|
BugTraq
RSA SecurID SID800 Token vulnerable by design Sep 07 2006 06:49PM hadmut danisch de (Hadmut Danisch) (2 replies) Re: RSA SecurID SID800 Token vulnerable by design Sep 09 2006 09:41AM 3APA3A (3APA3A SECURITY NNOV RU) (2 replies) Re: RSA SecurID SID800 Token vulnerable by design Sep 09 2006 10:51PM Bojan Zdrnja (bojan zdrnja gmail com) (2 replies) Re[2]: RSA SecurID SID800 Token vulnerable by design Sep 11 2006 11:54AM 3APA3A (3APA3A SECURITY NNOV RU) RE: [Full-disclosure] Re: RSA SecurID SID800 Token vulnerable by design Sep 10 2006 02:27AM Lyal Collins (lyal collins key2it com au) Re: [Full-disclosure] Re: RSA SecurID SID800 Token vulnerable by design Sep 09 2006 02:12PM Brian Eaton (eaton lists gmail com) (1 replies) Re[3]: RSA SecurID SID800 Token vulnerable by design Sep 11 2006 02:55PM 3APA3A (3APA3A SECURITY NNOV RU) (1 replies) Re: Re[3]: RSA SecurID SID800 Token vulnerable by design Sep 11 2006 03:35PM Brian Eaton (eaton lists gmail com) (1 replies) Re[5]: RSA SecurID SID800 Token vulnerable by design Sep 11 2006 04:16PM 3APA3A (3APA3A SECURITY NNOV RU) Re: RSA SecurID SID800 Token vulnerable by design Sep 08 2006 10:33PM Bojan Zdrnja (bojan zdrnja gmail com) |
|
Privacy Statement |
I recently tested an RSA SecurID SID800 Token
http://www.rsasecurity.com/products/securid/datasheets/SID800_DS_0205.pd
f
The token is bundled with some windows software designed to make
user's life easier. Interestingly, this software provides a function
which directly copies the current token code into the cut-and-paste
buffer, when the token is plugged in into USB. This is weak by design.
The security of these tokens is based on what RSA calls "two-factor
user authentication": It takes both a secret (PIN) and the
time-dependend Token-Code to authenticate. The security of the
Token-Code depends on the assumption that the token is resistant
against malware or intruders on the computer used for communication
(web browser, VPN client,...).
However, if the Token Code can be read over the USB bus, this
assumption does not hold. A single attack on the PC where the token is
plugged in would compromise both the PIN (e.g. with a keylogger) and
the token itself (e.g. writing a daemon which continuously polls the
token and forwards the token in real time to a remote attacker.
Ironically this could make an attack even easier: If some malware
simultaneously monitors the token and the keyboard, it is much easier
to detect that the keystrokes are actually related to some login
procedure:
Whenever the 6-digit token code appears in the keyboard or
cut-and-paste input stream, you can be pretty sure that in a sliding
window of about the last 100-200 keystrokes both the PIN and the
address of the server to login is contained. Makes it really easy to
automatically detect secrets in the input stream.
Thus, two different authentication methods are together weaker than
each single one.
regards
Hadmut
[ reply ]