Perry E. Metzger wrote:
Handheld "Chip & Pin" terminals for reading credit cards in the UK are
required to be tamperproof to avoid the possibility of people
suborning them. Here is a report from a group that has not merely
tampered with such a terminal, but has (as a demo) converted it into a
tetris game to demonstrate that they can make it do whatever they
like.

http://www.lightbluetouchpaper.org/2006/12/24/chip-pin-terminal-playing-tetris/

a couple mentions of the same   

Game over for Chip and PIN?
http://www.finextra.com/fullstory.asp?id=16332
Hacked Chip and PIN terminal plays Tetris
http://www.astalavista.com/?section=news&cmd=details&newsid=3160
Chip and Pin fraud alert
http://www.thisismoney.co.uk/saving-and-banking/article.html?in_article_id=416139&in_page_id=7&ct=5

misc. past posts on related vulnerabilities and exploits
http://www.garlic.com/~lynn/subintegrity.html#yescard

as an aside ... some of the "overlay" type of exploits that make the news about 
automatic teller machines have also been used with point-of-sale terminals ... somewhat a 
man-in-the-middle attack ... even if it is only being used for skimming information (as 
in most of the automatic teller machine scenarios) .... aka how does the consumer know 
they are dealing with the real-terminal ... or an MITM/middle-man terminal? various past 
posts mentioning MITM-attacks
http://www.garlic.com/~lynn/subintegrity.html#mitmattack

the EU finread standard attempted to address some of the same issues ... 
providing tamper resistant personal-use terminals (addressing some of the same 
tamper resistant characteristics as point-of-sale terminals)
http://www.garlic.com/~lynn/subintegrity.html#finread

two of the issues

1) is the transaction you "see", the same as the transaction you "approve"

2) independent pin-entry ... as countermeasure to the numerous PC-based keylogging vulnerabilities
there is somewhat reduced concern that a terminal (that you always have 
physical possession
of) ... being subverted with some sort of overlay technology (i.e. there isn't 
an actual
attack the tamper-resistant characteristics of the operating point-of-sale terminal ... but there is a MITM overlay). Cellphone and PDAs use at POS have also been suggested
as countermeasure to the variety of point-of-sale terminal exploits.

In X9a10 financial standards working group .... recent mention in this post
http://www.garlic.com/~lynn/aadsm26.htm#18 SSL (https, really) accelerators for 
Linux/Apache?

one of the things looked at for X9.59 standard
http://www.garlic.com/~lynn/x959.html#x959
http://www.garlic.com/~lynn/subpubkey.html#x959

was how can the relying/authorizing party really know the integrity 
characteristics of the transaction environment. so x9.59 allowed for the 
transaction environment (point-of-sale terminal, finread terminal, etc) to also 
digitally (co-)sign the transaction. the authorizing party can
look-up the integrity characteristics of the terminal used in the transaction 
environment (and also have some assurance that terminal was actually used for 
the transaction based on verifying its digital signature with onfile public 
key).

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to