Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Bug Privacy Education Security

How a Simple Security Bug Became a University Campus 'Master Key' (techcrunch.com) 73

An anonymous reader quotes a report from TechCrunch: When Erik Johnson couldn't get his university's mobile student ID app to reliably work, he sought to find a workaround. The app is fairly important, since it allows him and every other student at his university to pay for meals, get into events and even unlock doors to dorm rooms, labs and other facilities across campus. The app is called GET Mobile, and it's developed by CBORD, a technology company that brings access control and payment systems to hospitals and universities. But Johnson -- and the many who left the app one-star reviews in frustration -- said the app was slow and would take too long to load. There had to be a better way.

And so by analyzing the app's network data at the same time he unlocked his dorm room door, Johnson found a way to replicate the network request and unlock the door by using a one-tap Shortcut button on his iPhone. For it to work, the Shortcut has to first send his precise location along with the door unlock request or his door won't open. Johnson said as a security measure students have to be physically in proximity to unlock doors using the app, seen as a measure aimed at preventing accidental door openings across campus. It worked, but why stop there? If he could unlock a door without needing the app, what other tasks could he replicate?

Johnson didn't have to look far for help. CBORD publishes a list of commands available through its API, which can be controlled using a student's credentials, like his. But he soon found a problem: The API was not checking if a student's credentials were valid. That meant Johnson, or anyone else on the internet, could communicate with the API and take over another student's account without having to know their password. Johnson said the API only checked the student's unique ID, but warned that these are sometimes the same as a university-issued student username or student ID number, which some schools publicly list on their online student directories, and as such cannot be considered a secret. Johnson described the password bug as a "master key" to his university -- at least to the doors that are controlled by CBORD. As for needing to be in close proximity to a door to unlock it, Johnson said the bug allowed him to trick the API into thinking he was physically present -- simply by sending back the approximate coordinates of the lock itself.
The vulnerability was fixed and session keys were invalidated shortly after TechCrunch shared details of the bug with CBORD.
This discussion has been archived. No new comments can be posted.

How a Simple Security Bug Became a University Campus 'Master Key'

Comments Filter:
  • door locks need an public cloud? and no local readers??

    and why put your doors into an public multi client system controlled by an 3rd party vendor? vs some local network system?

    • Who do you think you are? Quit asking sensible questions.

    • I work at a university. The students are petitioning to replace the "archaic" rifd/swipe cards and keys with NFC readers to interact with their phones.
      • Then they'll petition emergency phone chargers when their phones run out of juIce and they can't open stuff.
      • To be fair, RFID and magstripe are both archaic in the sense that they can both be cloned surreptitiously with the right equipment - one of them even at a distance.

        NFC is not very transparent. I don't know if any of the lock implementations actually offer a challenge-response protocol or just present a tag. The latter could be cloned. A door reader that can handle NFC on a phone would also still work with a card with NFC.

        At least NFC shouldn't require a cloud connection to do the unlocking if you're doin

        • by AmiMoJo ( 196126 )

          NFC is just the transport layer (the physical interface) and a very basic protocol that lets the phone decide what app to launch to handle the interaction. The security of the lock is down to the app that handles the lock protocol. It could be as simple as supplying a serial number that the lock checks against a list of authorized ones, very similar to RFID cards.

          • Yes. You repeated me very accurately. The point is, the product box will just say "NFC" and there's no way to know if it's a simple identifier that can be hit by a replay attack or a challenge-response with a shared secret.

        • by pz ( 113803 )

          Neither would a physical key.

          But, hey, you know, mechanical things are considered bad by the young crowd, despite thousands of years of development.

          What, exactly, does using your phone to unlock a door have over using a key?

          • Proper access control. If you leave a key lying around, someone can copy that too. And then put it back where they found it without you ever knowing.

    • How about replacing them by strips of metal that have a unique pattern cut out in them?
      • by Luckyo ( 1726890 )

        Search youtube for lock picking lawyer. Everything sucks, it's just that some things suck more than others.

        Like implementation in the OP.

        • I know of the lock picking lawyer.
          Particularly his Christmas editions are magnificent.

          And indeed, a lock is not to prevent a theft, but it is to ensure that the thing next to it is easier to steal.
      • by Ksevio ( 865461 )

        Then students get a hold of the master key (or figure out how to make one) and they have access to all the doors with no log of entry.

  • I actually had a set of master keys for my university. Could get me into pretty much anywhere steam tunnels, biology labs, dean’s residence. The one place I verified I had no access to was the experimental nuclear reactor on the campus but that wasn’t really that interesting.

    I don’t think an “api key reset” would have impacted it either.

    Thank god social media wasn’t a thing back then!

    • the experimental nuclear reactor on the campus but that wasn’t really that interesting.

      Are you sure??

      • I had a tour of it before it was decommissioned. It was very small, maybe 250kW. Experimental as in "for experiments," not innovative. It was part of the nuclear engineering program. It should have been decommissioned 15-20 years earlier.

    • I also had a few keys that got me into quite a bunch of places I shouldn't have been in back in school. Like you, there were a couple I did try only to find I had no access. The long locked and forgotten 'Isotope Storage Facility' in one of the tunnels under the med school annex was one of them. Probably a good thing.
    • Was this the University of Florida, Gainesville?

      • No; hopefully they don’t need steam tunnels, but what do I know.

        Where doesn’t really matter, when is much more important to society. So happy it was pre-social media and pre cheap CCTV systems. The ability to do stupid things, survive, and not have it be a permanent black mark on your life is really important to growing up.

  • That's what I'm getting from TFA's title, at any rate.

    Microsoft oughtta sue for copyright infringement!

  • I went to a school where the online university directory (for students/staff) used your "student ID number" as a primary database key. The directory gave you everyone's student ID number regardless of whether you even asked for it. This number was worthless, except for the tiny fact that it was also the number encoded on everyone's keycard. It certainly was interesting... i learned my first "real" microcontroller while working on a project that was, erm, related.
  • If I recall correctly Garage doors Luxury cars ATM machines (still happening) Car park (free parking) Remote control of very expensive cars indeed What if there was a fire master key Fire drill master key Personally I am fed up with locksmiths 'owning' duplication rights and charging 5 times normal to cut a simple key. As in many apartments, sniff and replay works a treat.
  • This reminds me of Clifford Stoll's book Cuckoo's Egg, which I can heartily recommend! The book explains how he went from tracking a 75 cent anomaly in the university's compute time bookkeeping history to ever grander scale events.
  • Did they fix the location spoof? Can't imagine how you would do that with an internet-controlled lock and an adversary-controlled client.
  • This sounds like it should have been caught in even the most basic testing. It doesn't matter that they fixed this one bug, they obviously don't test their software much. Their QA probably consists of a demo to managers - "Look, the door opened after we hit the button. It's perfect, ship it!". If they don't test for something as simple as a wrong password, that means they have no test process, therefore I doubt they check for any security holes either. Based on just this bug being shipped, I would not use t
  • by Viol8 ( 599362 ) on Friday March 04, 2022 @05:48AM (#62325121) Homepage

    Back when I was in uni in the 90s we had these things called "locks" on the doors. If no one was in the labs they were locked. Wanted to buy a meal? Cash or card was your friend. Wanted to get into your room? Remember your key. What the fuck is this rush to app-ify everything even when its clearly impractical (bugs, phones can be lost/stolen, not everyone even amongst the young has or wants a smartphone) when there are simpler solutions that Just Work?

    • Re: (Score:3, Insightful)

      by langedb ( 518453 )
      The reason large places like universities moved to electronic locks was for the cost savings. With the old brass-keys, you needed a lock shop and a decently sized staff of locksmiths. Lose a dorm room key? Not a big deal, send the locksmith out to re-core the door & give the student a new key. Lose a key that opened a lot of doors & a lot of folks had access to? That's expensive as all the doors now need re-coring and new keys need to be cut & distributed. It takes a lot of time, energy, p
      • by qubezz ( 520511 )
        Which also demonstrates the fault in dumb master keying. If there is a master key, the code for that master key is in every single lock, just two screws away. Students have 10 minutes of spare time on their dorm room door and a blank, they can make the master.
    • Because a survey revealed Iphones lines in womens jeans made them feel more confident, and 'bulky' keys in their pockets ruined the clothing lines and look generally. Secondy it was a barrier to getting into their rooms, as one hand was firmly welded to their phone and social media,, and you could not open the handbag to get in. Whereas a toggle to an app seems obvious. Stalkers approved as well, the mark was always tracked, and phone traffic revealed their whereabouts.
    • Keys are easier to hack than phones. You can buy a key blank for most locks for dollars, file it down to a 'bump key', and it will unlock almost anything.

      The most effective and secure way to do doors (besides a human guard) is:
      1) an NFC reader lock with feedback confirming it opened,
      2) The lock has a escalating time out for every false reading.
      3) Have the NFC transmitter automatically change the combination every time it succesfully works. So if someone clones it, then either their clone will not work or

      • by Viol8 ( 599362 )

        No lock is unpickable but magnetic keys can't be replicated using a standard blank so beyond the scope of 99.99% of students to make a dup.

