Apple ios 8 Security



Similar documents
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

DTI / Titolo principale della presentazione IPHONE ENCRYPTION. Litiano Piccin. 11 ottobre 2014

Smart Ideas for Smartphone Security

Students Mobile Messaging Registration & Configuration

ios Encryption Systems Deploying ios Devices in Security-Critical Environments

Pryvate App User Manual

Mobile Iron User Guide

Apple Pay Questions & Answers

Analyzing the Security Schemes of Various Cloud Storage Services

How to wipe personal data and from a lost or stolen mobile device

Case Study: Smart Phone Deleted Data Recovery

Why you need. McAfee. Multi Acess PARTNER SERVICES

What security and assurance standards does Trustis use for TMDCS certificate services?

EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality

How To Protect Your Privacy On An Apple Iphone Or Ipod

FAQ for ipad (ios 5.x)

Mobile Device Management for CFAES

Legal Process Guidelines

ios How to Back Up from icloud

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

Forensic analysis of iphone backups

Apple Deployment Programs Apple ID for Students: Parent Guide

Lockup: A software tool to harden ios by disabling default Lockdown services

Case 1:15-mc JO Document 11 Filed 10/19/15 Page 1 of 7 PageID #: 60 APPLE INC. S RESPONSE TO COURT S OCTOBER 9, 2015 MEMORANDUM AND ORDER

ENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702

ios Security ios 9.0 or later September 2015

Legal Process Guidelines

Mobile Device Management ios Policies

ios Security October 2014 ios 8.1 or later

icloud Keychain and ios 7 Data Protection Andrey Belenko Sr. Security viaforensics

Reboot, reset, erase, power off, restore - what's the difference?

Mobile Security & BYOD Policy

NHSmail mobile configuration guide Apple iphone

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

Deploying iphone and ipad Security Overview

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Mobile Device Security and Encryption Standard and Guidelines

Ensuring the security of your mobile business intelligence

Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.

End User Devices Security Guidance: Apple OS X 10.10

Mobile Configuration Profiles for ios Devices Technical Note

ios Security October 2012

Deploying iphone and ipad Apple Configurator

Tutorial on Smartphone Security

Ensuring the security of your mobile business intelligence

UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION. Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny

Information Systems. Connecting Smartphones to NTU s System

How to Remotely Track Any Lost Smartphone, Tablet, or PC

Using Devices. Chapter 3

Cisco Mobile Collaboration Management Service

District 211 Technology. ipad Setup Instructions

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

A practical guide to IT security

Mobile Devices Using Without Losing

When enterprise mobility strategies are discussed, security is usually one of the first topics

ios Keychain Weakness FAQ Further Information on ios Password Protection

Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really?

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

iphone in Business How-To Setup Guide for Users

Encryption and Digital Signatures

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data

Data Storage on Mobile Devices Introduction to Computer Security Final Project

Getting Started - MDM Setup

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

Management of Hardware Passwords in Think PCs.

BEST PRACTICES FOR A COLLECTION OF AN IOS MOBILE DEVICE

Encryption Made Simple for Lawyers

Case Study: Mobile Device Forensics in Texting and Driving Cases

ONE Mail Direct for Mobile Devices

USER MANUAL. v Windows Client January

Deploying iphone and ipad Mobile Device Management

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Systems Manager Cloud Based Mobile Device Management

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

mobilecho: 5-Step Deployment Plan for Mobile File Management

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Neutralus Certification Practices Statement

Multi-Factor Authentication

Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad?

AirWatch for Android Devices

Hard vs. Soft Tokens Making the Right Choice for Security

SecureCom Mobile s mission is to help people keep their private communication private.

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Security Architecture Whitepaper

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

ipad in Business Security

A Taste of SANS SEC575 Part I: Invasion of the Mobile Phone Snatchers

Transcription:

Apple ios 8 Security

Apple ios 8 Security

Apple ios 8 Security

What s this all about? For all devices running ios 8.0 and later versions, Apple will no longer be performing ios data extractions as the data sought will be encrypted and Apple will not possess the encryption key. -- Apple Legal Process Guidelines for Law Enforcement

Reactions?

