SearchSecurity.com: Figuring out FIDO

Depending on your perspective, either a lot or very little has happened in the past year with the Fast Identity Online (FIDO) security alliance. In the former category are lots of signatories to its protocols and standards, adding new members from the Bank of America, RSA, Netflix, Mastercard and a 100 other supporters. Most notable is that Samsung’s major new smartphone, the Galaxy S5, will contain a fingerprint sensor that makes use of the FIDO protocols. Samsung and PayPal also announced a partnership where you will be able to use the phone to authenticate to your PayPal account via your fingerprint. It doesn’t hurt that the president of the FIDO alliance works at PayPal, either. (Here is an interview SearchSecurity did with him last year that is worth reviewing.)

But all of this action is somewhat frustrating, because as of this moment, there aren’t any actual FIDO-ready products that are for sale and no commercial FIDO users. Even Nok Nok Labs’ CEO Phillip Dunkelberger and one of the founding FIDO members has admitted, “There’s nothing on the end user side yet.”

 

Still, there is a lot of testing going on, a lot of demonstration projects, and a lot of promises (even the S5 won’t be available until mid April at the earliest and not everywhere even then). And the actual draft standards specs weren’t made public until this past February, almost a year after all the initial hoopla over the alliance began. But at least they are available now.

 

“FIDO promises to clean up the strong authentication marketplace, making it easier for one fob fits all solutions. The FIDO method is more secure than current methods because no password of identifying information is sent out; instead, it is processed by software on the end user’s device that calculates cryptographic strings to be sent to a login server,” as was mentioned in ComputerWeekly last year.

 

That’s a big advantage. In the past, multiple factor authentication methods were based on either a hardware fob or some kind of tokenless solution that made use of custom software, proprietary programming interfaces, and lots of work to integrate the method into your existing on-premises and Web-based applications. (Here is a link to a review that I did last year for Network World with 8 different methods.) FIDO will change that significantly.

 

If it is widely adopted, FIDO will divorce these second factor methods from the actual apps that will depend on them. That means the same authentication device can be used in multiple different ways for signing into a variety of providers, without each provider being aware of the others and without the need for extensive programming for the stronger authentication. This could banish the need for users to cart around different second factor tokens and other authentication methods.

“FIDO also makes it easier to do the authentication integration piece and not have to rewrite the client software over and over again,” says Mike Goldgof, the VP of Marketing at Agnito. “This gives us a huge population of users to draw on,” he said. Without FIDO, Agnito would have to continue to develop different SDKs for each target audience and application, or work closely with individual app developers.

“That seems like a no-brainer and a big win,” says Joseph Sikes, a security engineer with a cable communications company who has looked at the specs. “Integrating this type of built-in technology with digital wallets and ecommerce can not only help protect consumers, but reduce the risk, liability and fraud for financial institutions and digital marketplaces.”

 

The big leap that FIDO is taking is to use something, say a biometric feature such as your voiceprint, your fingerprint, facial recognition or some other combination of things that are unique to you, and digitize and protect that information with solid cryptographic features. But unlike the traditional second factor authentication key fobs or even the tokenless phone call-back solutions, this information remains on your smartphone or laptop and isn’t shared with any application provider. FIDO can even use a simple four-digit PIN code, and everything will remain on the originating device. “It will be cryptographically secure and we don’t transmit this information or store it on some central database,” said Jamie Cowper, a senior director at Nok Nok Labs. This avoids the potential for Target POS exploits that release millions of logins to the world, a big selling point for many IT shops and providers.

 

The other big advantage to FIDO is that it is designed to work from the get-go both for online applications, such as eCommerce and SaaS-based sites, and for traditional local database servers and other on-premises authentication situations. For those two factor solutions that grew up in the offline era that is another selling point. “The FIDO group has done their homework and it is put together solidly,” says Dennis King, a St. Louis-based security integrator with Working Security. “A lot of people were nervous after Snowden and the fact that FIDO doesn’t shove your biometric data into the cloud, but keeps it private and local is useful, especially if you can employ common standards and hide the complexity of the cryptographic key exchange,” he said.  “FIDO will also improve security for the developer,” says Kapil Raina, the director of product marketing for Zscaler. “The abstraction of the actual protocol implementation will cut down on development time and errors.”

 

But some people, like Tony Maro, aren’t waiting around for FIDO to be finished. The CEO of Evrichart.com, a healthcare IT-related VAR in White Sulphur Springs, WV said, “We are currently developing two factor tools using a time-based algorithm for one of our applications and will probably ignore FIDO specs for the next couple of years at least.  That algorithm is the same one that Google, Dropbox, and even my own website host has chosen.  It also eliminates carrying a separate dongle as just about everyone has a mobile phone these days and can run the Google Authenticator or other apps. This is a mobile world we live in, and we need mobile compatible solutions, otherwise you’re behind the curve right out of the gate.”

