Re: Security of Mac Keychain, File Vault

2009-10-26 Thread Marcus Brinkmann
Jerry Leichter wrote:
 The article at http://www.net-security.org/article.php?id=1322 claims
 that both are easily broken.  I haven't been able to find any public
 analyses of Keychain, even though the software is open-source so it's
 relatively easy to check.  I ran across an analysis of File Vault not
 long ago which pointed out some fairly minor nits, but basically claimed
 it did what it set out to do.
 
 The article makes a bunch of other claims which aren't obviously
 unreasonable.
 
 Anyone one know of more recent analysis of Mac encryption stuff?  (OS
 bugs/security holes are a whole other story)

The last page of the article has references and this:

MacMarshal. The best Mac tool I ve seen so far, it is right now the number 1
Mac tool. MacMarshall can parse user account information , Address Book,
Safari, iChat, and can even crack File Vault. This is free to Law Enforcement.

But on another page we find:

http://www.macosxforensics.com/Analysis/CrackingFileVault/CrackingFileVault.html

Cracking FileVault is a bit of a misnomer. As of this writing, here is not a
known flaw in the 128 bit AES encryption that is being used. When attempting
to open a FileVault encrypted Home directory, there are two methods which can
be used:

Brute Force
Brute Force with a dictionary attack

[...]

Much faster utilities such as crowbarDMG and Mac Marshal are now available
which will give you speeds Spartan will never attain in its current form.

So, this seems to be all about dictionary attacks.

More troublesome is the claim by the forensic expert that the best tool to
analyze a mac filesystem is a mac, which he just proclaimed as insecure.  This
calls for a disaster: A trojan that targets forensic examiners...



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Unexpected side-effects

2009-09-30 Thread Marcus Brinkmann
Jerry Leichter wrote:
 Well, here I'll expect one. :-)

Not a new idea, although I don't know where I heard it the first time.

 As there is increasing pressure to keep
 records of Internet use, there will be a counter-move to use VPN's which
 promise to keep no records.  Which will lead to legal orders that
 records be kept, with no notification to those being tracked.  Enter
 secure remote attestation - rendering it impossible for an appropriately
 defined non-logging implementation to start logging without giving this
 fact away.

Probably off-topic for this list, but this doesn't make much sense to me, as
such non-logging implementations likely will be just as illegal as notifying
the client of the change, which seems an overall better solution if you are
willing to break the law (provided you can hide the notification from
authorities).  [In Germany, means of surveillance are required by law, as is
record keeping].

Getting back on topic, cryptographically speaking, it's also quite possible to
just monitor all ingoing and outcoming traffic and correlate one with the
other.  Preventing this is not easy, even if encryption is used.

 Maybe it'll be the pirates who make the first large-scale use of those
 TPM's!

Maybe, and this would be a major confirmation that TPM actually works at any
non-trivial scale.  I can't see it, though.

Thanks,
Marcus

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Judge orders defendant to decrypt PGP-protected laptop

2009-03-04 Thread Marcus Brinkmann
Adam Fields wrote:
 On Tue, Mar 03, 2009 at 12:26:32PM -0500, Perry E. Metzger wrote:
 Quoting:

A federal judge has ordered a criminal defendant to decrypt his
hard drive by typing in his PGP passphrase so prosecutors can view
the unencrypted files, a ruling that raises serious concerns about
self-incrimination in an electronic age.

 http://news.cnet.com/8301-13578_3-10172866-38.html
 
 The privacy issues are troubling, of course, but it would seem trivial
 to bypass this sort of compulsion by having the disk encryption
 software allow multiple passwords, each of which unlocks a different
 version of the encrypted partition.
 
 When compelled to give out your password, you give out the one that
 unlocks the partition full of kitten and puppy pictures, and who's to
 say that's not all there is on the drive?

In this particular case, the border guard already saw the supposedly
incriminating documents, but they failed to properly secure the evidence (the
picture on the laptop) at that time.   When they shut down the laptop, the
evidence was locked down by the encryption due to the removal of the
encryption key from RAM.  Securing digital evidence is a big problem for law
enforcement.

So, if the defense then discloses a different encryption drive with only
kitten and puppy pictures, they will be in very big trouble, as there is
already testimony that other files exist.

The defense is asked to produce the documents in question.  I don't know much
about the legal bells and whistles that apply to such a case, but here are
some ideas:

* Maybe the defense could ask the prosecution to describe which pictures they
want to have in particular, and the defense can make a case to just produce
those particular pictures.  However, the prosecution can probably just demand
to produce all files within particular folders, which are easier to recall and
more likely to hit something interesting.

