icloud keychain

61
iCloud Keychain and iOS 7 Data Protection Andrey Belenko Sr. Security Engineer @ viaForensics Alexey Troshichev @hackappcom founder

Upload: alexey-troshichev

Post on 20-May-2015

135.059 views

Category:

Internet


0 download

DESCRIPTION

IF YOU ARE CONCERNED ABOUT CLOUD SECURITY PLEASE READ http://blog.hackapp.com/2014/09/what-if-i-was-cloud.html

TRANSCRIPT

Page 1: iCloud keychain

iCloud Keychain and

iOS 7 Data ProtectionAndrey Belenko

Sr. Security Engineer @ viaForensics !

Alexey Troshichev@hackappcom founder

Page 2: iCloud keychain

What is iCloud?

Page 3: iCloud keychain

What’s inside?

• Documents

• Photos

• Backups (SMS, application data, etc)

• Keychain

Page 4: iCloud keychain

Hacker’s view

Page 5: iCloud keychain

Bruteforce protection?

Page 6: iCloud keychain

Bruteforce protection?

Page 7: iCloud keychain

Bruteforce protection?

Page 8: iCloud keychain

Find My iPhone

Page 9: iCloud keychain

Brought to you by hackapp.com

!

github.com/hackappcom/ibrute

@hackappcom

Page 10: iCloud keychain

iCloud KeychainImage: Apple Inc.

Page 11: iCloud keychain

Motivation

http://support.apple.com/kb/HT4865

Page 12: iCloud keychain

Intercepting SSL

SSL Proxy (Burp, Charles, …)

Root CA cert Proxy settings

Page 13: iCloud keychain

Authentication

GET /authenticateAppleID, Password

DsID, mmeAuthToken, fmipAuthToken

icloud.com

Page 14: iCloud keychain

/getAccountSettings

Page 15: iCloud keychain

/getAccountSettings

Page 16: iCloud keychain
Page 17: iCloud keychain
Page 18: iCloud keychain

Setup Options

Page 19: iCloud keychain

The Big Picture

*.keyvalueservice.icloud.com

*.escrowproxy.icloud.com

Keychain items (encrypted) Keybag (encrypted)

Some Secret

Page 20: iCloud keychain

Key-Value Store• Not new

• Used extensively by many apps e.g. to keep preferences in sync across devices

• iCloud Keychain utilises two stores:

• com.apple.security.cloudkeychainproxy3• Syncing between devices

• com.apple.sbd3 (securebackupd3)• Copy to restore if no other devices

Page 21: iCloud keychain

Escrow Proxy• New; Designed to store precious secrets

• Need to know iCSC to recover escrowed data

• Need to receive SMS challenge

• Must successfully complete SRP auth

• User-Agent: com.apple.lakitu (iOS/OS X)

Image: mariowiki.com

Page 22: iCloud keychain

Key-Value Store com.apple.security.cloudkeychainproxy3

S(usrPwd, D2_pub)

S(D2_priv, (D1_pub, D2_pub))

S(D1_priv, D1_pub)S(userPwd, D1_pub)

S(D1_priv, (D1_pub, D2_pub))S(userPwd, (D1_pub, D2_pub))

Page 23: iCloud keychain

Key-Value Store com.apple.sbd3

Key Description

com.apple.securebackup.enabled Is Keychain data saved in KVS?

com.apple.securebackup.record Keychain records, encrypted

SecureBackupMetadata iCSC complexity, timestamp, country

BackupKeybag Keybag protecting Keychain records

BackupUsesEscrow Is keybag password escrowed?

BackupVersion Version, currently @“1”

BackupUUID UUID of the backup

Page 24: iCloud keychain

4-digit iCSC [Default]

Page 25: iCloud keychain

4-digit iCSC [Default]

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

Page 26: iCloud keychain

4-digit iCSC [Default]

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Backup KeybagKey 1

Key 2

Key 3

AES-GCM 256 bit

Page 27: iCloud keychain

4-digit iCSC [Default]

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Backup KeybagKey 1

Key 2

Key 3

AES-GCM 256 bit

AES-Wrap Keys RFC 3394

Page 28: iCloud keychain

4-digit iCSC [Default]

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Backup KeybagKey 1

Key 2

Key 3

AES-GCM 256 bit

AES-Wrap Keys RFC 3394

*.keyvalueservice.icloud.com

Page 29: iCloud keychain

4-digit iCSC [Default]

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

iCloud Security Code1234 PBKDF2

SHA-256 x 10’000

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Backup KeybagKey 1

Key 2

Key 3

AES-GCM 256 bit

AES-Wrap Keys RFC 3394

*.keyvalueservice.icloud.com

Page 30: iCloud keychain

4-digit iCSC [Default]

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

iCloud Security Code1234 PBKDF2

SHA-256 x 10’000

AES-CBC 256 bit

*.escrowproxy.icloud.com

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Backup KeybagKey 1

Key 2

Key 3

AES-GCM 256 bit

AES-Wrap Keys RFC 3394

*.keyvalueservice.icloud.com

Page 31: iCloud keychain

Secure Remote Password

• Zero-knowledge password proof scheme

• Combats sniffing/MITM

• One password guess per connection attempt

• Password verifier is not sufficient for impersonation

• Escrow Proxy uses SRP-6a

Page 32: iCloud keychain

Key Negotiationa ← random, A ← g^a

b ← random, B ← kv + g^b

u ← H(A, B) u ← H(A, B)x ← H(SALT, Password)

S ← (B - kg^x) ^ (a + ux)K ← H(S)

S ← (Av^u) ^ bK ← H(S)

Key VerificationM ← H(H(N) ⊕ H(g), H(ID), SALT, A, B, K)

(Aborts if M is invalid)

ID, A

SALT, B

M

H(A, M, K)

Password verifier:!SALT ← randomx ← H(SALT,Password)v ← g^x

Agreed-upon parameters:!H – one-way hash functionN, g – group parametersk ← H(N, g)

Page 33: iCloud keychain

Key Negotiationa ← random, A ← g^a

b ← random, B ← kv + g^b

u ← H(A, B) u ← H(A, B)x ← H(SALT, Password)

S ← (B - kg^x) ^ (a + ux)K ← H(S)

S ← (Av^u) ^ bK ← H(S)

Key VerificationM ← H(H(N) ⊕ H(g), H(ID), SALT, A, B, K)

(Aborts if M is invalid)

ID, A, SMS CODE

SALT, B

M, SMS CODE

H(A, M, K)

Password verifier:!SALT ← randomx ← H(SALT,Password)v ← g^x

Agreed-upon parameters:!H – SHA-256N, g – RFC 5054 w. 2048-bit groupk ← H(N, g)

Page 34: iCloud keychain

Escrowed Data Recovery

*Dis

play

pur

pose

s on

ly

Page 35: iCloud keychain

Escrowed Data Recovery/get_records

List of escrowed records

*Dis

play

pur

pose

s on

ly

Page 36: iCloud keychain

Escrowed Data Recovery/get_records

List of escrowed records

/get_sms_targetsList of phone numbers*

*Dis

play

pur

pose

s on

ly

Page 37: iCloud keychain

Escrowed Data Recovery/get_records

List of escrowed records

/get_sms_targetsList of phone numbers*

/generate_sms_challengeOK

*Dis

play

pur

pose

s on

ly

Page 38: iCloud keychain

Escrowed Data Recovery/get_records

List of escrowed records

/get_sms_targetsList of phone numbers*

/generate_sms_challengeOK

/srp_init [DsID, A, SMS CODE][UUID, DsID, SALT, B]

*Dis

play

pur

pose

s on

ly

Page 39: iCloud keychain

Escrowed Data Recovery/get_records

List of escrowed records

/get_sms_targetsList of phone numbers*

/generate_sms_challengeOK

/srp_init [DsID, A, SMS CODE][UUID, DsID, SALT, B]

/recover [UUID, DsID, M, SMS CODE][IV, AES-CBC(KSRP, Escrowed Record)]

*Dis

play

pur

pose

s on

ly

Page 40: iCloud keychain

Escrow Proxy EndpointsEndpoint Description

get_club_cert [?] Obtain certificateenroll Submit escrow record

get_records List escrowed recordsget_sms_targets List SMS numbers for escrowed records

generate_sms_challenge Generate and send challenge codesrp_init First step of SRP protocolrecover Second step of SRP protocol

alter_sms_target Change SMS number

Page 41: iCloud keychain

Escrow Record

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

iCloud Security Code1234 PBKDF2

SHA-256 x 10’000

AES-CBC 256 bit

*.escrowproxy.icloud.com

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Backup KeybagKey 1

Key 2

Key 3

AES-Wrap Keys RFC 3394

AES-GCM 256 bit

*.keyvalueservice.icloud.com

Page 42: iCloud keychain

Escrow Record

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

iCloud Security Code1234 PBKDF2

SHA-256 x 10’000

AES-CBC 256 bit

*.escrowproxy.icloud.com

Key ← PBKDF2-SHA256(iCSC, 10’000)

