Re: [cryptography] Compromised Sys Admin Hunters and Tor
On Sat, Mar 22, 2014 at 12:59 AM, Stephan Neuhaus stephan.neuh...@tik.ee.ethz.ch wrote: On 2014-03-22, 04:28, Nico Williams wrote: Insiders are always your biggest threat. I'm always interested in empirical evidence for the things that we believe to be true. Do you have any? [The context was sysadmins, who generally wield a lot of power.] Anecdotal, yes. I'm not sure if I'm at liberty to discuss any of the events of which I have close knowledge, though one of them was in the news at the time (that is, I'm not sure if I'm at liberty to discuss the details). In the largest incident I've close knowledge of a laid-off sysadmin left a time bomb in thousands of servers that caused significant downtime for the business' customers. And then there's Mr. Snowden... ...and the long line of insiders who spied against their nations, versus the number of outsiders who made it through whatever technological barriers were in their way. Even if you limit yourself to the Internet era, the most famously damaging attacks I can think of were all insider attacks. Many were not attacks in the sense of security attacks like buffer overflows, say, but rather in the sense of actions that went beyond legitimate access and badly damaged a business (Nick Leeson, anyone?). It stands to reason that insiders who have vast and/or intimate knowledge, and legitimate access to a business' resources, have a lot of power to cause damage. By definition they have more capacity to cause immediate damage than outsiders. Whether insiders are the biggest threat in the sense of probability is, of course, not easy to predict and largely irrelevant: they are the first threat to protect against. I'm not sure that empiricism has any place in this very particular matter; without the insiders on your side, you stand no chance against outsiders. So I'm not sure what you're asking for... Even if there was little data as to actual attacks by insiders, that would not mean that insiders are not a danger, and even if individual insider risk were empirically far lower than outsider risk, that would not mean that the total damage an insider could cause is far less than that which outsiders can cause. Which isn't to say that outsiders must not be protected against. Of course security in depth is critical -- and the right approach. Nico -- ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Compromised Sys Admin Hunters and Tor
Not to intrude onto a finely crafted discourse, but I saw nothing particularly damning with regards to the brief Dingledine gave to NSA. Talking to NSA politely != installing backdoors into people's stuff. He didn't say anything we did not know, and the only revelation, as far as I am concerned, is that NSA people are apparently allowed to use emoticons in documents. Way to look professional, guys. Now... As to the original question, you have got to weight the gravity of using TOR versus complexities needed to thwart local adversary's attempts at finding out whether you are using TOR. Basically, if your cryptoparty is somewhere in EU or US, and the activists in question are mild-mannered folks who aren't high profile targets in any way, you guys would probably do good by just using plain TOR (and running nodes, though asking to run exit nodes might be asking for a bit too much commitment) If one is a high-profile target or operating in conditions where TOR use is dangerous in and on itself, it might be prudent to rent a VPS (come on, it's just $5 or so nowadays!) and use it as a SOCKS 5 SSH proxy (Windows users can do this via putty), since TOR client can be configured to use a SOCKS proxy between itself and the rest of the net, and Putty (or any equivalent SSH client on your OS of choice) can set up a SOCKS5 on localhost and forward all traffic directed at it through the server SSH client has connected to. The setup will end up being AliceSSH_proxyRemote_machineTORBob. Since a local adversary can not get access to the VPS and can only observe the connection between Alice and the VPS (which is an SSH connection), it will remain largely oblivious to the fact that Alice is in fact using TOR (and there are perfectly pedestrian reasons for having an SSH connection to a remote machine) The VPS provider will, of course, be able to learn that something TORish is going on, but won't be able to decrypt traffic. Thus, you now have plausibly deniable TOR as far as a local adversary is concerned Main caveats - choose VPS provider and server jurisdiction very wisely. also, if a break-in-and-search happens (can happen to hi-profile targets), TOR (TOR bundle, one would assume) is still installed locally (which isn't very plausibly deniable), but management of evidence on local machines for high-profile activists is a very different and way more contrived subject. On Fri, Mar 21, 2014 at 4:01 PM, John Young j...@pipeline.com wrote: Sys admins catch you hunting them and arrange compromises to fit your demands so you can crow about how skilled you are. Then you hire them after being duped as you duped to be hired. The lead Tor designer reportedly (via Washington Post) had a session with NSA to brief on how to compromise it, although compromise was not used nor is the word used by gov-com-org-edu. http://cryptome.org/2013/10/nsa-tor-dingledine.htm Not many honest comsec wizards nowadays are promising more than compromised comsec, and the compromise is gradually increasing as Snowden material is dribbled out to convince the public and wizards not a hell of a lot can be done about it except believe in and buy more compromised comsec. Not news here and in comsec wizard-land, to be sure, but compromised comsec is the industry standard, as the industry and its wizards in and out of government enjoy the boom and bust in comsec tools generated by precursors of Snowden, Snowden and his successors. Compromisability is assumed by the comsec industry to be a fundamental feature in all nations, no need to advertise it, much better to advertise how great comsec is and now much it is needed. Crypto-wizards have a long history of compromising believers who hire them and who suffer their promises of highly trusted protection. Trusted comsec is necessary to get persons to pack their comms with compromisable information. The greater the trust the greater the revelations of just what is desired. So what if laws are aleays jiggered to allow access to the revelations under legal pressure and FISC orders. That has been a fundamental feature of crypto and comsec wizardry. At 06:04 AM 3/21/2014, you wrote: Hi there, As I am running a local cryptoparty and do a lot of basic encryption/privacy talks and workshops, I am often recommending Tor as one of the means of protecting one's privacy and yes, even security (for example, by running a hidden service and making it possible for users not to leave the darknet). Of course it's far from being enough, and I make that very clear. But lately I got to wonder if using Tor does more harm than good? If the NSA can impersonate any IP on the planet, they can impersonate any Tor node; tis has two important consequences: 1. they know when you're using Tor, and can flag you accordingly, and (for example) deliver some nastiness when (not if!) they get the chance, because when you have something to hide... 2. they can guess with high
[cryptography] Compromised Sys Admin Hunters and Tor
Sys admins catch you hunting them and arrange compromises to fit your demands so you can crow about how skilled you are. Then you hire them after being duped as you duped to be hired. The lead Tor designer reportedly (via Washington Post) had a session with NSA to brief on how to compromise it, although compromise was not used nor is the word used by gov-com-org-edu. http://cryptome.org/2013/10/nsa-tor-dingledine.htm Not many honest comsec wizards nowadays are promising more than compromised comsec, and the compromise is gradually increasing as Snowden material is dribbled out to convince the public and wizards not a hell of a lot can be done about it except believe in and buy more compromised comsec. Not news here and in comsec wizard-land, to be sure, but compromised comsec is the industry standard, as the industry and its wizards in and out of government enjoy the boom and bust in comsec tools generated by precursors of Snowden, Snowden and his successors. Compromisability is assumed by the comsec industry to be a fundamental feature in all nations, no need to advertise it, much better to advertise how great comsec is and now much it is needed. Crypto-wizards have a long history of compromising believers who hire them and who suffer their promises of highly trusted protection. Trusted comsec is necessary to get persons to pack their comms with compromisable information. The greater the trust the greater the revelations of just what is desired. So what if laws are aleays jiggered to allow access to the revelations under legal pressure and FISC orders. That has been a fundamental feature of crypto and comsec wizardry. At 06:04 AM 3/21/2014, you wrote: Hi there, As I am running a local cryptoparty and do a lot of basic encryption/privacy talks and workshops, I am often recommending Tor as one of the means of protecting one's privacy and yes, even security (for example, by running a hidden service and making it possible for users not to leave the darknet). Of course it's far from being enough, and I make that very clear. But lately I got to wonder if using Tor does more harm than good? If the NSA can impersonate any IP on the planet, they can impersonate any Tor node; tis has two important consequences: 1. they know when you're using Tor, and can flag you accordingly, and (for example) deliver some nastiness when (not if!) they get the chance, because when you have something to hide... 2. they can guess with high probability whom are you communicating with; they don't have to break encryption, it's enough they listen-in and see that a Tor packet from your IP to Node A is x bytes; a packet from Node A to Node B is x-( header + Tor encryption layer size ) bytes, and so on. So, is using Tor today doing more harm than good? Would ordinary Joe Schmoes be far better of not using Tor? How about more high-profile targets, like activists/hacktivists, etc? -- Pozdr rysiek ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Compromised Sys Admin Hunters and Tor
On Fri, Mar 21, 2014 at 5:01 AM, John Young j...@pipeline.com wrote: Sys admins catch you hunting them and arrange compromises to fit your demands so you can crow about how skilled you are. Then you hire them after being duped as you duped to be hired. everything old is new again, betrayals for lucre, for lust, for fame, for fear, ... this is why some technology consumers demand independent validation[0] to confirm to their own eyes if design matches intent; if operation matches assurance. how can you even trust the word of a third party verifying integrity if you can't determine integrity yourself? caution: this line of reasoning leads to long dependencies... ;) The lead Tor designer reportedly (via Washington Post) had a session with NSA to brief on how to compromise it, although compromise was not used nor is the word used by gov-com-org-edu. http://cryptome.org/2013/10/nsa-tor-dingledine.htm the beauty of privacy, like freedom, is that it floats all boats. [ i may not agree with what you do with free, uncensored communication, yet i code and toil for your ability to communicate regardless. ] in all seriousness, what you describe at the root of things: systems that are inherently and fundamentally compromising, if you have the right adversary, if you have the right resources, is absolutely true! in industry speak this is characterized in terms of risk management. in military, aimed at a higher common denominator, yet fundamentally just as vulnerable (built to a more competent attacker. a larger resource stream.) there are defeatists a plenty, having looked around the state of things, and fall to nothing but despair. i think it is reasonable to demand complete transparency and utmost correctness and reliability in these technologies we depend on. that's a radically different future than what we have now or can think of in terms of current engineering capabilities. never the less, a future worth aiming toward! finally, to your mention of the meeting with NSA, this is interesting from a reversing the adversary's perspective. [since presumably Roger does not hold clearance of course, this is all treating Roger as hostile witness!] let's review it: --- Roger Dingledine at NSA NOV 2007 ... Contents 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at RE (Sponsored by NSA RT) o 1.1 (U) Who are TOR Customers? o 1.2 (U) Anonymity System Concepts o 1.3 (U) TOR Issues the usual culprits. (U) Talk by Roger Dingledine at NSA, 11/01/2007 at RE (Sponsored by NSA RT) next time ask for them to sponsor bridges, obfuscated proxies, and fast exits? :) [only half in jest, as QUANTUMSQUIRREL would also make a great single, large exit for entire Tor network as has been mentioned in the past! constantly changing set of address space would avoid censorship and blocking into and out of the network. (though i would _only_ use NSANet as a obfuscated proxy first hop to hidden services or as last hop exit relay to clearnet where they occurr no where else along my circuit.)] (U) Roger Dingledine, now of Torproject.org, was one of the principle inventors or TOR. Current usage statistics quoted are 200K users and 1K servers. When asked about trends, he had no concrete data - Being a non-profit open-source effort, the collector of statistics has not been active recently. now there are metrics :) https://metrics.torproject.org/ (U) The obligatory Anonymity is not equal to Cryptography and Anonymity is not equal to Steganography admonishments were given early on. (U) Who are TOR Customers? (U) Mr. Dingledine mentioned that the way TOR is spun is dependent on who the spinee is. Using the typical (in the cryptography world), Alice and Bob as communicants, he described several Alices: (U) 1. Blogger Alice, who wants to be able to write to a blog in an anonymous way. (U) 2. 8 yr. old Alice, who wants to be able to post to sites for children in a way insuring her true name and location are not discovered. (U) 3. Sick Alice, who want to research information on her illness on the Internet while not enabling anyone to determine her true name and location. (U) 4. Consumer Alice, who wants to research possible purchases without having a database of her marketing habits being built without (or with her weak) consent. (U) 5. Oppressed Alice, who lives in a repressive country (no or limited free speech) and wants to talk about things contrary to her governments positions. The countries he used as examples were France, Germany (prohibitions on fascist writings?) and the US (not sure what he meant here?). (U) 6. Turning to Business Alice, we had examples of companies not wanting to give up their business secrets to competitors via their Internet usage patterns. An anecdote was given of some business getting a different HTML page displayed when the same URL was accessed with and without TOR. (U) 7. Law Enforcement Alice was concerned with
Re: [cryptography] Compromised Sys Admin Hunters and Tor
At this point, one can but humbly remember John 8:7, ...He that is without sin among you, let him first cast a stone... --dan ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Compromised Sys Admin Hunters and Tor
On Fri, Mar 21, 2014 at 7:01 AM, John Young j...@pipeline.com wrote: Sys admins catch you hunting them and arrange compromises to fit your demands so you can crow about how skilled you are. Insiders are always your biggest threat. Then you hire them after being duped as you duped to be hired. The lead Tor designer reportedly (via Washington Post) had a session with NSA to brief on how to compromise it, although compromise was not used nor is the word used by gov-com-org-edu. Er, so? The NSA could just... read the public docs and source anyways. I'd personally love to be able to sit down with NSA cryptonerds and chat -- if they talked at all I'd learn something. As long as there was no coercion anyways. Nico -- ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography