Re: [gentoo-user] Internet security.

2013-09-09 Thread Adam Carter

 [2]

 http://michael.orlitzky.com/articles/why_im_against_ca-signed_certificates.php
 .


I like to state some of what you say here as website certificates are only
as trusted as the LEAST trustworthy CA in the trusted certificate store


Re: [gentoo-user] Internet security.

2013-09-09 Thread Pavel Volkov
On Mon, Sep 9, 2013 at 6:05 AM, Michael Orlitzky mich...@orlitzky.comwrote:

 The CA infrastructure was never secure. It exists to transfer money away
 from website owners and into the bank accounts of the CAs and browser
 makers. Security may be one of their goals, but it's certainly not the
 motivating one.


Well, at least CAcert doesn't exist for money.



 To avoid a tirade here, I've already written about this:

 [1]

 http://michael.orlitzky.com/articles/in_defense_of_self-signed_certificates.php

 [2]

 http://michael.orlitzky.com/articles/why_im_against_ca-signed_certificates.php


I've got a question about Gentoo in this case. If we assume that stage3 is
trusted, does portage check that mirrors are trusted? I'm not sure about
this. But if it does, then distfiles checksums are also checked, so they
are trusted, too. In this case you could trust a running browser. Until
your system becomes compromised in other ways.
This would be OS packaging system problem, not the problem with CA--user
trust model.


Re: [gentoo-user] Internet security.

2013-09-09 Thread thegeezer
There's a lot FUD out there and equally there is some truth.  the NSA
we can decrypt everything statement was really very vague, and can
easily be done if you have a lot of taps (ala PRISM) and start doing
mitm attacks to reduce the level of security to something that is
crackable.
for 'compatibility' very many low powered encryption schemes are
supported and it is these that are the issue.
if you are using ipsec tunnels with aes encryption you can happily
ignore these.
if you are using mpls networks you can almost guarantee your isp and
therefore your network is compromised.
the question really is what do you define as security ?
if someone was to hit you on the head with a hammer, how long til you
willingly gave out your passwords ? [1]
I agree with the lack of faith in certificate CA's and i feel that the
reason that warnings over ssl are so severe is to spoon feed folks into
the owned networks. I far more trust the way mozilla do their web of
trust [2] but equally am aware that trolls live in the crowds.
while ssh authorized_keys are more secure than passwords, i can't (and
am hoping someone can point me to) find how to track failed logins as
folks bruteforce their way in.  yes it's orders of magnitude more
difficult but then internet speed is now orders of magnitude faster, and
OTP are looking more sensible every day [3] to me.
i used to use windows live messenger and right near the end found that
if you send someone a web link to a file filled with /dev/random called
passwords.zip you would have some unknown ip connect and download it too.
who then is doing that and i trust skype and it's peer2peer nonsense
even less.
who even knows you can TLS encrypt SIP ?
there are many ways of encrypting email but this is not supported from
one site to another, even TLS support is often lacking, and GPG the
contents means that some folks you send email to cannot read it -- there
is always a trade off between usability and security.
i read in slashdot that there is a question mark over SELinux because it
came from the NSA [4] but this is nonsense, as it is a means of securing
processes not network connections.  i find it difficult to believe that
a backdoor in a locked cupboard in your house can somehow give access
through the front door.
how far does trust need to be lost [5] before you start fabricating your
own chips ?   the complexity involved in chip fabs is immense and if
bugs can slip through, what else can [6]
ultimately a multi layer security approach is required, and security
itself needs to be defined.
i like privacy so i have net curtains, i don't have a 3 foot thick
titanium door with strengthened hinges.
if someone looks in my windows, i can see them. either through the
window or on cctv.
security itself has to be defined so that risk can be managed.
so many people buy the biggest lock they can find and forget the hinges.
or leave the windows open. 
even then it doesn't help in terms of power failure or leaking water or
gas mains exploding next door (i.e. the definition of security in the
sense of safety)
to some security means RAID, to others security means offsite backup
i like techniques such as port knocking [7] for reducing the size of the
scan target
if you have a cheap virtual server on each continent and put asterisk on
each one; linked by aes ipsec tunnels with a local sip provider in each
one then you could probably hide your phone calls quite easily from
snoops.  until they saw your bank statement and wondered what all these
VPS providers and SIP accounts were for, and then the authorities if
they were tracking you would go after those.  why would you do such a
thing? perhaps because you cannot trust the monopoly provider of a
country to screen its equipment [8]
even things like cookie tracking for advertising purposes - on the
lighter side what if your kids see the ads for the stuff you are buying
them for christmas ?  surprise ruined?  where does it stop - its one
thing for google to announce governments want your search history, and
another for advertising companies to sell your profile and tracking,
essentially ad companies are doing the governments snooping job for them.
ultimately it's down to risk mitigation. do you care if someone is
snooping on your grocery list? no? using cookie tracking ?  yeah
profiling is bad - wouldn't want to end up on a terrorist watchlist
because of my amusement with the zombie apocalypse listmania [9]
encryption is important because you don't know what other folks in the
internet cafe are doing [10]
but where do you draw the line ?
if you go into a shop do you worry that you are on cctv ?

ok i'll stop ranting now, my main point is always have multi layered
security - and think about what you are protecting and from whom

[1] http://xkcd.com/538/
[2] https://addons.mozilla.org/en-US/firefox/addon/wot-safe-browsing-tool/
[3] http://blog.tremily.us/posts/OTP/
[4]

Re: [gentoo-user] Internet security.

2013-09-09 Thread Bruce Hill
On Mon, Sep 09, 2013 at 10:36:09AM +0100, thegeezer wrote:
 There's a lot FUD out there and equally there is some truth.  the NSA
 we can decrypt everything statement was really very vague, and can
 easily be done if you have a lot of taps (ala PRISM) and start doing
 mitm attacks to reduce the level of security to something that is
 crackable.
 for 'compatibility' very many low powered encryption schemes are
 supported and it is these that are the issue.
 if you are using ipsec tunnels with aes encryption you can happily
 ignore these.
 if you are using mpls networks you can almost guarantee your isp and
 therefore your network is compromised.
 the question really is what do you define as security ?
 if someone was to hit you on the head with a hammer, how long til you
 willingly gave out your passwords ? [1]
 I agree with the lack of faith in certificate CA's and i feel that the
 reason that warnings over ssl are so severe is to spoon feed folks into
 the owned networks. I far more trust the way mozilla do their web of
 trust [2] but equally am aware that trolls live in the crowds.
 while ssh authorized_keys are more secure than passwords, i can't (and
 am hoping someone can point me to) find how to track failed logins as
 folks bruteforce their way in.  yes it's orders of magnitude more
 difficult but then internet speed is now orders of magnitude faster, and
 OTP are looking more sensible every day [3] to me.
 i used to use windows live messenger and right near the end found that
 if you send someone a web link to a file filled with /dev/random called
 passwords.zip you would have some unknown ip connect and download it too.
 who then is doing that and i trust skype and it's peer2peer nonsense
 even less.
 who even knows you can TLS encrypt SIP ?
 there are many ways of encrypting email but this is not supported from
 one site to another, even TLS support is often lacking, and GPG the
 contents means that some folks you send email to cannot read it -- there
 is always a trade off between usability and security.
 i read in slashdot that there is a question mark over SELinux because it
 came from the NSA [4] but this is nonsense, as it is a means of securing
 processes not network connections.  i find it difficult to believe that
 a backdoor in a locked cupboard in your house can somehow give access
 through the front door.
 how far does trust need to be lost [5] before you start fabricating your
 own chips ?   the complexity involved in chip fabs is immense and if
 bugs can slip through, what else can [6]
 ultimately a multi layer security approach is required, and security
 itself needs to be defined.
 i like privacy so i have net curtains, i don't have a 3 foot thick
 titanium door with strengthened hinges.
 if someone looks in my windows, i can see them. either through the
 window or on cctv.
 security itself has to be defined so that risk can be managed.
 so many people buy the biggest lock they can find and forget the hinges.
 or leave the windows open. 
 even then it doesn't help in terms of power failure or leaking water or
 gas mains exploding next door (i.e. the definition of security in the
 sense of safety)
 to some security means RAID, to others security means offsite backup
 i like techniques such as port knocking [7] for reducing the size of the
 scan target
 if you have a cheap virtual server on each continent and put asterisk on
 each one; linked by aes ipsec tunnels with a local sip provider in each
 one then you could probably hide your phone calls quite easily from
 snoops.  until they saw your bank statement and wondered what all these
 VPS providers and SIP accounts were for, and then the authorities if
 they were tracking you would go after those.  why would you do such a
 thing? perhaps because you cannot trust the monopoly provider of a
 country to screen its equipment [8]
 even things like cookie tracking for advertising purposes - on the
 lighter side what if your kids see the ads for the stuff you are buying
 them for christmas ?  surprise ruined?  where does it stop - its one
 thing for google to announce governments want your search history, and
 another for advertising companies to sell your profile and tracking,
 essentially ad companies are doing the governments snooping job for them.
 ultimately it's down to risk mitigation. do you care if someone is
 snooping on your grocery list? no? using cookie tracking ?  yeah
 profiling is bad - wouldn't want to end up on a terrorist watchlist
 because of my amusement with the zombie apocalypse listmania [9]
 encryption is important because you don't know what other folks in the
 internet cafe are doing [10]
 but where do you draw the line ?
 if you go into a shop do you worry that you are on cctv ?
 
 ok i'll stop ranting now, my main point is always have multi layered
 security - and think about what you are protecting and from whom
 
 [1] http://xkcd.com/538/
 [2] 

Re: [gentoo-user] Internet security.

2013-09-09 Thread thegeezer
 When a top-post is that long did you read it before noticing?

 Well, if you opened this email, All ur base r belong to us!

:$  oops, was more focussed on my rant than the etiquette


Re: [gentoo-user] Internet security.

2013-09-09 Thread Michael Orlitzky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 09/09/2013 01:28 AM, Mick wrote:
 
 Are you saying that 2048 RSA keys are no good anymore?
 

They're probably fine, but when you're making them yourself, the extra
bits are free. I would assume that the NSA can crack 1024-bit RSA[1],
so why not jump to 4096 so you don't have to do this again in a few years?

The performance overhead is also mostly negligible: the only thing the
public key crypto is used for is to exchange a secret which is then
used to do simpler (and faster) crypto.


[1]
http://blog.erratasec.com/2013/09/tor-is-still-dhe-1024-nsa-crackable.html

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
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=Ni4r
-END PGP SIGNATURE-



Re: [gentoo-user] Internet security.

2013-09-09 Thread Michael Orlitzky
On 09/09/2013 02:50 AM, Adam Carter wrote:
 [2]
 
 http://michael.orlitzky.com/articles/why_im_against_ca-signed_certificates.php
 .
 
 
 I like to state some of what you say here as website certificates are
 only as trusted as the LEAST trustworthy CA in the trusted certificate
 store

Right, and most of them you wouldn't even consider trustworthy a priori.
If the NSA can hack or persuade *any* of them, every single website on
the net is compromised.

Here's a list of the ones included with Firefox:

http://www.mozilla.org/projects/security/certs/included/index.html

The ones in the USA, we already know, can be forced to do whatever under
gag order. Of the ones outside the USA, well, I see a couple that belong
to countries where I would be executed for the things I did this weekend.




Re: [gentoo-user] Internet security.

2013-09-09 Thread Michael Orlitzky
On 09/09/2013 03:19 AM, Pavel Volkov wrote:
 On Mon, Sep 9, 2013 at 6:05 AM, Michael Orlitzky mich...@orlitzky.com
 mailto:mich...@orlitzky.com wrote:
 
 The CA infrastructure was never secure. It exists to transfer money away
 from website owners and into the bank accounts of the CAs and browser
 makers. Security may be one of their goals, but it's certainly not the
 motivating one.
 