EscrowRecord ← AES-CBC(Key, RandomPassword)

Page 43: iCloud keychain

Escrow RecordKey ← PBKDF2-SHA256(iCSC, 10’000)

EscrowRecord ← AES-CBC(Key, RandomPassword)

Page 44: iCloud keychain

• This is stored by Apple

Escrow RecordKey ← PBKDF2-SHA256(iCSC, 10’000)

EscrowRecord ← AES-CBC(Key, RandomPassword)

Page 45: iCloud keychain

• This is stored by Apple

• iCSC is 4 digits by default

Escrow RecordKey ← PBKDF2-SHA256(iCSC, 10’000)

EscrowRecord ← AES-CBC(Key, RandomPassword)

Page 46: iCloud keychain

• This is stored by Apple

• iCSC is 4 digits by default

Escrow RecordKey ← PBKDF2-SHA256(iCSC, 10’000)

EscrowRecord ← AES-CBC(Key, RandomPassword)

Page 47: iCloud keychain

• This is stored by Apple

• iCSC is 4 digits by default

Escrow RecordKey ← PBKDF2-SHA256(iCSC, 10’000)

EscrowRecord ← AES-CBC(Key, RandomPassword)

Can you spot the problem yet?

Page 48: iCloud keychain

Escrow RecordKey ← PBKDF2-SHA256(iCSC, 10’000)

• Offline iCSC guessing is possible

• Almost instant recovery [for default settings]

• iCSC decrypts keybag password

• Keybag password unlocks keybag keys

• Keybag keys decrypt Keychain items

Page 49: iCloud keychain

Apple, or other adversary with access to stored data, can near-

instantly decrypt “master” password and read synced iCloud

Keychain records !

(for default settings)

Page 50: iCloud keychain

Setup Options

Page 51: iCloud keychain

Complex iCSC

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

iCloud Security Codecorrect horse battery staple PBKDF2

SHA-256 x 10’000

AES-CBC 256 bit

Backup KeybagKey 1

Key 2

Key 3

*.escrowproxy.icloud.com

AES-Wrap Keys RFC 3394

AES-GCM 256 bit

*.keyvalueservice.icloud.com

Page 52: iCloud keychain

Complex iCSC

• Mechanics are the same as with simple iCSC

• Offline password recovery attack is still possible, although pointless if password is complex enough

Page 53: iCloud keychain

Setup Options

Page 54: iCloud keychain

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Backup KeybagKey 1

Key 2

Key 3

AES-Wrap Keys RFC 3394

AES-GCM 256 bit

*.keyvalueservice.icloud.com

iCloud Security Codecorrect horse battery staple PBKDF2

SHA-256 x 10’000

AES-CBC 256 bit

*.escrowproxy.icloud.com

Random iCSC

Page 55: iCloud keychain

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Backup KeybagKey 1

Key 2

Key 3

AES-Wrap Keys RFC 3394

AES-GCM 256 bit

*.keyvalueservice.icloud.com

iCloud Security Codecorrect horse battery staple PBKDF2

SHA-256 x 10’000

AES-CBC 256 bit

*.escrowproxy.icloud.com

Random iCSC

Page 56: iCloud keychain

Random PasswordBL7Z-EBTJ-UBKD-X7NM-4W6D-J2N4

Keychain PasswordsyMa9ohCJ

tzzcVhE7

sDVoCnb

Backup KeybagKey 1

Key 2

Key 3

AES-Wrap Keys RFC 3394

AES-GCM 256 bit

*.keyvalueservice.icloud.com

Random iCSC

Page 57: iCloud keychain

Random iCSC

• Escrow Proxy is not used

• Random iCSC (or derived key) stored on the device [haven’t verified]

Page 58: iCloud keychain

Setup OptionsiCloud

Keychain

Keychain Sync

Keychain Backup

Master Password

EscrowNo iCloud Security Code

Random iCloud Security CodeComplex iCloud Security CodeSimple iCloud Security Code

Page 59: iCloud keychain

Conclusions

Image: Apple Inc.

Page 60: iCloud keychain

Conclusions

• Trust your vendor but verify his claims

• Never ever use simple iCloud Security Code

• Do not think that SMS Apple sends you is a 2FA

• Yet, iCK is reasonably well engineered although not without shortcomings

Page 61: iCloud keychain

Thank You! Questions are welcome :-)

!

!@abelenko @hackappcom