Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] A Little OT: The Password Post-It



Richard Pieri wrote:
> Tom Metro wrote:
>> Strictly an automatic screen lock/unlock. But nice. A step in the right
>> direction.
> 
> Until someone steals your phone....

All security measures have a finite space of effectiveness. What are the
attack vectors you are trying to guard against?

Remember that the phone only serves as the 2nd of a two-factor
authentication. So the window of opportunity (unless the attacker also
plans to crack your password) is limited to an hour or two after you
walked away from your computer.

Sure, someone can steal your phone, but will they know it can unlock
your computer if they get into your office before you get back from
lunch? A co-worker would, but are they who you are guarding against?


> Regarding the Bluetooth proximity unlock, there is a way to exploit
> such a system without the victim ever being without his fob. ...use a
> pair of transceivers to extend the RFID range.
> 
> It's a simple exploit.

Clever, and simple in concept, but not simple to pull off.

So lets see, an attacker sneaks into your office, surreptitiously places
a Bluetooth transceiver just outside the conference room where you are
having a meeting, and then gets back to your cube unnoticed where he
paces the 2nd transceiver and unlocks your computer? Or maybe he breaks
into your office just after you left work for the evening, while his
partner "war drives" for your phone outside your house?

Sure, doable, but until you can pick up a pair of turn-key Bluetooth
extender transceivers mail order from China, not likely. If you're
protecting something valuable enough to justify that effort, you don't
want to be relying on Bluetooth proximity.

In any case, with a smartphone you could easily mitigate this exploit
with "geofencing." The PKI app on the phone wouldn't even respond to an
unlock request if the phone wasn't in the right geographic area (based
on GPS) for the requesting computer.

Even the basic Bluetooth proximity mechanism is a worthy upgrade
compared to using only passwords that are stuck to the monitor on a
post-it note.


> Car thieves have been using it for several years...

Really? There's evidence this has been pulled off more than once? How do
they get the transceiver near the owner without being noticed? Who is
building the transceivers?

 -Tom

-- 
Tom Metro
Venture Logic, Newton, MA, USA
"Enterprise solutions through open source."
Professional Profile: http://tmetro.venturelogic.com/



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org