[VoiceOps] SMS receive security

Lee Riemer lriemer at bestline.net
Thu Dec 10 11:58:20 EST 2009


Or your phone ends up in the wrong hands.

On 12/10/2009 10:53 AM, Peter Beckman wrote:
> On Wed, 9 Dec 2009, nick hatch wrote:
>
>> Hi all,
>>
>> Reading the last thread on why SMS isn't/should be dead, I almost 
>> piped up
>> with a thought before I realized I should probably check my 
>> head-sphincter
>> interface, first.
>>
>> Many banks use SMS messages as an out-of-band authentication factor for
>> online banking. (ie, they send a challenge code to the customers 
>> phone in
>> response to an online banking request) If one assumes that cell phone 
>> SMS
>> messages can't be intercepted out of the air by a forged device or 
>> through
>> other means, they operate as a quasi-physical authentication factor, 
>> which
>> is very valuable.
>>
>> This would be a strong use case for SMS over email or other 
>> general-purpose
>> communication mediums where the password or other knowledge can be
>> bootstrapped into access to the medium.
>>
>> However, I'm not so sure this assumption is correct. Does anyone have 
>> good
>> references for the security of SMS? The most I've been able to find 
>> is this
>> Slashdot article [1].
>>
>> -Nick
>>
>> [1] http://it.slashdot.org/article.pl?sid=09/05/21/1858233
>
>  Is SMS secure?  No.  But SMS is useful for an OTP (One Time Password) 
> such
>  as the banking industry is using.
>
>  SMS is not secure, in any way.  Unless the banks have spent the tens, if
>  not hundreds, of thousands of dollars to directly connect with private
>  non-Internet lines directly to the carriers, or has an encrypted tunnel
>  between their operations and their aggregator, the SMS messages still go
>  over the Internet to an aggregator (mQube, Mobile 365 (now Sybase 365)).
>  During that process it is possible to sniff that information.
>
>  It is also possible that any company involved in the delivery of that 
> SMS
>  is somehow comprimised or able to be, at which point the SMS can be 
> read.
>  Unless the SMS message is wrapped into a cryptographic tunnel between
>  endpoints, SMS must be assumed to be insecure.
>
>  The SMS is also delivered over the air, which means it can be 
> intercepted.
>  I know that there is some sort of authentication between the phone 
> and the
>  tower, but since SMS is part of informational messages sent between the
>  tower and the phone, it may not be encrypted, and may be easily sniffed.
>  If you know where the user and their phone is, and they left 
> bluetooth on,
>  you could, in theory, silence the phone, go to the bank, log in, send 
> the
>  OTP to the phone, sniff it, enter it, then delete (via bluetooth) the 
> SMS
>  from the phone, removing any trace indicating to the user that their 
> bank
>  account has just been hacked.
>
>  But with OTP, insecure is OK for banks it seems.
>
>  Annoying thing about OTP -- if you use a 3rd party service like Mint.com
>  or PayTrust.com to fetch your eBills, turning on OTP kills those very
>  useful services.
>
> Beckman
> --------------------------------------------------------------------------- 
>
> Peter Beckman                                                  
> Internet Guy
> beckman at angryox.com                                 
> http://www.angryox.com/
> ---------------------------------------------------------------------------
>
>
> _______________________________________________
> VoiceOps mailing list
> VoiceOps at voiceops.org
> https://puck.nether.net/mailman/listinfo/voiceops
>    
>
>
> _______________________________________________
> VoiceOps mailing list
> VoiceOps at voiceops.org
> https://puck.nether.net/mailman/listinfo/voiceops
>    
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/voiceops/attachments/20091210/ad9a5d2e/attachment.html>


More information about the VoiceOps mailing list