43
EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Embed Size (px)

Citation preview

Page 1: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

EE515/IS523 Think Like an

AdversaryLecture 7

UI and Psychological Failures

Yongdae Kim

Page 2: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Recap http://syssec.kaist.ac.kr/courses/ee515 E-mail policy

Include [ee515] or [is523] in the subject of your e-mail

Class Presentation Assignments are made Always check calendar Text only posting, email!

Preproposal meeting this week Group leader sends me three 30-min time windows between

Wednesday and Friday (evening is OK)

Page 3: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

RecapAccess Control Matrix

ACL, Capabilities, Role-based ACL

User InterfaceToo many warnings…Password Authentication

Text, graphical, hardware token, biometrics, …

Phishing: Psychological failure!

Page 4: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Policy and Usability

Page 5: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim
Page 6: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Cost of Reading Policy Cranor et al.

TR= p x R x n p is the population of all Internet users R is the average time to read one policy n is the average number of unique sites Internet users visit

annually

p = 221 million Americans online (Nielsen, May 2008)

R = avg time to read a policy = # words in policy / reading rate To estimate words per policy:

Measured the policy length of the 75 most visited websites Reflects policies people are most likely to visit

Reading rate = 250 WPM Mid estimate: 2,514 words / 250 WPM = 10 minutes

Page 7: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

n = number of unique sites per yearNielsen estimates Americans visit 185 unique

sites in a month:but that doesn’t quite scale x12, so 1462 unique

sites per year.

TR= p x R x n

= 221 million x 10 minutes x 1462 sitesR x n = 244 hours per year per person

Page 8: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

P3P: Platform for Privacy Preferences

A framework for automated privacy discussionsWeb sites disclose their privacy practices in

standard machine-readable formatsWeb browsers automatically retrieve P3P privacy

policies and compare them to users’ privacy preferences

Sites and browsers can then negotiate about privacy terms

Page 9: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim
Page 10: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim
Page 11: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Why Johnny Can’t Encrypt

- A Usability Evaluation of PGP 5.0-

Alma Whitten and J.D. TygarUsenix Sec’99

Presented by Yongdae Kim

Some of the Slides borrowed from Jeremy Hyland

Page 12: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Defining Usable Security Software

Security software is usable if the people who are expected to use it:are reliably made aware of the security tasks they

need to perform.are able to figure out how to successfully perform

those tasks don't make dangerous errorsare sufficiently comfortable with the interface to

continue using it.

Page 13: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Why is usable security hard?

1. The unmotivated users“Security is usually a secondary goal”

2. Policy AbstractionProgrammers understand the representation but

normal users have no background knowledge.

3. The lack of feedbackWe can’t predict every situation.

4. The proverbial “barn door”Need to focus on error prevention.

5. The weakest linkAttacker only needs to find one vulnerability

Page 14: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Why Johnny can’t encrypt?PGP 5.0

Pretty Good PrivacySoftware for encrypting and signing dataPlug-in provides “easy” use with email clientsModern GUI, well designed by most standards

Usability Evaluation following their definitionIf an average user of email feels the need for privacy and authentication, and acquires PGP with that purpose in mind, will PGP's current design allow that person to realize what needs to be done, figure out how to do it, and avoid dangerous errors, without becoming so frustrated that he or she decides to give up on using PGP after all?

Page 15: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Usability Evaluation Methods

Cognitive walk throughMentally step through the software as if we were a

new user. Attempt to identify the usability pitfalls.Focus on interface learnablity.

Results

Page 16: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Cognitive Walk Through Results

Irreversible actions Need to prevent costly errors

Consistency Status message: “Encoding”?!?

Too much information More unneeded confusion Show the basic information, make more advanced

information available only when needed.

Page 17: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

User TestUser Test

PGP 5.0 with Eudora12 participants all with at least some college and

none with advanced knowledge of encryptionParticipants were given a scenario with tasks to

complete within 90 minTasks built on each otherParticipants could ask some questions through

email

Page 18: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

User Test Results 3 users accidentally sent the message in clear text

7 users used their public key to encrypt and only 2 of the 7 figured out how to correct the problem

Only 2 users were able to decrypt without problems

Only 1 user figured out how to deal with RSA keys correctly.

A total of 3 users were able to successfully complete the basic process of sending and receiving encrypted emails.

One user was not able to encrypt at all

Page 19: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Conclusion Reminder

If an average user of email feels the need for privacy and authentication, and acquires PGP with that purpose in mind, will PGP's current design allow that person to realize what needs to be done, figure out how to do it, and avoid dangerous errors, without becoming so frustrated that he or she decides to give up on using PGP after all?

Is this a failure in the design of the PGP 5.0 interface or is it a function of the problem of traditional usable design vs. design for usable secure systems?

What other issues? What kind of similar security issues? What do we learn from this paper?

