Slash Boxes

SoylentNews is people

posted by azrael on Tuesday September 02 2014, @01:46AM   Printer-friendly
from the opening-pandora's-box dept.

One of the unintended consequences of cheap 3-D printing is that any troublemaker can duplicate a key without setting foot in a hardware store. Now Andy Greenberg reports that clever lockpickers are taking that DIY key-making trick a step further printing a "bump key" that opens even high-security locks in seconds, without seeing the original key.

A bump key resembles a normal key but can open millions of locks with a carefully practiced rap on its head with a hammer. Using software they created called Photobump, Jos Weyers and Christian Holler say it's now possible to easily bump open a wide range of locks using keys based on photographs of the locks' keyholes. As a result, all anyone needs to open many locks previously considered "unbumpable" is a bit of software, a picture of the lock's keyhole, and the keyhole's depth. "You don’t need much more to make a bump key," says Weyers. "Basically, if I can see your keyhole, there’s an app for that."

Weyers and Holler want to warn lockmakers about the possibility of 3-D printable bump keys so they can defend against it. Although Holler will discuss the technique at the Lockcon lockpicking conference in Sneek, the Netherlands, next month, he doesn't plan to release the Photobump software publicly and is working with police in his native Germany to analyze whether printed bump keys leave any forensic evidence behind.

Ikon maker Assa Abloy argues 3-D printing bump keys to its locks is an expensive, unreliable trick that doesn’t work on some locks whose keys have hidden or moving parts but Weyers argues that instead of dismissing 3-D printing or trying to keep their key profiles secret, lockmakers should produce more bump resistant locks with electronic elements or unprintable parts.

"The sky isn't falling, but the world changes and now people can make stuff," says Weyers. "Lock manufacturers know how to make a lock bump-resistant. And they had better."

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Interesting) by malloc_free on Tuesday September 02 2014, @02:54AM

    by malloc_free (3034) on Tuesday September 02 2014, @02:54AM (#88339) Journal
    Why have mechanical keys not been replaced? I can figure out a few reasons as to why - mechanical keys are pretty robust, proven to work, finding someone to fix or replace one is pretty easy. An electronic lock has the downside of possible electronic hardware fault, software bugs, power failure (mains or battery). Plus there has to be a mechanical element there anyway (so they inherit some of the problems of a standard mechanical key). Fixing or replacing one might not be as straight forward as a mechanical system. There is also the cost - but with the rate at which the prices for electronics have been falling, this may not be an issue any more. Then again, why fix what ain't broken? This works from an economic perspective too. That may slow the rate of adoption, and it could be hard for anyone to make a profit. Both appear to be hackable in some respect. One thing though - an electronic system can be patched to eliminate bugs, but you really can't fix what is wrong with a mechanical key without replacing a large part of the mechanism. Keys can be lost or stolen, but if you are using a card system, then they can be lost/stolen too. Passwords/pins can be weak, forgotten, written down. I do recall a story sometime ago about a - I think it was a card swipe system - that was installed in a lot of hotels that needed upgrades due to a bug. Technicians had to upload the update, and there was some hooha about the company that produced them charging for this service. I guess you could add an sdcard slot or usb port to allow for easy uploading of firmware - but that opens up another attack vector. Wi-fi would have the same (probably worse) problem. Proper security practices (use of authentication certificates, hashes etc) should eliminate these though. Again, all of this adds to the TCO. I have not done any research into this, so I may be completely wrong. Just throwing it out there. Sure someone out there has a better idea.
    Starting Score:    1  point
    Moderation   +4  
       Insightful=1, Interesting=3, Total=4
    Extra 'Interesting' Modifier   0  

    Total Score:   5  
  • (Score: 4, Insightful) by gringer on Tuesday September 02 2014, @04:00AM

    by gringer (962) on Tuesday September 02 2014, @04:00AM (#88359)

    So, you want an electric lock. Great. Let's ignore cost, but have you considered the following?

    • In the event of power failure, should the door lock, or open?
    • How will emergency services get access to the thing behind the lock?
    • How can you ensure that the lock will still work in 20 years?
    • If the lock is mains powered, where will you put the wire (or induction coil) for the power?
    • If the lock is battery powered (including solar), how will the battery be replaced?
    • If the lock is key powered, what will the lock do when the key's battery is depleted?
    • What happens when someone discovers how to copy a key?
    • What happens when someone discovers how to unlock without a key?
    • (Score: 1) by malloc_free on Tuesday September 02 2014, @07:37AM

      by malloc_free (3034) on Tuesday September 02 2014, @07:37AM (#88400) Journal

      Ah, yeah I addressed most of that. I didn't get into so much detail, but I discussed the power failure thing (mains with battery backup?), emergency services are as fucked with a mechanical lock as they are with an electronic lock, the next I did not cover (I guess a standard could be devised), mains power is not really an issue (a lot of the external doors in the houses I live in have had light switches beside the door, so getting power there is already solved), batteries are not hard to replace(?), the next I did not address (although mains with battery backup would be the ideal solution), key copying could be fixed with decent security measures, and I did address the last (firmware upgrades, decent software security).

      And yes, I do want an electronic lock.

    • (Score: 2) by wonkey_monkey on Tuesday September 02 2014, @07:57AM

      by wonkey_monkey (279) on Tuesday September 02 2014, @07:57AM (#88403) Homepage

      How will emergency services get access to the thing behind the lock?

      The same way they do it at the moment, I'd assume.

      systemd is Roko's Basilisk
  • (Score: 1) by anubi on Tuesday September 02 2014, @08:41AM

    by anubi (2828) on Tuesday September 02 2014, @08:41AM (#88415) Journal

    My feeling about mechanical locks is they are good for little more than informing someone he is not supposed to go there unless he is authorized. If someone is bound and determined to go there anyway, there simply isn't much you can do about it.

    Once an individual has breached the "polite security" of a mechanical lock, its then up to covert electronic data collectors to acquire images and other evidence of him proceeding on his unauthorized foray and what he did.

    The lock was only a polite way of saying "If you go any further, you will be recorded, then tracked down, detained, then asked to explain your actions in a court of law before the judge."

    "Prove all things; hold fast that which is good." [KJV: I Thessalonians 5:21]
  • (Score: 3, Interesting) by hankwang on Tuesday September 02 2014, @09:51AM

    by hankwang (100) on Tuesday September 02 2014, @09:51AM (#88430) Homepage

    Why have mechanical keys not been replaced?

    Like in every large hotel? I can think of other reasons besides the ones you mention:

    • Hotel key systems work on batteries which require special tools to replace. A hotel can make a routine of replacing the batteries in time, and in case you're locked out of your room anyway, you can contact the staff to deal with it. At home, most people (including me) will postpone action on "battery low" warning lights and won't replace a battery until it stops working. If the battery runs out and it's a "failsafe lock" system, you're locked out of your house. If it's a "failsafe open" system, an attacker can get in by exhausting the battery.
    • Cards are less durable than metal keys. i've had several failures of magnetic stripes, chips, and NFC cards over the years. I've had only one broken metal (bicycle) key.
    • With an NFC key card I have to worry that somebody copies/clones my card by holding an NFC reader next to my trouser pocket.
    • With a magstripe card, I have to worry about someone installing a skimmer device. Note that you cannot solve that with a firmware update.
    • (Score: 0) by Anonymous Coward on Tuesday September 02 2014, @03:55PM

      by Anonymous Coward on Tuesday September 02 2014, @03:55PM (#88540)

      Hard keys are not really as secure as 'soft' keys (ie: proximity cards). With soft keys you can arbitrarily assign and revoke keys conveniently simply by changing a setting in a computer, you can control who has access to what doors and easily change access parameters at will, and you can audit who came into what door when (or at least what badge was used). You can also program the key reader to beep whenever someone places a card next to it which alerts those around it that someone is here and attempting to enter. With a hard key if someone duplicates it then you would have to physically change all the locks to revoke the key and who wants to do all that.

      As far as the battery needing replacement you can have a battery that can be replaced from the outside. Have a dual battery system, one set of batteries from the inside and one set of batteries from the outside. If either of the batteries are working the door will open upon someone punching in their pin or using their card. If one set of batteries dies the system can beep a certain way upon someone putting in a pin or using their card to inform the person that the battery is low and needs replacing. A light indicator can indicate which set of batteries is low. This is useful because it gives time to replace one set of batteries while the other set is hopefully still good. If the inside and outside batteries are both dead and someone is locked outside they simply need to go to the store and get a standard 9 volt battery (or whatever standard batteries are sold) and replace it from the outside and then punch in their pin or use their key reader to get in. They still can't get in without their pin/key reader but they still have a backup plan in case the battery dies. The key reader can also optionally be plugged into a power source so that power can be drawn from the power source when there isn't a power outage. The inside battery can even be a rechargeable battery that automatically stays charged during times that there isn't a power outage. If there is another (back) door with a key reader and the front key reader isn't working someone can simply go to the back door and use their key reader to get in from there. Problem solved.

    • (Score: 1) by malloc_free on Wednesday September 03 2014, @02:30AM

      by malloc_free (3034) on Wednesday September 03 2014, @02:30AM (#88734) Journal

      Valid points. However NFC cards can't be copied that easily. Well, not the cards I have used. You can use public key encryption to prevent interception of transmitted data. However that is probably not the case for all cards.

      • (Score: 2) by hankwang on Wednesday September 03 2014, @04:21PM

        by hankwang (100) on Wednesday September 03 2014, @04:21PM (#88964) Homepage

        I was thinking of an attack where one guy holds an NFC reader next to your pocket and another one an NFC card emulator next to your door. With a mobile internet connection, that could work, if the allowed latencies of NFC are not too strict.

        • (Score: 1) by malloc_free on Wednesday September 03 2014, @08:41PM

          by malloc_free (3034) on Wednesday September 03 2014, @08:41PM (#89068) Journal

          With the right card and proper encryption, this should not work. The cards I have used allow for public key encryption and, using that, creation of a shared secret key.


          • (Score: 2) by hankwang on Wednesday September 03 2014, @10:14PM

            by hankwang (100) on Wednesday September 03 2014, @10:14PM (#89104) Homepage

            How would that prevent this from happening? It's a known problem anyway:


            Because NFC devices usually include ISO/IEC 14443 protocols, the relay attacks described are also feasible on NFC.[41][42] For this attack the adversary has to forward the request of the reader to the victim and relay back its answer to the reader in real time, in order to carry out a task pretending to be the owner of the victim's smart card. This is similar to a man-in-the-middle attack. For more information see a survey of practical relay attack concepts.[43] One of libnfc code examples demonstrates a relay attack using only two stock commercial NFC devices. It has also been shown that this attack can be practically implemented using only two NFC-enabled mobile phones.[44]

            • (Score: 1) by malloc_free on Thursday September 04 2014, @12:37AM

              by malloc_free (3034) on Thursday September 04 2014, @12:37AM (#89145) Journal

              OK yeah there is little you can do about this if the system you use only requires one method of authentication - just the card itself. I see most of the solutions attempt to detect delays in transmission/relpy. So one way to fix this would be to use two-factor authentication, where a pin is required as well as the card. Then there is shoulder surfing I guess...


  • (Score: 0) by Anonymous Coward on Tuesday September 02 2014, @03:58PM

    by Anonymous Coward on Tuesday September 02 2014, @03:58PM (#88541)

    "Why have mechanical keys not been replaced?"

    As far as commercial and government buildings are concerned there are usually four basic layers of defense.

    1: Physical. These include gates, fences, doors, locks, etc...

    2: Burglar alarms

    3: Cameras

    4: Security guards (this can be a plus or a minus because you want to make sure you trust the security guards and do thorough background checks since they are often given a wide range of access and are left alone).