Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <BAY107-F124835B12EB3057FBEBB13FD390@phx.gbl>
Date: Tue, 13 Dec 2005 22:12:42 +0100
From: "Frank Dittrich" <frank_dittrich@...mail.com>
To: john-users@...ts.openwall.com
Subject: Re: MSSQL/SAP hashes?

Solar Designer wrote:

>Although I don't know German, I had a look at your articles and I'd
>appreciate your summarizing your findings on this mailing list.  I think
>that this is on topic, although a _lengthy_ discussion might not be
>since there's no publicly available patch to John the Ripper to support
>those hashes.

OK, I'll try my best to summarize what I've published so far, and
skip parts which should be obvious for the mailing list members.

Some information will be difficult to comprehend without basic
knowledge of the SAP R/3 architecture.

I may be forced to somewhat simplify the description, but I hope not
to provide incorrect information due to the simplification.
Nevertheless, the desription might still become lengthy;)


1. General remarks, not neccessarily related to SAP password security

SAP can be run on a variety of oprerating systems with different
DBMS, Oracle is probably the most commonly used one.
Since all SAP processes have the same uid, and connect to the DB as
the same user, OS and DB cannot distingush different SAP users.
Almost all SAP functionality is implemented in ABAP, the ABAP source
code of (almost all) SAP standard programs is readable and modifyable
by SAP customers.
Customer specific programs and third party add-ons are developed
in ABAP as well. SAP provides separate name spaces for those.

The ABAP programs use the run time environment provided by the
SAP kernel. (A machine dependent byte code is generated from the ABAP
source code.)

A minimal SAP system landscape usually looks like this:
development system -> test system -> production system.

In an SAP environment, authority checks have to be implemented in
the ABAP source code.
Nothing prevents a developer from copying a SAP standard program
and starting the copy after removing the AUTHORITY-CHECK statements.
There are only two exceptions, where the authority check is
hard coded into the SAP kernel:
-for accessing files on the operating system
-for executing arbitrary OS commands using a SAP kernel function
Even worse, the authorizations are stored in database tables which
the developer has write access to.

While this problem affects only development systems, a developer can
compromize subsequent systems as well, if no proper code review
procedure is in use.
Even with a code review, it's very hard to prevent a malicious
developer from compromizing subsequent systems.
A developer who is able to execute the programs he created in the
development system can modify any SAP standard program, among others
the programs of the development workbench (e.g. the editor, the
SAP standard tools to create and release transport requests to
subsequent systems, view the transport logs, the contents of a
transport request, ...)
Other possible ways to compromize a production system:
-"remote function calls" from development system or test system
to the production system, e.g. if logon credentials of a
dialog user instead of a communication user are stored in table
RFCDES (the password will is encrypted, but can easily be decrypted)
or if the communication user has unnecessary authorizations
-0-day exploits
(there's a large number of programs available in source code,
and ABAP even provides it's own parser as part of the syntax,
or wait until SAP puplishes a fix (and the source code diff)
in an OSS note)

Since SAP allows to include "special objects" into a transport
request which cause automatic program execution in the destination
system, it's possible to automatically manipulate SAP standard
programs in the destination system.

After manipulating those SAP standard tools, you can't rely on the
fact that the source code you see in the editor really is the
source code which is stored in the database, and which gets
executed when running the program.
So, the only way to _know_ you really see the source code that is
stored in the DB, you'll have to use the debugger and single-step
through the program which reads and displays the source codes in
question.
Even then, you'll need a very skilled person to perform the
review, otherwise it's very unlikely to discover all potentially
dangerous ABAP programs.
Detecting maiciously modified SAP standard programs is rather
difficult, since a develpoper can change any program without
modifying the "last-changed date" and "last changed by"
fields  in the repository (TRDIR-UDAT and TRDIR-UNAM).
In addition, the SAP standard doesn't provide support to calculate
and compare checksums for repository objects, like tools on Unix
systems, e.g. tripwire or aide do.
In a default configuration, a version history for repository
objects is only created in the development system, not in
subsequent systems.
A developer can easily manipulate the version history, because
(meanwhile you might guess it) he has write access to the tables
where it is stored.


2. Protection against attackers with special authorizations/skills

2.1. Measures to protect the clear text passwords

When logging in into a SAP system, the start screen of program
SAPMSYST will be processed.
SAPMSYST is one of the few programs which are not readable using the
SAP development workbench transactions or the ABAAP command
READ REPORT.
This is how SAP wants to ensure this program cannot be modified.

Nevertheless, a skilled developer can read and modify the source code
of this program, e.g., to capture the passwords entered during login.
While "protecting" the source code of this program does indeed
require additional skills to manipulate the source, it also makes it
more difficult to detect such manipulations.
Modifying the source code of SAPMSYST is not the only way a skilled
developer can use to capture the passwords.

2.2 Protection of SAP password hashes

SAP stores password hashes and the version of the password hash
alggorithm of the currrently used password and of 5 previously
used passwords in the database table USR02.
In addition, the password hash (but not the CODVN of the algorithm)
is stored in a newly created record in DB table USH02, whenever the
user changes his password, or whenever an admin changes the
valid-from or valid-to date of a user, locks or unlocks a user, etc.
(That means, DB table USH02 stores _all_ password hashes of all
users since the SAP system has been installed, with user name,
date and time as key fields.)

In a development system, you cannot prevent developers from accessing
the contents of USR02 and USH02.
Since a developer even has write access to these tables, he can
modify USR02-BCODE, to logon as another user.
The SAP user name is used as a salt, so all he has to do is:
Install a MiniSAP system (delivered on a CD with various ABAP books)
or a Linux TestDrive system (can be ordered at no cost, see
http://www50.sap.com/linux/eval/index.asp) on his private PC,
create a new user with a known password, and copy the hash.

Even in production systems, there might be possibilities to gain
read access to password hashes.
To directly access the contents of tables USR02 or USH02, a user
needs the authorization to start transaction SE16 (authority-check
object S_TCODE) and the authorization for authority-check object
S_TABU_DIS, authorization group SC.
(Depending on the release or on the authorization to release batch
jobs, the user can also directly start the programs generated by
SE16 via transaction codes SA38 or SE38.)

In a development or test system, authorizations are often not
as much restricted as in the production system.
(This is a problem, if the test system is frequently re-built
from the production system, or if passwords are synchroized across
systems, e.g. via CUA ("Central User Administration").)

Without direct access to the contents of the DB table, it's
possible to see password hashes of other users if you have
debugging authorization, even without the authorization to
overwrite the contents of variables during debugging.
You just have to debug one of the many programs which check the
validity of a SAP user name by
SELECT SINGLE * FROM USR02
     WHERE BNAME = name_entered_in_some_dialog_screen ...
Because checking the validity of a SAP user name like this is the
most commonly used method across all SAP programs, it's also
infeasible to detect "unauthorized" USR02 access by switching on
the SAP SQL trace for USR02.

2.3. Protection of the hash algorithm

SAP tries to prevent illegitimate calls of the SAP kernel function
which calculates the password hash.
If SAP detects such an illeggitimate call of the kernel function,
a SAP system log entry will be created, the user will be locked and
immediately logged out of the system.
That means, since SAP R/3 release 4.6B it's somewhat harder to
write an ABAP program which tries to crack SAP passwords than it
has been in earlier releases.
But a skilled developer can easily bypass SAP's check.
So, even without knowledge of the hash algorithm, it's possible
to develop a SAP password cracking program implemented in ABAP.

On a Linux PC with an AMD Athlon(TM) XP 2100+ processsor and 1 GB
RAM, an ABAP program can try about 8 million user name / password
combinations per minute (compute the hash and compare it with the
hashes from USR02/USH02).


2.4 Weakness of the SAP hash algorithm(s)
    (as mentioned in my 1st article)

CODVN A

The previously used hash algorithm (USR02-CODVN = 'A' for the
currently used password, or USR02-CODV1 - USR02-CODV5 for the
5 previously used passwords, respectively) had serious flaws:
-just the first 6 characters of the SAP user name have been used
as a salt, so that an attacker could crack the passwords of several
users who's user names started with the same characters without the
need to calculate each hash separately
-frequently occuring hash collissions, so that a trivial password
often had the same hash as a really complicated password
-password hashes of the same password, but for totally different
user names, usually "looked" very similar, so that probably attacks
much more effective than trying arbitrary passwords should be
possible

(That's why, you should take care that no USR02 record with CODVN 'A'
exists.
Since CODVN 'A' has been depreciated a long time ago, this CODVN
should, if at all, only occur for dialog user IDs which are still
valid, but the password hasn't been changed for years, or for
non-dialog users like RFC users (here "RFC" means "remote function
call")

Because of those weaknesses, SAP introduced a new hash algorithm,
CODVN B, many years ago (about 10 years ago, I think).
SAP didn't publish the algorithm.
All high-level information that's "publicly" available can be
found in SAP OSS note 2467 and related notes.
(SAP OSS notes are accessible for SAP customers via the
SAP Service Marketplace, https://service.sap.com/notes.)

CODVN B

The hash algorithm which replaced CODVN A also has it's
flaws/problems:
The SAP documentation up to R/3 release 4.6C mentions that
the system does not distinguish between upper and lower case
characters, but otherwise you can use all characters which
can be entered into a terminal when composing a password.
The documentation for release 6.20 mentions that letters A-Z,
digit's 0-9, and punctuation marks can be used.

Problems when using 8bit characters (not 7bit ASCII characters)
have not been mentioned.

Analyzing the hashes computed by the system, you'll see that all
characters which are not 7bit ASCII characters can be replaced by
an accent circumflex ('^') without changing the hash.
(These predictable collisions occur for non-ASCII characters in
SAP user names as well:
If SAP users MÜLLER and MÖLLER (both very common German names)
use the same password, the hash will also be the same.
It should be obvios how this knowledge can be used by an attacker.)

The reason for not distinguishing non-ASCII character has probably
been the fact that SAP runs on a variety of platforms, and wanted
the hashes to be independent of the code pages in use.

(BTW, for CODVN A all non-ACII characters in the user name or
password caused collisions with an apostrophe ('\'') instead of an
acccent circumflex.)


3. Protection against unauthorized login attempts

3.1 Detection of failed login atttempts

To prevent unauthorized logins, it's mandatory to deal with
failed login attempts. Otherwise, an attacker might sooner or
later succeed by simply trying different passwords.

SAP logs failed dialog login attempts in the system log.
(I'll skip mentioning the SAP security audit log, since it hasn't
been covered in my articles, and since it's not activated in a
default configuration.)
In addition, the number of failed login attempts since the last
successful login is stored in the user master record (USR02-LOCNT).
The problem is that usually only SAP system administrators have the
authorization to check the system log or the number of failed login
attempts for a particular user.
But a system administrator will usually not be able to distinguish
between an unauthorized login attempt and an authorized user who
accidently mis-typed the password.
You can only assume the authorized user mis-typed his password,
if immediately afterwards the user logs in successfully.
Even then, you cannot be sure.
Neither the terminal ID nore the IP address of the client PC are
sufficient to prove who tried to login.
(The terminal ID which is reported in transaction SM04 can be
easily manipulated by users who are authorized to change
environment variables on the operating system of the client PC.
If the SAPGUI is started from a WBT server, or if the user connects
via a SAProuter, the SAP application server only "knows" the
IP address of the WBT server or SAProuter.)

Only the user will know whether or not he mis-typed the password
in a previous login attempt.
That's why, the user should be informed about failed login attempts.
But the SAP standard doesn't provide this functionality.
Even in the SAP login user exit (so-called "user exits" allow
to plug-in customer specific code without modifying SAP standard
programs) such a function cannot easily be provided, since the
counter of failed login attempts will have been reset to 0 before
the login user exit is processed.
(The only way would be to define an update trigger on DB level,
which increases a counter in a customer specific table,
check this customer specific table in the login user exit,
inform the user about failed login attemts, reset the counter...)

3.2 Locking users after failed login attempts

The SAP system profile parameter login/fails_to_user_lock determines
how many failed login attempts may occur before a user will be
automatically locked by the system.
There was an issue with the sapinfo tool which allowed to try
passwords via RFC connects without locking the user, see
http://seccurityfocus.com/bid/7007/discusssion/
(Meanwhile the problem has been fixed, I think.)

3.3 Password change frequency

To make successful password cracking attempts more difficult,
it is required to frequently change the password. (So that the
time to crack a password is hopefully larger than the time the
password is valid.)

The SAP system profile parameter login/password_expiration_time
determines how long a password can be used.
If the specified number of days since the last password change is
over, the user is forced to change his password during login.

There's no prior warning before the password expires, and no
possibility to specify a number of grace logins without
requiring to change a password which has been expired.

As a result, users are either picking passwords which can easliy
be guessed, or they frequently forget their password.

A warning about passwords which expire in a few working days can
be easily implemented in the SAP login user exit.
It's even possible to let each user configure how many working days
in advance he wants to be informed about a password expiry.

3.4 SAP specific password restrictions

For SAP systems, several restrictions apply:
-minimal length is 3 characters (can be _increased_ by
adjusting a SAP profile parameter)
The minimal password length is not checked during login,
only when changing the password. (If you know the hash algorithm
and have write access to the hash, you can login with a
one character password, but not with an empty password.)
-maximal length is 8 characters
-trailing spaces are ignored (they'll be removed before
computing the hash)
-no distinction between upper and lower case
-the first character cannot be '!' or '?'
(according to SAP's documentation, there cannot be a space
among the first 3 characters of the password, however, this
restriction does not longer apply to current SAP kernel versions)
-among the first 3 characters, there have to be at least 2
different characters, not counting upper/lower case differences
(this restriction is only checked when changing the password,
so that a user who picks the password ÄÖÜßµ²³° can login with
the password ÄÄÄÄÄÄÄÄ or ^^^^^^^^, if CODVN B has been used to
compute the hash)
-the password cannor be PASS or SAP
-the 5 previously used passwords cannot be reused
-the user cannot change the password more than once per day,
except if the password has been reset by an administrator
(to prevent bypassing the password reuse restriction)

(The restriction that the first 3 characters of the password
may not occur in the same sequence in the user name, which is still
mentioned in SAP's documentation, does not longer apply - checked
for R/3 releases >= 6.10)

There's also a DB table USR40, which can be maintained by the
administrator.
This table is designed to store forbidden passwords and password
patterns (? is used as a placeholder for a single character,
and * as a placeholder for any sequence of characters).

In releases >= 6.10, additional restrictions can be activated
via SAP profile parameters, see appendix)

3.5 Enforcing strong passwords/detecting weak passswords

In earlier releases, SAP allowed to plugin customer specific
password checks (in program SAPMS01J), to reject weak passwords.
Because this plugin could have been mis-used, such a possibility
no longer exists.

('m afraid I have to postpone covering most of the findings
mentioned in my second article.
The most detailed part is the description of hash collisions
which occur due to a minor flaw in the implementation, and how
CODVN B and the newly created CODVN D hash algorithms are affected.)


Appendix

SAP profile parameters related to password policy:

login/min_password_length
minimal password length, checked when changing a password
(values less than 3 will be ignored)

login/min_password_diff (R/3 release >= 6.10)
minimum number of characters that differ, when comparing old and new
password (simple shifting, like GJP$EUB7 -> P$EUB7GJ, doesn't count
as a difference.)

login/min_password_digits (R/3 release >= 6.10)
minimum number of digits (0-9) in a password,
checked when changing a password

login/min_password_letters (R/3 release >= 6.10)
minimum number of letters (A-Z) in a password,
checked when changing a password

login/min_password_specials (R/3 release >= 6.10)
minimum number of other characters (not 0-9A-Z) in a password,
checked when changing a password

login/password_expiration_time
number of days before a user password expires
(0: password doesn't expire)

login/password_max_new_valid
number of days a password of a newly created user is valid

login/password_max_reset_valid
number of days a user password reset by the admin is valid

login/fails_to_session_end
number of failed login attempts after which the current
SAPGUI session is closed

login/fails_to_user_lock
number of failed login attempts after which a user will be locked

login/failed_user_auto_unlock
determines whether a user who is locked due to the number of
failed login attempts will be automatically unlocked at midnight

login/no_automatic_user_sapstar
(default 0 means, if no record for user SAP* exist in table USR02
for a particular client, login as SAP* is possible with password
PASS, and the user SAP* will have unlimited authorization,
value 1 means, no login as user SAP* with password PASS possible,
if no such USR02 record exists)


SAP documentation on the web:
http://help.sap.com/


> > I'm, however, not going to publish the patch or mention details
> > about the algorithms being used.
> > (I'd like to contribute work to John the Ripper, because I
> > appreatiate the work done by Solar Designer and others, but I think
> > publishing the patch wouldn't be a good idea.
> > The reason is that it's very hard, if not impossible, to protect
> > SAP password hashes against unauthorized access.
> > That's why, publishing the algorithm IMO would have a disastrous
> > effect on the security of SAP systems, instead of increasing the
> > security by allowing the admin to discover weak passwords.)
>
>Well, if Unix password crackers were not publicly available, most
>vendors wouldn't bother implementing shadow passwords.  Isn't publishing
>the algorithm the only way to persuade SAP to start fixing things?

You might be right.
Adressing the issues would, however, require a few,
not easily to implement, changes in the SAP R/3 architecture.
That's why I doubt they'll implement significant improvements
in releases which are currently in use by customers.
(And migrating to a new SAP release is usually not that simple,
either.)

Regards, Frank


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.