[alt.security] Modem backdoor passwords

smith@sctc.com (Rick Smith) (04/10/91)

I had posted a note decrying the existence of backdoor passwords in
dialback modems.

In article <1991Apr5.215301.13807@netcom.COM>
gandrews@netcom.COM (Greg Andrews) wrote:

>Access to the modem wouldn't compromise security on the computer ...
>... unless the computer has no security at all.

And sw@ (Steve Warner) wrote:

>There is little security risk in this though as all the computers
>connected to these modems have secondary password queries.

The basic question is *WHY* would someone buy a dialback modem in the
first place? Yes, computer systems are pasword protected. For many
users (academic classwork and research machines, for example) this is
sufficient. However, if you are protecting something serious or pricey,
you often want something more than generic authentication techniques.
As we all know, *nobody* has ever had their password compromised ;->

The purpose of dialback security is to prevent dialins from
arbitrary locations. The existence of a backdoor password eliminates
the the dialback modem's whole purpose as a security product. Anyone
with the backdoor password can bypass the dialback security that the
modem was supposed to provide. How many of those backdoor passwords
are floating around pirate BBSes already?

The thing I find most annoying is that the backdoor password doesn't
provide any features that couldn't be provided securely. At least
there could be a DIP switch that enables/disables the master password
so that you had the option to be really secure. Or else the DIP switch
could enable some magic mode for tweaking the modem via its serial
port. On the other hand, giving dialin access to the guts of the modem
means that any wily cracker out there could come and play with your
modem. Secrets (like ROMmed-in passwords) don't remain secret for long.

BTW, does anyone have a list of dialback modem manufacurers who do
and don't have backdoor passwords?

Rick.
smith@sctc.com    Arden Hills, Minnesota

gandrews@netcom.COM (Greg Andrews) (04/12/91)

In article <1991Apr10.150745.4628@sctc.com> smith@sctc.com (Rick Smith) writes:
>
>The basic question is *WHY* would someone buy a dialback modem in the
>first place? Yes, computer systems are pasword protected. For many
>users (academic classwork and research machines, for example) this is
>sufficient. However, if you are protecting something serious or pricey,
>you often want something more than generic authentication techniques.
>As we all know, *nobody* has ever had their password compromised ;->
>

I don't see modem password security (whether dialback or pass-through) as 
a big benefit for most computers, since they would already have security 
measures built in.

It can be useful for other types of devices that wouldn't otherwise have
security measures.  One example that was pointed out to me is computer
controlled radio transmitter gear located next to the antenna on a remote
hilltop.  The engineers at the radio station want to dial in and tweak
the transmitter, but it was designed for a dumb terminal in a locked room
so there's no password security built in.  Modem security would let the
engineers sleep without nightmares about 14-year-old modem jockeys finding
the number and pulling the plug...

>
>BTW, does anyone have a list of dialback modem manufacurers who do
>and don't have backdoor passwords?
>

Telebit doesn't use a password scheme for remote access.  Set S45=0 and
it is disabled.  I haven't double checked myself yet, but I believe that
the security register (S46) can't be changed through remote access even
if remote access were enabled.


-- 
.------------------------------------------------------------------------.
|  Greg Andrews   |       UUCP: {apple,amdahl,claris}!netcom!gandrews    |
|                 |   Internet: gandrews@netcom.COM                      |
`------------------------------------------------------------------------'

paulh@cimage.com (Paul Haas) (04/15/91)

In article <PTTe13w164w@dogface>  writes:
>   ...     From what I've seen and read, good dialback security isn't a
>one modem product, anyway.  One modem answers and passes you through to
>a security front door, which has your account info and callback number.
>When you pass the test, it uses another (auto-answer disabled) modem to
>call you back.  If somebody hangs on the outbound modem line (by calling
>in repeatedly until they catch a phone dialing out and then sending an
>answer-style carrier) then they have normal password security.  To avoid
>this, the outbound modem should terminate the call if it doesn't detect
>dial tone.  This assumes that your CO or PBX provides a recognizable dial
>tone.
>Anyway, what I just wrote is more alt.security material, I'll bet.
>-- Bob

The modem doing the spoofing could present a fake dial tone.  A better
solution is to get a dial-out only phone line from the phone company.
When the bad guy's modem calls the dial-out number they would get one
of those fine Bell System messages telling them that they can't call
this number.  I've mostly seen it used for payphones.

If the phone company in your area doesn't provide such a service, use
call forwarding.  The important thing is to make it so that under no
circumstances can anyone call into the dialout modem in the callback
pair.

---
Paul Haas paulh@cimage.com

tneff@bfmny0.BFM.COM (Tom Neff) (04/18/91)

If and when Caller*ID becomes universally available, it might be
superior to callback for modem security.  If the caller's number isn't
on your approved list, don't accept the login.  (Further, only accept
certain classes of login based on the caller number's security
classification, etc.)

Issues of ID masking and so forth would be moot.  Personal voice callers
may (and, I personally think, should) have the right to some anonymity
for the sake of a free society.  But secure corporate telecommunications
is a different matter -- if you want access to a secure system, the
telco line you use to do it ought to be traceable.
-- 
    For the curious:            +---+     Tom Neff
Here's what RS-232 pins do!   ==|:::|==   tneff@bfmny0.BFM.COM
       -- Inmac                 +---+     uunet!bfmny0!tneff