[Infowarrior] - MIT studies Charlieticket vuln

Richard Forno rforno at infowarrior.org
Fri Aug 15 12:14:59 UTC 2008


Public Documents Seem to Show Free T Fare
By Michael McGraw-Herdeg
EXECUTIVE EDITOR
August 14, 2008, 4:13 p.m.

http://www-tech.mit.edu/V128/N30/subwayvulnerabilities.html

Documents made public by an MBTA lawsuit against MIT undergraduates  
show how anyone can get free T fare by copying an existing  
CharlieTicket or by making their own.

The Massachusetts Bay Transportation Authority has asked for its  
temporary restraining order, protecting information about research by  
MIT students into the CharlieCard and CharlieTicket systems, to be  
changed to include only “non public” information. MBTA spokesman Joe  
Pesaturo characterized documents available online as “harmless  
information that is now public” in an e-mail.

But that public information shows how to get free rides with a  
CharlieTicket, leaving open the possibility that the MBTA suspects an  
even more serious compromise of its CharlieCard system.

Numerous ways to get unpaid-for T fare are clearly laid out in the DEF  
CON presentation, available online at http://www-tech.mit.edu/V128/N30/subway/Defcon_Presentation.pdf 
; in the report the students gave to the MBTA, available at http://www-tech.mit.edu/V128/N30/subway/10-declaration-henderson-vulnerability.pdf 
; and in prior research on similar systems.

Anyone with a magnetic card writer can repeatedly copy a CharlieTicket  
onto another card, never having to pay for a ticket again, if the  
students’ “Vulnerability Assessment Report” is accurate. In the T’s  
system, a CharlieTicket is worth as much as its magnetic stripe says  
it is, and no central computer tracks the tickets’ values, according  
to the report.

A single $25 ticket could be copied onto hundreds, if not thousands of  
blank cards, providing free travel forever.

A ticket’s identification number or value can also be easily changed,  
the report says. A $5 card can be made to say it is worth up to $655.36.

A thief could take a 5 cent CharlieTicket, rewrite it so that its  
value is $99, insert it into an MBTA ticketing kiosk along with a  
dollar, and receive $100 in T fares on a fresh card, purchased for  
$1.05, the report says. The ticket would have “$100.00” printed on the  
front and would appear identical to a legitimate CharlieTicket. The  
report suggests that an attacker might resell tickets.

(Three people arrested in New York are said to have exploited a  
vending machine bug to get $800,000 worth of Long Island Rail Road  
tickets and MetroCard fares for free, The New York Times reported  
Tuesday. They allegedly sold much of that fare.)

Magnetic card writers go for $173 on eBay, but they can be made for as  
little as $5 in parts, according to slides the students were to  
present at this weekend’s DEF CON hacker convention. Discarded  
CharlieTickets are available in many subway stations’ trash cans;  
other cards with magnetic stripes can also be found for less than a  
dollar online.

The information on the ticket includes a checksum, a six-bit number  
calculated from the rest of the information on the card, which is used  
to detect errors in the card’s data. There are only 64 six-bit  
numbers. If you do not know how the checksum is generated, you need  
only create 64 tickets, each with a different checksum value, and test  
each. One will work, according to the report.

The report does not say whether the students have successfully written  
software to generate forged CharlieTickets without having to try all  
the possible checksums. The final presentation in the spring 2008  
subject Computer and Network Security (6.857) was based on guessing  
the checksum value by making many cards, a “brute force” approach.  
That work was done by four students: Samuel G. McVeety G, who did not  
participate in the DEF CON presentation, along with the three students  
who did, Zackary M. Anderson ‘09, Russell J. Ryan ‘09, and Alessandro  
Chiesa ‘09. The project earned an A, according to the MBTA.

Students recommend system changes

A central system should store the current value of all tickets so that  
people cannot forge new CharlieTickets, the students’ confidential  
report recommends. An “auditing system” should also be used to detect  
copied or forged tickets, the report recommends.

The CharlieTicket and CharlieCard should both include additional  
encryption to make them hard to duplicate or forge, the report says.  
The report recommends an auditing system be installed to detect  
cloning of RFID cards. It also recommends that the CharlieTicket’s  
checksum be replaced with a cryptographically secure signature which  
would be harder to duplicate.

The DEF CON presentation highlighted fixable weaknesses in “physical  
security.” The presentation includes photos of unlocked doors into  
subway stations, pictures of open “turnstile control boxes” accessible  
“almost everywhere,” a picture of a “door key” found in an open box,  
and a photo of a computer screen in the MBTA’s operations center.  
(That picture was taken from an adjacent building with a telephoto  
lens, according to Tech photographer Eric Schmiedl, who gave a  
presentation on physical security at DEF CON.)

Charliecard may be insecure

The students’ report suggests that all CharlieCards may be protected  
against duplication by a single encryption key, but the report is  
unclear on whether they have decoded that key. If they have found this  
key, this could be what the MBTA’s restraining order seeks to protect.  
CNET reported on Thursday that the students gave the MBTA “particular  
information to complete the Charlie card hack which they say they had  
no intention of revealing in the Defcon discussion,” which could be  
this key.

The CharlieCard uses the MIFARE Classic system, which is also used in  
London’s transport system and in the Dutch transport system. That  
system is known to be vulnerable to a cloning attack -- by standing  
near someone, you can decrypt their card and copy its identity and  
value. The maker of that card, NXP Semiconductors, has unsuccesfully  
sued in Dutch courts to keep research details from being presented in  
public.

The students’ report discusses possible ways to decode the encryption  
key that protects CharlieCards. It also suggests that the key may be  
the same on every card, rather than differing from card to card --  
which could be a serious problem if true. But in a court filing,  
security consultant Eric Johanson said that the publicly available  
information about the students’ findings describes an “aspirational”  
attack on the key rather than a functional one.

The MIFARE Classic card has undergone worldwide security analysis.

In place of the students’ talk on Sunday, Dutch journalist Brenno de  
Winter gave a talk describing MIFARE Classic vulnerabilities and NXP’s  
unsuccessful lawsuit that sought to keep Dutch researchers from  
presenting those vulnerabilities. The research results to be published  
in October will show how the card can be cloned in a few seconds, he  
said. “If anyone in the room is using MIFARE Classic at this moment,  
this is your final wakeup call,” de Winter said. “This is your final  
heads-up. You’ve got two months left, and then you’re screwed.”

An NXP Semiconductors employee advised the MBTA on July 30 about the  
upcoming DEF CON presentation. “Of special concern is the announced  
intent to release open source tools required to perform the attacks,”  
wrote Manuel Albers, director of regional marketing for NXP. “Please  
let me know if we can support you in any way,” he wrote.


More information about the Infowarrior mailing list