Re: Exponent 3 damage spreads...

2006-09-28 Thread Erik Tews
Am Montag, den 25.09.2006, 01:28 +0200 schrieb Philipp Gühring:
 Hi,
 
 We have been researching, which vendors were generating Exponent 3 keys, and 
 we found the following until now:
 
 * Cisco 3000 VPN Concentrator
 * CSP11
 * AN.ON / JAP (they told me they would change it on the next day)
 (perhaps more to come)
 
 My current estimate is that 0.26% of the certificates in the wild have 
 Exponents =17

I did a little survey one month ago for my bsc. thesis.

I found out, that round about 1.19% of all https-server-certs use an
exponent = 17. I did choose round about 32,000 random webservers for
this survey.

What is intresting is what happens when it comes to imap-ssl. Here, only
0.1% of all servers use a server-cert with exponent = 17. Imap-ssl
users seem to be the better ssl-users, tls 1.0 is more widespread there,
small rsa-modulus-sizes are more seldom, and ssl 2.0 is not so common
there too.

I will publish some more details later.


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: interesting HMAC attack results

2006-09-28 Thread Alexander Klimov
 Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using
 Hash Collisions, by Scott Contini and Yiqun Lisa Yin (*)

On Mon, 25 Sep 2006, Anton Stiglic wrote:
 Very interesting, I wonder how this integrates with the following paper
 http://citeseer.ist.psu.edu/bellare06new.html (**)

According to Section 1.4 of (*), the new result on HMAC does not
contradict the analysis in (**). That is the assumption used by Mihir
Bellare do not hold for MD4, MD5, and SHA-1.

-- 
Regards,
ASK

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: A note on vendor reaction speed to the e=3 problem

2006-09-28 Thread Richard Salz
 From a security point of view, shar has obvious
 problems :-)

Really, what?  There are things it doesn't do, but since it's only a 
packaging format that's a good thing.

/r$

--
STSM, Senior Security Architect
SOA Appliances
Application Integration Middleware


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: fyi: On-card displays

2006-09-28 Thread Anne Lynn Wheeler

and for a whole lot of drift with respect to smartcards being pda/cellphone 
wanabees

Storm building over RFID-enabled passports
http://www.networkworld.com/news/2006/092106-rfid-passports.html

from above:

The chip, which is embedded inside the cover of the passport, contains only a 
duplicate copy of the passport photograph and the printed data. The digital 
data is intended to prevent forgeries by allowing inspectors to compare the 
printed and digital data.

... snip ...

the article mentions that integrity of the electronic data is protected by a 
digital signature (preventing tampering and/or forgeries).

At some level, the digitally signed data can be considered a electronic 
credential that is extremely difficult to counterfeit.

posting with number of references about cloning (electronic) passport data
http://www.garlic.com/~lynn/aadsm25.htm#11 And another cloning tale

from three factor authentication model
http://www.garlic.com/~lynn/subpubkey.html#3factor

* something you have
* something you know
* something you are

... frequently hardware tokens (chips) are implemented as something you have 
authentication (i.e. the chip supposedly contains some unique information ... which differentiates 
it from every other chip). some recent posts mentioning something you have 
authentication.
http://www.garlic.com/~lynn/aadsm25.htm#30 On-card displays
http://www.garlic.com/~lynn/aadsm25.htm#25 RSA SecurID SID800 Token vulnerable 
by design
http://www.garlic.com/~lynn/aadsm25.htm#16 Fraudwatch - ChipPIN one-sided story

however, taking the passport chip data as an electronic credential, cloning the 
information doesn't (directly) represent a vulnerability ...  since it is more 
analogous to digital certificates ... which are readily assumed to be widely 
distributable.

the passport chip data as an electronic credential containing a digital photograph ... and matching 
a person's face to the digital photograph then represents something you are 
authentication (as opposed to assuming the chip ...or even a cloned chip ... represents any sort of 
something you have authentication).

in theory, an electronic credential would be considered valid, regardless of 
any specific chip container that it might be carried in. one might then make 
the assertion, that a passport electronic
credential could be carried in any device capable of reliably reproducing the 
correct bits.

going back to the issue raised in
http://www.garlic.com/~lynn/aadsm25.htm#30 On-card displays

that most smartcards/chips are really pda/cellphone wanabees ... one might 
suggest that you could then even carry your electronic credential/passport in 
your pda or cellphone ... as opposed to needing a separate physical device.

the issue that then is raised are there any significant privacy considerations 
similar to privacy issues raised with x.509 identity digital certificates from 
the early 90s (having large amounts of privacy information in x.509 identity 
digital certificates widely distributed all over the place).

by the mid-90s, many institutions considered that the privacy and liability problems with 
x.509 identity digital certificates were so significant that they retrenched to 
relaying-party-only certificates. lots of past posts mentioning 
rpo-certificates
http://www.garlic.com/~lynn/subpubkey.html#rpo

these were digital certificates that effectively only contained some sort of 
database index or account number. the relying party then used the account 
number to retrieve the actual information of interest (w/o having to widely 
expose it in any way).

the analogy for an electronic passport infrastructure would be just needing to present 
the passport number. the actual credential data (and any photos or other information 
necessary for something you are authentication) is retrieved from secure 
online repository.

as repeatedly pointed out in the RPO digital certificate scenario ... it 
isn't even necessary to include the account/passport number in a digitally signed 
document ... since there is no information that needs integrity protection. the person 
just makes an assertion as to their correct account/passport number. the appropriate 
information is then retrieved from the online infrastructure and used for authentication 
(and whatever other required purposes). asserting the
wrong account/passport number presumably retrieves information that fails to 
result in valid authentication.

needing (some certification authority) to digitally sign the passport/account 
number (in the RPO scenario) for any possible integrity purposes, is then 
redundant and superfluous (one of my oft
repeated comments).


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: A note on vendor reaction speed to the e=3 problem

2006-09-28 Thread Travis H.

On 9/26/06, Richard Salz [EMAIL PROTECTED] wrote:

Really, what?  There are things it doesn't do, but since it's only a
packaging format that's a good thing.


Though there are unshar tools, typically people run it as input to /bin/sh,
usually without reading through it (and given the level of obfuscation sh
offers, it's not clear that you couldn't sneak something through even if
the person skims it).
--
Enhance your calm, brother; it's just ones and zeroes.
Unix guru for rent or hire -- http://www.lightconsulting.com/~travis/
GPG fingerprint: 9D3F 395A DAC5 5CCC 9066  151D 0A6B 4098 0C55 1484

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


National Security Agency ex-classified publication indexes now online

2006-09-28 Thread John Gilmore
[The Memory Hole also publishes an interesting list of FOIA logs,
 listing who asked NSA for what, across many years.  I see a lot of
 friends in there.  http://www.thememoryhole.org/foi/caselogs/ -- gnu]

HUGE CACHE OF NATIONAL SECURITY AGENCY INDEXES PUBLISHED ONLINE
By Michael Ravnitzky , [EMAIL PROTECTED]

This page, just published online at Russ Kick's site, The Memory Hole:

http://www.thememoryhole.org/nsa/bibs.htm

Or you can get there from his home page at

http://www.thememoryhole.org

contains indexes of four periodicals published by the National Security
Agency, plus a listing of publications from the NSA's Center for Cryptologic
History. These indexes haven't been publicly released until now, and many of
the Cryptologic History publications weren't previously known to the public:

Cryptologic Quarterly Index

NSA Technical Journal Cumulative Index

Cryptologic Spectrum Index

Cryptologic Almanac Index

Center for Cryptologic History Publications

You can request from NSA a copy of any of the reports listed in these
hundreds of pages of indexes, using the instructions provided.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Exponent 3 damage spreads...

2006-09-28 Thread Ralf-Philipp Weinmann


On Sep 25, 2006, at 10:29 AM, Simon Josefsson wrote:


Leichter, Jerry [EMAIL PROTECTED] writes:


I agree that there are two issues, and they need to be treated
properly.  The first - including data after the ASN.1 blob in the
signature computation but then ignoring it in determining the
semantics - is, I'll argue, an implementation error.  You list only
OpenSSL as definitely vulnerable, NSS as ?, so it sounds like
only one definitive example.


