
@ 2002-06-16 14:22 presotto
  2002-06-16 15:59 ` Jim Choate
  0 siblings, 1 reply; 25+ messages in thread
From: presotto @ 2002-06-16 14:22 UTC (permalink / raw)
  To: 9fans

[-- Attachment #1: Type: text/plain, Size: 407 bytes --]

Of course not.  All systems are crackable. I didn't see anyone say that
his won't be.  The only question is how hard.

I haven't heard enough about Miller's system to say how hard.  So far
all I've heard is that he wants to put secstore on a smart card.

You've been building strawmen and burning them down.  You may be right
but without more about the system, I have no idea.  Why are you so
angry?

[-- Attachment #2: Type: message/rfc822, Size: 2511 bytes --]

From: Jim Choate <ravage@ssz.com>
To: 9fans@cse.psu.edu
Subject: [9fans] Re: secret stuff
Date: Sun, 16 Jun 2002 09:19:39 -0500 (CDT)
Message-ID: <Pine.LNX.3.96.1020616091658.1158A-100000@einstein.ssz.com>



On Sun, 16 Jun 2002 presotto@plan9.bell-labs.com wrote:

> I'll wait till miller says something.  If you
> design his system for him to be crackable, then
> you're guaranteed to be right.

Nobody designed the system to be crackable, but we have a 2nd Law of
Thermodynamics to contend with. There is no such thing as a uncrackable
system.

It isn't a question of 'right', it isn't a pissing contest. It's just a
question of physics. That's the problem with this list, too many people
worrying about pissing rights and not the facts. If 'miller' says so it
must be so...Ever hear the one about a plea to authority and the liklihood
they are correct? Nah, didn't think so.


 --
    ____________________________________________________________________

              When I die, I would like to be born again as me.

                                            Hugh Hefner
     ravage@ssz.com                                         www.ssz.com
     jchoate@open-forge.org                          www.open-forge.org

    --------------------------------------------------------------------


^ permalink raw reply	[flat|nested] 25+ messages in thread
* Re: [9fans] Re: secret stuff
@ 2002-06-16  3:58 presotto
  2002-06-16  5:10 ` Jim Choate
  0 siblings, 1 reply; 25+ messages in thread
From: presotto @ 2002-06-16  3:58 UTC (permalink / raw)
  To: 9fans

[-- Attachment #1: Type: text/plain, Size: 1571 bytes --]

Perhaps calling this a smart card is too charged?

I don't know what miller meant but I thought
the smart card would be running the same
PAK protocol that a remote secstore server would.
You'ld just be taking via 9P over a local bus rather than
via TCP over the net.  You could
snoop the conversation but it wouldn't be any different
than snooping the conversation to a secstore running
elsewhere on the network.  I really don't understand
this ``mount it (and make an image - probably in less
than 10 minutes).''  Was this predicated on the card
just looking like a file system full of secrets?

One question is whether or not you can get secstore (i.e.
PAK) onto a smart card.  I don't really see why not, it's not that
complicated though it might be slow.  However, you don't
use it very often, just to load up factotum and to save
new secrets.

The keystroke attack is certainly there both with and without the
smartcard, they're unrelated.  Factotum currently needs a
password to access the secstore.  That's independent of where
the secstore resides.  If you only type it in at boot time
keystroke attacks are less likely, no app code running.

The problems of physical security and environmental attacks
that you talked about are indeed still there.  The question is how
much you trust a card in someone else's hands.  I'm not sure
I would.  But a card that you use for getting at everything
is something you'ld notice lost or stolen pretty quickly,
perhaps soon enough to start changing all your secrets.
It would be a pain though.

[-- Attachment #2: Type: message/rfc822, Size: 2483 bytes --]

From: Jim Choate <ravage@ssz.com>
To: 9fans@cse.psu.edu
Subject: [9fans] Re: secret stuff
Date: Sat, 15 Jun 2002 19:49:33 -0500 (CDT)
Message-ID: <Pine.LNX.3.96.1020615194657.1158u-100000@einstein.ssz.com>


On Fri, 14 Jun 2002, Richard Miller wrote:

> > ... However, you should talk
> > the Plan 9 file system messages and have some want make a pipe twixt
> > the smart card and a process.
>
> My intention is to have the smart card itself talking 9P (like the
> inferno styx-on-a-brick) so you can access its services directly via
> mount.

