
Bugtraq mailing list archives
Re: swc / ActivCard
From: Alan DeKok <aland () STRIKER OTTAWA ON CA>
Date: Wed, 23 Aug 2000 14:01:01 -0400
Michal Zalewski <lcamtuf () DIONE IDS PL> wrote:
Gosh, I never said I'll be able to gain access to someone's account. I just believe that numbers should be predictable with probability equal to 1 / number of digits' combinations, and not more. If this probability is thousands times smaller, it's bad. But I didn't even said it is
Your original message said:
Even basing on our rough estimations and basic analysis, we were able to guess next number with about 35% chance within 100 attempts -
That was reasonably clear. And *if* true, even for *one* card, it gives cause for a *huge* degredation in the public confidence of ActivCard tokens. That's pretty damning hype.
Simply, get this data. Strip two first digits (they're almost 100% predictable), then: - dump their binary image - visualise these values on the Y axis
That doesn't *appear* to be random to my eyes, but humans are not a good standard for deciding randomness. A simple check of the 106 6-digit numbers shows that 33 are less than 5x10^5. For random numbers, you'd expect a number closer to 53. I won't bother doing the math to discover the probability of 33/106 happening by chance, but I'd guess it to be somewhat low. That is, *if* that sequence did come from an ActivCard token.
If you believe this gives good randomness, that can be used as completely unpredictable passwords, I won't agree. It's weak. Some values / sequences are much more possible than other. That's all!
No, you said that you could *predict* the numbers with 35% accuracy. That statement is a LOT stronger than noting statistical irregularities with the output of DES operations. Please don't change your story. Any statistical issues might be minor, as you only supplied ~100 numbers. Maybe if we looked at 10,000 numbers, the irregularities might go away. Personally, I would like you to supply *all* of the information you used to make that 35% prediction. That is, *all* configuration for the ActivCard you used, (including serial number and programming options), *all* data, *all* programs, and a description of the methods that you used. Without this information, your claim of 35% was pure, unadulterated hype, without any factual basis. Supplying 100 numbers and saying "Look at them!" does NOT validate your claim about the predictability of the token output. If there *is* a vulnerability, then the public should know. If you made a mistake, and your claims are not reproducible, then you should issue a retraction, and an apology.
I'm not saying it affects every AC card in the world. Test it. If not, the case is closed. If yes, probably it's time for AC to re-design their algorithm.
Assuming there is no hardware problem with your card, I find it difficult to see how any claimed vulnerability can only affect one card out of thousands. They do, presumably, all run the same software on the same hardware, with only the keys being different. THAT is why people are getting upset at you. Your claim to have invalidated the security of one card implies an attack on all of them. Don't pretend otherwise. Alan DeKok.
Current thread:
- swc / ActivCard Michal Zalewski (Aug 18)
- Re: swc / ActivCard Alan DeKok (Aug 18)
- Re: swc / ActivCard John Fulmer (Aug 21)
- Re: swc / ActivCard Alan DeKok (Aug 21)
- Re: swc / ActivCard Michal Zalewski (Aug 21)
- Re: swc / ActivCard Vin McLellan (Aug 23)
- Re: swc / ActivCard Michal Zalewski (Aug 23)
- Re: swc / ActivCard Alan DeKok (Aug 25)
- Re: swc / ActivCard Michal Zalewski (Aug 25)
- Re: swc / ActivCard Michal Zalewski (Aug 25)
- Re: swc / ActivCard Alan DeKok (Aug 18)
- Re: swc / ActivCard Steve VanDevender (Aug 25)
- <Possible follow-ups>
- Re: swc / ActivCard Vasilios Katos (Aug 18)