The notion that someone would market a closet that could never be opened even if it involves a case involving a child kidnapper and a court order to me does not make any sense

The notion that someone would market a closet that could never be opened even if it involves a case involving a child kidnapper and a court order to me does not make any sense The company s slovenly security on icloud made it the butt of jokes for weeks [...] With the release of ios 8, Apple made a privacy improvement so dramatic that it should rightly wipe out the taint of these security failures.

The notion that someone would market a closet that could never be opened even if it involves a case involving a child kidnapper and a court order to me does not make any sense The company s slovenly security on icloud made it the butt of jokes for weeks [...] With the release of ios 8, Apple made a privacy improvement so dramatic that it should rightly wipe out the taint of these security failures. What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law.

The notion that someone would market a closet that could never be opened even if it involves a case involving a child kidnapper and a court order to me does not make any sense What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law. The company s slovenly security on icloud made it the butt of jokes for weeks [...] With the release of ios 8, Apple made a privacy improvement so dramatic that it should rightly wipe out the taint of these security failures. With ios 8, Apple has finally brought their operating system up to what most experts would consider acceptable security

The notion that someone would market a closet that could never be opened even if it involves a case involving a child kidnapper and a court order to me does not make any sense What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law. The company s slovenly security on icloud made it the butt of jokes for weeks [...] With the release of ios 8, Apple made a privacy improvement so dramatic that it should rightly wipe out the taint of these security failures. With ios 8, Apple has finally brought their operating system up to what most experts would consider acceptable security "It is fully possible to permit law enforcement to do its job while still adequately protecting personal privacy,"

The notion that someone would market a closet that could never be opened even if it involves a case involving a child kidnapper and a court order to me does not make any sense What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law. "It is fully possible to permit law enforcement to do its job while still adequately protecting personal privacy," The company s slovenly security on icloud made it the butt of jokes for weeks [...] With the release of ios 8, Apple made a privacy improvement so dramatic that it should rightly wipe out the taint of these security failures. With ios 8, Apple has finally brought their operating system up to what most experts would consider acceptable security The only actions that have undermined the rule of law are the government s deceptive and secret mass surveillance programs.

The notion that someone would market a closet that could never be opened even if it involves a case involving a child kidnapper and a court order to me does not make any sense What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law. "It is fully possible to permit law enforcement to do its job while still adequately protecting personal privacy," The company s slovenly security on icloud made it the butt of jokes for weeks [...] With the release of ios 8, Apple made a privacy improvement so dramatic that it should rightly wipe out the taint of these security failures. With ios 8, Apple has finally brought their operating system up to what most experts would consider acceptable security The only actions that have undermined the rule of law are the government s deceptive and secret mass surveillance programs. With all their wizardry, perhaps Apple [...] could invent a kind of secure golden key they would retain and use only when a court has approved a search warrant.

The notion that someone would market a closet that could never be opened even if it involves a case involving a child kidnapper and a court order to me does not make any sense What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law. "It is fully possible to permit law enforcement to do its job while still adequately protecting personal privacy," [...] With all their wizardry, perhaps Apple [...] could invent a kind of secure golden key they would retain and use only when a court has approved a search warrant. The company s slovenly security on icloud made it the butt of jokes for weeks [...] With the release of ios 8, Apple made a privacy improvement so dramatic that it should rightly wipe out the taint of these security failures. With ios 8, Apple has finally brought their operating system up to what most experts would consider acceptable security The only actions that have undermined the rule of law are the government s deceptive and secret mass surveillance programs. The iphone never had a Backdoor just bad security design

People beyond the law. A closet that could never be opened.

Dramatic security improvement. Government s deceptive and secret mass surveillance programs.

Acceptable security.

No backdoor, just bad security.

So, what s actually going on?

ios Security Overview The Secure Enclave is a Coprocessor used for all Encryption, Decryption, and Key Management Has it s own secure memory for storing and processing information Effaceable Storage is the only location to store/erase keys and in charge of erasing all references to them

ios Security Overview The Secure Enclave is a Coprocessor used for all Encryption, Decryption, and Key Management Has it s own secure memory for storing and processing information Effaceable Storage is the only location to store/erase keys and in charge of erasing all references to them Every device has a UID, GID and Apple Root Certificate UID - Unique to a single device, unknown to Apple GID - Unique to class of processors (e.g. A8 processor has a key common in all A8 processors) Apple Root Certificate - Used for verifying Apple signatures (verifying software)

ios Security Overview The Secure Enclave is a Coprocessor used for all Encryption, Decryption, and Key Management Has it s own secure memory for storing and processing information Effaceable Storage is the only location to store/erase keys and in charge of erasing all references to them Every device has a UID, GID and Apple Root Certificate UID - Unique to a single device, unknown to Apple GID - Unique to class of processors (e.g. A8 processor has a key common in all A8 processors) Apple Root Certificate - Used for verifying Apple signatures (verifying software) Passcode - User defined password for accessing phone and contents

Local Storage 1. User creates a file File Contents

Local Storage 1. User creates a File 2. System creates a File Key specifically for encrypting that file File Key File Contents

Local Storage 1. User creates a File 2. System creates a File Key specifically for encrypting that file 3. The file key gets encrypted by one of 4 class keys, making sure the file is accessed appropriately Class Key File Key File Contents

Local Storage 1. User creates a File 2. System creates a File Key specifically for encrypting that file 3. The File Key gets encrypted by one of 4 Class Keys, making sure the file is accessed appropriately 4. The encrypted File Key is stored in the File s Metadata File Metadata Class Key File Key File Contents

Local Storage 1. User creates a File 2. System creates a File Key specifically for encrypting that file 3. The File Key gets encrypted by one of 4 Class Keys, making sure the file is accessed appropriately 4. The encrypted File Key is stored in the File s Metadata 5. The File Metadata is encrypted with the File System Key File System Key File Metadata Class Key File Key File Contents

Local Storage 1. User creates a File 2. System creates a File Key specifically for encrypting that file 3. The File Key gets encrypted by one of 4 Class Keys, making sure the file is accessed appropriately 4. The encrypted File Key is stored in the File s Metadata 5. The File Metadata is encrypted with the File System Key 6. The File System Key is encrypted by the UID and the GID Hardware Keys (UID, GID) File System Key Class Key File Metadata File Key File Contents

Local Storage 1. User creates a File 2. System creates a File Key specifically for encrypting that file 3. The File Key gets encrypted by one of 4 Class Keys, making sure the file is accessed appropriately 4. The encrypted File Key is stored in the File s Metadata 5. The File Metadata is encrypted with the File System Key 6. The File System Key is encrypted by the UID and the GID 7. 3 out of 4 Class Keys are encrypted by Passcode, UID, and GID (One wrapped by UID and GID) Hardware Keys (UID, GID) File System Key File Metadata Passcode Class Key File Key File Contents

File Classes No Protection Only encrypted using UID/GID, same level of encryption as before ios8 Hardware Keys (UID, GID) File System Key File Metadata Passcode Class Key File Key File Contents

File Classes No Protection Only encrypted using UID/GID, same level of encryption as before ios8 Protected Until First User Authentication Files are locked until the user first opens them, protects against reboot attacks Protected Unless Open The device can be locked but the file open, if not opened the file is protected Complete Protection Accessible only on an unlocked device Hardware Keys (UID, GID) File System Key File Metadata Passcode Class Key File Key File Contents

The Backdoor Before The iphone never had a backdoor -just poor security design - Julian Sanchez Apple could decrypt files by signing and running an alternate boot-loader that told the device to decrypt all files without asking for a passcode

