[36021] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards

daemon@ATHENA.MIT.EDU (Kevin Sheldrake)
Sat Aug 7 08:56:04 2004

To: "Lee Dilkie" <lee_dilkie@mitel.com>,
        "Toomas Soome" <Toomas.Soome@microlink.ee>
Cc: bugtraq@securityfocus.com
Message-ID: <opsca599dbyl48zk@wintony>
Date: Fri, 06 Aug 2004 12:31:11 +0100
From: "Kevin Sheldrake" <kev@electriccat.co.uk>
Content-Type: text/plain; format=flowed; delsp=yes; charset=utf-8
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
In-Reply-To: <41123007.8080805@mitel.com>

Not unless the card is stolen and the owner either doesn't notice  
immediately or doesn't report it immediately.  How many people will turn  
up at work (for instance) claiming to have 'forgotton' their card rather  
than report it lost, on the off chance they have actually misplaced it?   
If the keys give access to money, reputation, authority or the like then  
perhaps the size of the exposure window is important?

Kev


> Perhaps I'm missing something here. As far as I can tell, no keys  
> located on the card were compromised, only the PIN was. Since this is a  
> two factor authentication system, possession of the PIN is of little  
> value without possession of the token itself.
>
> Am I missing the point here?
>
> regards,
>
> -lee
>



-- 
Kevin Sheldrake MEng MIEE CEng CISSP
Electric Cat (Bournemouth) Ltd

home help back first fref pref prev next nref lref last post