[comp.virus] PKZIP Auto-Verification feature..

USERQS88@SFU.BITNET (Charles) (12/05/90)

There seems to be a common misconception floating around that just anybody
can use the auto-verification feature of PkZip.

This just isn't so!

In the documentation that comes with PkZip, it states that you have to get
in touch with Phil Katz, and give him some information about your company's
name; he will then send you a corresponding verification key that you
apply to the programs you are pkzipping..  This key is kept private, so in
effect, the whole system is a public-key cryptography system.

Someone mentioned earlier that a trojan version of PkZip was released by
someone.  This trojan version reported that the auto-verification key was
correct, and the software was intact.  There are two ways this could have
happened:
   1) The correct verification key was discovered, allowing any zip file
      to be stamped with Phil Katz's own signature, in which case, I'd be
      worried about the security, or...
   2) The self-extracting archive was modified to ignore the signature, and
      report "All's well!".
The second method can be tested by using PkZip 1.1 to test the signature,
instead of 'PkZip 1.2' (the trojan version).

Does anybody know the workings of the AV system, or more importantly, how
big the signature is, and whether two different signatures produce the same
result?

And as an aside, does anybody know how secure the PkZip encryption method is;
since the US Government insisted on the encrypting version of PkZip staying
within the boundaries of the US, one would suspect that it is pretty good.

>From the desk of: Charles Howes
  USERQS88@SFU.BITNET - USERQS88@cc.sfu.ca  (Expires soon)
  c275387@csil.cs.sfu.ca  (ditto)
In Canada, 1-604-531-5623  (Will never expire!)

Note: Students don't have opinions.  :-)
 Simon Fraser University, Burnaby, BC, Canada

dave@tygra.ddmi.com (David Conrad) (12/07/90)

There's another way the Authenticity Verification of PKZIP might have
been fooled, though I doubt it was done this way, for reasons given
below.

As far as I know, PKUNZIP simply checks to see if the unzipped file
contains the same encrypted key that the file was originally zipped
with.  Thus, the trojan author could have gotten a valid serial number
from PKWARE and zipped the file with it.  Upon unzipping a message
would be displayed that the file was authentically made with *A VALID
SERIAL NUMBER*.  Not necessarily the right serial number.  Does anyone
know if the Name associated with the serial number is displayed upon
unzipping so that the user can confirm that the data was not just
zipped by *someone* with an AV serial number, but by the person whom
the user expects to have zipped it?  I can't check this myself as I
only have the export version of the software.  (Silly damn NSA....)

I presume, however, that the folks at PKWARE could determine which
serial number was used to zip the file, even if the current version of
their software doesn't display this information upon unzipping (well,
of course it wouldn't display the serial number, I meant to say the
name), thereby nabbing the culpret.  This seems almost too obvious.
Has this been considered?  It would be awfully funny if whoever did
this had given themselves away thinking they were clever enough to
outwith the AV.
- --
David R. Conrad | Domain: dave@tygra.ddmi.com | Path: uunet!tygra!dave
"Save the strong, lose the weak.  Never turnin' the other cheek.  Trust
nobody, and don't be no fool.  Whatever happened to the Golden Rule?"
                         -- Stevie Ray Vaughn
- --
=  CAT-TALK Conferencing Network, Computer Conferencing and File Archive  =
- -  1-313-343-0800, 300/1200/2400/9600 baud, 8/N/1. New users use 'new'    -
=  as a login id.  AVAILABLE VIA PC-PURSUIT!!! (City code "MIDET")        =
   E-MAIL Address: dave@DDMI.COM