Re: Article on passwords in Wired News

2004-06-07 Thread Peter Fairbrother
Peter Gutmann wrote:

>> An article on passwords and password safety, including this neat bit:
>> 
>> For additional security, she then pulls out a card that has 50
>> scratch-off codes. Jubran uses the codes, one by one, each time she
>> logs on or performs a transaction. Her bank, Nordea PLC, automatically
>> sends a new card when she's about to run out.
>> 
>> http://www.wired.com/news/infostructure/0,1377,63670,00.html
> 
> One-time passwords (TANs) was another thing I covered in the "Why isn't the
> Internet secure yet, dammit!" talk I mentioned here a few days ago.  From
> talking to assorted (non-European) banks, I haven't been able to find any that
> are planning to introduce these in the foreseeable future.  I've also been
> unable to get any credible explanation as to why not, as far as I can tell
> it's "We're not hurting enough yet".  Maybe it's just a cultural thing,
> certainly among European banks it seems to be a normal part of allowing
> customers online access to banking facilities.

My (European) bank uses "memorable information", an alphanumeric string
provided by me, and they ask for three randomly chosen characters when
authenticating online. There is also a fixed password.

Not terribly secure, or terribly one-time, but it would defeat a simple
keylogger or shoulder surfing attack, for instance. It doesn't give me the
warm fuzzies, but it does mean I would use a dodgy terminal at least once if
I was stuck in the badlands (and then change passwords etc.).


-- 
Peter Fairbrother

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Article on passwords in Wired News

2004-06-07 Thread Greg Rose
At 21:04 2004-06-06 -0400, Adam Fields wrote:
On Sat, Jun 05, 2004 at 10:06:20AM +0530, Udhay Shankar N wrote:
> Citibank in India experimented with a special case of this a few years ago
> - "online credit cards" - basically, a credit card number valid for one 
use
> only, which would be ideal for online purchasing.
>
> IIRC, the offering was withdrawn because there weren't enough takers.

American Express still does this, although it's difficult to find and use.
They call it "Private Payments".
Actually, they just discontinued it too, as of end of may.
Greg.
Greg RoseINTERNET: [EMAIL PROTECTED]
Qualcomm Australia   VOICE:  +61-2-9817 4188   FAX: +61-2-9817 5199
Level 3, 230 Victoria Road, http://people.qualcomm.com/ggr/
Gladesville NSW 2111/232B EC8F 44C6 C853 D68F  E107 E6BF CD2F 1081 A37C
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Article on passwords in Wired News

2004-06-06 Thread Adam Fields
On Sat, Jun 05, 2004 at 10:06:20AM +0530, Udhay Shankar N wrote:
> Citibank in India experimented with a special case of this a few years ago 
> - "online credit cards" - basically, a credit card number valid for one use 
> only, which would be ideal for online purchasing.
> 
> IIRC, the offering was withdrawn because there weren't enough takers.

American Express still does this, although it's difficult to find and use.

They call it "Private Payments".

-- 
- Adam

-
http://www.adamfields.com

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Article on passwords in Wired News

2004-06-06 Thread Anne & Lynn Wheeler
At 02:19 AM 6/5/2004, Ernst Lippe wrote:
What is that card? There are some schemes that use debit cards
with an embedded smartcard. If you are referring to one of these
schemes I don't think that they are more secure than TAN's. If
it is a card that you carry along with you, the risk that it will
be stolen is higher than the risk that some TAN's will be stolen,
because in most cases you are able to store your TAN's in
a safe place in your home. The only apparent advantage of
using a card is the PIN, i.e. "something you know", but all
internet banking application that I have seen require some form
of password which has at least the same security as a PIN.
If it really is a debit card, then the security is probably
even worse. In several debit card schemes the PIN for cash
transactions is the same as the PIN for web transactions (
if the users have the possibility to change either PIN, it
is a safe bet that they will be both the same), and it it not
at all difficult to determine the PIN in this case.
there is two factor authentication:
* something you have
* something you know
in this scenario we could conclude there are are a least
3-4  types of "something you know" authentication.
* re-usable "shared-secret", things like run-of-the-mill
account numbers .. where knowing the account number is
sufficient to perform a fraudulent transaction. these are
extremely attractive to criminals ... because merchants
tend to aggregate them in transaction files ... so a single
theft of the transaction file could represent an extremely
huge return-on-investment (benefit/risk trade-off). some past
discussion of this with regard to security proportional
to risk:
http://www.garlic.com/~lynn/2001h.html#61
* shared-secret, one-time account numbers. this is
a fairly adequate counter-measure for the major fraud
scenario ... harvesting merchant account files. there
can still thefts/copying of individual account sheets,
just like there can be thefts of individual cards. note
however that the benefit/risk of individual thefts is
orders of magnitude less than the merchant transaction
file harvesting. as per the above url discussion of
security vis-a-vis risk ... harvesting a merchant account
file of re-usable account numbers may represent a $50m
exposure ... and hundreds of thousands of dollars
expense to a bank to block the affected accounts and
re-issue new cards. one time numbers may represent
little or no countermeasure to the individual vulnerability
 but it represents a countermeasure for the aggregate
vulnerability that is several orders of magnitude larger
and more expensive
* something you have cards ... that are supposedly
hard to counterfeit ... but changing technology over
the years have made them more and more vulnerable,
PINs with most of these existing cards have been
somewhat "something you know" shared secret ...
i.e. some flavor of it is transmitted to the financial
institution. skimming technology captures the
magstripe value as well as the entered PIN;
counterfeit cards are then manufactored ... along
with notation regarding the correct pin. this
skimming also relies on re-useable values ... and
skimming operations can be setup and automated
to capture tends of thousands
* newer generation of something you have cards
with embedded chips and non-shared secret
PINs ... i.e. the correct PIN has to be sent
to the chip ... before the chip performs the
correct operation. Some of these have acquired
the "yes card" label in some parts of euro-press.
transaction information is skimmed  ... sufficient
to create a counterfeit chip-card. these counterfeit
chip-cards answer "yes" to everything ... i.e.
whether the pin entered was correct, whether the
transaction value is less than limit, etc. again
the skimming process has been automated,
allowing the capture of information for potentially
thousands of counterfeit cards (the skimming
can be identical to that used with magstripe cards).


--
Anne & Lynn Wheelerhttp://www.garlic.com/~lynn/
  

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Article on passwords in Wired News

2004-06-05 Thread Ernst Lippe
On Friday 04 June 2004 02:24, martin f krafft wrote:
> also sprach Peter Gutmann <[EMAIL PROTECTED]> [2004.06.03.1014 
+0200]:
> > One-time passwords (TANs) was another thing I covered in the "Why
> > isn't the Internet secure yet, dammit!" talk I mentioned here
> > a few days ago.  From talking to assorted (non-European) banks,
> > I haven't been able to find any that are planning to introduce
> > these in the foreseeable future.  I've also been unable to get any
> > credible explanation as to why not, as far as I can tell it's
> > "We're not hurting enough yet".  Maybe it's just a cultural thing,
> > certainly among European banks it seems to be a normal part of
> > allowing customers online access to banking facilities.
>
> While these are definitely nice, I am not particularly pleased. For
> one, they are only "what you have", and not anything else.
>
> I love the Swiss system, which is a token card and a reader, locked
> with a PIN. You go to the web, get a challenge, run it through the
> reader after inserting the card and entering the pin, then it spits
> out the response, which you enter, and you're in...

What is that card? There are some schemes that use debit cards
with an embedded smartcard. If you are referring to one of these
schemes I don't think that they are more secure than TAN's. If
it is a card that you carry along with you, the risk that it will
be stolen is higher than the risk that some TAN's will be stolen,
because in most cases you are able to store your TAN's in
a safe place in your home. The only apparent advantage of
using a card is the PIN, i.e. "something you know", but all
internet banking application that I have seen require some form
of password which has at least the same security as a PIN.
If it really is a debit card, then the security is probably
even worse. In several debit card schemes the PIN for cash
transactions is the same as the PIN for web transactions (
if the users have the possibility to change either PIN, it
is a safe bet that they will be both the same), and it it not
at all difficult to determine the PIN in this case.

TAN's are probably somewhat more reliable than your card terminal,
that needs batteries and is susceptible to hardware problems
with the card, such as the electrical contacts of the smartcard.
Also TAN's are somewhat more convenient for the user because
they don't have to type the challenge into some device. Most such
devices that I have seen had very small keyboards and displays
that will be troublesome for users with visual or motoric handicaps.

TAN's are susceptible to copying, while smartcards are at first sight
not vulnerable to this threat. Some TAN lists are protected with
a coating that must be scratched off, in this case it will be difficult
to copy the list. Also with smartcards you will have to be very careful
about the card terminals where you use the card. For mag-stripe cards
fake terminals have become really popular in recent years, and there
is no real technical reason why the same cannot be done for smartcards
as well. When you can use the smartcard in a smartcard reader that
is directly connected to a PC, it can also be used remotely
by an attacker.

So overall I don't think that there is a very big difference
in security between TAN's and smartcards, and in certain circumstances
TAN's could actually be safer.

Ernst Lippe


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Article on passwords in Wired News

2004-06-05 Thread Udhay Shankar N
At 01:44 PM 6/3/2004, Peter Gutmann wrote:
One-time passwords (TANs) was another thing I covered in the "Why isn't the
Internet secure yet, dammit!" talk I mentioned here a few days ago.  From
talking to assorted (non-European) banks, I haven't been able to find any that
are planning to introduce these in the foreseeable future.  I've also been
unable to get any credible explanation as to why not, as far as I can tell
it's "We're not hurting enough yet".
Citibank in India experimented with a special case of this a few years ago 
- "online credit cards" - basically, a credit card number valid for one use 
only, which would be ideal for online purchasing.

IIRC, the offering was withdrawn because there weren't enough takers.
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Article on passwords in Wired News

2004-06-04 Thread martin f krafft
also sprach Peter Gutmann <[EMAIL PROTECTED]> [2004.06.03.1014 +0200]:
> One-time passwords (TANs) was another thing I covered in the "Why
> isn't the Internet secure yet, dammit!" talk I mentioned here
> a few days ago.  From talking to assorted (non-European) banks,
> I haven't been able to find any that are planning to introduce
> these in the foreseeable future.  I've also been unable to get any
> credible explanation as to why not, as far as I can tell it's
> "We're not hurting enough yet".  Maybe it's just a cultural thing,
> certainly among European banks it seems to be a normal part of
> allowing customers online access to banking facilities.

While these are definitely nice, I am not particularly pleased. For
one, they are only "what you have", and not anything else.

I love the Swiss system, which is a token card and a reader, locked
with a PIN. You go to the web, get a challenge, run it through the
reader after inserting the card and entering the pin, then it spits
out the response, which you enter, and you're in...

Simple, efficient, secure.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"you raise the blade, you make the change
 you rearrange me till i'm sane.
 you lock the door, and throw away the key,
 there's someone in my head but it's not me."
   -- pink floyd, 1972


signature.asc
Description: Digital signature


Re: Article on passwords in Wired News

2004-06-03 Thread Roy M. Silvernail
Eugen Leitl wrote:
Banks tried to push smart cards, but very half-heartedly (didn't offer free
readers, which could have created critical mass). 
Ther was one of those "net-only" bank-like operations in the last days 
of the bubble that did offer free smart-card readers.  That's what 
prompted me to sign up.  Of course, the bubble burst and I never did get 
my free reader.
--
Roy M. Silvernail is [EMAIL PROTECTED], and you're not
Never Forget:  It's Only 1's and 0's!
SpamAssassin->procmail->/dev/null->bliss
http://www.rant-central.com

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Article on passwords in Wired News

2004-06-03 Thread Eugen Leitl
On Thu, Jun 03, 2004 at 08:14:39PM +1200, Peter Gutmann wrote:

> One-time passwords (TANs) was another thing I covered in the "Why isn't the
> Internet secure yet, dammit!" talk I mentioned here a few days ago.  From
> talking to assorted (non-European) banks, I haven't been able to find any that

Customers hate PINs/TANs (have to carry then around, PINs typically are not
alphanumeric, and fixed-length, print is low-contrast). Which is why power 
users have a (Windows-only, for some reason couldn't get GNUcash working, 
despite right crypto libraries and proper port punched through firewall) 
HBCI software alternatives. Which are not used widely, alas.

Banks tried to push smart cards, but very half-heartedly (didn't offer free
readers, which could have created critical mass). Now some folks are trying
to use existing smartcard-authenticated mobile phone infrastructure for
online payments, but it has its own problems (Bluetooth/IrDa, security, fax
effect, etc).

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpp37oZjAHGy.pgp
Description: PGP signature


Re: Article on passwords in Wired News

2004-06-03 Thread Peter Gutmann
>An article on passwords and password safety, including this neat bit:
>
>   For additional security, she then pulls out a card that has 50
>   scratch-off codes. Jubran uses the codes, one by one, each time she
>   logs on or performs a transaction. Her bank, Nordea PLC, automatically
>   sends a new card when she's about to run out.
>
>http://www.wired.com/news/infostructure/0,1377,63670,00.html

One-time passwords (TANs) was another thing I covered in the "Why isn't the
Internet secure yet, dammit!" talk I mentioned here a few days ago.  From
talking to assorted (non-European) banks, I haven't been able to find any that
are planning to introduce these in the foreseeable future.  I've also been
unable to get any credible explanation as to why not, as far as I can tell
it's "We're not hurting enough yet".  Maybe it's just a cultural thing,
certainly among European banks it seems to be a normal part of allowing
customers online access to banking facilities.

(If anyone from the outside-Europe banking industry can provide me with an
 explanation for non-use of TANs that goes beyond "We're looking into it", I'd
 be interested in hearing from them).

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Article on passwords in Wired News

2004-06-02 Thread Perry E. Metzger

FYI, /. has posted a story on this, but, true to form, they confuse
one time passwords with one time pads.

Perry

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Article on passwords in Wired News

2004-06-02 Thread Perry E. Metzger

An article on passwords and password safety, including this neat bit:

   For additional security, she then pulls out a card that has 50
   scratch-off codes. Jubran uses the codes, one by one, each time she
   logs on or performs a transaction. Her bank, Nordea PLC, automatically
   sends a new card when she's about to run out.

http://www.wired.com/news/infostructure/0,1377,63670,00.html

-- 
Perry E. Metzger[EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]