|
BugTraq
Clear text password exposure in Datakey's tokens and smartcards Aug 04 2004 05:08AM vuln hexview com (1 replies) Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards Aug 04 2004 06:45AM Lionel Ferette (lionel ferette belnet be) (1 replies) |
|
Privacy Statement |
> Note that this is true for almost all card readers on the market, not only for
> Datakey's. Having worked for companies using crypto smart cards, I have
> conducted a few risk analysis about that. The conclusion has always been that
> if the PIN must be entered from a PC, and the attacker has means to install
> software on the system (through directed viruses, social engineering, etc),
> the game's over.
>
> The only solution against that problem is to have the PIN entered using a
> keypad on the reader. Only then does the cost of an attack raise
> significantly. But that is opening another can of worms, because there is
> (was?) no standard for card readers with attached pin pad (at the time,
> PC/SCv2 wasn't finalised - is it?).
>
at least some cards are supporting des passphrases to implement secured
communication channels but I suppose this feature is not that widely in
use.... how many card owners are prepared to remember both PIN codes
and passphrases...
toomas
[ reply ]