{"id":1613,"date":"2011-08-31T11:55:15","date_gmt":"2011-08-31T11:55:15","guid":{"rendered":"http:\/\/www.slyman.org\/blog\/?p=1613"},"modified":"2012-11-28T11:18:31","modified_gmt":"2012-11-28T11:18:31","slug":"passwindow","status":"publish","type":"post","link":"https:\/\/slyman.org\/blog\/2011\/08\/passwindow\/","title":{"rendered":"PassWindow"},"content":{"rendered":"<p><a alt=\"Hyperlink to PassWindow website\" title=\"PassWindow, a new commercial authentication system\" href=\"http:\/\/www.passwindow.com\/\" target=\"_blank\">PassWindow<\/a> is a new authentication system that claims &ldquo;<em>unsurpassed security<\/em>&rdquo;.&nbsp; Such claims are made frequently but are rarely substantiated in hindsight, so we found the temptation to investigate too great to resist.<\/p>\n<p><a href=\"http:\/\/www.passwindow.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"Screenshot of PassWindow&#x27;s website, containing their claim of &ldquo;unsurpassed security&rdquo; etc.\" title=\"Screenshot of PassWindow&#x27;s website\" src=\"http:\/\/www.slyman.org\/blog-cdn\/PassWindow.jpg\" style=\"width:446px;height:174px;margin:0 2.25em;\" \/><\/a><\/p>\n<p><strong><a alt=\"Hyperlink to PassWindow website\" title=\"PassWindow website\" href=\"http:\/\/www.passwindow.com\/\" target=\"_blank\">PassWindow<\/a> is potentially an effective and user-friendly component<\/strong> in a <a title=\"Wikipedia: Two-factor authentication\" href=\"http:\/\/en.wikipedia.org\/wiki\/Two-factor_authentication\" target=\"_blank\">two-factor authentication<\/a> system since the human brain is already well-trained to use this system: we look at numbers all the time, and our brains are trained to find numbers even when surrounded by visual noise.&nbsp; PassWindow is <strong>not<\/strong> an &ldquo;electronic black-box&rdquo; giving users a false sense of security; in fact, PassWindow uses no electronic components so it is electrically isolated from the computing\/communication device.&nbsp; PassWindow does a particularly good job of <a title=\"PassWindow: Comparative security&#xd;&#xa;&#x2014;note that this external page is focused mainly on the traditional threat environment, and not the threat environment that might exist should PassWindow become more pervasive.\" href=\"http:\/\/www.passwindow.com\/security.html\" target=\"_blank\">defending against the kinds of threats that typically defeat traditional authentication<\/a> regimes.&nbsp; PassWindow is conceptually simple yet by using secret key patterns that are impractical to describe verbally, <span title=\"...unless of course, the end-user may be persuaded by their attacker to send a photocopy or scan of their PassWindow card...\">PassWindow provides <em>some<\/em> protection against social engineering attacks<\/span>.&nbsp; The very simplicity of PassWindow provides further protection against social engineering attacks by making it <span title=\"Even with PassWindow, it is possible for a man-in-the-middle to convince the end-user that the authentication system has malfunctioned by sending junk challenges.\">somewhat more difficult<\/span> to persuade an end-user that the authentication system has malfunctioned.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.slyman.org\/blog-cdn\/passwindow.png\" style=\"width:452px;height:100px;margin:0 2.25em;\" \/><\/p>\n<p>We are somewhat suspicious about the device&#x27;s overall security benefits in the modern threat environment: this device applies the principle of a <strong><a title=\"Wikipedia: One-time pad\" href=\"http:\/\/en.wikipedia.org\/wiki\/One-time_pad\" target=\"_blank\"><em>one-time pad<\/em><\/a>, but the secret pattern is used <em>multiple times<\/em><\/strong>.&nbsp; <strong>The secret authentication patterns are static low-resolution high-contrast<\/strong> flat 2D <strong>graphics<\/strong> in a highly restricted configuration <strong>containing very small amounts of information<\/strong> that <strong>must be exposed to view during the authentication process<\/strong>.&nbsp; PassWindow&#x27;s website emphasises that over-the-shoulder attacks are partially neutralised by parallax effects, however, <img decoding=\"async\" src=\"http:\/\/www.slyman.org\/blog-cdn\/nikon-digital-camera.jpeg\" style=\"width:138px;height:126px;float:right;margin:0.5em 1em;\" \/>their system is still vulnerable to photographic surveillance attacks since <strong>an image of the secret authentication pattern alone is sufficient to attack their system<\/strong>&#x2014;for this reason, social engineering attacks may still succeed if end-users may only be persuaded to send a photocopy or scan of their PassWindow card to an attacker, and <strong>a PassWindow based system might be compromised on a large scale if even an unsophisticated attacker can infiltrate the key distribution process for static-pattern key cards<\/strong>.