Re: [cryptography] Kernel space vs userspace RNG

2016-05-05 Thread shawn wilson
On May 5, 2016 2:22 PM,  wrote:
>

> I think this sums it up well. Today you are thrown into having to know
> what to do specifically because it's a system level problem (matching
> entropy sources to extractors to PRNGs to consuming functions).
>
> The OS kernel does a thing well that is it's job - taking single physical
> instances of entropy sources, post processing it and making it available
> to all userland and kernel consumers.
>
> However kernel writers cannot address the full system issue because they
> don't know what hardware they are running on. They don't know if they are
> in a VM. They don't know whether or not they have access to entropic datao
> or whether something else has access to the same data.
>
> So one of the "things you should know" is if you run a modern Linux,
> Solaris or Windows on specific CPUs in specific environments (like not in
> a VM) then it can and will serve your userland programs with
> cryptographically useful random numbers, at the cost of a fairly large
> attack surface (drivers, APIs, kernel code, timing, memory etc.)
>
> Intel came down firmly on the side of enabling the userland. One
> instruction puts entropic state into the register of your running userland
> program. Smaller attack surface, simpler, quicker, serves multiple users
> whether or not they are running in on bare metal or in a VM. You have to
> trust the VM (as you do for anything else you do in a VM). Stuff is done
> in hardware to make sure it serves multiple consumers, just as an OS does
> stuff to serve multiple consumers.
>
> A SW userland RNG is an effective method to connect entropy sources you
> know about on your system to algorithms that meet your needs. The recent
> switch to NIST requiring 192 bits or greater in key strength has
> precipitated a few 256 bit SW SP800-90 implementations. I know, I wrote a
> couple of them and I've reviewed a few others that have been written in
> response to the NIST change.
>
> SW RNG code is also easy to take through certification.
> The different is you take the system through certification, not just the
> code (except for CAVS). An OS kernel writer doesn't have that advantage.
>
> So my general view is that if you are tasked with enabling random numbers
> in your application, userland is usually a better place to do it. Maybe in
> a decent library used directly by your application. Maybe with some
> trivial inline assembler. But only if you can control the entropy source
> and the sharing of it. If you can use HW features (RdRand, RdSeed, other
> entropy sources, AES-NI, Hash instructions etc.) then your SW task is
> simplified, but it assumes you know what hardware you are writing for.
> Ditto for other platforms I'm less familiar with.
>
> The mistake I have seen, particularly in certain 'lightweight' SSL
> libraries is to say "It's our policy not to do the RNG thing - we trust
> the OS to provide entropy" and read from /dev/urandom as a result (because
> /dev/random blocks on many platforms). They are trusting the thing that is
> not in a place where it can guarantee entropy sources are available. It
> will work on some platforms and will certainly fail on some platforms,
> particularly lightweight platforms with Linux kernels on CPUs with no
> deliberately designed source of entropy which is where lightweight SSL
> libraries are used most.
>

This was pretty much my thinking (though idk Intel thought similar). If
this is debatable, that's fine as long as my view isn't totally
batt-shit-crazy :)
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Kernel space vs userspace RNG

2016-05-05 Thread shawn wilson
Just reflecting on the Linux RNG thread a bit ago, is there any technical
reason to have RNG in kernel space? There are things like haveged which
seem to work really well and putting or charging code in any kernel can be
a bit of a battle (as it should be with code as complex as that involving
crypto - wouldn't want people missing an exploit your new system exposes
and accepting it*). So I wonder what the gain is for putting RNGs in the
kernel.

The only argument I can think of against this is non technical - if you
rely on users to pick their RNG implementation, they are liable to get it
wrong. This may be valid but I'm still curious about the technical reasons
for RNG in kernel space.

Also, if kernel space is really necessary, I'd think publishing as a dkms
type package would gain more traction for getting into mainline (but this
is probably OT here)

* Obviously that same argument can be made of userspace programs but I'd
much prefer my exploits happen at a less privileged ring whenever possible
:)
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] IIRC, there was discussion on this list a while back about D-Wave...

2015-12-08 Thread shawn wilson
http://www.technologyreview.com/news/544276/google-says-it-has-proved-its-controversial-quantum-computer-really-works/

Just curious what y'all think about NASA's research and Google's paper
(linked to in the article - I read the abstract, but not much else
yet) ?
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] no, don't advertise that you support SSLv2!

2015-08-04 Thread shawn wilson
Yahoo has always had lax security (weak spam filters, no bad pass lock, no
attachment virus scan). But as a news site (as long as their reporters get
to have better security), they don't do bad.
On Aug 3, 2015 10:03 PM, Patrick Pelletier c...@funwithsoftware.org
wrote:

 I was on an e-commerce site today, and was horrified when I saw the
 following badge:

 https://lib.store.yahoo.net/lib/yhst-11870311283124/secure.gif

 Did they still have SSLv2 enabled?  I checked, and luckily they don't:

 https://www.ssllabs.com/ssltest/analyze.html?d=us-dc2-order.store.yahoo.net

 So, it's not as bad as their badge claims, but still, they only get a C.
 (They support only one version: TLS 1.0.)  I would've thought a big Web
 property like Yahoo could do better.  :(

 --Patrick

 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] GoVPN -- reviewable secure state-off-art crypto free software VPN daemon

2015-05-04 Thread shawn wilson
On May 4, 2015 5:09 AM, Jane laterc...@consultant.com wrote:

 Actually, in my oh so very humble opinion, world has enough reasonably
good VPNs that can operate on reasonably good connections.

 What is lacking is something that can function transparently and
effectively on a very flakey connection (thing lousy GPRS one) without
introducing noticeable overhead.
 Given that lousy GPRS connections are unstable, any classic VPN scheme
starts suffering a lot of connection re-negotiation overhead, which sucks
(even if the overhead for a single instance of properly negotiating a
session key is minuscle, when you do it every goddamn time connection is
lost, it starts adding up really fast).
 Also, hearbeating tends to eat mobile battery pretty fast.


