Archive for the ‘Security’ Category

h1

Oracle is acting rationally.

March 23, 2010

In the last post, I described what Oracle was doing and has done in relation to support customers accessing documentation for products they don’t license.  I stand by my assertion that enforcing access control in this situation is fairly trivial.  However, for Oracle, spending anything on securing access is a waste of time and money.  Here are two reasons why:

  1. Oracle suffers no harm if an actual customer reads support documentation for other products.  They cannot stop Rimini Street from accessing these materials even with strong access control…the consultants will just have to spend slightly more effort to keep up-to-date on the documentation one product at a time rather than en masse.
  2. Oracle has a business driver to eliminate the competition that Rimini Street presents.  They are going to dedicate resources to achieve this through the courts and through their business practices regardless of what ends up being their trigger event.

In my searching, I’ve not found any cases where Oracle has actually sued an end-user customer for exceeding their authorization.  I suspect that if there was never a Rimini Street or a TomorrowNow, this access control issue would not see the light of day.  Given their stance on third parties providing support for Oracle products, they’ve already allocated the money and effort to fight the competition — spending money on securing the support docs is pointless.

h1

Access control in real life.

March 12, 2010

Rimini Street offers third-party support for Siebel, PeopleSoft, SAP, and JD Edwards software.

Oracle is suing them because they claim that Rimini is gaining access to support materials surreptitiously through Rimini clients’ online support credentials.  They sued SAP’s subsidiary TomorrowNow for the same thing in 2007.  In both cases Oracle uses the same language — that the target of the suit is involved in “[c]orporate theft on a grand scale”.

Here’s the meat from page 3 of the Rimini Street Complaint (Case 2:10-cv-106, US District Court Nevada):

Rimini Street typically logs on to Oracle’s password protected Technical Support websites using a customer credential, then downloads Software and Support Materials in excess of the customer’s authorization under its license agreement.  Sometimes Rimini Street will download hundreds or even thousands of Software and Support Materials at a time, relating to entire families of software (e.g., PeopleSoft, JDE, or Siebel) that the customer does not license and for which it has no use.

The same claim was made against SAP (March, 2007) in a San Francisco district court:

Instead, SAP employees using the log-in credentials of Oracle customers with expired or soon-to-expire support rights had, in a matter of a few days or less, accessed and copied thousands of individual Software and Support Materials.  For a significant number of these mass downloads, the users lacked any contractual right even to access, let alone copy, the Software and Support Materials.  The downloads spanned every library in the Customer Connection support website.

Rimini and TomorrowNow were using their customer’s access to download support materials from Oracle.  This is a common practice across the IT industry when consultants or contractors are supporting technology on behalf of a customer who purchased the technology.  Rimini, in the complaint, appears to have leveraged that access to download everything that the customer’s ID can touch — and customer support IDs could touch everything.  In both cases, Oracle’s complaint hinges on the claim that the agent for the customer violated authorization that has no corresponding technological control in place.  The suit against SAP/TomorrowNow was settled, and TomorrowNow no longer exists.  Given Oracle’s previous victory, a similar end is possible for Rimini.

Oracle is either trying to solve an access control deficiency through litigation, or are leaving their access control open to enable litigation.  They are clearly placing the burden of determining what a customer is licensed to download on the customer themselves.

A competent sysadmin for their support site could at the very least lock down access to materials by product in a matter of weeks, even in a dysfunctional bureaucratic environment.  The fact that they are leaving a known access control deficiency open for over three years does not imply good faith in protecting support materials on the part of Oracle.

This raises an interesting question.  Should you use strong technological controls to enforce contractual authorization, making violations a criminal matter, or should you employ lax controls and pursue violations through civil litigation?

h1

Proximity Card Answers

February 26, 2010

What’s a “static proximity card”?

Proximity cards used in physical security applications generally work on low frequencies, and are energized by ‘proximity’ to a reader.  Upon being activated, a static proximity card will respond by modulating the signal to send out a sequence of bits.  Static cards have no handshake, no ‘smarts’, and will always spit out the same sequence of bits to anything that manages to energize them.  They are a single-purpose ID code transmitter.

What’s wrong with static cards?

Static cards will broadcast their ID anytime they are activated.  They cannot determine if the signal activating them is from a legitimate reader or not.  Conversely, static card readers cannot verify that the ID code they recive is from a legitimate card.  The ID code, once intercepted, can be used in place of the card to gain surreptitious access for the entire lifetime of the original card in the security system.  In addition to stealing ID codes from cards, an attacker can attempt to guess codes by using the readers in the system.  While static protocols claim between 44 and 128 bits for the ID codes, the differences between cards enrolled in the same security system can be as low as 16 bits.

Why pick on HID?

It’s not personal.  HID http://www.hidglobal.com is the single most common vendor of proximity card physical security systems I’ve come across.  There’s an industry of other manufacurers that make equipment compatible with the static “Prox” and “Prox II” protocols that HID created.

h1

Why Static Proximity Cards Are Dangerous

February 26, 2010

I’m setting up another HID Prox security demonstration.  I’ve cleaned up my equipment so it doesn’t look quite so hacked-together.  I’m working on some long-range antennas and the code to safely support them.  Once it is all working, I hope to be able to…

  • Sniff cards being read across the room by a legitimate reader
  • Flash a room and read card responses
  • Brute-force desired bits on a proximity card

Already I can read a card to capture its number at short-range with a variety of readers.  With the card’s number, I can easily retransmit to a reader.  Basically, the existing system I’ve assembled lets me read your card and use it later at my leisure.