back to article Worldpay outs self as provider of easy-to-crack payment services

Everyone knows the SHA-1 cipher is a relic that can be cracked without colossal effort. So why has Mozilla allowed Symantec to issue some new SHA-1 certificates? Mozilla participates in Web PKI, the effort overseeing the issuance of certificates allowing browsers to identify themselves to servers. The organisation has learned …

  1. DryBones
    Pint

    They should have said no.

    1. John Tserkezis

      "They should have said no."

      It's more complicated than that. Upgrading the devices isn't an option, one because the vendor has chosen to make them obsolete, two, replacement cost just by sheer numbers would be prohibititive, and three, you may not get to find out exactly which devices are obsolete till they stop working. It's easy to say that's not your job or your concern, but it will be someone's.

      1. Lysenko

        Four...

        ...because in some cases "upgrading" the devices is impossible by design as the threat model they were designed to resist is the possibility of someone installing changed code after the unit was certified and manufactured.

        Some chips (PIC16's, for example) have 'fuses' built in specifically to ensure that once the firmware is programmed it can never be changed or read back again.

      2. Anonymous Coward
        Anonymous Coward

        exactly...

        People forget that there is a business need with impact on revenue when you cut off obsolete devices... this is the difference between being a security nazi and driving business by being a security enabler. The important thing is, they know the risk, they are taking steps to fix it, but they just need a little more time...

        1. Doctor Syntax Silver badge

          Re: exactly...

          "People forget that there is a business need with impact on revenue when you cut off obsolete devices"

          Fraud also has an impact on revenue.

          Keeping payment systems up-to-date with security should be seen as a normal business cost, just like physical security measures.

        2. Alan Brown Silver badge

          Re: exactly...

          "The important thing is, they know the risk, they are taking steps to fix it, but they just need a little more time..."

          Several YEARS already. It's not as if this was sprung on them six months ago.

          I'm betting that Worldpay will pitch for a SHA-1 extension when the current one expires.

          Now that Mozilla have said "yes" once, they're in a position where Worldpay can sue them if they say no in future.

      3. Pallas Athena

        If you think that upgrading or replacing those devices is costly, just wait until someone empties your bank-account through this vulnerability.

      4. Alan Brown Silver badge

        "It's more complicated than that. "

        Only because Worldpay has been sweating its assets for as long as possible instead of getting on with meeting deadlines.

        Hopefully the FTC will put its boot in.

      5. Gnosis_Carmot

        "....but it will be someone's."

        Yeah - the people who should have been doing this very task over the last several YEARS.

  2. Anonymous Coward
    Anonymous Coward

    Not quite as easy as that..

    In Worldpay's defence, it's not exactly easy to migrate such a vast amount of legacy hardware. This is the bane of the in-shop payment world in general: a massive legacy network of ageing hardware. The amount of capital sunk in that network is shocking, it gets painful when you need to upgrade it and it's even worse when the majority of the kit isn't even yours.

    HOWEVER..

    They could have started a LOT earlier, from the moment it became evident that some protocols are simply no longer up to the job and that has been quite a while back. The victims here are not Worldpay, but the merchants (and thus their customers) who would be offline if it gets chopped right now. No doubt the bigger merchants would hit Worldpay with breach of contract or something, but I'm more worried about the smaller shops who don't have the margin to pay for court cases.

    I'd give Worldpay at most another 6 months, and a message that that IS the deadline. No more margin.

    1. Anonymous Coward
      Anonymous Coward

      Re: Not quite as easy as that..

      Well, Worldpay is now on the hook for payment fraud liability of all those terminals that have not yet been upgraded. This could get interesting.

      As a customer I would actually like to know who has those insecure devices because I would prefer NOT to shop there. I think we should be told, which could further increase the pressure on Worldpay to get on with it.

      1. Alister

        Re: Not quite as easy as that..

        Well, Worldpay is now on the hook for payment fraud liability of all those terminals that have not yet been upgraded. This could get interesting.

        No, they're not. You don't imagine (or perhaps you do) that Worldpay are the supplier of all the POS Terminals in the world, do you? In reality, there are hundreds of manufacturers and resellers, and lease companies where retailers buy or rent their payment systems from.

        Worldpay do their best to support all these disparate devices, whilst at the same time trying to meet the latest security guidelines.

        I'm sure if you were the owner of a small retail business, and Worldpay told you "oh, we're not supporting your payment system any more, you need to get a new one", you'd be really happy, wouldn't you.

        1. Anonymous Coward
          Anonymous Coward

          Re: Not quite as easy as that..

          Disclaimer: I used to work for Worldpay on their New Acquiring Platform (NAP - they are implementing whole card processing engine from scratch, replacing 30yo mainframe). I run away when contract finished :)

          They do not provide terminals - they just send request to NCR and they send terminals and maintain them. So it is even more complicated as multiple businesses are involved.

          But after seeing what was happening in NAP project I'm not surprised. This organisation is so heavily political, with even execs changing often. Security is a joke, no testing, changes of directions every year or 2, obsolete dev practices, etc. Nothing gets done there. Just check the reviews on Glassdoor.

          The big news will be in year or 2 when NAP goes live. It has been built to such a bad standards it will all collapse. This one is just a little taster. Considering they are the biggest card processor in Europe and planning IPO, so it will be double whammy when share price also crashes down.

          1. Alan Brown Silver badge

            Re: Not quite as easy as that..

            "so it will be double whammy when share price also crashes down."

            The share price will go down even faster now that it's been effectively advertised to the bad guys that open season on Worldpay's authentication system is "Go".

        2. Alan Brown Silver badge

          Re: Not quite as easy as that..

          "I'm sure if you were the owner of a small retail business, and Worldpay told you "oh, we're not supporting your payment system any more, you need to get a new one", you'd be really happy, wouldn't you."

          As a past owner of a small retail business, If Worldpay had said 2-3 years ago "These will stop being supported in 2-3 years. You need to update by then", it would have been put into the financial planning.

          The only reason this would be sprung on small owners overnight would be criminal incompetence on the part of Worldpay - but then again this _is_ Worldpay....

  3. localzuk Silver badge

    Big ships turn slowly

    Mozilla made the announcement about the phasing out of SHA-1 in 2014. For a company like WorldPay, with millions of terminals in use, that isn't enough time to address the issue. Just look at the way Windows XP lasted well beyond its life expectancy due to big businesses.

    1. Doctor Syntax Silver badge

      Re: Big ships turn slowly

      "Mozilla made the announcement about the phasing out of SHA-1 in 2014. For a company like WorldPay, with millions of terminals in use, that isn't enough time"

      So how long should fraudsters allow WorldPay to update before they start using exploits?

    2. Anonymous Coward
      Anonymous Coward

      Re: Big ships turn slowly

      Mozilla made the announcement about the phasing out of SHA-1 in 2014

      That may be so, but it was found to be too weak in 2005 and so, and in 2010 quite a lot of large organisations started to actively argue for its full retirement. It should not have taken a sunset declaration of Mozilla to START planning and executing migration work.

      If anyone in that organisation had a clue about security (let me rephrase that: if anyone in management actually cared about security instead of exclusively focusing on the IPO), they would have been able to follow the shutdown of SHA1 with minimal issues.

  4. Richard Jones 1
    Coat

    Perhaps Cash?

    If the new technology cannot hack the modern world there is always the option of cash or cheques.

    Thought about that Worldpay?

  5. Francis Boyle Silver badge

    I've always found it easy to pay for crack

    Just use cash.

  6. Someone_Somewhere

    Irony

    According to Calomel SSL Validation, these forums have no security protocol at all!

    And they're Plain Text Offenders too!

  7. Vince

    Unbelievable. Meanwhile Small Businesses that I work with have to go through WorldPay's PCI compliance programmes where they make the costs and requirements utterly disproportionate to the risk and heck to any "old" equipment.

    The hypocrisy in these things really grinds me gears.

    1. Anonymous Coward
      Anonymous Coward

      PCI Compliance

      WorldPay don't decide the contents of a PCI compliance program, the PCI body themselves do for a given level of compliance.

      Some big businesses want the highest level of PCI compliance from their suppliers (i.e WorldPay). So that means the small ones have to comply to the same level.

      1. P. Lee

        Re: PCI Compliance

        PCI compliance is hard mostly because industry (software and other) in general is rubbish at security. It is mostly just good IT security sense implemented, documented and audited.

      2. Vince

        Re: PCI Compliance

        If you're (unfortunate enough to be) a WorldPay customer, they have a scheme that they expect you to use (you can provide confirmation from another suitable body, but they then largely ignore you and just bill you as if you're not compliant for a few months whilst you get them to read a PDF), attesting your compliance.

        That process (saferpayments) requires you to attest that the terminal THEY provide is compliant. Which it is it not possible to do. Except if you don't, you can't complete the attesting and thus get screwed for fees.

  8. vjirasek

    Misleading article

    The first sentence say it all about the level of the research effort the author has made! Currently, there are only theoretical attacks know against sha1. These weaken the security from 2^80 to 2^61. While this is quite a dramatic decrease in effort needed, it is still beyond capabilities of your average crime lord. Perhaps a NSA could do it though. So please stop spreading FUD and do your research!

  9. Steve Graham

    The previous (more secure) behaviour should be re-enabled by setting security.pki.sha1_enforcement_level to 2 (now defaults to 0).

  10. Anonymous Coward
    Anonymous Coward

    bullsh*t

    Except SHA-1 isn't a cipher. And, if it can "be cracked without colossal effort", go ahead and publish your chosen-prefix attack that was so easy to do. Yes, they should have updated earlier but this article is FUD and authored by someone who obviously knows little about crypto or the payments industry.

  11. Crazy Operations Guy

    Mozilla has also allowed other bad certificates

    Looking at Mozilla's list of authorized CA's in Firefox, noticed several bad authorities still getting updated with certs for several different country's intelligence agencies, including PM/SGDN - IGC/A (The French intelligence agency that was caught issuing fraudulent *.google.com / *.gmail.com certificates a few years back).

    The worst part is that Firefox re-adds them whenever it updates. I've gone the route of setting up a proxy server that does crypto re-encapsulation so all my clients just see the one certificate. My proxy only trusts a very small number of vetted Certificate Authorities.

  12. Anonymous Coward
    Anonymous Coward

    Perception issue folks, stick to the facts please

    Payment terminals using sslv3 and sha-1 cert's won't be hacked so soon. This is not http with cookies and bad crypto implementation. It's proprietary messaging and the vuln's we take for granted are not applicable.

    You guys are falling for a perception issue because you don't understand payment. Besides, any terminal doing p2pe or just e2ee and card data is inaccessible for a 1000 years

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like