What you're looking for is multi homed vpn, there are quite a few posts
and articles on the subject. Both OpenVPN and IPSec can do this (though
IPSec is more flexible and should do exactly what you want).
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] GeoTrust Launches GeoRoot; Allows Organizations with Their Own Certificate Authority (CA) to Chain to GeoTrust's Ubiquitous Public Root

2015-04-06 Thread shawn wilson
Good catch - it would seem 10 years old to be exact:
http://www.hostreview.com/news/050215geotrust.html

On Mon, Apr 6, 2015 at 10:30 AM, Peter Bowen pzbo...@gmail.com wrote:
 I think that press release is years old.  GeoTrust was bought by VeriSign
 years ago who was then bought by Symantec.

 This kind of agreement now requires the subordinate to be audited to the
 same standards as all other public CAs.

 On Apr 5, 2015 3:03 PM, Jeffrey Walton noloa...@gmail.com wrote:


 http://www.prnewswire.com/news-releases/geotrust-launches-georoot-allows-organizations-with-their-own-certificate-authority-ca-to-chain-to-geotrusts-ubiquitous-public-root-54048807.html

 It appears Google's Internet Authority G2 (https://pki.google.com)
 could be part of this program since the subordinate CA is certified by
 GeoTrust Global CA. If you look at the certificate, it is *not* name
 constrained so Google can mint certificates for any domain (and not
 just its web properties). I'm not too worried about Google. But I
 can't say the same for any old organization that joins this program.

 Both the IETF and CA/B Forums have name constraints that could be used
 to enforce policy. The relevant documents are RFC 5280, 4.2.1.10 Name
 Constraints and Baseline Requirements, 9.7 Technical Constraints in
 Subordinate CA Certificates via Name Constraints.

 I'm not sure if the program targeting organizations as a subordinate
 CA is a bad idea or if GeoTrust is doing a bad job by not using name
 constraints. But as it stands, I don't like the smell of things.
 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography


 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Underhanded Crypto Contest - All Entries Published

2015-03-22 Thread shawn wilson
I skimmed a few of those and noticed two submissions for signature
issues: RyanCastellucci, and AleksanderEssex. Is it normal for people
to find issues with the signing/verification process or is this just
coincidence?

On Sat, Mar 21, 2015 at 5:44 PM, Adam Caudill a...@adamcaudill.com wrote:
 FYI - All of the entries received for the Underhanded Crypto Contest have
 now been published. See here for the list and downloads:

 https://underhandedcrypto.com/2015/03/21/all-underhanded-crypto-entries/

 --Adam Caudill
 http://adamcaudill.com

 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Crypto Vulns

2015-03-08 Thread shawn wilson
On Mar 7, 2015 9:11 PM, coderman coder...@gmail.com wrote:

 On 3/7/15, Dave Horsfall d...@horsfall.org wrote:
  On Sat, 7 Mar 2015, Kevin wrote:
 
   No 1 vulnerability of crypto is the user
   2nd passphrases
   3rd overconfidence
   4th trust in the producer
   5th believing backdoors are No. 1
 
  I don't agree that the user should be first on that list unless you are
  talking about poor implementation.
 
  How would you arrange them, then?  I seem to recall that Enigma was
broken
  largely due to sloppy user practices e.g. weak message key, re-use of
  keys, repeating same message with a weaker scheme, etc.  Used properly,
  Enigma would've been unbreakable at the time.


 1. failed software and security engineering. [#'s 1, 2, 4 above all
 reduce to this error.]

I strongly agree with this. For example, people are told to use a password
managers for each site and most people end up with the same password across
hundreds of sites - is that a user failure or one of software? I copy and
paste passwords between pgp files and browsers all the time but I don't
expect my mom to.

 2. overconfidence [believing backdoors or nation state attacks are
 your weakness is overconfidence in the rest of your threat model]

Well kinda (not necessarily overconfidence but the example). How about
this: would the creator of gnupg be getting $100k per year (I think it's
renewed in 5 years - I suspect it will be) without the NSA things? Point
being, jumping at shadows can cause productive fear (until you die of a
heart attack).

 3. complacency [if everything else is in place, letting habit slide to
 convenience, then to compromise, will result in sorrow.]


Orgs with otherwise pretty damn secure software setups do education next to
teach their people how not to mess up again (this is generally done after a
pentest). However, your average organization isn't going to do this - your
average person can't do this. So I wonder whether we really want to change
habits or make software that learns to conform to the user while staying
secure.

 some would say that truly strong, usable crypto systems with integrity
 for the common public are impossible. i would retort that just because
 we don't know how to build them yet, does not mean they won't exist in
 the future. :P


We're starting to build them - take Proton Mail for example. No need to
know pgp, generate a key, verify keys (I don't use it so IDK how they
handle trust). The keys are local to you. It seems there might be
shortcomings with this but I'll give them pretty good.  And this is just
one example of how you can take a pretty sophisticated software and make it
so that end users can deal with it and aren't likely to leak data and the
like.

OTOH, systems like Active Directory that are hard to setup, not scalable,
allow downgrading of hashes, and have issues like PtH central to the
protocol. Again, not something you can blame a user for - just a badly
designed system. We can do better - should expect better.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Cryptanalysis of RADIUS MD5 cipher?

2015-02-04 Thread shawn wilson
I'd look at the rfc before asking this.

You seem to be looking for application issue (overrun or parse issues)
which has nothing to do with the crypto. IIRC the password is padded up to
112 characters - Idr much more than that.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] QODE(quick offline data encryption)

2015-01-07 Thread shawn wilson
On Wed, Jan 7, 2015 at 2:40 PM, Jeffrey Goldberg jeff...@goldmark.org wrote:
 On 2015-01-07, at 12:26 PM, Kevin kevinsisco61...@gmail.com wrote:

Any company could review it and decide if it's worth using or not.

 Hi Kevin.

 Actually that’s a part of my job within the company I work for. I’m the one 
 who can read some of the primary literature in cryptography. Now this makes 
 me unusual, not a lot of companies
 our size have someone with my skills.


And I'm betting they're Fortune 100. My point is, the company I work
for does pentesting and have seen so many issues with information that
people thought was encrypted not being encrypted and then leaked
because it was only obfuscated with some base32/64 or w/e and maybe
rotated by some value or w/e. It's kinda insane what people will do
instead of using a well vetted crypto library. So I'm fearful that
we'll stumble across someone using your library by finding some issue
with it and the client says well, we encrypted it and then well,
obviously not.

