Hacker News new | past | comments | ask | show | jobs | submit login
OSDP was supposed to make it harder to break in to secure facilities. It failed (arstechnica.com)
29 points by lisper 10 months ago | hide | past | favorite | 6 comments



What's the systematic cause behind why organizations like this never bring in the kind of talent and thinking necessary to really solve problems like this? Would they do better if they reversed all the decisions of the hiring committee? Or if they wrote a standard and then had somebody else write a standard that did everything differently?


Why no Diffie-Hellman key exchange?

Also, Did anybody else read the headline in the Babylon 5 voice-over style?


Diffie-hellman would not be enough if there is a MITM at the time of the exchange, would it?

Somehow the control panel and the reader must authenticate each other. I'm no security expert but only way I can think of is to use some pre-shared key. A key set via a trusted side channel, or at a time when the osdp channel is known to not be intercepted.


Security neophyte here- you are exactly right. It also seems like in this case there was a "default encryption key" and is 100% a part of the problem


I guess the default key is a problem too. Mainly since it might trick developers/manufactures that this somehow makes the key exchange secure if you use it while setting a device unique key.

I do work with OSDP devices and I have heard this argument from manufactures, like "we only support setting a new key while using the default key, it's more secure that way". While it, at best, will just obfuscate the process.


I haven't done enough PKI to call myself "good" at it but I've done enough to shudder any time I hear "hardcoded key"




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: