Re: [NTSEC] Re: Internet Explorer Bug #4 (fwd)
=====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian | "If you're gonna die, die with your|./|\. ..\|/..|sunder@sundernet.com|boots on; If you're gonna try, just |/\|/\ <--*-->| ------------------ |stick around; Gonna cry? Just move along|\/|\/ ../|\..| "A toast to Odin, |you're gonna die, you're gonna die!" |.\|/. .+.v.+.|God of screwdrivers"| --Iron Maiden "Die With Your Boots on"|..... ======================== http://www.sundernet.com ========================= For with those which eternal lie, with strange eons even death may die. ---------- Forwarded message ---------- Date: Sat, 29 Mar 1997 14:37:43 -0800 From: Chris Plunkett <chris.plunkett@opensys.com> To: pmarc@cmg.FCNBD.COM Cc: Romulo Moacyr Cholewa <rmcholewa@poboxes.com>, Windows NT BugTraq Mailing List <NTBUGTRAQ@rc.on.ca>, "ntsecurity@iss.net" <ntsecurity@iss.net>, hughtay@microsoft.com Subject: Re: [NTSEC] Re: Internet Explorer Bug #4
We are aware of this, but the report is misleading. The report states that both times the password sent from the client to the server is encrypted. It would take quite a while for even a Cray Supercomputer to decrypt the password, even if it was dedicated to that sole task. For the average network server (and a powerful one), it would take a few human lifetimes to decrypt them even if they were dedicated to that sole task.
Arrggghhh! Nothing sets off my ignorance alert more quickly than somebody who mentions a Cray in conjunction with attempts to brute force crypto algorithms. I won't bother to explain all of the reasons why that is a foolish thing to say. Instead I will share a little story about some folks I know from about 3-4 years ago. (Greetings to any of these individuals who may be lurking on NTSEC or NTBUGTRAQ.)
Apparently they had some good reasons to go after the encryption algorithm used by WordPerfect. After several ineffective implementations, a WordPerfect engineer developed a DES based encryption algorithm. His claim was that it would take a room full of Crays to break the algorithm. Hmmm... sounds familiar. Needless to say, shortly after a successful attack on the algorithm by those mentioned, there was a certain 486 with a YMP sticker plastered to its front.
Sure, brute force attacks can be expensive when an algorithm is implemented correctly. However, I can't let it pass when these facts are expressed in such a patronizing manner.
--- Paul M. Cardon - System Officer Capital Markets Systems - First Chicago NBD Corporation pmarc@cmg.fcnbd.com - (312) 732-7392
I heard a story one time. It evolved around a college student in France doing some cyptography work in school, working nights as a backup operator at some large computer center. He didn't need a cray. A little knowledge and some creative programming, and a center full of computers (problably around the size of a Sparc 10). The story ended explaning how one of the encryption schemes that would tale a Cray week to break, was broken in one night, by a bunch of computers running backups. It might be hard to find a cray, but I know a guy, he works at this place where they got them 15 pentium pros. The average network server has another server for some other task on the same wire. ------------------------------------------------------------ Chris Plunkett System Technician Breakwater Technologies Inc. phone:(206)803-5000x112 Fax:(206)803-5001 http://www.breakwater.net mailto:chris@breakwater.net ------------------------------------------------------------
At 11:19 AM 3/31/97 -0500, Ray Arachelian forwarded:
---------- Forwarded message ---------- Date: Sat, 29 Mar 1997 14:37:43 -0800 From: Chris Plunkett <chris.plunkett@opensys.com> To: pmarc@cmg.FCNBD.COM Cc: Romulo Moacyr Cholewa <rmcholewa@poboxes.com>, Windows NT BugTraq Mailing List <NTBUGTRAQ@rc.on.ca>, "ntsecurity@iss.net" <ntsecurity@iss.net>, hughtay@microsoft.com Subject: Re: [NTSEC] Re: Internet Explorer Bug #4
[Amusing story deleted "486 with 'YMP' sticker on it]
I heard a story one time. It evolved around a college student in France doing some cyptography work in school, working nights as a backup operator at some large computer center. He didn't need a cray. A little knowledge and some creative programming, and a center full of computers (problably around the size of a Sparc 10). The story ended explaning how one of the encryption schemes that would tale a Cray week to break, was broken in one night, by a bunch of computers running backups.
This is almost certainly the RC4/40 crack in August 1995 by Damien Doligez in response to Hal Finney's challenge. It had actually been broken a few hours earlier by an English (Anglo-American?) team using a coordinated Internet attack, but Damien noticed his success before they noticed theirs. Much noise was made in the press by various people about "Using $10,000 worth of supercomputer time", but in fact the antique KSR-1 contributed far less crunching than the bunch of DEC Alpha workstations, and the amount of money per crack (if you'd been renting computer time) would have been far less. Subsequent cracks were run by the Internet team, which ran even faster, once they were organized. Various Cypherpunks were quoted in the press talking about how the US export laws were bogus, and how the maximum-strength crypto allowed by US law could be broken by a grad student over a weekend. Since then, there have been other cracks - the RC5/40 crack by Ian Goldberg took 3.5 hours on a Network of Workstations at Berkeley, winning the RSA challenge a few minutes before Germano Caronni's distributed Internet team, which subsequently broke the RC5/48 challenge. It's been popular in the press to refer to these talented researchers as "a grad student" when trying to make the point that "anybody could break this wimpy stuff" or as "a university research team with a room full of expensive supercomputers" when trying to pretend the export limits are reasonable for the real world. The news article below is from "NB", presumably "NewsBytes", and was posted without permission to the cypherpunks list by an anonymous remailer user. ====================================================== Date: Sat, 19 Aug 1995 00:01:18 +0200 Subject: WhiSSLing in the Dark To: cypherpunks@toad.com From: nobody@REPLAY.COM (Anonymous) Netscape Encrypted Data Cracked Tokyo, Japan, Aug. 18 (NB) -- Two computer users have managed to break Netscape's Secure Sockets Layer (SSL) encryption code in response to a challenge posted to the Internet. But far from scaring people away from using the system for online purchases, the results could reassure people of the safety. In mid July Hal Finney, a US computer user, posted data in an Internet message that he recorded when he sent an order, containing a fake name and credit card details, to Netscape's own computer. Setting a task for the hacking community, he wrote, "The challenge is to break the encryption and recover the name and address info I entered in the form and sent securely to Netscape." Early this week, news came from Damien Doligez, a French computer user, that he had cracked the code and revealed the contents of the message. Several hours later a message from an American team also claimed the same feat, actually cracking it two hours earlier than Doligez. While the results look damaging on the surface, Netscape, and Doligez, pointed out the amount of computer processing power needed to hack just one message and the difficulty in repeating the process. Roseanne Siino of Netscape told Newsbytes, "The real issue is whether this compromises security on the net. He used 120 computers for 8 days just to crack one message." Siino points out that to break into another message would require another eight days at the same 120 workstations and 2 parallel computers. In home computer terms, Doligez guesses a network of about 80 Intel Pentium-based machines would be equivalent to the system he had access to via his workplace, INRIA in Paris, and computers an Ecole Polytechnique and ENS. Netscape estimates the total cost of this computing time at around $10,000, meaning there are many more economical ways of getting credit cards numbers than hacking into Netscape SSL messages. Doligez agrees, writing on his home page: "The technical implications are almost zero. Everybody who understands the technical details knew perfectly well that this was do-able and even easy. You have to understand what happened exactly. I did not break SSL itself. I did only break one SSL session that used the weakest algorithm available in SSL. If I want to break another session, it will cost another 8 days of all my machines." The vulnerability of the encryption system is shown by its international use. The coding system available via Netscape software from the Internet makes use of a 40-bit encryption key. A stronger version, using a 128-bit key, is available to US citizens but restricted from export outside the United States by government regulations. Netscape's Siino explained the US government allows export of the lower security version "because they can break it." There are some hopes that this demonstration will help persuade the US government to lift export restrictions on some harder-to-crack versions of the code. Netscape is currently developing a new Secure Courier code which just encrypts the financial data in the messages using 56-bit keys. Siino explained, "You can export over 40-bit keys for a specific application." The new system should be available early next year. Many companies working on secure transaction systems hope the much more secure 128-bit code version of the system will be available for export eventually. This is said to be almost unbreakable, requiring a trillion times more processing power to crack than the 40-bit version. Internet users can view a copy of the original challenge, access Doligez's home page with details of his result, get copies of the program used to crack the code and read Netscape's response to the news through a special section at Netscape, http://home.netscape.com/newsref/std/key_challenge.html Press contacts : Roseanne Siino, Netscape, +1-415-528-2619 , Internet email roseanne@netscape.com; Damien Doligez, Internet email damien.doligez@inria.fr ; Hal Finney, Internet email hfinney@shell.portal.com) ========================================================================= # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts@ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list, please Cc: me on replies. Thanks.)
participants (2)
-
Bill Stewart
-
Ray Arachelian