Invalid banking cert spooks only one user in 300
  Stephen Bell, Computerworld
  16/05/2005 09:19:10

  Up to 300 New Zealand BankDirect customers were presented with a security
  alert when they visited the bank's website earlier this month - and all but
  one dismissed the warning and carried on with their banking.

The rest of the story is at
http://www.pcworld.idg.com.au/index.php/id;1998944536;fp;2;fpid;1 or
http://www.computerworld.co.nz/news.nsf/0/FCC8B6B48B24CDF2CC2570020018FF73?OpenDocument&pub=Computerworld
(PC World Australia or ComputerWorld NZ).  To provide a little more background
information, BankDirect is an online-only offshoot of another bank (ASB)
that's targeted at computer-savvy users who don't need (or want) the expense
of a standard bricks-and-mortar account.  There are no branches, and payment
is done electronically at the point of sale (EFTPOS) and managed via the
Internet or a cellphone, thus the (apparently) low number of accesses - you'd
generally rarely need to access it over the net.

So in other words the number of computer-savvy users who were stopped by an
invalid server cert at a banking site was essentially zero.  To quote the
article again:

  Peter Benson, chief executive of Auckland-based Security-Assessment.com,
  says he is "not at all surprised" at the statistics. "In my experience, the
  single weakest point in the chain of [computer] security is the space
  between the keyboard and the floor."

  A lot more education of users in responding appropriately to security alerts
  is needed, he says.

Looks like we have a long way to go in making effective security usable.  Note
that if the same site had used TLS-PSK
(http://www.ietf.org/internet-drafts/draft-ietf-tls-psk-08.txt) instead of
straight passwords over TLS, and had this been malicious spoofing instead of
just an accident, none of this would have been possible (TLS-PSK provides
mutual authentication of both parties before any sensitive information is
exchanged, so even if the user ignores the warning, they won't be able to
communicate with a spoofed site).

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to