Page 20: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Why (Special Agent)Johnny (Still) Can’t

Encrypt:A Security Analysis of the APCO

Project 25 Two-Way Radio System

S. Clark, T. Goodspeed, P. Metzger, Z. Wasserman, K. Xu, M. Blaze

Usenix Sec’11Presented by Yongdae Kim

Slides borrowed from Matt Blaze

Page 21: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

APCO Project 25 (“P25”) Standard (in the US and elsewhere) for digital two-

way radio (voice and low-speed text)Widely fielded by government: local police & fire dept,

federal law enforcement & security services, DoDStandard under ongoing development since early 90’s.P25 products increasingly available since early 2000’s.

Drop-in replacement for analog FM systemsUser narrow band channels, limited infrastructureCan use simplex, repeaters, or trunked infrastructure

Cryptographic security optionsContent confidentiality (encryption)

Page 22: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

P25 EquipmentWide range of COTS

subscriber radios availableMobile, portable, base and

infrastructure

Several US vendorsMotorola dominates in federal

law enforcement sector

Equipment features and user interfaces (somewhat) standardized across vendors.

Page 23: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

P25: Deployed Examples

Page 24: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

The P25 Voice ProtocolNarrow-band radio channel (12.5 Khz)

Co-exists with analog FM9,600 bps (4,800 2bit symbols/sec)

IMBE vocoderReasonable speech qualityTrain of 1,728 bit voice frames that encode 180ms

of audio

“Broadcast” modelAll transmissions “one-way”, no ACKs or sessionsError correction codes

Header Data UnitHeader

Data UnitLogical Link Data Unit 1Logical Link Data Unit 1

Logical Link Data Unit 2Logical Link Data Unit 2

Logical Link Data Unit 1Logical Link Data Unit 1

Logical Link Data Unit 2Logical Link Data Unit 2

Terminator Data Unit

Terminator Data Unit

Page 25: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

P25 Optional Security Features

Symmetric key encryption Unclassified: AES, DES, … Classified: various Type I

Traffic keys must be loaded into radios in advance Via keyloader device or over-

the-air rekeying Keys can expire, self destruct

No “sessions” Sender radio selects crypto

mode & key Up to receiver to decrypt

Received cleartext always demodulated & played

Received ciphertext decrypted & played if correct key available

No authentication

Sender’s radio makes all security decisions Radios can be configured

for always clear, always encrypted, or user selected

User-selected is standard configuration

Page 26: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

HighlightsApparently ad hoc design

No formal (or informal) security requirements specified in P25 standard

But traffic encryption itself isn’t obviously broken

But does suffer significant protocol weaknessNo authenticationSusceptible to (active and passive) traffic analysis

Radio unit IDs sent in clear even when encryption enabled

Vulnerable to very efficient Denial of Service 13 dB energy advantage to attacker

Serious crypto-usability weakness

Page 27: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Passive and Active Traffic Analysis

Subscriber radio’s unit ID, TalkGroup ID, NAC sent with every transmission24 bit unit ID is typically unique to each radioEffectively identifies individual radio + agency it

belongs to

Standard supports encryption of Unit IDBut they found UID always in clear, if crypto

enabled

Radios typically automatically respond to pingsActive adversary can easily discover idle radiosTransparent to pinged radio

Page 28: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

ScenarioPing response is sufficient to allow

automated direction findings of targeted radiosRequires two bases at fixed location with phased

directional antenna

Adversary can thus create a real0time map of selected radios, even when they are “idle”

Significant potential threat in military environment

Page 29: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Denial of Service (in theory)

P25 uses aggressive error correction codes But individual subfields of transmission are error-corrected

separately

Adversary can select a single subfield to jam within frame Pattern at start of transmission makes synchronization easy

Voice frame is 1,728 bits, including critical 64bits NID subfield that IDs frame type Jamming 64 bits renders entire 1,728 bit frame useless 32 symbols of jamming per 864 symbols

Jammer needs 14dB less energy than the transmitter Compare: Analog FM requires (about) equal energy to jam Jamming digital spread spectrum requires much more

energy

Page 30: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Denial of Service (in practice)

How hard is to build a P25 subfield jammer?TI CC1110 is a single-chip digital radio

transceiver chipSupports native protocol very similar to P25Sufficiently close to recognize start of P25

frames…

User in GirlTech IMME toy instant messenger ($15)So they developed their own P25 jammer

firmware…Their first jammer

Page 31: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Scenario: Selective Jamming

Need not to jam every P25 transmissionJammer is low duty cycle

Spends most time in receiving modeCan be programmed to recognize certain types of

transmissions and interfere only with them

Easy to configure a jammer that recognizes and disables only encrypted P25 signalsForce users to switch to clear in order for

communication to work

Page 32: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Potential Usability Problems

Poor feedback about crypto stateTransmit crypto is controlled by an obscurely

marked toggle switchSwitch’s state has no effect on received audio

Clear always accepted in encrypted mode Encrypted accepted in clear mode (if keyed)

Frequent rekeying + unreliable rekeyingMany agencies use short-lived keysBut, re-keying is difficult and unreliable

Page 33: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Poor Crypto Feedback Remember “Why Johnny can’t encrypt?” Radios are typically configured to control outbound

crypto with a two-position switch Often obscurely marked, out of view

Little feedback to user about crypto state other than the switch itself “Encrypted” icon on display Configurable “clear” beep warning

But the same beep used to indicate other things.

