Re: [cryptography] Compromised Sys Admin Hunters and Tor

2014-03-24 Thread Nico Williams
On Sat, Mar 22, 2014 at 12:59 AM, Stephan Neuhaus
stephan.neuh...@tik.ee.ethz.ch wrote:
 On 2014-03-22, 04:28, Nico Williams wrote:
 Insiders are always your biggest threat.

 I'm always interested in empirical evidence for the things that we
 believe to be true. Do you have any?

[The context was sysadmins, who generally wield a lot of power.]

Anecdotal, yes.  I'm not sure if I'm at liberty to discuss any of the
events of which I have close knowledge, though one of them was in the
news at the time (that is, I'm not sure if I'm at liberty to discuss
the details).  In the largest incident I've close knowledge of a
laid-off sysadmin left a time bomb in thousands of servers that caused
significant downtime for the business' customers.

And then there's Mr. Snowden...

...and the long line of insiders who spied against their nations,
versus the number of outsiders who made it through whatever
technological barriers were in their way.

Even if you limit yourself to the Internet era, the most famously
damaging attacks I can think of were all insider attacks.  Many were
not attacks in the sense of security attacks like buffer
overflows, say, but rather in the sense of actions that went beyond
legitimate access and badly damaged a business (Nick Leeson, anyone?).

It stands to reason that insiders who have vast and/or intimate
knowledge, and legitimate access to a business' resources, have a lot
of power to cause damage.  By definition they have more capacity to
cause immediate damage than outsiders.  Whether insiders are the
biggest threat in the sense of probability is, of course, not easy to
predict and largely irrelevant: they are the first threat to protect
against.

I'm not sure that empiricism has any place in this very particular
matter; without the insiders on your side, you stand no chance against
outsiders.  So I'm not sure what you're asking for...  Even if there
was little data as to actual attacks by insiders, that would not mean
that insiders are not a danger, and even if individual insider risk
were empirically far lower than outsider risk, that would not mean
that the total damage an insider could cause is far less than that
which outsiders can cause.

Which isn't to say that outsiders must not be protected against.  Of
course security in depth is critical -- and the right approach.

Nico
--
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Compromised Sys Admin Hunters and Tor

2014-03-22 Thread Jane
Not to intrude onto a finely crafted discourse, but I saw nothing
particularly damning with regards to the brief Dingledine gave to NSA.
Talking to NSA politely != installing backdoors into people's stuff. He
didn't say anything we did not know, and the only revelation, as far as I
am concerned, is that NSA people are apparently allowed to use emoticons in
documents. Way to look professional, guys.

Now...

As to the original question, you have got to weight the gravity of using
TOR versus complexities needed to thwart local adversary's attempts at
finding out whether you are using TOR.

Basically, if your cryptoparty is somewhere in EU or US, and the activists
in question are mild-mannered folks who aren't high profile targets in
any way, you guys would probably do good by just using plain TOR (and
running nodes, though asking to run exit nodes might be asking for a bit
too much commitment)

If one is a high-profile target or operating in conditions where TOR use is
dangerous in and on itself, it might be prudent to rent a VPS (come on,
it's just $5 or so nowadays!) and use it as a SOCKS 5 SSH proxy (Windows
users can do this via putty), since TOR client can be configured to use a
SOCKS proxy between itself and the rest of the net, and Putty (or any
equivalent SSH client on your OS of choice) can set up a SOCKS5 on
localhost and forward all traffic directed at it through the server SSH
client has connected to.

The setup will end up being AliceSSH_proxyRemote_machineTORBob.

Since a local adversary can not get access to the VPS and can only observe
the connection between Alice and the VPS (which is an SSH connection), it
will remain largely oblivious to the fact that Alice is in fact using TOR
(and there are perfectly pedestrian reasons for having an SSH connection to
a remote machine)

The VPS provider will, of course, be able to learn that something TORish is
going on, but won't be able to decrypt traffic.

Thus, you now have plausibly deniable TOR as far as a local adversary is
concerned

Main caveats -
choose VPS provider and server jurisdiction very wisely.

also, if a break-in-and-search happens (can happen to hi-profile targets),
TOR (TOR bundle, one would assume) is still installed locally (which isn't
very plausibly deniable), but management of evidence on local machines for
high-profile activists is a very different and way more contrived subject.


On Fri, Mar 21, 2014 at 4:01 PM, John Young j...@pipeline.com wrote:

 Sys admins catch you hunting them and arrange compromises
 to fit your demands so you can crow about how skilled you are.
 Then you hire them after being duped as you duped to be hired.

 The lead Tor designer reportedly (via Washington Post) had a
 session with NSA to brief on how to compromise it, although
 compromise was not used nor is the word used by
 gov-com-org-edu.

 http://cryptome.org/2013/10/nsa-tor-dingledine.htm

 Not many honest comsec wizards nowadays are promising
 more than compromised comsec, and the compromise is gradually
 increasing as Snowden material is dribbled out to convince the
 public and wizards not a hell of a lot can be done about it except
 believe in and buy more compromised comsec.

