Full Disclosure mailing list archives

Re: Most common keystroke loggers?


From: Blue Boar <BlueBoar () thievco com>
Date: Fri, 02 Dec 2005 11:12:56 -0800

Frank Knobbe wrote:
That's why I emphasized that the use of tokens should not only be made
for initial authentication, but also for *each transaction*. Any
transaction can be hashed with a one-time code generated by a token and
sent as a control with the transaction parameters. Any MITM interception
and modification will invalidate that hash thus voiding the transaction.

I agree. I'd also like to point out that the "token" has to actually do the transaction processing for it to still be secure. The PC at that point is more-or-less just another untrusted pipe. The banking industry probably should be looking into making $40 USB co-computers with a 2-line LCD display and accept/decline buttons.

Reason being that the user still needs to use the compromised computer to type in what the transaction is, and for how much. The token needs to display the size and type of the transaction for approval. I.e. if Grandma says to transfer $50 to PG&E, she needs to see that the token doesn't say transfer $1000 to Nigeria.

And I'd STILL not be happy with how easy it would be for clueless users to authorize such a transaction. But I don't know how to fix that.

                                                BB
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: