Re: [cryptography] can the German government read PGP and ssh traffic?

2012-05-28 Thread Thierry Moreau

Peter Gutmann wrote:

Werner Koch w...@gnupg.org writes:


Which is not a surprise given that many SSH users believe that ssh
automagically make their root account save and continue to use their lame
passwords instead of using PK based authentication.


That has its own problems with magical thinking: Provided you use PK auth,
you're magically secure, even if the private key is stored in plaintext on ten
different Internet-connected multiuser machines.  I don't know how many times
I've been asked to change my line-noise password for PK auth, told the person
requesting the change that this would make them less secure because I need to
spread my private key across any number of not-very-secure machines, and
they've said that's OK because as long as it uses PKCs it's magically secure.

Peter.



Please Peter, a little rigor in the arguments would help.

Since the SSH servers need *only*your*public*key*, then the ten 
different Internet-connected multi-user machines are not those SSH 
servers the admin of which would have made the request to turn to client 
PK for SSH.


If you chose to roam into different (and as insecure as you wish to 
support your argument), it's your decision as a SSH client user. With 
the low selling price of small single user system, you could also 
dedicate one as a SSH client console and make it a) intermittently 
connected to the Internet, b) single user for all practical purposes, c) 
little vulnerable to Trojan horse, d) having only the software you 
selected for the job, e) ...


Unless automated SSH sessions are needed (which is a different problem 
space), the SSH session is directly controlled by a user. Then, the 
private key is stored encrypted on long term storage (swap space 
vulnerability remaining, admittedly) and in 
*plaintext*form*only*momentarily* for SSH handshake computations 
following a decryption password entered by the user. If you have to fear 
keyboards grabbers, you fear them for line-noise passwords as well.


Maybe you want to argue that PK authentication is an HMI nightmare and 
comes with misleading security claims derived from an obscure theory of 
operation. Fine. But in the case of SSH authentication, the PK 
alternative allows security-minded remote system operators to enjoy a 
secure remote console.


I don't understand why you would chose to handle your encrypted SSH 
private key in a lousy way. But it seems inappropriate to assume that 
better ways are not feasible.


Regards,

--
- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, QC, Canada H2M 2A1

Tel. +1-514-385-5691
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] can the German government read PGP and ssh traffic?

2012-05-28 Thread Peter Gutmann
Peter Maxwell pe...@allicient.co.uk writes:

Why on earth would you need to spread your private-key across any number of
less secure machines?

The technical details are long and tedious (a pile of machines that need to
talk via SSH because telnet and FTP were turned off/firewalled years ago, I
won't bore you with the details).  The important point isn't the technical
details but the magical thinking, a private key sprayed all over the place in
plaintext is more secure than a line-noise password because everyone knows
passwords are insecure and PKCs are secure (and, as I've said, this isn't an
isolated case).

Peter.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] can the German government read PGP and ssh traffic?

2012-05-28 Thread Steven Bellovin

On May 26, 2012, at 8:15 34AM, Eugen Leitl wrote:

 On Fri, May 25, 2012 at 11:19:33AM -0700, Jon Callas wrote:
 
 My money would be on a combination of traffic analysis and targeted
 malware. We know that the Germans have been pioneering using targeted malware
 against Skype. Once you've done that, you can pick apart anything else. Just
 a simple matter of coding.
 
 Unrelated, IIRC Microsoft changed the architecture of supernodes to allow
 for lawful interception with Skype. It would be interesting to see inasmuch
 an open source version of Skype would want to evade that infrastructure,
 while asserting interoperability with legacy users.

I've seen news stories about Microsoft deploying its own supernodes, rather
than relying on the kindness of strangers.  I haven't seen any stories
about making lawful intercept possible -- do you have a source?


--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] can the German government read PGP and ssh traffic?

2012-05-28 Thread Peter Maxwell
On 29 May 2012 01:35, Peter Gutmann pgut...@cs.auckland.ac.nz wrote:

 Peter Maxwell pe...@allicient.co.uk writes:

 Why on earth would you need to spread your private-key across any number
 of
 less secure machines?

 The technical details are long and tedious (a pile of machines that need to
 talk via SSH because telnet and FTP were turned off/firewalled years ago, I
 won't bore you with the details).  The important point isn't the technical
 details but the magical thinking, a private key sprayed all over the
 place in
 plaintext is more secure than a line-noise password because everyone knows
 passwords are insecure and PKCs are secure (and, as I've said, this isn't
 an
 isolated case).



To make an analogy: people still manage to kill themselves in cars fitted
with seat-belts and airbags.  That does not imply those measures are not an
improvement but rather that the improvement is a statistical one.

Similarly, just because some numpty stores private keys in plaintext does
not imply that public key auth is not in general an improvement over
password auth.  Yes, it is not magical but if the users of such systems
cannot handle private keys with at least minimal care, there are bigger
problems afoot.

If multiple users need to use SSH on multiple hosts, they should store the
private key on removable media and use it from a limited number of hosts;
to hop from one host to another, create a port-forward on the first ssh
session form which the second ssh session can connect through to the
destination host, hence obviating the requirement for copying private keys
and ensuring the intermediate hosts cannot decrypt any traffic.

I have yet to encounter a problem in real life that requires private ssh
keys to be copied all over the shop and when it happens, it's bad
management, which no technical measure is going to sort.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography