Re: BrinCity 2.0: Mayor outlines elaborate camera network for city

2004-09-11 Thread Nomen Nescio
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

R. A. Hettinga ([EMAIL PROTECTED]) wrote on 2004-09-10:
  Critics say the cameras ought not be regarded as a panacea in crime
 fighting. They say the more there are, the greater the potential for abuse.

So, since this is titled BrinCity, it surely means that the image
streams will be available from a web site and that we the people get
cameras in the emergency response center and the mayor's office?

-END TYPE III ANONYMOUS MESSAGE-



Re: potential new IETF WG on anonymous IPSec

2004-09-11 Thread Bill Stewart
At 12:57 PM 9/9/2004, Hal Finney wrote:
   http://www.postel.org/anonsec
To clarify, this is not really anonymous in the usual sense.  Rather it
is a proposal to an extension to IPsec to allow for unauthenticated
connections.  Presently IPsec relies on either pre-shared secrets or a
trusted third party CA to authenticate the connection.  The new proposal
would let connections go forward using a straight Diffie-Hellman type
exchange without authentication.  It also proposes less authentication
of IP message packets, covering smaller subsets, as an option.
I read the draft, and I don't see how it offers any improvement
over draft-ietf-ipsec-internet-key-00.txt or Gilmore's proposal touse open 
secret as a not-very-secret pre-shared secret
that anybody who wants to can accept.
It does introduce some lower-horsepower alternatives for
authenticating less than the entire packet, and suggests
using AH which I thought was getting rather deprecated these days,
but another way to reduce horsepower needs is to use AES instead of 3DES.

Also, the author's document discusses protecting BGP to prevent
some of the recent denial-of-service attacks,
and asks for confirmation about the assertion in a message
on the IPSEC mailing list suggesting
   E.g., it is not feasible for BGP routers to be configured with the
   appropriate certificate authorities of hundreds of thousands of peers.
Routers typically use BGP to peer with a small number of partners,
though some big ISP gateway routers might peer with a few hundred.
(A typical enterprise router would have 2-3 peers if it does BGP.)
If a router wants to learn full internet routes from its peers,
it might learn 1-200,000, but that's not the number of direct connections
that it has - it's information it learns using those connections.
And the peers don't have to be configured rapidly without external 
assistance -
you typically set up the peering link when you're setting up the
connection between an ISP and a customer or a pair of ISPs,
and if you want to use a CA mechanism to certify X.509 certs,
you can set up that information at the same time.



Bill Stewart  [EMAIL PROTECTED] 



Re: potential new IETF WG on anonymous IPSec

2004-09-11 Thread Joe Touch

Bill Stewart wrote:
At 12:57 PM 9/9/2004, Hal Finney wrote:
   http://www.postel.org/anonsec
To clarify, this is not really anonymous in the usual sense.  Rather it
is a proposal to an extension to IPsec to allow for unauthenticated
connections.  Presently IPsec relies on either pre-shared secrets or a
trusted third party CA to authenticate the connection.  The new proposal
would let connections go forward using a straight Diffie-Hellman type
exchange without authentication.  It also proposes less authentication
of IP message packets, covering smaller subsets, as an option.

I read the draft, and I don't see how it offers any improvement
over draft-ietf-ipsec-internet-key-00.txt or Gilmore's proposal touse 
open secret as a not-very-secret pre-shared secret
that anybody who wants to can accept.
That is part of the solution, but not all, as noted below.
It does introduce some lower-horsepower alternatives for
authenticating less than the entire packet, and suggests
using AH which I thought was getting rather deprecated these days,
but another way to reduce horsepower needs is to use AES instead of 3DES.
That is corrected in  draft-touch-tcp-antispoof, which contains the BGP 
focus of anonsec-00; anonsec-01 (to appear in about 2 weeks) focuses on 
just the anonsec portion of 00.

Also, the author's document discusses protecting BGP to prevent
some of the recent denial-of-service attacks,
and asks for confirmation about the assertion in a message
on the IPSEC mailing list suggesting
   E.g., it is not feasible for BGP routers to be configured with the
   appropriate certificate authorities of hundreds of thousands of peers.
Routers typically use BGP to peer with a small number of partners,
though some big ISP gateway routers might peer with a few hundred.
(A typical enterprise router would have 2-3 peers if it does BGP.)
If a router wants to learn full internet routes from its peers,
it might learn 1-200,000, but that's not the number of direct connections
that it has - it's information it learns using those connections.
And the peers don't have to be configured rapidly without external 
assistance -
you typically set up the peering link when you're setting up the
connection between an ISP and a customer or a pair of ISPs,
and if you want to use a CA mechanism to certify X.509 certs,
you can set up that information at the same time.
Thanks for that input; the claim that BGP in core Internet routers 
required intractible setup for TCP-MD5 has been refuted by experience 
noted during the TCPM WG meeting in San Diego as well. This section of 
tcp-antispoof will be updated accordingly.

Joe

Bill Stewart  [EMAIL PROTECTED]


signature.asc
Description: OpenPGP digital signature


A nice little dose of pop conspiracy theory...

2004-09-11 Thread Tyler Durden
Actually, despite some of the fairly dubious what about this! points, 
there are some things that are a little unsettling. No way that's a Boeing 
757, and it's not like they can just lose one (ie, there should have been 
one unaccounted for). And I was unaware of the possibility that the FBI had 
quickly confiscated tapes that would show the 'plane' more clearly.

So for what it's worth...
http://pixla.px.cz/pentagon.swf
-TD
_
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



Re: Call for 'hackers' to try to access voting machines draws stern warning

2004-09-11 Thread R. A. Hettinga
At 7:56 AM -0700 9/11/04, Major Variola (ret) wrote:
The No paper trail, no trust coalition

In St. Thomas, of course, it's No paper trail, no trus' mon. ;-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Call for 'hackers' to try to access voting machines draws stern warning

2004-09-11 Thread Major Variola (ret)
t 06:59 PM 9/10/04 -0400, R. A. Hettinga wrote:
http://www.virginislandsdailynews.com/index.pl/article?id=7181775
Call for 'hackers' to try to access voting machines draws stern warning

 The warning came after Elections officials received a faxed document
last
week stating that a $10,000 cash award would be offered to anyone who
can
successfully hack into electronic voting machines to prove whether
vote
tallies can be changed.

Sounds like a good idea for social hacking in the States, too.
The No paper trail, no trust coalition needs only a bit of typesetting

and some glue to make the point.  Art is not a crime.  Political sarcasm

is art.  I'm surprised that flyers haven't appeared in SF yet; art is
not
just for the playa.  Even better, give Diebold's URL on the flyer...









Re: BrinCity 2.0: Mayor outlines elaborate camera network for city

2004-09-11 Thread Major Variola (ret)
At 12:50 PM 9/11/04 +0200, Nomen Nescio wrote:
So, since this is titled BrinCity, it surely means that the image
streams will be available from a web site and that we the people get
cameras in the emergency response center and the mayor's office?

Is adultery a crime in Chicago?  Given the predilication for peripheral
pussy by
those in power, the cameras could be used to track them.  Conspiracy
to commit a crime is also a crime.  Who knows, Gary Condit's concubine
might still be aerobic had there been enough cameras on the ingress
points
to various buildings.  Hey, its in public view.  All those homebodies
with computers could help keep the public safe.

They're not using crypto to keep the publicly funded, public images from
public
scrutiny, are they?  What do they have to hide?

.Wear light colored burkhas to survive the thermal flash.. aluminized
fabrics preferred




Re: A nice little dose of pop conspiracy theory...

2004-09-11 Thread Roy M. Silvernail
On Sat, 2004-09-11 at 10:34, Tyler Durden wrote:
 Actually, despite some of the fairly dubious what about this! points, 
 there are some things that are a little unsettling. No way that's a Boeing 
 757, and it's not like they can just lose one (ie, there should have been 
 one unaccounted for). And I was unaware of the possibility that the FBI had 
 quickly confiscated tapes that would show the 'plane' more clearly.
 
 So for what it's worth...
 
 
 http://pixla.px.cz/pentagon.swf

Interesting stuff.  The plane in the Pentagon camera shots is definitely
no 757.  Question is, where did the flight 77 equipment (the 757 that
supposedly crashed into the Pentagon) finally end up?
-- 
Roy M. Silvernail is [EMAIL PROTECTED], and you're not
Progress, like reality, is not optional. - R. A. Hettinga
SpamAssassin-procmail-/dev/null-bliss
http://www.rant-central.com



Re: Perplexing proof

2004-09-11 Thread Sarad AV


--- Major Variola (ret) [EMAIL PROTECTED] wrote:

 Can someone explain how finding regularity in the
 distribution of primes
 
 would affect any modexp() system?   Suppose that you
 have a function
 F(i) which gives you the i-th prime.  Since the PK
 systems (eg RSA, DH)
 use *randomness* to pick primes, how does being able
 to generate
 the i-th prime help?


It doesn't affect security of RSA. It only speeds up
primality testing.

Sarath.




__
Do you Yahoo!?
New and Improved Yahoo! Mail - Send 10MB messages!
http://promotions.yahoo.com/new_mail