safe cracking

53
Safecracking Eric Schmiedl [email protected] Without a Trace

Upload: sabreusa

Post on 12-Oct-2014

474 views

Category:

Documents


57 download

TRANSCRIPT

Page 2: Safe Cracking

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 3: Safe Cracking

Non-destructive Entry

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 4: Safe Cracking

Non-destructive Entry

• Manipulation

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 5: Safe Cracking

Non-destructive Entry

• Manipulation

• Picking, decoding, etc.

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 6: Safe Cracking

Non-destructive Entry

• Manipulation

• Picking, decoding, etc.

• Radiographic

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 7: Safe Cracking

Non-destructive Entry

• Manipulation

• Picking, decoding, etc.

• Radiographic

• Robot-dialing

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 8: Safe Cracking

Non-destructive Entry

• Manipulation

• Picking, decoding, etc.

• Radiographic

• Robot-dialing

• Robot-manipulation

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 9: Safe Cracking

Manipulation

Page 10: Safe Cracking

Combination lock operation

Imag

es fr

omLo

cks,

Safe

s, an

d Se

curit

y

Page 11: Safe Cracking

Combination lock operation

the gates

Imag

es fr

omLo

cks,

Safe

s, an

d Se

curit

y

Page 12: Safe Cracking

Combination lock operation

the fence the gates

Imag

es fr

omLo

cks,

Safe

s, an

d Se

curit

y

Page 13: Safe Cracking

Combination lock operation

the fence the gates

Imag

es fr

omLo

cks,

Safe

s, an

d Se

curit

y

Page 14: Safe Cracking

Combination lock operation

the fence the gates

bolt retractedthis way

Imag

es fr

omLo

cks,

Safe

s, an

d Se

curit

y

Page 15: Safe Cracking

Figure 13: Imperfections in wheel pack and fence. Only the “largest” wheel actually determines the depth

to which the fence lowers. Sometimes the wheels are of slightly different diameter (as shown here), and

sometimes the fence is not exactly parallel with the wheel pack. In this cutaway view of an off-the-shelf

S&G 6730, the middle wheel is slightly larger.

3.3.1 Manipulation principles

Two properties of the Group 2 lock design render it vulnerable to manipulation attacks.

The first property is imperfect wheel/fence alignment. Recall that the combination is “tested” by lower-

ing the fence along the edge of the wheel pack at a fixed position, allowing the nose to engage the cam only

if the fence can enter the gates. If at least one wheel in the wheel pack has its gate elsewhere, the fence can

go no lower than the edge of the wheel pack. If the lock were perfectly manufactured, when no gate is under

the fence the fence would rest on all three wheels simultaneously. But since the lock cannot be perfectly

manufactured, in fact the wheels will be of slightly different diameter and the fence will not be perfectly

parallel with the axis on which the wheels ride. This means that, in practice, the fence is blocked from low-

ering not by all wheels, but only by an effectively largest wheel. When that wheel is rotated so that its gate

is under the fence, the fence will be able to lower slightly more, but will then be prevented from lowering

further by the next “largest” wheel. That is, although a complete lowering of the fence requires positioning

the gates of all wheels, the exact depth to which the fence can lower at any given time is actually determined

by only a single wheel. See Figure 13 for an example of this phenomenon in a typical commercial lock.

The second property is the amplification of fence depth through the nose and cam gate. Recall that the

lever nose and cam gate are roughly wedge shaped. When the nose is fully engaged in the cam gate, it is

a snug fit, with very little lateral play. But when the nose only partially lowers into the cam gate, there is

considerable play from side to side. In fact, the total amount of play is inversely proportional to the depth

of the nose in the cam gate (and hence the depth at which the fence touches the largest wheel in the wheel

pack).

The play of the nose in the cam gate is readily observable through the external dial interface (as

locks in about 20 minutes

23

Imag

e fro

mSa

fecr

acki

ng fo

r th

e Co

mpu

ter

Scie

ntist

Page 16: Safe Cracking

If only all locks were this easy.

The

Nat

iona

l Loc

ksm

ith G

uide

to

Man

ipul

atio

n

Page 17: Safe Cracking

Figure 3: Major components of Group 2 lever-fence lock, as seen from the back (Kaba-Ilco model 673)

Although many of the lock components serve more than one purpose, with complex interactions that

depend on the lock state, the design is simpler than it might first seem. Recall that the purpose of the lock is

to retract the lock bolt (and thereby release the door bolts) only after a correct combination has been entered.

It is easier to understand the design as a whole by studying its two basic functions separately – retracting the

lock bolt and enforcing the combination.

2.1 Retracting the lock bolt: the drive cam and lever

The two main internal components involved in retracting the lock bolt are the drive cam and the lever.

Within the lock module, the spindle terminates at a drive cam (also known as the cam wheel or simply

the cam). The cam moves with the external dial, with all rotational movement of the dial transmitted directly

to the cam. (On most locks, including that shown in Figure 3, the cam is the rear-most element, but that is not

essential to the design.) Observe that the cam is circular with a wedge-shaped notch cut in its circumference;

the notch is called the cam gate.

The lock bolt slides partly into or out of the lock within a channel in the side of the module’s housing

(i.e., to the left or the right in the figures here). The bolt is attached within the lock module to the lever. The

lever is attached to the bolt with a lever screw, which acts as a pivot point for the lever, allowing it to move

upward and downward across a range of a few degrees. The lever is pressed downward by a lever spring,

which is usually wound around around the lever screw.

The lever runs within the module from the lock bolt to near the spindle axis. At the far end of the lever,

the lever nose rests along the edge of the cam, held down by the pressure of the lever spring. Observe that

the lever nose is in the same wedge shape as the cam gate. The bolt is moved by allowing the lever nose to

mate with the cam gate.

9

the nose

the fence

Imag

e fro

mSa

fecr

acki

ng fo

r th

e Co

mpu

ter

Scie

ntist

Page 18: Safe Cracking

Figure 9: Interaction of lever and fence with cam and gates, combination not set

14

Figure 9: Interaction of lever and fence with cam and gates, combination not set

14

The nose makes life a little more difficult. Imag

es fr

omSa

fecr

acki

ng fo

r th

e Co

mpu

ter

Scie

ntist

Page 19: Safe Cracking

The Solution

Figure 9: Interaction of lever and fence with cam and gates, combination not set

14

Figure 9: Interaction of lever and fence with cam and gates, combination not set

14

Imag

e fro

mSa

fecr

acki

ng fo

r th

e Co

mpu

ter

Scie

ntist

Page 20: Safe Cracking

The Solution

Figure 9: Interaction of lever and fence with cam and gates, combination not set

14

Figure 9: Interaction of lever and fence with cam and gates, combination not set

14

Contact points!

Imag

e fro

mSa

fecr

acki

ng fo

r th

e Co

mpu

ter

Scie

ntist

Page 21: Safe Cracking

The Solution

Figure 9: Interaction of lever and fence with cam and gates, combination not set

14

Figure 9: Interaction of lever and fence with cam and gates, combination not set

14

Contact points!

The contact points get closer together as the nose drops in further.

Imag

e fro

mSa

fecr

acki

ng fo

r th

e Co

mpu

ter

Scie

ntist

Page 22: Safe Cracking

Figure 14: Play of lever nose within cam gate, high wheel pack vs. low wheel pack. The contact region (the

range between the left and right contact points) is narrower when the lever can fall lower.

25

Imag

e fro

mSa

fecr

acki

ng fo

r th

e Co

mpu

ter

Scie

ntist

Page 23: Safe Cracking

The

Nat

iona

l Loc

ksm

ith G

uide

to

Man

ipul

atio

n

Page 24: Safe Cracking

The

Nat

iona

l Loc

ksm

ith G

uide

to

Man

ipul

atio

n

Page 25: Safe Cracking

The

Nat

iona

l Loc

ksm

ith G

uide

to

Man

ipul

atio

n

Page 26: Safe Cracking

Now, which wheel’s gate are we seeing?

We only have to dial three combinations to find out.

Page 27: Safe Cracking

Now, which wheel’s gate are we seeing?

We only have to dial three combinations to find out.

??-22-2222-??-2222-22-??

Page 28: Safe Cracking

Now, which wheel’s gate are we seeing?

We only have to dial three combinations to find out.

??-22-2222-??-2222-22-??

Where the gate “vanishes,” we’ve got our wheel.

Page 29: Safe Cracking

Learning manipulation

• Practice locks

• Manipulation aids

Page 30: Safe Cracking

This is no good if you’re storing classified data.

Imag

e fro

mSa

fecr

acki

ng fo

r th

e Co

mpu

ter

Scie

ntist

Figure 18: Manipulation-resistant locks. Top left: Kaba-Ilco 683 Group 2M lock, with mechanism that adds

irregularity to contact points. Top right: Kaba-Ilco 693 Group 1 lock, with secondary mechanism that holds

the fence off the wheel pack until the nose is already within the contact region. Bottom left & right: Sargent

& Greenleaf 8400 Group 1 lock, with “butterfly” in dial. A secondary mechanism holds the fence off the

wheel pack until the “butterfly lever” in the dial knob is rotated, which also locks the dial into position. This

lock is shown in a mount for use on a US DoD “SCIF” vault. The Group 1R version of this lock has plastic

Delrin wheels.

