Hi Linus,

now I had the time to look at the Mumble project.

I might be incorrect in my assessment. I found some information but it was mostly irrelevant to make a good assessment about the security and privacy properties about it.

There seems to be the (wrong) believe that if you publish software as open source then everyone can look at the code and the quality will be good.

That's of course not the case. There are a few words here and there about security but I failed to see enough to even give me enough to say something meaningful about it.

From what I can tell the software does not interoperate with anything else other than their own silo, which is bad.

If you use a provider that runs that VoIP service then you have to trust him like with any other VoIP providers. Of course you can run your own server but then your friends have to be on your own server as well, if I understood it correctly. Maybe that's a great idea that everyone should have their own server and if you want to talk to someone then they create an account at your server and start communicating with you. (You could simplify the account creating by using identity federations, even if they don't have anything to do with VoIP.) Of course, this would be OK with gaming (which seems to be the main target audience of that VoIP platform) but not for normal communication use because it would not be obviously for anyone trying to contact you how to reach you unless you have a permanent VoIP provider.

From the point of view what we are trying, namely to develop globally interoperable VoIP solutions, this is obviously a step backwards (maybe 20 years).

What is worse, in my point of view, is that adding Tor to Mumble may not actually provide you any additional privacy/security benefits. If you trust the VoIP provider than you could very easily create an end-to-end security solution. Without Tor the other party would most likely still see the IP address of your device (or the IP address of some NAT). That's what Tor (or other tunneling technologies) could hide. The VoIP provider still knows who you are talking with and, depending on how the details look like, he may still be able to decrypt the VoIP communication.

Ciao
Hannes


On 09.09.2013 14:43, Hannes Tschofenig wrote:
Hi Linus,

thanks for the comments.

I have indeed skipped that topic. I will have to read into the Mumble
project to see what security and privacy guarantees it provides.

My current conclusion from using VoIP/IM systems without using Tor is
that you cannot really protect against collecting this transaction data
(i.e., you have to at least trust the two VSPs, our own and then the VSP
of your communication partner). While you can influence routing of the
data traffic to a certain extend it does not work too well when your VSP
is working against you.

With IM you could at least set up your own server (e.g., by using an
XMPP server) but with VoIP that's more complicated because nobody else
will accepted your connection attempts (as explained in the
interconnection part of my write-up).

I will come back to you on that issue.

Ciao
Hannes


On 09.09.2013 14:31, Linus Nordberg wrote:
Hannes Tschofenig<[email protected]> wrote
Mon, 09 Sep 2013 11:26:39 +0300:

| http://www.tschofenig.priv.at/wp/?p=997
|
| It contains a number of recommendations, which are addressed to VoIP
| providers and vendors but have to be enforced by data protection
| authorities.
|
| The recommendations unfortunately highlight some challenges...

Indeed. And still, I miss any mention on protection against collecting
data about who's talking to who.

Without claiming any expertise at all in this area, the closest thing to
something implementing this that I've heard of is Mumble over
Tor. Mumble [0] is not standardised AFAICT. The Guardian Project wrote
[1] about this earlier this year. Some people seem to use it [2].

[0] https://en.wikipedia.org/wiki/Mumble_%28software%29
[1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/Mumble
[2]
https://guardianproject.info/2013/01/31/anonymous-cb-radio-with-mumble-and-tor/

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass


_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to