OTOH, people will be people. If you want to keep it available and hope
that no one uses it in production and that someone reviews it *shrug*.
If someone uses it vs making their own system, hopefully you're
smarter than them (probably) and it'll be harder to break than w/e
they might've done. And it would probably be a good learning exercise
if an expert got back to you with issues.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] QODE(quick offline data encryption)

2015-01-07 Thread shawn wilson
On Wed, Jan 7, 2015 at 1:26 PM, Kevin kevinsisco61...@gmail.com wrote:

 Any company could review it and decide if it's worth using or not.

Ok, lets run with that - as a company, show me the steps (make file, a
test suite in any programming language, or just english if you
prefer), explain to me the steps one would go through to verify your
crypto isn't battshit crazy?

There have discussions about frameworks to test crypto on this list
and iirc a few exist but I haven't gone though the time to figure out
how to implement something. So, if you (or anyone else) has a
verification method, I'm all ears.

And, I'm not the smartest one (on this list or even the smartest
sysadmin) but if I don't know, I wouldn't expect at least the majority
of other devs/admins to know how to verify your crypto past the
simplest code review (I wouldn't have a clue how to besides fuzzing
some stuff from the outside).

Hence I say, it's a mistake to publish any toy you want to call crypto.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] QODE(quick offline data encryption)

2015-01-06 Thread shawn wilson
So the practical reason behind everyone saying unless you have
qualifications, etc, don't do this is because, even if you make
something and say it's just for your learning or a joke or w/e,
someone (no joke) *will* use it and then some Fortune 500 will fall
over because of your joke code. So, yeah, don't do this - as in, it'd
be best to take it down for everyone's sanity.

On Tue, Jan 6, 2015 at 6:25 PM, John Young j...@pipeline.com wrote:
 At 04:55 PM 1/6/2015, you wrote:

 Yes, that is the received canon of cryptosystems:

 1.Sarcasm toward unqualified efforts,

 2. Designing cryptosysystems is *hard*.

 3. No, that's too mild, it's mindblowingly* hard.

 4. It doesn't start with code, it strts with mathematical description.

 5. No, even that is not true, it starts with years of study.

 6. Denizens of this list have seen a hundred cryptosystems crash and burn.

 7. Some of them designed by very clever people.

 8. Designing crytposystems is hard.

 9. Don't even think of trying it, not unless a fewyears spent studying the
 state of the art.

 10. Sorry to be blunt.

 Not to mention how often thclaims are made despite thier sounding like
 alchemy and astrology, cultish, religious, authoritarian, scientistic,
 recruitment
 for arcane pursuit of unsolvable mysteries, and hardly applicable to the
 long
 and varied history of cryptology suffused with bizarre claims, subterfuge,
 deception, betrayal, treachery, obligatory prevarication, inherent cheating,
 diabolical misrepresentation of trustworthiness, venomous accusations
 against competitors, unrestrained dupery and duplicity against the unwary,
 citizen and royalty alike.

 Nor that mathematics is a modern innovation in cryptology and remains
 its weakest element due to inability of its applicators to wed it to code
 and hardware without recourse to alchemy and astrology favored by
 promoters, sales and PhDs who dream of math as golden key to natsec.

 QODE, QED.

 Kevin wrote:  I figured I'd start building my own open source encryption
 algorithm:  https://github.com/kjsisco/qode If you feel overwhelmed by the
 sarcasm directed your way, there is a reason for that. Designing
 cryptosystems is *hard*. No, that's too mild. Is *mindblowingly* hard. It
 doesn't start with code. It starts with a mathematical description. No, even
 that is not true: It starts with years and years of study. The denisens of
 this list have seen a hundred cryptosystem crash and burn. Some of them were
 designed by very clever people. Did I mention that designing cryptosystems
 is hard? Don't even think of trying it, not unless you have first spent a
 few years studying the state of the art. Sorry to be so blunt, but I think
 it will save you a whole lot of grief. – Harald
 ___ cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography /x-flowed



 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Gogo inflight Internet uses fake SSL certs to MITM their users

2015-01-06 Thread shawn wilson
You can smartly limit resolution in squid - I don't trust this is what
they were doing, but you could provide a better experience like this.

On Tue, Jan 6, 2015 at 11:01 AM, Peter Maxwell pe...@allicient.co.uk wrote:


 On 6 January 2015 at 15:40, Jeffrey Altman jalt...@secure-endpoints.com
 wrote:

 On 1/5/2015 8:47 PM, John Levine wrote:
 
 
  http://venturebeat.com/2015/01/05/gogo-in-flight-internet-says-it-issues-fake-ssl-certificates-to-throttle-video-streaming/
 
  They claim they're doing it to throttle video streaming, not to be evil.
 
  Am I missing something, or is this stupid?  If they want to throttle
  user bandwidth (not unreasonable on a plane), they can just do it.
  The longer a connection is open, the less bandwidth it gets.

 I suspect that throttling user bandwidth is not the goal.  Instead they
 are attempting to strip out embedded video from within http streams.
 Since the video stream might be sent over the same tcp connection as
 non-video content they can improve the user's experience by delivering
 all but the video.


 So why do they not take a more traditional approach of:

 i. blocking obvious video services (YouTube, etc) wholesale; and,

 ii. limiting sustained bandwidth per user at a level that would frustrate
 viewing video anyway.


 It's somewhat easier to do than intercepting SSL/TLS connections.



 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] best practice openssl.cnf

2014-09-15 Thread shawn wilson
Does anyone have a best practice options to use in use for self signed
certs with openssl?

I just noticed that default_md = md5 was in most examples and a
debian/ubuntu bug to up the default to sha1 and i think the best md
openssl supports is sha256. So I figured I'd see if anyone had made
some 'crypto best practice' openssl config file that I could go off
of?
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Cryptoparty 2014 - Hi my name is Ed - 2014/09/20

2014-08-18 Thread shawn wilson
I've created a @cryptopartydc twitter account where I'll put more
frequent updates.

On Sun, Aug 17, 2014 at 5:51 PM, shawn wilson ag4ve...@gmail.com wrote:
 Is anyone (or know anyone) in the DC area who would like to talk at
 this event? The focus is on defensive security, identity, and tools
 (and some UX as it relates to things like gnupg). But I'd also like to
 see some more technical talks involving math or programatic use of
 encryption.

 If anyone is interested, the hacdc forum is an open Google group or
 you can email me (I can also provide another email that I use gpg with
 if you'd prefer).


 -- Forwarded message --
 From: shawn wilson ag4ve...@gmail.com
 Date: Sun, Jun 8, 2014 at 7:27 PM
 Subject: Cryptoparty 2014 - Hi my name is Ed - 2014/09/20
 To: blab...@hacdc.org blab...@hacdc.org


 tldr:
 Speaking/links/software spreadsheet:
 https://docs.google.com/spreadsheet/ccc?key=0AlbW1qRSpLFMdEM5MzV4YTBhQ0g0ZXdveUVuXzR3ckEusp=sharing
 Meetup event: http://www.meetup.com/hac-dc/events/187948232/

 For those who don't follow the list, the back story on the subtitle
 (besides me thinking it's ironic) is:
 https://groups.google.com/a/hacdc.org/forum/#!topic/Blabber/-N8UxXMvfxU

 First, we need speakers!!! In order to have an event like the last two
 years, people need to volunteer to present on what they know. Here's
 last year's doc (for reference)
 https://docs.google.com/spreadsheet/ccc?key=0AlbW1qRSpLFMdHVlN3ZDMmNQTVlUZVJDZTA4UHZSY2cusp=sharing
 and here's this year's doc (for you to sign up and update
 software/links on [1]):
 https://docs.google.com/spreadsheet/ccc?key=0AlbW1qRSpLFMdEM5MzV4YTBhQ0g0ZXdveUVuXzR3ckEusp=sharing

 If you work at a news agency or activist group where you feel you're
 handling communication and individuals' privacy correctly maybe you or
 your CTO would like to talk about it?
 If you enjoy crypto and would like to talk about your experience, sign up.
 If you think that crypto is hard and have ideas on how to improve it
 (I know you do) maybe you should give a talk. [2]
 If you have a friends, colleges, college professors, etc who is kinda
 local who you think would add content to our discussion, get them to
 sign up to give a talk.

 On the other hand, if you'd like to become more familiar with the most
 cryptographically secure ways to store and transmit data including how
 to setup encrypted (or signed) email, FDE [3], best password hashes to
 use and how hashing works, common mistakes when creating
 passwords/making more secure passwords, etc - please come.

 Here's the meetup event: http://www.meetup.com/hac-dc/events/187948232/
 The event can still be pretty flexible (there's more going on at the
 church the week before, but I think we could work around that). I
 think I'll wait a few days to see if anyone shows any event conflicts
 (within the same sphere of computer/internet/security) but this should
 be it.

 [1] We can debate on the usefulness of an unmaintained TrueCrypt, but
 it probably should stay in that list for now.
 [2] 
 https://researchspace.auckland.ac.nz/bitstream/handle/2292/2310/02whole.pdf?sequence=2
 and later https://www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf
 [3] FDE - full disk encryption (will probably be mentioned later in this 
 thread)
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Fwd: Cryptoparty 2014 - Hi my name is Ed - 2014/09/20

2014-08-17 Thread shawn wilson
Is anyone (or know anyone) in the DC area who would like to talk at
this event? The focus is on defensive security, identity, and tools
(and some UX as it relates to things like gnupg). But I'd also like to
see some more technical talks involving math or programatic use of
encryption.

If anyone is interested, the hacdc forum is an open Google group or
you can email me (I can also provide another email that I use gpg with
if you'd prefer).


-- Forwarded message --
From: shawn wilson ag4ve...@gmail.com
Date: Sun, Jun 8, 2014 at 7:27 PM
Subject: Cryptoparty 2014 - Hi my name is Ed - 2014/09/20
To: blab...@hacdc.org blab...@hacdc.org


tldr:
Speaking/links/software spreadsheet:
https://docs.google.com/spreadsheet/ccc?key=0AlbW1qRSpLFMdEM5MzV4YTBhQ0g0ZXdveUVuXzR3ckEusp=sharing
Meetup event: http://www.meetup.com/hac-dc/events/187948232/

For those who don't follow the list, the back story on the subtitle
(besides me thinking it's ironic) is:
https://groups.google.com/a/hacdc.org/forum/#!topic/Blabber/-N8UxXMvfxU

First, we need speakers!!! In order to have an event like the last two
years, people need to volunteer to present on what they know. Here's
last year's doc (for reference)
https://docs.google.com/spreadsheet/ccc?key=0AlbW1qRSpLFMdHVlN3ZDMmNQTVlUZVJDZTA4UHZSY2cusp=sharing
and here's this year's doc (for you to sign up and update
software/links on [1]):
https://docs.google.com/spreadsheet/ccc?key=0AlbW1qRSpLFMdEM5MzV4YTBhQ0g0ZXdveUVuXzR3ckEusp=sharing

If you work at a news agency or activist group where you feel you're
handling communication and individuals' privacy correctly maybe you or
your CTO would like to talk about it?
If you enjoy crypto and would like to talk about your experience, sign up.
If you think that crypto is hard and have ideas on how to improve it
(I know you do) maybe you should give a talk. [2]
If you have a friends, colleges, college professors, etc who is kinda
local who you think would add content to our discussion, get them to
sign up to give a talk.

On the other hand, if you'd like to become more familiar with the most
cryptographically secure ways to store and transmit data including how
to setup encrypted (or signed) email, FDE [3], best password hashes to
use and how hashing works, common mistakes when creating
passwords/making more secure passwords, etc - please come.

Here's the meetup event: http://www.meetup.com/hac-dc/events/187948232/
The event can still be pretty flexible (there's more going on at the
church the week before, but I think we could work around that). I
think I'll wait a few days to see if anyone shows any event conflicts
(within the same sphere of computer/internet/security) but this should
be it.