So the mount would be insecure, in that anyone who has the card could
mount it (and make an image - probably in less than 10 minutes).

Or do you intend to have it ask for a password during the mount?...sort of
defeats the purpose of the smart card since this password process can be
subverted (eg keystroke sniffers).


 --
    ____________________________________________________________________

              When I die, I would like to be born again as me.

                                            Hugh Hefner
     ravage@ssz.com                                         www.ssz.com
     jchoate@open-forge.org                          www.open-forge.org

    --------------------------------------------------------------------

^ permalink raw reply	[flat|nested] 25+ messages in thread
* Re: [9fans] secret stuff
@ 2002-06-15 16:44 presotto
  2002-06-15 17:07 ` [9fans] " Jim Choate
  0 siblings, 1 reply; 25+ messages in thread
From: presotto @ 2002-06-15 16:44 UTC (permalink / raw)
  To: 9fans

I'm interested.  I've seen the power jitter attacks and they
generally had prettty good success over a fair amount of time on some
cards.  IBM claimed that they were not susceptible, since they disable
the card (permanently) if the power gets too wonky.  On the other hand,
the last I saw of their secure engine, it didn't look like my wallet
was big enough (either in volume or contents).

So is this just all a bunch of PR hooey and if I lend my card to someone
for 10 minutes I might as well kiss my data goodbye?


^ permalink raw reply	[flat|nested] 25+ messages in thread
* Re: [9fans] secret stuff
@ 2002-06-14  8:02 Richard Miller
  2002-06-16  0:49 ` [9fans] " Jim Choate
  0 siblings, 1 reply; 25+ messages in thread
From: Richard Miller @ 2002-06-14  8:02 UTC (permalink / raw)
  To: 9fans

> ... However, you should talk
> the Plan 9 file system messages and have some want make a pipe twixt
> the smart card and a process.

My intention is to have the smart card itself talking 9P (like the
inferno styx-on-a-brick) so you can access its services directly via
mount.

-- Richard



^ permalink raw reply	[flat|nested] 25+ messages in thread

end of thread, other threads:[~2002-06-18  9:31 UTC | newest]

Thread overview: 25+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2002-06-16 14:08 [9fans] Re: secret stuff presotto
2002-06-16 14:19 ` Jim Choate
2002-06-16 23:08   ` Dan Cross
2002-06-17  0:26     ` Jim Choate
2002-06-17 17:34       ` Dan Cross
2002-06-18  9:31         ` Douglas A. Gwyn
  -- strict thread matches above, loose matches on Subject: below --
2002-06-17 11:33 Richard Miller
2002-06-17  2:21 David Gordon Hogan
     [not found] <20020616160013.24019.43455.Mailman@psuvax1.cse.psu.edu>
2002-06-16 23:52 ` Andrew Simmons
2002-06-17  0:29   ` Jim Choate
2002-06-17  1:46 ` Andrew Simmons
2002-06-17  2:11   ` Jim Choate
2002-06-17  1:40     ` Sam
2002-06-17  2:43       ` ggm
2002-06-16 22:27 Russ Cox
2002-06-17  1:58 ` Jim Choate
2002-06-16 19:05 Richard Miller
2002-06-16 19:51 ` Jim Choate
2002-06-16 14:22 presotto
2002-06-16 15:59 ` Jim Choate
2002-06-17  9:19   ` Don
2002-06-16  3:58 presotto
2002-06-16  5:10 ` Jim Choate
2002-06-15 16:44 [9fans] " presotto
2002-06-15 17:07 ` [9fans] " Jim Choate
2002-06-14  8:02 [9fans] " Richard Miller
2002-06-16  0:49 ` [9fans] " Jim Choate

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).