Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

The Keyboard That Could Phone Home 287

An anonymous reader writes "University of Pennsylvania researchers have developed a keylogger they call the JitterBug that can modulate passwords or other information into normal traffic by adding imperceptible delays to keypresses as people use keyboard and network-intensive apps like telnet and remote desktop. The idea is that the delays in keypresses cause delays in packets, and data can be encoded in those delays. There's no software or extra network activity that the victim can see, but anyone who can see the traffic (even if it's encrypted) could grab the data. Here's the scary part: the researchers say that it could be manufactured into a keyboard, making these keyloggers widespread and virtually undetectable."
This discussion has been archived. No new comments can be posted.

The Keyboard That Could Phone Home

Comments Filter:
  • by Saint Aardvark ( 159009 ) * on Tuesday August 08, 2006 @07:22PM (#15870529) Homepage Journal
    ...by adding your own random jitter to outgoing packets? I'm thinking of something like an option in OpenBSD to do this for all TCP connections, say.
  • manufactured (Score:5, Insightful)

    by Anonymous Coward on Tuesday August 08, 2006 @07:24PM (#15870542)
    Couldn't any kind of virus or malicious "software" be manufactured in to many different hardware. It's the trust and accountability we have in companies that keeps this from happening in general. It's kind of crazy we would have to worry about something like that...
  • Huh? (Score:5, Insightful)

    by tgd ( 2822 ) on Tuesday August 08, 2006 @07:34PM (#15870609)
    Who uses telnet? And if they are, sniff the damn packets directly.

    And RDP is not a keystroke-per-packet, 100% of the time. Neither is SSH. Without that, you couldn't make any assumptions about the data you may have missed.

    Encryption latency, packet retransmissions upon collisions at routing equipement... there are 1000 reasons outside the lab this wouldn't be even remotely useful for tracking activity off the desktop, and there's way easier ways of doing it on the desktop.
  • by jumpingfred ( 244629 ) on Tuesday August 08, 2006 @07:37PM (#15870631)
    On a more serious note though..
    I always thought it was easier to just torture somebody for the password?

    Often times it might be nice to get the password without the victim's knowledge that the password is compromised.
  • by Anonymous Coward on Tuesday August 08, 2006 @07:40PM (#15870653)
    Well the bug could wait until a stream of network activity commences (say downloading a file), and hijack that stream as a timed channel, but I still fail to see how the bug could communicate with a remote machine to which the stream of packets were not already destined. It would require a 'man in the middle' such as a compromised router or active sniffer on the network to use this.
  • Very limited (Score:5, Insightful)

    by stienman ( 51024 ) <adavis&ubasics,com> on Tuesday August 08, 2006 @07:43PM (#15870665) Homepage Journal
    It would only work when the pressing of a single key causes the generation and transmission of a packet. Telnet is what they talk about, but most terminal programs would be vulnerable. Connecting to a mainframe is obvious, but you'd have the same problem with windows remote desktop, any remote client programs, etc. The SSL telnet program send passwords as a single packet, so that would prevent transmission of information during the password phase, but would not prevent it during interactive use.

    Normal websurfing, email, and desktop applications run on the computer itself (instead of remotely) would not pass any usable jitter information.

    Ajax web based applications could be vulnerable if they generate packets each time a key is pressed. Not many do this, but more will as time goes on.

    The key problems are:
    1) It can, at best, transmit 1 bit per keypress
    2) All of the intelligence would have to be in the keyboard for deciding *what* to send.

    Further, I haven't read the paper, but I don't see how this would work unless the user's typing patterns are very well known to the program, or the jitter introduced is significantly greater than 1/2 the average keypress to keypress time. This would be noticable to most people, though they would get used to it. This could be adaptive though, if you know that a particular keyboard is used by one user, and the keyboard spends a significant amount of its bandwidth on known patterns.

    Also, the keyboard cannot query the computer - the only information it could gain is what is typed in it. And since it could only get 1/7 of the possible information that's typed in (or perhaps 1/3 if good compression is used) then it wouldn't be able to get very much at all.

    All in all, it seems like a cool trick, but like tempest it requires some fairly specific conditions. For most things there are other ways that are likely easier, less detectable by the end user, and more informative than this one. But under appropiate conditions, it could be just the ticket.

    -Adam
  • by sploxx ( 622853 ) on Tuesday August 08, 2006 @07:54PM (#15870719)
    Maybe this is obvious, but anyway:

    This is also another reason for 100% open source code for any important part (which you use to transfer confidential information) of your computer.

    Especially for low-level parts like device drivers. Stallman wanted to have a free printer driver. Remember the yellow dots??

    I hope this is something which makes the closed source WLAN (it's working, it's ok) fans
    a bit quieter.
  • by FhnuZoag ( 875558 ) on Tuesday August 08, 2006 @08:00PM (#15870750)
    No, you can't get around this, because if it's built into the keyboard, then it's a hardware thing, and any software based solution will be insufficient.

    But really, this whole issue is stupid. Built into the keyboard? WTF? If you allow a hostile agent to install hardware in your computer, then having a keylogger is the least of your worries. Where's the alarmist article about the possibility of keyboards with built in hand grenades?

    The system is also overcomplicated by far - for one, you are relying on people using telnet and remote desktop, which most home users do not. What advantages, if at all, does this tech hold over just modulating in delays with conventional traffic (e.g. HTTP requests)? Or other known systems of steganography? And don't forget that telnet is unencrypted in any case.
  • by tji ( 74570 ) on Tuesday August 08, 2006 @08:01PM (#15870754)
    Maybe it's a proof of concept, or thought exercise, but I think there would be many hurdles against actually using this. Such as:

    - Discerning keyboard delays vs. user typing delays.
    - Discerning keyboard delays vs. network latency variability.
    - Getting the user to connect to a remote host using a direct keyboard interface like telnet. The much more common WWW connections do not expose keyboard input speed, the input is sent as one big request (unless you run some java app, or possibly other active code in the browser).
    - Compromising the network connection or destination host to expose the keyboard traffic.

    I'd say there are a whole lot of more likely exploits that are higher on my list of things to look out for.
  • Re:{sigh} (Score:4, Insightful)

    by Elemenope ( 905108 ) on Tuesday August 08, 2006 @08:03PM (#15870767)

    I was thinking about that myself. I'm no Luddite, but it seems to me the inexhorable march of advancement is fast outstripping any hope of catching up with social and cultural adaptation. Stuff like this makes me think "Why would anyone (legitimate) do this? Just to see if they could?" It seems like a stupid justification.

    But then, isn't it stupendously better for this type of danger to show up in an academic paper, for all to see and think about how to counter, rather than spooks, foreign spooks, or some black hat with an attitude being able to use it surreptitiously for a long, long time because nobody else thought about it or publicized it?

  • by bhmit1 ( 2270 ) on Tuesday August 08, 2006 @08:03PM (#15870771) Homepage
    SSH already went through the debate of timing style attacks and came out fine: http://www.ssh.org/company/newsroom/article/204/ [ssh.org]. Additionally, web forms aren't transmitted until you hit submit. So you need some interractive session to monitor to detect something like this. The article mentions telnet, which, if you're going to sniff to detect packet timing, you might as well watch the packets themselves. When you get into something that is encrypted and interractive, wouldn't there be enough random jitter from the encrypting and other data, like mouse position updates when you have remote GUI's, to make this very difficult without creating so much jitter to be obvious to the user that the keyboard is screwed up?

    Implementation wise, the article lacked detail, so it's time to guess what's involved. You can't simply add a fixed number of ms to each key. What you need to do is have a timer that you are always offsetting from. Otherwise, the time that the user takes to type a key would be added on to the keystroke jitter, making it useless. Say you only watch 90 keys, giving you up to 90X, where X is some measurable time. The timer would also need to be 90X, meaning that you really have a maximum possible delay of 180X. With a CPU context switch (this is an interactive user), encryption processing, and physical network delays, I'm guessing that X would have to be several ms to be detectable. That would make the maximum time, even with only a 3ms X, over a half second in the worst case, which a user will certainly notice. Of course you can reduce the number of keys that you monitor, I picked 90 because it made the math easy and eliminated the F1-F12 keys. But anything over a couple 1/10s of a second will be noticable.
  • by frovingslosh ( 582462 ) on Tuesday August 08, 2006 @08:24PM (#15870852)
    Sure, you could add your own jitter, but it's not really needed. My bullshit detector went off right as I hit the text reading "adding imperceptible delays to keypresses as people". Come on! People add their own imperceptable delays to keypresses, particularly when typing passwords. Other system and network activity adds timing discrepencies to packets that would mask this "jitter". And in most cases when a password is sent, it is sent in a packet, not as individual packets for each character, meaning that the keyboard can't really influence the between letter spacing at all. Plus the keyboard has no comprehension of what is going on upon the screen, it has no way to know if what is being typed is a password or not, so there is no way it can detect and specially encode passwords, it would have to somehow influence the system in a way that allowed it to encode every single keypress as this magic keypress jitter. Because of other packet "jitter" already affecting traffic, I don't believe it could even work if robots were doing all the typing, but certainly not for humanas.

    Sure, there is valid reason to be concerned about spying hardware and software being built into computers.But unfortunatey bullshit hype like this just clouds the issue, when it is finally discredited it will just make it that much harder for people who are warning of valid concerns.

  • by adrianmonk ( 890071 ) on Tuesday August 08, 2006 @08:34PM (#15870883)
    I RTFA'd and I don't see how this would work with regular, semi-random typing -ie. I may 'sit on a character' while I space out or think about what to type next -or try to find the next key....

    There may be several schemes that would work, but here's the simplest one I can think of off the top of my head. Basically, you figure out what the maximum delay that can go unnoticed is, and you buffer keystrokes for that length of time. For example, if you determine that nobody ever notices when a keystroke is delayed 100 ms, you buffer keystrokes for that long.

    Now, if during that period of time you get multiple keystrokes, then you spit the keystrokes out of your queue with a predefined timing. If you want to send a 0, you might send the first keystroke out, then wait 50 ms, then send the second. If you want to send out a 1, then you might wait 75 ms between the keystrokes. So basically, you get opportunistic about it. Only if you have two keystrokes in a short period of time do you try to encode data in the timing.

    But of course there will be times when the user is typing slowly, and you don't get 2 or more keystrokes in a short interval, but you still have to send them out. The solution to that problem is easy: if you aren't trying to send a 0 or 1, just make sure you never send out any keystroke sooner than 100 ms after you sent the last one. Now you have a system where (at the remote end), if you see two packets arrive about 50 ms apart, that's a 0, and if you have two arrive about 75 ms apart, that's a 1, and if you have two arrive about 100 ms or more apart, that's no data (a no-op).

    And of course you want all kinds of redundancy built in because the network and the TCP/IP stack and the operating system will add lots of noise and corruption to your covert data stream, so you'll have to piece it back together. But that's an easy enough problem provided you don't mind reducing the bandwidth even further than what it is already is.

    Oh, speaking of bandwidth, you can probably encode more than one bit per keystroke pretty easily. Coincidentally enough, today I was observing network latency between two sites about 1000 miles apart, and I noticed that even though the latency was usually around 70 ms, the standard deviation seemed to be much lower, down around 2 or 3 ms. So in this case, depending on how much you want to delay things (you can't delay things so much that an average typist can outpace you!), you could use one of a set of several different delays between keystrokes. You might encode 3 bits by doing intervals spaced 5 ms apart. So, 50 ms for 000, 55 ms for 001, 60 ms for 010, 65 ms for 011, ..., 85 ms for 111, and 110 ms for no-op. (Things get complicated, but I'm assuming you'd want a bigger gap between no-op and the others since no-op will occur very frequently.)

  • by spagetti_code ( 773137 ) on Tuesday August 08, 2006 @08:48PM (#15870928)
    The government of the USA has already shown a proclivity [usatoday.com] towards [wired.com] watching [infowars.net] its [zmag.org] citizens [eff.org]. To be fair, this phenomenon isn't [geek.com] limited [silicon.com] to [spy.org.uk] the USA, but Bush has taken it to new levels.

    We now know that the government secretly had printer manufacturers embed hidden ID codes on printer's output [eff.org], thereby removing any possibility of anonymous document creation.

    I wouldn't be surprised if some enterprising Bush-ite didn't see the possibility here of having *every* keyboard manufactured with some form of this technology embedded. Imagine if the government could tell what you were typing just by listening to your traffic.

    Think of the terrorists we could stop! Think of the children!
  • by MajinBlayze ( 942250 ) on Tuesday August 08, 2006 @08:58PM (#15870973)
    Except that something like this wouldn't have to go into a driver. It could be a chip built into the keyboard, and as you type it adds a short delay. reading that delay is how it would work.
  • by Reziac ( 43301 ) * on Tuesday August 08, 2006 @09:16PM (#15871058) Homepage Journal
    I'm wonder if Treach^H^H^H^H^H Trusted Computing (the TC chip in the computer itself) might *prevent* a software solution from interfering with a compromised keyboard...???

  • bullshit (Score:2, Insightful)

    by nazsco ( 695026 ) on Tuesday August 08, 2006 @10:30PM (#15871287) Journal
    let's assume microsseconds delays in packets to transfer data. riiiiiiiiight...

    they should market it as a replacement for tcp/ip for real time applications rather then a scriptkiddie wet dream's keyloger.
  • Re:Hmm... (Score:3, Insightful)

    by coaxial ( 28297 ) on Tuesday August 08, 2006 @11:36PM (#15871473) Homepage
    With Communist computer, keyboard spy on YOU!

    In freedom loving countries, keyboard KEEPS YOU SAFE!

    Be afraid! Or the terrorists' goal to make us change our lives and live in terror will succeed!
  • Re:Hmm... (Score:3, Insightful)

    by megaditto ( 982598 ) on Wednesday August 09, 2006 @12:49AM (#15871674)
    Hey, I wonder if NSA/AT&T used Chinese boxes to wiretap citizens?

    Warrants or no warrants [eff.org], but as a patriot, I sure hope they use 100% American?
  • Mod parent up. This was my immediate question as well, and I still haven't heard it answered.

    If you want to encode information into the delay between key-press packets, then you need to make the delay significantly longer (at least a few standard deviations) than the average difference between two keypress packets.

    People don't type at exactly the same rate, so if the delay in between keypresses varies (I'm making up numbers here) between 100 and 150 ms, then you need to make the introduced delay greater than 50ms.

    Alternately, you could buffer all of the incoming keystrokes in the computer, and send them out at a constant rate (say exactly 100ms apart); then you'd only have to add a small delay to them in order to encode information. But unless the packets are being buffered and sent out in such an orderly fashion by the host system already, it seems like this kind of behavior could be easily picked up on, because it would cause a delay of at least a few keystrokes in an interactive system (if there's one packet per keystroke and you're queueing and buffering a few packets at a time). I'm sure there's probably some nice mathematical formula for the amount of transit time you'd add (from the time the key goes down to the time it's received by the host system) as a result of buffering out all the variation in the timing between packets ... I just can't think of it right now.

    Ultimately though, I don't see any defense against an attack like this. If someone can compromise your hardware, particularly your input devices, you're quite screwed. I've always seen it as an extension of the 'local console root' rule: if someone can get to the CPU, then they have root. I guess we've got to extend this to keyboards, mice, and monitors as well: if you don't know where everything that you pass unencrypted information through was last night, maybe you shouldn't be using it.

    Messing with the delay is only one of many ways that someone could sneak information out of an area -- it's neat, technically, but there are a lot of low-tech ways that would work just as well (including the audio recorder trick from a while back, where you can determine a typed password by listening to a recording of the keypresses).

