Hacking fingerprint scanners. Or: why Microsoft Fingerprint Reader is not a security feature



Similar documents
Penetration Testing Biometric System

USB Portable Storage Device: Security Problem Definition Summary

22 nd NISS Conference

Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich eugene@tsyrklevich.name Vlad Tsyrklevich vlad902@gmail.com

USB Portable Storage Device: Security Problem Definition Summary

Client Server Registration Protocol

Virtual Private Networks

Wireless LAN Security I: WEP Overview and Tools

Topics in Network Security

Criteria for web application security check. Version

Biologger A Biometric Keylogger

Each ievo reader needs its own network cable, as each reader has its own IP address. Ensure this has been taken into consideration

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

Thick Client Application Security

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Wireless LAN Security: Securing Your Access Point

Windows Remote Access

Fingerprint Based Biometric Attendance System

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P:

SHORT MESSAGE SERVICE SECURITY

Reviving smart card analysis

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

WiFi Security Assessments

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Wireless Traffic Analysis. Kelcey Tietjen DF Written Report 10/03/06

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Mobile Office Security Requirements for the Mobile Office

Chapter 17. Transport-Level Security

Chapter 6 CDMA/802.11i

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Why you need secure

True Identity solution

Final Year Project Interim Report

The Top Web Application Attacks: Are you vulnerable?

ABSTRACT I. INTRODUCTION

Securing IP Networks with Implementation of IPv6

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Internet Banking System Web Application Penetration Test Report

Wireless Networks. Welcome to Wireless

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Authentication requirement Authentication function MAC Hash function Security of

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

DigitalPersona Pro Enterprise

Storing Encrypted Plain Text Files Using Google Android

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

SecureDoc Disk Encryption Cryptographic Engine

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Security Policy for Oracle Advanced Security Option Cryptographic Module

Navigating Endpoint Encryption Technologies

Guidance Regarding Skype and Other P2P VoIP Solutions

Security. Definitions

Secure USB Flash Drive. Biometric & Professional Drives

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

File System Encryption with Integrated User Management

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network FAX Driver. Operation Guide

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Site to Site Virtual Private Networks (VPNs):

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Secure Data Exchange Solution

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

SafeNet MSSQL EKM Provider User Guide

Digital Persona Fingerprint Reader Installation

Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview

A Security Survey of Strong Authentication Technologies

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

How Secure is your Authentication Technology?

That Point of Sale is a PoS

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Network Security. HIT Shimrit Tzur-David

FileCloud Security FAQ

How to hack VMware vcenter server in 60 seconds

Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Fingerprint Identity User Manual for the Griaule Biometric Framework Rev 1.00

Learn Ethical Hacking, Become a Pentester

Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS

Summary of Results from California Testing of the ES&S Unity /AutoMARK Voting System

Windows 7. Qing Liu Michael Stevens

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

Locking down a Hitachi ID Suite server

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Princeton University Computer Science COS 432: Information Security (Fall 2013)

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Transcription:

Hacking fingerprint scanners Or: why Microsoft Fingerprint Reader is not a security feature

Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 1

Biometric authentication systems Large number of components and modules many vulnerable communication channels These communications channels are usually secured Physical closeness (& tamperproof hardware) Encrypting the communication channel Data collection Raw data Signal processing Feature vector Matching Template Feature storage Score Application Yes/No Decision 2

Exploit targets (1) Unencrypted communication channels (sniffing) Person, if the biometrics is easily extractable (social engineering, rubber-hose) Decision module (reverse engineering) Data collection Raw data Signal processing Feature vector Matching Template Feature storage Application Yes/No Decision Score 3

Exploit targets (2) Usually the lack of physical protection make the raw data (if unencrypted) the most promising target of the communication channels Likewise the data collection module (i.e. fingerprint scanner) is usually more easily accessible than other modules The channel between the data collection module and the signal processing (such as device drivers) should be well protected The focus of this presentation is on cryptographic protection (or lack thereof) Data collection Raw data 4

Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 5

Fingerprint scanning example protocol A Scan ready Signal processing B M=D Private,B (E Public,A (RAND)) K=GenKey(RAND) RAND=D Private,A (E Public,B (M)) K=GenKey(RAND) E Public,B (RAND+1) E K (FP-scan) Transmission of the scanned image Check, if D Private,B (E Public,B (RAND+1))-1=RAND 6

Properties of the example protocol Anyone not knowing the private key of A cannot open the random number. Replaying the encrypted random number will not help the attacker, since the operation is done on the original number replayprevention (1) and authentication of A (2) Anyone not knowing the private key of B may generate some nonce that will end the protocol, but A will generate a different session key from B a party simulating B cannot decrypt the raw data (3) 7

Protecting the raw data In order to protect the raw data, two things are needed: A decent cryptographic algorithm A good cryptographic protocol 8

Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 9

Microsoft Fingerprint Reader A USB-fingerprint scanner for consumer market Price around 40 Can be used to log in to Windows (not domains) and in to certain types of web-sites (providing they have standard GUI-controls used for the password) The device can be used as a fingerprint scanner for other applications as well, if 3 rd -party software is used Very little public technical information available 10

MSFR as an access control device? 11

MSFR security features Not recommended to be used as a guardian for sensitive information Why? Microsoft is not saying (publicly anyway) Bugtraq / SecurityFocus, etc: no sources The few sources (i.e. Globetechnology [1]) tend to think that the anti-forgery and encryption features are ok [1]: http://www.globetechnology.com/servlet/story/rtgam.20041115.gtfingernov15/bnstory/techreviews/ Misconception from a different device (APC) 12

Playing field Microsoft: - Casing ri Griaule: - SDK Signaalinkäsittely Piirrevekto Vertaaminen (matching) Vertailuarv o (template) Biometristen piirteiden säilytys Kyll ä/ei Päätös Pistey tys DigitalPersona: - Hardware - Drivers - GUI 13

Related products DigitalPersona U.are.U-technology According to DP s Gold SDK (and others) this technology is used in MSFR as well Architecture: Fingerprint scanner Challenge Response Raw data encrypted with a session key U.are.U COMserver Encrypted raw data 128-bit cipher key Signal processing 250-byte feature vector Matching module DP Fingerprint Engine Template Feature storage 14

Related products, cont d DP U.are.U 4000B scanner firmware & MSFR scanner firmware are NOT identical there is a one-bit difference! [1] Replacing this bit in MSFR drivers Does not crash Windows or freak out the MSFR Does not work properly either => MSFR = UrU 4000B, with commercial modifications [1]: http://dpfp.berlios.de/wikka.php?wakka=firmware 15

DigitalPersona The hardware has been tested and found to be sound The transmission of raw data with DP s system includes (Unspecified) challenge-response - protocol Stream cipher encryption, with session keys All is well? 16

Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 17

Testing equipment Raw data transmission: Sniffer/Filter built on top of USB Sniffer [2] Formatting: PaintShopPro, HexEdit, Custom-made filter Anti-forgery and technical properties: Griaule GrFinger SDK [3], and miscellaneous equipment [2] http://benoit.papillault.free.fr/usbsnoop/doc.php.en [3] http://www.griaule.com/en/fingerprint_recognition_sdk.php 18

MSFR: technical properties Optical scanner Resolution 512dpi (> 650dpi horizontal, 350-450dpi vertical) Scanned result in raw format: 384x288 pixels Scanning focus not immediately on the surface of the scanner glass: uses the skin s ridges 3D-properties FTIR (Frustrated Total Internal Reflection) Starting the scan requires a certain (coarse) pressure distribution and activity on the sensors heat does not matter, but reflective surfaces do not induce a scan 19

FTIR-sensors Optical material (prism, etc.) Finger 3D-sensitive Geometrical distortion Light source CCD/CMOS 20

MSFR: anti-forgery (1) Raw data is made of the actual scan and a checksum : a differently scanned smaller area from near the fingerprint scan focal point Imaging is not 1:1, but a conformal transformation of the fingerprint (FTIR-property, makes constructing digital replay-images from latent fingerprints harder) Forgery attempts did not achieve login with the experimented tricks, but a partial print was achieved with merely a 2D-image and blue tack (sort of sticking plasticine). Thresholded fingerprint image was printed on a transparency and used as the print of a blue tack finger 21

MSFR: anti-forgery (2) Tinfoil to create different reflective properties near the hotspot Partial fingerprint scan (with checksum) achieved with printed transparency and blue tack Actual fingerprint scan (with checksum) 22

MSFR: FTIR distortion Test grid to estimate the transformation ()14'1,15316,41010'0,845xxyyy = Screenshot from Griaule SDK, points to the type of conformal transformation made to the raw data Must be reproduced for digital replays An estimate of the transformation made by MSFR, obtained from measuring the pixels between MSFR and Griaule SDK scans 23

MSFR: crypto-features (1) First guess: Griaule s SDK will expose the crypto in the device (The free-version of the SDK let s one save the scans encrypted) This does not prove to be a correct guess, but: It is instructive to look closer at the pictures saved by the Griaule SDK 24

Griaule SDK: encryption Encrypted scan 1 Encrypted scan 2 Difference of the scans The same encryption key between scans and even sessions small graylevel differences in the scanned fingerprint don t cancel, but the background does No decent key management no replay protection Confidentiality not protected 25

USB Sniffer Affordable hardware sniffers with appropriate wiring hard to come by A software sniffer is placed between drivers and the client app A lot of USB-control traffic that needs to be identified and filtered 26

27

Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 28

MSFR: messaging (1) MSFR DP drivers Firmware Scanner init Empty scan Scan ready Finger placed Fingerprint scan Fingerprint checksum Finger removed Data obtained with USB Sniffer and Griaule SDK 29

MSFR: messaging (2) Messages travel also to MSFR USB-protocol control messages Device firmware USB-protocol request messages (incl. memory areas) Almost all messages to MSFR are constant All messages bound for DP s drivers (aside from the scans themselves) are constant, excluding the serial number and type Not at least per-scan keys are used The messages to DP s drivers in the beginning of a session are identical no session keys are used either 30

MSFR: crypto features (2) MSFR does not use any kind of key management protocol Encrypting the actual scan? The values of the scan obtained from the USB Sniffer s log are suspiciously unevenly distributed, and there are easily seen 384 bytes sequences Form a bitmap of the values, of width 384 pixels: 31

MSFR: crypto features (3) Empty initial scan Fingerprint, and its checksum MSFR scanning results from the sniffer 32

MSFR: crypto features (4) Let s turn on the bit different from the DP s firmware Scans become encrypted! - Also some session keys or salt seem to be in use (trivial image difference did not work) But: DP s drivers are unable to process the scan any further Crypto-bit is turned off in the firmware, but the DP s drivers do not expect anything encrypted either 33

UrU 4000B messaging MSFR DP drivers Firmware Scanner init Empty scan Scan ready Challenge (00 29 00 00 00) Response (2E 95 D9 63) Finger placed Fingerprint scan Challenge (01 29 00 00 00) Response (56 66 30 4B) Fingerprint checksum Challenge (02 29 00 00 00) Response (D9 00 CC A1) Finger removed Data obtained with USB Sniffer, courtesy of Daniel Drake 34

MSFR: crypto features (5) If crypto is on, session keys are used, BUT, who initializes them? 10 20 replugs: two initial scans were retrieved: - Image difference did work! => MSFR initializes the keys => UrU & MSFR cipher is a stream cipher 35

Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 36

Equipment and software Impostor Victim USB male-to-male cable Custom-made USB-message player software USB-sniffer software 37

MSFR messaging Lot of USB control data; constant Request-response messages Requests vary, but responses are constant => requests need not be interpreted, only counted Actual images Image headers must be sequenced 38

