FV Demonstrates Fatal Flaw in Software Encryption of Credit Cards

Jeff Weinstein jsw at netscape.com
Tue Jan 30 12:09:19 PST 1996


Nathaniel Borenstein wrote:
> This is wrong on two main counts:  the ID's are harder to find than
> credit cards, and they're not as directly useful as credit cards.  These
> two facts combine to make the attack more or less irrelevant to FV.
> 
> First of all, the Virtual PIN (FV-ID) is much harder to extract from a
> large data stream because it is arbitrary text, unlike credit card
> numbers, which are self-identifying.
> 
> Second, a Virtual PIN is not a one-way payment instrument, like a credit
> card.  To use FV to buy something on your credit card, you need to
> combine the theft of a Virtual PIN with the compromise of the buyer's
> email account, for confirming transactions.  We all know this can be
> done -- we actually even spell out how to do it in our paper, "Perils
> and Pitfalls of Practical CyberCommerce" -- but it is very hard to
> combine these steps on the large scale that would be needed to mount an
> automated attack, which is the most serious threat to the credit card
> system.

  It would not be much harder than the demonstrated keyboard attack
to create a hacked version of winsock that would implement an
attack against First Virtual.  If the attacker had a list of web
pages that accept FV payments it would be very easy to collect
the ID numbers.  There is no need to attack the large datastream
of keyboard input when the search can be easily narrowed.  Since
FV doesn't use encryption the attack could easily be implemented
in winsock, making it independent of any client software.  A version
that infected the win95 IP stack could be quite effective.  The list
of FV accepting sites would be easily obtainable via a query of
altavista.  Since the infected system is on the internet and has
to periodically send its results to the attacker, it could download
an updated list of FV pages at the same time.  

  Attacking the e-mail verification step of the FV system could also
be accomplished via a hacked winsock.  A bit of POP3 aware code
in the winsock could intercept the verification messages and keep
the e-mail client from ever seeing them.  It could automatically
generate "Yes" responses for all such messages.

  I believe that FV is just as vulnerable to these types of
attacks as any of the encryption based credit card schemes, if
not more so.  The thing that really protects FV is that it can
only be used to buy bit, not real goods, and the bad guys don't
generally care about stealing bits.  This is also what makes FV
not generally useful to people who want to shop over the internet.

	--Jeff

-- 
Jeff Weinstein - Electronic Munitions Specialist
Netscape Communication Corporation
jsw at netscape.com - http://home.netscape.com/people/jsw
Any opinions expressed above are mine.






More information about the cypherpunks-legacy mailing list