        Also you have to ask yourself if the electronics is worth the hassle and cost since few standard door locks can withstand a sledgehammer or even a well placed kick and if someone really wants to get in they will anyway.

        • You got a point about the kick. But the main use of locks is two fold a) discourage casual crime and b) inform you that a crime has been committed when you find the lock/door broken.

          Also magnetic keys are mostly hype. Many of the so called magnetic locks can be opened with a refrigerator magnet. Some need to also throw in a bump key.

    • Back when I was in uni in the 90s we had these things called "locks" on the doors. If no one was in the labs they were locked.

      Sounds like an actual security nightmare, or one of those archaic institutions which require students to be supervised at all times like little children.

      I'm glad we're not in the 90s anymore having facility managers doing something as archaic as managing physical keys. What next, you complain about the fact we can send an email rather than have our receptionists type a letter for us as we dictate while smoking a cigar like the good ol' days?

      There's a reason keys aren't used for access management at any faci

      • Back when I was in uni in the 90s we had these things called "locks" on the doors. If no one was in the labs they were locked.

        Sounds like an actual security nightmare, or one of those archaic institutions which require students to be supervised at all times like little children.

        Sigh. Typical slash-dotter "(reasonable thing to do) is ridiculous and oppressive because seems bad to me though I have not given it any thought at all" response.

        Even the touching "absolutely all students are totally trust worthy and would never steal or break anything" faith (did you actually encounter many students in your life?) assumes that the entire building is locked with no access by walk-ins. Requiring everyone who might need to enter a building to have their own key (remember this is still mechani

    • What the fuck is this rush to app-ify everything even when its clearly impractical (bugs, phones can be lost/stolen, not everyone even amongst the young has or wants a smartphone) when there are simpler solutions that Just Work?

      Keys and wallets can be stolen, lost, or misplaced just like phones.

      Not that those other systems were simpler either... Key management on the scale of something like a university is a pretty good sized job all on it's own. Ditto the cashiers in school cafeterias. It's not that the

    • by hecky ( 445344 )

      There is some incentive to track things like who unlocked which doors when, and to be able to instantly revoke access to specific areas of campus under certain conditions (such as a lockdown). Keys don't do that. Moreover, keys present a security hazard that is difficult to address when they are lost or stolen -- especially when the keys allow access to a building rather than to a single dorm room.

      The real question is whether locking or unlocking doors ought be done with a chipped student ID card (as is cur

  • You know how you have to take lessons, pass a test, & get a licence to drive a car, be a dentist, et,.? Why not do the same for IT security, i.e. licence security engineers & certify systems? It could be voluntary at first & then gradually mandate it from the most critical infrastructure systems & on down the list until it covers everything it should. This is all easily preventable stuff if there are widely known & required 'best parctices.'
    • The entire security industry would likely fail this - go and look at the https://www.youtube.com/c/lock... [youtube.com] it shows that physical locks have not improved in 100 years and are quick and simple to open without a key ...
      The new Digital locks are laughed at and bypassed with tricks conventional locks mostly stopped 100 years ago but also new tricks ... they amazingly are less secure

  • by v1 ( 525388 ) on Friday March 04, 2022 @08:15AM (#62325307) Homepage Journal

    It astounds me how anyone thought this was a good design to use.

    It must have been designed entirely by a single person, because there's just no way even a small team could have looked at that and said, "yeah, thats secure." someone would have raided a hand and said "but couldn't just anyone do that?"

    • "but couldn't just anyone do that?"

      I feel like hubris may speak to this. I've met an unfortunate number of programmers who think they are gods gift and that their abilities are something that objectively can't be replicated.

  • "failure to authenticate" isn't a bug. It's a fundamental desgin flaw.

    But unlike say, "forgetting to actually unlock the door", it's a failure that wasn't immediately obvious to the end users.

    And I think that's a problem with security. We rarely SEE it in action, and just expect it to be there and doing its job. GOOD security is practically (or completely) invisible to the end user. Which makes it look exactly like bad (or non-existant) security, and allows it to go undiscovered for a long time before s

  • Buy schlocky products make students use them daily and watch creme of the crop emerge. Universities issue tuition to level up for next semester.

  • You tossers! You had ONE job to do.
  • Wow. Requiring a cell phone to open doors? That's just stupid. Obviously consumertards love it.

    So this is what they are teaching at schools these days - how to love toy cell phones?

    Yeish.

  • Some hotels now allow room unlocking via phone.

    Who's the guest in your room?
  • This sounds like a bug that I'd fix from the 1980s.

    Same mistakes over and over again.

"The medium is the massage." -- Crazy Nigel

Working...