 Not news here and in comsec wizard-land, to be sure, but
 compromised comsec is the industry standard, as the industry
 and its wizards in and out of government enjoy the boom and
 bust in comsec tools generated by precursors of Snowden,
 Snowden and his successors.

 Compromisability is assumed by the comsec industry to be a
 fundamental feature in all nations, no need to advertise it, much
 better to advertise how great comsec is and now much it is
 needed. Crypto-wizards have a long history of compromising
 believers who hire them and who suffer their promises of
 highly trusted protection.

 Trusted comsec is necessary to get persons to pack their
 comms with compromisable information. The greater the
 trust the greater the revelations of just what is desired.

 So what if laws are aleays jiggered to allow access to the
 revelations under legal pressure and FISC orders.
 That has been a fundamental feature of crypto and
 comsec wizardry.

 At 06:04 AM 3/21/2014, you wrote:

 Hi there,

 As I am running a local cryptoparty and do a lot of basic
 encryption/privacy
 talks and workshops, I am often recommending Tor as one of the means of
 protecting one's privacy and yes, even security (for example, by running a
 hidden service and making it possible for users not to leave the darknet).

 Of course it's far from being enough, and I make that very clear.

 But lately I got to wonder if using Tor does more harm than good? If the
 NSA
 can impersonate any IP on the planet, they can impersonate any Tor node;
 tis
 has two important consequences:

 1. they know when you're using Tor, and can flag you accordingly, and (for
example) deliver some nastiness when (not if!) they get the chance,
because when you have something to hide...

 2. they can guess with high 

[cryptography] Compromised Sys Admin Hunters and Tor

2014-03-21 Thread John Young

Sys admins catch you hunting them and arrange compromises
to fit your demands so you can crow about how skilled you are.
Then you hire them after being duped as you duped to be hired.

The lead Tor designer reportedly (via Washington Post) had a
session with NSA to brief on how to compromise it, although
compromise was not used nor is the word used by
gov-com-org-edu.

http://cryptome.org/2013/10/nsa-tor-dingledine.htm

Not many honest comsec wizards nowadays are promising
more than compromised comsec, and the compromise is gradually
increasing as Snowden material is dribbled out to convince the
public and wizards not a hell of a lot can be done about it except
believe in and buy more compromised comsec.

Not news here and in comsec wizard-land, to be sure, but
compromised comsec is the industry standard, as the industry
and its wizards in and out of government enjoy the boom and
bust in comsec tools generated by precursors of Snowden,
Snowden and his successors.

Compromisability is assumed by the comsec industry to be a
fundamental feature in all nations, no need to advertise it, much
better to advertise how great comsec is and now much it is
needed. Crypto-wizards have a long history of compromising
believers who hire them and who suffer their promises of
highly trusted protection.

Trusted comsec is necessary to get persons to pack their
comms with compromisable information. The greater the
trust the greater the revelations of just what is desired.

So what if laws are aleays jiggered to allow access to the
revelations under legal pressure and FISC orders.
That has been a fundamental feature of crypto and
comsec wizardry.

At 06:04 AM 3/21/2014, you wrote:

Hi there,

As I am running a local cryptoparty and do a lot of basic encryption/privacy
talks and workshops, I am often recommending Tor as one of the means of
protecting one's privacy and yes, even security (for example, by running a
hidden service and making it possible for users not to leave the darknet).

Of course it's far from being enough, and I make that very clear.

But lately I got to wonder if using Tor does more harm than good? If the NSA
can impersonate any IP on the planet, they can impersonate any Tor node; tis
has two important consequences:

1. they know when you're using Tor, and can flag you accordingly, and (for
   example) deliver some nastiness when (not if!) they get the chance,
   because when you have something to hide...

2. they can guess with high probability whom are you communicating with; they
   don't have to break encryption, it's enough they listen-in and see that a
   Tor packet from your IP to Node A is x bytes; a packet from Node A to Node
   B is x-( header + Tor encryption layer size ) bytes, and so on.

So, is using Tor today doing more harm than good? Would ordinary Joe Schmoes
be far better of not using Tor? How about more high-profile targets, like
activists/hacktivists, etc?

