1 10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context and benefits of each change. Author: Graham Lee Senior Macintosh Software Engineer, Sophos
2 Table of contents Introduction Does it need to come with you? Change your Keychain password and settings Lock the screen when away from the computer Filevault Encrypted disk images Keychain secure notes Secure Empty Trash Encrypted swap files Firmware Password Automatic logout...10
3 Introduction Sophos s recent threat report 1 showed that while the Macintosh platform is now becoming the target of the same sort of organized crime that affects Windows users, these attacks are still very limited in scope and in impact. Nonetheless, we Mac users cannot afford to be complacent. The success of many data theft attacks depends more on the target system s user and the way in which they work with their computer, than on which operating system they have chosen to install. Laptops are more prone to physical attack than desktop systems by their nature being portable they are often taken out of the office to work from home, on the train or even in the local Starbucks. When you take your machine out on the road, you also take the data it contains away from the safety of the corporate environment with its security controls and into new environments with new risks and threats. Home users too must realize that when taking their MacBook out of the front door, more of their identity is on display than simply their preferred laptop brand. In this paper I describe 10 steps that can improve the security of a Mac system, paying particular attention to laptop considerations. I concentrate on improving physical security that is, protecting the system from attackers who can get their hands onto the computer. 1 Does it need to come with you? The first step in securing your remote computing lifestyle is considering whether you need to take everything out. All of the attacks discussed here involve getting data from the computer the easiest way to stop that from happening is to ensure that the data isn t there in the first place. In some environments, the attacker doesn t even need a computer; I have been sat in numerous cafés and on trains where I could see the online banking pages of other customers, and could (were I so inclined) read their account numbers, balances and the payments they were making. Simply put, I could see all of the information that an identity thief works to collate. While governmental departments such as the UK s HMRC may lose information about millions of people, most of the data on your laptop concerns one important person: you. Deciding whether all of this information really needs to come with you is the first, and most important, step to take on the road to safer computing. In some cases this might not be so easy. John Gruber, author of Mac blog Daring Fireball 2, says: My primary computer is a PowerBook that I use both at home and on the road. The only difference in how I use it on the road is that at home, I m always connected to the internet, but on the road, network access depends on the availability of Wi-Fi. Otherwise, no difference. In such a situation, leaving everything at home (perhaps on an external drive) loses the convenience of carrying on your work when you re out. But I would say this is a compromise well worth making. 2
4 2 Change your Keychain password and settings I asked John Gruber what changes he had made to his Mac OS X configuration with respect to security. His answer: The only significant change I ve made is that I use a different password for my Keychain than for my user account. That s a change I also make on all of my systems. The Keychain allows you to keep internet passwords, notes and SSL certificates in an encrypted store, and synchronize them between different machines with.mac. So far, so good of course there is only a single password to unlock all of this information, but it means that you can choose one really good password that you can remember, then use different passwords for all of the websites, mail accounts and so on that you use, which you don t need to keep in your head (or on a Post-It note) because you can always get them out of the Keychain. The problem with the default Keychain configuration is that this password is synchronized with your login password; whenever you are logged in, the items in your Keychain are unlocked and available to any application that asks for them. It is simple to fix this: firstly, open the Keychain Access application in /Applications/Utilities. In the Edit menu, choose Change password for Keychain login... and set a new password. Now when an application needs a password out of the Keychain, it has to prompt you for that password; a slight reduction in convenience but with a huge payoff in being able to control when your stored passwords are used. You can also control when the Keychain is automatically locked (so that you get re-prompted for the password) through the Keychain s settings, accessed from the Change Settings for Keychain login... menu item. Figure 1: Changing the login Keychain's password 3
5 3 Lock the screen when away from the computer Imagine the scene: you are logged into a website (perhaps checking your credit card balance, or seeing how many people have poked you today) in the coffee shop, when the barista tells you your drink is ready. You won t be far away and you can still see the laptop, so it is not going to get stolen... but while you re up, the nice girl on the next table makes a few notes on a napkin, and by the time you get home your credit card is a few hundred pounds lighter. This situation can be easily avoided by using the password-protected screen saver built into Mac OS X. In the Security system preferences pane, make sure that Require password to wake this computer from sleep or screensaver is enabled. Now it is also useful to have a quick way to activate the screensaver, and two options are available. The first is to set up a hot corner in the screensaver preferences, so that when you move the mouse pointer into that corner of the screen, the screensaver will activate. The second can be found in the preferences of the Keychain Access program: choose Show status in menu bar. The padlock icon which appears shows whether the Keychain is currently locked; clicking on it provides a menu from which one option is to lock the screen. Figure 2: The Keychain status menu item lets you quickly lock the screen 4 Filevault It is hard to imagine that you would ever forget your laptop and leave it at the train station, but it does happen. You have probably got insurance to cover the cost of the computer, and while it will be a hassle to recover all those files from a backup (less so with Time Machine, of course) you can soon get back to working again. Anyway, that MacBook Air looks so lonely on the shelf all by itself... but what has happened to the data on the ibook you left behind? If it was picked up by a cracker, then they probably didn t even turn the computer on, but just removed the hard drive and dropped it into a different computer. Then, without even needing to crack your password, all of the files browser history, downloaded mail, Pages documents and so on on that drive are ripe for the picking. Filevault solves that problem in a simple way: it replaces your home directory, the area on the hard drive where all your personal files are stored, with an encrypted container. This container can only be unlocked by supplying one of two passwords either your login password or the master password, a catch-all password in case the login password is forgotten. The encryption used by Filevault is of a standard deemed safe to use by US government agencies. 3 To enable Filevault, go to the Security pane in System Preferences, and choose the Filevault tab. Click on the Turn On Filevault... option, and you will be asked both to enter a master password and your own account s password. The Mac will convert your home directory into an encrypted container, and you cannot log in until this is complete. It is important that this step isn t interrupted, so if you are using a laptop plug it into the 4
6 mains before enabling Filevault. The master password can be used to remove the Filevault encryption from your home folder, so it s best to use a very complex password here, although if you are going to write it down then of course you have to keep it somewhere it won t be found. Using Filevault or any other encryption (see below for two more options built-in to Mac OS X) raises a question about backups: do you keep your backups encrypted, or back up the files inside the encrypted container in the clear? There is no right answer, but I choose to keep unencrypted backups because my backup disk stays at home where I can be confident about who accesses it. Time Machine, the built-in backup system on Mac OS X, will only back up the Filevault volume when you log out, not on the regular schedule. 4 5 Encrypted disk images Covering your whole home directory with encryption may seem like overkill, especially if you only have a few sensitive files. You can use the same encryption mechanism that Filevault employs to create your own encrypted disk images, which can be used from the Finder in exactly the same way as regular images except that you cannot see the contents without entering your password. Launch the Disk Utility application from /Applications/Utilities, and click on New Image. From the drop-down which appears, choose the 128-bit option from Encryption, and configure the image as you like. (By the way, this is a great way to make an encrypted USB key drive format the drive, then create an encrypted disk image on it using some or all of the free space.) 5
7 Figure 3: Creating an encrypted disk image 6 Keychain secure notes For short notes which should be hidden from the view of others, you can create Secure Notes in the Keychain Access application which can then only be viewed by entering your Keychain password. This could be useful if you want to write yourself a reminder without letting anyone else see it, for example to remind you about a task in your online banking website. 6
8 7 Secure Empty Trash When you delete a file from the hard drive in your Mac, it is not really deleted the info telling the computer where to find the file is removed, but the data will remain on the disk until the space is needed to store something else. It is really easy to recover deleted files, you can buy off-the-shelf programs such as FileSalvage 5 which can do it. Therefore even your deleted files are not safe from the interested cracker. By selecting Secure Empty Trash from the Finder menu to empty the Trash, you can make recovery of the deleted files much harder. It s still not impossible, although it will require complex (and expensive) forensics equipment to do. Secure Empty Trash writes over the files a number of times before deleting them, which makes it difficult to Figure 4: Using Secure Empty Trash to completely delete files discover the original contents. Securely deleting files can be a slow process. 8 Encrypted swap files Many news websites have reported the story that security researchers have found a way to recover passwords 6 from the RAM of computers running a variety of operating systems including Mac OS X. The constraints on that particular attack are very limited (the attacker needs physical access, and must be able to reboot the system, then boot from their own removable media within less than a minute), but the applicability is wider on Mac OS X for a simple reason: it is possible for your login password to get into the swap file, a file on the hard drive used to simulate more memory. When that happens anyone who can get access to the files on the hard drive locally or remotely can read the password. 7
9 Figure 5: Enabling secure virtual memory Luckily, a solution to this problem is incredibly simple. From the security pane in System Preferences tick Use secure virtual memory. Once you have done this, reboot and the swap file will be stored in an encrypted format. 9 Firmware Password Referring back to the attack described above in Encrypted swap files, the attacker needed to be able to boot into their own operating system to recover the passwords from RAM. It is possible to stop that from happening by password-protecting the firmware. Doing so is slightly more involved than encrypting the virtual memory, but it may make sense on workstations as well as laptops, depending on the environment without the password, an attacker can t reboot from the OS X installation disk to reset administrator passwords or otherwise manipulate the contents of the hard drive. It also stops computers with unrestricted physical access, such as those in internet cafés or university computing labs, from being booted into another operating system to circumvent any local policy. On the installation disk that came with your Mac, go to the Applications/Utilities folder (Apple has hidden this folder on my copy, which means that to get there I had to choose Go To Folder... (Command-Shift-G) in the Finder, and type /Volumes/Mac OS X Install Disc 1/Applications/Utilities. The good news is that you don t have to type all of that, you can type the first few characters of each part then hit Tab to complete it). The application is called Open Firmware Password.app on PowerPC computers and Firmware 8
10 Password.app on Intel Macs. You need to provide an administrator password before you set the firmware password, and it is very important not to forget that password as without it you cannot change what operating system the computer boots into, nor boot in Verbose, Safe or Single-User modes. Apple has a support article 7 with a detailed description of the consequences of entering a firmware password. Figure 6: Setting a firmware password Setting a firmware password also gives protection against attackers using a FireWire connection to snoop the contents of your computer s memory, which can include your login password. By connecting a FireWire cable to any Mac in its default configuration, a bad guy can see, or even change, what is in the Mac s memory 8 without having to install any software on the system and without any record of the intrusion. Setting the firmware password causes the FireWire drivers to operate in a secure mode, removing this direct memory access. 9
11 10 Automatic logout The last item in this discussion of Mac OS X features to improve physical security is also the least, because it offers little additional security at a cost of some convenience. In the Security preference pane you can configure the Mac to log you out automatically if you are not active for a certain amount of time. The problem with that is that the inactivity time gives bad guys a chance to use the computer, while locking the screen (or even shutting the computer down) would stop them from being able to do that. Sources 1 2 daringfireball.net/ 3 images.apple.com/macosx/pdf/macosx_leopard_security_tb.pdf citp.princeton.edu/memory/ 7 docs.info.apple.com/article.html?artnum=
Cumulus 8.1 Administrator Guide Copyright 2010, Canto GmbH. All rights reserved. Canto, the Canto logo, the Cumulus logo, and Cumulus are registered trademarks of Canto, registered in the U.S. and other
OS X Support Essentials 10.10 Exam Preparation Guide Updated January 2015 1 Contents About This Guide... 3 Exam Details... 4 Recommended Exam Preparation... 4 Part One: Installation and Configuration...
A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password
Working Smarter with MS Outlook 2010 Useful Website: https://intranet.uow.edu.au/myit/services/email/ Contents What s new and working smarter with Office 2010... 4 What s new in Office 2010... 6 Tips...
March 2012 The Virtual Office Running your Business from a Distance Contents 1 Introduction... 4 2 Online Banking... 4 2.1 Banking Services... 6 2.2 First Nations Bank Small business accounts... 7 2.2.1
LevelOne User Manual ACC-2000 KVM IP Console Module Ver. 1.1 1 / 87 Certificates Ver. 1.0.0-0709 FCC This equipment has been tested and found to comply with Part 15 of the FCC Rules. Operation is subject
BaseTech / Network+ Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 528 20 Zen and the Art of Network Support Primum non nocere ( First, do no harm. ) ATTRIBUTED TO GALEN
Options for backing up your computer Aryeh Goretsky, MVP, ZCSE NOTE: An earlier version of this white paper appeared as a guest blog at The Windows Club website. Table of Contents Both hardware and software
ADOBE PHOTOSHOP LIGHTROOM 5 QUICK START GUIDE Victoria Bampton www.lightroomqueen.com/lr5quickstart www.lightroomqueen.com 1 LEGAL NOTICE: 2013 Victoria Bampton. All rights reserved This ebook is available
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
TeamViewer 7 Manual Remote Control TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 5 1.1 About the software... 5 1.2 About the manual... 5
Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Alma Whitten School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 email@example.com J. D. Tygar 1 EECS and SIMS University
Kerio Connect Administrator s Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Connect, version 7.2. All additional modifications
Concentsus Online Backup User Manual Concentsus Small Business 5252 Edgewood Drive, Suite 250 Provo, UT 84604 888-889-9949 www.concentsus.com 2008 Concentsus, a service of efilecabinet, LC All Rights Reserved.
Harmony Ultimate One User Guide Version 1 (2014-02- 11) Harmony Ultimate One User Guide Ultimate One Table of Contents About this Manual... 6 Terms used in this manual... 6 At a Glance... 6 Features...
An Overview of the Different Technologies Available for Backup CONTENTS CONTENTS... 2 INTRODUCTION... 4 TAPE DRIVES... 4 Cost... 4 Quantity of Data... 4 Length of Archival... 5 Time to Backup... 5 Time
User Manual V1.0 2008.10.23 Certifications FCC This equipment has been tested and found to comply with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may
Data protection is an everyday risk that far too many users are not addressing. Using any storage device that protects against hard drive failure is a great start, but it does not protect against major
4 Using Forums, Chats, and Dialogues Forums are a powerful communication tool within a Moodle course. Think of them as an online message board where you and your students can post messages to each other
TM Creating Trust Online Comodo Internet Security Pro User Guide 1 Table of Contents 1 Comodo Internet Security Pro - Introduction... 6 1.1 Special Features... 10 1.2 Installation... 12 1.3 System Requirements...
In Security and Usability: Designing Secure Systems that People Can Use, eds. L. Cranor and G. Simson. O'Reilly, 2005, pp. 679-702 CHAPTER THIRTY- FOUR Why Johnny Can t Encrypt A Usability Evaluation of
ShadowProtect IT Edition User Guide Page 1 1. ShadowProtect IT Edition User Guide............................................................................ 3 1.1 ShadowProtect Overview..................................................................................
G DATA TechPaper #0273 Mobile Device Management G DATA Application Development TechPaper_#0273_2015_04_21 Contents 1. 2. 3. 4. Introduction... 3 Mobile devices in the enterprise... 3 2.1. Benefits... 4