Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
From: Thomas Roessler (roesslerDOES-NOT-EXIST.ORG)
Date: Tue Apr 10 2001 - 13:05:33 CDT

  • Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]

    Executive summary: If you have ever used Strip for the Palm to
    generate your passwords, change them. Change them NOW.

    Strip (Secure Tool for Recalling Important Passwords) is a nice
    encrypted password notebook for the Palm; see
    <http://www.zetetic.net/products.html> for details.

    Strip-0.5 also features a function for generating passwords, which
    certainly has some appeal to anyone who generates passwords

    However, this function has some flaws, one of which has the effect
    to limit the number of different passwords strip can create to 2^16
    per class (alphanumeric, alphabetic, numeric, ... with N

    Generating this number of passwords and trying each of them with
    crypt(3) is a matter of less than 3 seconds on a current PC running

    The attached program can be used to demonstrate this in the case of
    alphanumeric passwords containing 8 characters. Just take your
    encrypted, strip-generated password from /etc/shadow, and pass it as
    the single command line argument. (Covering the other classes of
    passwords strip can generate is left as an exercise.)

    The Flaws

    - Strip uses the PalmOS SysRandom() function to generate the
      passwords. SysRandom() is a very simplistic linear PRNG, which
      should most likely not be used for password generation.

    - Strip tries to seed this PRNG with the result of TimGetTicks().
      TimGetTicks() returns the number of ticks (1 Tick = 10ms on
      current devices) since the last reset of your Palm. The ticks
      counter is not incremented when the device is turned off.

      Obviously, small values for the TimGetTicks() result are much more
      likely than large values, so an attacker could just start at 0 and
      try any possible ticks value. This kind of attack would already
      be quite successfull and efficient - at least against any
      passwords generated during the first couple of months of regular
      use of a PalmOS device after a reboot.

    - The actual implementation has a bug which finally limits the
      search space to trivial dimensions: TimeGetTicks() returns a 32
      bit integer value, and the PRNG expects such a value as its seed.
      However, the return value from TimeGetTicks() is stored in a 16
      bit Int variable.

      Thus, the numbers 0, ..., 0xffff are the only seeds which will
      ever be used, limiting the number of possible passwords of any
      class to 2^16.


    Thanks to Ian Goldberg for posting his (correct) take at the
    SysRandom() function to coderpunks, and to Marc Haber for telling me
    about Strip.


    Thomas Roessler			    <roesslerdoes-not-exist.org>

    -----BEGIN PGP SIGNATURE----- Version: 2.6.3in

    iQEVAwUBOtNLbdImKUTOasbBAQF66Af/SmMkCcmDpa5TsFIcsNLnAHCUFfiLzTH8 VBgd/sGcI9byqb/+cbXT9pO9o2rC0Ek+pozfTKisQV2IxFV3A+/nk/ROwcpTXTMm PPqwf2NQn753tdB8GEV8G7kzI1NDAdm79X73xUuwp7NBosS18jiwUV/7HRyAXvws nDs3QCfeAFid7ou5tfG4blv9VgrDjtn/ecJBRU1MIjdDEezKkLqmSg2qXRQdFZN8 pF+hkJLCo+WRyolmushRTFGJ/pVXG4zh2zhpHnOt/oS0Gf2zIYw1DTGALDBR9fZP PwHUsS2NTdCB9LGsNjnhnZeSDXR3xUU/q0pGPKWDGl3Vx5saWn40LA== =3lNS -----END PGP SIGNATURE-----