32

Page 31: Safe Cracking

[the story behind the 6730MP]

Page 32: Safe Cracking

Sargent & Greenleaf 8400 “manipulation proof” lock

Imag

e fro

mSa

fecr

acki

ng fo

r th

e Co

mpu

ter

Scie

ntist

Figure 18: Manipulation-resistant locks. Top left: Kaba-Ilco 683 Group 2M lock, with mechanism that adds

irregularity to contact points. Top right: Kaba-Ilco 693 Group 1 lock, with secondary mechanism that holds

the fence off the wheel pack until the nose is already within the contact region. Bottom left & right: Sargent

& Greenleaf 8400 Group 1 lock, with “butterfly” in dial. A secondary mechanism holds the fence off the

wheel pack until the “butterfly lever” in the dial knob is rotated, which also locks the dial into position. This

lock is shown in a mount for use on a US DoD “SCIF” vault. The Group 1R version of this lock has plastic

Delrin wheels.

32

Page 33: Safe Cracking

Nose drops in here

eric

schm

iedl

pho

togr

aphy

Page 34: Safe Cracking

Radiographic Attack

Safecracking, James Bond style.Moonraker

Page 35: Safe Cracking

Image fromLocks, Safes, and Security

SAIC portable package inspection X-ray

Page 36: Safe Cracking

Group 1R locks use plastic (Delrin) wheels.

eric

schm

iedl

pho

togr

aphy

Page 37: Safe Cracking

eric

schm

iedl

pho

togr

aphy

Hollywood is Hollywood

Page 38: Safe Cracking

The Robot Dialer

Opens the lock in four to forty hours.Image from

Locks, Safes, and Security

Page 39: Safe Cracking

Robot Manipulation

The Mas-Hamilton Soft-Drill

Imag

es fr

omLo

cks,

Safe

s, an

d Se

curit

y

Page 40: Safe Cracking

This safe was opened in 22 minutes.

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 41: Safe Cracking

Video

Vide

o fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 42: Safe Cracking

Video

Vide

o fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 43: Safe Cracking

The Solution

Kaba-Mas X-09

Mas-Hamilton X-07

Imag

es fr

omLo

cks,

Safe

s, an

d Se

curit

y an

d Ka

ba-M

as

Page 44: Safe Cracking

• Zener diode prevents dial from being turned at high speed

• Dial position is not proportional to previous number dialed

• True 1,000,000 possible combinations

• Audit trail

Security Features

Sour

ce:

LSS+

Page 45: Safe Cracking

• Continuous dialing without a pause of .25 seconds every 1 1/3 turns

• Entire combination entered in less than 15 seconds

• Continuous dialing for more than five minutes without lock power-down

• Ten incorrect combinations in sequence requires a several-minute wait until the lock resets

Sour

ce:

LSS+

Page 46: Safe Cracking

Intel designed CPU, claimed to be custom

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 47: Safe Cracking

Design Features• Data representation of the number sequence changed each

time the dial direction is reversed;

• Random number generator seed encrypted and key changed each time the dial is turned;

• Free-running counter in the CPU re-encrypted at each opening;

• Algorithm seed changed at each re-programming;

• Memory location for the seed changed at re-programming;

• Lock serial number used to generate the seed;

• Lock serial number may be used to open the lock if combination is forgotten.

Sour

ce:

LSS+

Page 48: Safe Cracking

Electronics are potted in Dymax: a compound that has particles scattered throughout to provide a unique fingerprint under UV light.

Imag

e fro

mLo

cks,

Safe

s, an

d Se

curit

y

Page 49: Safe Cracking

“A robot dialer utilizing the most sophisticated sensing technology,including optical character recognition, sound, and video,

would be expected to accomplish an opening based upon half of the combinations in 190 days.”

“In reality, there is no such thing as surreptitious entry of an X-07. If you do not have the combination, you will not open the lock.”

-- Marc Weber Tobias, “Locks, Safes, and Security.”

Page 50: Safe Cracking

...as far as we know. :)

Page 51: Safe Cracking

The easiest way to open a safe

Exploit a design flaw.

Page 52: Safe Cracking

The easiest way to open a safe

Exploit a design flaw.

Page 53: Safe Cracking

• Locks, Safes, and Security by Marc Weber Tobias. If you only buy one book, buy this one. (www.security.org)

• The electronic version (LSS+) is pricer but has a search function... and how-to videos.

• “Safecracking for the Computer Scientist” by Matt Blaze. Free and awesome. (www.crypto.com/papers/)

• The National Locksmith Guide to Manipulation

Further Reading

Contact: [email protected]