The big concern I have here is that the address resolution seems similar to DNS... Which is very bad, IMHO. Are they taking necessary steps to mitigate ddos and Man in the middle attacks? If they're not, they're seeing themselves up for major disaster.
godelmachine|5 years ago
I am sure I am missing something. Just curious to know where do you see an attack vector for DDoS or MOTM attack?
sudeepj|5 years ago
I am not sure how this would happen in this case. If you want to flood the system you will have initiate a lot of payments which will be costly.
Both sender and receiver are authenticated with bank, so there is a traceability.
Also, you need a bank license from the central bank to act as a bank and each UPI is linked to an bank account which itself is linked to details. To add, it is now difficult (not impossible) to have anonymous bank account because they are linked to a central ID called Aaddhar number [1] and other KYC procedures.
One will have to really execute an elaborate scam like in Ocean's 11 movie to make this work.
[1] https://en.wikipedia.org/wiki/Aadhaar
arafsheikh|5 years ago
[1] https://www.exalog.com/en/swiftnet-network-banking-communica...
closeparen|5 years ago
blueblisters|5 years ago
NCPI could definitely be a single point of failure, and I think that makes them vulnerable to more than just MITM and DDOS attacks.
captn3m0|5 years ago
The client-PSP is over HTTPS, and the remaining legs are over UPI (which is essentially SOAP+XML) which uses XML signatures.
There are rate-limits built at most ends, and I think most PSPs also cache the resolution.
sseth|5 years ago
ta2987|5 years ago
[deleted]