From: Richard Outerbridge on
In article <hl6b9r$lgh$1(a)orkan.itea.ntnu.no>,
Kristian Gj�steen <kristiag+news(a)math.ntnu.no> wrote:

> Richard Outerbridge <outer(a)interlog.com> wrote:
> >In article <hl5m2l$fl2$1(a)orkan.itea.ntnu.no>,
> > Kristian Gj�steen <kristiag+news(a)math.ntnu.no> wrote:
> >
> >> Richard Outerbridge <outer(a)interlog.com> wrote:
> >> >I understand this entirely. I have no doubt they were able to perform
> >> >the attack. But I do not believe the attack can be amplified, and as
> >> >such it is more a proof-of-concept attack against EMV than a practical
> >> >widespread compromise of Chip&PIN.
> >>
> >> Why couldn't their tools be replicated and mass-produced, leading to
> >> significant compromise?
> >
> >Two key sentences:
> >
> >"The card itself may permit the terminal to attempt signature
> >verification if PIN verification fails, but in practice merchants
> >will normally reject the transaction."
> >
> >"The issuer, which can decode the IAD, does not know which cardholder
> >verification method was used, and so cannot use it to prevent the
> >attack."
> >
> >But the Issuer knows which verification methods are allowed by their
> >cards, and can decode the IAD. If the Issuer has allowed signature
> >fallback, or no verification, or has not included the IAD in the ARQC,
> >the ambiguity arises and the attack goes through.
> >
> >But if, as suggested by the first sentence, offline PIN verification
> >by the card itself is the only option for online transactions, then
> >there is no ambiguity - except as permitted by the specification and
> >perhaps implemented by incautious Issuers.
>
> I don't understand. Why should this be an obstacle for me with a copy
> of their tools, but not an obstacle for them with the exact same tools?

They got to choose the perhaps incautious Issuers' cards they attacked?
From: Kristian Gj�steen on
Richard Outerbridge <outer(a)interlog.com> wrote:
>They got to choose the perhaps incautious Issuers' cards they attacked?

Do you know what fraction of issuers are "incautious"?

--
Kristian Gj�steen
From: Richard Outerbridge on
In article <hl6i0m$n9n$1(a)orkan.itea.ntnu.no>,
Kristian Gj�steen <kristiag+news(a)math.ntnu.no> wrote:

> Richard Outerbridge <outer(a)interlog.com> wrote:
> >They got to choose the perhaps incautious Issuers' cards they attacked?
>
> Do you know what fraction of issuers are "incautious"?

I have no idea, I'll grant you that.
From: Peter Fairbrother on
Kristian Gj�steen wrote:
> Richard Outerbridge <outer(a)interlog.com> wrote:
>> They got to choose the perhaps incautious Issuers' cards they attacked?
>
> Do you know what fraction of issuers are "incautious"?
>

Afaik 100% of UK-issued cards allow signature fallback.

That's not likely to change, for complex legal and political reasons I
won't go into as it's a very long story.

Forbidding all fallback methods would be a fix, but it would mean
issuing new cards, and it would make eg unverified transactions
impossible, as well as signature fallback of course.

Merchants and cardholders wouldn't like it, and as I say it's a legal
problem too, so I don't think it will happen - especially as there are
better fixes if the banks are issuing new cards and/or terminals anyway.



Some other comments: it's not a new attack, it has been known about for
quite some time.

The Cambridge people did demonstrate it effectively though, and their
writeup in the paper is very good. Afaik it's the first paper on the attack.

However for them to say they discovered the attack, as they do on their
FAQ page, is not true (unless they discovered it independently). They
weren't the first to describe their previous big story, the relay
attack, either.

Both attacks were described and available on the 'net, authored by other
people, for at least a year before they wrote papers on them. In both
cases they were aware of the earlier descriptions. That isn't mentioned
in either paper, which I think is a little grabby of them.





Ross is on his consumer high horse yet again, but I think the immediate
victims of this attack are probably not the cardholders, but the merchants.

The issuing bank "knows" from the IAD that cardholder verification was
by signature, and will (or should) ask the retailer for the signed slip,
which he can't produce as it never existed.


However the acquiring bank will probably (I'm not entirely sure of this)
"know" that the verification was done by PIN, from data the terminal
sends to the acquiring bank.

So (if that's the case) the attack will be detectable after the fact, if
the issuing and acquiring banks can compare notes (which may be another
legal problem).



But chip and PIN is broken anyway. Even random PIN trial by thieves will
net some rewards, and the cardholders in these cases will lose out if,
as seems to be the case, the regulator and ombudsman accept that PINs
are "infallible".

Not to mention relay attacks, attacks on the PIN retry counter, and so on.


-- Peter Fairbrother
From: Kristian Gj�steen on
Peter Fairbrother <zenadsl6186(a)zen.co.uk> wrote:
>Kristian Gj�steen wrote:
>> Richard Outerbridge <outer(a)interlog.com> wrote:
>>> They got to choose the perhaps incautious Issuers' cards they attacked?
>>
>> Do you know what fraction of issuers are "incautious"?
>>
>
>Afaik 100% of UK-issued cards allow signature fallback.

In Norway, the banks say that the domestic payment system does not allow
signature fallback. Since almost every card are also part of either
the Mastercard or Visa system, I wonder if those systems might allow
signature fallback, and if so, if it is possible to make the cards use
the Mastercard/Visa system instead of the domestic system.

It would be rather daft it that was possible...

--
Kristian Gj�steen