[1] We can debate on the usefulness of an unmaintained TrueCrypt, but
it probably should stay in that list for now.
[2] 
https://researchspace.auckland.ac.nz/bitstream/handle/2292/2310/02whole.pdf?sequence=2
and later https://www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf
[3] FDE - full disk encryption (will probably be mentioned later in this thread)
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Question About Best Practices for Personal File Encryption

2014-08-17 Thread shawn wilson
I just use gpg and armor the file. If its text, there's also a vim plugin
that works perfectly with this method.
On Aug 16, 2014 12:06 AM, Mark Thomas mark00tho...@gmail.com wrote:

 I have a question for the group, if I may ask it here and in this manner
 (?).

 What are you guys using to encrypt individual files and folders or even
 entire drives like a USB?

 I am thinking that:

 1. any commercial product could be compromised and not completely secure.
 Like Apple’s FileVault2, which Apple has a key to.

 2. It is probably open source.

 3. It is probably implemented with the command line.

 Am I on the right track? If so does anyone know of a helpful guide to get
 started with OpenSSL on the command line besides the man pages?

 Regards,

 Mark
 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread shawn wilson
On Thu, Jul 10, 2014 at 10:52 PM, Tony Arcieri basc...@gmail.com wrote:
 On Thu, Jul 10, 2014 at 4:45 PM, John Young j...@pipeline.com wrote:

 This is the comsec dilemma. If a product or system becomes mainstream
 it is more likely to be overtly and/or covertly compromised.


I don't find this a dilemma - I don't use immature projects because
they haven't had time prove themselves and get stress tested. I like
the idea of LibreSSL but won't use it for at least 3 years (if it
gains traction).

 Clearly OpenSSL is a great demonstration that many eyes don't make
 bug(door?)s shallow, but if the source is available, it's certainly
 something that can be used to build trust in a system.


I don't think that's a good example at all. I think OpenSSL's issue is
feature bloat without enough time for code audits.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA Said to Exploit Heartbleed Bug for Intelligence for Years

2014-04-11 Thread shawn wilson
So I trust EFF's analysis more here. However this is newer than the latest
article I've seen from EFF. So, where's Bloomberg's technical analysis on
the subject?
On Apr 11, 2014 5:50 PM, Jeffrey Walton noloa...@gmail.com wrote:


 http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html

 The U.S. National Security Agency knew for at least two years about a
 flaw in the way that many websites send sensitive information, now
 dubbed the Heartbleed bug, and regularly used it to gather critical
 intelligence, two people familiar with the matter said.

 The NSA’s decision to keep the bug secret in pursuit of national
 security interests threatens to renew the rancorous debate over the
 role of the government’s top computer experts.

 Heartbleed appears to be one of the biggest glitches in the Internet’s
 history, a flaw in the basic security of as many as two-thirds of the
 world’s websites. Its discovery and the creation of a fix by
 researchers five days ago prompted consumers to change their
 passwords, the Canadian government to suspend electronic tax filing
 and computer companies including Cisco Systems Inc. to Juniper
 Networks Inc. to provide patches for their systems.
 ...
 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] question about heartbleed on Linux

2014-04-10 Thread shawn wilson
On Thu, Apr 10, 2014 at 10:31 PM, John Levine jo...@iecc.com wrote:
  Well, the operating system clears memory when it is allocated to a new 
 process,

 That's plenty bad, of course.

Yeah, too bad none of that memory can be made executable :)
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] The Heartbleed Bug is a serious vulnerability in OpenSSL

2014-04-08 Thread shawn wilson
On Apr 8, 2014 2:03 AM, Edwin Chu edwinche...@gmail.com wrote:

 I am not openssl expert and here is just my observation.

 TLS frame messages into length-prefixed records. Each records has a
 1 byte contentType and a 2 byte record length, followed by the record
 content and MAC.

 Heartbeat messages are TLS records with contentType 24 of this content
format:

struct {
   HeartbeatMessageType type;
   uint16 payload_length;
   opaque payload[HeartbeatMessage.payload_length];
   opaque padding[padding_length];
} HeartbeatMessage;


Here: https://github.com/FiloSottile/Heartbleed
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] [Cryptography] The Heartbleed Bug is a serious vulnerability in OpenSSL

2014-04-08 Thread shawn wilson
On Tue, Apr 8, 2014 at 3:18 PM,  tpb-cry...@laposte.net wrote:
 Message du 08/04/14 18:44
 De : ianG

 E.g., if we cannot show any damages from this breach, it isn't worth
 spending a penny on it to fix! Yes, that's outrageous and will be
 widely ignored ... but it is economically and scientifically sound, at
 some level.


 So, let's wait until another 40 million credit cards are stolen, then we 
 prove this method was used exactly, then we will try to fix it in all 
 deployments ... yeah, seems reasonable.


Keep it as is if you want. https://www.mattslifebytes.com/?p=533
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Fwd: Re: Commercialized Attack Hardware on SmartPhones

2014-03-02 Thread shawn wilson
On list
-- Forwarded message --
From: shawn wilson ag4ve...@gmail.com
Date: Mar 2, 2014 11:37 AM
Subject: Re: [cryptography] Commercialized Attack Hardware on SmartPhones
To: Tom Ritter t...@ritter.vg
Cc:

How about a dictionary and rules. Even if you choose an alphanumeric
strong pass, you're kinda limited to the phone's keyboard - you're not
going to want to switch case or between letters and special too often.
Also, IIRC Android limits length to 15 chars. I also don't think the screen
lock can be different than the boot pass (so everything I said above should
hold true).

Basically what I'm saying is use hashcat.
On Mar 2, 2014 10:34 AM, Tom Ritter t...@ritter.vg wrote:

 Hey all, wondering if anyone knows of any commercialized hardware
 (e.g. developed into a product, not just a research paper) that
 conducts attacks on powered-on, Full Disk Encrypted Android/iPhone
 phones that _isn't_ PIN guessing?

 So a powered-off FDE-ed iPhone or Android can be attacked by brute
 force with no limiting factor.  A good example of this type of
 software is Elcomsoft [0] - they brute force the passphrase.

 A powered-on FDE-ed iPhone or Android can also be attacked by manual
 or automated PIN entry - on the iPhone this can introduce a lockout,
 but not on Android.  Assuming they can't see your smudges and guess
 the PIN/Swipe/password of course.  I'm not sure if I know of a
 commercialized solution to this that does it electronically, but a
 friend of mine built a robot. [1]

 But if you have a strong passphrase, things are looking good.  But
 what about Cold Boot or DMA?