* Maybe the defense can argue that they lost the password and thus access to
the document.  They'd better make a convincing argument that they really can
not recover it.  It would be great if that argument is tied to the police
confiscating the equipment.  Maybe the password  was written in invisible ink
on the laptop and needs to be rewritten every day or it washes away...

* I wonder if it may not be a better strategy to reveal the password and then
argue that the pornography is legal or widely available on the internet,
supposing it really is just generic internet porn.  OTOH, some material may be
legal only in some countries.

A couple of consequences:

* The safest thing to do is to do a clean operating system install before
traveling.

* If you use encryption, shut it down before crossing the border.

* Computers have too many documents in a single, easily accessible location.
If the files were more dispersed, the defense might be able to weasel out by
producing fewer documents.  Nobody would bring a meter-high stack of porn
magazines from Amsterdam in their luggage, but with cheap mass storage it's a
different situation.

Also, this information is easily explorable by everyone using the file
manager.  Maybe hierarchical organization is not the best way to store such
documents.  A searchable database that limits the number of results may offer
some protection against stumbling over something interesting.

* Online storage may be an attractive solution for border crossing without
leaving documents at home.  The internet is a big smuggling ring that easily
avoids border guards.

Marcus

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: X.509 certificate overview + status

2009-03-02 Thread Marcus Brinkmann
Travis wrote:
 Recently I set up certificates for my server's SSL, SMTP, IMAP, XMPP,
 and OpenVPN services.  Actually, I created my own CA for some of the
 certificates, and in other cases I used self-signed.  It took me
 substantially more time than I had anticipated, and I'm left with
 feelings of unease.

Welcome to the club!

 Further, trying to dig into ASN.1 was extremely difficult.  The specs
 are full of obtuse language, using terms like object without
 defining them first.  Are there any tools that will dump certificates
 in human-readable formats?  I would really like something that could
 take a PEM file of a cert and display it in XML or something of the
 sort.

Ubuntu comes with dumpasn1.  There are also quite a few libraries.

 I'm plowing through the O'Reilly OpenSSL book, but are there other
 resources out there that could help me, or others like me?

You should be aware of Peter Gutmann's style guide:

http://www.cs.auckland.ac.nz/~pgut001/pubs/x509guide.txt

Thanks,
Marcus

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: MD5 considered harmful today, SHA-1 considered harmful tomorrow

2009-01-17 Thread Marcus Brinkmann
Weger, B.M.M. de wrote:
 In my view, the main lesson that the information security community, 
 and in particular its intersection with the application building 
 community, has to learn from the recent MD5 and SHA-1 history,
 is that strategies for dealing with broken crypto need rethinking.

On the other hand, compared to many other aspects of our security
infrastructure, even MD5 does quite well.  Of course, that is not meant
to be taken as an excuse.  I agree with your call to have smooth
transition systems to go from one cipher to another, but when to make
the transition is a difficult decision to make.

 PS: I find it ironic that the sites (such as ftp.ccc.de/congress/25c3/) 
 offering the video and audio files of the 25c3 presentation MD5 
 considered harmful today, provide for integrity checking of those 
 files their, uhm, MD5 hashes.

It seems to me they are only provided to protect against transmission
errors, and they are fine for that.  Otherwise, it would be a more
serious mistake to transfer them in-band.  Security is a spectrum.

Thanks,
Marcus

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: A History of U.S. Communications Security

2009-01-02 Thread Marcus Brinkmann
Pehr Söderman wrote:
 Freshly declassified and a rather interesting read:
 
 A History of U.S. Communications Security (Volumes I and II, 1973)
 David G. Boak Lectures, National Security Agency (NSA)
 
 http://www.governmentattic.org/2docs/Hist_US_COMSEC_Boak_NSA_1973.pdf
 
 (From Bruce Schneier/Governmentattic)

I like the informal style of the document, it's an easy read, even if
one is not an intelligence buff.  In the first volume, all but the first
and last chapters are redacted (what is left is an introduction and
TEMPEST).  The second volume is more intact, and has some history DES,
and a view on public key cryptography before affordable general
computers.  Certainly other things of which I don't realize the
significance...

Some of the redactions may be easily guessable, I fancy iron curtain,
embassy, and later Russia on page 97.  Why do they even bother?
This would be a good exercise for some student to write a program doing
a dictionary attack on the text using the properties of the used font.

The last page has a puzzle, an innocent text system (steganography).
Didn't solve it yet, but I think I found the clue, a misspelling of be
advised to he advised.

Thanks,
Marcus

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com