 
 Well, at least CAcert doesn't exist for money.
  

You sort of make my point for me:

  If you want to access a website that uses a SSL certificate signed by
  CAcert, you might get an SSL warning. We are sorry, but currently
  that's still 'normal' as mainstream browsers don't automatically
  include the CAcert Root Certificate yet. [1]

So, CACert certificates don't eliminate the browser warning, which is
the only reason you would ever pay for a certificate in the first place.
But why don't browsers include CACert?

  Traditionally vendors seeking to have their root certificates
  included in browsers (directly or via the underlying OS
  infrastructure like Safari via OS X's Keychain) would have to seek an
  expensive Webtrust audit (~$75,000 up-front plus ~$10,000 per
  year). [2]

They don't pay up! So I wouldn't include CACert in my blanket statement,
but they're not really part of the CA infrastructure and you might as
well use a self-signed cert instead if you're gonna get a warning anyway.


 I've got a question about Gentoo in this case. If we assume that stage3
 is trusted, does portage check that mirrors are trusted?

No. There's a GLEP for some of these issues:

  https://www.gentoo.org/proj/en/glep/glep-0057.html

The relevant part is,

  ...any non-Gentoo controlled rsync mirror can modify executable code;
  as much of this code is per default run as root a malicious mirror
  could compromise hundreds of systems per day - if cloaked well
  enough, such an attack could run for weeks before being noticed.



[1] http://wiki.cacert.org/FAQ/BrowserClients
[2] http://wiki.cacert.org/InclusionStatus




Re: [gentoo-user] Internet security.

2013-09-09 Thread Hinnerk van Bruinehsen
On Mon, Sep 09, 2013 at 10:36:09AM +0100, thegeezer wrote:
 There's a lot FUD out there and equally there is some truth.  the NSA we can
 decrypt everything statement was really very vague, and can easily be done if
 you have a lot of taps (ala PRISM) and start doing mitm attacks to reduce the
 level of security to something that is crackable.
 for 'compatibility' very many low powered encryption schemes are supported and
 it is these that are the issue.

I think you're right because it'll be much easier to read the data at one
endpoint than to decrypt everything. If big corporations like Google or Cisco
can be forced to cooperate (and they can - that much is fact), it'd be the
likelier way to get your data.
On the other hand e.g. Bruce Schneier warns of ECC because the NSA promoted it
intensively. So there may be some secret that helps to decrypt it in the hands
of the NSA (possible something about the NIST curve definitions that reduce the
effective keylength).
 if you are using ipsec tunnels with aes encryption you can happily ignore
 these.
This would be true if you have an secure endpoint. And I think that nowadays
nothing is secure...
 if you are using mpls networks you can almost guarantee your isp and therefore
 your network is compromised.
 the question really is what do you define as security ?
 if someone was to hit you on the head with a hammer, how long til you 
 willingly
 gave out your passwords ? [1]
 I agree with the lack of faith in certificate CA's and i feel that the reason
 that warnings over ssl are so severe is to spoon feed folks into the owned
 networks. I far more trust the way mozilla do their web of trust [2] but
 equally am aware that trolls live in the crowds.
 while ssh authorized_keys are more secure than passwords, i can't (and am
 hoping someone can point me to) find how to track failed logins as folks
 bruteforce their way in.  yes it's orders of magnitude more difficult but then
 internet speed is now orders of magnitude faster, and OTP are looking more
 sensible every day [3] to me.
 i used to use windows live messenger and right near the end found that if you
 send someone a web link to a file filled with /dev/random called passwords.zip
 you would have some unknown ip connect and download it too.
 who then is doing that and i trust skype and it's peer2peer nonsense even 
 less.
 who even knows you can TLS encrypt SIP ?
 there are many ways of encrypting email but this is not supported from one 
 site
 to another, even TLS support is often lacking, and GPG the contents means that
 some folks you send email to cannot read it -- there is always a trade off
 between usability and security.
 i read in slashdot that there is a question mark over SELinux because it came
 from the NSA [4] but this is nonsense, as it is a means of securing processes
 not network connections.  i find it difficult to believe that a backdoor in a
 locked cupboard in your house can somehow give access through the front door.
This point you get wrong. SELinux implement the LSM API (in fact the LSM API
was tailored to SELinux needs). It has hooks in nearly everything
(file/directory access, process access and also sockets). One of the biggest
concerns at the time of creation of the LSM API was rootkits hooking that
functions. It's definitively a thread. I'm not saying that SELinux contains
a backdoor (I for myself would have hidden it in the LSM part, not in SELinux
because that would enable me to use it even if other LSMs are used). If you
google for underhanded C contest you'll see that it's possible to hide
malicious behaviour in plain sight. And if the kernel is compromised all other
defenses mean nothing. (As I said,  I don't want to spread fearbut that is
something to consider imho).
 how far does trust need to be lost [5] before you start fabricating your own
 chips ?   the complexity involved in chip fabs is immense and if bugs can slip
 through, what else can [6]
 ultimately a multi layer security approach is required, and security itself
 needs to be defined.
You need an anchor from which you can establish trust. If there is a hardware
backdoor you'll not be able to fix that problem with software. There is an
excellent paper from Ken Thompson called Reflections on trusting trust that
theorizes about the possibility of a trojanized compiler that injects malicous
code and therefore makes code audits pointless. Security sadly is hard..
 i like privacy so i have net curtains, i don't have a 3 foot thick titanium
 door with strengthened hinges.
 if someone looks in my windows, i can see them. either through the window or 
 on
 cctv.
 security itself has to be defined so that risk can be managed.
 so many people buy the biggest lock they can find and forget the hinges. or
 leave the windows open. 
 even then it doesn't help in terms of power failure or leaking water or gas
 mains exploding next door (i.e. the definition of security in the sense of
 safety)
 to some security means RAID, to 

Re: [gentoo-user] Internet security.

2013-09-09 Thread Hinnerk van Bruinehsen
On Mon, Sep 09, 2013 at 04:30:31PM +0100, thegeezer wrote:
  i read in slashdot that there is a question mark over SELinux because it 
  came
  from the NSA [4] but this is nonsense, as it is a means of securing 
  processes
  not network connections.  i find it difficult to believe that a backdoor 
  in a
  locked cupboard in your house can somehow give access through the front 
  door.
  This point you get wrong. SELinux implement the LSM API (in fact the LSM API
  was tailored to SELinux needs). It has hooks in nearly everything
  (file/directory access, process access and also sockets). One of the biggest
  concerns at the time of creation of the LSM API was rootkits hooking that
  functions. It's definitively a thread. I'm not saying that SELinux contains
  a backdoor (I for myself would have hidden it in the LSM part, not in 
  SELinux
  because that would enable me to use it even if other LSMs are used). If you
  google for underhanded C contest you'll see that it's possible to hide
  malicious behaviour in plain sight. And if the kernel is compromised all 
  other
  defenses mean nothing. (As I said,  I don't want to spread fearbut that is
  something to consider imho).
 Interesting, I didn't realise LSM provisioned hooks for SELinux -
 thought it it was more modular (and less 'shoehorned') than that. 
 I need to go read about that some more now


You can start here:

http://www.freetechbooks.com/efiles/selinuxnotebook/The_SELinux_Notebook_The_Foundations_3rd_Edition.pdf

for a general overview (page 64ff has a list of the hooks).
Other than that http://www.kroah.com/linux/talks/ols_2002_lsm_paper/lsm.pdf and
http://www.nsa.gov/research/_files/publications/implementing_selinux.pdf may be
of interest (though both are quite old).

WKR
Hinnerk


signature.asc
Description: Digital signature


Re: [gentoo-user] Internet security.

