Fingerprint-Protected USB Sticks Cracked 166
juct writes "Manufacturers of USB sticks and cards with fingerprint readers promise us that their data safes can only be opened with the right fingerprint. In their tests, heise Security found that it is easy to bypass the authentication and get access to the protected data. This works by sending a single USB command, using the open source tool PLscsi, that changes the accessible partition. They found the vulnerability in several USB sticks that use the same chipset. The article concludes: 'The fingerprint sensors in the products mentioned above apparently only serve one purpose: they mislead interested buyers. They do not provide any significant level of protection. We can only recommend that these products not be purchased.'"
Fingerprint scanners suck. (Score:5, Interesting)
Now I had garlic pizza for lunch, so there is more than one reason that would have worked, but the fact that it did work was more than enough to convince me of the worthlessness of the tech. They had a Mythbusters episode a while back where they were fooling fingerprint readers with xeroxes and rubber casts; again, a huge glaring flaw.
At this point, security is still about passwords. I haven't seen any consumer grade biometric I'd trust with my MySpace profile (if I ever make one), more less anything sensitive.
Re: (Score:2)
Re: (Score:2)
Isn't that like using a deadbolt lock AND the little clasp on the screen door? Yes, the clasp is a "lock" just like the fingerprint scanner, but it isn't really the "secure" part of the solution.
Re:Fingerprint scanners suck. (Score:5, Insightful)
Re:Fingerprint scanners suck. (Score:4, Interesting)
Re: (Score:2)
Re: (Score:3, Funny)
I'm certain it's not negative
Re: (Score:2, Interesting)
Re:Fingerprint scanners suck. (Score:5, Informative)
Then that's not the way it should be done. For one thing, while the angle of the print may change, the relative size will not.
I think you can create fingerprints based off of a formula. All you need is to supply a set of variable coefficients. The hash would be that set of coefficients for your formula.
It's been a very long time since I had studied fingerprints, and that was rather cursory.
From what I know, every print has at least one point. The alternative is that some prints have ridges going straight across, which doesn't sound right to me.
- Focus on the most prominent one or the one ranked highest in priority.
- Measure the distances between unique points and their angles relative to each other.
- A left loop will always be a left loop no matter the rotation, and has an apex.
- Same with a tented arch, except it will also have a triangular shape.
- A whorl has two epicenters of a given distance.
I never worked in the field, but the above plan seems obvious to me. I also don't have a large sample set to help refine that formula - maybe having two whorls or two similar loops or some other combo never happens.
With any authentication, the important thing is that it be easy to produce the key and make it very hard to fake it. Therefore, the biggest problem with fingerprint authentication is that the user keeps leaving their key everywhere they touch. It's like mentioning your passwords in plaintext within every conversation you have. One solution may be to use toeprints instead.
Re: (Score:2)
Re: (Score:2)
My C is a little rusty, so I apologise for any syntax errors.
Re: (Score:2)
Encryption would be nice, too, but if it's going to be entirely based on biometrics, it's not going to be secure to hardware hacks. It should at least be possible to stop this fully automatic, software-based attack that it suffers from right now, though.
Re: (Score:3, Interesting)
The scanners are still foolable. They did it on mythbusters without much trouble...I think they lifted a print, photoshopped it to make it look "cleaner", printed it out, licked the paper, and ran it over the scanner.
Passwords are much more secure at this point. No one is going to steal your password off an old soda bottle.
Re:Fingerprint scanners suck. (Score:5, Funny)
My password is "Dr. Pepper" you insensitive clod!
Re: (Score:3, Interesting)
Just check the wikipedia article, http://en.wikipedia.org/wiki/Dr._Pepper#Name_formatting [wikipedia.org], or look at one of your many cases of Dr Pepper if you don't believe me.
That said, quite a few people use stupid passwords. My own for
You haven't seen some password policies (Score:4, Funny)
Re:Fingerprint scanners suck. (Score:4, Insightful)
Adding a few numbers or characters should buy you a fair amount of security, for instance, "DrPepper!!!" or "DrPepper732" should be harder to guess than "DrPepper". The problem is that you can go too far. You could require, for instance, that passwords be at least 12 characters long and contain at least one uppercase letter, one lowercase letter, one number, and one non-alphanumeric symbol, e.g. "DrPepper732!?". The problem is that you've got multiple passwords- one for work, one for Amazon.com, one for online banking, one for /., etc. etc. so it becomes virtually impossible to remember the damn things. Now what? People have to start writing them down, and posting them next to the machine. A huge part of the security of passwords comes from the fact that it's not physically written down; as soon as you have to record it instead of keeping it in your memory, your overall level of security is going down, even if the password is getting harder to crack.
