[19122] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Clips] Banks Seek Better Online-Security Tools

daemon@ATHENA.MIT.EDU (Florian Weimer)
Tue Dec 6 12:03:41 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Florian Weimer <fw@deneb.enyo.de>
To: Eugen Leitl <eugen@leitl.org>
Cc: cryptography@metzdowd.com
Date: Mon, 05 Dec 2005 19:56:05 +0100
In-Reply-To: <20051205075458.GP2249@leitl.org> (Eugen Leitl's message of "Mon,
	5 Dec 2005 08:54:58 +0100")

* Eugen Leitl:

> The German PIN/TAN system is reasonably secure, being an effective
> one-time pad distributed through out of band channel (mailed dead
> tree in a tamperproof envelope).

Some banks have optimized away the special envelope. 8-(

> It is of course not immune to phishing (PIN/TAN harvesting), which
> has become quite rampant recently.

And we face quite advanced attack technology, mainly compromised end
systems.  We are well beyond the point where simple tokens (like RSA
SecureID) would help.

> I do have a HBCI smartcard setup with my private account but don't use it
> since it's locked in a proprietary software jail.

The way the current attacks are carried out, smartcard-based HBCI is
less secure than the PIN/TAN model because with HBCI, you don't need
to authorize each transaction separately.  At this stage, few people
recognize this problem, and German banks put high hopes on
smartcard-based online banking, despite its high costs in terms of
consumer devices and support calls.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post