 I don't believe you can do a DMA attack against most Android phones -
 it's just a USB port.  But what about the HDMI-mini port?  And is the
 iPhone Thunderbolt/Lightning connector hooked up to DMA?

 As far as cold boot, I'm aware of the FROST paper[2], but that isn't a
 commercialized offering, nor does it seem reliable or robust enough
 for law enforcement needs.  Chip-off attacks are very unlikely.  AFAIK
 iPhone jailbreaks require you to unlock your phone for technical
 reasons, so those aren't possible without an unlocked phone (although
 I'm not positive about that.)

 Does anyone know about anything in this space? Where an 'ordinary' law
 enforcement agency (e.g. the NYPD, not the NSA) could shortcut a
 strong passphrase on a phone technically? (e.g. not beating it out of
 someone?)

 -tom

 [0] http://www.elcomsoft.com/eift.html#passcode
 [1] http://boingboing.net/2013/07/26/pin-punching-200-robot-can-br.html
 [2] https://www1.informatik.uni-erlangen.de/frost
 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] To Protect and Infect Slides

2014-01-01 Thread Shawn Wilson
If you'll notice that both political parties have expanded on the NSA's 
mission, scope, and probably funding. I doubt there are any business motives 
here. In fact, it seems to me there are the exact opposite. Though, since much 
of government is now contracted out, I do wonder who this was billed out to? 
Also sorta interesting that the possibility of the NSA contracting a French 
company (Vupen) to find exploits. I always assumed HP, Rapid7, Mandiant, etc 
would do this type of thing and that it would be easier to clear companies in 
the US. 

coderman coder...@gmail.com wrote:
On Wed, Jan 1, 2014 at 3:56 AM, Ralph Holz h...@net.in.tum.de wrote:
 Hi Jake,

 Ian Grigg just made a point on metzdowd that I think is true: if you
 want to change the NSA, you need to address the [...]
 [... money] Because the chain goes like this:

 corporate money - election campaigns - representatives - NSA


it should be noted that corporate money influence is currently aimed
at privacy eroding efforts in myriad manner.


you need to change the incentive to result in a privacy enhancing
impetus like this:
  corporate money - election campaigns - representatives -
defunding much NSA/CIA/DoD actvity.

which is implemented not just in US, but all reasonable governments,
at the same time privacy aware corporations are implementing privacy
enhancing operations and software. this can be as simple as HTTPS only
with forward secret suites, or as significant as desired.


in other words: it's even more difficult! an effective response
requires cooperation of most governments and international corporate
entities.


there are tens and tens of billions that could be trimmed from the
black budget and DoD budget while preserving a minimal, defensive
force and command, allowing for targeted, HUMINT focused operations to
replace all wholesale and endemic COMSEC vulnerability exploiting
efforts.


good luck finding the incentive of sufficient force, and defending
against the significant pushback!


best regards,
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] beginner crypto

2013-12-29 Thread Shawn Wilson


andrew cooke and...@acooke.org wrote:

it's difficult to know what would interest you, but there's a
collection of
puzzles / challenges that you can sign up for here -
http://www.matasano.com/articles/crypto-challenges/ - which are pretty
inteesting.  you get to solve problems and at the same time learn about
how to
write secure code.  andrew


Thanks for that. I emailed them - I guess they do this all by hand (which is 
sorta cool). Any other challenges like this (automated or not)?
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Password Blacklist that includes Adobe's Motherload?

2013-11-13 Thread shawn wilson
On Wed, Nov 13, 2013 at 9:13 PM, Jeffrey Walton noloa...@gmail.com wrote:
 Hi All,

 Is anyone aware of a blacklist that includes those 150 million records
 from Adobe's latest breach?


This is the only thing I've seen (haven't really looked):
http://stricture-group.com/files/adobe-top100.txt

 I tried finding a list and was not successful. Bonus points if
 implemented as a bloom filter (I'm interested in seeing how small that
 list can be in practice, and I'd like to use it for its small
 footprint).


I did some quick searching and I don't see a PAM module to take that
structure. It'd be interresting for other work we're doing if someone
knows different.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] [Cryptography] RSA equivalent key length/strength

2013-09-22 Thread Shawn Wilson
Just an example of how to spend $250M. 

Jared Hunter feralch...@gmail.com wrote:
New to the list, so I'm sorry if I missed it, but what was the evidence
presented that RSA took a $10M payoff to make Dual EC DRBG the default
in Crypto-C?

Thanks,

-Jared

 On Sep 22, 2013, at 9:01 AM, Peter Gutmann
pgut...@cs.auckland.ac.nz wrote:
 
 ianG i...@iang.org writes:
 
 One mystery is left for me.  Why so much?  It clearly doesn't cost
that much
 money to implement the DRBG, or if it did, I would have done it for
$5m,
 honest injun!  Nor would it cost that to test it nor to deploy it on
mass.
 Documentation, etc.
 
 You're assuming that someone got passed a suitcase full of cash and
that was 
 it.  Far more likely that RSA got a $10M contract for some government
work and 
 at some point that included a request to make the ECDRBG the default
for 
 insert plausible-sounding reason here.  All quite above board,
nothing 
 terribly suspicious to raise eyebrows.
 
 Peter.
 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] [Cryptography] RSA equivalent key length/strength

2013-09-22 Thread Shawn Wilson


James A. Donald jam...@echeque.com wrote:
On 2013-09-22 23:01, Peter Gutmann wrote:

 You're assuming that someone got passed a suitcase full of cash and
that was
 it.  Far more likely that RSA got a $10M contract for some government
work and
 at some point that included a request to make the ECDRBG the default
for
 insert plausible-sounding reason here.  All quite above board,
nothing
 terribly suspicious to raise eyebrows.

Possibly, but security agencies do tend to use the suitcase full of
cash 
gambit, not to mention the we know where your children live gambit.  

Do we have any proof of this? Is there any record of how we did business with 
Crypto-AG? 

This, however, because done in secret, tends to be even more wasteful 
and expensive that the supposedly above ground government contract.

Well yes, windows with noise and radiation deflection or refraction and blast 
resistant probably cost more than those in your dining room. 

Also, we read this (and most of us are involved with this in some capacity for 
a living). This makes us spend a bit more time (and possibly money) securing 
our data. For example, the company I work for does lots of pentests - do you 
think we use an Active Directory domain? So if I'm working at a place that 
figures how to listen to LTE, do you think I'm going to let my employees use 
LTE? How much does it cost to get end to end encryption on a modern phone? How 
many models and chips do I reverse engineer? How many Angry Birds APKs do I do 
dynamic (and maybe static) analysis on? The report said they obtained 
information through hacking. So how much does their ingress and egress 
monitoring cost? What types of monitoring have they developed for mobile 
devices (bet someone like Mandiant has a killer contract for this)? 

You see $250 and wonder how you can spend that much. I see that and think for 
that price can I have another. 


For a security agency to order a pizza costs ten million dollars.

Again some proof would be nice. I've heard there is (or was) a BestBuy in the 
Pentagon that has standard prices on items. I'll bet that store is highly 
subsidized (scanning people and packages, shielding, etc) but I'd doubt the 
store sees much (any?) more profit above their other stores. 

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Image hash function

2013-09-20 Thread shawn wilson
Does anyone have a list of processes people have come up with to create
images for hashes? The only one that I'm aware of is the randomart that
is generated when creating a keypair for ssh (
http://www.ece.cmu.edu/~adrian/projects/validation/validation.pdf)

I wanted a fuzzy solution - so an image would be similar but not the same
for a given key. Say some type of fractal or optical ilusion with static
that didn't defeat the ilusion or something like that?
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Introducing TDMX - Trusted Domain Messaging eXchange (Specification)

2013-09-19 Thread shawn wilson
Per the purpose - this is to encrypt messages that generally traverse
TCP/53 (zone transfer and the like), correct?


On Thu, Sep 19, 2013 at 4:37 PM, pjklau...@gmail.com wrote:

 Dear cryptographers,

 I've been working privately on the design and proof-of-concept of an
 enterprise messaging oriented middleware, named Trusted Domain Messaging
 eXchange. Think of it as an amalgamation of secure email and file transfer
 with end2end encryption and mutual authorization. The specification is a
 work in progress at [1].

 Being a software engineer and not a hard core cryptographer - it would be
 great to get some expert opinions on the concept and in particular the
 proposed crypto scheme in the chapter Cryptography. Several concrete
 implementations are spec'ed out which offer PFS and the option to cascade
 ciphers.

 I'm happy to answer any questions you might have.

 - Peter Klauser.

 [1] http://tdmx.org

 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] urandom vs random

2013-08-20 Thread Shawn Wilson
Not exactly. I think havaged is better at this as you're relying on the same 
type of data but with a single source. I also don't believe you want a 
microphone inline in order to do this. You should rely purely on electric noise 
with the ADC/mixer. I don't even think the volume level affects the quality of 
the randomness. Though I think you generate more random bits at higher 
levels. 

Again, at this point, I trust a modern linux kernel or havaged more than a 
rigged solution. 



-Original Message-
From: James A. Donald jam...@echeque.com
To: cryptography@randombit.net
Sent: Tue, 20 Aug 2013 5:54
Subject: Re: [cryptography] urandom vs random

On 2013-08-20 1:31 AM, ianG wrote:
 It's a recurring theme -- there doesn't seem to be enough market 
 demand for Hardware RNGs.

Every microphone is a hardware RNG

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] urandom vs random

2013-08-19 Thread shawn wilson
They're also not super good. They barely keep up with my ssh traffic and it
took ages to create a key for whatever Arch wanted (don't recall what).


On Mon, Aug 19, 2013 at 10:21 AM, Harald Hanche-Olsen
han...@math.ntnu.nowrote:

 [Aaron Toponce aaron.topo...@gmail.com (2013-08-19 13:20:45 UTC)]

  I'm currently working on a program to feed the random data found
  from an RTL-SDR dongle into the entropy pool. Then just tune to an
  empty frequency, and let atmospheric noise rule.

 The raspberry pi supposedly has a hardware RNG built in.
 Perhaps one could be used as a random data dongle?
 It's not like they're super expensive.


 http://scruss.com/blog/2013/06/07/well-that-was-unexpected-the-raspberry-pis-hardware-random-number-generator/

 - Harald
 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] urandom vs random

2013-08-19 Thread shawn wilson
On Mon, Aug 19, 2013 at 11:31 AM, Aaron Toponce aaron.topo...@gmail.comwrote:


 Hopefully they rise like a phoenix, and their product is for sale again. I
 would like to purchase more.


No kidding. I think someone on here told me about them and I tried to get
one a bit later and couldn't. I think the company I work for might also get
a few as well. It's not like they're the only ones that sell these, but
they /were/ the only ones to sell USB PRNG at $800.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] urandom vs random

2013-08-16 Thread shawn wilson
I thought that decent crypto programs (openssh, openssl, tls suites)
should read from random so they stay secure and don't start generating
/insecure/ data when entropy runs low. The only way I could see this
as being a smart thing to do is if these programs also looked at how
much entropy the kernel had and stopped when it got ~50 or so. Is this
the way things are done when these programs use urandom or what?
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] urandom vs random

2013-08-16 Thread shawn wilson
On Fri, Aug 16, 2013 at 10:03 AM, Swair Mehta swairme...@gmail.com wrote:

 As far as I know, there is no measure like 50 or so for /dev/random.


/proc/sys/kernel/random/entropy_avail
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Crack Me If You Can!

2013-08-02 Thread shawn wilson
Figured some here might be interrested in this...


Our password cracking contest started about 4 hours ago.  Register
online and play along at home!

Or just watch the pretty stats as the participants duke it out.

http://contest-2013.korelogic.com/

And I really need to go to bed.

--
You received this message because you are subscribed to the Google
Groups NoVAHackers group.
To unsubscribe from this group and stop receiving emails from it, send
an email to novahackers+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] OpenPGP adoption post-PRISM

2013-07-30 Thread shawn wilson
On Tue, Jul 30, 2013 at 1:51 AM, Andreas Bürki abue...@anidor.com wrote:


 Am 30.07.2013 01:25, schrieb Tony Arcieri:
 Here's the source of the data, if you're curious:

 https://sks-keyservers.net/

 To me as a boring consumer it looks curious, right:

 https://www.ssllabs.com/ssltest/analyze.html?d=sks-keyservers.nethideResults=on


What exactly are you pointing out here?

If this were a timely graph (ie, one made to indicate the trend
before/after the NSA leaks) it might've been limited to the beginning
of the year and 3.2M and have put markers for certain events (I'd
like to see this graph anyway if anyone wants to make it). The chart
looks pretty honest to me (I have nothing to dispute the numbers or
the source nore any feeling that the trend is wrong).
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Integrety checking GnuPG

2013-05-30 Thread shawn wilson
I was not asked to keep this off list but removing attribution just in
case.


 On Thu, May 30, 2013 at 8:49 PM, shawn wilson ag4ve...@gmail.com wrote:
  Thanks for all of the input. In the end I think I'm going to go with
  the simplest solution (along the way, I found ima-linux and signelf).
 
  Let me know if what issues there are with this:
  Encrypt the LUKS passkey in a text file.
  Encrypt a user defined message and file checksums in another file with
  a different password. Decrypt this file first and display the message
  (letting the user know that if it doesn't look right, they should
  stop). Get the hashes of all of the files and compare them with the
  data in the text file and report if anything didn't match. If all is
  good, prompt for the password of the second file.
 If the evil maid installs herself in the BIOS or a periphery's ROM,
 then there's not a lot you can do. The user's password will always be
 exposed. You could even boot to a thumb drive, perform the integrity
 check, and things would still look fine from the outside.


If the hardware is altered in an undetectable manner, you're right. But is
the boot image is altered (ROM or otherwise) the checksum process would
fail. I could even have a simple pass/fail test case to show the user that
diff or comm were not altered.

Also, I think there is kernel support for reading most BIOS models. So
maybe next, I should look into that. Though, I think at the point of
altering hardware is where I need to call it quits - someone could modify
any PCI card and as long as it was loaded at that point, there will be at
least some leakage and I can't verify everything. Either way, I'll see how
far I can get with dumping hardware data and hashing it as well.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Integrety checking GnuPG

2013-05-29 Thread shawn wilson
I guess I should've said what my use case is:
I want a boot system that unlocks a partition where everything is
checked to prevent an evil maid attack. I can sign / check everything
but the key and the integrity checker. However, someone could replace
gpg with a version that logs to something. I could use some system
like tripwire to check the files but this just moves the vulnerable
component to something else.

Maybe it's possible to use a signed kernel module that does the
integrety checking of the files via a hash that could be compiled into
the kernel?

Again, this is for a boot system. So I'm in initramfs at this point
(shouldn't matter but just thought I'd mention it).

On Wed, May 29, 2013 at 1:58 AM, Erick Staal elst...@xs4all.nl wrote:
 Herewith my 2c:

 - run static code analyzer against GPG source code (e.g. llvm's scan-build).
 Verify GPG source code against keys provided after downloading. (Of course
 is manual inspection also a possibility, but at least for our team
 scan-build catches more errors than the humans involved).
 - Question: do you trust your toolchain?.
 - Compile from inspected source on a different (never Internet connected and
 cleanly installed) system.
 - generate checksums on binary and other related files.
 - generate GPG keys.
 - burn GPG binary and GPG keys to CD.
 - mount CD (read-only) on system-at-risk using a cd-player without writing
 capability.
 - run GPG from CD.

 Caveat: doesn't protect against e.g. live in-memory attacks on running GPG
 and/or on data presented to user on screen, but minimizes the risk for a lot
 of other possible mischief.
 Criticisms concerning cookbooklet above more than welcome.

 Sincerely, Erick






 On 05/29/2013 07:20 AM, shawn wilson wrote:

 This is sort of a trusting trust question. However, is there a way to
 have gpg verify it has not been altered? Maybe by compiling it with an
 internal key file and it asking for a password before decrypting
 itself and then presenting some type of verification. I'm asking
 whether something like this exists or is possible? Ie, how does
 malware do integrety checking / try to thwart people from running it
 if something is amiss? Can this type of thing be put into gpg?
 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography

 ___
 cryptography mailing list
 cryptography@randombit.net
 http://lists.randombit.net/mailman/listinfo/cryptography
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Here's What Law Enforcement Can Recover From A Seized iPhone

2013-03-28 Thread shawn wilson
On Mar 27, 2013 11:38 PM, Jeffrey Goldberg jeff...@goldmark.org wrote:




http://blog.agilebits.com/2012/03/30/the-abcs-of-xry-not-so-simple-passcodes/


Days? Not sure about the algorithm but both ocl and jtr can be run in
parallel and idk why you'd try to crack a password on an arm device anyway
(there's a jtr page that compares platforms and arm is god awful slow).
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Interactive graph of the CA ecosystem

2012-12-14 Thread shawn wilson
On Fri, Dec 14, 2012 at 11:10 AM, Bernhard Amann
bernh...@icsi.berkeley.edu wrote:
 Hi,

 On Dec 14, 2012, at 4:25 AM, Ralph Holz h...@net.in.tum.de wrote:

 Root-CAs are pictured as red nodes, intermediate CAs are green.
 The node diameter scales logarithmically with the number of
 certificates signed by the node. Similarly, the color of the green
 nodes scales proportional to the diameter.

 Hm, I do have a question. Thawte EV has an outbound link to Thawte
 Root, similarly TUM has an outbound link to DFN. I would understand
 outbound as indicating the direction of the signature, i.e. DFN -
 TUM. So I would have expected the link between TUM and DFN to be
 inbound when I click on TUM. But it seems to be consistenly applied,
 so I guess that was a conscious choice?

 Well, we chose to represent the relationships between the certificates
 the other way round - the child certificates point to their parent CA. 
 However,
 this is a purely semantical issue - for your point of view we just would
 have to reverse all links.


To that end, have y'all thought of other views that would be
interesting to have? Also, can you put more meta data along with the
provider? Such as address, parent company, how long they've been a CA,
(if it's known) how many certs they've signed?
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography