[Interest] TLS/SSL XML encryption security

Henry Skoglund henry at tungware.se
Mon Oct 7 16:51:22 CEST 2019


Yes, I also know about the lizardmen from Phobos who can crack SSL/TLS 
keys instantly.
If you can show some code all this would be much more credible. After 
all, this is a Qt mailing list, not a science fiction one.

Rgrds Henry


On 2019-10-07 16:06, Roland Hughes wrote:
>
> On 10/7/19 5:00 AM, Thiago Macieira wrote:
>> You do realise that's not how modern encryption works, right? You do 
>> realise
>> that SSL/TLS rekeys periodically to avoid even a compromised key from 
>> going
>> further? That's what the "data limit for all ciphersuits" means: 
>> rekey after a
>> while.
> yeah.
>> You're apparently willfully ignoring the fact that the same cleartext 
>> will not
>> result in the same ciphertext when repeated in the transmission, even 
>> between
>> two rekey events.
>
> No. We are working from two completely different premises. It appears 
> to me your premise is they have to be able to decrypt 100% of the 
> packets 100% of the time. That's not the premise here.
>
> The premise here is they don't need it all to work today. They just 
> need to know that a Merchant account service receives XML/JSON and 
> responds in kind. The transaction is the same for a phone app, Web 
> site, even when you are standing at that mom & pop retailer physically 
> using your card. They (whoever they are) sniff packets to/from the IP 
> addresses of the service logging them to disk drives.
>
> The dispatch service hands 100-1000 key combinations out at a time to 
> worker computers generating fingerprints for the database. These 
> computers could be a botnet, leased from a hosting service or machines 
> they own. The receiver service stores the key results in the database.
>
> A credit card processing service of sufficient size will go through a 
> massive number of salts and keys, especially with the approaching 
> Holiday shopping season. 1280 bytes "should" be more than enough to 
> contain a credit card authorization request so this scenario is only 
> interested in fast cracking a single packet. Yes, the CC number and 
> some other information may well have additional obfuscation but that 
> will also be a mechanical process.
>
> Periodically a batch job wakes up and runs the sniffed packets against 
> the database looking for matching fingerprints. When it fast cracks 
> one it moves it to a different drive/raid array, storage area for the 
> next step. This process goes in steps until they have full CC 
> information with a transaction approval, weeding out the declined cards.
>
> When the sniffed packet storage falls below some threshold the sniffer 
> portion is reactivated to retrieve more packets.
>
> This entire time workers are adding more and more entries to the 
> fingerprint database.
>
> These people don't need them all. They are patient. This process is 
> automated. They might even configure it to send an email when another 
> 100 or 1000 valid CCs so they can either sell them on the Dark Web or 
> send them through the "buying agent" network.
>
> Yeah, "buying agent" network might need a bit of explanation. Some of 
> you may have seen those "work from home" scams where they want a 
> "shipping consolidation" person to receive items and repackage them 
> into bulk packs for overseas (or wherever) shipping. They want a fall 
> person to receive the higher end merchandise which they then bulk ship 
> to someone who will sell it on eBay/Amazon/etc.
>
> The CC companies constantly scan for "unusual activity" and call you 
> when your card has been compromised. This works when the individuals 
> are working with limited information. They have the CC information, 
> but they don't have the "where you shop" information. The ones which 
> have the information about where you routinely use the card can have a 
> better informed "buying agent" network and slow bleed the card without 
> tripping the fraud alert systems. If you routinely use said card at 
> say, Walmart, 2-3 times per week for purchases of $100-$500 they can 
> make one more purchase per week in that price range until you are 
> maxed out or start matching up charges with receipts.
>
> The people I get asked to think about are playing a long game. They 
> aren't looking to send a crew to Chicago to take out $100 cash 
> advances on a million cards bought on the Dark Web or do something 
> like this crew did:
>
> https://www.mcall.com/news/watchdog/mc-counterfeit-credit-cards-identity-theft-watchdog-20160625-column.html 
>
>
> Or the guy who just got 8 years for running such a ring in Las Vegas. 
> That's the most recent one turning up in a quick search.
>
> Maybe they are looking to do just that, but are looking for more 
> information?
>
> At any rate, the "no-breach" scenario is being seriously looked at. 
> Yes, the Salt will change with every packet and the key might well 
> change with every packet but these players are only looking to crack a 
> subset of packets. Most organizations won't have the infrastructure to 
> utilize a billion compromised credit cards. They can handle a few 
> hundred to a few thousand per month.
>
> In short, they don't need _everything_. They just need enough to get 
> that much
>
>> And don't forget the Initialisation Vector. Even if you could compute 
>> the
>> fingerprint database, you still need to multiply it by 2^128  to 
>> account for
>> all possible IVs.
>
> Perhaps. A few of those won't be used, such as low-values and 
> high-values. That also assumes none of the desalination chatter pans 
> out. Maybe it does and maybe it doesn't. One thing is certain. We now 
> have the storage and computing power available to create the database 
> or 2^128 database tables if needed.
>
> The people I get asked to think about are playing a very long game. If 
> they are using a botnet the machines to generate the database content 
> cost them nothing. They are only on the hook for a bit of coding and 
> what is becoming cheaper by the month storage.
>
> https://venturebeat.com/2014/07/13/hackers-only-need-to-get-it-right-once-we-need-to-get-it-right-every-time/ 
>
>
>
>



More information about the Interest mailing list