    If you only wanted a system that would work once, you could build a more powerful keystroke-recorder into a keyboard. Instead of having it mess with the delay, make it wake up the computer in the middle of the night (logging on -- it's not hard to grab your password on a Windows box, since it's nicely defined as the first thing you type after pressing Ctrl-Alt-Del and before return), and then executing a macro that emailed a recording of everything that had been typed recently to a dead-drop.
  • by dustman ( 34626 ) <dleary@[ ]c.net ['ttl' in gap]> on Wednesday August 09, 2006 @01:41AM (#15871782)
    A) It can 'transmit' any data it wants along the connection from the keyboard to the computer, encoded in the timing of keypresses. For example, it could transmit a keypress every 2ms max. If the keypress is transmitted on an odd ms, then the bit being transferred is a 1, otherwise it's a 0. This scheme seems a little naive, but it's a simple example.

    B) Some programs send packets interatively, on keypresses. As the article says, programs like SSH, and remote deskop.

    So, if you design your transmission protocol to be resilient enough to handle the noise introduced by all the processing between the keypresses hitting the computer and the computer transmitting a packet, as long as the packet transmission is still tied to the keypresses, you could eventually transmit information along this 'channel'.

    Now, the issue is just deciding which information to transmit.
    You could easily just dump its entire buffer over and over.
    Since this channel will probably be pretty slow, however, you might want to code "password detection" heuristics into your algorithm, so it can try to only send passwords, or at least send them first. A simple heuristic I thought of off the top of my head just now: A sequence of characters that does not form an actual word, but is repeated several times per day/week is probably either a password or a recurring typo. Send these sequences first.
  • by frovingslosh ( 582462 ) on Wednesday August 09, 2006 @02:26AM (#15871888)
    That makes no sense at all. Remember, and this is something that you seem to be completely ignoring, This is a keyboard, it sends keystrokes to the motherboard, it does not send packets to the Internet! Packets would be sent by some software that was in the computer after the keystrokes are reeceived. SO, ok, lets pretend that the keyboard can indeed slightly delay packets and know how long ago in milliseconds it was since the last key press, even if it was several minutes. Then yes, the keyboard could convey one bit of data with each keypress. But it can only convey it as far as the local computer that is receiving keystrokes. If that computer is not in on the game and is not running special software to detect the delays, then this whole thing is meaningless! And if it is compromised, then there are far simpler ways to capture and send passwords than to have a hardware hack keyboard that uses this bogus "jitter" nonsense.
  • by jimicus ( 737525 ) on Wednesday August 09, 2006 @03:41AM (#15872009)

    Remember the yellow dots

    Yes. They're in the firmware of the printer, not the driver, so a free printer driver wouldn't make much difference in this case.
  • by Eivind ( 15695 ) <eivindorama@gmail.com> on Wednesday August 09, 2006 @04:54AM (#15872159) Homepage
    That's not nessecarily true, it depends on the preciseness of your timing, and the aditionally introduced jitter that you cannot control.

    An example.

    Assume a user types a character on the average every 100ms.

    If you could time to the ms then you could encode 2 secret bits on each packet by delaying the packet by 0,1,2 or 3 ms

    Decoding the stream would be a simple matter of taking the sequence of delays and run mod4 on them.

    If noise made this impractical (i.e. single-ms timing is impossible) then you could do the same thing by adding 0, 10, 20 or 30 ms delay to every packet, using delay mod 10 for decoding.

    The delay you need to add is completely unrelated to the typing-speed of the user. It is related only to the accuracy with which you can cause and measure delay.

    If the user pressed a single key once an hour, you could *still* delay that packet by 0, 10, 20 or 30ms and thus transport 2 "hidden" bits. The only assumption being that you can cause and measure delay accurately enough that you can detect which of the 4 happened.

  • by ebvwfbw ( 864834 ) on Wednesday August 09, 2006 @08:12AM (#15872606)
    I used to be a nay sayer for doing away with passwords. However it seems clear that we will have to do away with them one day and rely on something we have (a device - USB drive, RSA secure-id, etc) rather than something we know (a password). Perhaps a combination of the two will eventually win out - something we have and know.

    Lost your device? Just answer what your dog's name is (Cujo) or what you wanted to be when you grew up (Convenience store attendant, just like Apu).

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...