These forums have been archived and are now read-only.

The new forums are live and can be found at https://forums.eveonline.com/

EVE General Discussion

 
  • Topic is locked indefinitely.
Previous page12
 

Eve Authenticator

Author
Chribba
Otherworld Enterprises
Otherworld Empire
#21 - 2013-04-21 13:24:04 UTC
Wodensun wrote:
Dave Stark wrote:
Wodensun wrote:
Dave Stark wrote:
there's not really a need for such a thing.

common sense is already enough to stop your account getting "stolen" or whatever.


Bullshit with signature/heuristic based AV your always running after the facts. This means a virus/trojan/keylogger has to be known for it to be detected.


enjoying a decade and counting of not having any of my accounts stolen. regardless of what the account is for.

feels good.


And thats your counter argument? Haaaahahaahahahaaha no wait for it... Whaaaahaahahahaa now be gone noob.


Chribba wrote:
For myself I'd just be happy if I could lock my accounts to IP (yes won't work for everyone I know)

/c


Chribs that can be defeated as wel the thing with the authenticator is the hacker wont know the next key in sequence and he cant generate it.

Consider ARP spoofing/poisoning ;-)
Except I wouldn't have to carry around another device... plus for anyone attempting at spoofing they would need to know which IP to spoof to begin with, plus to add to the fact that since it's TCP it will be a hell lot harder to get working sessions unless they actually manage to spoof at routers in CCP's datacenter - in which case I doubt a spoofed IP for an account is the biggest problem they have.

/c

★★★ Secure 3rd party service ★★★

Visit my in-game channel 'Holy Veldspar'

Twitter @ChribbaVeldspar

Tau Cabalander
Retirement Retreat
Working Stiffs
#22 - 2013-04-21 14:00:57 UTC  |  Edited by: Tau Cabalander
James Amril-Kesh wrote:
Lord Haur wrote:
James Amril-Kesh wrote:
I still don't get how these things actually work, anyway.

It took me a while just to understand the basic concepts behind public key cryptography.

Long story short, these run an algorithm with two inputs. The first is easy enough, the authenticator's UniqueID. The second is a little more complicated, usually either the current time or the previous result. These inputs are manipulated to produce a auth token. The server can run the same algorithm, using the authenticator's ID associated with the account. If the two results match, then authentication is successful.

The token distributed at FF2011 appears to use the timestamp method - the result only updates every 30s or so.

Yeah, the part I was confused about is how the server knows which input to expect. But that makes sense.

There is one more part you are all missing.

There isn't a single valid code, rather there is a short list of valid codes.

Example: Authenticator displays a new code every 30 seconds, so validating computer makes a new list of codes in the sequence, say 20 of them, and that will cover a time mismatch of up to 10 minutes. As soon as you use a valid code from the list, the validating computer knows where in the sequence the authenticator is, which synchronizes both ends.

When you first start using the authenticator, you enter a code printed on the back which is used to create the numeric sequence (it isn't one number, but rather a bunch of constants that control a complex math function), as well as the current code on the authenticator. This synchronizes the authenticator and validating computer.

If they get too far out of sync, you have to contact customer support and re-initialize the process. This typically takes many months of not being used; they often use a cheap 20 ppm crystal of 32.768 kHz as a timebase. Changes in temperature, and the age of the crystal also affect the timebase accuracy. If my math is right, 20 ppm yields +- 51.84 seconds per month of possible error. Hence the need for a process of synchronization; a 20 code list is good for about 10 months.

Use the authenticator to login enough, and the validating computer can learn how fast or slow the authenticator clock is, and adapt the valid list length or expiry time.
Wodensun
Caldari Provisions
Caldari State
#23 - 2013-04-21 14:45:24 UTC  |  Edited by: Wodensun
Chribba wrote:

Except I wouldn't have to carry around another device... plus for anyone attempting at spoofing they would need to know which IP to spoof to begin with, plus to add to the fact that since it's TCP it will be a hell lot harder to get working sessions unless they actually manage to spoof at routers in CCP's datacenter - in which case I doubt a spoofed IP for an account is the biggest problem they have.

/c


Currently using a forum of any kind? Then they know your IP, accepting skype calls or even using skype then they know your IP, Using torrent on your home machine to download patches in the future then your IP is being broadcast. It really isnt rocket science to find out which IP your using mate (( see what I did there Blink )) and hijacking a TCP session isnt that hard to. ISPs do it all the time.. oh wait I didnt say that its called lawfull intercept and surveilance.

Ps, Don't get me wrong I think your awesome and all but hey seeing the trap is the first step in avoiding it

/TinFoilHatOff

Do not give me likes them 101 likes arent a accident...

Angelique Duchemin
Team Evil
#24 - 2013-04-21 14:51:48 UTC
Optional layer of protection. I like it and there's no reason to oppose it.

The very sun of heaven seemed distorted when viewed through the polarising miasma welling out from this sea-soaked perversion, and twisted menace and suspense lurked leeringly in those crazily elusive angles of carven rock where a second glance shewed concavity after the first shewed convexity.

Chribba
Otherworld Enterprises
Otherworld Empire
#25 - 2013-04-21 15:20:30 UTC
Wodensun wrote:
Chribba wrote:

Except I wouldn't have to carry around another device... plus for anyone attempting at spoofing they would need to know which IP to spoof to begin with, plus to add to the fact that since it's TCP it will be a hell lot harder to get working sessions unless they actually manage to spoof at routers in CCP's datacenter - in which case I doubt a spoofed IP for an account is the biggest problem they have.

/c


Currently using a forum of any kind? Then they know your IP, accepting skype calls or even using skype then they know your IP, Using torrent on your home machine to download patches in the future then your IP is being broadcast. It really isnt rocket science to find out which IP your using mate (( see what I did there Blink )) and hijacking a TCP session isnt that hard to. ISPs do it all the time.. oh wait I didnt say that its called lawfull intercept and surveilance.

Ps, Don't get me wrong I think your awesome and all but hey seeing the trap is the first step in avoiding it

/TinFoilHatOff

You assume that the IP I use to browse the random forum is the IP I use to connect to EVE, if it was then yes an ISP (wonder why they would need to intercept though) could try and hijack and then bruteforce or something lol

Of course not saying IP-lockdown is a fullproof thing, just said I would rather have that (or the possibility) for myself since it would rule out most (if not all then) attempts to access my accounts.

/c

★★★ Secure 3rd party service ★★★

Visit my in-game channel 'Holy Veldspar'

Twitter @ChribbaVeldspar

chriz
Deep Core Mining Inc.
Caldari State
#26 - 2013-04-21 15:38:32 UTC
Ok this is a nice discussion but it got out from its initial discussion and that is sometimes good and sometimes not as good :)

I am still saying that an iOS or Android application that uses the same authentication mechanism as Google Authenticator or Battlenet.nets Authenticator methods is a very secure way of having Eve account privacy.

And to ensure that you are you.... you first had to login and select the new authentication method the server gives you a sequence to type into your mobile handset device and that in return gives you a "private" access code / string that shall be entered in return. What you have done now is to setup a private key that is assigned to your account.

The validation process is something else it still uses information regarding your handset (at least I would) and your private key and some other information to have as a base for the alghorithm the code being presented on the authentication application in your handset will give you a numbered sequence that is valid for lets say 2-3 minutes. That sequence is valid on the server side because the server has the same "base" information and can use "the same" algorithm on its side to translate that into a security code that will match the initial setup.

This setup its really really tough to break and works in the same way as a hardware one-time-password device does.
Like for your internet bank authentication or other. The setup isnt that hard and I wouldnt worry going online in any internet cafe around the globe cause after I have logged the old password has been useless for hours.

At least I would feel secure if it was implemented.

/chriz
Relth Draron
Republic Military School
Minmatar Republic
#27 - 2013-04-21 18:00:14 UTC
Angelique Duchemin wrote:
Optional layer of protection. I like it and there's no reason to oppose it.


Pretty much this.

An app for the smartphones would be nice too.
Eurydia Vespasian
Storm Hunters
#28 - 2013-04-21 18:14:09 UTC
i used one with WoW for ages. i didn't believe i would get hacked. but it happened. and for no reason i can recall. i never entered my password anywhere but the game and battle.net. no suspicious emails. only thing i can think of is picking up a random keylogger...somewhere. no clue.

anyhow...it happened. i caught it pretty early. tried to log in and could not. i called blizzard and spoke to a very nice guy for a while. he told me someone in korea had gotten in somehow and changed my password. probably to spam RMT for gold. he told me about authenticators and how i could d/l it free as an app for my phone and i was like "awesome!"

so i did that. and never had a problem after. i would totally support CCP authenticators. a mobile chat program would be fun too Big smile
Hamatitio
State War Academy
Caldari State
#29 - 2013-04-21 18:50:27 UTC
DIdn't one of the CCP guys just go into the new mobile division of CCP?

Perhaps they will actually do one now.
Sturmwolke
#30 - 2013-04-21 19:05:21 UTC
They might be balking from the cost model studies (long term/short term) and system effectiveness . The whole layered authentication infrastructure costs money in licenses, hardware, staff and integration efforts.
As an MMO, there's no real pressing need for heavy IT sec protocols similar to large multi-national companies. Hence the feet dragging.

The hardware token itself, although some (on a personal level) may think it's cheap, isn't as cost effective as an issued software token. Then you need to consider how many real players will be buying these tokens, despite the favorable view, the pool probably won't exceed 100K at the most optimistic level. If I was betting, maybe within the 10-20K range.

Don't really know if other MMOs is making any profit, loss or is just breaking even on secondary authentication. Doubt they can profit considering the long live tokens vs capital and ongoing support costs that they will incur. Break even? Depends on how much discount they get for the tokens from the manufacturer and how much profit they tack on it when they resell it.
Setaceous
Nexus Prima
#31 - 2013-04-21 21:04:33 UTC
As long as I can get a physical version I'm all for it. Unfortunately there has never been a software version that works on my cellphone from any company.
chriz
Deep Core Mining Inc.
Caldari State
#32 - 2013-04-21 22:18:32 UTC
Setaceous wrote:
As long as I can get a physical version I'm all for it. Unfortunately there has never been a software version that works on my cellphone from any company.



Change phone ...

/chriz
Setaceous
Nexus Prima
#33 - 2013-04-21 22:38:26 UTC
chriz wrote:
Setaceous wrote:
As long as I can get a physical version I'm all for it. Unfortunately there has never been a software version that works on my cellphone from any company.



Change phone ...

/chriz

I don't actually own a cell phone of my own. I have a work supplied Nokia C2, which is perfectly good for calls and text and nothing else. Oh and it has a battery life of 6 days with regular use. Everything a good phone should be :P
Agent Trask
Doomheim
#34 - 2013-04-22 01:30:02 UTC
James Amril-Kesh wrote:

Yeah, the part I was confused about is how the server knows which input to expect. But that makes sense.


Time and authenticator serial number are the simplest.

We all have the correct time within 30 seconds, and you register your number with CCP.

If your authenticator gets run through the laundry and dead, you can cough up the serial number to get authentication turned off.

Join the New Order, buy your permit today, and follow the code.

www.minerbumping.com

NeoShocker
The Dark Space Initiative
Scary Wormhole People
#35 - 2013-04-22 01:39:41 UTC
i heard authenticators is easily hacked. My brother works at NASA and said NASA used to have it, but they abolished it due of security concerns.

I would take his word on it. The only safe security for any accounts, is keeping password in your brain or in hidden notes that only YOU can find.
rswfire
#36 - 2013-04-22 05:37:59 UTC
Dave Stark wrote:
enjoying a decade and counting of not having any of my accounts stolen. regardless of what the account is for.

feels good.


I suppose I should prepare myself for the inevitable trolling I'll receive for posting this, but I've been programming computers for over twenty years. I literally started around the age of eight; I was sent a cease and desist letter by Hasbro as an eleven year old for making a Monopoly game and distributing it on BBS'. Point being, I know computers well, and I know the common ways that key loggers and viruses are spread, and I don't use simple passwords by any means. Last year, for the first time, I had my PayPal account hacked because of a key logger. They drained quite a lot of money out of my account (despite it not actually having anything in it) because it was linked to my bank accounts.

In my opinion, if it can happen to me, it can happen to anyone.
Chandaris
Immortalis Inc.
Shadow Cartel
#37 - 2013-04-22 16:22:15 UTC  |  Edited by: Chandaris
RSA authenticator tokens have been exploited a thousand times over. The companies that make them spend a whole lot of money trying to stay relevant and making sure you don't find this out.

I very much doubt CCP will ever end up implementing this as it wound up on the chopping block along with incarna and other stupid ideas.

- Use strong passwords. (see: XKCD comic)
- don't login to game or eve gate from unsecured PC's
- reset your password at the first sign of suspicious activity, and/or every few months
- security of the associated email account is important as well.
GreenSeed
#38 - 2013-04-22 17:10:51 UTC
Klymer wrote:
Stop using password as your password.

you can read minds?
Grigori Annunaki
#39 - 2013-04-22 20:12:54 UTC
The issue isn't the security of any one password, it's reuse of passwords across different sites. If CCP makes it effectively impossible to hack your account, but you used the same password at some site that stored it in clear text, your account has been compromised. The best security is never reusing passwords ever for any reason, but given the number of things the average person has to log into, that's not feasible. Personally, I segment my passwords so each group of sites uses the same password, but high-risk sites don't use the same password as high-value sites.

Multi-factor authentication is woefully underutilized, but there's been some movement in that area lately. It still annoys me that my Battle.Net account is harder to hack than my bank accounts. I'd like to see an authenticator implemented for EVE, but the reality is that there isn't enough financial incentive for Bad People™ to try to access your account compared to WoW, GW2, etc. Heck, they could just leverage Google's authenticator if they don't want to take the time to roll their own.
Previous page12