{"id":4080,"date":"2014-06-20T21:48:04","date_gmt":"2014-06-21T03:48:04","guid":{"rendered":"http:\/\/royceeddington.com\/?p=4080"},"modified":"2014-06-20T21:48:04","modified_gmt":"2014-06-21T03:48:04","slug":"a-serious-question-to-the-nsa-about-snowden-and-master-passwords","status":"publish","type":"post","link":"https:\/\/royceeddington.com\/?p=4080","title":{"rendered":"A serious question to the NSA about Snowden and master passwords"},"content":{"rendered":"<p>If anybody from the NSA reads this, I have a serious question.<\/p>\n<p>Have you all scanned what Snowden stole\/liberated (whatever floats your boat) for government <a href=\"http:\/\/en.wikipedia.org\/wiki\/Backdoor_(computing)%20\">backdoor and\/or \u201cmaster password\u201d<\/a> references? Were there any government backdoor and\/or \u201cmaster password\u201d references stored in the systems he had access to?<\/p>\n<p>OK, in English now\u2026 for a long time there have been rumors of backdoor and\/or \u201cmaster passwords\u201d for all computer systems. With a certain password for a certain system, an \u201cauthorized\u201d person could get full access.<\/p>\n<p>There really are \u201cmaster passwords\u201d currently in place for PC BIOS systems, all vehicle-embedded systems, and even on all iPhones. (Seriously. <a href=\"http:\/\/www.cultofmac.com\/20871\/how-to-change-your-iphones-default-ssh-password\/\">It\u2019s not a secret that \u201calpine\u201d works for full SSH access on all iPhones.<\/a>)<\/p>\n<p>To make things even more interesting, <a href=\"http:\/\/www.win.tue.nl\/~aeb\/linux\/hh\/thompson\/trust.html\">since 1984 there have been ways to put backdoor and\/or \u201cmaster passwords\u201d into compilers<\/a> so not even programmers who make applications on their own would know such a backdoor and\/or \u201cmaster password\u201d was put into the app they just created.<\/p>\n<p>Cool, huh?<\/p>\n<p>You do need a specialized program to access each of these systems, sometimes you also need local access to the device, and most of the Google-able backdoor and\/or \u201cmaster passwords\u201d that show up are for things like maintenance and root-level hijinks, not \u201cwatch what people are doing live\u201d kinds of things.<\/p>\n<p>Regardless, I would bet there\u2019s just a few backdoor and\/or \u201cmaster passwords\u201d reserved for the government that are already embedded in some critical systems. I would also bet with the right password combination, a \u201cwatch what people are doing live\u201d kind of thing could be set up with no problem.<\/p>\n<p>All theoretically, of course.<\/p>\n<p>Snowden stole\/liberated somewhere between \u201ctoo much\u201d and \u201coh dear God\u201d levels of data from the NSA. Now all that data was classified information. Communications. Transfers. Notes. Reports. Stuff not meant to see the light of day for some reason or other (justified or not).<\/p>\n<p>I\u2019m thinking things like this were in the pile of data\u2026<\/p>\n<ul>\n<li>Senator John Doe thinks Ambassador Moe Howard has a funny haircut, smells bad and isn\u2019t too smart. This should remain classified because we need to make nice with Ambassador Howard for now, but if it got out, no big deal. Doe and Howard could work it out over a golf game and some scotch.<\/li>\n<li>Senator John Doe is on the top secret Kinetic Intelligent Satellite Striker (KISS) committee \u2013 well, that\u2019s bad, but not world-ending. There\u2019s not much hard proof about this project, the locations are all buttoned down, and there\u2019s nothing other countries can act on directly.<\/li>\n<li>Senator John Doe used the password \u201cBOHONKUS\u201d to access files from a Dell Latitude E5430 system on an ambassador\u2019s laptop from a country currently designated as \u201chostile\u201d.<\/li>\n<\/ul>\n<p>That last one? Clearly naming the government backdoor and\/or \u201cmaster password\u201d for a specific system and purpose?<\/p>\n<p>If that gets out, it can be used by ANYONE. Anywhere. Anytime. You can kiss EVERYTHING that backdoor and\/or \u201cmaster password\u201d is embedded in goodbye forever.<\/p>\n<p>Plan on everyone using that backdoor password, and by everyone I mean especially\u2026<\/p>\n<ul>\n<li>The Chinese \u201cwe\u2019re not hackers \u2013 we\u2019re just curious\u201d brigade<\/li>\n<li>Russia<\/li>\n<li>North Korea<\/li>\n<li>ISIS<\/li>\n<li>Bored Americans<\/li>\n<\/ul>\n<p>As an extra bonus, there\u2019s no resetting a backdoor and\/or \u201cmaster password\u201d on most embedded systems without local \u201chands on\u201d access. No way to erase it. No way to change it. No way to block it.<\/p>\n<p>I don\u2019t know if Snowden would or would not release something like this if he found it in his data pile, but I guarantee a hostile government with access to this information would use it without question.<\/p>\n<p>Which brings me back around to my question for the NSA.<\/p>\n<p>Has the NSA scanned what Snowden stole\/liberated for government backdoor and\/or \u201cmaster password\u201d references? Were there any government backdoor and\/or \u201cmaster password\u201d references stored in the systems Snowden had access to?<\/p>\n<p>Finally, if there are backdoor and\/or \u201cmaster password\u201d references in the pile of data Snowden has, what is the worst case scenario if a hostile entity uses this password to access the system(s) it is embedded in?<\/p>\n<p>It\u2019s going to be a terrible thing to admit to the U.S., but if there is a backdoor and\/or \u201cmaster password\u201d reference of any kind in Snowden\u2019s data pile, we need to do something about it right now.<\/p>\n<p>The alternative would be far, FAR worse.<\/p>\n<p>Any compromised systems for private citizens or commercial businesses would need to be updated as soon as possible.<\/p>\n<p>Any compromised military systems would need to be taken offline IMMEDIATELY and kept out of active service until they have all been secured.<\/p>\n<p>And NSA, going forward, if you\u2019re going to ignore that \u201cunreasonable search and something or other\u201d part of the Constitution and put in backdoor and\/or \u201cmaster passwords\u201d on some systems, please install VERY secure backdoor and\/or \u201cmaster passwords\u201d that require multi-factor authentication that can be changed or be deleted if necessary.<\/p>\n<p>The back door needs to be more secure than the front door.<\/p>\n<p>At the bare minimum, I suggest a DIFFERENT password for different series of devices and\/or software with something like a random key fob authentication system for each.<\/p>\n<p>For example\u2026<\/p>\n<ul>\n<li>The backdoor password for Dell laptops model A with serial numbers 00001-10500 would be DWW-TATANKA.BUFFALO synced to key fob series ALPHA-9.<\/li>\n<li>The backdoor password for Dell laptops model G with serial numbers 00001 \u2013 10500 would be CJLP-TEA.EARL.GREY.HOT synced to key fob series ALPHA-3.<\/li>\n<li>The backdoor password for accessing everything the <a href=\"http:\/\/www.nbcbayarea.com\/news\/national-international\/NATL-NSA-Spy-Spying-Angry-Birds-Google-Maps-Phone-Apps-Smartphone-Snowden-242258731.html\">\u201cAngry Birds\u201d app sends to the NSA<\/a> would be HONEY-WHERE.IS.MY.SUPER.SUIT synced to key fob series BETA-111<\/li>\n<li>Etc.<\/li>\n<\/ul>\n<p>Make a <a href=\"http:\/\/xkcd.com\/936\/\">different password string<\/a> for each manufacturer\u2019s series and each manufacturer\u2019s model numbers. Tie all of that into a version of a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Security_token\">key fob<\/a> multi-factor <a href=\"http:\/\/www2.safenet-inc.com\/sas\/keyfob-tokens.html\">authentication generator<\/a> for final access.<\/p>\n<p>After this update, to access a system\u2019s backdoor, you would not only need the \u201cmaster password\u201d embedded in the device, you would also need the randomly synced password that would be generated on the key fob to proceed.<\/p>\n<p>Worst case &#8211; if a master backdoor password is compromised or stolen by a future Snowden, it would be useless in and of itself without the key fob generator to finish \u201copening the door\u201d and it would only be valid on a limited set of systems. If both a master backdoor password and its\u2019 correlating key fob system were compromised, you would only risk access to a limited series of systems.<\/p>\n<p>That\u2019s the minimum recommended civil-rights violations per serving. Seriously. No more single word passwords for an entire warehouse of systems or for all software made with compiler X.<\/p>\n<p>I know there\u2019s insanely more complex ways of implementing backdoor access, but depending on the \u201caudience\u201d using the backdoor passwords, the NSA guys need to keep it accessible by the non-tech-savant crowd and reasonably quick as well.<\/p>\n<p>Systems from the 80s, 90s and 2000 era are still out there. Applications built and modified on top of existing systems in this time period are legion. Only the NSA knows if there\u2019s really such a thing as backdoor single-word-passwords and where they might be installed at.<\/p>\n<p>To quote Forrest Gump, \u201cthat\u2019s all I got to say about that.\u201d<\/p>\n<p>Now back to silly cat photos, already in progress.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If anybody from the NSA reads this, I have a serious question. Have you all scanned what Snowden stole\/liberated (whatever floats your boat) for government backdoor and\/or \u201cmaster password\u201d references? Were there any government backdoor and\/or \u201cmaster password\u201d references stored &hellip; <a href=\"https:\/\/royceeddington.com\/?p=4080\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[],"class_list":["post-4080","post","type-post","status-publish","format-standard","hentry","category-rant"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p6Pfyw-13O","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/royceeddington.com\/index.php?rest_route=\/wp\/v2\/posts\/4080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/royceeddington.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/royceeddington.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/royceeddington.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/royceeddington.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4080"}],"version-history":[{"count":1,"href":"https:\/\/royceeddington.com\/index.php?rest_route=\/wp\/v2\/posts\/4080\/revisions"}],"predecessor-version":[{"id":4081,"href":"https:\/\/royceeddington.com\/index.php?rest_route=\/wp\/v2\/posts\/4080\/revisions\/4081"}],"wp:attachment":[{"href":"https:\/\/royceeddington.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/royceeddington.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/royceeddington.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}