Track Layouts On ATM Cards


SUBMITTED BY: Biohazard

DATE: Sept. 6, 2015, 2:11 a.m.

FORMAT: Text only

SIZE: 21.1 kB

HITS: 311

  1. *************** Track Layouts ************************
  2. This is off the top of my head, but is 99% there. Also I'll ignore
  3. some obsolete stuff.
  4. The physical layout of the cards are standard. The LOGICAL makeup
  5. varies from institution to institution. There are some generally
  6. followed layouts, but not mandatory.
  7. There are actually up to three tracks on a card.
  8. Track 1 was designed for airline use. It contains your name and
  9. usually your account number. This is the track that is used when
  10. the ATM greets you by name. There are some glitches in how things
  11. are ordered so occasionally you do get "Greetings Bill Smith Dr."
  12. but such is life. This track is also used with the new airline
  13. auto check in (PSA, American, etc)
  14. Track 3 is the "OFF-LINE" ATM track. It contains such nifty
  15. information as your daily limit, limit left, last access, account
  16. number, and expiration date. (And usually anything I describe in track
  17. 2). The ATM itself could have the ability to rewrite this track to
  18. update information.
  19. Track 2 is the main operational track for online use. The first thing
  20. on track to is the PRIMARY ACCOUNT NUMBER (PAN). This is pretty
  21. standard for all cards, though no guarantee. Some additional info
  22. might be on the card such as expiration date. One interesting item
  23. is the PIN offset. When an ATM verifies a PIN locally, it usually
  24. uses an encryption scheme involving the PAN and a secret KEY.
  25. This gives you a "NATURAL PIN" (i.e. when they mail you your pin, this
  26. is how it got generated.) If you want to select your own PIN, they
  27. would put the PIN OFFSET in the clear on the card. Just do modulo 10
  28. arithmetic on the Natural PIN plus the offset, and you have the
  29. selected PIN. YOUR PIN IS NEVER IN THE CLEAR ON YOUR CARD. Knowing
  30. the PIN OFFSET will not give you the PIN. This will required the
  31. SECRET KEY.
  32. Hope that answers your question
  33. ************ Deposits at ATMs ************************
  34. Deposits on ATM:
  35. Various banks have various systems. As an example, at CITIbank
  36. a deposit was made to a specific account. Your account was updated
  37. with a MEMO update, i.e. it would show up on your balance. However
  38. it did not become AVAILABLE funds until it was verified by a teller.
  39. On the envelope was Customer ID number, the envelope number and
  40. the Entered dollar amount, the branch # and the Machine #.
  41. There was also a selection for OTHER PAYMENTS. This allowed you to
  42. dump any deposit into the ATM.
  43. What are you assured then when you deposit to an ATM ?
  44. 1) You have a banking RECORD (not a reciept at Citibank). If you
  45. have this record, there is a VERY high percentage that you
  46. deposited something at that ATM.
  47. 2) Some banks have ways of crediting your deposit RIGHT NOW.
  48. This could be done by a balance in another account (i.e. a long
  49. term C.D. or a line of credit.) That way they can get you if
  50. you lied.
  51. ************** ATM Splitting a Card in half ***************
  52. I've worked with about 75% of the types of machines on the market
  53. and NONE of them split a card in half upon swallow. However, some
  54. NETWORKS have a policy of slicing a card to avoid security
  55. problems.
  56. Trusting an ATM.
  57. Intresting you should bring this up, I'm just brusing up a paper
  58. describing a REAL situation where your card and PIN are in the clear.
  59. This involves a customer using a bank that is part of a network.
  60. All the information was available to folks in DP, if they put in some
  61. efforts to get it.
  62. Mis-Implementation of an ATM PIN security system
  63. 1. Synopsis
  64. In an EFT (Electronic Funds Transfer) network, a single node which does
  65. not implement the proper security can have effects throughout the
  66. network. In this paper, the author describes an example of how security
  67. features were ignored, never-implemented, and/or incorrectly designed.
  68. The human factors involved in the final implementation are explored by
  69. showing several major vulnerabilites caused by a Savings and Loan and a
  70. regional EFT network's lack of vigilance in installing an EFT network
  71. node. While using an EFT system as an example, the concepts can be
  72. extrapolated into the implementation of other secured systems.
  73. 2. Background
  74. A small Savings and Loan was setting up a small (10 to 16 ATMs)
  75. proprietary Automatic Teller Machine (ATM) network. This network was
  76. then intended to link up to a regional network. The manufacturer of the
  77. institution's online banking processor sent an on-site programmer to
  78. develop the required interfaces.
  79. An ATM network consists of three main parts. The first is the ATM
  80. itself. An ATM can have a range of intelligence. In this case the ATM
  81. was able to decode a PIN (Personal Identification Number) using an
  82. institution supplied DES (Data Encryption Standard) key. It was then
  83. required to send a request for funds to the host where it would receive
  84. authorization.
  85. The second portion of the network is the ATM controller. The controller
  86. monitors the transaction, and routes the message to the authorization
  87. processor. The controller would also generally monitor the physical
  88. devices and statuses of the ATM.
  89. The third portion of the network is the authorization system. In this
  90. case customers of the local institution would have the transaction
  91. authorized on the same processor. Customers from foreign (i.e. one
  92. that does not belong to the institution that runs the ATM) institutions
  93. would be authorized by the regional network. Authorization could be
  94. from a run-up file which maintains establishes a limit on withdrawals
  95. for a given account during a given period. A better method is
  96. authorization direct from the institution which issued the card.
  97. 3. Security
  98. The system has a two component key system to allow access to the network
  99. by the customer. The first is the physical ATM card which has a
  100. magnetic stripe. The magnetic stripe contains account information. The
  101. second component is the Personal Identification Number (PIN). The PIN
  102. is hand entered by the customer into the ATM at transaction time. Given
  103. these two parts, the network will assume that the user is the
  104. appropriate customer and allow the transaction to proceed.
  105. The Magnetic stripe is in the clear and may be assume to be reproducible
  106. using various methods, thus the PIN is crucial security.
  107. Security PIN security
  108. 3.1. PIN security
  109. 3.1.1. PIN key validation method
  110. PINs can be linked up to a particular card in a number of ways. One
  111. method puts the PIN into a central data base in a one-way encrypted
  112. format. When a PIN is presented, it would be encrypted against the
  113. format in the data base. This method requires a method of encrypting
  114. the PIN given at the ATM, until it can be verified at the central site.
  115. Problems can also occur if the institution wants to move the PIN data
  116. base to another processor, especially from a different computer vendor.
  117. Another method is to take information on the card, combine it with an
  118. institution PIN encryption key (PIN key) and use that to generate the
  119. PIN. The institution in question used the PIN key method. This allows
  120. the customer to be verified at the ATM itself and no transmission of the
  121. PIN is required. The risk of the system is the PIN key must be
  122. maintained under the tightest of security.
  123. The PIN key is used to generate the natural PIN. This is derived by
  124. taking the account number and using DES upon it with the PIN key. The
  125. resulting number then is decimialized by doing a lookup on a 16 digit
  126. decimalization table to convert the resulting hexadecimal digits to
  127. decimal digits. An ATM loaded with the appropriate PIN key can then
  128. validate a customer locally with no need to send PIN information to the
  129. network, thereby reducing the risk of compromise.
  130. The PIN key requires the utmost security. Once the PIN key is known,
  131. any customer's ATM card, with corresponding PIN can be created given a
  132. customer account number. The ATM allows for the PIN to be entered at
  133. the ATM in two parts, thus allowing each of two bank officers to know
  134. only one half of the key. If desired, a terminal master key can be
  135. loaded and then the encrypted PIN key loaded from the network.
  136. The decimalization table usually consists of 0 to 9 and 0 to 5, ("0" to
  137. "F" in hexadecimal where "F" = 15). The decimalization table can be put
  138. into any order, scrambling the digits and slowing down an attacker. (As
  139. a side note, it could be noted that using the "standard" table, the PIN
  140. digits are weighted to 0 through 5, each having a 1/8 chance of being
  141. the digit, while 6 through 9 has only a 1/16 chance.)
  142. When handling a foreign card, (i.e. one that does not belong to the
  143. institution that runs the ATM), the PIN must be passed on to the network
  144. in encrypted form. First, however, it must be passed from the ATM to
  145. the ATM controller. This is accomplished by encrypting the PIN entered
  146. at the ATM using a communication key (communication key), The
  147. communication key is entered at the ATM much like the PIN key. In
  148. addition, it can be downloaded from the network. The PIN is decrypted
  149. at the controller and then reencrypted with the network's communication
  150. key.
  151. - 2 -
  152. Security
  153. PIN security
  154. PIN key validation method
  155. Maintaining the the security of the foreign PIN is of critical
  156. importance. Given the foreign PIN along with the ATM card's magnetic
  157. image, the perpetrator has access to an account from any ATM on the
  158. network. This would make tracking of potential attackers quite
  159. difficult, since the ATM and the institution they extract funds from can
  160. be completely different from the institution where the information was
  161. gleaned.
  162. Given that the encrypted PIN goes through normal communication
  163. processes, it could be logged on the normal I/O logs. Since it is
  164. subject to such logging, the PIN in any form should be denied from the
  165. logging function.
  166. 3.2. Security Violations
  167. While the EFT network has potential to run in a secured mode given some
  168. of the precautions outlined above, the potential for abuse of security
  169. is quite easy. In the case of this system, security was compromised in
  170. a number of ways, each leading to the potential loss of funds, and to a
  171. loss of confidence in the EFT system itself.
  172. 3.2.1. Violations of the PIN key method
  173. The two custodian system simply wasn't practical when ATMs were being
  174. installed all over the state. Two examples show this: When asked by
  175. the developer for the PIN key to be entered into a test ATM, there was
  176. first a massive search for the key, and then it was read to him over the
  177. phone. The PIN key was written on a scrap of paper which was not
  178. secured. This is the PIN key that all the customer PINs are based on,
  179. and which compromise should require the reissue of all PINs.)
  180. The importance of a system to enter the PIN key by appropriate officers
  181. of the bank should not be overlooked. In practice the ATM installer
  182. might be the one asked to enter the keys into the machine. This indeed
  183. was demonstrated in this case where the ATM installer not only had the
  184. keys for the Savings and Loan, but also for other institutions in the
  185. area. This was kept in the high security area of the notebook in the
  186. installer's front pocket.
  187. Having a Master key entered into the ATM by officers of the bank might
  188. add an additional layer of security to the system. The actual PIN key
  189. would then be loaded in encrypted form from the network. In the example
  190. above, if the installer was aware of the terminal master key, he would
  191. have to monitor the line to derive the actual PIN key.
  192. The use of a downline encrypted key was never implemented, due to the
  193. potential complications and added cost of such a system. Even if it
  194. was, once violated, security can only be regained by a complete reissue
  195. of customer PINs with the resulting confusion ensuing.
  196. - 3 -
  197. Security
  198. Security Violations
  199. Network validated PIN Security violations
  200. 3.2.2. Network validated PIN Security violations
  201. Given the potential for untraced transactions, the maintenance of the
  202. foreign PINs security was extremely important. In the PIN key example
  203. above, any violation would directly affect the institution of the
  204. violators. This would limit the scope of an investigation, and enhance
  205. the chance of detection and apprehension. The violation of foreign PIN
  206. information has a much wider sphere of attack, with the corresponding
  207. lower chance of apprehension.
  208. The communication key itself was never secured. In this case, the
  209. developer handed the key to the bank officers, to ensure the
  210. communication key didn't get misplaced as the PIN key did (This way he
  211. could recall it in case it got lost). Given the communication key, the
  212. security violation potential is simple enough. The programmer could
  213. simply tap the line between the ATM and the controller. This
  214. information could then generate a set of PIN and card image pairs. He
  215. would even have account balances.
  216. Tapping the line would have been an effort, and worse yet he could get
  217. caught. However, having the I/O logs could serve the same purpose.
  218. While originally designed to obscure PIN information in the I/O logs,
  219. the feature was disabled due to problems caused by the regional network
  220. during testing. The I/O logs would be sent to the developer any time
  221. there was a problem with the ATM controller or the network interface.
  222. The generation of PIN and card image pairs has a potential for even the
  223. most secured system on the network to be attacked by the lapse in
  224. security of a weaker node. Neither the communication key, nor the PIN
  225. should ever be available in the clear. This requires special hardware
  226. at the controller to store this information. In this case, the
  227. institution had no desire to install a secured box for storing key
  228. information. The communication key was available in software, and the
  229. PIN was in the clear during the process of decrypting from the ATM and
  230. re-encrypting with the network key. Any programmer on the system with
  231. access to the controller could put in a log file to tap off the PINs at
  232. that point.
  233. The largest failure of the system, though, was not a result of the items
  234. described above. The largest failure in the system was in the method of
  235. encrypting the PIN before going to the network. This is due to the
  236. failure of the network to have a secured key between sites. The PIN was
  237. to be encrypted with a network key. The network key was sent in
  238. encrypted form from the network to the ATM controller. However, the key
  239. to decrypt the network key was sent almost in the clear as part of the
  240. start-of-day sequence.
  241. Any infiltrator monitoring the line would be able to get all key
  242. information by monitoring the start-of-day sequence, doing the trivial
  243. decryption of the communication key, and proceeding to gather card image
  244. and PIN pairs. The infiltrator could then generate cards and attack the
  245. system at his leisure.
  246. - 4 -
  247. Security
  248. Security Violations
  249. Network validated PIN Security violations
  250. The network-ATM controller security failure is the most critical feature
  251. since it was defined by a regional network supporting many institutions.
  252. The network was supposedly in a better position to understand the
  253. security requirements.
  254. 4. The Human Factors in Security Violation
  255. It is important the users of a system be appraised of the procedures for
  256. securing the system. They should understand the risks, and know what
  257. they are protecting. The bank officers in charge of the program had
  258. little experience with ATM systems. They were never fully indoctrinated
  259. in the consequences of a PIN key or communication key compromise. The
  260. officers showed great surprise when the developer was able to generate
  261. PINs for supplied test cards. Given the potential risk, nothing more
  262. was done to try to change the PIN key, even though, they were quite
  263. aware that the PIN key was in the developer's possession. They once
  264. even called the developer for the PIN key when they weren't able to find
  265. it.
  266. The developer had a desire to maintain a smooth running system and cut
  267. down on the development time of an already over-budget project. Too
  268. much security, for example modifying I/O logs, could delay the isolation
  269. or repair of a problem.
  270. The regional network was actually a marketing company who subcontracted
  271. out the data processing tasks. They failed to recognized the security
  272. problem of sending key information with extremely weak encryption. The
  273. keys were all but sent in the clear. There seemed to be a belief that
  274. the use of encryption in and of itself caused a network to be secured.
  275. The use of DES with an unsecured communication key gave the appearance
  276. of a secured link.
  277. The lack of audits of the system, both in design and implementation was
  278. the final security defect which allowed the system to be compromised in
  279. so many ways. An example of the Savings and Loan's internal auditors
  280. failure to understand the problems or technology is when the auditors
  281. insisted that no contract developers would be allowed physically into
  282. the computer room. The fact was, access to the computer room was never
  283. required to perform any of the described violations.
  284. 5. Security Corrections
  285. As in any system where security was required, the time to implement it
  286. is at the beginning. This requires the review of both implementation
  287. ormed to
  288. verify that the procedures are followed as described in the plan.
  289. Financing, scheduling and man power for such audits must be allocated so
  290. security issues can be addressed.
  291. For this institution, the first step would have been to indoctrinate the
  292. - 5 -
  293. Security Corrections
  294. banking officers of the risks in the ATM network, the vulnerabilites,
  295. and the security measures required.
  296. Custodians of all keys should be well aware of their responsibilities
  297. for those keys. A fall back system of key recovery must be in place in
  298. case an officer is not available for key entry.
  299. The cost of installing hardware encryption units at the host should be
  300. included in the cost of putting in the system. The host unit could
  301. generate down-line keys for both the PIN key and the communication key
  302. thus making it more difficult to derive these keys without collusion
  303. from at least three people.
  304. A secured communications key should be established between the Network
  305. and the institution. This would allow for the exchange of working
  306. communication keys. This key should be changed with a reasonable
  307. frequency.
  308. All these areas should be audited in both the system specification and
  309. implementation to make sure they are not being abridged in the name of
  310. expediency.
  311. 6. Summary
  312. In this view of a single institution, a number of failures in the
  313. security system were shown. There was shown a definite failure to
  314. appreciate what was required in the way of security for PINs and keys
  315. used to derive PIN information. An avoidance of up front costs for
  316. security lead to potentially higher cost in the future. The key area
  317. was the lack of audits of the EFT system by both the institution and the
  318. network, causing potential loss to all institutions on the network.
  319. - 6 -
  320. For those of you who would like a deeper view of thes of ATM
  321. PIN stuff, I'm merging some previous postings along with a paper
  322. Downloaded from Just Say Yes. 2 lines, More than 500 files online!
  323. Full access on first call. 415-922-2008 CASFA
  324. Another file downloaded from:
  325. !
  326. -$- & the Temple of the Screaming Electron
  327. ! * Walnut Creek, CA
  328. + /^ |
  329. ! | |//^ _^_ 2400/1200/300 baud (415) 935-5845
  330. /^ / @ | /_-_ Jeff Hunter, Sysop
  331. |@ _| @ @|- - -|
  332. | | | /^ | _ | - - - - - - - - - *
  333. |___/____|_|_|_(_)_| Aaaaaeeeeeeeeeeeeeeeeee! /
  334. Specializing in conversations, E-Mail, obscure information,
  335. entertainment, the arts, politics, futurism, thoughtful discussion,
  336. insane speculation, and wild rumours. An ALL-TEXT BBS.
  337. "Raw data for raw minds."

comments powered by Disqus