advertisement
advertisement

This is page 2 of:

Cambridge University Calls Verified By Visa Secure Protocol Terrible Security

February 1st, 2010

The report also takes issue with how 3DS handles passwords, which is already getting quite difficult.

“Before 3DS can be used to authenticate transactions, cardholders must register a password with their bank. A reasonably secure method would be to send a password to the customer’s registered address. But to save money, the typical bank merely solicits a password online the first time the customer shops online with a 3DS-enabled card, known as activation during shopping (ADS),” the Cambridge University paper said. “To confirm that the customer is the authorized cardholder, the ADS form may ask for some weak authenticators (e.g., date of birth), although not all banks do even this. From the customer’s perspective, an online shopping Web site is asking for personal details. This further undermines customers’ security usability and trust experience, and it is being exploited by criminals, as phishing Web sites impersonating the ADS form to ask for banking details. Also, because setting a password is a secondary task, [customers] are more likely to choose a poor password, or one they use elsewhere. While Visa requires that customers can opt out at least the first three times, banks may try to force 3DS activation after this stage by preventing the purchase. One of the authors attempted to opt out of using 3DS with a Maestro product. The issuer, the NatWest Bank (now majority-owned by the U.K. Government), did not allow even one card use without activating 3DS for the account.”

The password problems get even worse.

“The 3DS specification only covers the communication between the merchant, issuer, acquirer and payment scheme, not how customer verification is performed. This [step] is left to the issuer, and some have made extremely unwise choices. For instance, one bank asks for the cardholder’s ATM PIN,” the report said. “It’s bad enough that EMV Verified by Visa and MasterCard SecureCode have trained cardholders to enter ATM PINs at terminals in shops. Training them to enter PINs at random E-Commerce sites is just grossly negligent. Another issuer-specified choice is how to reset the password when a customer forgets it. Here, again, corners are cut. Some banks respond to one or two failed password attempts by prompting an online password reset using essentially the same mechanisms as ADS. In a number of cases, the bank requires only the cardholder’s date of birth, which is easily available from public records. With one (U.K. Government-owned) bank, two wrong password attempts simply lead to an invitation to set a new password.”

This issue is a classic battle between expediency and security. To be fair, there is a legitimate security advantage to expediency–if and only if it sharply increases consumer participation, and if and only if that increased participation improves security. Yes, there’s a PCI parallel argument here–namely, that even with all of its issues, PCI has still sharply improved retail security.

That said, the Cambridge University report’s well-reasoned case against the 3DS approach is more than enough to give security executives pause. But at this stage of marketshare acceptance, is it too late? As a practical matter, this siren is indeed probably much too late.


advertisement

5 Comments | Read Cambridge University Calls Verified By Visa Secure Protocol Terrible Security

  1. Steve Sommers Says:

    Darn, they beat me to the punch! This was on my to-write-about list.

    All the topics in the report I fully agree with. Some banks using ATM PINs for both ATMs and VbV/SC5 was news to me. While the report said that Visa and MasterCard got the economics right for the merchant, I feel they missed it for the consumer. The agreement most cardholder’s sign when enrolling for the programs stipulate a significant loss in charge back rights. In the fine print of many of these agreements is that the consumer can’t dispute a transactions based on “I didn’t make that purchase.”

    I never use these programs for just this reason (plus the fact you have to dissect the page source to confirm it is not a phishing site).

  2. A reader Says:

    Nice paper. Factual conclusions. Utterly useless. It won’t get fixed.

    Remember that Visa is perversely opposed to providing true security for transactions. True security means full end-to-end protection of the transaction, with those endpoints being the customer’s credit card and their bank. In a truly secure model, you don’t trust any part of the network, so any untrustworthy network will suffice. And in that case VisaNet is just like the regular Internet, except with vigorish.

    As long as Visa can continue hand-waving, blaming security faults on retailers, processors, web sites, and everybody but themselves, they can keep raking in the interchange fees. They don’t even accept responsibility for the losses due to fraud because of these weak protocols: those flow to the merchant or to the bank. Visa has every financial incentive to keep the current confusing, insecure model around as long as possible.

    No single retailer (except possibly WalMart) is large enough to orchestrate a change in protocols. A single bank could bring out a secure system for its customers, but it would be more complex than a simple credit card, and customers have incentive to stay with “simple” mag stripes as the mandated $50 limit protects them from liability. And no government agency is going to mandate a security change, as those would be railed against as “expensive” or “anti-business”. It won’t get fixed because the current screwed up system is too profitable for Visa. How screwed up is that?

  3. E t Voorde Says:

    One bank using the card PIN as 3DS password doesn’t prove that the whole protocol is useless.

    Besides that, the protocol might not be perfect, it does prevent from a lot of very simple Card Not Present fraud happening today.

    Offtopic: saying that with EMV the ATM PIN is used for POS is typically UK, because whole Europe was already using PIN in POS in magstripe debit transactions for years!

  4. Lucas Zaichkowsky Says:

    The quote from Steven J. Murdoch and Ross Anderson’s report is incomplete. There’s a lot missing between the first sentence and the rest, incorrectly leading the reader to believe 3DS specifies PINs as the method of identity verification. Truth is that only one card issuing bank was found doing that.

    From the report: “The 3DS specification only covers the communication between the merchant, issuer, acquirer and payment scheme, not how customer verification is performed. This is left to the issuer, and some have made extremely unwise choices. For instance, one bank asks for the cardholder’s ATM PIN. It’s bad enough that EMV Verified by Visa and MasterCard SecureCode has trained cardholders to enter ATM PINs at terminals in shops; training them to enter PINs at random e-commerce sites is just grossly negligent.”

  5. James Lin Says:

    Here’s another acronym: Points-of-Failure (PoF).

    3DS requires additional communications and services to complete a transaction. Both the Visa’s directory look-up and issuing bank’s verifier need to be reachable and running which poses possible PoF in a transaction.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.