💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › dialback.txt captured on 2023-01-29 at 07:41:02.

View Raw

More Information

⬅️ Previous capture (2021-12-04)

-=-=-=-=-=-=-


Date:  Thu, 28-Feb-85
Subject:  Dial Back isn't always secure
From: [usenet via anonymous donor]

        An increasingly popular technique for protecting dial-in ports
from the ravages of hackers and other more sinister system penetrators
is dial back operation wherein a legitimate user initiates a call to the
system he desires to connect with, types in his user ID and perhaps a
password, disconnects and waits for the system to call him back at a
prearranged number.  It is assumed that a penetrator will not be able to
specify the dial back number (which is carefully protected), and so even
if he is able to guess a user-name/password pair he cannot penetrate the
system because he cannot do anything meaningful except type in a
user-name and password when he is connected to the system.  If he has a
correct pair it is assumed the worst that could happen is a spurious
call to some legitimate user which will do no harm and might even result
in a security investigation.

        Many installations depend on dial-back operation of modems for
their principle protection against penetration via their dial up ports
on the incorrect presumption that there is no way a penetrator could get
connected to the modem on the call back call unless he was able to tap
directly into the line being called back.  Alas, this assumption is not
always true - compromises in the design of modems and the telephone
network unfortunately make it all too possible for a clever penetrator
to get connected to the call back call and fool the modem into thinking
that it had in fact dialed the legitimate user.

        The problem areas are as follows:

                Caller control central offices

        Many older telephone central office switches implement caller
control in which the release of the connection from a calling telephone
to a called telephone is exclusively controlled by the originating
telephone.  This means that if the penetrator simply failed to hang up a
call to a modem on such a central office after he typed the legitimate
user's user-name and password, the modem would be unable to hang up the
connection.

        Almost all modems would simply go on-hook in this situation and
not notice that the connection had not been broken.  If the same line
was used to dial out on as the call came in on, when the modem went to
dial out to call the legitimate user back the it might not notice (there
is no standard way of doing so electrically) that the penetrator was
still connected on the line.  This means that the modem might attempt to
dial and then wait for an answerback tone from the far end modem.  If
the penetrator was kind enough to supply the answerback tone from his
modem after he heard the system modem dial, he could make a connection
and penetrate the system.  Of course some modems incorporate dial tone
detectors and ringback detectors and in fact wait for dial tone before
dialing, and ringback after dialing but fooling those with a recording
of dial tone (or a dial tone generator chip) should pose little problem.


                Trying to call out on a ringing line

        Some modems are dumb enough to pick up a ringing line and
attempt to make a call out on it.  This fact could be used by a system
penetrator to break dial back security even on joint control or called
party control central offices.  A penetrator would merely have to dial
in on the dial-out line (which would work even if it was a separate line
as long as the penetrator was able to obtain it's number), just as the
modem was about to dial out.  The same technique of waiting for dialing
to complete and then supplying answerback tone could be used - and of
course the same technique of supplying dial tone to a modem which waited
for it would work here too.

        Calling the dial-out line would work especially well in cases
where the software controlling the modem either disabled auto-answer
during the period between dial-in and dial-back (and thus allowed the
line to ring with no action being taken) or allowed the modem to answer
the line (auto-answer enabled) and paid no attention to whether the line
was already connected when it tried to dial out on it.


                The ring window

        However, even carefully written software can be fooled by the
ring window problem.  Many central offices actually will connect an
incoming call to a line if the line goes off hook just as the call comes
in without first having put the 20 hz.  ringing voltage on the line to
make it ring.  The ring voltage in many telephone central offices is
supplied asynchronously every 6 seconds to every line on which there is
an incoming call that has not been answered, so if an incoming call
reaches a line just an instant after the end of the ring period and the
line clairvointly responds by going off hook it may never see any ring
voltage.

        This means that a modem that picks up the line to dial out just
as our penetrator dials in may not see any ring voltage and may
therefore have no way of knowing that it is connected to an incoming
call rather than the call originating circuitry of the switch.  And even
if the switch always rings before connecting an incoming call, most
modems have a window just as they are going off hook to originate a call
when they will ignore transients (such as ringing voltage) on the
assumption that they originate from the going-off-hook process.  [The
author is aware that some central offices reverse battery (the polarity
of the voltage on the line) in the answer condition to distinguish it
from the originate condition, but as this is by no means universal few
if any modems take advantage of the information so supplied]


                In Summary

        It is thus impossible to say with any certainty that when a
modem goes off hook and tries to dial out on a line which can accept
incoming calls it really is connected to the switch and actually making
an outgoing call.  And because it is relatively easy for a system
penetrator to fool the tone detecting circuitry in a modem into
believing that it is seeing dial tone, ringback and so forth until he
supplies answerback tone and connects and penetrates system security
should not depend on this sort of dial-back.


                Some Recommendations

        Dial back using the same line used to dial in is not very secure
and cannot be made completely secure with conventional modems.  Use of
dithered (random) time delays between dial in and dial back combined
with allowing the modem to answer during the wait period (with
provisions made for recognizing the fact that this wasn't the originated
call - perhaps by checking to see if the modem is in originate or answer
mode) will substantially reduce this window of vulnerability but nothing
can completely eliminate it.

        Obviously if one happens to be connected to an older caller
control switch, using the same line for dial in and dial out isn't
secure at all.  It is easy to experimentally determine this, so it ought
to be possible to avoid such situations.

        Dial back using a separate line (or line and modem) for dialing
out is much better, provided that either the dial out line is sterile
(not readily tracable by a penetrator to the target system) or that it
is a one way line that cannot accept incoming calls at all.
Unfortunately the later technique is far superior to the former in most
organizations as concealing the telephone number of dial out lines for
long periods involves considerable risk.  The author has not tried to
order a dial out only telephone line, so he is unaware of what special
charges might be made for this service or even if it is available.


                A final word of warning

        In years past it was possible to access telephone company test
and verification trunks in some areas of the country by using mf tones
from so called "blue boxes".  These test trunks connect to special ports
on telephone switches that allow a test connection to be made to a line
that doesn't disconnect when the line hangs up.  These test connections
could be used to fool a dial out modem, even one on a dial out only line
(since the telephone company needs a way to test it, they usually supply
test connections to it even if the customer can't receive calls).

        Access to verification and test ports and trunks has been
tightened (they are a kind of dial-a-wiretap so it ought to be pretty
difficult) but in any as in any system there is always the danger that
someone, through stupidity or ignorance ity of the Hackers controling satelites in geo-sync 
orbit are being moved out of there assigned orbits. Granted they 
did not move the bird,but did gain control of the rotation control 
for the satelite.
 
And  it was stated that the information needed to do such  things 
was  found  on an underground bulletin board.  Ok,that  might  be 
true,but information that is far more valuable to people on earth 
is being posted on the boards. And the information comes from the 
trash  can  or from insiders who have become disgruntled or  just 
from plain old research looking for publicly available sources. 
Some  of  these public sources are to include users manuals  and  
system documentation. Others are to include users groups and just 
talk.
 
 
 
 

 
ASPECTS OF HACKER CRIME : HIGH TECHNOLOGY TOMFOOLERY OR THEFT ?
-------------------------------------------------------------
Other  interesting facts about the boards is that they contain  a 
group   of   sub-sections  that  are  to  include forwarded to line B, to avoid callers when it is trying to dial out.
Line C is some phone in the attacker's control.  The attacker forwards
line C to line A, and then calls line C from yet another phone.  The
call is forwarded only from C to A, not from C to A to B.  --
                Joe Eykholt

[Opinions expressed by me are not necessarily held by any other entity.]