--
Pozdr
rysiek



___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Compromised Sys Admin Hunters and Tor

2014-03-21 Thread coderman
On Fri, Mar 21, 2014 at 5:01 AM, John Young j...@pipeline.com wrote:
 Sys admins catch you hunting them and arrange compromises
 to fit your demands so you can crow about how skilled you are.
 Then you hire them after being duped as you duped to be hired.

everything old is new again,
  betrayals for lucre, for lust, for fame, for fear, ...


this is why some technology consumers demand independent validation[0]
to confirm to their own eyes if design matches intent; if operation
matches assurance.  how can you even trust the word of a third party
verifying integrity if you can't determine integrity yourself?

caution: this line of reasoning leads to long dependencies...  ;)



 The lead Tor designer reportedly (via Washington Post) had a
 session with NSA to brief on how to compromise it, although
 compromise was not used nor is the word used by
 gov-com-org-edu.

 http://cryptome.org/2013/10/nsa-tor-dingledine.htm

the beauty of privacy, like freedom, is that it floats all boats.
  [ i may not agree with what you do with free, uncensored communication,
yet i code and toil for your ability to communicate regardless. ]



in all seriousness, what you describe at the root of things: systems
that are inherently and fundamentally compromising, if you have the
right adversary, if you have the right resources, is absolutely true!

in industry speak this is characterized in terms of risk management.
 in military, aimed at a higher common denominator, yet fundamentally
just as vulnerable (built to a more competent attacker.  a larger
resource stream.)

there are defeatists a plenty, having looked around the state of
things, and fall to nothing but despair.

i think it is reasonable to demand complete transparency and utmost
correctness and reliability in these technologies we depend on.
that's a radically different future than what we have now or can think
of in terms of current engineering capabilities.
  never the less, a future worth aiming toward!



finally, to your mention of the meeting with NSA, this is interesting
from a reversing the adversary's perspective.
  [since presumably Roger does not hold clearance of course, this is
all treating Roger as hostile witness!]

let's review it:


---

Roger Dingledine at NSA NOV 2007
...
 Contents
 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at RE (Sponsored by NSA 
 RT)
 o 1.1 (U) Who are TOR Customers?
 o 1.2 (U) Anonymity System Concepts
 o 1.3 (U) TOR Issues

the usual culprits.



 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at RE (Sponsored by NSA RT)

next time ask for them to sponsor bridges, obfuscated proxies, and
fast exits? :)
[only half in jest, as QUANTUMSQUIRREL would also make a great single,
large exit for entire Tor network as has been mentioned in the past!
constantly changing set of address space would avoid censorship and
blocking into and out of the network. (though i would _only_ use
NSANet as a obfuscated proxy first hop to hidden services or as last
hop exit relay to clearnet where they occurr no where else along my
circuit.)]



 (U) Roger Dingledine, now of Torproject.org, was one of the principle 
 inventors or TOR. Current usage statistics quoted are 200K users and 1K 
 servers. When asked about trends, he had no concrete data - Being a 
 non-profit open-source effort, the collector of statistics has not been 
 active recently.

now there are metrics :)
  https://metrics.torproject.org/



 (U) The obligatory Anonymity is not equal to Cryptography and Anonymity 
 is not equal to Steganography admonishments were given early on.
 (U) Who are TOR Customers?
 (U) Mr. Dingledine mentioned that the way TOR is spun is dependent on who 
 the spinee is. Using the typical (in the cryptography world), Alice and 
 Bob as communicants, he described several Alices:
 (U) 1. Blogger Alice, who wants to be able to write to a blog in an 
 anonymous way.
 (U) 2. 8 yr. old Alice, who wants to be able to post to sites for children 
 in a way insuring her true name and location are not discovered.
 (U) 3. Sick Alice, who want to research information on her illness on the 
 Internet while not enabling anyone to determine her true name and location.
 (U) 4. Consumer Alice, who wants to research possible purchases without 
 having a database of her marketing habits being built without (or with her 
 weak) consent.
 (U) 5. Oppressed Alice, who lives in a repressive country (no or limited 
 free speech) and wants to talk about things contrary to her governments 
 positions. The countries he used as examples were France, Germany 
 (prohibitions on fascist writings?) and the US (not sure what he meant 
 here?).
 (U) 6. Turning to Business Alice, we had examples of companies not wanting 
 to give up their business secrets to competitors via their Internet usage 
 patterns. An anecdote was given of some business getting a different HTML 
 page displayed when the same URL was accessed with and without TOR.
 (U) 7. Law Enforcement Alice was concerned with 

Re: [cryptography] Compromised Sys Admin Hunters and Tor

2014-03-21 Thread dan

At this point, one can but humbly remember John 8:7,

   ...He that is without sin among you, let him first cast a stone...



--dan

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Compromised Sys Admin Hunters and Tor

2014-03-21 Thread Nico Williams
On Fri, Mar 21, 2014 at 7:01 AM, John Young j...@pipeline.com wrote:
 Sys admins catch you hunting them and arrange compromises
 to fit your demands so you can crow about how skilled you are.

Insiders are always your biggest threat.

 Then you hire them after being duped as you duped to be hired.

 The lead Tor designer reportedly (via Washington Post) had a
 session with NSA to brief on how to compromise it, although
 compromise was not used nor is the word used by
 gov-com-org-edu.

Er, so?  The NSA could just... read the public docs and source
anyways.  I'd personally love to be able to sit down with NSA
cryptonerds and chat -- if they talked at all I'd learn something.  As
long as there was no coercion anyways.

Nico
--
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography