Banks to Use 2-factor Authentication by End of 2006 313
Evil Grinn writes "As reported on Yahoo and elsewhere the Federal Financial Institutions Examination Council (FFIEC) has given a deadline of end-of-year 2006 for U.S. banks to implement two factor authentication."
One more damn thing to carry around (Score:4, Insightful)
1. I have to carry it around
2. I may lose it
3. It will probably break
4. Its code could be duped
Too little security, too much inconvieniece
Re:One more damn thing to carry around (Score:5, Insightful)
But I'm betting you wouldn't sign a waiver relieving them of liability if you opt out of using their T-FA...
Re:One more damn thing to carry around (Score:5, Insightful)
Second factor Windows-only? (Score:5, Insightful)
The reason for my suspicion is that I used USB dongles for some expensive, proprietary software at my workplace, and on a whim I looked around for Linux drivers for the thing. Turns out that the manufacturer only supports Windows 2000 and XP, and no third-party drivers for other OS's exist.
And it won't work. (Score:4, Insightful)
But because it will be a cool "encryption" key, people will not know that they aren't "secure".
The only way to improve the security is to use a different channel (example: the bank calls your phone to have you verify the transaction)
-or-
The site relays the information to you using your IP address as part of the encryption (this won't work with NAT/PAT/Masquerading, but will be feasible with IPv6).
Re:One more damn thing to carry around (Score:5, Insightful)
What, you have a magnetic-strip card reader attached to your computer? Sure, no problem - we'll just mandate that all computers that want to access a bank online have to have one, or whatever hardware doohickey they decide to require.
THAT's the real problem with this proposal. Much like extending Daylight Savings Time, politicians have no idea what impact this has on the real world - programmers that have to code this stuff, and in this really BAD case, new hardware that even the end user is required to now purchase.
Bleh.
Why doesn't... (Score:3, Insightful)
The wikipedia link claims that TFA contrasts to a system where only the password need be known. That may be a problem with some systems where the username is essentially public (i.e. *nix), but for online banking access, the username need not be easily guessed or based on any personal information, just unique.
Isn't requiring two non-obvious pieces of information (non-personally identifiable username + password) a form of two factor ID? (yes, I know the traditional mantra of "something you have/know")
If not, why is an ATM card and PIN considered to be, knowing the ease with which mag stripes can be copied? It's not like there should be high confidence the ATM card stripe is proof of possession of a unique object, as might be the case with a SecureID or retinal scan.
Silly (Score:5, Insightful)
How about requiring banks to use https correctly [squarefree.com], which would at least reduce the impact of pharming attacks?
Re:Second factor Windows-only? (Score:3, Insightful)
That said, I hate the SecurID. I'm a much bigger fan of PKI-based solutions, because of all the other things you can get along with it (secure email, secure transactions, strong authentication, persistent digital signature and encryption) for almost no additional cost. However, I'd understand if organizations went the SecurID route to save money not having to support something that didn't work well in multiple platforms.
"Reprogramming" Daylight Saving Time? (Score:4, Insightful)
That's it. No 'reprogramming' involved at all. That's because the interpretation of the TZ variable was already programmed to include this sort of encoded rules.
On the gripping hand, I have no clue what it'll take to fix Windows timezones.
You try and man-in-the-middle SSL (Score:4, Insightful)
I worry about man-in-the-middle attacks for encrypted channels like not at all. Anyone who has the ability to compramise a major network provider to do that, probably has better thigns to do than go after my info.
Re:Silly (Score:3, Insightful)
it will just force attackers to use the information gleaned from such attacks before the fob's digits expire.
The fob's digits expire in 60 seconds. I hadn't heard that real-time phishing attacks were a problem.
Re:And it won't work. (Score:2, Insightful)
A car alarm usually just alerts thieves that there might be something worth stealing in your car. Nobody pays any attention to car alarms going off any more, as 99.999% of car alarm noises are false alarms due to poorly adjusted shock sensors.
The car alarm probably makes your situation worse.
Re:Why couldn't they just (Score:4, Insightful)