BugTraq
Clear text password exposure in Datakey's tokens and smartcards Aug 04 2004 05:08AM
vuln hexview com (1 replies)
Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards Aug 04 2004 06:45AM
Lionel Ferette (lionel ferette belnet be) (1 replies)
Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards Aug 04 2004 08:11PM
Toomas Soome (Toomas Soome microlink ee) (2 replies)
Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards Aug 05 2004 01:03PM
Lee Dilkie (lee_dilkie mitel com) (1 replies)
Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards Aug 06 2004 11:31AM
Kevin Sheldrake (kev electriccat co uk)
Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards Aug 05 2004 10:39AM
Kevin Sheldrake (kev electriccat co uk) (1 replies)
Surely if the user is entering a passphrase then the same problem exists -
that of effectively eavesdropping that communication from the keyboard?

Ignoring the initial expense for a moment, wouldn't it have made a lot of
sense to include the keypad actually on the cards? Obviously, card
readers would need to be contructed such that the keypad part of the card
would be exposed during use. The keypad security could then rely on the
tamper resistant properties of the rest of the card.

From a costs perspective, I would guess that the actual per-card cost
increase would be minimal if hundreds of millions of these cards were
produced.

Kev

> Lionel Ferette wrote:
>
>> Note that this is true for almost all card readers on the market, not
>> only for Datakey's. Having worked for companies using crypto smart
>> cards, I have conducted a few risk analysis about that. The conclusion
>> has always been that if the PIN must be entered from a PC, and the
>> attacker has means to install software on the system (through directed
>> viruses, social engineering, etc), the game's over.
>> The only solution against that problem is to have the PIN entered
>> using a keypad on the reader. Only then does the cost of an attack
>> raise significantly. But that is opening another can of worms, because
>> there is (was?) no standard for card readers with attached pin pad (at
>> the time, PC/SCv2 wasn't finalised - is it?).
>>
>
> at least some cards are supporting des passphrases to implement secured
> communication channels but I suppose this feature is not that widely in
> use.... how many card owners are prepared to remember both PIN codes
> and passphrases...
>
> toomas
>
>

--
Kevin Sheldrake MEng MIEE CEng CISSP
Electric Cat (Bournemouth) Ltd

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus