Title: RE: 3D Secure Vulnerabilities?

-----Original Message-----
From: Jack A. Hudson [mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 25, 2001 3:26 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: 3D Secure Vulnerabilities?


I've read the merchant implementation guide for 3D secure.  Verified by Visa is definitely a step forward.  But, to me it seems overly merchant-oriented.  I mean, merchants are protected pretty well from fraudulent cardholders.  But the cardholder is only marginally safer as a result of this technology.  Or am I missing something?  Here are some of the reasons (questions) I feel that 3D secure still leaves the consumer vulnerable in internet transactions.

 
1)       The merchant pops up a daughter window for password collection on behalf of the issuing bank.  How can the cardholder be sure the merchant isn't just popping up a look-alike window to collect and keep their password? 

AS PER IMPLEMENTATION THE POP HAS TO COME FROM THE ISSUING BANK. THE TRANSACTION FLOW IS AS FOLLOWS:
1. CARDHOLDER ENTERS THE CARD NUMBER
2. THE SOFTWARE IMPLMENTED AT MERCHANT'S SITE SENDS REQUEST TO VISA DIRECTORY.
3. VISA DIRECTORY CHECKS IF THE CARD IS A REGISTERED 3D CARDS AND RESPONDS TO MERCHANT WITH THE ISSUER'S AUTHENTICATION URL.

4. THE MERCHANT REDIRECTS THE CARDHOLDER TO ISSUER'S AUTHENTICATION URL.
5. THE CARDHOLDER IS AUTHENTICATED BY THE ISSUING BANK. (CHARGE IS ALSO DISPLAYED TO THE CARDHOLDER)
6. ISSUER PASSES THE SECRET CODE TO THE MERCHANT THROUGH VISA.
7. MERCHANT MAY NOW SUBMIT THE CHARGE.

NOTE:
1. IT IS UPTO THE ISSUING BANK, HOW IT VALIDATES THE CARDHOLDER, DIGITAL CERTIFICATES, HARDWARE TOKENS, OR PASSWORDS.
2. IT IS ALSO UPTO THE ISSUING BANK HOW THEY ASSURE THAT TEH CARDHOLDER IS INDEED GIVING THE PASSWORD TO THE ISSUING BANK.

3. WHERE ISSUING BANKS ARE USING VISA'S ASP SERVICES, THERE IS A PROVISION OF A "PERSONAL ASSURANCE MESSAGE". THIS "PAM" IS GIVEN BY THE CARDHOLDER TO VISA DURING THE REGISTRATION PROCESS.

 
 
2)       The user enters their password in this dialog and the issuer checks it.  But how is the password checked for correctness?  It is just blasted over to the issuing bank for validation?  If so, that seems to raise other security concerns (i.e. couldn't a false-merchant intercept the transmission of the password?)   Or does 3D secure use the password as a "secret key" to avoid this problem, since doing so removes the need to transmit the password over the Internet?

THERE IS NO QUESTION OG PASSWORD BEING BLASTED:
1. THE PASSWORD ACCEPTANCE PAGE IS "POPPED-UP" BY ISSUING BANK.
2. OR VISA IF ASP SERVICES ARE BEING USED BY THE ISSUING BANK.
 
3)       Because the cardholder enters a password, they may feel comfortable that their card is safe with that merchant.  But, even if the merchant implements VbV and prompts for a password, once the credit card number is stored in their database, it is just as vulnerable to theft as a non-VbV enrolled card.  A VbV card can be stolen and used at any merchant that doesn't prompt for the password.  Merchants are right to feel protected by VbV.  But why should consumers feel protected when they see the password prompt?

IF THE SOMEONE USES THE CARD NO AT A NON 3D SITE, THEN THE TRANSACTION MAY BE DISPUTED. IT WOULD NOT BE A NON-REPUDIABLE TRANSACTION.

 
4)       Let's say the cardholder enters their password correctly and the merchant proceeds to submit the transaction.  What (aside from eventual human detection) prevents them from submitting a higher amount than the cardholder authorized at the password prompt?  For example, the password prompt shows transaction details of 14.95.  But when the transaction is sent to the acquirer for authorization, what prevents the amount from increasing to, say 149.55 (which the merchant could claim as accidental)?

ANSWERED IN THE ABOVE TRANSACTION FLOW.
 
5)       The merchant implementation guide says, if the password is entered wrongly, the merchant cannot submit the charge.  But, what is to prevent them?  They could submit the charge as a card-not-present transaction (i.e. without the CAVV), and reassume liability if a chargeback results.

TRUE!
 
Thanks
 
 

"This e-mail message may contain confidential, proprietary or legally privileged information. It should not be used by anyone who is not the original intended recipient. If you have erroneously received this message, please delete it immediately and notify the sender. The recipient acknowledges that ICICI or its subsidiaries and associated companies (including ICICI Bank) "ICICI Group", are unable to exercise control or ensure or guarantee the integrity of/over the contents of the information contained in e-mail transmissions and further acknowledges that any views expressed in this message are those of the individual sender and no binding nature of the message shall be implied or assumed unless the sender does so expressly with due authority of ICICI Group. Before opening any attachments please check them for viruses and defects."

Reply via email to