&nbsp; PassWindow attempts to frustrate photographic attack by tinting the secret pattern or making it partially reflective, which is unlikely to help much since <a title=\"ucsd.edu: Photographic surveillance attacks compromise security of physical keys, even with images taken &gt;60m from the subject (which is far harder to accomplish than reconstructing a simple PassWindow pattern from a close-range snap).\" href=\"http:\/\/www.jacobsschool.ucsd.edu\/news\/news_releases\/release.sfe?id=791\" target=\"_blank\">high resolution cameras may still exfiltrate the low-resolution secret pattern<\/a> when silhouetted against an appropriate back-light such the sky or a light patch on the user&#x27;s computer screen.&nbsp; Near the bottom of the third page of their website, PassWindow&#x27;s developers admit:<\/p>\n<blockquote><p>&ldquo;However, a user is always vulnerable to physical attack or surreptitious video surveillance&#8230;&rdquo;<\/p><\/blockquote>\n<p><em>Eventually<\/em>, suppliers of PassWindow key cards and printing equipment <em>may<\/em> provide methods of <em>mitigating<\/em> photographic threats; e.g. with inks that can only be read from certain directions, or codes that can only be read against a light polarisation present in the challenge or with polarised eye-wear worn by the end-user, or by encapsulating the key inside a telescopic eyepiece.&nbsp; It is unlikely that photographic threats will ever be completely defeated without compromising the simplicity of the system through integration with electronics and an LCD screen (which would retain the fundamental strengths of PassWindow against the simplest social engineering attacks), since a single successful exfiltration of a static secret key is sufficient to open a substantial window of opportunity to a potential attacker.&nbsp; <strong>These limitations are not necessarily unique to PassWindow<\/strong>, but may be fundamental to any technology that shares PassWindow&#x27;s intrinsic simplicity, since any two-way authentication technology must communicate with the end-user&#x27;s senses of vision, hearing etc.<\/p>\n<p>During each authentication operation, <strong>PassWindow makes sparse use of key\/ challenge information, obfuscating the secret key<\/strong> by interleaving the real challenge with random position &amp; sequence-based noise, and by randomly selecting the parts of the key that must be communicated.&nbsp; This strategy substantially extends the life of PassWindow keys beyond the expected life of a one-time-pad.&nbsp; Credible statistics quoted by PassWindow&#x27;s developers and corroborated by at least one source in the broader security community indicate that a PassWindow key can perform between 20 and &gt;10,000 one-way authentications, or a <span title=\"The number of mutual authentications that a key may perform is smaller than the number of one-way authentications that same key may be used for, since mutual authentication is done by modulating a potentially known plain-text into the PassWindow challenge.\">smaller number of mutual authentications<\/span>; before being retired and replaced by the PassWindow server which continually monitors the possibility of statistical attack on each individual key that has been issued.&nbsp; The size, sparseness &amp; strength of each key and challenge may be configured by the system&#x27;s operators and challenge strength may be varied dynamically even for a fixed key size; however, there is an inevitable compromise between challenge\/ key strength and user-friendliness\/ insult-rate.&nbsp; PassWindow&#x27;s developers are researching upgrades that may enhance the statistical strength of PassWindow in the future without seriously compromising its ergonomics.<\/p>\n<h2>Conclusions: practical advice for security engineers<\/h2>\n<p>This simple device offers a useful mechanism for authenticating high-value transactions or for authenticating users attempts to log in to a high-value system.&nbsp; <strong>PassWindow <em>should always be used in conjunction<\/em> with other authentication mechanisms in a two-factor or three-factor configuration, where the PassWindow system may provide complementary strengths to your existing security regime<\/strong>.&nbsp; If you choose <a title=\"PassWindow\" href=\"http:\/\/www.passwindow.com\/\" target=\"_blank\">PassWindow<\/a> as a component in your security regime, specify a strong enough configuration for your application, its threat environment and attack economics.&nbsp; Consider the likely frequency, economy and practicality of key replacement, and evaluate the comparative costs and benefits in terms of the convenience of the authentication process and any additional training and incentivisation necessary to persuade your end-users to protect their keys.&nbsp; PassWindow is relatively simple in its training requirements, as its only rule of security is to avoid visual surveillance.&nbsp; Usability testing by learning-disabled people has yielded encouraging results, and the system has been successfully deployed in regions with high rates of illiteracy.<\/p>\n<p><strong>Be cautious about using static-pattern PassWindow keys in public or potentially compromised spaces<\/strong> where hostile visual surveillance may reduce the advantages of using PassWindow.&nbsp; In order to ensure that PassWindow represents an improvement on the existing security regime, avoid using PassWindow on a computer with a camera attached potentially enabling a remote attacker to more easily exfiltrate a useful image of the end-user&#x27;s secret pattern.&nbsp; Nowadays, many laptops come with webcams installed in their chassis that may not be electrically disconnected: <a title=\"Wikipedia: Robbins v. Lower Merion School District\" href=\"http:\/\/en.wikipedia.org\/wiki\/Robbins_v._Lower_Merion_School_District\" target=\"_blank\">such cameras might be covertly switched on<\/a> by a remote &ldquo;man-in-the-middle&rdquo; attacker: end-users must be taught how to physically disconnect or temporarily disable such cameras (e.g. by covering the lens with a post-it note when not in use).<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.slyman.org\/blog-cdn\/passwindow-mk5-card.jpg\" style=\"width:250px;height:161px;margin:0 2.25em;\" \/><\/p>\n<p>For those wishing to deploy PassWindow, there are currently two main options:<\/p>\n<ol>\n<li>$7.00&#x2013;<strong>$9.00 USD<\/strong> per user per year&#x2014;<strong>sign up for the <a title=\"ShieldPass: PassWindow based 2nd-factor authentication service\" href=\"https:\/\/www.shieldpass.com\/\" target=\"_blank\">ShieldPass<\/a> service<\/strong> for rapid integration with your existing website.<\/li>\n<li><strong>negotiable<\/strong>&#x2014;per user per year&#x2014;<strong>install PassWindow&#x27;s server software<\/strong>, which gives you the option to manage key distribution yourself.<\/li>\n<\/ol>\n<hr \/>\n<p><strong>With thanks<\/strong> to Matthew Walker and his team at PassWindow, who consulted with us on the technical aspects of their system.&nbsp; <strong>We plan to purchase ShieldPass service soon.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p><a title=\"PassWindow, a new commercial authentication system\" href=\"http:\/\/www.passwindow.com\/\" target=\"_blank\">PassWindow<\/a> authentication claims &ldquo;<em>unsurpassed security<\/em>&rdquo;&#8230; <a href=\"https:\/\/slyman.org\/blog\/2011\/08\/passwindow\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[210,17],"tags":[332,324,23,328,325,322,321,323,329,330,327,331,333],"class_list":["post-1613","post","type-post","status-publish","format-standard","hentry","category-reviews","category-security","tag-against","tag-attack","tag-authentication","tag-defend","tag-man-in-the-middle","tag-over-the-shoulder","tag-passwindow","tag-photographic-attack","tag-protect","tag-social-engineering","tag-spyware","tag-surveillance","tag-two-factor"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/posts\/1613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/comments?post=1613"}],"version-history":[{"count":8,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/posts\/1613\/revisions"}],"predecessor-version":[{"id":2848,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/posts\/1613\/revisions\/2848"}],"wp:attachment":[{"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/media?parent=1613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/categories?post=1613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/tags?post=1613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}