RFID Privacy Problems! Why don’t companies do resonable security?

I wonder if you ever heard about RFID. It is a technology in which data can de transferred wirelessly from a tag or a transponder, allowing passive or active identification of a device.

The amount of possible implementations of the technology is HUGE. From inventory control, facilitating tracking and logistics, to automatic tellers in supermarket and even wireless credit card transactions. IBM is investing on the technology and even put some commercials on TV about it:

While this type of solutions can severely reduce costs for companies that deal with logistics, we must be careful when using it in personal level. A lot of privacy issues come around, for example: an eavesdropper can identify you remotely by scanning your RFID tag. The scenario I am imagining is something like the one pictured on the film Minority Report, when Tom Cruise is targeted by a series of personalized commercials when iris scanners identify him while passing through a shopping mall. In RFID, this can be done reading your credit card information.

Some might say that the information can be encrypted; more than that it WILL BE encrypted even to avoid fraud. The bad news is that the first generation of RFID credit cards is out, and the encryption, apart from what the banks say, seems not to be there.

A group of scientists have been studying the topic and founded the RFID ConsurtiUm For Security and Privacy, which aims “to make RFID safe for consumers by conducting open research and educating the next generation work force that will develop, deploy and maintain secure RFID infrastructures”. The fact is that these guys conducted a series of tests on RFID credit cards and the result was not good. An interesting video came out showing the tests they conducted.

While the video can’t be conclusive, the technical reports on their webpage show that we are far away from a reasonable level of security on financial RFID implementations. If we think about the selection of SDA cards over DDA cards on the Chip and Pin technology I mentioned in a previous article, seems obvious that again the security is available for the technology (crypto is there, as long as the computing power for the devices to work), but no one wants to invest the money to have a product that protects the customer. It is not about a cost x benefit calculation but a matter of completely ignoring the risk. I congratulate the guys at the RFID CUSP for their work and let’s hope that initiatives like that pressures the manufacturers and companies that want to implement the technology to have a decent level of security in their systems.

Keep on eye for that technology… 😉

Posted in Information Security | Tagged , | Leave a comment

Is 3D Secure the solution for on-line card payments? Part II

Hiya,

I have received some feedback about the post on card payment solutions and one of the things it is important to say is that CAM and CVM are just components of the solution that secures POS (Point of Sale) card payments.

If we look into card payment as a process, we can see its many sub-processes. For example:

– POS card payments, when the payer pays the merchant using a card in a POS as the payment instrument on the merchant premises;

– Online card payments, when the payer uses information as the payment instrument and authenticate himself using remote solutions

– ATM operations, where the conditions in which the card is checked and the identity of the holder is authenticated are different because the ATM is a trusted piece of hardware.

If we expand on those, assuming that what we discussed in the last post is just part of the process, we then can talk about the challenges of on line card payments.

Back on the times of CD-Universe, where credit card numbers were stolen from a central database and was one of the factors that led the pioneer online CD selling company to bankruptcy, things have improved a bit.

It is very difficult to have precise fraud numbers. Credit card companies and banks are not very happy to talk about their losses, mainly because that is a threat to the confidence we put on the payment options they offer us. The fact is that we know the losses are huge, otherwise we would not see such a big investment on fraud identification and control as we see today.

VISA LogoOne of the latest solutions to avoid fraud on the online world is the 3D Secure, an “enhanced security scheme for online payments” currently being developed by MasterCard and VISA.

What is this all about? 3D Secure basically a process that uses technology like SSL with client authentication and HTTP redirection as basis to guarantee payee and payer authentication and avoid eavesdropping of the payment communication. That way the system would be secure in the sense that a malicious third party could not impersonate the payer nor capture the instrument for replay.

While the message flow through a payment would be a good way of going through the process, it would be too detailed and probably confuse most of the readers. It is a long 12 step process and I can refer you to the Professor Chris Mitchell’s MSc. lecture notes for the inner workings. The most important and relevant things about 3D Secure are:

– Apart from the bank, the payer and the merchant, a trusted third party (ACS – Access Control Server) is introduced to authenticate the payer and vouch for the payee identity. The way the payer is referred to that ACS and back to the merchant is through HTTP-Redirection (using methods like POST for data transfer)

– As the system uses SSL, it is dependant on an existing PKI. As security professionals we all know the complications that this implies… Also, users must know how to use digital certificates… I bet you all have been through the pain of user awareness before. Do you think it is easy to explain to a 60 year old lady how to check if a digital certificate presented to her is false or not?

– It needs a common infrastructure connecting the merchants, banks, brands and ACS. While communication is not an issue these days, who will pay for this is, as long as guaranteeing minimum access to those resources to avoid fraud.

In the end of the day, online card payments are STILL a complicated thing to do. It is very difficult to put security in mechanisms not designed to be secure on the first place, and let’s be hones: the web was not designed to be secure! So what is the solution? E-commerce won’t stop…

Credit cardsIt is all about common sense. None of the institutions interested in this want to give a step back and pay for the solution, but while we don’t collaborate fraud will still be a major issue. A solution involves the use of mutually multiple factor authentication, simple procedures, training, constant monitoring for system abuse and heavy penalties for those who try to fool the system!

By having mutually authentication all parties involved in the transaction know who is who, and that entity authentication is the base of everything else. The way to do it is using multiple factor authentication. The most secure forms to do it involve digital certificates. Question mark here: who will develop a wide adopted PKI?

Training has to come hands tied with simple procedures. Any wide scale solution should be simple. Why most people do know how to turn on the TV but still don’t know how to program or set the clocks on their VCRs?

Constant monitoring and heavy penalties also come together. While monitoring is important both for improving the system by identifying errors through audit, it also sends a message for who tries to fraud the system and gets caught. In any system there are usually a small number of people who are responsible for most of the damage. If we deal with them in an efficient fashion we send a message for all that wants to “play” with the system. It is part of user education. It is important to say that this require decent legislation. I wonder if our politicians are ready to build good laws to address this problem.

So, what is the solution to fraud? Common sense… if banks, brands and the financial sector stop to create short sighted high technology solutions and address the problem through a multidisciplinary approach (people, process and technology) things are going to start making sense.

God bless us all… 🙂

References:

– Card Watch: http://www.cardwatch.org.uk/
– VISA 3DSecure: http://partnernetwork.visa.com/pf/3dsec/main.jsp
– Application and Business Security Developments – Royal Holloway, University of London Chris Mitchel’s lecture notes: http://www.isg.rhul.ac.uk/~cjm/IY5601/index.htm

Posted in Information Security | Tagged , , | Leave a comment

Blog Updates

Hi!

You may have noticed a lot of recent changes on the blog. This is due to the early stage of the tool. I’m still working on the best layout and “formula” for the WebLog and again would appreciate comments.

I found out that WordPress offers a great set of tools (better than the ones at my ISP) and decided to move here temporarily. You can access it through the original address (http://blog.acciolyrosa.com) that will remain the Blog official address. It will be redirected here as long as I can’t organize things back at the ISP.

If you want to understand how and when things are happening, you can track them down at the revision control tab.

I’m sorry for the inconvenience, but I think it is for better usability and your benefit! 😉

All the best!

Posted in Admin | 2 Comments

Man fools ATM probably using default system password

By the way, as I just wrote about cards and payment systems, I thought that the news below could be relevant.

I have just read in Bruce Schneier’s Cryptogram that a man used system codes, probably taken from an ATM manual, to fool an ATM to hand him more money than it should. The machine was handing out US$20 bills thinking they were US$5 bills.

There are speculations that the trick involved the use of a default password on the ATM.

I’ve found a video on YouTube with the CNN story:

https://youtube.com/watch?v=cmW_4R81jVU

Enjoy!

Posted in Information Security | Tagged , , | 3 Comments

Is CHIP + PIN the Solution for Fraud in Card Payments?

Hi all,

This first post is about something I have been researching since last may: credit card transactions.

