[cryptography] why did OTR succeed in IM?

2013-03-23 Thread ianG

Someone on another list asked an interesting question:

 Why did OTR succeed in IM systems, where OpenPGP and x.509 did not?



(The reason this is interesting (to me?) is that there are not so many 
instances in our field where there are open design competitions at this 
level.  The results of such a competition can be illuminating as to what 
matters and what does not.  E.g., OpenPGP v. S/MIME and SSH v. secure 
telnet are two such competitions.)




iang
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] why did OTR succeed in IM?

2013-03-23 Thread Guido Witmond

On 03/23/2013 10:25 AM, ianG wrote:

Someone on another list asked an interesting question:




Why did OTR succeed in IM systems, where OpenPGP and x.509 did not?



I find that interesting too. What list would that be?

Guido.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] why did OTR succeed in IM?

2013-03-23 Thread Ben Laurie
On 23 March 2013 09:25, ianG i...@iang.org wrote:
 Someone on another list asked an interesting question:

  Why did OTR succeed in IM systems, where OpenPGP and x.509 did not?

Because Adium built it in?




 (The reason this is interesting (to me?) is that there are not so many
 instances in our field where there are open design competitions at this
 level.  The results of such a competition can be illuminating as to what
 matters and what does not.  E.g., OpenPGP v. S/MIME and SSH v. secure telnet
 are two such competitions.)



 iang
 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] msft skype IM snooping stats PGP/X509 in IM?? (Re: why did OTR succeed in IM?)

2013-03-23 Thread Adam Back

Was there anyone trying to use OpenPGP and/or X.509 in IM?

I mean I know many IM protocols support SSL which itself uses X.509, but
that doesnt really meaningfully encrypt the messages in a privacy sense as
they flow in the plaintext through chat server with that model.

btw is anyone noticing that apparently skype is both able to eavesdrop on
skype calls, now that microsoft coded themselves in a central backdoor, this
was initially rumoured, then confirmed somewhat by a Russian police
statement [1], then confirmed by microsoft itself in its law enforcement
requests report.  Now publicly disclosed law enforcement requests reports
are good thing, started by google, but clearly those requests are getting
info or they wouldnt be submitting them by the 10s of thousands.

http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/

75,000 skype related law enforcement requests, 137,000 accounts affectd (each
call involving or more parties).

You have to wonder with that kind of mentality at microsoft (to
intentionally insert themselves into the calls, gratuitiously when it
supposedly wasnt previously architected to allow that under skype's watch),
what other nasties they've put in.  Eg routine keyword scanning?  Remote
monitoring (turn on microphone, camera?) Remote backdoor and rifling through
files on the users computer.  The source is more than closed, its coded like
a polymorphic virus with extensive anti-reverse-engineering features it
would be rather hard to tell what all it is doing, and given the apparent
lack of end to end security, basically impossible to tell what they are
doing in their servers.

I think its past time people considered switching to another IM client, an
open source one with p2p routed traffic and/or end 2 end security,
preferably with some resilience to X.509 certificate authority based
malfeasance.

I have nothing particular to hide, but this level of aggressive, no-warrant
mass-scale fishing is not cricket.  They are no doubt probably hoovering it
all up to store in those new massive Utah spook data centers in case they
want to do some post-hoc fishing also.

And clearly there are plenty of people with very legitimate reasons to hide;
given the levels justice has stooped to do these days in their legal
treatment of activists (even green activists, anti-financial crimes,
corporate ethics activists, whistleblowers) - western countries are slipping
backwards in terms of transparency and justice.

Adam

[1] http://www.itar-tass.com/en/c142/675600.html

On Sat, Mar 23, 2013 at 01:36:34PM +, Ben Laurie wrote:

On 23 March 2013 09:25, ianG i...@iang.org wrote:

Someone on another list asked an interesting question:

 Why did OTR succeed in IM systems, where OpenPGP and x.509 did not?


Because Adium built it in?





(The reason this is interesting (to me?) is that there are not so many
instances in our field where there are open design competitions at this
level.  The results of such a competition can be illuminating as to what
matters and what does not.  E.g., OpenPGP v. S/MIME and SSH v. secure telnet
are two such competitions.)

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Keyspace: client-side encryption for key/value stores

2013-03-23 Thread danimoth
On 21/03/13 at 03:07am, Jeffrey Walton wrote:
 Linux has not warmed up to the fact that userland needs help in
 storing secrets from the OS.


http://standards.freedesktop.org/secret-service/

but maybe I have misunderstood your statement.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] why did OTR succeed in IM?

2013-03-23 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 3/23/13 7:36 AM, Ben Laurie wrote:
 On 23 March 2013 09:25, ianG i...@iang.org wrote:
 Someone on another list asked an interesting question:
 
 Why did OTR succeed in IM systems, where OpenPGP and x.509 did
 not?
 
 Because Adium built it in?

In the early Jabber days, we had OpenPGP support in several clients
such as Gabber, Psi, and WinJab. Although such clients could have
created special-purpose PGP keys, in practice the perception was that
OpenPGP was hard, that people would use existing keys, that Aunt
Tillie would never have a PGP key, etc. It didn't help that (IIRC)
GnuPG made some breaking API changes or somesuch around 2001 that
annoyed various Jabber client developers.

When we standardized the core Jabber protocol as XMPP at the IETF in
2003-2004, the working group settled on using X.509 for various
not-so-good reasons related to IETF politics at the time, resulting in
the monstrosity known as RFC 3923. (And we all know how well
client-side X.509 certificates have worked out.)

IMHO, there are three main reasons why OTR succeeded:

1. It worked across all IM systems.

2. It was relatively friendly for end users, compared to OpenPGP and
X.509.

3. It was built into the most popular open-source IM clients (Pidgin
and Adium).

Peter

- -- 
Peter Saint-Andre
https://stpeter.im/


-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=FUsJ
-END PGP SIGNATURE-
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] why did OTR succeed in IM?

2013-03-23 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


On Mar 23, 2013, at 6:36 AM, Ben Laurie b...@links.org wrote:

 On 23 March 2013 09:25, ianG i...@iang.org wrote:
 Someone on another list asked an interesting question:
 
 Why did OTR succeed in IM systems, where OpenPGP and x.509 did not?
 
 Because Adium built it in?
 

Yeah. And it just worked. It took me two hours to find a Jabber client that 
actually worked (Psi) and get Psi working with OpenPGP support, and even then 
it was just weird, from a UX perspective.

But there's also one other thing, and that is that there was no other real 
competitor. So:

* Greenfield advantage
* Better UX
* Better out-of-the-box experience.

Jon




-BEGIN PGP SIGNATURE-
Version: PGP Universal 3.2.0 (Build 1672)
Charset: us-ascii

wj8DBQFRTeWPsTedWZOD3gYRAgcxAJ9RLtQdYAsdluIKa/+hyBLDfCIVjwCg2bIq
pZT24itMJrs0CHuTSIeVm3o=
=WS8Z
-END PGP SIGNATURE-
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] why did OTR succeed in IM?

2013-03-23 Thread Ben Laurie
On 23 March 2013 16:51, Peter Saint-Andre stpe...@stpeter.im wrote:
 3. It was built into the most popular open-source IM clients (Pidgin
 and Adium).

It isn't actually built in to Pidgin. Should be, IMO.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] why did OTR succeed in IM?

2013-03-23 Thread Nico Williams
On Saturday, March 23, 2013, ianG wrote:

 Someone on another list asked an interesting question:

  Why did OTR succeed in IM systems, where OpenPGP and x.509 did not?


Because it turns out that starting with anonymous key exchange is good
enough in many cases.  Leap of faith would have been a good addition, but
would have created device sync issues, and the answer/question
authentication is good enough.  Imagine if we'd insisted on a PKI for IM...
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] msft skype IM snooping stats PGP/X509 in IM?? (Re: why did OTR succeed in IM?)

2013-03-23 Thread Ben Laurie
On 23 March 2013 18:08, Stephan Neuhaus stephan.neuh...@tik.ee.ethz.ch wrote:

 On Mar 23, 2013, at 15:04, Adam Back wrote:

 I think its past time people considered switching to another IM client, an
 open source one with p2p routed traffic and/or end 2 end security,
 preferably with some resilience to X.509 certificate authority based
 malfeasance.

 Any suggestions?

Adium or Pidgin.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] why did OTR succeed in IM?

2013-03-23 Thread James A. Donald

On 2013-03-24 3:25 AM, Jon Callas wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


On Mar 23, 2013, at 6:36 AM, Ben Laurie b...@links.org wrote:


On 23 March 2013 09:25, ianG i...@iang.org wrote:

Someone on another list asked an interesting question:

 Why did OTR succeed in IM systems, where OpenPGP and x.509 did not?

Because Adium built it in?


Yeah. And it just worked.



The hard part of cryptography is always UI.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Iranian Cryptography Vendors

2013-03-23 Thread James A. Donald

On 2013-03-24 6:28 AM, Ethan Heilman wrote:


Does anyone know where I would be able to find information on what 
cryptographic hardware is currently used by Islamic Republic's 
military and diplomatic organizations? �What vendors they are using 
and what elements of the Iranian government use�foreign�produced 
hardware?�


Presumably anyone who knows that would be located in Iran, and thus 
would surely die if he said that.





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Iranian Cryptography Vendor (backdoor reference)

2013-03-23 Thread J. Oquendo
Crypto AG has been accused of rigging its machines in collusion with 
intelligence agencies such as the German Bundesnachrichtendienst 
(BND) and the United States National Security Agency (NSA), enabling such 
organisations to read the encrypted traffic produced by the 
machines.[2] Suspicions of this collusion were aroused in 1986 following US 
president Ronald Reagan's announcement on national 
television that, through interception of diplomatic communications between 
Tripoli and the Libyan embassy in East Berlin, he had 
irrefutable evidence that Muammar al-Gaddafi of Libya was behind the 1986 
Berlin discotheque bombing in which two US service 
personnel were killed and another fifty injured. President Reagan then ordered 
the bombing of Tripoli and Benghazi in retaliation. 
There is no conclusive evidence that there was an intercepted Libyan 
message.[citation needed]

Further evidence suggesting that the Crypto AG machines were compromised was 
revealed after the assassination of former Iranian Prime 
Minister Shahpour Bakhtiar in 1991. On August 7, 1991, one day before 
Bakhtiar's body was discovered, the Iranian Intelligence 
Service transmitted a coded message to Iranian embassies, inquiring Is 
Bakhtiar dead? Western governments were able to decipher 
this transmission, causing Iranian suspicion to fall upon their Crypto AG 
equipment.[3]

http://en.wikipedia.org/wiki/Crypto_AG
http://www.schneier.com/blog/archives/2008/01/nsa_backdoors_i.html



-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

Where ignorance is our master, there is no possibility of
real peace - Dalai Lama

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x2BF7D83F210A95AF
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] NSA Critiques Public Key Cryptography in 1986

2013-03-23 Thread John Young

NSA Cryptolog, August-September 1986 reviews Ralph Merkel's
book, Secrecy, Authentication,and Public Key Systems, with disdain
and dismissal:

No library need acquire this tract.

The once Secret review cites the PKC work of James Ellis, Malcolm
Williamson and Cliff Cocks at GCHQ eleven years before their role
became public in 1997.

http://cryptome.org/2013/03/nsa-critiques-pkc.htm


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography