RE: Another entry in the internet security hall of shame....

2005-08-25 Thread Trei, Peter


 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] Behalf Of Peter Saint-Andre
 Sent: Wednesday, August 24, 2005 4:56 PM
 To: cryptography@metzdowd.com
 Subject: Re: Another entry in the internet security hall of shame
 
 
 Tim Dierks wrote:
  [resending due to e-mail address / cryptography list 
 membership issue]
  
  On 8/24/05, Ian G [EMAIL PROTECTED] wrote:
  
 Once you've configured iChat to connect to the Google Talk 
 service, you may
 receive a warning message that states your username and 
 password will be
 transferred insecurely. This error message is incorrect; 
 your username and
 password will be safely transferred.
  
  
  iChat pops up the warning dialog whenever the password is 
 sent to the
  server, rather than used in a hash-based authentication protocol.
  However, it warns even if the password is transmitted over an
  authenticated SSL connection.
  
  I'll leave it to you to decide if this is:
   - an iChat bug
   - a Google security problem
   - in need of better documentation
   - all of the above
   - none of the above
 
 It seems Google is assuming that SASL PLAIN is acceptable once you've 
 completed STARTTLS on port 5222 (or if you've connected via 
 SSL on the 
 old-style port 5223). Decide for yourself if that's secure 
 and whether 
 the iChat warning is justified.
 
 Peter
 
 -- 
 Peter Saint-Andre
 Jabber Software Foundation
 http://www.jabber.org/people/stpeter.shtml

Ironically, Peter's message above kicked off warning
dialogs from MS Outlook, since it was signed using a keypair
signed with Peter's own self-signed root, which was not in 
MSO's list of trusted
roots.

Self-signed certs are only useful for showing that a given
set of messages are from the same source - they don't provide
any trustworthy information as to the binding of that source
to anything.

Peter Trei
(not digitally signed, and not pretending to be)




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: [Clips] RSA Security Sees Hope in Online Fraud

2005-08-25 Thread Florian Weimer
* R. A. Hettinga quotes:

  Today RSA is perhaps best known for staging a prestigious annual security
  conference and for selling 20 million little devices that display a
  six-digit code computer users must type to gain access to computer
  networks. The code, which changes every minute as determined by an
  RSA-created algorithm, is unique to each SecureID token, making it
  useless to a snoop.

Of course, SecureID tokens do not prevent man-in-the-middle attacks
carried out in real-time.  For example, it's probably not too hard to
write a Browser Helper Object which automatically rewrites financial
transactions submitted using Internet Explorer.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another entry in the internet security hall of shame....

2005-08-25 Thread Steve Furlong
On 8/25/05, Trei, Peter [EMAIL PROTECTED] wrote:

 Self-signed certs are only useful for showing that a given
 set of messages are from the same source - they don't provide
 any trustworthy information as to the binding of that source
 to anything.

Which is just fine. Pseudonymity is good.

If, hypothetically, I were interested in writing and distributing
cypto source code which skated right at the edge of current US export
regs, I might want to let users verify that the updates came from the
same source as the original, without giving them or any gov't
busybodies the ability to trace the code back to me.

-- 
There are no bad teachers, only defective children.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: Another entry in the internet security hall of shame....

2005-08-25 Thread R.A. Hettinga
At 9:42 AM -0400 8/25/05, Trei, Peter wrote:
Self-signed certs are only useful for showing that a given
set of messages are from the same source - they don't provide
any trustworthy information as to the binding of that source
to anything.

Oddly enough, the same could be said for a hierarchically signed certificate.

;-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another entry in the internet security hall of shame....

2005-08-25 Thread Peter Saint-Andre

Trei, Peter wrote:


Ironically, Peter's message above kicked off warning
dialogs from MS Outlook, since it was signed using a keypair
signed with Peter's own self-signed root, which was not in 
MSO's list of trusted roots.


You may trust CAcert's root more or less than a root that is trusted by 
Microsoft. Personally, I find CAcert to be an interesting experiment in 
webs of trust.


Peter

--
Peter Saint-Andre
Jabber Software Foundation
http://www.jabber.org/people/stpeter.shtml


smime.p7s
Description: S/MIME Cryptographic Signature


Re: Another entry in the internet security hall of shame....

2005-08-25 Thread Ian G

Trei, Peter wrote:


Self-signed certs are only useful for showing that a given
set of messages are from the same source - they don't provide
any trustworthy information as to the binding of that source
to anything.


Perfectly acceptable over chat, no?  That is,
who else would you ask to confirm that your
chatting to your buddy?

iang

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another entry in the internet security hall of shame....

2005-08-25 Thread Ian G

Tim Dierks wrote:

[resending due to e-mail address / cryptography list membership issue]

On 8/24/05, Ian G [EMAIL PROTECTED] wrote:


Once you've configured iChat to connect to the Google Talk service, you may
receive a warning message that states your username and password will be
transferred insecurely. This error message is incorrect; your username and
password will be safely transferred.



iChat pops up the warning dialog whenever the password is sent to the
server, rather than used in a hash-based authentication protocol.
However, it warns even if the password is transmitted over an
authenticated SSL connection.

I'll leave it to you to decide if this is:
 - an iChat bug
 - a Google security problem
 - in need of better documentation
 - all of the above
 - none of the above


none of the above.  Using SSL is the wrong tool
for the job.  It's a chat message - it should be
encrypted end to end, using either OpenPGP or
something like OTR.  And even then, you've only
covered about 10% of the threat model - the
server.

But, if people do use the wrong tool for the
job, they will strike these issues...

iang

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another entry in the internet security hall of shame....

2005-08-25 Thread Eric Rescorla
Ian G [EMAIL PROTECTED] writes:

 Trei, Peter wrote:

 Self-signed certs are only useful for showing that a given
 set of messages are from the same source - they don't provide
 any trustworthy information as to the binding of that source
 to anything.

 Perfectly acceptable over chat, no?  That is,
 who else would you ask to confirm that your
 chatting to your buddy?

Most chat protocols (and Jabber in particular) are server-oriented
protocols. So, the SSL certificate in question isn't that of your
buddy but rather of your Jabber server. 

-Ekr


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]