Educause Security Discussion mailing list archives

Re: Implementing a Public Key Infrastructure


From: Valdis Kletnieks <Valdis.Kletnieks () VT EDU>
Date: Mon, 20 Feb 2006 13:43:27 -0500

On Mon, 20 Feb 2006 10:01:12 PST, "Cary, Kim" said:

In response to submitting your userid you are shown two tokens on the
resulting password input page:
1) A picture you chose from their set of pictures.
2) A phrase you previously input describing the picture.
They tell you not to put in your password unless you see the picture and
phrase you were expecting.

So, if someone is phish-ing, they have to guess my ID, snarf & load my
tokens into the phishing site in order to properly impersonate the site.

The first part is easily enumerable - all they have to do is set up a
throw-away account once.  It's probably pretty easy to guess likely
phrases - if the picture consists of 2 donkeys and a giraffe, likely guesses
are "giraffe and donkeys", "donkeys and giraffe", "horses and giraffe", and
"giraffe and zebras" (some users are dense and/or weird.. ;)

Then spamming out several *million* copies with different pictures and
phrases, they're likely to get at least *a few* right..

The only way this actually *protects* against phishing (rather than just making
it a bit harder) is if there is a clear way for customers to report a suspected
phish, and action is taken fast enough to get it closed down before a correct
random combo of picture and phrase land with a user that falls for it.

Of course, the *next* tactic will be including a "report a phish" link in
the e-mail, which goes to a page that purportedly reports a phish, but in
fact is a phish itself... ;)

Attachment: _bin
Description:


Current thread: