7 Epassport
7 Epassport
7 Epassport
Erik Poll
Digital Security Group Radboud University Nijmegen
overview
e-passports functionality and security mechanisms problems, problems so far future
e-passports
e-passport contains RFID chip / contactless smartcard
in Dutch passports, passports a Java Card
aka biometric passport or MRTD with ICC/chip introduction pushed by US in the wake of 9/11
to solve what problem?? p
e-passport p p logo g
3
NB possible confusion eNIK is a future extension of NIK, with digital signature capability MRTD = Machine-Readable Travel Document just has Machine (OCR) Readable Zone, the MRZ, but need not contain a chip ie. e-passport = MRTD + chip MRZ
5
Iris image (DG4, ISO 19794-6) NB one would prefer not to store the raw biometrics, but some (hash of) derived info. Why? How?
8
Security mechanisms
Passive Authentication (PA) ICAO digital signature on passport data on chip mandatory Basic Authentication Control (BAC) ICAO optional, access control to chip, to prevent EU mandatory unauthorised access & eavesdropping Active Authentication (AA) ICAO optional chip p authentication ie prevent cloning Extended Access Control (EAC) EU only, y, mandatory y for chip and terminal authentication 'advanced' biometrics,
ie fingerprint & iris
Passive Authentication
passport chip consists of 16 data groups (DGs)
DG1 MRZ DG2 face DG3 finger DG4 iris ... DG15 Active Authentication ...
and d a security object b SO, signed hash values of the data groups To check the signatures, terminal needs country signing certificates Passive Authentication mandatory on all e-passports
10
11
encrypted
12
13
send challenge
14
15
ISO 7816 Card Verifiable (CV) certificates used rather than X.509 p public key y certificates.
how do you revoke a terminal certificate on all passports? passport does not have time to check certificate expiry
chip can only record date of last transaction
17
19
Content MRZ Face Finger Iris SecurityInfo* AA public key Security Object
read/write R R R R R R R R R
mandatory / optional m m o o o o m
*ANS.1 data structure indicating support for Chip and Terminal , and defining. f g. Chip p Authentication Public Key K y Authentication,
20
active attacks
unauthorised access to passport without owner's knowledge possible up to 25 cm activating RFID tag requires powerful field! aka virtual pickpocketing variant: relay attack
22
23
24
25
26
27
29
bla
Erik Poll
30
31
32
Fingerprinting passports
All e-passports react the same to correct protocol runs.... but what about incorrect ones? Eg q commands out of sequence
eg B0 (READ BINARY) before completing BAC eg 44 (REHABILITATE CHV)
commands not in the ICAO specs at all commands with silly parameters
33
255 other instructions to try, and we can try different parameters ...
35
Fingerprinting passports
Response to strange inputs provides unique fingerprint for ten nationalities originally tested
A Australian, t li B Belgian, l i Dutch, D t h F French, h German, G Greek, G k Italian, It li Polish, Spanish, Swedish
37
38
Organisational hassle
How realiable is the issuance process?
Someone obtained a Dutch ID card with a picture of himself as the Joker from Batman of
few countries bother to read the chip on a regular basis exchanging certificates (bilaterely via diplomatic post) is a big hassle hardly any countries use fingerprint data is quality of fingerprints info really good enough ? yet more certificate hassle, hassle as terminal have to be equipped with a short-lived terminal certificate, one for every country do personnel trust the chip, and can they interpret errors? was it just security theatre? or was the real motivation Automated Border Control?
Questions?
40