survey of instant messaging privacy

alex at alten.org alex at alten.org
Tue Jun 10 21:02:15 EDT 2008


[Moderator's note: Please don't send giant run on paragraphs to the
list. They're hard to read. --Perry]

> From: "Marcos el Ruptor" <ruptor at cryptolib.com>
> > Interesting.  Of course, with the possible exception of Skype, 
> > only  the over-the-network part of the communication is 
> > protected.  The  IM providers can still give the contents of your 
> > communications to  third parties.
> 
> As far as I can tell after having reverse engineered its protocol,  
> Skype is actually very well made with a few exceptions that would  
> still be next to impossible to exploit for a street hacker (and 

A year ago when I took a hard look at the Skype login protocol (via public reverse engineering publications, etc.), I determined that the user id to public key binding was fundamentally weak.  If I remember correctly they were vulnerable to at least one attack, a dictionary attack against a password of a user account is possible using the Skype login client-server messages (they can't tell you are attacking since the account name and password are hashed together in the public key/AES encrypted request and you are using one of the well-known 14+ valid Skype public keys).  Their multiple layering of crypto obscures things but with software one can automate the building of the login request encrypted layers fairly easily.  Once you get a valid user cert from the login attack it looks like that account is permanently compromised (I didn't see any user cert validity period).  Because of Kerckhoff's principles there is really no way Skype can prevent this attack (basically they are using the data channel itself to distribute the user certs (with public & private auth keys) to then establish an enciphered phone session over it).   They also have at least one back door mechanism in place, which could be used to quickly compromise a user password.  They allow a user that forgot their password to have it reset and sent to their enrollment email address so that a Tier 1 IDS like Narus could easily scoop it up (this requires careful social engineering).  Also, any SSL traffic to a Skype server can be MITM intercepted (say via a Bluecoat ProxySG appliance) using a ICA cert from a major CA vendor (or internal corporate CA) and any user passwords could be scooped up that way as well.

Thus a retail level wiretap attack against a particular user is quite possible.  Having said that because the 14+ private Skype keys are (only?) stored on their servers, it does not look like a wholesale attack against the Skype system is easy to do (although they did use MD5 in their login algorithm).  However, given this centralization of Skype keys, they certainly could cooperate with any CALEA warrants, etc., by giving police the user certs to be wiretapped (which still requires an active MITM during the setup handshake of the encrypted channel between the two user end-points).  Of course, if physical theft occurs of the 14+ Skype PKI private keys then the whole security ediface will collapse.

- Alex


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list