Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Secure Ways to Determine 'Something You Have'? 103

Steve Cerruti asks: "My credit union is implementing multi-factor authentication for online banking. They are following guidelines provided by the Federal Financial Institutions Examination Council as outlined in Authentication in an Internet Banking Environment (PDF). As you are already required to enter a password, 'something you know' is covered. 'Something you are' has significant technical hurdles while 'something you have' is familiar to credit unions in the form of ATM cards. My credit union chose to implement 'something you have' as a two dimensional lookup table that they email to an address you supply when you initially log in to the online banking service, further access is blocked until you enter a code from the table. New Measures to Make Online Access Safer describes the plan and a short video (FLV) provides further details." For the security conscious among us, do you think this is a decent way to implement the 'something you have' portion of a well secured system, or are there better ways to do it?

Their plan can best be compared to single use scratch off cards. However, I am unsure of what constitutes "something you have" in this example. If someone has the capacity to log into your online banking account, it would seem an email account would be equally subject to access. It would therefore be possible for the authorized owner and the attacker to both possess the table simultaneously. Does this system provide multi-factor authentication or is it simply a convoluted mechanism for sharing yet another secret?

Off topic questions:
Is depending on near instantaneous access to email a reasonable thing to do?
If you were dealing with this situation, would you implement a Firefox extension or a cell phone application to reduce the level of effort for banking access?"
This discussion has been archived. No new comments can be posted.

Secure Ways to Determine 'Something You Have'?

Comments Filter:
  • With a java client taking a password and returning another. A one-time-pad could be trivially implemented, and getting random data to a phone is no problem either.
    • > getting random data to a phone is no problem either.

      if a phone has no data connection, perhaps the java client could "listen in" (Don't know whether it's possible) on DTMF codes transmitted at a certain point in the normal phone call between the user and the bank's phone server?
  • RSA SecurID (Score:5, Informative)

    by pdbaby ( 609052 ) on Saturday January 13, 2007 @07:20PM (#17596638)
    RSA SecurID is an excellent "what you have". It displays a number that changes every minute, so there's no need for a special interface. Your server has the seeds, so it can figure out what number's being displayed on a given SecurID at any given moment in time.
    • Secure ID tokens, and other token solutions, provide excellent second-factor security, but they have the downside of being

      (1) Difficult to deploy to customers
      (2) Expensive
      (3) Somewhat fragile

      The system described in the link also provides good second-factor security, is easy to deploy, cheap, and robust. The downside is that the "matrix" could be copied. Sounds like the matrix should be guarded kinda like you guard your ATM card (i.e., you don't just leave it lying around).
      • Another downside is that they drift. We use them for VPN access at work and run into it occasionally.
        • Isn't drift correction part of the magic you're paying for on the back end?

          Are they really fragile? I'd been hearing anecdotes about people running them through washing machines without breaking them.
          • I don't know if we're paying for that, I'm just an end user of that particular system. I've had no problem with them being fragile, no one I know has broken one.
          • by Andy Dodd ( 701 )
            I think early versions had problems with ESD in extreme environments. The documentation has some comments to that regard, saying what the symptoms are and to return your fob for a new one if that happens.

            That said, the SecurID card I have is subject to large amounts of abuse (it's on my keychain) and still works perfectly.

            As to being difficult to deploy - you can't have security AND convenience. The emailed matrix described by the submitter falls more into a "what you know" category than "what you have".
            • I've fried up a couple from ESD in my seven years of carrying one. Then again, I live in Colorado, where seeing humidities in the 6-7% range during the winter is not uncommon. ESD is brutal on everything out here.

          • by RMH101 ( 636144 )
            the old "credit card" form factor ones were fragile. well, they were pretty robust but being thin, sitting on them in a back pocket tended to break them. the newer keyfob style ones are nigh-on indestructible. and yes, the correction magic *is* what you're paying for...as the saying goes: "fast, cheap, good. pick two."
      • by mlts ( 1038732 )
        Surprisingly, AOL... yes, AOL offers SecurID keyfobs to paying customers. E-Trade is another place that offers SecurID.

        I wish more banks and financial institutions (I'm looking at you, eBay/PayPal) would offer this.
    • I love my work-issued RSA SecureID. The thing is, I don't want to have to carry one for work, one for my bank, one for my car loan bank, one for my mortgage bank, one for my HELOC bank, one for my airline credit card bank, one for eBay, one for PayPal, and one of each for all of my other assorted (but unused!) credit cards in case I should decide I want to check in with them one of these days. I'd actually be willing to pay a reasonable rate for a universal SecureID given that it were truly universal. Since
      • by larien ( 5608 )
        The biggest problem with this is that at any point in time, any one of those organisations can now spoof themselves as you because they now know the "thing you have", i.e. your RSA code. While you can probably assume that a couple of banks would be secure enough, can you guarantee they're all secure? What about employee X from bank A? He could steal money from your account at bank B with a bit of data engineering.

        I also don't think that RSA don't run the software back-end - I work in a bank which uses

      • I don't want to have to carry one for work, one for my

        I like the guy who put a webcam on all of his secureID cards. IE very difficult for others to find out it is his webcam, then they have to figure out which one does what...
        So at home, he has physical access to all the FOB's, on the road he still has access in a pinch. They still serve their job since it verified that IT passed the fob. Now, all he needs is to host several honeypot webcams, so if they enter a id from one of them his accounts are aler

    • RSA SecurID is an excellent "what you have". It displays a number that changes every minute, so there's no need for a special interface. Your server has the seeds, so it can figure out what number's being displayed on a given SecurID at any given moment in time.

      Unfortunately the server is unable to tell the difference between a person having the SecurID token and one that just happens to have a valid code as the result of a phishing attack. Note that typically several codes are accepted by the server a

      • And someone could much more easily put a knife to your throat, walk you to an ATM and ask you very politely to withdraw all your cash.

        Of course it's not a perfect system. If there was a perfect system, everybody would be using it and nobody would be developing stuff like the SecurID. The point of these things is that they're:
        • Better than what we have now
        • Cost-effective to implement

        If you don't think a window of opportunity of several minutes is preferable to a nearly unlimited window of opportunity, you've ei

        • Re: (Score:3, Interesting)

          by Sven Tuerpe ( 265795 )

          If you don't think a window of opportunity of several minutes is preferable to a nearly unlimited window of opportunity, you've either got a severe ideological bias towards the nonexistent utopian solution, or you're a broken robot incapable of tears.

          What I really think is that the length of this window of opportunity does not matter at all. There are reports that universal phishing kits exist [heise-security.co.uk] already, making it really simple for anyone not only to create a phishing site but also to mount a man-in-the-

    • In addition to their traditional "key-fobs", RSA Security has a product called RSA Mobile which is far more convenient for the average user. Taking advantage of the fact that most customers also own a cellphone, they offer an additional method of verifying "something you have". You go to a website and log in with your username and "something you know", be it a password or other, more complicated forms. Then, they will send an SMS message to the cellphone number associated with the account. This SMS messag
  • Could be worse (Score:4, Interesting)

    by earnest murderer ( 888716 ) on Saturday January 13, 2007 @07:26PM (#17596734)
    My banks idea of security is entering a word in an image like you see on so many sites these days.

    Those images are distorted so a computer can't just OCR the thing and brute force passwords (my understanding anyhow). This seems to have worked out well enough that you see it everywhere and brute forcing passwords is less of an issue (if at all).

    Curiously my bank decided to implement this functionality differently. The background is a grey colored word, and it's always the same word. The "code" is always black.

    I'm no genius but to the best of my knowledge this isn't much beyond an exercise in vigorous masturbation. Security through song and dance if you will?
    • Just to be clear, those words aren't distorted at all. Always the same (very clean looking) font, always in the same position.
    • Security through song and dance if you will?

      Close - the commonly used term is 'Security Theatre' (or Theater if you're new-school).

      It means "I'm implementing a system that looks to someone who doesn't understand security like it might improve safety, but really it just inconveniences everybody".

      The TSA is the Andrew Lloyd Weber of Security Theatre.
    • One of my banks does something similar - you might not have understood that they are trying to stop phishing attacks. When I identify to my bank, after giving my username, but before giving my passowrd, the bank offers up a picture and a keyword (chosen by me) to show that this is them. They are showing *me* something they know so I know it's them and not a phishing site.

      Is your bank doing something similar?

  • by Rosco P. Coltrane ( 209368 ) on Saturday January 13, 2007 @07:27PM (#17596742)
    I watch the video and it sounds like a lot of PR talk and buzzwords to me.

    At the end of the day, assuming the computers and networks between you and the credit union are secure (they're not, but let's forget that), the only problem they have is to make sure you're Mr. John Doe, legitimate holder of the account you're trying to access ("who you are"). Period. All that matrix and multi-identification stuff is just a variation on the same theme.

    Up to now, "what you know" (a password) was assumed to be representative of "who you are", with the single point of failure that someone else might be able to know what you know as well (being your password that's too simple, or someone looking over your shoulder while you type in the password). This was a reasonable assumption because you can't separate someone with this someone's knowledge.

    If they want to do better than that, they'll have to use biometrics (DNA analysis, fingerprinting, iris scanning, etc...) or some sort of permanent electronic tagging (RFID implant). That's plain as day. So if your credit union isn't providing you a fingerprint scanner or telling you to go to your local vet to get a RFID implanted, you can safely assume that their new ultra-super-duper solutions are a variation of what's already been implemented before, perhaps a little better, perhaps not, but definitely a lot of PR fluff.
    • > "I watch the video and it sounds like a lot of PR talk and buzzwords to me."

      I couldn't watch the video because I'm on a crappy hotel connection. (Although I will say that this chain (Courtyard Marriott) is the only one I know of that doesn't charge you for said crappy connection. Being billed several dollars a day for crappy DSL speeds ranks high on my Grand List of Suck, since it undermines the idea of Internet as a ubiquitous utility.)

      > "At the end of the day, assuming the computers and networks b
    • Re: (Score:3, Insightful)

      >If they want to do better than that, they'll have to use biometrics

      You can improve on passwords without breaking a sweat. What they've done is switch from a brittle login protocol to one that is closer to the random challenge/signed response that you'd want if there were a computer instead of a human on the other end.

      Not only does it block offline phishing, notice that it's even safe from a keylogger.

      Still vulnerable at several points to several attacks but a real improvement nonetheless.
  • they use an on page keypad where the numbers change position each time you use it. It defeats keystroke and pointer position loggers.

    In terms of "something you have", you could try securid. There are agents and software tokens available for phones and the like. Or say, a security code sent out with every paper statement.

     
    • Yes, but that's easily circumvented by taking a screenshot when the mouse is clicked. The bottom line is that if you're using a compromised machine to do your banking, security is a depressing exercise in futility, where you can only stall by finding more and more complicated and obscure solutions.

      A sequence of security codes would help a bit if they were not all stored on the compromised host, i.e. your paper statement suggestion. But the malware could also modify your session after you authenticate, so yo
      • I think the idea of ING Direct's system is to prevent your computer from remembering your password for you (and letting anyone that walks by log in later). That's the only thing I think it's useful for. Incidentally, their login system does work from browsers like lynx and w3m, so kudos to ING for that.
  • by mechsoph ( 716782 ) on Saturday January 13, 2007 @08:18PM (#17597304)

    Require an X509 client side certificates. That should make access to the account practically impossible unless an attacker can get access to the certificate.

    The only way to access the certificate would be to compromise the client machine, and if that happens your probably fucked regardless, right?

    • There's a big difference between having your box taken over and used to spam the world, and having your box taken over and your 5-figure bank-account drained.
      • Fucked as in the bad guy installs a key logger or plays man-in-the-middle and drains your bank account regardless of other measures taken, which is the context we were using.

        The SMS message mentioned in another comment might prevent man-in-the-middle if it contained transaction details (and the receiver made sure the message was coming from their bank...). But if the client's only point of interaction with the bank is through a single computer, that computer must be trusted. I don't see how you could h

        • Re: (Score:3, Interesting)

          by Workaphobia ( 931620 )
          > "But if the client's only point of interaction with the bank is through a single computer, that computer must be trusted. I don't see how you could have a secure system if that only point of interaction is compromised."

