Re: [cryptography] Interesting Webcrypto question
I'm catching up on this but it's a pretty easy answer. Say you've implemented a bunch of crypto on your web page via Javascript. And this is where you went wrong. Don't implement crypto (or anything of import) client side period (if we are talking web based javascript stuff here). -Peter ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On Mon, Mar 4, 2013 at 3:10 PM, Peter Thoenen peter.thoe...@yahoo.com wrote: I'm catching up on this but it's a pretty easy answer. Say you've implemented a bunch of crypto on your web page via Javascript. And this is where you went wrong. Don't implement crypto (or anything of import) client side period (if we are talking web based javascript stuff here). Actually, its not too far fetched. In the mobile arena, I see a number of in-house browser based apps that can be side-loaded or distributed through a private or enterprise application store. When using these distribution channels, script injection and tampering is not a high risk because its part of the application bundle. Organizations like the browsers based and hybrid apps because they are quick to develop, and HTML5 give them all sorts of annoying capabilities, such as reverse proxies via WebSockets. Its yet to be seen if we will get any useful security features for the 'side-loaded web app' model. I wrote to Ian and Alexey (authors of RFC 6455 - WebSockets) and asked for a method to query the underlying connection so I could do unthinkable things such as aborting the connecting or not transmitting the password if the certificate or public key was not expected. I did not hear anything back. Jeff ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On Mon, Mar 4, 2013 at 12:31 PM, Jeffrey Walton noloa...@gmail.com wrote: Actually, its not too far fetched. In the mobile arena, I see a number of in-house browser based apps that can be side-loaded or distributed through a private or enterprise application store. When using these distribution channels, script injection and tampering is not a high risk because its part of the application bundle. Can you mitigate the risk with the Chrome webstore too? Perhaps via some kind of chain-of-trust or attestation scheme. -- Taral tar...@gmail.com Please let me know if there's any further trouble I can give you. -- Unknown ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
[cryptography] Interesting Webcrypto question
Say you've implemented a bunch of crypto on your web page via Javascript. Someone in North Korea (or Iran, or one of the other export-restricted nations) visits your site. You've now exported crypto to a restricted country. What happens next? Peter. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On Sun, Mar 3, 2013 at 1:39 AM, Peter Gutmann pgut...@cs.auckland.ac.nz wrote: Say you've implemented a bunch of crypto on your web page via Javascript. Someone in North Korea (or Iran, or one of the other export-restricted nations) visits your site. You've now exported crypto to a restricted country. What happens next? most important question: what jurisdiction for you and your web page? perhaps you could argue you never exported, but merely cached remotely. some server http response headers could advance such a claim. ;) practical risk seems to be no one cares at this level; they're bypassing crypto if and when they need through easier avenues... ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
You've now exported crypto to a restricted country. What happens next? repl{physicist, javascripter, In some sort of crude sense, which no vulgarity, no humor, no overstatement can quite extinguish, the physicists have known sin; and this is a knowledge which they cannot lose. } ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
You've now exported crypto to a restricted country. What happens next? You ask a lawyer or a legislator, not a bunch of amateurs in the subject? --Paul Hoffman ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
Paul Hoffman paul.hoff...@vpnc.org writes: You've now exported crypto to a restricted country. What happens next? You ask a lawyer or a legislator, not a bunch of amateurs in the subject? Have you tried asking a lawyer or legislator? Would you say the look you got in response was more deer-in-headlights, or cow-at-an-oncoming-train? (It was also something of a rhetorical question). Peter. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
The entire idea that such countries don't have strong crypto because of the export restrictions is goofy. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On 03/03/2013 11:34 AM, Paul Hoffman wrote: You've now exported crypto to a restricted country. What happens next? You ask a lawyer or a legislator, not a bunch of amateurs in the subject? +1 As someone who personally reviewed hundreds of pages of EAR rules, applied for and received License Exceptions for the export of our key-management and PKI appliances, I would conjecture that crypto in JavaScript would violate US export laws. Companies/Individuals that create crypto are restricted from shipping/selling it to people even in the USA if they appear on the Denied Persons List: http://www.bis.doc.gov/dpl/default.shtm As is typical, my guess is that the law is trailing the technology curve, explaining why the practice is not explicitly controlled. But, in the US - and I suspect, many other nations - ignorance of the law is not an excuse/alibi for breaking the law. Arshad Noor StrongAuth, Inc. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On Sun, Mar 3, 2013 at 3:18 PM, Arshad Noor arshad.n...@strongauth.com wrote: On 03/03/2013 11:34 AM, Paul Hoffman wrote: You've now exported crypto to a restricted country. What happens next? You ask a lawyer or a legislator, not a bunch of amateurs in the subject? +1 As someone who personally reviewed hundreds of pages of EAR rules, applied for and received License Exceptions for the export Have you spoken to Anita? She is very helpful :) key-management and PKI appliances, I would conjecture that crypto in JavaScript would violate US export laws. Key management may or may not be covered by export controls. It depends on whether you are using encryption. You can perform key agreement (Diffie-Hellman) and not require an export license. But if you key a block cipher with the shared secret, you will need a license. If you are doing key transport (RSA), then you would need a license. EAP-PSK, with its underlying block cipher, also requires a license. Authentication does not require a license. Companies/Individuals that create crypto are restricted from shipping/selling it to people even in the USA if they appear on the Denied Persons List: http://www.bis.doc.gov/dpl/default.shtm I believe you can ship to banned countries/individuals, but you need a license that is administered by both Department of Commerce and State Department. Cookie cutter licenses to get approved for the App Store usually don't fall under joint jurisdiction. Jeff ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On 03/03/2013 01:41 PM, Adam Back wrote: Dont tell me you still think you need permission to export RSA in perl to non-embargoed entities: Open-source crypto that is downloadable from public-sites has a special designation in the EAR; you only need to notify the BIS and provide the download URL. While I cannot confirm this, US-companies that provide downloading capabilities - such as sourceforge.net - are required to comply with the EAR when the FOSS has crypto in it and are expected to restrict its distribution. I agree that this does not prevent individuals in permitted countries from downloading such open-source crypto and carrying it with them to embargoed countries/individuals - but at this point, as a US citizen, you will have broken the law. What happens after that is up to your lawyers and the USDOJ. I also agree that all this seems irrelevant considering that everyone has access to strong crypto in one form or another; but, even a stupid law is still the law. As a democracy, we have the ability to change it if its important enough to us, but when bigger issues are fumbled regularly, crypto-regulation should be the least of our problems. Its easier for small companies like ours to comply with it than fight it. Arshad Noor StrongAuth, Inc. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On Sun, Mar 3, 2013 at 4:41 PM, Adam Back a...@cypherspace.org wrote: Unless you're selling SSL MITM boxes to tyrants dictators, then of course its alright ;) Well maybe they'll turn a blind eye if the West is propping up that particular tyrant until they flip flop. Anyway wasnt all that US export of crypto code nonsense tidied up a decade or so ago? PRZ did not go to jail, and neither will you? Isnt at this stage more that you optionally notify BIS via email as courtesy rather than ask for permission? Dont tell me you still think you need permission to export RSA in perl to non-embargoed entities: I believe it depends on who you are :) Little folks like me have to play by the rules, or risk getting the Schwartz treatment from folks like Steve Heymann and Carmen Ortiz. Corporate America gets to opt-in to Federal law. Jeff ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
The realism of export restricting open source software is utterly ludicrous. Any self-declaration click-through someone might implement can be clicked through by anyone, from anywhere, and I presume someone from an embargoed country is more worried about their own countries laws than US laws, to the extent that it is apparently illegal in the US to ignore site policies (which itself is stupid, as the Swartz case demonstrates). In fact anyway most countries that are likely to be on an embargo list, probably are so repressive they dont allow encryption for their subjects anyway. If the government of the embargoed country wants a piece of software you can be damn sure a click through isnt going to stop them. Also the exemptions and conflicts are getting confusing - in some cases the USG has actually funded encryption softare for VPN tunneling targetted at the regimes of a very likely overlapping set of countries that it is embargoing. I guess we want their citizens to have encryption to tunnel out, but not their government nor arms-manufacturers. Governments and most corporations cant seem to keep the Chinese from bulk downloading all their firewalled restricted secrets or IP never mind stuff that is available for open download by design! I guess they never heard of VPNs and proxies. If everyone and his dog can stream movies from any country-IP restricted service, I dare say they can download any bits they care to with zip effort. You know I did hear it is also the law that hackney carriages (aka taxi cabs) in london must carry a fresh bale of straw, makes about as much sense as open source and jscript crypto export restrictions in an internet world. It does make a lot of sense not to sell embargoed countries physical weaponry. (I guess unless the West has just flip-flopped sides on the embargoed country and the newly installed dictator is now our dictator, then the mil-industry complex will be glad to have a clearance sale of previous previous gen old-stock mil-hardware.) Well anyway you can see the logic of not offering assistance of any form, paid or free, to these embargoed orgs and countries, but the futility of trying to censor information is just dumb. Maybe it would be more productive in the current USG info-war mentality to block and disconnect embargoed orgs and countries government sites from the internet in general. (But not their citizens who presumably we encourage to read international news etc). But that obviously is also at best going to be a minor irritant to them - they can just install consumer labeled IPs and tunnels. Adam On Mon, Mar 04, 2013 at 11:21:04AM +1300, Peter Gutmann wrote: Arshad Noor arshad.n...@strongauth.com writes: Open-source crypto that is downloadable from public-sites has a special designation in the EAR; you only need to notify the BIS and provide the download URL. Controls for export to the Twhatever-it-is-this-week countries override the 5D002 exception. In other words there's an exception to the exception (or in computer security terms the deny MAC overrides the allow MAC). This is why I specifically mentioned countries like North Korea and Iran. Peter. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On 2013-03-04 8:48 AM, Jeffrey Walton wrote: Little folks like me have to play by the rules, or risk getting the Schwartz treatment from folks like Steve Heymann and Carmen Ortiz. No, we don't have to play by these rules, which our rulers have pretty much forgotten about. Swartz penetrated the firewall by physically trespassing and hiding his laptop in a closet, which strikes me as mighty primitive for an officially designated genius, and the kind of thing that should get anyone into big trouble. If someone sticks his laptop in my closet to download my files, I will erase it with a ten pound hammer, and when he shows up to collect it, will deal with him similarly. It is a good thing that Swartz killed himself, like his hero Wallace. Both of them needed killing. Swartz was officially designated a genius because a leftist. He committed suicide, not because the state was feebly going through the motions of punishing him for illegal acts but because of the characteristic left wing disease of self hate.Leftists hate whites because they are themselves white and hate America because they are American. It is Jewish leftists like Rahm Israel Emanuel that seek the destruction of Israel.* *Swartz was a die-hard David Foster Wallace fan. Anyone who reads David Foster Wallace is influenced to commit suicide, and anyone who is a fan probably should commit suicide. David Foster Wallace is the type specimen for leftist self hatred. Wallace's suicidal propensities are an integral part of his leftism. If you want to be sincerely leftist, you have to be sincerely utilitarian. But no one can be sincerely utilitarian. The best approximation to utilitarianism one can achieve, is not to love distant strangers equally with oneself and those close to one, but hate oneself and those close to one, which Wallace did with maniacal intensity, until finally murdering himself out of hatred and despair. Leftists are notoriously self hating, Jews notoriously prone to self hate, so Jewish leftists are close to the top in self hate, though the Khmer Rouge take the all time prize for self hate by far. Of course often self haters are not literally self haters - like Rahm Israel Emanuel they hate the group of which they are part, and seek to exterminate it, but are very smug about themselves and their friends. But often, keenly aware of this hypocrisy, they are quite literally self haters, Wallace being an obvious example, indeed the obvious example. And since Swartz was a fan of Wallace, Swartz probably also literally hated himself - privileged and all that. Wallace, like Swartz, was a manufactured genius, an official genius. Wallace only wrote two fiction books, the broom of the system, and infinite jest, which very few people actually read. (The Pale King was ghostwritten) He seems to have been funded entirely by Academia, which is to say, funded by the left for being an articulate and relatively readable left winger - but not so articulate and readable that he could actually make a living out of writing. Wallace bears the same relationship to real writers, as Joe the puppeteer bears to real puppeteers. If someone is a fan of Wallace, it is because being an official leftist, it is officially high status to be a fan of Wallace. It is officially required that Wallace be highly regarded. He was officially credentialed as an important writer, therefore it demonstrates high status to fellow insiders to highly regard him. If you know that Wallace is officially a worthy writer, this shows you are knowledgeable about official truth, therefore an important cog in the system of propagating and enforcing official truth on the ignorant masses. Wallace was suicidally self hating, evil, and insane, murderously hating everyone close to him and himself most of all. The left loved him because his self hatred made demented evil seem plausibly moralistic, but as for his fiction writing, as far as I can tell, no one read him, including his biggest fans. Pity about that. If more of his biggest fans read him, more of them would follow in his tracks by killing themselves. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
It is a good thing that Swartz killed himself, like his hero Wallace. Both of them needed killing. This is the stupidest thing I have read in a long time. Shut the fuck up. It is Jewish leftists like Rahm Israel Emanuel that seek the destruction of Israel. Israel is disliked in most countries outside of the United States, not by self-hating Israelites, but by people who perceive Israel to be a harrasser. It is officially required that Wallace be highly regarded. He was officially credentialed as an important writer, therefore it demonstrates high status to fellow insiders to highly regard him. Yes, and your website celebrates Ayn Rand and dismisses Noam Chomsky. Could you possibly get more cliché? Say what you will about the semi-morbid posthumous inflation of Aaron Swartz contributions and stature, but don't pretend to know what he thought, or whether the prosecution's attempts were feeble. And try to see the world as a little more than one occupied by self-hating leftists who should kill themselves and people who love freedom. On Mon, Mar 4, 2013 at 1:45 AM, James A. Donald jam...@echeque.com wrote: On 2013-03-04 8:48 AM, Jeffrey Walton wrote: Little folks like me have to play by the rules, or risk getting the Schwartz treatment from folks like Steve Heymann and Carmen Ortiz. No, we don't have to play by these rules, which our rulers have pretty much forgotten about. Swartz penetrated the firewall by physically trespassing and hiding his laptop in a closet, which strikes me as mighty primitive for an officially designated genius, and the kind of thing that should get anyone into big trouble. If someone sticks his laptop in my closet to download my files, I will erase it with a ten pound hammer, and when he shows up to collect it, will deal with him similarly. It is a good thing that Swartz killed himself, like his hero Wallace. Both of them needed killing. Swartz was officially designated a genius because a leftist. He committed suicide, not because the state was feebly going through the motions of punishing him for illegal acts but because of the characteristic left wing disease of self hate.Leftists hate whites because they are themselves white and hate America because they are American. It is Jewish leftists like Rahm Israel Emanuel that seek the destruction of Israel.* *Swartz was a die-hard David Foster Wallace fan. Anyone who reads David Foster Wallace is influenced to commit suicide, and anyone who is a fan probably should commit suicide. David Foster Wallace is the type specimen for leftist self hatred. Wallace's suicidal propensities are an integral part of his leftism. If you want to be sincerely leftist, you have to be sincerely utilitarian. But no one can be sincerely utilitarian. The best approximation to utilitarianism one can achieve, is not to love distant strangers equally with oneself and those close to one, but hate oneself and those close to one, which Wallace did with maniacal intensity, until finally murdering himself out of hatred and despair. Leftists are notoriously self hating, Jews notoriously prone to self hate, so Jewish leftists are close to the top in self hate, though the Khmer Rouge take the all time prize for self hate by far. Of course often self haters are not literally self haters - like Rahm Israel Emanuel they hate the group of which they are part, and seek to exterminate it, but are very smug about themselves and their friends. But often, keenly aware of this hypocrisy, they are quite literally self haters, Wallace being an obvious example, indeed the obvious example. And since Swartz was a fan of Wallace, Swartz probably also literally hated himself - privileged and all that. Wallace, like Swartz, was a manufactured genius, an official genius. Wallace only wrote two fiction books, the broom of the system, and infinite jest, which very few people actually read. (The Pale King was ghostwritten) He seems to have been funded entirely by Academia, which is to say, funded by the left for being an articulate and relatively readable left winger - but not so articulate and readable that he could actually make a living out of writing. Wallace bears the same relationship to real writers, as Joe the puppeteer bears to real puppeteers. If someone is a fan of Wallace, it is because being an official leftist, it is officially high status to be a fan of Wallace. It is officially required that Wallace be highly regarded. He was officially credentialed as an important writer, therefore it demonstrates high status to fellow insiders to highly regard him. If you know that Wallace is officially a worthy writer, this shows you are knowledgeable about official truth, therefore an important cog in the system of propagating and enforcing official truth on the ignorant masses. Wallace was suicidally self hating, evil, and insane, murderously hating everyone close to him and himself
Re: [cryptography] Interesting Webcrypto question
On 2013-03-04 11:09 AM, Patrick Mylund Nielsen wrote: Say what you will about the semi-morbid posthumous inflation of Aaron Swartz contributions and stature, but don't pretend to know what he thought I know what Wallace thought and Wallace was evil, insane, and suicidal. Swartz described himself as a die hard fan of Wallace. , or whether the prosecution's attempts were feeble. Everyone knew that after much drama Swartz was going to be let off, after the fashion of Thoreau and the Occupy arrestees. This dance, where the official left charges the official left with crimes against the state, then lets them off with a slap on the wrist, has been carried out every couple of years ever since Thoreau, carried out every few years for a hundred and sixty years. Why would Swartz be treated differently from all the others? And then, right in the middle of the dance, he kills himself. There was never the slightest danger that Swartz, official genius, was going to do hard time, any more than Thoreau was in any danger of doing hard time. It is government policy, and a perfectly sound, wise and uncontroversial government policy, that science should move to open publication. Swartz, like Thoreau, was doing the standard official left thing, of heroically demanding that the government do what it wants to do anyway and is about to do regardless. The prospect of going to jail for criminal acts committed in the course of making such demands is remote. And, to get back on topic, the prospect of going to jail for having encryption script on a web paged accessed from North Korea is remote, because the silliness of such laws is widely recognized, though unmentionable - which was, I think Peter Gutmann's point. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On Sun, Mar 3, 2013 at 12:29 PM, Open eSignForms yoz...@gmail.com wrote: The entire idea that such countries don't have strong crypto because of the export restrictions is goofy. this can be shorted to: export restrictions [are] goofy in the last decade the crypto export hassles i have experienced are around hardware security modules / crypto accelerators, not software. i'd love to see some useful information on the subject... (and by hassle i mean waiting 6-8 weeks to pass $tla_scrutiny for shipment, nothing more) ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Interesting Webcrypto question
On 2013-03-04 8:10 AM, Arshad Noor wrote: I also agree that all this seems irrelevant considering that everyone has access to strong crypto in one form or another; but, even a stupid law is still the law. Much though we long for the glory days when cypherpunks actually were a persecuted minority engaged in genuine civil disobedience, the government is not interested in supplying us with drama. Laws ceased to matter about a decade or so ago, having lost any relationship to what is likely to result in punishment. What was done to the constitution, has now been done to law, and is in turn being done to regulation. Laws are increasingly idiotic, because no one cares what they say, hence the famous proclamation that we had to pass Obamacare to find out what it was. (And we still do not know what it is) The US government has lost interest in restricting strong crypto, in part because everyone is reporting their most secret activities to google, in part because everyone relies on PKI, which is no obstacle to the US government, but mostly because that horse has bolted, it is a bit late to lock the stable door, and everyone knows it. It does not matter what the law says, it matters what the US Government cares about. And the US government does not care about strong crypto any more. Now bitcoin, that could well see some drama, especially when the US starts actively resisting the decline of its role as the supplier of the world's currency, but right now the potential for drama is limited even there, because our rulers cannot seem to imagine loss of faith in the US dollar. As yet they only care about bitcoin to the extent that it is a way of laundering US dollars, not as a competitor to US dollars. There are two ways you can get heroic and dramatic civil disobedience. One is, like Swartz, to demand what the government is about to give anyway, which is apt to be good for one's career, if you refrain from killing yourself for no sane reason. The other is to provide what seriously pisses the government off, like Julian Assange did, which is not so good for one's career. Hey, Julian Assange, how do you feel about feminism these days? Not quite so keen on it as you used to be? No means no even when it follows sex by thirty six hours. The state department is the in large part the headquarters of the official international left. Julian Assange supplied a whole pile of telegrams that made the state department, and official leftism, look extremely bad, revealed international leftists as muppets of the state department, as they used to be puppets of Stalin. An ample supply of entirely genuine heroic and dramatic disobedience ensued, probably a great deal more than Julian Assange was expecting. Way to Go Assange! I am cheering Assange as much as I am pissing on Swartz, though I doubt Assange realized just how genuine his civil disobedience was going to be. He never intended to be the actually genuine hero, though he is now very reluctantly rising to the occasion. However, we cannot commit strong crypto civil disobedience, because everyone know the government does not care, and bitcoin is not /yet/ civil disobedience, and when it becomes civil disobedience, it will be a whole lot safer committing that disobedience through a non US identity in a non US location. When the US government gets the hots to shut down bitcoin, it is going to be the way they went after Assange, not the way they went after Swartz. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography