Re: Article on passwords in Wired News

2004-06-04 Thread martin f krafft
also sprach Peter Gutmann <[EMAIL PROTECTED]> [2004.06.03.1014 +0200]:
> One-time passwords (TANs) was another thing I covered in the "Why
> isn't the Internet secure yet, dammit!" talk I mentioned here
> a few days ago.  From talking to assorted (non-European) banks,
> I haven't been able to find any that are planning to introduce
> these in the foreseeable future.  I've also been unable to get any
> credible explanation as to why not, as far as I can tell it's
> "We're not hurting enough yet".  Maybe it's just a cultural thing,
> certainly among European banks it seems to be a normal part of
> allowing customers online access to banking facilities.

While these are definitely nice, I am not particularly pleased. For
one, they are only "what you have", and not anything else.

I love the Swiss system, which is a token card and a reader, locked
with a PIN. You go to the web, get a challenge, run it through the
reader after inserting the card and entering the pin, then it spits
out the response, which you enter, and you're in...

Simple, efficient, secure.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"you raise the blade, you make the change
 you rearrange me till i'm sane.
 you lock the door, and throw away the key,
 there's someone in my head but it's not me."
   -- pink floyd, 1972


signature.asc
Description: Digital signature


Re: Yahoo releases internet standard draft for using DNS as public key server

2004-05-31 Thread martin f krafft
also sprach Russell Nelson <[EMAIL PROTECTED]> [2004.05.30.0515 +0200]:
>  >   - The infrastructure is not there. Two standards compete for
>  >   email cryptography, and both need an infrastructure to back
>  >   them up.
> 
> Two standards?  DomainKeys and what else?

I meant PGP and S/MIME

But there's DomainKeys and CAs I guess... including those CAs
inserted into web of trusts.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"... alle sätze der logik sagen aber dasselbe. nämlich nichts."
   -- wittgenstein


signature.asc
Description: Digital signature


Re: Yahoo releases internet standard draft for using DNS as public key server

2004-05-28 Thread martin f krafft
also sprach Ed Gerck <[EMAIL PROTECTED]> [2004.05.28.1853 +0200]:
> It's "industry support". We know what it means: multiple,
> conflicting approaches, slow, fragmented adoption --> will not
> work. It would be better if the solution does NOT need industry
> support at all, only user support. It should use what is already
> available.

While I fundamentally agree, a user-side approach will not work for
two reasons, at least:

  - The technology is too complex to be grasped. users may be able
to select encryption in their GUI, but they fail to understand
the consequences. This is especially problematic on the receiver
side, because no standard user knows how to handle a BAD
SIGNATURE alert.

  - The infrastructure is not there. Two standards compete for email
cryptography, and both need an infrastructure to back them up.
Unless the governments do not settle on one standard and provide
the necessary infrastructure, such as signing keycards or
pocket devices capable of stream en/decryption, encryption is
not going to be standard.

If everyone and their mother is supposed to use cryptography, then
the two points need to be addressed. And unless everyone (and their
mother) uses cryptography consistently, email is not going to be
safe.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
the unix philosophy basically involves
giving you enough rope to hang yourself.
and then some more, just to be sure.


signature.asc
Description: Digital signature


A-B-a-b encryption

2003-11-16 Thread martin f krafft
it came up lately in a discussion, and I couldn't put a name to it:
a means to use symmetric crypto without exchanging keys:

  - Alice encrypts M with key A and sends it to Bob
  - Bob encrypts A(M) with key B and sends it to Alice
  - Alice decrypts B(A(M)) with key A, leaving B(M), sends it to Bob
  - Bob decrypts B(M) with key B leaving him with M.

Are there algorithms for this already? What's the scheme called?
I searched Schneier (non-extensively) but couldn't find a reference.

Thanks,

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
time wounds all heels.
   -- groucho marx


pgp0.pgp
Description: PGP signature


Fwd: New PGP Universal beta: PGP and S/MIME

2003-11-16 Thread martin f krafft
fyi

- Forwarded message from Lucky Green <[EMAIL PROTECTED]> -

Cpunks,
I spent the last few months working at PGP on a nifty new solution to an
old problem: how to get email encryption deployed more widely without
requiring user education.

Since ideas for solving this problem have been discussed on this mailing
list for over 10 years now, some of you might wish to take a peek at the
solution that we came up with. The public beta of PGP Universal 1.1 is
now yours to download for free from

http://www.pgp.com/products/beta1.1.html

One of the many interesting features of our approach is the ability to
secure all users of a mail server, without the users needing to
understand what encryption is or does, no need for MUA-specific plugins,
interchangeable use of PGP keys or S/MIME, and much more. And yes, you
can still keep your 4096-bit RSA key on your PC only. I am using PGP
Universal myself. It is really cool.

Note that the download of PGP Universal is 322MB in size and requires a
dedicated x86 server to install.

Have fun,
--Lucky Green <[EMAIL PROTECTED]>

- End forwarded message -

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"der beruf ist eine schutzwehr, hinter welche man sich erlaubterweise
 zurückziehen kann, wenn bedenken und sorgen allgemeiner art einen
 anfallen."
 - friedrich nietzsche


pgp0.pgp
Description: PGP signature


Re: Now Is the Time to Finally Kill Spam - A Call to Action

2003-10-13 Thread martin f krafft
also sprach R. A. Hettinga <[EMAIL PROTECTED]> [2003.10.13.0639 +0200]:
> The time to stop this nonsense is now, and there's a non-governmental,
> low-cost, low-effort way it could happen. Here's my plan of action, it's
> not original to me but I want to lay it out publicly as a battle plan:

Of course the plan is good, and I am all for it. But it won't be
carried in less than 10 years.

I am much in favour of Graham's "fight back" approach, which is to
simply "visit" webpage URLs in all emails automatically. This will
drown spammer websites in requests and should make spam a lot less
worthy.

Who has been working with this system already? Are there reference
implementations?

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"oh what a tangled web we weave,
 when first we practice to deceive."
-- shakespeare


pgp0.pgp
Description: PGP signature


Re: Reliance on Microsoft called risk to U.S. security

2003-09-26 Thread martin f krafft
also sprach Ian Grigg <[EMAIL PROTECTED]> [2003.09.25.2253 +0200]:
> > "I wouldn't put all of the blame on Microsoft," Schneier said,
> > "the problem is the monoculture."
> 
> On the face of it, this is being too kind and not striking at the
> core of Microsoft's insecure OS.  For example, viruses are almost
> totally a Microsoft game, simply because most other systems aren't
> that vulnerable.

Yes and no. First, I think that viruses will surface were e.g. Linux
to take top position, albeit they may have to employ totally new
paradigms to subvert the more advanced security architecture of
UNIX.

But I believe Schneier is right for the following reason: Microsoft
is a monopolist who, despite enjoying bad press for the past four
years, is managing to keep its sales going up each quarter. If you
are in business, what do you care for? The steep sales curve, or the
quality of your product?

As long as Microsoft has the monopoly on the desktop, as long as new
computers come with Windows per default, and as long as people stop
complaining and actually take action against the crap that Redmond
ships by switching to other systems in bulk, Microsoft has no reason
to invest any money in a code rework.

> So, in the market for server platform OSs, is there any view as to
> which are more secure, and whether that insecurity can be traced
> to the OS?

The defacement archive[1] has some statistics. But don't let
yourself be fooled as one should not forget that while Windows
usually comes with one web-, one mail-, one DNS server, there are
like 27 and up in each category for UNIX. So theoretically, when
comparing those categories, you need to include a factor of 27.

  1. http://defaced.alldas.org/

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"women love us for our defects.
 if we have enough of them,
 they will forgive us everything,
 even our gigantic intellects."
-- oscar wilde


pgp0.pgp
Description: PGP signature


Re: quantum hype

2003-09-21 Thread martin f krafft
Again, replying to all.

also sprach John S. Denker <[EMAIL PROTECTED]> [2003.09.19.0038 +0200]:
> Other key-exchange methods such as DH are comparably
> incapable of solving the DoS problem.  So why bring up
> the issue?

For one, I can un-DoS with QC at any point in time. This may be
relevant for certain attacks.

Second, if I have a strong key exchange protocol, you cannot DoS me
because I can choose other media. If all I can use is QC because of
its "features", you can DoS me easily.

> If you can _prove_ DH is secure, please let us know immediately.


I was drunk last night, but I swear I was able to prove it ;^>

> If you have a consistent theory of physics that repeals the
> uncertainty principle, please let us know immediately.

Yeah, solved that in my dream last night. (also ;^>)



also sprach Dave Howe <[EMAIL PROTECTED]> [2003.09.19.1416 +0200]:
> QC is a hype-only technology - it relies on a unbroken line
> impervious to MitM, and there ain't no such beast.

I think this may well be the conclusion up to now...

> > Has anyone *proven* that there is no way to read
> > a quantum bit without altering it?
> no. its the "underlieing hard problem" for QC. If there is
> a solution to any of the Hard Problems, nobody knows about them.

right, so it's no better than the arguable hard problem of factoring
a 2048 bit number.

> cryptography is 90% paranoia - you *have* enemies, and don't know
> about them.

wrong. i don't consider those that shouldn't know about some things
to be my enemies. i know that crypto is useful when someone actively
seeks information. but if i want my girlfriend not to see those
mails i send to this other chick (i have no girlfriend btw),
i encrypt them and guard against the risk that i leave the window
open when she comes home and she accidentally hits enter to read
that email.

i also don't consider an ISP an enemy who does network-related
maintenance and happens to read into my data stream. heck, maybe the
guy is even interested and reads along for his pleasure. he's not an
enemy. but using crypto will still prevent this.

i guess it's a matter of definition, so let's just leave it there.

> evesdropping *destroys* the data by removing 50% of the photons
> almost at random. that is the quantum bit of the process - only
> a single photon is sent, so it can only be processed (read) by one
> host; reading the photon destroys its value, and the random
> element ensures it is incorrectly read 50% of the time.

Now this makes a lot more sense. Somehow I thought that QC simply
flipped the bit. But then nature isn't binary, neither is physics,
so I was just dumb.

> I admit to not entirely following the logic behind Quantum
> Cryptography

You seem to have a lot more of a grasp than I.

Anyhow, we are deviating here and there from the topic. So let me
summarise:

  - QC, if correctly used, can serve as the basis for OTP
encryption.
  - The provable security of QC thus actually comes from OTP.
  - QC needs an unbroken channel. The channel does not have to be
private because an observer destroys photons, which can be
detected.
  - This observer could DoS the communication, but that's akin to
cutting the land-line.
  - Actually, no, because if I don't rely on QC but have other
means, I can switch to another medium if someone cuts my
landline.

There were other points, but I concentrated on the technical ones
and hope I left none out.

Btw: is this list archived?

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"if beethoven's seventh symphony
 is not by some means abridged,
 it will soon fall into disuse."
 -- philip hale, boston music critic, 1837


pgp0.pgp
Description: PGP signature


Re: quantum hype

2003-09-19 Thread martin f krafft
also sprach [EMAIL PROTECTED] <[EMAIL PROTECTED]> [2003.09.19.1115 +0200]:
> The sender sends RANDOM BITS to the receiver. Those that don't get
> eavesdropped can then be concatenated at both ends to produce an
> identical string of random bits. Since this is known to both
> endpoint parties, and not to the eavesdropper, it can be used as
> a session key for symmetric encryption. So it is not true that you
> have "lost data" by being eavesdropped. You've only lost random
> bits, not real data.

Does reading a quantum bit destroy the bit or simply flip it? If the
latter, how then can you find out when a bit got read?

> No physical theory is _EVER_ "proven", only "corroborated by
> observational evidence". Quantum theory is consistently
> corroborated by observational evidence. For comparison, Newton's
> theory of gravity was never "proven", but it matched (almost) all
> observational evidence.

But Newton gets more wrong the faster you go. So it's not F = m.a,
that theory was only a good approximation, nothing more.

> We _can_ make this statement about Heisenberg's uncertainty
> principle.

Sure we can. But I don't accept an argument that QC is bettern than
asymmetric crypto because the second is based on assumption, when
the first is just as well based on assumption.

Fact is, MagiQ is wrong in claiming theoretical security.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"arguments are extremely vulgar,
 for everyone in good society
 holds exactly the same opinion."
-- oscar wilde


pgp0.pgp
Description: PGP signature


Re: quantum hype

2003-09-18 Thread martin f krafft
It took me a while. I would herewith like to reply to all posts on
this I received so far:

also sprach John S. Denker <[EMAIL PROTECTED]> [2003.09.13.2343 +0200]:
>   *) In each block, Mallory has a 50/50 chance of being able to
>   copy a bit without being detected.

This is what I don't buy. If Mallory sees the data, it must be
detected, because otherwise the approach is flawed. But in any case
does Mallory have the means to completely DoS any attempt of
communication between the parties, simply by reading along, unless
there is a dedicated channel between Alice and Bob. In which case,
why is there a need for quantum cryptography in the first place?

> There is only one chance in 2^-C that Mallory knows this bit.

One chance in 2^C, otherwise it would be deadly, no? But in any
case, Reasonable keysized DH exchanges give me the same security
with a lot more flexibility, and a lot less chance for DoS. I still
don't buy it.

> The foregoing assumed an error-free channel.  Things get much
> worse if the good guys need to do error correction.

... which is almost always required.

> Not true.  The signal is continually checked for tampering;  no
> assumption need be made.

How can you check for tampering without reading the data off the
channel? Checksums?

> > if we want end-to-end security, one can't stick classical
> > routers or other such equipment in the middle of the connection
> > between you and I.
> 
> That's true.  A classical router is indistinguishable from a tap.

The same argument holds as above, why do I need QC then if I have
a dedicated channel anyhow?

Sending asymmetrically encrypted data over something like the plain
old telephone system strikes me as being more secure than sending
these data over the Internet, and that should hold for any
encryption used. Unless QC is applicable to the Internet (which it
won't be, as far as I can tell), I don't see any use beyond
marketing hype.

Sure, DH and similar approaches are based on mathematical
assumptions and are not secure, just incredibly hard to crack. But
just as I can choose a larger C for QC to diminish Mallory's chance
of decoding enough data to be able to make sense of the message
without being detected, I can choose a keysize of 16k if the
application calls for it. DH has been scrutinised and is, to current
knowledge, a theoretically secure algorithm. Or am I mistaken?



also sprach David Wagner <[EMAIL PROTECTED]> [2003.09.13.2343 +0200]:
> I believe the following is an accurate characterization:
>  Quantum provides confidentiality (protection against eavesdropping),
>  but only if you've already established authenticity (protection
>  against man-in-the-middle attacks) some other way.
> Tell me if I got anything wrong.

I don't think this is wrong, but I still don't see how QC guards
against eavesdropping. No, wrong, I see how a key exchange with QC
can make it very difficult to eavesdrop the key (more difficult than
DH?), but I do render the communication susceptible to complete DoS,
and I don't really gain security, IMHO.



also sprach John S. Denker <[EMAIL PROTECTED]> [2003.09.14.0102 +0200]:
> That means you can establish a confidential but
> anonymous tunnel, and then send authentication
> messages through the tunnel.

But the tunnel is only confidential as long as it isn't being
eavesdropped. As soon as someone eavesdrops it, I may be able to
find out, but I have already lost data to unwanted eyes. And if
I thus choose to end communication due to the risk of disclosing
more, the DoS worked.

I hope I am not annoying anyone while continually banging on this.
I just have not been convinced of the other side of this argument.



also sprach David Wagner <[EMAIL PROTECTED]> [2003.09.14.0018 +0200]:
> One could reasonably ask how often it is in practice that we have
> a physical channel whose authenticity we trust, but where
> eavesdropping is a threat.  I don't know.

How much of a threat really exists in a channel encrypted with e.g.
Blowfish, 256bit keys, perfect forward secrecy, and a session key
lifetime of 30 minutes???



also sprach Arnold G. Reinhold <[EMAIL PROTECTED]> [2003.09.14.0536 +0200]:
> The 160 GB hard drive has a couple of advantages over quantum key
> exchange:

And a disadvantage: disk corruption, which may render your channel
temporarily inaccessible. Also, once someone gets hold of the data
on the disk, everyone can read along. It's the same problem of all
symmetric algorithms, enhanced by the fact that the key data is
stored on a medium other than a human neural network (which to date
is only readable by one person)

 

also sprach David Wagner <[EMAIL PROTECTED]> [2003.09.14.1954 +0200]:
> Well, I agree.  If we get to use complexity-based crypto that is
> not proven secure, like AES, RSA, or the like, then we can do much
> better than quantum crypto.  The only real attraction of quantum
> crypto that I can see is that its security does not rely on
> unproven complexity-theoretic conjectures.

Has anyone

Re: quantum hype

2003-09-13 Thread martin f krafft
also sprach David Wagner <[EMAIL PROTECTED]> [2003.09.13.2306 +0200]:
> You're absolutely right.  Quantum cryptography *assumes* that you
> have an authentic, untamperable channel between sender and
> receiver. The standard quantum key-exchange protocols are only
> applicable when there is some other mechanism guaranteeing that
> the guy at the other end of the fibre optic cable is the guy you
> wanted to talk to, and that noone else can splice into the middle
> of the cable and mount a MITM attack.

Uh, so if I have a channel of that sort, why don't I send cleartext?

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"the public is wonderfully tolerant.
 it forgives everything except genius."
-- oscar wilde


pgp0.pgp
Description: PGP signature


quantum hype

2003-09-13 Thread martin f krafft
Dear Cryptoexperts,

With

  http://www.magiqtech.com/press/navajounveiled.pdf

and the general hype about quantum cryptography, I am bugged by
a question that I can't really solve. I understand the quantum
theory and how it makes it impossible for two parties to read the
same stream. However, what I don't understand is how that adds to
security.

The main problem I have with understanding the technology is in the
fact that any observation of the quantum stream is immediately
detectable -- but at the recipient's side, and only if checksums are
being employed, which are not disturbed by continual or sporadic
photon flips.

So MagiQ and others claim that the technology is theoretically
unbreakable. How so? If I have 20 bytes of data to send, and someone
reads the photon stream before the recipient, that someone will have
access to the 20 bytes before the recipient can look at the 20
bytes, decide they have been "tampered" with, and alert the sender.
So I use symmetric encryption and quantum cryptography for the key
exchange... the same situation here. Maybe the recipient will be
able to tell the sender about the junk it receives, but Mallory
already has read some of the text being ciphered.

In addition to that, the MITM attack seems to be pertinent, unless
I use public-key encryption and authentication. But then I am back
to cryptography whose strength is based on intractability and not on
a proof. And now I fail to see why quantum crypto is hyped so much.

Maybe I am completely misguided, but I would really appreciate some
explanation or even pointers. Or someone wants to spend a couple of
minutes to explain the process of theoretically unbreakable quantum
cryptography step-by-step.

Note: I am reading MagiQ's press release with the
subtract-marketing-b/s grain of salt. Of course, their technology is
superior to everything. However, most of my information and the food
for my questions stem from the more scientific side, having read
about it in articles in renowned magazines and mailing list posts.

Thanks,

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
joan of arc heard voices too.


pgp0.pgp
Description: PGP signature


Re: Voltage - Identity Based Encryption.

2003-07-08 Thread martin f krafft
also sprach C. Wegrzyn <[EMAIL PROTECTED]> [2003.07.08.2324 +0200]:
> This is the same approach used in the Authentica system but it is 
> deployed in an enterprise environment.

Sure, but this doesn't make it any more secure. I only know very
little about Authentica, but it also doesn't strike my fancy.
Private keys are private, period. There got to be other ways to make
PK cryptography easier.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid PGP subkeys? use subkeys.pgp.net as keyserver!
 
"die menschen drängen sich zum lichte, nicht um besser zu sehen,
 sondern um besser zu glänzen."
 - friedrich nietzsche


pgp0.pgp
Description: PGP signature


Re: Voltage - Identity Based Encryption.

2003-07-08 Thread martin f krafft
also sprach Hack Hawk <[EMAIL PROTECTED]> [2003.07.08.0154 +0200]:
> So what they're saying is that your PRIVATE key is stored on
> a server somewhere on the Internet?!?!

I believe it says it is generated upon initial request, but this is
about as bad. I fully agree with you, this sounds fishy.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid PGP subkeys? use subkeys.pgp.net as keyserver!
 
"i never travel without my diary. one should always have something
 sensational to read on the train."
-- oscar wilde


pgp0.pgp
Description: PGP signature


Re: pubkeys for p and g

2003-06-30 Thread martin f krafft
also sprach Arnold G. Reinhold <[EMAIL PROTECTED]> [2003.06.29.0424 +0200]:
> >I am not sure I understand. How does this relate to my question?
> >
> >Where does the other factor come from?
> 
> I got the impression, and maybe I misunderstood, that you were 
> viewing a product of two primes aA, where a was the private part= and 
> A was the public part.  That is not how RSA works. The produce aA is 
> the public key. Either factor can be the private part.

Oh, I get it. No, that was my bad. aA and bB are simply the
private/Public keypairs for A and B. Yeah, yeah, I know. Algebra is
always haunting me...

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid PGP subkeys? use subkeys.pgp.net as keyserver!
 
"our destiny exercises its influence over us even when, as yet,
 we have not learned its nature; it is our future that lays down the law
 of our today."
 - friedrich nietzsche


pgp0.pgp
Description: PGP signature


Re: pubkeys for p and g

2003-06-28 Thread martin f krafft
also sprach Nomen Nescio <[EMAIL PROTECTED]> [2003.06.27.2230 +0200]:
> Do you have a reference to what exactly Check Point says about this?
> Maybe you are misunderstanding or misinterpreting them.  If you could
> quote it here verbatim (or provide a link if it is online) we might be
> able to understand their claim better.  It would be wise to make sure
> it is not a simple misunderstanding before you put something critical
> about them in your book.

Of course, that's why I am here. Problem is that my co-author has
seen it and I haven't found it. He's on vacation at the moment, so
we won't know until next week.

I did check the FP3 Mgmt II Student and Instructor Notes, but no
reference there. He says it's in the slides, but I don't have
Powerpoint here and OpenOffice is a little bitchy about them. Let's
suspend this until I know more.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid PGP subkeys? use subkeys.pgp.net as keyserver!
 
i need not suffer in silence
while i can still moan, whimper and complain.


pgp0.pgp
Description: PGP signature


Re: pubkeys for p and g

2003-06-26 Thread martin f krafft
> I'm not certain I understand your questions, but here are some
> answers (I think).

To clear this up:

I am well aware how DH works, and what the mathematical properties
of p and g are and have to be.

My point was that some commercial vendors (Check Point and others)
claim, that if two partners want to perform a DH key exchange, they
may use their two public keys for g and p. This, in effect, would
mean that g and p were not globally known, but that the public keys
are used in their place.

I am well aware that p and g are globally known as defined in the
chosen DH Group. However, I am wondering how Check Point (and
others) can claim that public keys may well be used in place,
thereby invalidating the need for a globally constant p and g pair.
These public keys are independent of the public keys exchanged as
part of DH, which are simply calculated by the g^x mod p formula of
DH, from the private keys.

Thus every communication party would have a key pair, aA and bB,
where the capital letter is the public key. Then, the following
happens:

  let g = A and p = B
  let A' = g^a mod p and B' = g^b mod p
 = A^a mod B= A^b mod B

and off you go, doing DH with g = A, p = B, and the keypairs aA' and
bB' on either side.

This would, in my opinion, only be possible if:

  - there would be a rule to decide which public key is p and which
is g.
  - all public keys (RSA in this case) are primes.
  - all public keys are good generators mod p.

We are writing a book and simply want to have some backup. I am
almost sure that Check Point is bullshitting (wouldn't be the first
time), so unless anyone has actually heard of this possibility, I am
going to write this down and influence a thousand people, basically
claiming that Check Point is wrong.

Does it make sense now?

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid PGP subkeys? use subkeys.pgp.net as keyserver!
 
experience is what causes a person
to make new mistakes
instead of old ones.


pgp0.pgp
Description: PGP signature


DH: pubkeys for p and g

2003-06-25 Thread martin f krafft
The Check Point Firewall-1 Docs insist, that the public keys be used
for p and g for the Oakley key exchange. I ask you: is this
possible?

  - which of the two pubkeys will be p, which g?
  - are they both always primes?
  - are they both always suitable generators mod p?

It just seems to me that Check Point isn't entirely sure themselves
here. I'd appreciate a short cleanup...

To my knowledge, g and p are globally defined, either in DH Groups
(which are nothing but pre-defined g's and p's, right?), or
otherwise set constant. Am I wrong about this?

Thanks.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid PGP subkeys? use subkeys.pgp.net as keyserver!
 
"one should never do anything that
 one cannot talk about after dinner."
-- oscar wilde


pgp0.pgp
Description: PGP signature


authentication and ESP

2003-06-19 Thread martin f krafft
As far as I can tell, IPsec's ESP has the functionality of
authentication and integrity built in:

RFC 2406:

   2.7 Authentication Data

   The Authentication Data is a variable-length field containing an
   Integrity Check Value (ICV) computed over the ESP packet minus
   the Authentication Data.  The length of the field is specified by
   the authentication function selected.  The Authentication Data
   field is optional, and is included only if the authentication
   service has been selected for the SA in question.  The
   authentication algorithm specification MUST specify the length of
   the ICV and the comparison rules and processing steps for
   validation.

To my knowledge, IPsec implementations use AH for "signing" though.
Why do we need AH, or why is it preferred?

Thanks for your clarification!

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid PGP subkeys? use subkeys.pgp.net as keyserver!
 
XP is NT with eXtra Problems.


pgp0.pgp
Description: PGP signature


Re: The meat with multiple PGP subkeys

2003-06-18 Thread martin f krafft
also sprach David Shaw <[EMAIL PROTECTED]> [2003.06.18.0240 +0200]:
> The problem is that the PKS keyserver was not written to handle keys
> with multiple subkeys.

[snip]

Thanks for the explanation. I didn't know about subkeys.pgp.net yet.

Moreover, I second the belief that the keyservers must be fixed as
they are really harming the PGP infrastructure.

I support Jason's work:

  http://keyserver.kjsl.com/~jharris/keyserver.html

and am already talking the wwwkeys.ch.pgp.net people into upgrading.

Maybe everybody can pick a keyserver of their choice and sit on the
admin's face until s/he gets it... ? Let's riot!

Can someone tell me why the heck SKS is written in Ocaml? What an
annoyance is that? No offence to the Ocaml people here...

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
keyserver problems? http://keyserver.kjsl.com/~jharris/keyserver.html
get my key here: http://madduck.net/me/gpg/publickey
 
"there is more stupidity than hydrogen in the universe,
 and it has a longer shelf life."
-- frank zappa


pgp0.pgp
Description: PGP signature


The meat with multiple PGP subkeys

2003-06-17 Thread martin f krafft
My key, 220BC883330C4A75, has multiple encryption subkeys, and it's
about to get another one on Friday, as my current encryption key
expires.