Yes.  I'm only familiar with NSS as a user, not as a developer.  For
some reason, the Mozilla bug tracker hides information about this
problem from us, so it is difficult to track the code down.

I believe I identified the patch that solved the problem in NSS,
search for 350640 in:

http://bonsai.mozilla.org/cvsquery.cgi?branch=HEADfile=mozilla/ 
security/nss/date=month


The bug discussion is not public:

https://bugzilla.mozilla.org/show_bug.cgi?id=350640

Possibly also bug reports 351079 and 351848 are related to the same
problem, but these bugs are also hidden.

The actual patch for 350640 is:

http://bonsai.mozilla.org/cvsview2.cgi? 
diff_mode=contextwhitespace_mode=showsubdir=mozilla/security/nss/ 
lib/ 
utilcommand=DIFF_FRAMESETfile=secdig.crev1=1.6rev2=1.7root=/ 
cvsroot


If some NSS developer could chime in, that would help.


Even if NSS has the same problem, one has to look at code
provenance.


Sure.


Hi Simon,

I'm not a NSS developer, but we did have a look at the code here to  
figure out what EXACTLY those guys patched. The relevant portion can  
quite easily be found by diff'ing the tags FIREFOX_1_5_0_6_RELEASE  
vs. FIREFOX_1_5_0_7_RELEASE on their CVS tree for example. Insofar I  
don't think that leaving the bug reports private after actually  
shoving out the release does not really help things in this  
situation; quite the opposite.


Relevant files to this problem that were patched turned out to be  
security/nss/lib/cryptohi/secvfy.c and nss/lib/util/secdig.c. Have a  
look at the function DecryptSigBlock() in secdig.c, lines 92-95


/* make sure the parameters are not too bogus. */
if (di-digestAlgorithm.parameters.len  2) {
goto sigloser;
}

Quite amused, we also noted the following:

 /* XXX Check that tag is an appropriate algorithm? */
---
 /* Check that tag is an appropriate algorithm */
 if (tag == SEC_OID_UNKNOWN) {
goto sigloser;
 }

This means, that before the patch was applied, NSS indeed was  
vulnerable to Kaliski's OID attack.



At least some versions of PKCS#1 does NOT say that, e.g., RFC 3447.

RFC 3447 essentially says to generate a new token and use memcmp().
Such implementations would not be vulnerable to any of the current
attacks, except the Kaliski ASN.1 OID attack (an attack that doesn't
work on existing implementations).


See above.

Cheers,
Ralf


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: Exponent 3 damage spreads...

2006-09-28 Thread Kuehn, Ulrich
 

 From: Ralf-Philipp Weinmann 
 [...]
 Relevant files to this problem that were patched turned out 
 to be security/nss/lib/cryptohi/secvfy.c and 
 nss/lib/util/secdig.c. Have a look at the function 
 DecryptSigBlock() in secdig.c, lines 92-95
 
  /* make sure the parameters are not too bogus. */
  if (di-digestAlgorithm.parameters.len  2) {
  goto sigloser;
  }
 
 Quite amused, we also noted the following:
 
  /* XXX Check that tag is an appropriate algorithm? */
 ---
   /* Check that tag is an appropriate algorithm */
   if (tag == SEC_OID_UNKNOWN) {
  goto sigloser;
   }
 
 This means, that before the patch was applied, NSS indeed was 
 vulnerable to Kaliski's OID attack.
 

While the patch for Firefox obviously fixed the bugs in 
security/nss/lib/cryptohi/whatever,
There is another pkcs#1-padding check in security/nss/lib/softtoken/rsawrapr.c, 
see function
RSA_CheckSign() and RSA_CheckSignRecover(). Does anybody know what these 
functions are used for?
I tried to find that out, but did not get very far... 
(Hal Finney also noted these functions some days ago).

It seems to be another creative bug:

/*
 * check the padding that was used
 */
if (buffer[0] != 0 || buffer[1] != 1) 
goto loser;
for (i = 2; i  modulus_len - hash_len - 1; i++) {
if (buffer[i] == 0) 
break;
if (buffer[i] != 0xff) 
goto loser;
}

/*
 * make sure we get the same results
 */
if (PORT_Memcmp(buffer + modulus_len - hash_len, hash, hash_len) != 0)
goto loser;

So it would accept a padding ( 00 || 01 || 00 || garbage || hash ), which is 
not exactly what pkcs#1 says :)
The same loop is used in RSA_CheckSignRecover(), but I did not succeed in 
finding out what it is exactly used for and if that is a safe application of 
the rather wrong code.

Cheers,
Ulrich

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Interesting paper on PKI and TRUSTe

2006-09-28 Thread Aram Perez

Abstract

Widely-used online trust authorities issue certifications without  
substantial verification of the actual trustworthiness of recipients.  
Their lax approach gives rise to adverse selection: The sites that  
seek and obtain trust certifications are actually significantly less  
trustworthy than those that forego certification. I demonstrate this  
adverse selection empirically via a new dataset on web site  
characteristics and safety. I find that TRUSTe-certified sites are  
more than twice as likely to be untrustworthy as uncertified sites, a  
difference which remains statistically and economically significant  
when restricted to complex commercial sites. I also present  
analogous results of adverse selection in search engine advertising -  
finding ads at leading search engines to be more than twice as likely  
to be untrustworthy as corresponding organic search results for the  
same search terms.


See http://www.benedelman.org/publications/advsel-trust-draft.pdf

Enjoy,
Aram Perez

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: fyi: On-card displays

2006-09-28 Thread Anne Lynn Wheeler

[EMAIL PROTECTED] wrote:

From: Ian Brown [EMAIL PROTECTED]
Subject: On-card displays
To: [EMAIL PROTECTED]
Date: Wed, 20 Sep 2006 07:29:13 +0100


Via Bruce Schneier's blog, flexible displays that can sit on smartcards.
So we finally have an output mechanism that means you don't have to
trust smartcard terminal displays:
http://www.cr80news.com/library/2006/09/16/on-card-displays-become-reality-making-cards-more-secure/

So, when do we see the combined chip/fingerprint reader/display on a
payment card :) Doesn't of course address the requirement that we want
evidence (such as a signed paper receipt) that can later be adjudicated
by a court with higher evidential standards than a bank statement that
their systems work perfectly...


for a decade or so ... i've made comments that the increasingly powerful 
smartcards are obsolete because they are really pda(/cellphone) wannabes (after 
some of the gov. technology transfer legislation in the early 90s, we did some 
consulting for one of the gov. agencies on attempting to move some smartcard 
chip based technology into the commercial sector ... and we could already see 
it was rapidly becoming obsolete).

the smartcard target of portable computing device from 70s/80s required various 
kinds of iso standards because of the lack of appropriate portable input/output 
capability  so there would be standardized, fixed input/output stations 
that could be used with the portable smartcards. that market niche for 
smartcards became obsolete with the appearance of pda/cellphone portable 
input/output capability sometime in the early to mid-90s.

possibly part of the problem was that there was significant investment in 
various kinds of smartcard technology during the 80s and 90s ... and when they 
became obsolete ... there was some amount of scurrying around attempting to 
obtain some/any return on the original investments ... even if it was only a 
few cents on the dollar.

they are now contending with various kinds of cellphone/pda payment delivery operations. 

there is some paradigm discontinuity tho. there is a tradition grown up where the institutions issue the card (payment, identification, etc) ... to some extent smartcard activities are attempting to capitalize on that legacy momentum. 


an individual's cellphone/pda tends to break that institutional centric issuing paradigm 
... since it can involve an individual taking their cellphone/pda (that they already 
have) and registering it for various activities/transactions/identification ... aka 
another form of something you have authentication ... but it is possibly a 
personal device rather than an institution issued device.

so there are already various kinds of pda/cellphones with display, input 
capability ... and
some of them even have their own biometric sensing capability.

the issue with electronic signature is demonstration of intent ... we got 
into that when we were asked to help word-smith some of the cal state (and later federal) 
electronic signature act. various past postings mentioning issue of establishing intent
http://www.garlic.com/~lynn/subpubkey.html#signature


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: fyi: On-card displays

2006-09-28 Thread Anne Lynn Wheeler

Steve Schear wrote:

I have a Mondex card from years ago that used a separate reader with LCD.


we were asked to do the design/sizing/cost for mondex infrastructure in the us. 


one of the things that turned up was much of the mondex infrastructure was 
based on float (initially essentially all going to mondex international) ... 
cards were almost incidental. somewhere along the way, mondex international 
even started offering to split the float with national organizations as an 
inducement to sign up.

somewhere along the way a group was also formed to try and map mondex to the 
internet ... which eventually morphed into IOTP.

misc. past posts that mention mondex
http://www.garlic.com/~lynn/aepay6.htm#cacr7 7th CACR Information Security 
Workshop
http://www.garlic.com/~lynn/aadsm6.htm#digcash IP: Re: Why we don't use digital 
cash
http://www.garlic.com/~lynn/aadsm7.htm#idcard2 AGAINST ID CARDS
http://www.garlic.com/~lynn/aadsm18.htm#42 Payment Application Programmers 
Interface (API) for IOTP
http://www.garlic.com/~lynn/aadsm20.htm#7 EMV
http://www.garlic.com/~lynn/aadsm21.htm#1 Is there any future for smartcards?
http://www.garlic.com/~lynn/aadsm23.htm#23 Payment systems - the explosion of 
1995 is happening in 2006
http://www.garlic.com/~lynn/2002e.html#14 EMV cards
http://www.garlic.com/~lynn/2002e.html#18 Opinion  on smartcard security 
requested
http://www.garlic.com/~lynn/2002g.html#53 Are you sure about MONDEX?
http://www.garlic.com/~lynn/2002g.html#54 Are you sure about MONDEX?
http://www.garlic.com/~lynn/2004j.html#12 US fiscal policy (Was: Bob Bemer, 
Computer Pioneer,Father of ASCII,Invento
http://www.garlic.com/~lynn/2004j.html#14 US fiscal policy (Was: Bob Bemer, 
Computer Pioneer,Father of ASCII,Invento
http://www.garlic.com/~lynn/2005i.html#10 Revoking the Root
http://www.garlic.com/~lynn/2005v.html#1 Is Mondex secure?

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: A note on vendor reaction speed to the e=3 problem

2006-09-28 Thread Leichter, Jerry
|  *That* is the Right Way To Do It. If there are variable parts (like
|  hash OID, perhaps), parse them out, then regenerate the signature data
|  and compare it byte-for-byte with the decrypted signature.
| 
| You know, this sort of reminds me of a problem with signatures on
| tar.gz files.  Basically, you have to keep them around so you can
| check the signature, but you can't delete them because you can't
| reconstruct the original tar file from an untarred copy because it's
| full of metadata that won't necessarily be replicated on your system.
| For example, uids and gids.  Unfortunately, cpio appears to be worse.
| From a tape backup standpoint, tar doesn't store enough (extended
| attributes, hard links, etc.) and so it appears to store both too much
| and too little at once.
VMS has for years had a simple CHECKSUM command, which had a variant,
CHECKSUM/IMAGE, applicable only to executable image files.  It knew
enough about the syntax of executables to skip over irrelevant metadata
like link date and time.  (The checksums computed weren't cryptographic
- at least the last time I used it, many years ago.  The command was
created to use in patches to provide a quick verification that the file
being patched was the right one.)  I've always found it surprising
that no one seems to have developed similar tools for Unix - with the
Gnu libraries for portable access to object/ executable files, it could
be done relatively easily.

The general issue here is how to checksum the information, rather than
the raw data.  XML signatures have horrendous problems with this
because XML has many equivalent ways to say the same thing, and
there is enough information in an XML file for intermediate nodes to
be able to change representation without changing semantics - and for
various reasons, they do so.  (The XML guys try to deal with this by
defining a canonical representation for data, and sign *that*.
Unfortunately, there are two competing standards for the canonical
representation.)
-- Jerry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Circle Bank plays with two-factor authentication

2006-09-28 Thread Ed Gerck

Circle Bank is using a coordinate matrix to let
users pick three letters according to a grid, to be
entered together with their username and password.

The matrix is sent by email, with the user's account
sign on ID in plaintext.

Worse, the matrix is pretty useless for the majority of users,
with less usability than anything else I saw in a long time.
This is what the email says:

  The following is your Two Factor code for Online Banking for
  username (sign on ID changed here for privacy reasons).  You will be
  required to enter the grid values associated with the three
  Two Factor boxes presented with each sign-on to Online Banking.
  Please save and store this Matrix in a safe yet accessible place.
  The required entries will be different each time you sign-on.


Two Factor Matrix

ABCDEFGH
________

108421175

274992420

336069906

464514684

517686592


These are the additional instructions in the site:

  Check your e-mail for receipt of the Two Factor Matrix which should
  be delivered within 2-3 minutes of activation. You can save the
  e-mail to your desktop for easy access or print the matrix.
  However, do not write your sign on ID and password on this matrix –
  treat it securely as you do with a Debit or ATM card.

  Go back to the online banking sign on page and type in your sign
  on ID, password, and the three coordinates from your Two Factor
  Matrix. These three coordinates are randomly selected each time
  you sign on, so remember to keep your matrix secure and easily
  accessible.

Well, the bank itself already compromised both the sign on ID
and the matrix by sending them in an email. All that's left
now is a password, which a nice phishing email giving the
correct sign on ID might easily get.

When questioned about this, the bank's response is that this
scheme was designed by the people that design their web site
and had passed their auditing.

Of course, a compromise now would be entirely the user's fault
-- another example of shifting the burden to the user while
reducing the user's capacity to prevent a compromise.

This illustrates that playing with two-factor authentication can
make the system less secure than just username/password, while
considerably reducing usability. A lose-lose for users.

Cheers,
Ed Gerck

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: A note on vendor reaction speed to the e=3 problem

2006-09-28 Thread Greg Rose

At 14:33  -0400 2006/09/28, Leichter, Jerry wrote:

|
VMS has for years had a simple CHECKSUM command, which had a variant,
CHECKSUM/IMAGE, applicable only to executable image files.  It knew
enough about the syntax of executables to skip over irrelevant metadata
like link date and time.  (The checksums computed weren't cryptographic
- at least the last time I used it, many years ago.  The command was
created to use in patches to provide a quick verification that the file
being patched was the right one.)  I've always found it surprising
that no one seems to have developed similar tools for Unix - with the
Gnu libraries for portable access to object/ executable files, it could
be done relatively easily.


The sum command has existed in Unixes since before VMS existed. 
Checksum has too many characters in the name ;-).


Greg.


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Circle Bank plays with two-factor authentication

2006-09-28 Thread Leichter, Jerry
| Circle Bank is using a coordinate matrix to let
| users pick three letters according to a grid, to be
| entered together with their username and password.
| 
| The matrix is sent by email, with the user's account
| sign on ID in plaintext.
| 
| Worse, the matrix is pretty useless for the majority of users,
| with less usability than anything else I saw in a long time.
| This is what the email says:
| 
|   The following is your Two Factor code for Online Banking for
|   username (sign on ID changed here for privacy reasons).  You will be
|   required to enter the grid values associated with the three
|   Two Factor boxes presented with each sign-on to Online Banking.
|   Please save and store this Matrix in a safe yet accessible place.
|   The required entries will be different each time you sign-on.
| 
| 
| Two Factor Matrix
| 
| ABCDEFGH
| ________
| 
| 108421175
| 
| 274992420
| 
| 336069906
| 
| 464514684
| 
| 517686592
| ...
Wow.  A variation of an idea I suggested back in the '70's  The
problem then was with telephone calling cards.  As those of us old
enough will remember, at one time you didn't have a cell phone with you
at all times (or at any times).  You had to use these things called pay
phones.  Long distance calls were expensive, and you had to dump a whole
bunch of change in to make them work.  Very annoying.  So you got a
calling card, which often charged to your home phone number.  Calling
cards had a fixed PIN on them.  Shoulder surfers would hang around
heavily used phones - commuter train stations were a good spot - watch
as you entered your account number/PIN, memorize it on the spot and then
sell it.  These could move remarkably quickly - my wife's PIN was stolen
this way, and in use within seconds after she hung up.  Over the next
hour or so, until the fraud people picked it up, it was used to make
several hundred dollars worth of calls from several locations in New
York.

Anyhow ... my suggestion was that a similar table be printed on the back
of the card.  (I would have put a multi-digit number at each
intersection point and only ask for one value.  All told, I'm not sure
which approach is better - but with good printing technology you can use
much smaller fonts than when you rely on people printing things out
themselves.)  I also suggested that the numbers be printed in a color -
light blue, red against a grey background - that would make it hard to
photocopy.

No one ever did anything like this with phone cards.  Interesting to see
the idea re-invented for a different purpose.  (Hmm, if I'd patented it,
the patent would be running out soon, even assuming I went for the
renewal.)  Now if only they hadn't done the actual implementation so
stupidly

-- Jerry



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Circle Bank plays with two-factor authentication

2006-09-28 Thread pat hache
Here,(Mexico) BBVA / Bancomer uses 24 special three digits numbers on a 
 card you need  to have at hand to access your account after login and 
username... the system asks you one of those 24 numbers to allow each 
session - entry.
supposed to be effective.  donno if there is a similar system 
elsewhere.


On 28 sept. 06, at 14:34, Ed Gerck wrote:

Circle Bank is using a coordinate matrix to let
users pick three letters according to a grid, to be
entered together with their username and password.

The matrix is sent by email, with the user's account
sign on ID in plaintext.

Worse, the matrix is pretty useless for the majority of users,
with less usability than anything else I saw in a long time.
This is what the email says:

  The following is your Two Factor code for Online Banking for
  username (sign on ID changed here for privacy reasons).  You will be
  required to enter the grid values associated with the three
  Two Factor boxes presented with each sign-on to Online Banking.
  Please save and store this Matrix in a safe yet accessible place.
  The required entries will be different each time you sign-on.


Two Factor Matrix

ABCDEFGH
________

108421175

274992420

336069906

464514684

517686592


These are the additional instructions in the site:

  Check your e-mail for receipt of the Two Factor Matrix which should
  be delivered within 2-3 minutes of activation. You can save the
  e-mail to your desktop for easy access or print the matrix.
  However, do not write your sign on ID and password on this matrix –
  treat it securely as you do with a Debit or ATM card.

  Go back to the online banking sign on page and type in your sign
  on ID, password, and the three coordinates from your Two Factor
  Matrix. These three coordinates are randomly selected each time
  you sign on, so remember to keep your matrix secure and easily
  accessible.

Well, the bank itself already compromised both the sign on ID
and the matrix by sending them in an email. All that's left
now is a password, which a nice phishing email giving the
correct sign on ID might easily get.

When questioned about this, the bank's response is that this
scheme was designed by the people that design their web site
and had passed their auditing.

Of course, a compromise now would be entirely the user's fault
-- another example of shifting the burden to the user while
reducing the user's capacity to prevent a compromise.

This illustrates that playing with two-factor authentication can
make the system less secure than just username/password, while
considerably reducing usability. A lose-lose for users.

Cheers,
Ed Gerck

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to 
[EMAIL PROTECTED]



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: A note on vendor reaction speed to the e=3 problem

2006-09-28 Thread Greg Black
On 2006-09-28, Leichter, Jerry wrote:

 VMS has for years had a simple CHECKSUM command, which had a variant,
 CHECKSUM/IMAGE, applicable only to executable image files.  It knew
 enough about the syntax of executables to skip over irrelevant metadata
 like link date and time.  (The checksums computed weren't cryptographic
 - at least the last time I used it, many years ago.  The command was
 created to use in patches to provide a quick verification that the file
 being patched was the right one.)  I've always found it surprising
 that no one seems to have developed similar tools for Unix - with the
 Gnu libraries for portable access to object/ executable files, it could
 be done relatively easily.

This is incorrect.  Hundreds of people have developed such tools
and use them regularly.  I've never bothered to look for any
published versions, because my own tool works for me, but I'd be
surprised if there weren't any out there in the wild.

Greg


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]