Banks to Use 2-factor Authentication by End of 2006 313
Evil Grinn writes "As reported on Yahoo and elsewhere the Federal Financial Institutions Examination Council (FFIEC) has given a deadline of end-of-year 2006 for U.S. banks to implement two factor authentication."
One more damn thing to carry around (Score:4, Insightful)
1. I have to carry it around
2. I may lose it
3. It will probably break
4. Its code could be duped
Too little security, too much inconvieniece
Re:One more damn thing to carry around (Score:2)
Re:One more damn thing to carry around (Score:5, Insightful)
But I'm betting you wouldn't sign a waiver relieving them of liability if you opt out of using their T-FA...
Re:One more damn thing to carry around (Score:3, Interesting)
It depends. If the waiver covered them purely for losses incurred through phishing, I would happily sign it. I use only secure computers to get to my bank's web site, and I type the URL by hand. I would rather not carry a token to access just one web site.
On the other hand, if they wanted to extend the waiver to all forms of account loss, regardless of whether it involved an online transaction or n
Re:One more damn thing to carry around (Score:5, Insightful)
Re:One more damn thing to carry around (Score:2)
Re:One more damn thing to carry around (Score:2)
Re:One more damn thing to carry around (Score:5, Insightful)
What, you have a magnetic-strip card reader attached to your computer? Sure, no problem - we'll just mandate that all computers that want to access a bank online have to have one, or whatever hardware doohickey they decide to require.
THAT's the real problem with this proposal. Much like extending Daylight Savings Time, politicians have no idea what impact this has on the real world - programmers that have to code this stuff, and in this really BAD case, new hardware that even the end user is required to now purchase.
Bleh.
"Reprogramming" Daylight Saving Time? (Score:4, Insightful)
That's it. No 'reprogramming' involved at all. That's because the interpretation of the TZ variable was already programmed to include this sort of encoded rules.
On the gripping hand, I have no clue what it'll take to fix Windows timezones.
Re:One more damn thing to carry around (Score:2)
Keep in mind that those credit card companies lose money every time identity is stolen. They are out the charges as laws protect consumers from credit card fraud. They are out all the administrative expense associated with handling the theft. They also lose out every time somebody chooses not to buy something online for fear of having their identity stolen, or otherwise
Re:One more damn thing to carry around (Score:3, Interesting)
Re:One more damn thing to carry around (Score:2)
And it won't work. (Score:4, Insightful)
But because it will be a cool "encryption" key, people will not know that they aren't "secure".
The only way to improve the security is to use a different channel (example: the bank calls your phone to have you verify the transaction)
-or-
The site relays the information to you using your IP address as part of the encryption (this won't work with NAT/PAT/Masquerading, but will be feasible with IPv6).
You try and man-in-the-middle SSL (Score:4, Insightful)
I worry about man-in-the-middle attacks for encrypted channels like not at all. Anyone who has the ability to compramise a major network provider to do that, probably has better thigns to do than go after my info.
Re:You try and man-in-the-middle SSL (Score:2)
Ah-ha! The problem isn't protecting the highly-intelligent readers of /. from a MiTM attack, it is protecting people like my father from one. Even though the error message would be big, loud, visible, and wouldn't let him move forward without some acknowledgement, more likely than not, he'd simply click "Yes I trust this new key" and move on.
People are stupid. Joe Schmoe was never trained in PKCS#11, the importance of the chain of trust in PKI, or even in proper handling of invalid certificate errors.
You don't understand man-in-the-middle. (Score:2)
Actually, it is. Unless you know specifically how to check that the site you are connected to is associated with the site you want to connect to.
No. You're wrong. Here's an example:
Your computer
-c
Re:You don't understand man-in-the-middle. (Score:3, Informative)
Man-in-the-middle implies that your communication is going to destination A, via intermediaries B, C, and D. Phishing, and what you describe, implies that for some reason you've been tricked in to setting your end destination as D, who will eventually go to A for you, but you addressed it wrong. Yes, I guess this person is technically "in the middle" of the chain of where you WANT to go, but if you had been smart about saying y
Re:And it won't work. (Score:5, Informative)
Similarily, what does a Smartcard authentication system over https do for you, as opposed to a simple username and password over https?
It raises the bar, while also making people without a Smartcard more attractive targets. Compromising a username and password is fairly easy - people fall for phishing attacks all the time. If a Smartcard and PIN are also needed, a man-in-the-middle attack doesn't do you much good. You can't get my PIN (you'd also need a keystroke logger on my computer for that) and even if you had it, unless you also stole my Smartcard you'd still be SOL.
Not to mention that a man-in-the-middle attack is far harder to achieve than sending out a phishing mail or doing a brute-force attack against a weak password. Anyone can send out phishing mails or use a password-attack script; far fewer people have the wherewithal to mount a successful man-in-the-middle attack. So if I have a Smartcard + PIN that I need to use to authenticate to my bank and you don't, I've outrun you. I don't have to worry as much about the bear.
Where I work, we use Smartcards and PINs for authentication to our network, in addition to a userid and a high-quality password that must be changed regularly and may not closely resemble the old one. How does this raise security? In two ways: first, if someone gains unauthorized accesss to a computer inside one of our facilities, they can't do much with it unless they also have a card and PIN. Assuming they stole a card and got inside the building and found a computer in an isolated place and put the card in, they'd still need the PIN, and brute-forcing it would take a while because it's 6 digits minimum (mine is longer). Of course, you also only get a few tries before the PIN is disabled.
The second case is if someone were to steal my laptop in an airport, from my trunk, etc. It has a VPN client to our company network, but that won't do you any good without the Smartcard and PIN, either.
In both cases, our network is made far more secure by using Smartcards and PINs. It is not only the accepted wisdom that "something you have and something you know" is far more secure than a username/password-only system, it is just plain correct.
Many banks in Europe have been using one-time PADs for years; it's about time US banks are getting with the program on security, and disappointing that they're only doing it because somebody made them. If any bank here could offer me Smartcard + PIN or one-time PAD authentication today, they'd have my business right now.
Re:Smart Cards and Banks (Score:2)
There's so very few of you though.
Does anyone remember the Amex blue? It had some basic authentication and no one wanted to use it. There's no reason a consumer is going to demand this. That's why the U.S. might be the last place in the world to implement EMV. The banks don't want to pay and the consumer's don't want it.
Do a search for NavyCash on google. It just barely scratches the s
That's an interesting usage of "security". (Score:2)
No, I don't see how it can be described as "relative".
... not through anything you did or did not do ... but just because everyone improved their "security" beyond your's.
If it were so, you could move from "secure" to "insecure"
That's kind of like saying "I don't have to lock my doors, as long as my neighbors don't shut their doors".
Re:And it won't work. (Score:2, Insightful)
A car alarm usually just alerts thieves that there might be something worth stealing in your car. Nobody pays any attention to car alarms going off any more, as 99.999% of car alarm noises are false alarms due to poorly adjusted shock sensors.
The car alarm probably makes
SSL can be "correct" and still be fake. (Score:2)
With IPv6, the bank would send you a random 512 digit number, encrypted with your password+IP_address. Since the man-in-the-middle would not have the same IP address as you, or your password, he would not be able to use that connection for his own transactions.
But a trojan key-logger would still be able to collect your keystrokes and defeat it.
Re:SSL can be "correct" and still be fake. (Score:2)
But that's ideally. And that's why I don't trust SSL certs.
Trivial to foil SSL (Score:2)
About a month ago there was an article on slashdot about spyware that bypassed SSL. (They of course claim they are not spyware) Just install a certificate of yourself into the machine, then set up all connections to proxy through your machine. Then just generate whatever keys you need to sign any page they connect to.
Too many different attacks. (Score:2)
A trojan can assist a man-in-the-middle attack
Encryption fobs won't help.
Smart cards won't help.
One time pads won't help.
Not as long as all the authentication information is passing over the Internet. You need a second channel for final authorization.
Welcome to the club! (Score:2)
Two channels is the only way to go.
Re:One more damn thing to carry around (Score:3, Funny)
5pm? (Score:2)
As I recall the banks always closed at 3pm, except on Friday they were open until 7, but anything done after 3pm Friday was just put in a box and not processed until the next Monday.
I'm told that it was because they didn't have computers back then, so everything was processed by hand, and they used the last 2 hours to balance the books. I don't know that I believe that though - I'm young enough that computers have always been around in banks. (They didn't reach general business until latter, but comput
Re:5pm? (Score:2)
IF this comes to pass (Score:2)
But this mandate can be quietly suspended, extended, or admended when it becomes apparent to the people who live in the real world how difficult it would actually be to get working.
But even if it does come to pass, and you
Re:IF this comes to pass (Score:2)
Re:One more damn thing to carry around (Score:2)
Re:Biometrics FUD? (Score:2)
In a system where the actual image of your finger was stored and linked to your personal information, yes this problem would exist.
But, the systems I've seen (Fancy stuff to be sure) they address this issue a couple of different ways.
1. no "picture" of your finger.
2. fingerprints and personal information are not kept together, or otherwise easily associated.
Some AFIS now anonymize the fingerprint data. I'm honestl
Re:Citibank (Score:2)
good idea, in my opinion. (Score:5, Informative)
I would embrace T-FA. I have never (as far as I know) been victim of identity theft, or fraud and for that I'm grateful. But for modest investment and great added peace of mind, I look forward to this.
Ironically, in the slashdot article reference to T-FA, the wikipedia gives as a downside to T-FA:
I think this actually strengthensstill does not ensure the intrude has access to one of the two pieces (something you know, and something you have).
Too, how many (documented) massive identity theft rings are of the "gaining access to personal computers" ilk? None that I can think of.
For a little more work or inconvenience, I think this adds much security.
Re:good idea, in my opinion. (Score:3, Funny)
Re:good idea, in my opinion. (Score:3, Interesting)
This is another in a long series of laws/policy that servers the "It sounds like we should do this" crowd. Read through the BS and its the insurance (FDIC in the US) behind the banks pushing policy. It does nothing to protect the idenitiy/credit of consumers.
Re:good idea, in my opinion. (Score:5, Informative)
If you want to keep it that way, the best thing you can do is commit a little fraud.
File a police report (this is the fraud part) saying something like you were on mass transit, carrying copies of your tax returns. You set them down, and then when you turned around, they were gone. "someone took them"
With this police report, file for a permanent fraud alert on your credit reports (all 3). This will almost immediately stop all credit card offers and will prevent someone from being able to open instant-credit in your name. You can still get credit, but it takes a little more time and takes a little more proof of who you are.
The sad thing is that to get this "opt-out" in the credit-reporting system, you have to commit a crime. Without doing so, you can only get a 3-month "opt-out". Lovely country it is where we have to commit crimes to protect ourselves from crime.
No fraud needed (Score:5, Informative)
Now this of course makes it much harder to get credit. No walking in to a cell store and walking out with a phone. You need to plan ahead, find out who the creditor uses for their credit checks (with few exceptions they use only one of the three agencies) and have them take the steps necessary to make your report available.
However it's quite secure, moreso than a fraud alert, and it's totally legal to get.
Re:No fraud needed (Score:3, Interesting)
http://www.bankrate.com/brm/news/cc/20030613c2.as
So if you are in a state that allows it, I think this is an excellent idea. For the rest of us, I guess we will have to fend for ourselves.
Not a good idea for banks, but still a good idea (Score:2)
Banks could much more portably just start requiring signed client certificates. For windows users they could be stored on a USB keyfob instead of the HDD for slightly better security. Users of other systems could set it up that way if they wanted, but implementastion on FreeBSD or whathaveyou would be left to the client.
It is a good idea for host login, though. CF the article in the November
Re:Not a good idea for banks, but still a good ide (Score:2)
Client certificates are just too hard to manage for most people.
Re:good idea, in my opinion. (Score:2)
LOL (that's "laugh out loud")
Yeah, I typed the post up in a big hurry and cringed as I typed the acronyms. I try to avoid that, or use what it stands for at least once first. Sorry about that. :-)
-yagu
My bank already does this (Score:4, Funny)
Great, if they keep it compatible (Score:5, Interesting)
Sounds great, as long as they don't take the opportunity to lock out their actual customers.
Good ideas:
Bad ideas:
Bottom line: These are average people on home PCs, not corporate desktops where they can dictate the hardware/OS config, and anything that takes too much time/effort/skill/cash to install is going to be prohibitive. If banks keep that in mind, this should work. If not, they'll find a sharp drop in use of their online services.
Re:Great, if they keep it compatible (Score:2)
No compatability problems at all... (Score:2)
It doesn't interface to a computer except by you pressing the button, looking at the number and then typing it into the login screen.
My bank, HSBC, already uses them. I have a red and grey one sitting here on my desk. It's annoying to have to carry it around, but it's not huge, so the main annoyance would be losing it.
By the way, I'm not the only person who thinks these devices are the way it will go. Vasco stock went up 9.36% to [yahoo.com]
Re:No compatability problems at all... (Score:2)
*If* they start requiring hardware crypto devices, I'd like to see them do it as a two-parallel-keys system to make loss/theft easier to deal with. The idea is that they issue you two completely seperate keys (as in seperate seeds inside them in the case of rolling pin devices like the one you describe or RSA's SecureID). Both are registered to your account. Either one can be used for full access, and either one can be used to request that the bank terminate the access of the other. You keep one on you,
Re:Great, if they keep it compatible (Score:2)
Second factor Windows-only? (Score:5, Insightful)
The reason for my suspicion is that I used USB dongles for some expensive, proprietary software at my workplace, and on a whim I looked around for Linux drivers for the thing. Turns out that the manufacturer only supports Windows 2000 and XP, and no third-party drivers for other OS's exist.
Re:Second factor Windows-only? (Score:2)
Re:Second factor Windows-only? (Score:3, Insightful)
That said, I hate the SecurID. I'm a much bigger fan of PKI-based solutions, because of all the other things you can get along with it (secure email, secure transactions, strong authentication, persistent digital signature and encryption) for almost no
Re:Second factor Windows-only? (Score:2)
The USB dongles are not actually manufactured by the publishers of the software packages that use them, so the observation that you mock is, in fact, valid. I did a little checking, which you should have done . . .
Safenet Sentinel: Some support for RedHat and Suse + OSX
Aladdin Hasp: Looks like Linux support is new for 2005
WIBU Key: Has Linux support
MARX Cryptoken: Based on M$ CAPI
This is just a sample of some of the
Just the FFIEC? (Score:2)
Hmm..I'm going to need a notification from atleast one other organization than the FFIEC before I believe this.
Re:Just the FFIEC? (Score:2)
Re:Just the FFIEC? (Score:2)
It very well may (and probably will) take past Dec. `06, but the key piece to remember when reading any legislation, regulation or guidance on such, is the interpretation varies.
What
Sounds great but... (Score:2, Funny)
Re:Sounds great but... (Score:2)
Re:Sounds great but... (Score:2)
Re:Sounds great but... (Score:2)
On second thought, maybe carying around a copy of your password is actually more secure.
Re:Sounds great but... (Score:2)
Agreed, people are idiots, and will likely write their pin on their token using a permanent marker. Still, when their token is gone, they KNOW it is gone. They know that they no longer have the token itself and they know that someone else likely has their pin. The token can then be revoked and the pin changed.
With single-factor auth, the authenticator (a.k.a. the pin) can be "stolen" without the user's knowledge. Their pin still works, they still know it. This give the bad guy time to do bad stuff.
To make it a really boring read (Score:3, Informative)
Straight from the FFIEC's mouth.
Why couldn't they just (Score:3, Interesting)
then when they login into the system, it sends a temporary use code to the email address.
Not used in 5 minutes, to is no longer anygood.
Older then 30 minutes, your logged out, the number is no longer any good.
In the email, you jsut send the number. If all banks used the same sender to send the code, then people intercepting it would not know what bank it came from.
Defeated via trojan. (Score:2)
Re:Why couldn't they just (Score:4, Insightful)
How about "Common Sense" authentication? (Score:2, Interesting)
Re:How about "Common Sense" authentication? (Score:2)
I can't recall seeing one bank (or credit union) ever having such lax policies.
But I live in Australia. Maybe things where you live could do with some tightening up.
Why doesn't... (Score:3, Insightful)
The wikipedia link claims that TFA contrasts to a system where only the password need be known. That may be a problem with some systems where the username is essentially public (i.e. *nix), but for online banking access, the username need not be easily guessed or based on any personal information, just unique.
Isn't requiring two non-obvious pieces of information (non-personally identifiable username + password) a form of two factor ID? (yes, I know the traditional mantra of "something you have/know")
If not, why is an ATM card and PIN considered to be, knowing the ease with which mag stripes can be copied? It's not like there should be high confidence the ATM card stripe is proof of possession of a unique object, as might be the case with a SecureID or retinal scan.
Because (Score:4, Informative)
Something you have (a key, a smartcard, etc) is strong because it has to be stolen to be of any use, someone has to physically take it. You can't just look at a smartcard and have it do you any good, you have to be in physical posession of it. However that's also the downside, it CAN be stolen. Someone can just grab it when you aren't looking.
Something you know (a password or username) is strong because it's stored in your head, nothing to physically steal, nothing to lose. However it's weak because if someone discovers it, you'll never know. They don't need to take anything, just know what it is and they can use it. Also complexity is limited by what you can remember.
Something you are (a fingerprint, an iris scan) is strong because you are unique, and it's a part of you. You never lose it, and peopel can't really fake it because, well, it's a part of you. The weakness is that what you are changes, and the ability to read it isn't 100% accurate, so someone CAN fake it out potentially.
Now, because of this, real strength comes form having two or three of these methods. If you just have passwords, even if you have 3, all someone needs to do is learn them and they are in. However if you need a smart card, a password, and a fingerprint the person has to get an impression of your finger and make a convincing dupe, then find out what your password is, then steal your smartcard, and then use it all before you notice any of this and invalidate the account.
So it's not worthless to have more of the same kind of authentication, but it's not nearly as good as having multiple kinds of authentication.
Australian Bank (Score:4, Interesting)
Taking up the extra security is entirely up to the individual and is gradually being introduced to customers, though it costs a reasonable amount of money to actually order a security device.
TFA Readers (Score:3, Funny)
T-FA ... ! (Score:2, Funny)
Silly (Score:5, Insightful)
How about requiring banks to use https correctly [squarefree.com], which would at least reduce the impact of pharming attacks?
Re:Silly (Score:2)
Re:Silly (Score:3, Insightful)
it will just force attackers to use the information gleaned from such attacks before the fob's digits expire.
The fob's digits expire in 60 seconds. I hadn't heard that real-time phishing attacks were a problem.
2 Factor does not require bulky items (Score:2)
- a membership number
- a secret word (they ask for letters or numbers from the secret word)
- a passcode
- an account number
It takes several forms, but I don't have yet a third bulky RSA key to carry around.
How about just have people answer 10 questions and then use 3 of those answers, things like, your favorite color (blue, no green), car color (fu
Defeated via trojan. (Score:2)
Re:2 Factor does not require bulky items (Score:2)
Found this... (Score:3, Interesting)
Also, is this simlar what we have had in sweden for a couble of years for our banking systems? We have a personal badge that we enter a pin and a temporary code to get a new temporary code to be able to authenticate??
my bank already implemented a low tech version (Score:5, Interesting)
sure, it's really far from RSA, as my code doesn't change and anyone can easily just photocopy my card. but i thought that it was a creative solution to implement a two factor auth that even dummies would understand, while providing a lower cost to implement.
Re:my bank already implemented a low tech version (Score:2)
Physical access. (Score:3, Funny)
If you gain physical access to a device
These n-factor authentication schemes
Step 1: Remove hard drive from device.
Step 2: Run away really fast.
Step 3: Rule the world.
Two Factor Withdrawls (Score:4, Funny)
Burden of Proving Fraud Shifted to Customer (Score:5, Interesting)
Speaking of fault
Keys, etc are no good if the fraudster takes control of the victim's computer itself
Banks are going to love this - sure the key tokens, etc are going to be a hassle for them to distribute, etc, but in the longrun banks will be able to shift more of the risk to the customer unless consumer groups speakup
Ron
Locking the front door... (Score:2)
In order to draft from your account, the only thing anybody needs is your account number. Heck, companies are now allowed to convert your paper checks into "electronic checks" (ie computer drafts) using only the information printed on the bottom of your check. There was something on the local radio station this week (Clark Howard, consumer guy out of Atlanta) about a woman whose $1600 mortgage payment got fat-fingered as $6600 and it took her MONTHS to get her money b
stupid, stupid, stupid, and also really quite dumb (Score:2)
From the article:
Could someone find the idiot administrator or politication or member of this council that came up with this idea and give them a nice, firm smack in the head with a laptop computer? It should be easy to pull this off, because obviously anyone who would suggest this has never heard of laptops, and therefore wouldn't see it coming.
God for
T-FA by dialup bbs instead of internet (Score:2)
More info needed, and this is inconvient! (Score:3, Interesting)
Userid and password is simple, and effective in most cases.
The Feds want more security here, yet if I ask my bank to only accept ACTUAL PHYSICAL checks with my signature on them before honoring them and paying the other banks, it is ILLEGAL for my bank to give me what I want and refuse to accept a "substitute check". It is ILLEGAL for a bank to insist on security which would go a long way towards stopping check fraud, something which I can't protect against.
Whereas phishing attacks require stupidity on the part of the user.
Why protect people from seomthing they can protect themselves against, yet not protect us from something we can't protect ourselves from (people can forge our signature, and anyone getting a check from us has the routing number and account number, which is all they need)?!
If you don't understand the basics of computer security, you shouldn't be allowed to bank on the Internet. If you don't understand the basics of operating a car, you shouldn't be allowed to drive on public roads. Same principle at work here.
Don't take away my convience and require me to carry a smart card (oops, left it at home and can't do some needed banking at work or on vacation - sucks to be me) because of other's stupidity.
Let the stupid people lose their money, get off the Internet and/or go broke and die.
We molly coddle the stupid way too much in this country (USA).
If they must DO SOMETHING, just mandate the banks block *.aol.com at the firewall and be done with it.
95% of the problem will be solved.
Or have the server attempt the common Windows exploits, if they fail, the user isn't on Windows or has actually secured Windows - in either case they likely aren't terminally stupid - and the banking session should be allowed.
Now 99% of the problem is solved.
As for the remaining 1%, guess what, nothing is perfect. Even with 2 factor authentication, once logged in, a malicious hacker with control of your PC can add an illicit transaction request to the banking session.
In any event, people should be responsible for computer security. Secure your damn PC, learn to not trust spammers and scammers and don't be a dumbass.
Or stay off the Internet, and don't cross the street either if you are an idiot.
Re:Security or Laziness? (Score:4, Funny)
Re:Security or Laziness? (Score:2)
Re:If this.. (Score:2)
I know, not a big difference, but you did ask.
Re:If this.. (Score:2)
On a related topic, the last I read, merchants are permitted to temporarily store card code data
Re:If this.. (Score:2)
Re:If this.. (Score:2, Informative)
Moreover, anyone maintaining a database with CC #'s (web sites, banks, etc.) cannot store CVV2 codes in their databases beyond the life of a given transaction. Literally seconds. This is how it helps, because anyone that gains unauthorized access to a database with CC's is not going to be able to use those cards at any merchant that requires a CVV2 (95% of any phone or web based business).
Re:Don't we already use this? (Score:2)
You enter the numbers the website produces into it, and enter the result back into your computer manually.
The devices are freely available from any of their offices by just producing a bankcard just in case you lost or forgot yours (and yeah, that means having to goto the bank indeed, but you get it inmediately when there)
Think such a setup solv
Um, no! (Score:2)
Why don't you suggest we submit punched card batch job requests for bank transactions?
Sheesh.
Re:Check authentication (Score:2)
Banks have to makes the funds available, on a provisional basis, within as short as one business day
Many folks, especially on Ebay, get burnt that way
Re:Check authentication (Score:2)
Foreign checks are a whole different matter completely
Ron
Re:New Zealand banks using SMS (Score:2)
With that said, with a minor adjustment, such a scheme can be made very secure by having SMS be the *final step*.
Example
1. Customer logs in as usual.
2. Performs transactions, etc.
3. Customer logs out.
4. Customer is notified via SMS, only after being logged out (will thwart most all man-in-middle attacks), that transactions have been performed and th
Re:X.509 Certificates (Score:2)