Category Archives: Security

PCI DSS drops ATM fraud 90% in Nigeria

At the RSA Conference in 2009 I presented “Top Threats to Personally Identifiable Information” for SafeNet where I attempted to prove from breach data that PCI DSS was having a tangible positive effect. My charts illustrated that despite breaches overall in a rise a filter for PCI DSS revealed a decline for industries adopting prescriptive compliance controls.

It was a tough illustration because of so many moving parts and the quality of data. My prediction that overall breaches would go down, because they already were going down in specific areas, was fun to try and prove. Yet everyone seemed to ask for more data on the biggest breaches instead of analysis of the overall trends. That is how my following presentations turned into the popular series called “Top 10 Breaches“.

Well, that’s not entirely the case. Each time I ran into Robert Hanson (RSnake) he asked for updates on the overall breach trend analysis. He kept reminding me that more people needed to see my contrariness. So credit goes to him for encouraging me to update the analysis and data for a presentation called “Message in a Bottle” for MetriCon. Unfortunately the Metricon presentation did not happen. It feels like it might be time to dust it off. This week I ran into an interesting update from Nigeria.

The Central Bank of Nigeria (CBN) announced six months ago that it was increasing compliance controls based on PCI DSS to combat financial fraud

…due to the failure of the nation’s banks to obey the CBN’s ATM regulatory framework and ensure compliance with these rules the apex bank rolled out penalties for non compliance with Payment Card Industry Data Security Standards (PCIDSS)

Modest fines were linked to the presence of audit trails and timeliness of response

…an ATM deployer would be made to refund the full amount involved in any fraud perpetrated on its ATM for failure to provide video recordings on the disputed transaction when required.

It pointed out that failure to respond to the customer or to the CBN on ATM complaints within 72 hours would attract a fine of N50, 000 [USD$300] per day for each complaint after the 72 hours until the response is received, adding that failure to resolve any ATM dispute with evidence of resolution within 14 days, would result in the deployer refunding the total amount involved in the fraud.

Similarly, the CBN stated that non-compliance with migration to EMV after September 30, 2010, will attract a fine of N50, 000 and the issuer will bear full liability for any fraud perpetrated with the magnetic-stripe card, adding that failure to provide audit trails and journals for ATM transactions would attract a fine of N50, 000 per week.

It further stated that for non-compliance with Payment Card Industry Data Security Standards (PCIDSS), a fine of N50, 000 per week will apply to the defaulter until compliance is established. It, however, said that non-compliance of ATM terminals with EMV levels 1 and 2, would attract a fine of N50, 000 and temporary suspension of the affected terminal unit until compliance is established.

Then, just this past week, the CBN reported that its compliance program has had a dramatic effect on ATM fraud

The Central Bank of Nigeria has said that the banking sector was on the way to recovery as banks Automated Teller Machine (ATM) frauds reduced by 90 per cent.

The governor of the apex bank and chairman, Steering Committee on Financial System Strategy 2020(FSS2020), Mallam Sanusi Lamido Sanusi, made this known on Wednesday in Abuja at the opening of the Strategy Execution Master Class of the FSS 2020.

In the banking sector, he said there had been a drastic drop in the level of non-performing loans adding that there had been structured growth of banks in the areas of capitalisation, capital adequacy and liquidity ratio.

They have not yet released data points to support this news. I am a skeptical believer and wonder how such a profound change can be extrapolated to the future from such a short time. It was announced with a suspicious amount of confidence. There must be more to the story than meets the eye. I can’t wait to see the numbers and roll them to the global data I collect for analysis of the trends and effects of compliance.

Encapsulation Risk and VXLAN

It has been nearly 20 years since VLANs were introduced. A move to make them virtual with VXLAN (Virtual Extensible VLAN) is now generating some interesting threads of resistance. A thread by Ken Duda tries to tease out architecture concerns.

Denton: the simple way to think about VXLAN is that each neighbor VTEP [VXLAN Tunnel End Point] is like a switchport (bridging endpoint) and ordinary 802.1d MAC learning/aging/unknown-DA-flooding applies, where IP multicast takes the place of LAN broadcast. So, when some endstation moves, the next time they send a broadcast or send a unicast to you, you say to yourself, “gee, I didn’t expect to see that (segment, MAC address) come from that VTEP IP source address,” and then you update your MAC table accordingly. Just like ordinary layer 2 bridging. Likewise with VRRP [Virtual Router Redundancy Protocol] — if the new VRRP active router sends gratuitous ARP requests (as per the VRRP spec), then these ARPs are delivered via VXLAN-encapsulated IP multicast to all VTEP’s (that carry the router interface’s segment and thus subscribed to the IP multicast group), and they all then update the router’s MAC address in their MAC tables accordingly.

Encapsulation of MAC in IP might seem scary and more prone to hijack, but then again encapsulation logically follows computers inside computers.

The question should not be whether we can get old tools to handle all change. That’s always a risk of progress and it can be a good problem to have — market for new tools.

Given that tools evolve a question also then is not whether we lose the ability to see inside (encapsulated does not have to mean opaque/crypto), but whether encapsulated assets can be given controls as secure/robust as their wrapper.

To this end, Denton Gentry has written up a nicely illustrated follow-up to the thread started by Ken.

VXLAN
The encapsulated packet retains its Inner MAC header and optional Inner VLAN, but has no Inner CRC. When VMs send packets to other VMs within a server they do not calculate a CRC, one is added by a physical NIC when the packet leaves the server. As the VTEP is a software component within the server, prior to hitting any NIC, the frames have no CRC when the VTEP gets them. Therefore there is no integrity protection end to end, from the originating VM to receiving. This is another case where even on L2 networks, the Ethernet CRC does not work the way our intuition would suggest.

CVE-2011-2894: Spring Serial Vulnerability

Example from Springsource, as explained by Wouter Coekaerts, showing why clients should not be trusted.

Affected: Applications that have Spring AOP on the classpath and deserialize a stream from an untrusted source
Result: Arbitrary code execution

Short version: The problem is that the JdkDynamicAopProxy, DefaultListableBeanFactory and some other Spring classes are Serializable and can be configured to execute arbitrary code when the application uses these deserialized objects.

[…]

The vulnerability has been fixed in Spring by making it impossible to deserialize a DefaultListableBeanFactory except through the SerializedBeanFactoryReference. And the id used by the SerializedBeanFactoryReference has been made easier to configure because it should not be predictable by a client.

Springsource has the announcement of the CVE posted but the NIST site gives only this error:

ERROR, “CVE-2011-2894” is valid CVE format, but CVE was not found.

LSE Report on Cycling Benefits

As I mentioned a few months ago, I attended the London School of Economics in the early 1990s and commuted every day by bicycle from outside of Greenwich to the Strand, about 10 miles each way.

No matter rain or shine, light or dark, I was pushing the pedals like a Victorian only 100 years late to the party. It was great fun although I was almost always the only cyclist on the road. In fact, come to think of it, I never saw another cyclist on the road back then, not even as I flew along with traffic above the banks of the Thames.

Crossing Tower Bridge in the rain at night on smooth metal grates in-between thundering lorries and at their speed is just one of the risks I learned to manage with skill and experience.

However, after six months I had to cut back and eventually stop riding due to the effects of harsh pollution on my lungs. The unregulated diesel fumes and particulates caused permanent damage and created the feeling of almost constant illness — a risk for which I tried but was unable to find any workaround. My GP literally told me to stop riding so far and so often because the London air was poisonous.

It is therefore amusing to me to read the brand new LSE report on the benefits of cycling that claims it can reduce illness.

Dr Alexander Grous of LSE’s Department of Management calculated a “Gross Cycling Product” by taking into account factors such as bicycle manufacturing, cycle and accessory retail and cycle related employment
[…]

  • Cycling to work is associated with less all-cause sickness absence. Mean absenteeism in cyclists is significantly lower than in non-cyclists with a significant relationship between frequent cycling and absenteeism, with regular cyclists taking 7.4 sick days per annum, compared to 8.7 sick days for non-cyclists
  • Frequent cyclists save the economy £128 million in absenteeism per year, projected to save a further £1.6 billion in absenteeism over the next 10 years
  • Compared with the rest of Europe, the UK has the highest number of sick days taken each year, with 225 million days estimated to have been taken in 2010 at a cost of £17 billion. This equates to around £600 per employee per annum, and an average of 7.7 days per person

I get the impression the report writers are not long-term cyclists as they leave out numerous other benefits. They definitely don’t read this blog. Even worse than the omission of the effects of pollution on cyclists is the omission of cycling benefits as a zero-emission transportation option. They also omit the benefits of social networking, as I’ve written about before in regard to an English propaganda movie. And the report omits the resilience of cyclists to natural disasters, as documented after the Japanese Tsunami; bicycles work without fuel supplies, fair roads, electric grids…they are the most effective form of transportation for national security and resilience to infrastructure failure.

It’s great to see cycling catch on in England but perhaps the greatest point of all is that England was full of cyclists after WWII for the reasons I mention above. Their decision to follow the US model of the automobile was a huge mistake if you run the numbers.

Thus, I find the LSE report a great start but embarrassingly weak analysis. Can they really directly attribute better health to cycling or is it just a correlation related to an overall lifestyle or even culture (e.g people who buy bikes already are healthy)? I would have added a long list of direct health and security benefits to the LSE report from cycling (e.g. zero emissions) to the gross product as well as call out the massive losses and costs since the decline of the last English cycling boom in the 1940s. Finally, I might even have tried to explain why cycling fell out of style.