As many of you probably know, there are a lot of vulnerabilities in the widely used stripe card system that is deployed in most of the credit cards in the world. It is very easy to clone a card, just by reading the information on the magnetic stripe or even by having access to the card number, holder name, expiration date and CVV number. Targeted systems include e-commerce stores, which use customer credit card details to process orders that are made online.

Security developments on cardsThere’s been a lot of interesting developments on the smartcard industry on the last years. These developments could allow a great reduction on the number of fraud that happens when credit card details are captured and cloned cards are used to make unauthorised purchases of goods and services. The chart below, extracted from Royal Holloway, University of London Professor Chris Mitchel’s lecture notes, show some of these developments in context and the escalation of fraud in relation to such developments

We can clearly see a tendency of growth, making it clear that criminals rapidly absorb these countermeasures and develop ways to circumvent the protections that are implemented. loss of profits that led to Chip and Pin development on the 90s

One of the latest technologies that have been deployed, especially through the Eurocard-Matercard-Visa system (EMV) is both CAM, or Card Authentication Method and CVM, or Cardholder Verification Method. In its latest form, these consist of a set of industry standards for the use of Smartcard technology to authenticate credit and debit cards successfully, while making sure that the card holder is really the person authorised to use the card.

If you have ever used a magnetic stripe credit card, you have probably signed a paper slip after conducting a transaction. The purpose of that signature is to guarantee the merchant that you are who you say you are. In fact, that is the second of a two way authentication: something you have (card) and something you are (signature – we could regard this as a form o biometrics). What many people don’t know is that if you dispute a transaction, the bank will ask the Merchant for the signed slip. If the merchant fails to provide that slip with an authentic signature you can successfully repudiate the transaction and the liability (loss) is the Merchant’s.

Of course there is a great number of ways to fool this system. From merchants who don’t check the signature, MOTO (Mail Order-Telephone Order) and on-line purchases where you don’t sign any slip, to bad guys stealing cards that arrive at your mail box, this system has proven not to be very secure, justifying a number of initiatives to protect the bank’s reputation and minimizing loss.

The business case for introducing the CAM and CVM that are being rolled out in Europe these days was considered in the 1990’s. By comparing the losses in fraud versus the investment necessary to implement the technology and processes necessary to support such scheme, banks decided to go for the Smartcard or Chip and PIN technology.

Basically, this works as a substitute for the signature slip. Instead of signing a paper slip, which is expensive to check in case of transaction repudiation, not applicable for all forms of transactions (as MOTO transactions for example) and are easily fraud by stealing unsigned cards, you would type a PIN (Personal Identification Number, or a pass number that is usually a 4 digit number) in the POS (Point of Sale, or machine where you swipe your card when making a payment). That way we substitute the signature (a form of biometrics) for the PIN (something you know) and make a secure two factor authentication (something you have – card – something you know – PIN)

Two mechanisms are used to ensure that the authorization for a transaction is not vulnerable to fraud. The CAM and the CVM.

CAM, or Card Authentication Method, is the way that the POS checks if the card is cloned and valid. If we are using Smartcards, there are two main ways of doing this: The SDA (Static Data Authentication) or DDA (Dynamic Data Authentication). The difference is that, in the first one, the card has a digital signature from the bank stored on its memory. When requested, the card presents that signature to the POS and it compares with another signature generated by the Bank CA stored on the POS itself. This makes SDA to be vulnerable to replay attacks, where a malicious POS would capture the signature and the card could be cloned by writing that signature in another smartcard.

On the DDA, there is a challenge-response mechanism, which prevents the POS (or malicious card reader) to have access to the instrument used for authentication. Thus, it is impossible for an attacker to perform the same attack as described above. The attacker would have to break into the smartcard that is theoretically a tamper resistant mechanism.

Of course that SDA cards are cheaper and easier to implement, but this vulnerabilities can introduce problems. For you to have an idea on the importance of such difference, Shell Petrol Stations have halted the use of Chip and Pin cards (SDA cards) . after £1 million fraud in the UK on may 2006. That event shook the confidence in the technology, but it should be seen as proof that the use a Smartcard doesn’t mean instant security. The correct technology should be selected on a base of cost-benefit analysis instead of saving some money on the last mile of a project.
There’s been a lot interesting work on SDA vulnerabilities and problems. I would suggest interested readers to take a look at the Point-of-Sale Terminal Interceptor that was developed by Mike Bond from the Computer Laboratory of the University of Cambridge. . Royal Holloway, University of London also has a great laboratory which conducts interesting research in the field.

It should also be noted that other modes of CAM also exist, like CDA, or Combined Data Authentication, but that is only a variation on DDA that prevents some minor attacks on its architecture.

The other side of it is the CVM, or Cardholder Verification Method. This consists of the smartcard verifying that the PIN typed on the POS by the payer is the correct PIN. This is an offline transaction, so the POS don’t have access to the bank’s network to perform the CVM.

While the PIN is stored securely in a theoretically tamper resistant smartcard, attacks usually involve the use of malicious POS. When the cardholder types his/hers PIN on the POS, it captures it and can know that it is a valid one when the smartcards confirm the verification of the cardholder. Solutions for this involve the use of a secure POS, but are complicated as the POS stay on the merchant’s facilities and are prone to wedge attacks and physical tampering for example.

While these technologies represent a great advance for payment systems, we are far away of proper use of technology. Cases like the one with Shell prove that processes are not in place to guarantee the proper architecture and authorization of payments and both academia and industry should collaborate for more open, secure and strong standards to avoid fraud and low costs of banking in our society.

There is much more to be explored on this topic. From Online Payment Authentication and Authorization schemes, like 3-D Secure, to Mobile Commerce, which I shall discuss on further articles. In the mean time I would love to hear your questions, feedback and opinions about this post. Please leave a comment or send me an e-mail at daniel acciolyrosa com.

References

Web:

Wikipedia Smartcards page: http://en.wikipedia.org/wiki/Smartcards
Wikipedia EMV page: http://en.wikipedia.org/wiki/EMV
Application and Business Security Developments – Royal Holloway, University of London Chris Mitchel’s lecture notes: http://www.isg.rhul.ac.uk/~cjm/IY5601/index.htm
Royal Holloway, University of London Smartcard Centre: http://www.scc.rhul.ac.uk/
Computer Laboratory of the University of Cambridge – Point-of-Sale Terminal Interceptor: http://www.cl.cam.ac.uk/~mkb23/interceptor/
EMVCO: http://www.emvco.com/

Books:

D. O’Mahony, M. Peirce and H. Tewari, Electronic Payment Systems for ECommerce. Artech House (2001), 2nd edition.

Posted in Information Security | Tagged , , | 6 Comments

Welcome to my Blog!

I believe in information exchange and freedom, and in times when we are overloaded with information blogs appeared as a flexible way to present personal points of view and share thoughts.

It is not a trend, but something that came to stay. As long as we are committed and not embarrassed to expose our points of view, we can all benefit from this wonderful experience that is publishing on the internet and learning from the feedback we receive.

I would be a fool not to take advantage of such nice tool. So after a small experience with a Blog I wrote about the time I spent attending to a MSc. in the United Kingdom, I am setting up this another one.

The idea is to create a space to share ideas, but since it is my blog I will focus it on my main interests. At this time I will write about Information Security (my professional area) and complement it with other interests I have. This is due to the fact that Infosec is such an interdisciplinary field that I believe it benefits from inputs of all areas of knowledge.

Another important issue is the Blog language. As much as I would like to be able to write it both in Portuguese and English, and consequentially be a more democratic space, most of my friends that speak Portuguese are able to understand English, while the other way around is not true. As I don’t have time to translate every post the main language will be English. I’m sorry to all my future Brazilian readers. I hope this won’t prevent you from enjoying this source of information as I intend to compare all my international experience with my Brazilian origin and bring to you all the best of both worlds.

This is it for now. As much as this is a test I would appreciate any feedback about my initiative at this early stage. You are welcome to comment the layout, features that I could offer and anything you can thing of.

Thank you, and please come back soon!

Daniel

Posted in Admin | Leave a comment