Updated: 24.11.2002; 14:10:06 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Wednesday, December 26, 2001

Secure in, insecure out

As readers of RISKS know, many Internet users think that HTTPS is equivalent to security. Here's an example where that went badly wrong.

My employer uses an online service to handle signups for the flexible spending plan (*). It uses an HTTPS form to collect the usual personal info: name, address, social security number, and amount to be deducted. So far, so good. I don't know what it does with the information (presumably puts it in a database, which has it's own issues). Then they e-mail the information back to the user for confirmation, including the SSN.

Interestingly, *someone* at the company understood the risks, because their "security and privacy" policy on their home page notes that unencrypted e-mail is not safe. (**) Whoever wrote that policy obviously wasn't working with the people building the system.

The response when we pointed the problem out was "we use HTTPS, so we're secure". After several rounds of back-and-forth with the vendor, they admitted the problem, and proposed to fix it early next year. Since this is software that gets used once a year (to meet the Dec 31st deadline), that was clearly a silly proposal, since all users would be forced into using the incorrect version. So after some arm-twisting, they changed the confirmation message to eliminate all but the last 4 digits of the SSN. A big improvement.

The risk here is that this is a commercial system that's presumably used by many other companies besides ours. How many other companies use this flawed system and never objected? And how many other equivalent systems are there out on the net? If I were looking for an easy way to commit identity theft, I'd be monitoring e-mails coming out of that company... chances are there's a lot of good info! (Which is why I'm not giving their name or URL!)

----- (*) A flexible spending plan is established by US tax law to allow tax-free deductions from salary into an account which can then be used to pay for medical or child care expenses. By law, you have to decide by December 31st how much money will be deducted in the following year, and you (generally) can't change that decision once it's made. Also, any unspent money is not returned to the employee, so it's important to estimate accurately. Because of the legal Dec 31st deadline, it wasn't possible/feasible to wait for a more appropriate resolution of the problem.

(**) I did a Google search on the actual phrase used on their Web page to see if it would disclose who the vendor is. They were the only vendor of their type who used the particular phrase, which is why I haven't quoted it verbatim, but it seems to be a catch phrase used in MANY security and privacy policies. So perhaps they just cut & pasted it without having a clue what it meant.

--Jeremy

P.S. Yes, I understand there are a lot of other risks in this system besides just sending the SSN unencrypted. This was just particularly egregious. [Jeremy Epstein via risks-digest Volume 21, Issue 83]
0:00 # G!


Maximillian Dornseif, 2002.
 
December 2001
Sun Mon Tue Wed Thu Fri Sat
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          
Nov   Jan

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.