Testing the User or Phunk’d


The Harvard/MIT study of Bank of America’s web site security, including SiteKey system and SSL certificate verification (see New York Times and Slashdot), tackles the problem of real users using real websites to see how they respond to the authentication protocols. The security, for the most part, failed the users, with the researchers citing difficulties in testing the usability of these controls.

Slashdot comments, as expected, complain about the intractability of the Trainables in their charge, diminishing the argument to “Users == Lusers.”

I couldn’t find a fleshy threat model in the study’s methodology. The subjects (recruited from Harvard Yard) were asked to log on to the bank’s legitimate website on a university computer under the guise of testing usability. Meanwhile, the researchers played pranks on their browsers, causing it to display incorrect information regarding SiteKey and SSL certificates. It seems to me that the researchers were solving for a very narrow set of threats, primarily a man-in-the-middle or a DNS spoofing attack. My understanding of published incidents is that phishing generally originates with a convincingly deceptive e-mail containing a link to a phony banking site, or through a keystroke logger. A more interesting question for me would be “Would the users pay more attention to the security clues if they were following an e-mail link?” The common credential collection trojan appears to be outside the scope of the research.

Since Harvard students should probably pride themselves on not being representative of the populace as a whole, I can’t see that there’s a tremendous amount that can be taken from this research. The approach seems more like an episode of “Punk’d” (even though I’ve never watched it) or “Candid Camera” (which I have) or the Jim Coyle/Mel Sharpe stuff (which I love, but no link! I’m shocked!). Is there a difference between a drawing a valid audit (or research) conclusion and just giving a Muntz-esque “Ha Ha” followed by a “Stop hitting yourself”?

Posted in Uncategorized | 2 Comments

Harry Potter and the Hacking the 1098


A couple brief notes.
From Pogo Was Right, a link to the Boston Globe op-ed on privacy, security and Harry Potter hackers. The nut of the argument of Mr. Peters, CISSP:

People take to the streets to protest the Patriot Act or the search of phone records even though the payoff may be stopping a terrorist. But the same people freely give their phone number or address to a checkout clerk when the only payoff is an abundance of junk marketing.

I remember hearing a guy named Maple quote an IBM study stating the Americans love their privacy, but will trade it away for a fifty cent off coupon. That was 1998, and I don’t think much has changed.

I’m not quite ready to give up on the power of consumer, but this chart is the most distressing for me. The consumer doesn’t matter if the shareholder get his bit.

And I was flattered that the Periodical of Record for Road Racing in North America picked up my post on the Ducati laptop lost and found. I should let Ducati know that I’d be happy to test the security of the USB Ducati Data Analysis on the 1098S just to make it is, you know, compliant with EU Privacy Directive. Maybe hook it up with some 802.11n and turn the 1098 into the only Desmo driven war driving device.

Posted in Uncategorized | Leave a comment

Kim Possible vs. The TSA

or the Mysterious Case of Kim and the Rights of Parking.
Briefly put, a City Council member wants to meet and greet visiting dignitaries at the airport gate, not at baggage claim. The memo that came with her special airport free parking badge (sweet!) appears to confer this privilege. Councilwoman Kim figured (not unreasonably, looking at the memo linked on the Statesman site), that the parking badge was like a home generated Northwest Airlines boarding pass.

But the memo was outdated, and caprice of the TSA being as it is, the offer of gateside greetings had expired. Kerfluffle (or a dust-up, maybe) ensues. City Manager sorts things out.

Personally, I think free airport parking is a pretty good perk in itself, especially if it’s in the covered garage rather than in lot F (also known as Rosanky). And Austin Bergstrom beyond the security checkpoint is a not a bad destination with live music and good bar-b-q. (I’ve had friends who’ve had gigs there, but none of the regulars showed up. Go figure.) All reasonable folks know that security should be checked at the gate, so you don’t have a race condition between check-in and boarding. Unfortunately, the set of TSA policy makers is not a subset of reasonable folks.

Posted in Uncategorized | Tagged | Leave a comment

Not All Lost Laptop Stories Are Bad


The lost laptop story has become tiresome. Some individual, proving themselves to be careless, or even just human, loses a laptop with some sort of confidential information. SB1386 has made this the most banal folk tale of the 2000s.

Fortunately, after perusing the results of the MotoGP tests in Jerez, I read the Roadracing World’s version of the lost laptop story. Four cats from DC head out early to the Laguna Seca track on the Wednesday before the big MotoGP race. They find a carry-on piece of luggage, which contained a passport, tickets, MotoGP credentials and (yes) a laptop containing precious Ducati Corse data. So, instead of heading over to Repsol Honda, or eBay, these gentlemen returned the baggage to the Corse engineer it belonged. In return, the Ducati folks treat them like royalty throughout that weekend, and invite them to the season closer at Valencia. Hanging out with umbrella girls, scooter rides with Randy Mamola, asking Garry McCoy where it hurts, watching Nicky Hayden win the championship, all worthy activities paid in gratitude from Ducati.

Admittedly, Ducati Corse is cooler than the Department of Veterans Affairs or Wells Fargo will ever be. But if people knew that they could go on a scooter ride with Randy Mamola if they returned laptops loaded with trade secrets or personally identifiably information, our privacy problems here would soon be over.

Posted in Uncategorized | 1 Comment

Steve McQueen’s Credit Card


The Bonham & Butterfield auction of Steve McQueen’s motor related ephemera included his credit card. According to February’s Sports Car Market, the unsigned Wells Fargo MasterCharge (exp 07/80) was purchased for $9,945. (some coverage here of the auction).

According to this Tao Security link, you can get a better deal on credit cards on IRC.

Posted in Uncategorized | 1 Comment

Shake Hands With Danger

or the Mysterious Case of the Substitute Teacher and the Depraved Pop Ups. Krebs has the details, more or less. And some comments. Lotsa comments.
I am of several minds on this incident.

The Forensics
Network Performance Daily has a couple of CSI:Connecticut posts the about the forensic evidence from folks who have seen it.
The Defense – The few details included don’t support forensic discipline. The statement “[d]uring the copy process we received several “Security Alerts!” from our antivirus program” appears to indicate that the forensic data was being copied (not imaged) over to a general purpose computer (that runs antivirus). Generally, forensics is done off an image mounted as read-only. Copied files don’t have much in the way of chain of custody, and copying data can change some of its properties.
The Prosecution – This post is just unreadable. I can’t tell what’s going on, but that the cop may have used a forensic program to examine the data.

Whatever
I mean, whatever. The forensic evidence doesn’t really establish who was at the keyboard when the nasty images came up. Could have been seventh graders, could have been the teacher. The teacher didn’t shut off the computer (or even turn off the monitor) when she left the room, though. I mean, in the words of G.O.B. “COME ON!”

So Shake Hands With Danger
When you log on to the Internet, you shake hands with danger. Computers are dangerous. If you aren’t checked out on the equipment, you shouldn’t operate it! You could be a danger to yourself and those around you. Don’t end up like Three Fingered Joe!

Posted in Uncategorized | Tagged , | Leave a comment

There is no physical access control.

I was thinking about the difficulty of accurately testing physical controls and identity today. People let people in areas based on a system of signals that indicate they are safe/authorized: badge, biometric (face, voice), dress (uniform, hard hat, clipboard). Gradations in each of these attributes build to the decision to grant access. I was also thinking about how lousy this system works. Every security consultant brags about how they can get in any building by just looking like they belong there. But how hard can it be?

For example, this disturbing story about a 29 year old sex offender who enrolled in middle school. Horrific, insane, and befuddling. He shows up with a fake birth certificate and some seriously perverted “grandpa” and he’s in. So long as he does his homework and show up for class.

I give up. There is no physical access control. I refuse to believe in it anymore.

Posted in Uncategorized | Tagged , , | Leave a comment

Buzzword Compliance or Compensating Controls


The most recent SANS e-mail letter, this article from Computerworld on pretty minor (all things considered) security incident at federal retirement fund agency.

The voice of SANS (Pescatore in this case) remarked thusly:

This and the Nordea incident, as well as the huge TJ Maxx compromise, continue to point out how commonplace financially motivated, targeted attacks now are. Attacks change faster than regulations – tunnel vision on being compliant with regulations, whether Sarbanes Oxley, Basel, or PCI, means you will not be looking at processes and architectures that can deal with changing threats.

Pescatore, duuude. Hate the game, not the playa.

First, I don’t any of those regulations really apply to the TSP, except as perhaps amusing past-times in the off season.
Secondly, what the hunh??? I really don’t get how some users who got their account hijacked through the client side would have to do with a focus on regulations. About a dozen accounts, $35,000 all told. In retirement fund terms, not a whole lot. And they did find out about the incident, it is possible that some account monitoring controls were in place. So maybe the system worked. And cruising around the TSP site, it looks like they are trying to educate their users.

Unfortunately, whatever cred the TSP folks gained is blown in the following quote:

“External penetration testing has demonstrated that our system has not been breached”

Umm… ? I’d like to see the pen-test firm that signed off on that. Maybe next time you should hire some forensic analysts over for a post-incident discussion. They may give you better results.

Just because you don’t have heavy super duty NAC/HIDS/NIDS two factor network with buzzwords du jour and a burled walnut interior, doesn’t mean that you are so distracted by your BASEL II crossword puzzle that your accounting department doesn’t notice some odd ball transfers. It’s all about the compensating controls.

Posted in Uncategorized | Tagged , , , | 2 Comments

Comply, Submit, or Obey?

A post and response from computerworld.com and cogent commentary from Mike Rothman.
My issues are primarily with Eric Ogren who cites “the only two effective regulations.”

1. Executive accountability of SOX.
Accountability is a good idea, and formalized some of the accountability that existed de facto. However, it is currently implemented by a legion of auditors with blank checklists seeking billable hours. Accountability could be frightening to the honest CEO, but SOX will just double the thrill factor for the corrupt.

2. SB1386 Disclosure
SB1386 as a shaming device? I believe it was designed to function as a means to protect the consumer. If its objective was to shame the violating corporations in the marketplace, it has failed. I believe there is sufficient evidence that public notification of a privacy breach is not a significant indicator of long term market performance. Other non-security, non-privacy related factors have more influence, and the investing/consuming public has become somewhat inured to notification after 2006’s breach-o-palooza notification blizzard. If it was designed to punish corporations, it would have provisions of fines, jail time, drawing and quartering for the execs (not unlike SOX). Market impact is a mild, short term side effect, equivalent to postage and printing notifications.

EO also cites the ineffective enforcement of HIPAA and PCI “regulations.” Well, I’ll go along with HIPAA, which was a bitter sausage long in the making, shoved in a casing of some of the weakest enforcement mechanisms this side of the FDCPA. I don’t understand all the byzantine economics of the health care industry, so I have a hard time imagining an FFIEC correllary that could oversee physicians, dentists, hospitals, clinics and insurance companies.

But PCI compliance brought CardSystems to its knees precisely because it was not a regulation, but a business agreement.

All in all, I have to agree with Rothman. I’ll even go beyond that. Compliance is a by-product. If your focus is on protecting the customer’s information, compliance will occur. If your focus is on compliance, you will likely waste resources chasing the wrong rabbit down the wrong rabbit hole, and never really achieve your objective. So, what are you trying to do?

Posted in Uncategorized | Leave a comment

Cooler than an iPhone


Immunity’s Silica.

From Immunity’s page:

Example Use Cases:

  • Tell SILICA to scan every machine on every wireless network for file shares and download anything of interest to the SILICA device. Then just put it in your suit pocket and walk through your target’s office space.
  • Tell SILICA to actively penetrate any machines it can target (with any of Immunity CANVAS’s exploits) and have all successfully penetrated machines connect via HTTP/DNS to an external listening port running Immunity CANVAS Professional.
  • Mail SILICA to your target’s CEO, then let it turn on and hack anything it can as it sits on their desk.
  • Have SILICA conduct MITM attacks against people on a wireless network.
  • Use SILICA as you would CANVAS on your desktop – just smaller.
  • Very cool.

    Posted in Uncategorized | Tagged , | Leave a comment