 

FIDO doesn’t solve all of our authentication problems, of course. If you need to know who the actual person is behind the finger or voice, you will want to look elsewhere. “When you are enrolling a new user, you want to be very sure that that you have verified them and are enrolling the right person,” says Cowper. Others, such as MiiCard.com, are working on solving this problem with their own identity system.

 

But if you are interested in FIDO, and don’t mind the wait for the products and final standards, here are a few places for enterprise developers to start to learn more.

 

First you should review how Samsung’s fingerprint sensor API works and whether this would motivate you to purchase new S5 phones and deploy them across your enterprise. (Apple’s iPhone 5C’s sensors don’t have programmatic access to its readers yet.)

 

Then take a look at this video demo from Yubico using their touch-sensitive USB key. This could be useful in situations where you want someone to acknowledge “proof of life” but where a total fingerprint isn’t needed. For example, these types of apps are useful for people receiving government pensions who need to verify that they are still alive before their monthly benefits can continue, or where you need to prove who you are when talking to a call center agent.

 

To see how a voice print recognition app will work, check out this one from Agnito called KIVOX, which is available for both Android and iOS that you can download here. Agnito has been working for several years on voice recognition apps, and has a project underway with one American bank to implement FIDO protocols for their customers. One of the interesting aspects of voice recognition is being able to detect a recorded voice and distinguish it from the original speaker.

 

You can download Nok Nok’s NNL S3 Suite that includes its Multifactor Authentication Server with iOS, Android, Windows 7 and 8 clients. This system will work with a variety of different sensors, including fingerprint readers.

Finally, Oberthur is building specialized phone SIM cards that have FIDO authenticators included, which demonstrates the flexibility of the protocol and how they can be used on phones that don’t have the latest technology.

Network World: Secure browsers offer alternatives to Chrome, IE and Firefox

The Web browser has been a major infection vector for years, allowing malware to be transported to millions of computers through phishing, man-in-the-middle, SQL injection and countless other attacks. But what if there was a way to stop this madness and secure the browsing channel itself?

spoon consoleI talk about ways to replace existing Chrome and Firefox browsers with a new breed of products, such as this screenshot of Spoon at left. You can read my article posted on Network World today here.

Network World: Virtual machine security still a work in progress

Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions.

CaptureWe last looked at this product category nearly three years ago, testing five products. At that time, we said that no single product delivered all the features we desired. That’s still true today even though the market matured some. This time around we tested three vendors who were in our previous test — Catbird, Hytrust and Trend Micro – plus a newcomer, Dome9. All represent solid approaches to improving your VM security, but coming from different places.

Sadly, I wasn’t able to test lots of other VM security technologies, which I have listed here.

You can read my review of these VM security products for Network World here. And you can view a series of screenshots of the four products here.

Dealing with ID Theft

With all the various security exploits of the past several months, I wanted to share two emails that I received over the past week. One was from USAA, the financial services giant that offers a variety of banking and insurance programs to military families. The other was from a security consultant. Both offered suggestions on how to protect your digital and online identity, but both had diametrically opposite suggestions.

The USAA email (and it was really from them) pointed to a page of theirs that reviews various security suggestions. There are tips on how to use social media wisely (such as don’t reveal too much on the first date) and how to watch out for ATM card skimmers (those add-on devices that can collect your PIN and card data).

USAA offers million-dollar liability protection in case of fraud – which more card issuers are doing – and a zero dollar deductible – which more card issuers should do. They also offer Trusteer Rapport software to flag phishing sites for free, along with a free Symantec VIP soft token for additional factor authentication to secure your account logins. Great for them, and one of the reasons why I like doing business with them.

All of these tools and tips are very practical, very easy to implement, and very sensible.

But let’s take a look at my second email from the security consultant. Here you have the opposite approach, of suggestions that border on the onerous if not impossible to implement. I won’t mention their name, but here are their suggestions on limiting ID theft. The first point was:

  • Set Google Alerts on yourself and know what information is assessable about you online. (This is a really good idea and something everyone should do anyway, regardless of vanity or security issues.)

But then things started getting weird:

  • Get a PO Box that is not in the same Zip code as your house, and have your bank statements sent there.
  • Set your insurance address and vehicle registration for the PO Box too.
  • Change the deed on your house to a trust that has nothing to do with your name. Set that mailing address to, guess what, the same PO Box.

Does this strike you as somewhat paranoid? I get it, I mean, having the PO Box in some random location could really help if your car is stolen, or if you are robbed and your wallet taken, or someone is doing an online search for your records and decides to target you. But how many of us are going to go through the motions for the above suggestions? Not many.

Sure, ID theft is a problem, especially as Target, Yahoo, Sears, et al. release millions of records unintentionally. For another perspective and what corporate IT managers can learn from these situations, check out my post on Ricoh’s WorkIntelligent.ly blog today here.

Be safe out there people.

Ricoh blog: 3 lessons learned from the Target’s data breach

The Target security breach of their point of sale system (POS) earlier this year and the theft of millions of customers’ credit cards was unfortunate, to say the least. A good rundown of what happened to them can be found here in the New York Times. But the exploit has some important lessons for beefing up your own security posture. Here are a few important takeaways.

1. Segment your network properly. 

One of the main entry points into their POS network was that their heating contractor had way more access rights than they needed. Why does such a contractor need to have access to your entire network just to turn up the heat? Brian Krebs writes, “it is common for large retail operations to have a team that routinely monitors energy consumption and temperatures in stores to save on costs (particularly at night) and to alert store managers if temperatures in the stores fluctuate outside of an acceptable range that could prevent customers from shopping at the store.” That being said, it turns out that the bad guys were able to steal the contractor’s network credentials and be able to get into many stores’ networks as a result.

2. Take a closer look at two factor authentication. Another issue was the heating contractor wasn’t using two-factor authentication on their network credentials. There was simply no excuse for this, and nowadays you can add a second factor to your logins at Facebook, Twitter, Google Docs, LinkedIn and many other software sites. The US CERT has put together a list of recommendations for specifically protecting POS systems but the first step is in strengthening passwords. I have reviewed many of the two factor tools that enterprises can use here for Network World; they are relatively straightforward to implement. And while they can’t protect you against every attacker (as one notable example: in the Netflix series of House of Cards, the two factor protection is defeated by one of the story’s characters in season 2), still it is better than not having it at all.

3. Change your default admin accounts. One part of the exploit made use of a username which was the same one that gets installed with an IT management software suite from BMC called Performance Assurance for Microsoft Servers. Brian Krebs again has more information about how this all happened. This is again a common exploit, and there is no excuse for laziness: change those default passwords, especially on accounts that have administrative or supervisory access to multiple or sensitive systems.

Obviously, these are just the tip of the iceberg, But all three lessons are important ones to remember to strengthen your own network security so you don’t become another Target. There is no point in having a strong perimeter defense if outsiders can easily become insiders and roam freely around your network.

CA blog: Making your mobile apps more secure

Businesses are getting more innovative about how they deploy their mobile apps. They are using them to reach a wider customer base or building exciting new internal apps that couldn’t be delivered to desktops. As an example, PKO, Poland’s largest bank, wanted to roll out a new epayment app for its smartphone users last year. Their challenge was to ensure that the banking data transmitted to those phones was kept secure.

Certainly, there is increasingly more malware that is targeted at mobile phones. Here are a few tips to help make your users’ mobile experience more secure.

  1. Train your users to steer clear of malware-infected websites. While it is hard to always resist the temptation to just type in some random URL, part of good security practice is not opening your phone up to downloadable exploits from sites that specialize in this sort of thing. There are various hacking contests, such as this one, where just visiting the site easily downloads exploits. And while you can’t always tell in advance, you should spend some time training your users and your customers to be more vigilant about where they navigate with their mobile browsers.
  2. Make sure your users are always downloading genuine apps. Trend Micro has a report about how the number of bad apps for Android now tops a million and is still rising. That is somewhat depressing to be sure. Even more depressing is that this is more than double the number that existed at the beginning of 2013. One way to avoid this situation is to provide a corporate app store with links to the genuine apps. Or you can lock down your corporate-owned phones to prevent random app downloads.
  3. Make sure your users connect securely or not at all. They should avoid open Wifi networks like the plague, because chances are they will catch something from these open networks. Spend some effort educating them about phony Wifi networks that are just virus swamps, and have them understand the consequences of connecting insecurely.
  1. Understand digital Trojans and how they work. They have been around for many years, with the first mobile trojans infecting the Symbian OS back in 2004. Other trojans can even hold your phone hostage and demand payment before they will release their grip. Make sure your IT staff understand how these exploits work and have them set up periodic scans of all of your corporate-owned phones to check for them.

Making your mobiles more secure can make it a center of enterprise IT innovation. If you tighten up your phones, you can have a more solid foundation to develop your own apps on them and provide more innovative ways to reach your customers, react to changing market conditions, or do more business.

A new way to provide malware protection

Note: Since I wrote this story back in 2014, events have changed. Norse’s database and methods have been questioned, and the company has seen a massive staff layoff, including its CEO. I would be careful if you choose their products for now. 

We all know it is an arms race on the Internet trying to protect our networks against bad actors. There are fake anti-virus alerts that masquerade as malware and an entire category of badness called ransomware that holds your hard disk hostage until you pay someone to unlock its hold on your data. And then there are traditional methods, such as what was used at Target and elsewhere to use legitimate credentials of people with wide-ranging network access to do their mischief.

It is all rather depressing. But because it is an arms race, the good guys have a few tricks up their sleeves too. The latest line of defense is to track sources of potential infections, down to geo-locating them in the physical world to the extent possible. This is what Norse Corp. offers its clients, and having seen some samples, I have to admit it is a great idea.

viking2Here is a screenshot showing you what they capture. The idea is to instrument the vast unwashed Internet (TOR routers, peer-to-peer torrents, and other effluvia that runs across what all of us would not like to think about when we are trying to trying to Get Real Work Done). Norse has placed thousands of its capture appliances around the world and collected a database of more than 120 million malicious URLs. While that sounds like a lot, it isn’t when you compare this to the number of infected PCs or those on existing botnets. But what is significant is that they can find malware sources in the developmental stages, before they start infecting other computers.

Of course, they aren’t the only ones with these appliances: Cisco, McAfee, BlueCoat, Bit9, Palo Alto Networks, and others have instrumented their customers’ routers and firewalls to capture similar information. Some of these companies score the source addresses and have integrated this reputation analysis into their firewall rules engines too. But to my knowledge, Norse is the only one that can locate these TOR exit nodes and start to identify what other IP addresses are being carried through them. And guess what? If you have to use TOR to hide your traffic, you probably aren’t sending nursery rhymes across the Interwebs. And because everything they observe is tied back to a common database, they can figure out some pretty important things. For example, when a hospital’s kidney dialysis machine is collecting credit card information or worse yet, doing actual payment transactions, that should send up a red flag.

I have written about this before, including most recently this piece in Information Security Magazine this past month. Too bad Target and Marriott and others didn’t have this technology when their insider accounts had been compromised. Yeah, too bad.

SearchSecurity: The changing face of advanced malware detection

In the escalating arms race against advanced malware, many organizations require defenses to protect enterprise networks in real time that go beyond desktop endpoint virus scanners and network-based intrusion prevention products.

Unfortunately for security organizations, advanced malware is getting harder to detect.

You can read more in SearchSecurity here.

Thank you, NSA!

So with all the stuff written about data privacy, the seemingly daily credit card breaches from various retailers, and even stories about point of sale systems being unsafe, I just wanted to take this moment to say thanks to our hapless NSA.

Why thank them? Well, they continue to inspire our entertainment industry in new and exciting ways, and also make previous movies and TV show plot points all that more believable. Take the following cases in point:

  1. “The Good Wife” used to be one of my favorite shows on the air, and one of the reasons were all the techy points scored by the various legal eagles working in Chicago. I mean, when did you ever hear the words “cell phone metadata” used in a TV series? Granted, some of the stuff is irritating, such as one client that looks awfully like Yahoo (or maybe their prototype is Google) called ChumHum that is always skirting the law. I guess if Dave Eggers can hide behind “The Circle” (which is a darn fine read, by the way), so can the fictional lawyers in “The Good Wife.” We were even treated to some “60 Minutes” style scene of NSA workers in Chicago tracking phone calls and more metadata on a subsequent show.
  2. Speaking of “60 Minutes,” when was the last time you got a tour of a top secret data center on national TV where you could plainly see the bad guys’ IP addresses? Granted, those are probably outdated anyway. But stiil.
  3. Speaking of Google, there are now artists who use images of people randomly captured in their Street Views to recreate the image in “real life”.  It could be borderline creepy, or a new art form, hard to say which.
  4. Jason Bourne’s exploits are all that much more believable. I was watching one of the earlier episodes and I have to admit it was almost too ironic that a reporter from The Guardian gets wasted by the CIA-like agency: the same newspaper that was involved in the Snowden leaks. And the talented agency can scan for those Bourne-oriented keywords in near real-time over the phone calls too. Amazingly prescient for 2007! I haven’t had a chance to review “War Games” or “Three Days of the Condor” yet, but I am sure a lot of other cold-war plot lines are back in style.
  5. Bluffdale Utah is now a tourist destination. This (pictured above) is where the NSA is trying to build its data repository for all those calls. As a destination, it isn’t quite A-list yet: you can only imagine but not see the fiasco happening beyond the barbed wire fencing about bad data center design, despite the nearly infinite budget involved.
  6. Overseas tech companies are reaping a competitive advantage. Thanks to all the subrosa connections between the NSA and various American tech leaders such as Microsoft, Google, and so forth, many enterprises are opting to look elsewhere to host their email traffic. When was the last time you heard the term “Email made in Germany” used in a positive way? Thanks NSA for making the market in offshore data havens.
  7. An entire industry of posting arrest records and mugshots now thrives. Several sites are now capturing this data. Thanks NSA for motivating the private sector!

Top security stories of the week

Scouring the net for this week’s most interesting security stories for Dice’s Security Talent Community, I recommend the following: