London Transport (uk.transport.london) Discussion of all forms of transport in London.

Reply
 
LinkBack Thread Tools Search this Thread Display Modes
  #31   Report Post  
Old November 20th 03, 06:08 PM posted to uk.transport.london
external usenet poster
 
First recorded activity at LondonBanter: Aug 2003
Posts: 5
Default Security of Oyster Cards

(Gareth Davis) wrote in message . com...
(sandy) wrote in message . com...

I leave the station and decide to take a bus. It's a DOO bus so it
has a card reader by the driver. I blip the card onto the reader, it
lights up green, the driver acknowledges the fare and I make my
journey. I go into another tube station to check what has happened on
the card's journey history; bus fare deducted 1p, balance £2.49. I
did the same again later that evening from my local tube station to
home so the first journey was clearly not an isolated incident. This
happened about a week ago and checking the journey history yesterday
indicates that LU haven't adjusted the balance on the card to deduct
the bus fares at their proper amount.


This is very worrying. If there isn't sufficent audit carried out to
spot this problem then they have not got a hope in hell of spotting
hacked Oyster cards. Automated processes should be trawling through
the reader events every day and flagging any cards with suspect
transactions. This will reduce the life of any hacked card to less
than 24 hours. The longer the period is between the checks then the
longer the period that a hacked card will be useful for. Apparently
this stands at one week and rising.

At least it is taking some money off of you though, which was better
than the older magnetic ticketing system which would under certain
circumstances open the barriers when fed an expired travelcard (I jest
not - Google has the details). Nice to see that Cubic have produced
another quality system with our millions.



I think that this isn't a security fault as such, but rather a
bug/"feature" of a system that hasn't become fully operational yet. I
do wonder why the bus oyster readers simply aren't set up to reject
prepay cards as the tube gate readers are.

--
-sandy

  #32   Report Post  
Old November 20th 03, 11:23 PM posted to uk.transport.london
external usenet poster
 
First recorded activity at LondonBanter: Nov 2003
Posts: 15
Default Security of Oyster Cards

(sandy) wrote in message . com...
(Gareth Davis) wrote in message . com...
(sandy) wrote in message . com...

I leave the station and decide to take a bus. It's a DOO bus so it
has a card reader by the driver. I blip the card onto the reader, it
lights up green, the driver acknowledges the fare and I make my
journey. I go into another tube station to check what has happened on
the card's journey history; bus fare deducted 1p, balance £2.49. I
did the same again later that evening from my local tube station to
home so the first journey was clearly not an isolated incident. This
happened about a week ago and checking the journey history yesterday
indicates that LU haven't adjusted the balance on the card to deduct
the bus fares at their proper amount.


This is very worrying. If there isn't sufficent audit carried out to
spot this problem then they have not got a hope in hell of spotting
hacked Oyster cards. Automated processes should be trawling through
the reader events every day and flagging any cards with suspect
transactions. This will reduce the life of any hacked card to less
than 24 hours. The longer the period is between the checks then the
longer the period that a hacked card will be useful for. Apparently
this stands at one week and rising.

At least it is taking some money off of you though, which was better
than the older magnetic ticketing system which would under certain
circumstances open the barriers when fed an expired travelcard (I jest
not - Google has the details). Nice to see that Cubic have produced
another quality system with our millions.



I think that this isn't a security fault as such, but rather a
bug/"feature" of a system that hasn't become fully operational yet. I
do wonder why the bus oyster readers simply aren't set up to reject
prepay cards as the tube gate readers are.


You managed to make a journeys costing less than the minimum bus fare.
The SQL query against the database of card usage to report events like
that is trivial and given sufficently powered servers hosting the
database should be completed in a very short time frame (i.e. minutes
if not seconds) using data from the previous days card transactions.
The fact that simple (in programming terms) audits are not happening
suggests that the more complex stuff matching journeys with ticket
validity is also not happening. This does not bode well for the
future.

The more the MiFare cards are rolled out round the world then the
higher the return to be made from cracking them. Or to put it into
perspective, I think it is fair to say that more people will soon be
using the MiFare system each day in London alone than used the pay TV
system of ITV digital whose smart cards were hacked at great expense
(to the hackers).

I have not seen any evidence to suggest MiFare is (currently) insecure
but you always need more than one level of security, if not to guard
against malicious hacking then to guard against a cock up such as
setting a 1p fare for a bus journey when the minimum bus fare is 70p
(or 65p? with saver tickets).

--
Gareth Davis

  #33   Report Post  
Old November 21st 03, 05:11 AM posted to uk.transport.london,alt.2600,sci.crypt
external usenet poster
 
First recorded activity at LondonBanter: Nov 2003
Posts: 2
Default Security of Oyster Cards

Richard J. wrote

Peter Fairbrother wrote:
Oyster cards have a few unexpected security risks - people tend to
keep them in their wallets, and take their wallets out of their
pockets to wave over the reader. Gives pickpockets a chance to eye up
the wallet, and learn where its owner keeps it, and it gives thugs
the chance/ inspiration to grab the wallet and run.


Unexpected? Why is that any different from the situation with old-style
mag-stripe season tickets? Are you suggesting that people who keep their
Oyster in their wallet didn't keep their old season tickets there?


To quote RP on another list:

"However, you still have to get your wallet out, as the range is
reportedly not enough otherwise. I'd rather *not* take my wallet out in
a place like Kings Cross, and so I always keep my paper ticket in the
breast pocket of my shirt - where it's really easy to take out and use."

Personally, I keep them in my left trousers back pocket.


--
Peter Fairbrother

  #34   Report Post  
Old November 21st 03, 09:56 AM posted to uk.transport.london
external usenet poster
 
First recorded activity at LondonBanter: Nov 2003
Posts: 1
Default Security of Oyster Cards

Gareth Davis wrote:

The more the MiFare cards are rolled out round the world then the
higher the return to be made from cracking them. Or to put it into
perspective, I think it is fair to say that more people will soon be
using the MiFare system each day in London alone than used the pay TV
system of ITV digital whose smart cards were hacked at great expense
(to the hackers).


The smartcard/encryption used by ITV digital was the SECA system developed
by CANAL+ and used widely throughout Europe on other pay-TV networks. Far
more people than the 1.1 million ITV digital subscribers stood to be able to
benefit from the system being cracked.

  #35   Report Post  
Old November 21st 03, 11:41 AM posted to uk.transport.london
external usenet poster
 
First recorded activity at LondonBanter: Jul 2003
Posts: 676
Default Security of Oyster Cards

Martin Rich typed

There aren't any BT phonecards (at least in the sense of cards that
you load value onto and put in a public phone) any more. However the
first generation of BT phone cards were reputed to be very easy to
hack - this sounds like why


Aren't there?

What became of 'phonecard plus'?

--
Helen D. Vecht:
Edgware.


  #36   Report Post  
Old November 21st 03, 02:21 PM posted to uk.transport.london,alt.2600,sci.crypt
external usenet poster
 
First recorded activity at LondonBanter: Jul 2003
Posts: 1,346
Default Security of Oyster Cards

"Ernst Lippe" wrote in message ...
Even though there are some possible attacks, in general it is very
difficult to extract those keys from the smart card.


No it isn't. You rip the lid off the chip and put the EEPROM under
a special microscope. I forget the actual technique used but its been done.
Admittedly its way out of the league of your one man operation but don't
think that professional fraud gangs arn't able to do it.

Companies always expect the software attack but they never think of the
hardware attack. If you can physcally read the transister/capacitor values
then you can get the data out and given that the memory in most of these
cards is only a few kilobytes this wouldn't take too long. Even encrypting
the data is a waste of time since even if you the fraudster doesn't understand
what he's seeing he can still make an exact copies of it onto operationally
identical hardware (ie duplicate the cards).

Of course whether a duplicated card or any data extracted from it is any
use is another question.

B2003
  #38   Report Post  
Old November 21st 03, 09:17 PM posted to uk.transport.london
external usenet poster
 
First recorded activity at LondonBanter: Aug 2003
Posts: 141
Default Security of Oyster Cards

On Fri, 21 Nov 2003 12:41:45 GMT, Helen Deborah Vecht
wrote:

Martin Rich typed

There aren't any BT phonecards (at least in the sense of cards that
you load value onto and put in a public phone) any more. However the
first generation of BT phone cards were reputed to be very easy to
hack - this sounds like why


Aren't there?

What became of 'phonecard plus'?


My source is http://www.payphones.bt.com/2001/pho...s/prepaid.html
- this does talk about various dates in April and Septamber 2003 in
the future tense, so it may not be completely authoritative (if you
see what I mean)

Martin
  #39   Report Post  
Old November 22nd 03, 09:09 AM posted to uk.transport.london
external usenet poster
 
First recorded activity at LondonBanter: Nov 2003
Posts: 37
Default Security of Oyster Cards

On Wed, 19 Nov 2003 05:49:38 +0000, Peter Fairbrother
wrote:

Oyster cards have a few unexpected security risks - people tend to keep them
in their wallets, and take their wallets out of their pockets to wave over
the reader. Gives pickpockets a chance to eye up the wallet, and learn where
its owner keeps it, and it gives thugs the chance/ inspiration to grab the
wallet and run.


Well, I keep mine in the cardholder that came with it. It's exactly the same
as the Travelcard holder except for different colours and the Oyster logos. My
wallet stays in my trousers, where it belongs.

The privacy implications aren't good either. All card usage is tracked
offline, to prevent use by multiple people, and usage records stored for
that purpose. The Police etc can ask for them (and may soon become able to
demand them, but that's another story) and use them to track your movements.


This may be a difficulty. With Blunkett wanting to keep an eye on us 24 hours
a day, we may have to call the Government on this one.

The card itself keeps a record of the last three trips, I'm told.

I wonder if, under freedom of information rules, we might be able to demand a
record of what information TfL has on where we've been.
--
Chris Hansen | chrishansenhome at btinternet dot com
  #40   Report Post  
Old November 22nd 03, 10:10 AM posted to uk.transport.london
external usenet poster
 
First recorded activity at LondonBanter: Jul 2003
Posts: 144
Default Security of Oyster Cards

On Sat, 22 Nov 2003 10:09:09 +0000 (UTC), Christian Hansen
wrote:

On Wed, 19 Nov 2003 05:49:38 +0000, Peter Fairbrother
wrote:

Oyster cards have a few unexpected security risks - people tend to keep them
in their wallets, and take their wallets out of their pockets to wave over
the reader. Gives pickpockets a chance to eye up the wallet, and learn where
its owner keeps it, and it gives thugs the chance/ inspiration to grab the
wallet and run.


Well, I keep mine in the cardholder that came with it. It's exactly the same
as the Travelcard holder except for different colours and the Oyster logos. My
wallet stays in my trousers, where it belongs.

The privacy implications aren't good either. All card usage is tracked
offline, to prevent use by multiple people, and usage records stored for
that purpose. The Police etc can ask for them (and may soon become able to
demand them, but that's another story) and use them to track your movements.


This may be a difficulty. With Blunkett wanting to keep an eye on us 24 hours
a day, we may have to call the Government on this one.

The card itself keeps a record of the last three trips, I'm told.

I wonder if, under freedom of information rules, we might be able to demand a
record of what information TfL has on where we've been.


The card has more than the last three trips. Have a look on the touch
screen machines at Tube stations (have a look on the 'View Oyster Card
Usage')(

Try the Data Protection Act. Yes, I'm pretty sure you'd be entitled to
a record of details held by TfL. Why not check with them?


Rob.
--
rob at robertwoolley dot co dot uk


Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Oyster Cards damaged by proximity door entry cards neill London Transport 5 March 24th 12 06:28 PM
Oyster and the b***y security question!! jedy London Transport 0 October 28th 09 11:45 AM
New National Security Technology ignored that might have stopped the bombing Scott Anderson London Transport 3 July 7th 05 05:50 PM
removing staff? What happens to security? CharlesPottins London Transport 12 July 3rd 04 10:16 AM
How do you enter your security answer on the Oyster Sales site? TheOneKEA London Transport 5 January 25th 04 05:46 PM


All times are GMT. The time now is 10:29 AM.

Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 London Banter.
The comments are property of their posters.
 

About Us

"It's about London Transport"

 

Copyright © 2017