Little chance for other users to notice or help Received cleartext always accepted, even when their own

switch is in the “secure” position

Page 34: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Motorola XTS5000: Clear Mode

Page 35: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Motorola XTS5000: Secure Mode

Page 36: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

No Ad Hoc Field Keying If even a single user lacks

current keys, there is usually nothing a team can doKey cannot be created or

entered by hand into radioKeyloader hardware is not

typically available in the field.

OTAR frequently fails in practice

Often only practical option is for an entire operation to go to clear

Page 37: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

P25 COMSEC in practiceThe P25 traffic analysis and DoS attacks they

found are potentially serious, but require some expertise and resources on part of adversaryCurrent off-the-shelf equipment can’t easily

implement most of the protocol-level attacks we found without modification Inexpensive software-defined radio will soon change this,

however

Not much can be done to mitigate these vulnerabilities without changing P25 protocols in any case

More serious are usability weaknesses that can be easily exploited by anyone, today:A significant volume of law-enforcement-sensitive cleartext

regularly goes over the air, without users unaware.A significant volume of law-enforcement-sensitive cleartext

regularly goes over the air, without users unaware.

Page 38: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Unintended Sensitive P25 Cleartext

They accidently misconfigured a P25 radio in their lab, and were surprised to hear chatter from a federal tactical surveillance operation This turned out not to have been a fluke event

They subsequently collected statistics about unintended over-the-air sensitive cleartext in several metropolitan areas Focused on confidential tactical law-enforcement traffic

Omitted local agencies, non-covert operations (e.g. interop networks, uninformed FPS patrols), etc.

No encrypted traffic captured Used only readily-available, unmodified consumer-grade

equipment Live monitored samples of traffic, recorded traffic statistics.

Page 39: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Intercepting the Federal Spectrum

2000 discrete VHF and UHF voice channels allocated to Federal government 24 MHz of spectrum 12.5 KHz channels Law enforcement mixed in

among less sensitive users Some agency channels are

widely known, others not.

Easy to identify the channels used locally for covert tactical LE activities They are the ones with

encrypted traffic on them.

Many P25 receivers on market

Icom R-2500 Aimed at hobby “scanner”

market, includes P25 options

Legally available to anyone

Page 40: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Results Searched the Federal VHF and UHF spectrum for the

frequencies used for sensitive tactical networks Likely candidate frequencies easy to identify: they carry

mostly encrypted traffic

Configured a small network of R-2500 receivers in several metropolitan areas with software to systemically scan these networks and log incidence of cleartext Periodically “live monitored” samples of cleartext audio Did not retain identifiable information about agencies or

targets

In each metropolitan area: Most tactical traffic was apparently successfully encrypted But still > 20 min (mean) sensitive cleartext per city per day

High variance; lower volume on weekends and holidays

Page 41: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

How Sensitive is Sensitive?

The P25 unintended cleartext they live-sampled included some of the most sensitive investigative data Names and/or identifying features of targets and confidential

informants, their locations, description of undercover agents Information relayed by Title III wiretap plants Plans for forthcoming takedowns and operations Wide range of crimes, some involving targets that appeared

to employ reasonably sophisticated countermeasures Sensitive cleartext captured from virtually every DoJ & DHS

LE agency

Mostly law enforcement / criminal, but we were not looking for military or intelligence traffic.

Page 42: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

What is going wrong?Three categories of unintended cleartext:

Single user error: one user transmitting in clear, but communicating with an encrypted team

Group error: everyone in clear, indicated they were encrypted, no one noticed they weren’t

Keying failure: one member of group did not have key, so everyone went to clear

Cleartext they sampled was roughly evenly split between single/group error and keying failure.

Page 43: EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Observations P25 tactical radio crypto capability is now widely

deployed by federal law enforcement Yet, Federal P25 networks still carry quite a bit of

easily intercepted LE sensitive cleartext Two dominant causes, each requiring different

mitigating approaches Accidental cleartext (about half the time) Keying failure (about half the time)

Mitigations P25 protocols and products require a top-to-bottom redesign

for security Should not be considered reliable secure, until then. Authors suggested some short term solution.