Weak Crypto Keys Fixed

Monday, October 29, 2012 @ 02:10 PM gHale

Google and other Internet companies use weak cryptographic keys for certifying the emails sent from their corporate domains, a weakness spammers and phishers could easily exploit, said Zach Harris, a Florida-based mathematician.

Harris discovered the flaw almost by chance after receiving an email from a Google job recruiter. Doubting its authenticity, he checked the email’s header information, and it seemed legitimate.

Windows Help Files an Attack Vector
Apple ID Phishing Scam
Phishing Attacks Elevate
Most Common Spear Phishing Word

He did notice, however, the DomainKeys Identified Mail key the company uses for the google.com emails was only 512 bits long and, therefore, crackable within days with the help of cloud computing, according to a report in Wired.

Believing this to be a recruiting test that all who want job consideration must pass, he decided to crack the key and use it send emails to Google’s two founders, making it seem to each of them like it was coming from the other but also including his email address in the return path.

Having received no reply in the next few days from either of them or from the recruiter that first contacted him, he began to doubt his initial impression and went to check Google’s cryptographic key.

He then found it changed to the standard length, leading him to conclude that Google had not, obviously, been aware of this vulnerability until the moment they received those emails.

His interest piqued, he poked around to check whether other companies, online services and social networks were vulnerable to the same attack, and discovered that PayPal, eBay, Apple, Amazon, Twitter, and others, including several banks, were using 384 bits, 512 bits, or 768 bits keys.

The good news is since his discovery he contacted all of those companies with this information and most have already issued new keys for the domains and revoked the old ones, in order to thwart potential phishers.

The bad news is that he found a similar flaw in the receiving domains, which often accept test DKIM keys, verifying the emails as legitimate instead of as unsigned.

US-CERT issued a warning about the issue, advising system administrators to check the length of DKIM keys, to replace them (if needed) with 1024 bit or longer keys (particularly for long-lived keys), and to configure their systems to not use or allow testing mode on production servers.

Leave a Reply

You must be logged in to post a comment.