          Simple: don't trust that computer. Home computers are general-purpose machines and very few of them are highly secured. A specialized, embedded device with a private key sounds much more trustworthy, and you could still use the untrusted home computer to transmit the resulting encrypted+
          • Re: (Score:3, Insightful)

            by mechsoph ( 716782 )

            A specialized, embedded device with a private key sounds much more trustworthy

            Agreed, but do the losses due to fraud exceed the costs of issuing an embedded cryptographic device to every customer?

            • Good point. I was assuming that it would be a reasonable expense, but if banks don't lose too much from fraud then it may not be. I suppose one could start to imagine various centralized systems for distributing multi-purpose crypto tokens - for example, turning your driver's license into a smartcard. That way, the cost is one-time and it can be useful in many different private systems.
              • Remember, there's not just the direct cost of fraud - there's also the feeling the customer has of being safe (or not being safe). This is probably a larger cost/benefit than the fraud itself.

                Eivind.

    • It's what client-side certificates were for in the first place, but the idea seems to been forgotten.

      I'd hate to the be the first organization trying to exercise the client-side certificate code...

      You'd have to completely and permanently disable non-certificate logins or phishers would would still be in business.
      • It's what client-side certificates were for in the first place, but the idea seems to been forgotten. I'd hate to the be the first organization trying to exercise the client-side certificate code...

        Swiss Migros Bank [migrosbank.ch] uses client-side certificates to authenticate customers. Certificates are handed out on smart cards branded M-Card smart. They don't force certificates upon their customers, though; other means of authentication are supported as well.

        Unfortunately their Web site seems to be available on

    • by morzel ( 62033 )
      A client side certificate can be copied without you knowing it, so it does not belong in the "something you have" category. The only way this can work is when the certificate is on a smart card/USB key that does not allow exporting it.
      When security is implemented properly, compromising the machine does not compromise end-to-end security.
  • by enos ( 627034 ) on Saturday January 13, 2007 @08:19PM (#17597308)
    A Danish bank mails you a card with 50 4-digit numbers. This is your one-time pad of sorts. When you log in to your account it asks you for, say, #23. You provide it, and it never asks for it again. When you're down to 20 numbers left or so, the bank automatically mails you another card. The card is something you have.

    BPH (Polish bank) has your cell phone number on file. They do bank transfers, which are used over there a lot more than here, you can pay people directly like that (like an electronic check), even buy skype credit directly with it. When you attempt a transfer the bank sends you an SMS with a code you have to supply to the website. The cell phone is something you have. Trouble with this is that in the US some people have to pay for incoming SMSes. In the rest of the world that's usually free.
    • Hello -

      I tend to like "zero-knowledge proof" based systems.
      Here, you don't exchange an item (e.g. password) directly.
      For example, a server can challenge you (your smart card by proxy) with a randomized value / set of values.
      Your card performs a function, and returns a value.
      If the value doesn't match the accepted value, the challenge has failed. Only your card should return the correct value. However, someone else's might by chance succeed, or there may be an attack.
      So, this type of set of exchanges can be
      • Re: (Score:3, Interesting)

        by tomhudson ( 43916 )

        Yes, it works SO well for satellite TV ... oops ...

        A $50 receiver cracks the rotating keys in minutes, a $200 receiver in seconds ... (the latest models run linux, btw).

        • by lorcha ( 464930 )
          I'm pretty sure this is not the case for NAGRA-2/P5.
          • I'm pretty sure this is not the case for NAGRA-2/P5.

            Nagra2 has been cracked for almost 2 years http://dishnewbies.com/nagra2.shtml [dishnewbies.com] ... and a lot has happened since.

            Most decent aftermarket receivers nowadays don't need a card to decrypt either dishnet, expressvu or echostar. Just plug them in, wait 5 minutes, and everything's "open". Example: I know someone who has a Viewsat Ultra, and it works fine.

            This was an example of a single-point failure of depending on "something you have". You were supposed

      • A nice part of such schemes is that (properly implemented), they are highly resistant to a number of forms of attack including sniffers and man-in-the-middle attacks.

        Unless we discover that ordinary people are unable to participate in such schemes, thus needing a computer to help them, which consequently becomes part of any sensible definition of middle.