2013-09-09 Thread thegeezer
 i read in slashdot that there is a question mark over SELinux because it came
 from the NSA [4] but this is nonsense, as it is a means of securing processes
 not network connections.  i find it difficult to believe that a backdoor in a
 locked cupboard in your house can somehow give access through the front door.
 This point you get wrong. SELinux implement the LSM API (in fact the LSM API
 was tailored to SELinux needs). It has hooks in nearly everything
 (file/directory access, process access and also sockets). One of the biggest
 concerns at the time of creation of the LSM API was rootkits hooking that
 functions. It's definitively a thread. I'm not saying that SELinux contains
 a backdoor (I for myself would have hidden it in the LSM part, not in SELinux
 because that would enable me to use it even if other LSMs are used). If you
 google for underhanded C contest you'll see that it's possible to hide
 malicious behaviour in plain sight. And if the kernel is compromised all other
 defenses mean nothing. (As I said,  I don't want to spread fearbut that is
 something to consider imho).
Interesting, I didn't realise LSM provisioned hooks for SELinux -
thought it it was more modular (and less 'shoehorned') than that. 
I need to go read about that some more now



Re: [gentoo-user] Internet security.

2013-09-09 Thread Dale
Dale wrote:
 Someone found this and sent it to me. 

 http://news.yahoo.com/internet-experts-want-security-revamp-nsa-revelations-020838711--sector.html


  SNIP

 Am I right on this, wrong or somewhere in the middle?

 Dale

 :-)  :-) 



I got this in my email today. 

https://www.eff.org/deeplinks/2013/08/one-key-rule-them-all-threats-against-service-provider-private-encryption-keys


It seems, I may be wrong on this tho, that some changes are being made. 
While there is a lot of info there, it also seems that each site has one
key and once you have that one key, you can then handle the whole sites
encryption.  Example:  Google, Facebook, a bank, the EFF site or whatever. 

It seems we are back to face to face and even that isn't a sure thing. 

I'm still reading some of the other posts.  It seems this is a mess with
no real sure answer since it all depends on a lot of other things. 
Mostly we don't know for sure what information the spy folks have and
what is compromised and what is not.   sighs 

Dale

:-)  :-) 

-- 
I am only responsible for what I said ... Not for what you understood or how 
you interpreted my words!




Re: [gentoo-user] Internet security.

2013-09-09 Thread thegeezer
On 09/09/2013 05:04 PM, Hinnerk van Bruinehsen wrote:
 On Mon, Sep 09, 2013 at 04:30:31PM +0100, thegeezer wrote:

 Interesting, I didn't realise LSM provisioned hooks for SELinux -
 thought it it was more modular (and less 'shoehorned') than that. 
 I need to go read about that some more now

 You can start here:

 http://www.freetechbooks.com/efiles/selinuxnotebook/The_SELinux_Notebook_The_Foundations_3rd_Edition.pdf

 for a general overview (page 64ff has a list of the hooks).
 Other than that http://www.kroah.com/linux/talks/ols_2002_lsm_paper/lsm.pdf 
 and
 http://www.nsa.gov/research/_files/publications/implementing_selinux.pdf may 
 be
 of interest (though both are quite old).

 WKR
 Hinnerk
thanks muchly :)



Re: [gentoo-user] Internet security.

2013-09-09 Thread Michael Orlitzky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 09/09/2013 01:36 PM, Pavel Volkov wrote:
 
 I noticed there's another GLEP which eliminates the mirror problem:
  http://www.gentoo.org/proj/en/glep/glep-0058.html
 
 It's marked as accepted. I hope they'll implement it in reasonable
 time.
 

This is the latest news; not much there unfortunately:

  http://thread.gmane.org/gmane.linux.gentoo.devel/87099

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
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=SbM7
-END PGP SIGNATURE-



Re: [gentoo-user] Internet security.

2013-09-09 Thread Mick
On Monday 09 Sep 2013 14:42:28 Michael Orlitzky wrote:
 On 09/09/2013 01:28 AM, Mick wrote:
  Are you saying that 2048 RSA keys are no good anymore?
 
 They're probably fine, but when you're making them yourself, the extra
 bits are free. I would assume that the NSA can crack 1024-bit RSA[1],
 so why not jump to 4096 so you don't have to do this again in a few years?

Right, but my router won't work with keys larger than 2048 and its admin GUI 
is controlled with 1024-bit public certificate.

-- 
Regards,
Mick


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Internet security.

2013-09-09 Thread Michael Orlitzky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 09/09/2013 02:07 PM, Mick wrote:
 On Monday 09 Sep 2013 14:42:28 Michael Orlitzky wrote:
 On 09/09/2013 01:28 AM, Mick wrote:
 Are you saying that 2048 RSA keys are no good anymore?
 
 They're probably fine, but when you're making them yourself, the
 extra bits are free. I would assume that the NSA can crack
 1024-bit RSA[1], so why not jump to 4096 so you don't have to do
 this again in a few years?
 
 Right, but my router won't work with keys larger than 2048 and its
 admin GUI is controlled with 1024-bit public certificate.
 

How often do you need to admin the router? Just do it from home (i.e.
on the LAN side).

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
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=N9w5
-END PGP SIGNATURE-



Re: [gentoo-user] Internet security.

2013-09-09 Thread Pavel Volkov
On Monday 09 September 2013 10:00:25 Michael Orlitzky wrote:
 No. There's a GLEP for some of these issues:
 
   https://www.gentoo.org/proj/en/glep/glep-0057.html
 
 The relevant part is,
 
   ...any non-Gentoo controlled rsync mirror can modify executable code;
   as much of this code is per default run as root a malicious mirror
   could compromise hundreds of systems per day - if cloaked well
   enough, such an attack could run for weeks before being noticed.

I noticed there's another GLEP which eliminates the mirror problem: 
http://www.gentoo.org/proj/en/glep/glep-0058.html

It's marked as accepted. I hope they'll implement it in reasonable time.

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Internet security.

2013-09-09 Thread Mick
On Monday 09 Sep 2013 20:24:56 Michael Orlitzky wrote:
 On 09/09/2013 02:07 PM, Mick wrote:
  On Monday 09 Sep 2013 14:42:28 Michael Orlitzky wrote:
  On 09/09/2013 01:28 AM, Mick wrote:
  Are you saying that 2048 RSA keys are no good anymore?
  
  They're probably fine, but when you're making them yourself, the
  extra bits are free. I would assume that the NSA can crack
  1024-bit RSA[1], so why not jump to 4096 so you don't have to do
  this again in a few years?
  
  Right, but my router won't work with keys larger than 2048 and its
  admin GUI is controlled with 1024-bit public certificate.
 
 How often do you need to admin the router? Just do it from home (i.e.
 on the LAN side).

Yes, that's how I do it, or I VPN into the LAN from the outside if there is 
some emergency.  However, the VPN SSL keys can't be any larger that 2048-bit.

-- 
Regards,
Mick


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Internet security.

2013-09-08 Thread Michael Orlitzky
On 09/08/2013 09:33 PM, Dale wrote:
 Someone found this and sent it to me. 
 
 http://news.yahoo.com/internet-experts-want-security-revamp-nsa-revelations-020838711--sector.html
 
 
 I'm not to concerned about the political aspect of this but do have to
 wonder what this means when we use sites that are supposed to be secure
 and use HTTPS.  From reading that, it seems that even URLs with HTTPS
 are not secure.  Is it reasonable to expect that even connections
 between say me and my bank are not really secure? 
 

The CA infrastructure was never secure. It exists to transfer money away
from website owners and into the bank accounts of the CAs and browser
makers. Security may be one of their goals, but it's certainly not the
motivating one.

To avoid a tirade here, I've already written about this:

[1]
http://michael.orlitzky.com/articles/in_defense_of_self-signed_certificates.php

[2]
http://michael.orlitzky.com/articles/why_im_against_ca-signed_certificates.php

Warning: they're highly ranty, and mostly preach to the choir in that I
don't give a ton of background.

The tl;dr is, use a 4096-bit self signed certificate combined with
pinning. It's not perfect, but it's as good as it gets unless you plan
to make a trip to each website's datacenter in person.




Re: [gentoo-user] Internet security.

2013-09-08 Thread Mick
On Monday 09 Sep 2013 03:05:57 Michael Orlitzky wrote:
 On 09/08/2013 09:33 PM, Dale wrote:
  Someone found this and sent it to me.
  
  http://news.yahoo.com/internet-experts-want-security-revamp-nsa-revelatio
  ns-020838711--sector.html
  
  
  I'm not to concerned about the political aspect of this but do have to
  wonder what this means when we use sites that are supposed to be secure
  and use HTTPS.  From reading that, it seems that even URLs with HTTPS
  are not secure.  Is it reasonable to expect that even connections
  between say me and my bank are not really secure?
 
 The CA infrastructure was never secure. It exists to transfer money away
 from website owners and into the bank accounts of the CAs and browser
 makers. Security may be one of their goals, but it's certainly not the
 motivating one.
 
 To avoid a tirade here, I've already written about this:
 
 [1]
 http://michael.orlitzky.com/articles/in_defense_of_self-signed_certificates
 .php
 
 [2]
 http://michael.orlitzky.com/articles/why_im_against_ca-signed_certificates.
 php
 
 Warning: they're highly ranty, and mostly preach to the choir in that I
 don't give a ton of background.
 
 The tl;dr is, use a 4096-bit self signed certificate combined with
 pinning. It's not perfect, but it's as good as it gets unless you plan
 to make a trip to each website's datacenter in person.

Are you saying that 2048 RSA keys are no good anymore?

-- 
Regards,
Mick


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Internet security.

2013-09-08 Thread Mick
On Monday 09 Sep 2013 02:33:48 Dale wrote:
 Someone found this and sent it to me.
 
 http://news.yahoo.com/internet-experts-want-security-revamp-nsa-revelations
 -020838711--sector.html
 
 
 I'm not to concerned about the political aspect of this but do have to
 wonder what this means when we use sites that are supposed to be secure
 and use HTTPS.  From reading that, it seems that even URLs with HTTPS
 are not secure.  Is it reasonable to expect that even connections
 between say me and my bank are not really secure?
 
 Also, it seems there are people that want to work on fixing this and
 leave out any Government workers.  Given my understanding of this, that
 could be a very wise move.  From that article, I gather that the tools
 used were compromised before it was even finished.  Is there enough
 support, enough geeks and nerds basically, to do this sort of work
 independently?  I suspect there are enough Linux geeks out there to
 handle this and then figure out how to make it work on other OSs.  I use
 the words geek and nerd in a complimentary way.  I consider myself a bit
 of a geek as well.  :-D
 
 One of many reasons I use Linux is security.  I always felt pretty
 secure but if that article is accurate, then the OS really doesn't
 matter much when just reaching out and grabbing data between two puters
 over the internet.  I may be secure at my keyboard but once it hits the
 modem and leaves, it can be grabbed and read if they want to even when
 using HTTPS.  Right?
 
 This is not Gentoo specific but as most know, Gentoo is all I use
 anyway.  I don't know of any other place to ask that I subscribe too.  I
 figure I would get a no comment out of the Government types.  ROFL
 Plus, there are some folks on here that know a LOT about this sort of
 stuff too.
 
 Again, I don't want a lot of political stuff on this but more of the
 technical side of, is that article accurate, can it be fixed and can we
 be secure regardless of OS.  It seems to me that when you break HTTPS,
 you got it beat already.
 
 Am I right on this, wrong or somewhere in the middle?
 
 Dale
 
 :-)  :-)

As far as I know the NSA has cracked elliptic curve algorithms and earlier SSL 
versions.  Not that you would suspect this from their peddling of it here :-p

  http://www.nsa.gov/business/programs/elliptic_curve.shtml


Latest TLS v1.2 *should* be OK, but with the advent of quantum computing who 
can tell if science fiction decryption capabilities have become reality for 
state actors.  Looking at this, you can see that loads of websites out there 
are not using strong enough encryption, so even if it worked quantum computing 
may be an overkill for many https implementations today:

  https://www.trustworthyinternet.org/ssl-pulse/

-- 
Regards,
Mick


signature.asc
Description: This is a digitally signed message part.