Re: (Score:3, Insightful)
Re:Fingerprint scanners suck. (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The thing that people need to drill is that fingerprints are a username. You still need a password.
Re: (Score:2)
The most it can do, is provide a "close enough" match to a program which will then provide the actual key. Since this is just a program, you can simply hack it to provide you with the key regardless of what input is fed to it, or just write your own program to retrieve the key from wherever it's stored.
A fingerprint is as poor a form of authentication as a signature, all for show while not providing any real
Big Picture: Still a bad idea (Score:2)
Re:Fingerprint scanners suck. (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Hook it up to the South African flamethrower car alarm [wikipedia.org]; that should do it! (If you can get them to start making those again.)
Fingerprint scanners suck. (Score:5, Informative)
1. the sensor itself.
2. the implementation of the sensor. (e.g. sensor as a front end)
There are two legitimate sensor manufacturers in the U.S. and one very well-known French company all of whom do not sell to just anyone anywhere and at prices absolutely out of range for a TV show and the average company.
Another thing to keep in mind is even IF there was budget for a good device, (oh to dream) there are implementation issues that can make the hardware worthless. As is often the case, meaningful implementations tend to complicate practically all business/operations matters which is why no company bothers.
To generalize that all fingerprint scanners suck is just wrong.
Re:Fingerprint scanners suck. (Score:4, Interesting)
Re:Fingerprint scanners suck. (Score:5, Interesting)
Re: (Score:2, Informative)
Re: (Score:3, Informative)
Re: (Score:2)
Re:Fingerprint scanners suck. (Score:5, Insightful)
This is why I don't ever want a car with fingerprint locks. Pretty much the same for laptops. I am going to put a fingerprint reader on my pool gate though, as it will be easier for someone to just kick the gate open, or jump the gate than it is for them to mug me and take my fingers.
Re:Fingerprint scanners suck. (Score:4, Interesting)
Re: (Score:2, Interesting)
Even scarier, in my view, was that they later skipped the last step altogether. They took the printed paper as is, moistened it, a
Re: (Score:2, Insightful)
The problem with these particular devices isn't in the fingerprint sensors but with the way the security system was setup on the USB chip. The attacks shown used in the article don't have anything to do with the fingerprint sensors. Heise did a similar review of similarly flawed "fingerprint protected" hard drives recently. I think I saw that link from Bruce Schnier's site originally.
This is not to say that fingerprint sensors are perfect. H
Damned With Faint Praise? (Score:5, Interesting)
You seldom get such unflinching prose in a review.
Re: (Score:2, Informative)
A few weeks ago, they said the same thing for "encrypted" USB hard drives (with state-of-the-art "XOR" encryption).
What's wrong with low level protection? (Score:3, Insightful)
Around the world there are millions of low-level padlocks etc that will stop most petty thieves but will not deter serious thieves. Most houses have pickable locks that anyone could learn to pick, but yet most locks still serve their purpose.
The only real issue is if peeople buy these devices and think they're getting Fort Knox level security and essentially use a two-dollar padlo
LOLOL pwned! (Score:4, Interesting)
Thanks once again, Slashdot, for making it possible for me to project the impression that I'm doing my job. ^_^
Re:LOLOL pwned! (Score:4, Insightful)
Just saying...
np: Pole - Achterbahn (Shackleton Remix) (Steingarten Remixes)
Re: (Score:2)
Re: (Score:2)
Then again he might ignore you and ask you what you are doing reading
Mythbusters (Score:4, Informative)
http://www.youtube.com/watch?v=oXyFmieZjiE
Re: (Score:3, Interesting)
Not that they didn't take both of them down easily, using low tech methods.
Re: (Score:3, Informative)
bad security (Score:3, Informative)
Re: (Score:3, Insightful)
Stupidity of the gullible people buying this, that is.
The guys who designed this (and, more importantly, marketed it) are certainly not stupid - they are essentially selling low-grade USB sticks at probably a 10x markup, at the cost of having a couple programmers write a Windows-only driver that makes it look like there is a security layer. I wouldn't
More snake oil security (Score:5, Interesting)
Here [tweakers.net] is an article by a dutch website (the article is in english though) that does a thorough job (technical details included) of debunking a similar product.
Meanwhile, the scary thing is that government and military organizations are reported to have been actually using such products...
Re: (Score:2)
Now, Joe Average doesn't know more about security than the feds do. Actually, I'm tempted to say, he knows less. So the next time some data will be "lost", some fed PR goon will step in front of the cam and announce that yes, we lost some data, but fortunately it was well encrypted, so your data has not been compromised. And Joe will be happy and satisfied, because it's encrypted.
How well
Comment removed (Score:5, Informative)
Re: (Score:3, Interesting)
The only problem is that they do not work.
There is a big market for physical security. It needs companies that will exploit it without snake oil. I like the idea of a multi-layer encryption / pass phrase / physical lock / self-destruct / whatever combination etc. idea on USB sticks and laptops etc. and I expect that products that cater to that need will grow. Unfortunately products that fail to live u
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
So your security is dependent on them hiding the hash to the rest of the data. Security is only as strong as its weakest point.
Re: (Score:2)
Re: (Score:2)
Fingerprint readers are kind of like a new, lazy, security guard; he kind of knows what people look like, and he'll let anyone in the building that looks close enough. Unfortunately, he _has_ to let people in who look close enough, or he'll get fired (the fingerprint reader won't be purchased).
Fingerprint readers are even worse than the human, because you can fake them so easily. So, you've got w
Re: (Score:2)
Re: (Score:3, Interesting)
If the encryption you are using is so poor that the loss of your USB stick means you consider the data to be compromised, why bother encrypting at all?!!!
Re: (Score:2)
True of biometrics, maybe. (Score:2)
However, it is possible to do strong encryption such that you should assume it will be secure, and there is a number of years for which you can assume that to be true. Most schemes we employ today are assumed secure for at least ten years. Without some trick (or fully-functional quantum computers), there are some schemes which will outlast the heat-death of the Universe, but 10 years
Hardware-based security is often vulnerable (Score:5, Informative)
Re:Hardware-based security is often vulnerable (Score:4, Informative)
You couldn't be more wrong about biometric authentication. You probably haven't seen the Sagem or Cogent sensors implemented well. It is the very rare organization who would actually spend the money to do the job right. A revision is necessary to make your statement accurate.
Cheap and dirty hardware security methods just aren't as secure as software-based encryption.
That's better.
Re:Hardware-based security is often vulnerable (Score:5, Interesting)
Granted It helps I made my way through college modding VideoCipher II boards back in the 80's so epoxy potting removal is incredibly easy to me.
The ONLY way to make these toys secure is custom chipsets. power up chipset and then only decrypt the contents of the flash after the 12 digit key was entered on the little pin pad. But nobody is going to make that.
Re: (Score:3, Informative)
Out of curiosity, how do you do it? I've used a combination of soaking in acetone and physically chipping/milling the stuff away, but I'd love to know better techniques.
>The ONLY way to make these toys secure is custom chipsets. power up chipset and then only decrypt the contents of the flash after the 12 digit key was entered on the little pin pad. But nobody is going to make that.
Read about the Maxim DS3600 [maxim-ic.com] family of chips some time. Keys stored e
Re: (Score:2)
http://www.blackhat.com/presentations/bh-dc-08/Tarnovsky/Presentation/bh-dc-08-tarnovsky.pdf [blackhat.com]
Watch a Sci-fi movie! (Score:2)
Re: (Score:2)
Plus, a gun beats any security measure you can come up with. Just hold it to the head of a guy who knows the password.
"Hey, see my gun? What's the password?"
"It's 12345. Here, let me press the thumb scanner for you while I'm here anyway."
Re: (Score:3, Informative)
'distress finger' (Score:2)
Re: (Score:2)
Under some situations, sure, it'd be problematic. But by the time you're doing that, you've already screwed up past your original silent-like-the-wind attack, where they'd never know you were there.
Of course, this being a scifi flick, something will go wrong anyway...
Mythbusters (Score:2)
Re: (Score:2, Informative)
I am honestly not surprised. Biometrics has a long way to go. Now when are we going to see retinal scanner thumb drives? *eyeroll*
The Elephant in The Room (Score:3, Insightful)
As long as someone can get access to the container, they can find a way in.
Obviously we're balancing convenience with security, but when some employee takes your whole customer database off-site on his laptop your problem is not encryption, it's keeping that data in a controlled environment.
Re:The Elephant in The Room (Score:5, Insightful)
Username:
Password:
Last login date:
Last Login time:
Today's PIN:
Worked good but kept a LOT of people out as they could never remember when they last logged in I was one of few that never called the help desk as I simply scheduled my login times to be the same each day.
Today's pin was not so safe as it was written on the whiteboard in the security office.
Re: (Score:2)
So anyone that knew you could easily get that part of the login. Not only compromising the system but locking you out in the process!
That's like setting your password to your wifes name or something. No security at all.
Re: (Score:2)
If you are that good, then yes you could get in.
Oh no! Not fingerprint "security" (Score:5, Interesting)
Obligatory links:
http://www.theregister.co.uk/2002/05/16/gummi_bears_defeat_fingerprint_sensors/ [theregister.co.uk]
http://www.schneier.com/crypto-gram-9808.html#biometrics [schneier.com]
It's important to understand that your fingerprints aren't secrets. You put them on thousands of objects every day. You can't create any security based on fingerprints unless you can assure that the reading device isn't tampered with. By placing a guard (a person) there or something.
Re: (Score:2)
Sounds like they read that article and repeated the experiment to see what would happen - and there was me thinking they'd actually made some of it up...
Another misuse of biometrics (Score:3, Interesting)
Most of the time, a username/password is a perfectly good access-control method. In some cases (either high-security environments or connections over hostile space), a second authentication method is advised. Now we have a two-factor authentication. Typical example is "log onto the firewall to allow you to log onto a machine inside the firewall." SecureID cards and the like also work as a good second-factor method.
A biometric challenge is arguably an acceptable second-factor when added to a username/password system. It is NOT a substitute for such a system.
However, biometrics are HARD to do correctly! Cheap scanners suck and are generally insecure by design. Expensive scanners suck, but are generally designed better. None are foolproof, yet.
Also, biometric authentication carries a risk. If your username and password are stolen, then you can change your password and stop the damage. If your biometric ID (retinal scan, fingerprint, etc.) are successfully 'stolen,' then you have lost your authentication ability for all time! If your fingerprint is compromised, you can NEVER USE it as an authentication method again! There ain't no resetting fingerprints!
So we have a large expense for an imperfect system with exactly one possible compromise per user per lifetime. This isn't a primary ID method. It's not a good second-factor ID method either. In EXTREME security environments, it might make sense as a third-factor authorization system, along with username/password and a (pseudo-) one-time pad (i.e. SecureID).
If you don't NEED that type of security, then DON'T USE YOUR BIOMETRIC DATA! One compromise, and it's useless. Forever. Period.
Oh yeah, but I forget the most important part: Fingerprint scanners are shiny and cool, just like in the movies. Bah.
Encrypted memory stick experience (Score:2)
The fundamental problem... (Score:2)
If you are going to provide authorization, you need to use a "what you know" (password) to even have a minimum of security.
Doing anything else is an explicit decision to disable security. Hopefully an acceptable reduction in exchange for a necessary benefit. Most of the time its not, h
Re: (Score:2)
Preview first... preview first...
If at first you don't get posted... (Score:3, Insightful)
I guess now I know what to do if the stories I submit don't make it...
Re: (Score:2)
Fingerprint Systems (Score:2)
Well that was stupid (Score:2)
Assuming you *had* to do it with fingerprints... why wouldn't you just come up with some algorithm that takes certain points and spaces and distances of your fingerprint, creates an encryption/decryption password based on the results, and then encrypts/decrypts your data with something like what TrueCrypt does, but using this password instead.
This way your data is ac
Truecrypt (Score:2)
When I plug it into another computer, the autostart popup comes on the screen to mount the volume, easy enough, and as almost everyone run their windows as administrator, no problem to run Truecrypt.
It works also on Linux and OSX.
And if someone steal it, good luck finding the key!
Re: (Score:2)
It works also on Linux and OSX.
And if someone steal it, good luck finding the key![/quote]
If someone knows a machine you'll be sticking it into at some time, they could simply get there before you and put a few simple tools on it to monitor what happens, and either flat out copy the encryp
It's your username (Score:2)
Everyday Joe.... (Score:2)
I for one think t
Security Failures in Secure Devices (Score:2)
http://www.blackhat.com/presentations/bh-dc-08/Tarnovsky/Presentation/bh-dc-08-tarnovsky.pdf [blackhat.com]
You're not getting th idea behind the hack. (Score:3, Insightful)
Those sticks are flawed not because the fingerprint sensor sucks, but because the authentication is made on the computer.
If I got it right, those sticks should work like this
The fact that the stick uses biometrics is irrelevant. With a design like that, it would have been vulnerable even if it had PIN, RSA keys or black magic. You can just bypass the security mechanism by sending the unlock command.
Essentialy, it has the same flaw as the secustik we saw last year.
Re:Misleading? (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)