A lot of people are reporting that they cannot encrypt to me, due to
an unusable public key. It only seems to work if they use modern
software and obtain my key from keyserver.kjsl.com:11371 or the
various URLs where it sits.

I am already working with keyserver maintainers to get their
keyservers up to par, but before this can be completed, I feel that
I need to get an exact understanding of what's going on.

Could someone help me clean up this understanding?

- What is the problem with multiple subkeys?

- Are they in accordance with the RFC (2440)?

- Are others experiencing these problems, and how do you deal with
  them?

- Is there a solution in the works?

- If not, has anyone already thought about how to solve this mess?

Thanks, and I hope this is appropriate for this list.

Take care,

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
keyserver problems? http://keyserver.kjsl.com/~jharris/keyserver.html
get my key here: http://madduck.net/me/gpg/publickey
 
"wickedness is a myth
 invented by good people
 to account for the curious attraction of others."
-- oscar wilde


pgp0.pgp
Description: PGP signature


Re: Wildcard Certs

2003-06-16 Thread martin f krafft
also sprach Stefan Kelm <[EMAIL PROTECTED]> [2003.06.16.1652 +0200]:
> Now, suppose I buy a certificate for *.i-am-bad.com (assuming that I'm 
> the owner of that domain). I could then set up an SSL server with a 
> hostname of something like   
> 
> www.security-products.microsoft.com.order.registration.checkout.user-
> support.i-am-bad.com
> 
> hoping that the browser will only display the more familiar looking parts 
> of the URL to the user who in turn will happily accept the certificate.  

I could also just buy a certificate with that name. While it is an
interesting point, I do not see how wildcard certificates make this
possible, or enhance it.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
keyserver problems? http://keyserver.kjsl.com/~jharris/keyserver.html
get my key here: http://madduck.net/me/gpg/publickey
 
before he died, rabbi zusya said: "in the world to come they will not
ask me, 'why were you not moses?' they will ask me, 'why were you not
zusya?'"


pgp0.pgp
Description: PGP signature


Wildcard Certs

2003-06-16 Thread martin f krafft
I just ran across

  http://certs.centurywebdesign.co.uk/premiumssl-wildcard.html

but there are many more sites like that:

  Secure multiple websites with a single PremiumSSL Certificate. For
  organisations hosting a single domain name but with different
  subdomains (e.g. secure.centurywebdesign.co.uk,
  www.centurywebdesign.co.uk, signup.centurywebdesign.co.uk), the
  wildcard Certificate is a cost effective and efficient means of
  securing all subdomains without the need to manage multiple
  certificates. All the features, compatibility and warranty of
  PremiumSSL included.

This strikes me as notoriously bad, although it is in accordance
with the RFC. I still don't want to accept the usefulness and
inherent security, so I'd like to get some expert opinions on this.

Are wildcard certficates good? secure? useful?
Would you employ them? If not, how would you solve the problem they
are trying to address (if you don't have your own CA)?

Thanks!

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
keyserver problems? http://keyserver.kjsl.com/~jharris/keyserver.html
get my key here: http://madduck.net/me/gpg/publickey
 
"a scientist once wrote that all truth passes through three stages:
 first it is ridiculed, then violently opposed and eventually,
 accepted as self-evident."
   -- schopenhauer


pgp0.pgp
Description: PGP signature


Re: The real problem that https has conspicuously failed to fix

2003-06-08 Thread martin f krafft
also sprach James A. Donald <[EMAIL PROTECTED]> [2003.06.08.2243 +0200]:
> (When you hit the submit button, guess what happens)

How many people actually read dialog boxes before hitting Yes or OK?

I know you do, and most of us, but who's the majority?

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
keyserver problems? http://keyserver.kjsl.com/~jharris/keyserver.html
get my key here: http://madduck.net/me/gpg/publickey
 
"my experience is that as soon as people are old enough to know better,
 they don't know anything at all."
-- oscar wilde


pgp0.pgp
Description: PGP signature