What is the lifetime of a ‘public secret’?

September 28th, 2009

I wrote about public research before. As far as I am concerned research should be done out in the open. And all parties involved should know the vulnerabilities in detail. And parties involved for me are: the (potential) customers, the manufacturer and the rest of the research field (in other words: everybody). It is a fact that if you make a public announcement revealing eighty (or more) percent of your discovery, some clever person will stand up and fill in the missing part. And the more common a lock is, the sooner this will happen (as people have hardware to compare and try attacks on).

Bi-Axial pins

The greatest and most clever ‘lock hack’ I have even seen is a method to bypass some Medeco sidebar locks (on locks with bi-axial pins, filled by the official codebook, manufactured before Q4 2007). Marc Tobias and Tobias Bluzmanis hacked the lock and even wrote a book about it … an all time classic and ‘must read’ if you ask me (and I wrote the foreword). However, the book does not reveal the last twenty percent needed to actually make the so called ‘code setting keys’ that are needed to bump and/or pick open the locks.

I learned some time ago someone did his/her homework and published the findings on the net. A document called ‘code set.zip‘ appeared on a site called ‘mega upload’….

I wonder how long it takes before someone will post a cliq.zip there ….

Macbook died, key copying and transparent lock

September 22nd, 2009

My poor macbook died. I keep backups, so no harm is done, but it sucks to have to work on an old company windows machine for now.

So my posting is going to be a simple one today, using some images I uploaded to blackbag before the crash. One of the things I wanted to share is a couple of pictures taken at HAR from the by now famous ‘transparten lock’. These one, two, three, four images give you a much better idea how nice this lock is than in my original posting. And many people took the opportunity to play with the lock at HAR. If you have large demo locks like this please let me know!

copies made with the quick key system

One other thing mentioning was the round the clock presentations at HAR by my good friend Till. He demonstrated a system to copy mechanical keys called ‘quick key’ (made and designed in Berlin). It uses some sort of two component kind of rubber to make a mould of a key. Till showed that with a little effort almost any mechanical key can be duplicated. He even managed to copy a high security popular French safe lock key.

And to keep in line with my dead macbook … at HAR I have seen the most bizarre picktool case EVER…..

Hope to be back on a Mac sunday for a new update on BlackBag ….

Article in the New York Times

September 16th, 2009

The New York Times visited an Amsterdam Toool gathering last week and wrote a nice article about it (PDF) ….

New York Times on lockpicking

Printing police handcuff keys …

September 14th, 2009

German SSDeV member Ray is known all around the world for his impressive collection of handcuffs and his fun ways of opening most of them. On top of that he gives great presentations and always manages to add a lot of humor into them!

a plastic 3D printed key that will open the handcuffs of the Dutch police

At HAR he pulled another stunt: He used a 3D printer to print handcuff keys. And not just any ordinary handcuff key … no, it’s the official handcuff key from the Dutch police! At first the police officers at HAR were a little reluctant to event try out the plastic key he printed. But he found another way to verify the key he printed was the correct one. I guess these officers never thought about wearing keys concealed, especially when talking with Mr. Handcuff himself. Given the megapixel camera’s on the market today it was not so difficult to verify the key he printed was the correct one.

Someone is looking at your butt ...

At the end of the day he talked the officers into trying the key on their handcuffs and … it did work! At least the Dutch Police now knows there is a plastic key on the market that will open their handcuffs. A plastic key undetectable by metal detectors….

And Ray made it easy for you. For those of you wanting to print your own Dutch police handcuff key … the STL file is available online at http://ke.y.nu/

The New York Times just came out with an article on European lockpickers, quoting a Dutch Police officer who was not too negative about the lockpick scene. Lets hope they still feel this way after this post …

*Warning* Before you print out your keys please check your local law! Reading the article below (pdf mirror) should be a fair warning! In some places it is not quite healthy to run around wearing police handcuffs ….

Homeless man could get 5 years for wearing handcuff keys

Wed, Sep. 09, 2009
BY DAVID OVALLE

For wearing handcuff keys on a necklace draped around his neck, a homeless Miami Beach man could face years in prison.

Prosecutors on Tuesday formally charged Michael Gonzalez, 22, with disorderly intoxication, marijuana possession and two counts of possession of a concealed handcuff key — a third-degree felony punishable by up to five years in prison.

“It’s an actual felony,” prosecutor Barbara Teresa Govea explained to Miami-Dade Circuit Judge John Thornton, who questioned the charge.

“There’s got to be some kind of constitutional violation in there somewhere,” Assistant Public Defender Michelle Prescott grumbled to the court.

Actually, the Florida Legislature passed the law after the 1998 murders of two Tampa deputies and a state trooper. Hank Earl Carr shot and killed them after he escaped his cuffs using a universal handcuff key hidden on a necklace.

Gonzalez was arrested Aug. 16 after Miami Beach police said he was harassing women on the South Beach sand. In a report, Officer Errol Vidal wrote that he found a small amount of marijuana in the man’s pocket and “two handcuff keys concealed under his shirt on a necklace.”

Also under Gonzalez’s shirt: a tattoo on his right shoulder, with the word “anarchy” and shooting flames.

HAR2009 … dress rehearsal for Turkey 2010

September 9th, 2009

A little delay updating blackback as I am quite busy with non-lock related stuff. But looking back at Hacking At Random’ still makes me smile … it was great! The people, the championships, the lockpick village, the presentations, the atmosphere … it all was magic.

now all say 'Open' !!!

And for us it was the ultimate dress rehearsal for the mega-event that is waiting for us at the 2010 ELF/LockCon conference in Turkey. The most important thing about that conference (for us) is that it will host the first official European lockpick championships. And we will be organizing it. Lockpickers from all over the globe could try to win three full paid ticket to that event at HAR.

From the beginning it was unclear if Julian Hardt could make it to Hacking At Random. But the moment he tapped on my shoulder and we greeted each other I said out loud: there go our tickets to Turkey.

Julian Hardt and Barry Wels

And I was right. Julian won the most prestigious ticket to be won: that of the ‘unofficial european lockpick championships‘. And even though it was a hard battle, it was no surprise the winner would (most likely) be from Germany. And for me personally it was no surprise it would be Julian Hardt. I immediately admit that people like ‘Master of the universe’ Dr. Manfred Bölker or Arthur Meister also had a fair chance to win. But Julian is a multi-talent that keeps impressing us with his skills. He was the only one that managed to open the notorious Lips 6 pin in the finals (containing very nasty serrated pins). And on a side note: we just had another safe opening weekend where Julian proofed to be a bad-ass safecracker by picking open a couple of very high security safes (one of them containing a mauer variator B, 11 lever lock). The big surprise at the lockpick championships was to see Peter Fuhrmann from Labor/Bochum getting second! Arthur Meister and Gerhard Heperle became third and fourth.

Julian also became winner of the safe combination manipulation contest. In the qualifiers he opened his lock in 57 minutes … just three minutes before the end. In the finals he managed to dial open the lock in an impressive 21 minutes! But since Julian already won a ticket in the lockpick championships, second place winner Michael Huebler now won the ‘all in ticket’ to Turkey.

As the Germans have a tradition in winning lockpic games, the Dutch seem to have a reputation to protect when it comes to impressioning. Three out of the last four games were won by Toool members and the absolute world record time of 1 minute and 27 seconds is set by Jos Weyers from Toool too. It is interesting to note that both number two (Oliver Diederichsen) and three (Dr. Manfred Bölker) at HAR broke the previous record of 4:23 (by Olivier Diederichsen) by going well under the magical ‘four minute border’.

Still, we are not really clear about the future of these games in the current setup. For example: at the games in Sneek 2008 Oliver used 52 minutes to open a lock that would normally take him (much) less then ten minutes to open. And a few months ago in Hamburg Jos scored 46 minutes on a lock using six blanks … not to mention me not opening the lock at all.

This all makes it feel like some kind of lottery. So maybe we will sit down with some people before Turkey and work on a new style game to rule out this luck/bad luck factor (for example: people playing against each other on the same locks, using knock-out rounds).

There is so much more to say about HAR that I will split the post. The follow up will be about the presentations, the lockpick village and the more interesting things that happened there …

busy

August 31st, 2009

I am currently a little busy. So my HAR post will have to wait a couple of days …. Hope to finish it in the next 48 hours orso …

Let’s keep the discussion about locks and physical security open.

August 25th, 2009

I have been looking forward to the HAR conference for a long time. After all, it was going to be the moment to publicly talk about our discovery on bypassing the electronic locking part on the first generation Mul-T-Lock Cliq. More then one year ago we discovered the samples we had in some instances could be opened with the so called ‘magnetic ring’ (you still needed to have the correct mechanical key or bypass the mechanical part). An important discovery as the attack would not show up in the electronic logfile in the lock. And the integrity of the logfile is a key issue in these kind of systems. So we immediately informed Mul-T-Lock about this problem. And even though communication did not always go smooth we came to an agreement. We agreed to go into full detail about this at the HAR conference in 2009. And that is what we just did. At the presentation we showed the problem was not magnetism … it was vibration!

At the presentation we explained how the blocking of the electronic part of these locks work.

In the meantime Mul-T-Lock came out with a new version and we even received some samples to test. How successful the fix was still has to be determined. And communication is still slow. Marc Tobias and Tobias Bluzmanis claimed at DefCon to be able to still open the latest generation Mul-T-Lock Cliq locks (and a wide range of other electronic and electromechanical locks). They briefed us behind closed doors and I can only say their claims look solid (as was to be expected from these clever and high-profile security experts!).

At the HAR presentation we also demonstrated attacks on electronic locks that make use of the basic Dallas Ibutton key. This key is nothing more then a device that spits out a 64 bit number. If the number is on the list of the lock it will open. I read somewhere 175 million of these keys are in use. We found it is not difficult to duplicate these keys.

What is more interesting is that we found a way to scan for keys on some of these locks. Scanning a 64 bit key can take forever (at approximately one key per second!). However … we discovered sometimes these keys are handed out in batches with numbers following up or in close range of each other. In those cases it might be possible to scan for numbers in a known range.

And our presentation contains some other attack vectors you might enjoy….

To see the entire presentation you need to go to: www.rehash.nl , select ‘HAR2009’ and enter ‘lockpicking’. Unfortunately there is no deeplink to our presentation yet….

Presenting these hacks was nice, but more important to me we also tried to address a more serious topic. That of disclosure and dealing with lock manufacturers.

I like to keep things simple. If we discover a vulnerability in a lock we will notify the manufacturer. We will tell them what we know and most of the time an interesting and technical discussion is started. And sometimes the manufacturer is a little reluctant and barely wants (or dares) to communicate. Especially in the US the stakes can be high for them because of the ‘I will sue you’ culture. So in a way we understand both approaches and are fine with them, as long as it is clear we will go public on the vulnerability at one moment in time. In general we are talking giving them three to six months, although a longer period can be negotiated if that time is needed to update specific projects or customers.

The philosophy behind this is approach is to give the manufacturer some time to fix the problem, inform it’s customers, exchange locks or prepare a press statement. The fact they know a publication is coming should be enough to motivate them to do the right thing. Going public on the vulnerability will send out a clear signal: better make good locks! There are motivated people out there paying attention to what you do and who will write about it if weak spots are discovered.

So far so good ….

What we have seen lately is that lock manufacturers (try to) fix problems but no longer openly want to discuss their fixes. It could be because of this ‘I sue you culture’, but it also creates a lot of ‘security trough obscurity’. And to me that is a sign of weakness. After all, how can we evaluate the ‘new and improved’ product if the manufacturer is reluctant to release information on how they (supposedly?) fixed a problem? The ‘just trust us, we know what we are doing’ approach is not something that gives me a warm fuzzy feeling … at all.

By not saying anything about the fix the researchers are delayed. Or if they have a limited number of locks to test they might even miss an important new feature that is incorporated in some of the new locks. But at the end of the day the information leaks out or is distilled from a greater pool of locks. And since the researchers are highly motivated, the product will fall anyway. Only by it taking a little longer to fall, more locks are sold and more locks are affected when it happens.

Interestingly enough it now seems some security researchers are going the same route as the lock manufacturers. They claim specific locks can be bypassed but refuse to tell the manufacturer how they did it. Only if the manufacturer promises to exchange all the locks in the field (free of charge) they are willing to explain how the technique works. The idea behind this is they are trying to do the end customer a favor. After all, nobody knows how to bypass the customers lock and the manufacturer has to change it free of charge before anyone else hears about it. Logically the lock manufacturer will first try to find the problem itself, but now learns what it feels like to be kept in the dark. Even if they find a vulnerability they can never be sure it is the same one the researchers found. So a fix created does not necessarily means it actually works against the unknown attack…. or if the fix introduces an even bigger problem! And instead of being happy, the end customer is getting nervous. What if someone else finds out about the problem?

There may well be a few extreme cases where putting lots of pressure on some manufacturer is justified because they are really screwing over the public interest. But in general we feel everyone benefits if we try to keep as much information available to as many parties as possible, as quickly as possible. That way, consumers can make informed choices, manufacturers still make their own judgments (and face public scrutiny on them) and manufacturers and enthusiasts can continue to learn from eachother.

Let us try to keep the research area open and transparent and all learn from these discoveries…..

87 seconds …. Jos Weyers!

August 17th, 2009

Newsflash: The LockCon #2 impressioning games were won by Jos Weyers (Toool.nl).
His time: 1 minute and 27 seconds (that is 87 seconds for a five pin lock …).

Some technical background on the lock: Abus 5 pin, non-masterkeyed, type C83, pin depths 3-2-6-7-4.

Now I need some time to relax.
When my internal battery is charged up a little I will try to write a nice post about HAR ….

HAR lockpick village is ready to go …

August 11th, 2009

HAR lockpick village tent all set up for fun, fun, fun

The HAR camp is on schedule. As a matter of fact: they are ahead of schedule. When we arrived this morning the tent was already set up, the only thing we had to do was carry ten big tables and thirty five chairs in. And the tent is much bigger as I expected too! I am sure we are going to have one hell of a time there!

I am real curious how the lockpick championships will go. After all, there is quite something at stake! The games will be played in on solid ground and not in a tent. The risk of rain on a Dutch event just is too big. So for this we rented a nice location (on walking distance from lockpick village). Please visit us at the ‘paasheuvel zaal’ on Saturday from 11:30 till +- 16:00 to see the lockpick championships, or at 23:00 on Saturday evening for the impressioning games. The reason we are doing the impressioning games so late is to give Oliver Diederichsen a fair chance to win a ‘double whammy‘ too. Lets see how that all goes …. I am looking very forward to it all!

Defcon17

August 5th, 2009

Just got back from Vegas and will share some experiences with you….

Lets start with the US lockpick championships:

Jgor ... US lockpick champion

And the winner is … JGOR!

From the fifty participants that attended the US lockpick championships at the Defcon17 conference, JGOR stood out. It was impressive to see his ‘cool’ way of picking. While his opponents were nervously raking and rapidly moving the tools in and out the lock he was just calmly picking. Setting one pin at the time yet opening locks in impressive times (like 17 seconds in the finals on a lock others did not open). To me it is clear the best man won. Second best was Schuyler Towne, third was a draw between Chris Pentacoff and Tokey (from France!).

By winning the US lockpick championships Jgor won a full paid plane ticket to the European lockpick championships in Turkey next year. It will be interesting to see how well he does there.

Deviant and Babak (Toool.US) did a great job organizing the lockpick village and the various lockpick games. One of the things I admire from Babak and Deviant is their eye for detail. Take for instance the locks used in the games. These locks are connected to an electronic timer that stops when the lock is opened!

Fun:

It is always fun in Vegas. Renderman introduced me to one of his friends who had a little problem with some of her locks. I seem to be losing my touch as I was not able to open the simple lock. Maybe it was the jetlag? After hearing the story, my dear wife Charlotte found an appropriate t-shirt for me at the vendor area two days later. Other fun was meeting some famous people in vegas.

The vendor area:

As you can see on the video above, there was lots of activity at the vendor area. There even was a stand selling bumpkeys (using a slightly NSFW booth-babe). Check the youtube video for details (and a good laugh).

Public and private talks:

I only visited one presentation. Obviously it was the one by Mark Tobias and Tobias Bluzmanis. Han and I spoke with them before the presentation and learned about the details of their attacks on some of the electromechanical Cliq locks. Pretty impressive things they have come up with. They did not go publicly into details on how to bypass these expensive ‘top of the line’ high security locks. Han and I know the Cliq system well as we did conduct our own research for a year now too. And we will go into details when we discuss our research at our presentation at HAR next week. Interesting times we live in ….

Dangerous place:

Defcon is a dangerous place. At least for those that are not computer savvy. The famous ‘Wall of sheep’ was showing (parts of) login data of those not using SSL or other types of encryption when popping mail or transferring files etc….

But even when Defcon is a dangerous place … we all made it back safe. Now preparing for HAR! Hope to see you there!