Download presentation
Presentation is loading. Please wait.
1
Verified by Visa and MasterCard SecureCode – or, How Not to Design Authentication Steven Murdoch and Ross Anderson Cambridge
2
Single Sign-on Systems Since mid-80s, we’ve seen products that let you use one password for multiple systems What do you think is the most successful single sign-on system ever? –Microsoft Passport / InfoCard? –OpenID? –Liberty Alliance? Actually, it’s none of these…
3
3-D Secure Branded as “Verified by Visa” and “MasterCard SecureCode”; hereinafter 3DS Lets you use a password with your credit card to pay at many merchant websites Like Passport, OpenID etc, it redirects you to a central login service It was the card industry’s answer to a big rise in card-not-present (CNP) fraud that followed the introduction of the Europay-Mastercard-VISA (EMV) smartcard payment system
4
Fraud in the UK since EMV
5
How 3DS Works Customer presents card to merchant Merchant passes card number to its bank (the acquirer) who supplies a URL for logon The URL is often to a third-party service such as RSA The logon page was originally presented as popup Because of popup blockers, the standard now recommends that the merchant embeds it in an iframe
6
User Interface (1)
7
User Interface (2)
8
How 3DS Works (2) If successful, auth code is returned for merchant using TLS and client certificate Similar systems are being introduced (or are planned) for more and more payment systems –VISA original credits –Single European Payment Area (SEPA) e-Mandates The latter will replace cheques in Europe! So how secure is all this?
9
Technical Security (1) Implementation is left to individual banks and their contractors Some make truly shocking choices – like reusing ATM PINs as online 3DS passwords Best practice is to authenticate the bank too – with a memorable phrase from the customer But this is still open to man-in-the-middle attack So we’re now seeing a variety of phishing attacks
10
Phishing (1)
11
Technical Security (2) Banks should mail out passwords – but to save money most do Activation During Shopping (ADS) So a merchant website suddenly enrols you! Weak auth – e.g. date of birth (Bank of Scotland) Banks are not supposed to compel registration until after three transactions, but many ignore this Also, if you forget your password, many banks just rerun the enrolment protocol All this also gets used in phishing …
12
Phishing (2)
13
Security Usability Users should only enter bank credentials at bank URL to which they have navigated (or at least which they’ve checked) Our industry introduced cues such as extended validation certs and browser toolbar colour The banking industry via 3DS has trashed this completely! Our first encounter with securesuite.co.uk So why should the computer industry be helpful to the banks in future?
14
Privacy SET gave the bank and the merchant only the data they needed; InfoCard prevents profiling at all 3DS collects full transaction data And it’s mostly run by contractors like RSA who accumulate huge databases of transactions We might then worry about FBI national security letters, spear phishing, corrupt employees... Will there be a big bust-up as with SWIFT?
15
Security Economics 3DS is easily the worst secure signon protocol ever; why did it succeed? –Merchants are no longer as liable for transactions they push through 3DS –Users lose statutory protection of signatures; typical contract says customer liable for all uses While InfoCard and OpenID had good engineering but no incentives for adoption, 3DS had bad engineering but strong incentives
16
Policy 3DS is abusive – customers get little or no protection but a huge increase in liability What’s needed is transaction authentication – e.g. modify 3DS to include SMS, Cronto (Commerzbank, Germany) or CAP interaction (Ogone, Belgium) Regulation: at present, a liability shift is allowed under Europe’s e-signature directive if the customer has a secure signature creation device The missing word is “only”!
17
Conclusions Single sign-on provides a telling case study in security engineering Previous offerings like OpenID and InfoCard got the engineering right but the economics wrong 3D Secure got the engineering wrong but the economics ‘right’ (at least for the banks) It’s the one that succeeded The outcome is abusive to customers (and merchants hate it too). Regulators ought to fix it It contributes to growing systemic risk (recall the hassles of registering and booking!)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.