    • by marol ( 734015 )
      Some Swedish banks use OTP devices like these http://www.actividentity.com/products/tokens_otp__ home.php [actividentity.com] (I've got one like the third one down on that page). The device I use is accessed with a PIN code and then used to sign a challenge when logging in, it's also used to sign new target accounts when transferring money and to sign the amount of money at each transfer.
      You have to pick up the device in person and provide ID and they also make you set the PIN when you check it out. All the signing might be a
    • Re: (Score:3, Interesting)

      LISTEN to this chap! E-mailing the list is bad because that communication is in-band. It took the phone companies much frustration to move it's signaling out of bands. When payphones and the switches did all their communication in-band [wikipedia.org], then phreakers could manipulate the line via blue boxes or red boxes. If someone is running malware on one of your client's workstations, they could see the e-mail come across and later copy it for their own uses.

      Out-of-band communication [wikipedia.org] works because an attacker need

  • From the horse mouth:

    http://www.schneier.com/blog/archives/2006/11/figh ting_fraudu.html [schneier.com]

    My CU implemented a system whereby I now have two passwords. I guess they are probably following the law, but I'm not safer from anything now, especially since they put some text by the second password telling me what it is about. One of the better comments from the Schneier post points out that two factor authentication isn't worth much if they both use the same channel. Another goes ahead and calls it multiple single f
  • by vakuona ( 788200 ) on Saturday January 13, 2007 @09:31PM (#17597950)
    When I call my bank, they never ask me for say, my full telephone pin. They ask for 2 random digits.

    So this gives you passwords within passwords. You can have a fifteen digit number/password, and they ask you for random characters from those. Always try to ask for a different combination, and perhaps ask in more ingenious ways, like the third letter and the fourth from last (which could be the same position as the third - if you had a stupid password).

    You can then keep the password long enough for it to not be too much of a bother to remember. And they can always disable the account if too many wrong tries are made.

    The cleverest thing to do though, is to probably make it harder to do international transfers of cash using accounts, or impossible online. And make it harder to have an account without giving some form of verifiable ID. My bank does that. It is quite silly to steal money online into another local account in my estimation anyway, because you will be caught. Internationally is another issue, because some countries may not cooperate.

    Anyway, how many people do you know who have had their money stolen from their bank accoount online. I guess very few.
    • So it takes n calls to learn the n digit PIN?
      • Re: (Score:3, Interesting)

        by tomhudson ( 43916 )
        Shouldn't take more than n/2 on average ... and for the two digits, just pick any 2 digits at random, and you have a 1/100 chance of being right the first time. If they give you 3 chances each call, you need, on average, to make 18 calls to get access, no matter how long the actual password is.
        • by jimicus ( 737525 )
          And if your bank has the good sense to block you from being allowed to access telephone banking after a small number of attempts, then suddenly it becomes much less of an issue.
        • by psmears ( 629712 )
          Shouldn't take more than n/2 on average
          Are you sure? If each phone call provides 2 of the n digits, then isn't n/2 the best you can hope for, not the average? The average number of calls will surely be higher, because on some calls you'll get one digit that's been asked for before...
          • If they're asking for 2 digits, there's only 100 possible combinations - 00 to 99

            So, you'll hit the right combination, half the time, at 50 tries (n/2).

            If you dial random numbers, and they issue random responses, the odds stay the same.

            If they allow 3 attempts before disconnection, then the average becomes n/2/3, or 17 tries, on average. Sometimes, you'll get it right away, sometimes it will take 100 tries, or even 200, but, on average, 17 attempts would get you in.

            • by psmears ( 629712 )

              Watson Ladd's post said:

              So it takes n calls to learn the n digit PIN?
              So n is the number of digits in the PIN, not the number of combinations to guess between. And the aim is to work out the number of calls to learn the entire PIN, not just get into the account... (and I think he's assuming you're eavesdropping on calls, rather than attempting to break in remotely...)
              • The topic was the fallacy of the "something you have" in regards to a 2-digit verification number. No matter how large the pin, a 2-digit verification number will fail, on average in 50 tries. So if someone has left their access code in their browser, and you now have to enter a 2-digit verification number, and they give you 3 guesses before they close the account, you have a 1 in 18 chance of p0wning their account.

                "Something you have" will never be foolproof, because if you have it, someone can always t

    • When I call my bank, they never ask me for say, my full telephone pin. They ask for 2 random digits.

      This would concern me to no end - it sounds like the bank staff can see your PIN on their screens. What's to stop staff looking-up people's PINs and either using them themselves or even selling them to someone else.

      • When I call my bank [...] They ask for 2 random digits [of my pin].

        This would concern me to no end - it sounds like the bank staff can see your PIN on their screens.

        Only if the design is braindead. If they need the whole PIN, then they can see your entire PIN (or they type in everything you say). If they only ask for a piece of the PIN, then they only need to see the piece. Maybe even an interface that just says "Ask customer for piece 4 [enter here] and piece 9 [enter here]".

        Whenever I call a credi

    • >The cleverest thing to do though, is to probably make it harder to do international transfers of cash using accounts, or impossible online.

      But then all the bad guy has to do is pay a cut to local recipients of phishing proceeds who will pass along the funds [theregister.co.uk]. No need for the online transaction to go straight to Elbonia in one step.

      >some countries may not cooperate.

      Notice the destinations are never squeaky-clean places like Finland. It's always some place where it's easier for the crooks to have an und
    • by arevos ( 659374 )

      When I call my bank, they never ask me for say, my full telephone pin. They ask for 2 random digits.

      I cannot abide this. It makes logging in a extremely painful procedure, as the human mind remembers words in sequence. Ask a person to type out the word 'impossible' and any reasonably proficient computer user will have it typed out in a second; but ask a person to give you the 7th letter and suddenly it takes a lot more time, especially when you don't have it written down. It's even worse when dealing with passwords of random letters and numbers, as they're so much less familiar. Asking for random letter

  • Maybe you should send me your userid, password and that table and I'll let you know if it's secure.
  • This is reasonable for medium security levels, and banking never has needed higher ones for smaller day-to-day transactions. However emailing these to the cunstomer is completely wrong and a massive risk! It is not so much that the email could be intercepted, but it could still be on the users computer if somebody breaks in and the user can effortlessly print it as often as liked. Also an automated search for this "token" should be easy to implement. Emailing this is worse than not doing it at all, IMO.

    The
  • Have we really become so damn busy (or lazy) in today's society that we can't work a trip to the bank into our day? Sorry, but I would never do online banking -- too many pitfalls, too many points in the system where someone can hack in, too much agony trying to clean up your account afterwards. I don't care what kind of security is put in place -- sooner or later, someone will figure a way around it. If I need to transfer, withdraw, or pay out any significant amount of money above a typical ATM withdrawal,
    • Have we really become so damn busy (or lazy) in today's society that we can't work a trip to the bank into our day?

      Hey, some of us have to work for a living. The don't call them "bankers' hours" for nothing ...

    • [I] insist that they verify my identity in person before they start manipulating my money.

      Well, that certainly ramps up the security, doesn't it? I'm sure someone with malicious intent is doing the same thing.

  • >If someone has the capacity to log into your online banking account, it would seem an email account would be equally subject to access.

    Only if they phished your email password at the same time as your online banking password, sorted through your old email, found your Matrix chart still there and not yet deleted, and downloaded it for their use.

    Not your average phishing scam at all, and it's probably easier for a phisher to set up a real-time man in the middle attack where they relay your bank's challeng
  • One of my local Wells Fargo branches asked for my thumbprint in order to get my balance, after depositing my check. This was despite showing them my ID. They didn't want to see that. When I asked why, and refused to provide a print, I was told to go talk to the manager.
    She explained it was a policy to speed up identification, etc.

    - When I opened the account in another state, I didn't give a thumbprint. So whoever shows up and sticks a thumb down in my name will be recorded as the account holder of record. T
    • by nachoboy ( 107025 ) * on Sunday January 14, 2007 @11:33PM (#17609162)
      One of my local Wells Fargo branches asked for my thumbprint in order to get my balance, after depositing my check. This was despite showing them my ID. They didn't want to see that. When I asked why, and refused to provide a print, I was told to go talk to the manager.
      She explained it was a policy to speed up identification, etc.


      The customer service agent didn't implement the policy, she doesn't know why she has to collect the thumb print any more than you do. You assumed the thumb print was to provide confirmation of your identity in order to *authorize* the transaction. This is not the case, and also why they don't really care that they've never collected a thumb print before. The purpose of the thumb print is to provide *evidence* after the fact in case there is a fraudulent transaction.

      Suppose you are head of Wells Fargo's security department. The CEO has mandated that you implement "greater security" and the CFO demands that you do so on a minimal budget. Which of the following do you choose?

      1) Implement a new program requiring millions of customers to come into a physical banking location and establish their authorized thumb print, regardless of their account age, banking history, account balance, or fraud risk. Maintain a secure, reliable, online database of all these thumb prints. Make the database accessible to several thousand banking locations. Implement a near-100% accurate thumb print recognition algorithm. Ensure that all the components in this system can operate at near-instantaneous speed so transactions can be authorized in a timely manner.
      Cost to bank: several hundred million dollars
      Cost to users: hassle for thumb print at each transaction

      2) Implement a new program that requires thumb prints to be taken for each transaction. Thumb prints may be collected on paper, stored at the local banking location, archived only occasionally, and are only ever referenced if a transaction has been flagged as fraudulent. If such a thing does happen, surveillance tapes and the thumb print may be supplied to law enforcement for further action.
      Cost to bank: in the tens of millions of dollars
      Cost to users: hassle for thumb print at each transaction

      Both methods produce essentially the same amount of security, particularly for dumb criminals who may not know that the bank is relying on method 2 and not method 1. I honestly can't say I would have chosen differently either.
  • by Anonymous Coward
    How it is done in Norway:

    1. You get a keypad in the post, a small (3x2)" thingy with numbers 0-9 and a tiny calculator-style screen.
    2. You also get instructions how to set a four-digit PIN code on it for first use.
    3. To log in to the internet bank, you enter your personal number (SSN equivalent), and type the PIN into the pad. It gives you an eight digit code.
    4. You enter the first six digits of the code. The bank displays the last two, which should match your card's.

    Hackable? Phishable? Any flaws? I can't
  • A better way would be to put a code on the monthly statement (that changes every statement)- of course most banks are trying to get rid of paper statements so the point is moot, but I think it would be the best way without requiring an actual token.
  • by thsths ( 31372 )
    Ok, so you have a shared secret, and you use part of it every time to authenticate yourself. That does not sound like a new idea to me. In fact, German banks have all used this scheme for years. They use a more refined version:
    • The matrix is mailed in a sealed envelop. This is important - try to seal email :-).
    • Each entry is 6 digits long, so the change of guessing it is very low.
    • You use one entry for every transaction. So you don't need the matrix to check your balance.

    This may sound complicated, but actuall

  • by Eivind ( 15695 )
    Sure there's MUCH better examples of "something you have".

    The basic problem with emails, tan-numbers etc is that they can be easily copied. So, the fact that you have the item/information does nothing to ensure that noone else has it too. You're much more likely to notice having *lost* something than you are of noticing that someone has *copied* something you posess.

    If you could be certain people wouldn't leave them plugged in (many would, despite strict instructions to the contrary) the ideal something

    • by bucky0 ( 229117 )
      Or, you could do something where the PC first veirfys that the USB-dongle isn't connected before the transaction starts, and if it is, forcing the user to disconnect/reconnect, so the user would be in somewhat of the habit of disconnecting the thing.
      • by Eivind ( 15695 )
        That doesn't work because you cannot trust the PC. (it could be trojaned or whatever)

        However, if the check was in the dongle itself it could work. The dongle could require the pushing of a on-dongle-button before it'd sign a single transfer.

        For added paranoia, the dongle could have a display: "Press the button to transfer [dollar-amount] to [account-number]".

    • by akohler ( 997911 )

      I completely agree with this, although I would also say that the addition of biometric verification - such as a fingerprint scanner on the usb encryption token - would add an additional layer of security at a reasonable price and convenience point. These are already available for purchase, and I don't think it would be overly onerous to implement them.

