[Full-Disclosure] unix entropy source can be used for keystroke timing attacks

From: Michal Zalewski (lcamtufat_private)
Date: Thu Aug 14 2003 - 16:03:49 PDT

  • Next message: KF: "Re: [Full-Disclosure] Re: Buffer overflow prevention"

    Another bizarre vulnerability, for your amusement...
    
    Several unix systems systems provide a secure entropy source maintained by
    collecting certain information that is supposed to be practically
    unpredictable (such as interrupt timings, keyboard scancodes or device
    request times), then running it thru one-way hashing function (SHA1 or
    MD5).
    
    A device called /dev/random estimates the amount of entropy available in
    the entropy pool, and blocks on read when the pool gets empty. This
    continues until the buffer is seeded with some new data due to one of the
    events mentioned.
    
    By emptying the /dev/random, and then timing the moments when data becomes
    available, we can precisely determine, at what intervals those events
    occur. While we can't determine what data is being added to the entropy
    pool, we can rather easily tell a situation when a keystroke data is added
    due to a specific pattern triggered by it. For example, on Linux the
    sequence is:
    
      Keypress scancode in: one to two bytes available
      50-150 ms delay (keypress duration)
      Key release scancode in: one to two bytes available
      50 ms or more delay
    
    Other types of events, such as disk activity, usually generate a burst of
    events, usually under 1 ms away from each other, or have other distinct
    patterns (besides, those events happen only sporadically).
    
    Because of this, it is possible to measure keypress AND key release
    timings _very precisely_, for any console user of a machine we have an
    unprivileged account on. Timings between keystrokes depend on the distance
    between subsequently pressed keys for each hand, and the placement of the
    hand, keystroke durations usually depend on the finger used - all this
    making it quite easy to come up with a nice subset of possible passwords,
    and not impossible to determine some of the commands typed.
    
    There is some mature research in the field of recovering typed information
    or its certain properties from the timing information (both for the
    purpose of biometrics and surveillance), so I don't think to get too far
    into this. I can just provide an example of the difference in average
    keystroke timings for two related words typed by a keyboard-proficient
    user:
    
      1) "evil"
    
            e press      |
            e release    | =========
            v press      | ===============
            i press      | ====
            v release    | ==
            i release    | ====
            l press      | =======
            l release    | ============
    
            Note out of sync 'v' release after hand switch.
    
      2) "good"
    
            g press      |
            g release    | ========
            o press      | ====
            o release    | =====
            o press      | =======
            d press      | =========
            o release    | =======
            d release    | ==============
    
            Same for second 'o'.
    
    A workaround would be to add some latency before unblocking pending
    read()s when a new information becomes available. /dev/random is a very
    high latency device, and no program depends on how fast the data is
    available for its normal operation.
    
    -- 
    ------------------------- bash$ :(){ :|:&};: --
     Michal Zalewski * [http://lcamtuf.coredump.cx]
        Did you know that clones never use mirrors?
    --------------------------- 2003-08-15 01:01 --
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Thu Aug 14 2003 - 17:14:31 PDT