The Backdoor Before What s New The iphone never had a backdoor -just poor security design - Julian Sanchez Apple could decrypt files by signing and running an alternate boot-loader that told the device to decrypt all files without asking for a passcode More files default to more secure file classes 3 out of 4 file classes are encrypted using UID/GID and passcode Apple has no access to passcode and therefore cannot decrypt using previous method

Security Incentives Apple must balance between usability and security Even when Apple recognizes a threat to their security, it may be difficult to find a userfriendly solution Four-digit pins are more secure than having no passcode but they re more annoying to use. And having no passcode at all is the simplest option for the user, but it offers no security Biggest threats to mobile device security: 1. Friends/Acquaintances/Significant others snooping on your device 2. Theft of device by common criminals 3. Targeting of your data by sophisticated attackers Previous versions of ios protected fairly well against 1 and 2, a simple passcode would prevent snoopers and common criminals from gaining access Apple and Apple users were not overly concerned at the time about sophisticated attackers (more advanced criminals, law enforcement, government agencies )

Updated Security Incentives Apple users become more aware and thus more concerned about sophisticated criminals Need for better security against the third category of attackers New security changes give users the impression they are more protected, in reality they are still not adequately protected against sophisticated security attacks (like those of law enforcement)

The Real Vulnerability : User Friendliness Escrow Keybag A collection of keys that allow access to all of your backup data It s stored on devices you have paired with the phone (computer, ipad, etc) Allows phone to be reset in case of lost passcode Jonathan Zdziarski Trains Police in how to break ios devices You can access your locked phone contents from a desktop (it s so user-friendly) This allows current commercial forensic tools to get your camera reel, videos, any recordings, anything on itunes, all 3rd party application data This requires access to the paired device

Threat Models Attacker possesses GID (easily obtainable) What can the attacker do? Not much, since the Class Key is derived from the UID + GID Attacker possesses GID + UID (not practical, but theoretically possible to get UID) What can the attacker do? Before ios-8 the attacker could access all files with ios-8 the attacker can only access files in No Protection class

Threat Models cntd. Attacker possesses GID + UID + user passcode (generally hard to do, only user should know the user passcode) What can the attacker do? Attacker can access all file types Attacker gains access to icloud of user (can be easy if password chosen badly, no two step verification setup) What can the attacker do? Attacker can access any files backed up on the icloud

Threat Models cntd. Attacker gains access to macbook of user (easy enough for law enforcement) What can the attacker do? Use recovery to get the escrow keybag and gain access to the files on the phone Attacker forges Apple Root Certificate (hard to do) What can the attacker do? Before ios-8, the Root Certificate could be used to decrypt all files With ios-8 only files in no encryption class

Bibliography Apple ios8 Security Doc Gizmodo's Article about Zdziarski Finds Jonathan Zdziarski's Blog about ios 8 Vulnerabilities Apple ios7 Technical Document Apple Backdoor before ios8 ios Encryption General Overview Apple Legal Process Guidelines

Bibliography cntd. http://www.bloomberg.com/news/articles/2015-01-06/new-york-prosecutorcalls-for-law-to-fight-apple-data-encryption http://www.theguardian.com/commentisfree/2014/sep/30/iphone-6-encryptedphone-data-default http://www.washingtonpost.com/opinions/compromise-needed-on-smartphoneencryption/2014/10/03/96680bf8-4a77-11e4-891d-713f052086a0_story.html http://appleinsider.com/articles/14/09/17/apple-says-incapable-of-decryptinguser-data-with-ios-8-even-for-government-agencies http://images.apple.com/privacy/docs/legal-process-guidelines-us.pdf http://support.apple.com/en-us/ht202303

Bibliography cntd. http://appleinsider.com/articles/14/09/30/usattorney-general-voices-concern-over-applesios-8-security-features http://h30499.www3.hp.com/t5/fortify- Application-Security/Mobile-Security-Threat- Modeling-Apple-s-TouchID/ba-p/6215627#. VNwXR53F-xV

Apple ios 8 Security