      My bank - Bank of America - claims to have "above industry standard" security for online banking, but to be quite honest, it's pretty lax. They added a mand

      • by Eivind ( 15695 )
        Fingerprint-scanners utterly suck. The basic problem is that their mode of operation requires leaving tons of copies of the "password" near the "password-entry" field. Which ain't clever.

        It's possible to make them less sucky, but most of the time that results in a higher false-negative rate which ain't that user-friendly at all. Plus, it's a large practical problem, you can't change your biometrics if they're somehow compromised.

        • by akohler ( 997911 )

          In general, I would agree that in a higher security environment, relying on cheap fingerprint scanners alone would be idiotic. They have many more functional models of scanners available, such as those that can detect whether the print is on a hand, the hand is alive, etc., but of course those are more expensive, and, as you point out, may give more false negatives.

          However, I think that most people are not as concerned with people breaking into their house and trying to lift their prints off the desk as th

    • I, lazy/busy American/Nabob, cannot be inconvenienced to cart around one of these for every one of all my very important, easy to remember and of course identical passwords.

      My bank has me scratch my mark on paper and fax it for anything critical, asks me to call from my phone-of-recod for some things of a little import, and insures everything else.

      I don't know how much that costs you all in additional fees and such, but thank you, and keep up the good work!

      • by Eivind ( 15695 )
        It's not lazyness. It's just that passwords are no longer useful for high-security stuff.

        To be secure, passwords should:

        • Not be shared between sites.
        • Be atleast 8-10 characters long.
        • Consist of random characters/numbers/symbols
        • Be changed regularily.

        At the same time, the number of situations where the average person needs a password increases strongly.

        The human brain just ain't suited for that kind of thing. It gets worse too, because the largest password easily crackable goes up over time. Used t

  • aptitude install libpam-opie [debian.org] opie-client [debian.org] opie-server [debian.org]
  • Sorry for this blatant plug but I believe it's quite relevant to the discussion.

    The company I work for [meridea.com] has an authentication product [meridea.com] that's more secure than hardware tokens (SecurID) and one-time password sheets.

    The product is a J2ME application that you install into your mobile phone. You activate the application in advance by entering a cryptographic key. To authenticate something, you start the application and enter your PIN code, then type in a challenge code given by the remote service (a web page,

  • by anomaly ( 15035 ) <tom DOT cooper3 AT gmail DOT com> on Monday January 15, 2007 @09:59AM (#17612818)
    My CU recently added "more security" to my account. I need to jump through a couple of hoops to have them write some kind of cookie to my PC. In order to improve the hoops, they asked me some "password challenge" questions.

    When I went to log into my account from a second PC, their system asked me the challenge questions. For elementary school attended, did I answer "jones" or "jones elementary" or "jones elementary school" or "Jones" (you get the idea)

    At any rate, since my answers the second time failed to exactly match, my account was locked and I had to call the customer service number to get my account unlocked. They reset my challenge questions, and told me that lots of people are having this problem. As a result the CSRs tell people to answer those questions with a single word, and to USE THE SAME WORD FOR EVERY ANSWER!

    This system is broken.

    Whatever you do, don't build a broken system.

    • by mutterc ( 828335 )

      did I answer "jones" or "jones elementary" or "jones elementary school" or "Jones"

      What I do for these is to make up answers (this defeats an attack where someone finds out where I went to school, etc.), then put that answer in my password-safe program along with the password.

      It doesn't add any extra types of security anyway. It's just a secondary password, same as those "we'll ask you this question to reset your password if you forget it" questions sites used to have. Those I would just answer with random gibberish, not logged (a well-backed-up password safe means I won't be forgettin

  • A good two-factor authentication system should include host authentication as well to prevent MITM attacks.

    http://en.wikipedia.org/wiki/Mutual_authentication [wikipedia.org]

    Otherwise, banks would be better off using OTPs to validate the transactions.
  • I'm bedazzled by the sheer ignorance displayed in this thread.

    First of all, the rest of the world is already using a pretty secure standard for two-factor authentication called EMV. It's all there, smart card vendors support the standard, card manufacturing plants can produce EMV cards, banking software supports it.

    Second RSA IS NOT cost effective in banking. Nevermind the logistics and cost of replacing lost RSA fobs, RSA will use the opportunity to ream the bank an extra-large you-know-what. Where else

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...