MSFR messaging (filtered) Ignore Time (ms) start=30610 Message direction MSFR DP Size (B) Type Ta.ID Contents INIT 156 0x10000 BULK 13 Contents of previous(?) scan, part 1 156 0x40 BULK 14 Msg X 276 0x40 BULK 14 Msg Y 276 0x40 BULK 31 Msg Q 533 0x10000 BULK 13 Empty scan, part 1 538 0xB340 BULK 35 Contents of previous(?) scan, part 2 587 0xB1C0 BULK 35 Empty scan, part 2 595 0x10000 BULK 36 Mem dump in ASCII 2068 0x40 BULK 31 Msg Z 2068 0x40 BULK 39 Msg Y Known finger 10940 0x40 BULK 39 Msg Z 10940 0x40 BULK 41 Msg Z 11044 0x10000 BULK 36 FP scan, part 1 11050 0xB340 BULK 43 Mem dump in ASCII 11100 0xB1C0 BULK 43 FP scan, part 2 11110 0x10000 BULK 45 Mem dump in ASCII 11287 0x8740 BULK 45 FP checksum 11297 0x10000 BULK 47 Mem dump in ASCII 11620 0x40 BULK 41 Msg Z 11620 0x40 BULK 50 Msg Z Identical between scans 39

MSFR image headers Initial empty scan headers All identical Checksum headers Variable, but simple sequence number, can be replayed Scan headers Variable, but simple sequence number Additional variable byte, varies within four units => at most 4 trials needed 40

Replay attack 1 Install a USB-sniffer to the victim s computer Get the logfile Use a custom-made USB message-player to parse the logfile Play back the logfile to the victim s computer Drawback: identical image - protection possible (untested) would require post-processing of the image at first (histogram changing, geometrical distortions) 41

Replay attack 2 Create a template: Generate a logfile in your own computer Create data: Get a fingerprint (i.e. a latent print) of the victim Digitize the fingerprint Apply the aforementioned conformal transformation to the fp image Combine data & template Replace the scan in the original logfile with the transformed fp image Replace the checksum with a negative image from the hotspot Play this message sequence to the victim s computer Identical image -protection is bypassed Drawback: checksum may be formed with a more complex method than just negative image (untested) combining known checksums? 42

Possible replay attack 3 (for encrypted version, conjectured) Create a template: Generate a logfile (encrypted and unencrypted fingerprint) in your own computer Record the challenge and response values Subtract the plain and encrypted images to get a one-time pad for the CPpair Create data: Get a fingerprint (i.e. a latent print) of the victim Digitize the fingerprint Apply the aforementioned conformal transformation to the fp image Add the one-time-pad to this image Combine data & template Replace the scan in the original logfile with the transformed & encrypted image Play this message sequence to the victim s computer Modify challenge and response messages between the driver and device Identical image -protection is bypassed Drawback: lots, not tested 43

Fix? MSFR would work correctly with just one flipped bit (*) Also DP s drivers should not expect an unencrypted image the bit location for this is not known Fix available in Linux, not in Windows, see [1] (*) Location 0xE9B7 in dpd0bx01.dll and location 0x42B in the uploaded firmware-messages should be 0x17, not 0x7 [1]: http://dpfp.berlios.de/wikka.php?wakka=firmware 44

MSFR as an access control device MSFR uses no crypto whatsoever: No protocol, (which could just have been misused due to a bug) No communication channel encryption at all in the most vulnerable part of a biometric authentication system Optical scanner, from which partial scans can be obtained with a 2D-model With predictable messaging and no crypto, one will not even need a gelatine finger, just a USB- recorder/player This is NOT a security feature 45

Demonstration 46

MSFR: closing statements Security features have been sacrificed for low price (DP s drivers have the security features, they are just not used) By using nonexistent crypto-features, MSFR also reveals some of the DP s anti-forgery techniques, such as the checksum The MS / DP disclaimer holds more likely it is an understatement! 47

Questions? 48