Re: Reverse Palladium?

2005-07-15 Thread Adam Back
Anonymous writes in favor of palladium arguing that it is optional, so
all is ok.

On Wed, Jul 13, 2005 at 12:15:21AM -0700, cypherpunk wrote:
 This is precisely the security model which has so many people upset:
 the system owner (the network admin) is giving up control over his
 machine, running software which he cannot control, molest or
 modify. You, a third party, are protected against the computer's
 owner. The ability for owners to voluntarily and verifiably give up
 a degree of control over their computers is anathema to Trusted
 Computing opponents, the height of evil and a threat to be fought at
 all costs. 

See I think it is entirely possible to get the benefits of secure
compartments, which are secured from hostile software, without locking
out the owner of the machine.

All that is needed is to turn over control of the machine to the
owner.  Give the owner of the machine keys for ring-1; he can have a
secured login to ring-1 where he gets to choose which ring-1 processes
he can attach a debugger to, binary patch etc and which loadable
things which are hashed for verification by remote attestation to lie
about the hash of.

In this way the owner can be sure he won't get valuable data hacked by
viruses, trojans etc; (well as secure as he can be under the palladium
model) but the evil remote non-optional control of your own hardware
is removed from the picture.

So the optionality anonymous is arguing about is your option to be
refused service outright, or cede ring-1 level (compartmented) access
to your machine.  ie to allow 3rd party software to run that you are
NOT able to debug, inspect, look at source or executable for, patch or
fix to your liking.

And how far this kind of optionality extends depends on the
architecture choices of microsoft eg al in how deeply they embed this
into the OS, their applications and programming frameworks, and how
much other companies choose to use this stuff.

So microsoft has already talked about software rental, etc etc; and
has a history of increasingly intrusive and annoying license
enforcement, so if you ask me you can bet your money that this will be
used throughout the whole system to the point where you can have the
option to switch off your machine, or give up control.  The OS will
become a container for rented, DRMed, uninspectable, unsniffable,
unpatchable corporate-warez.

 The fact that it is voluntary for all concerned means nothing to
 them. 

It would if it was.  But its not.  If its voluntary, give me the keys
to my own computer.  If you're not going to do that then shutup about
voluntary.  You have about as much control over your own machine
under palladium as you do over a user account on a remote system you
do not have root on.  Except it's your machine! and you still don't
get to control it.

 They don't want people even to have the chance to be tempted to
 utilize this technology, and they will stop at nothing to keep it
 from coming into existence. So far they have been extremely
 successful.

You need to go read Richard Stallman's essay on the right to read.
You and others proposing this software are trying to fast-track us to
the scary but plausible future under Palladium that Richard
presciently paints.

http://www.gnu.org/philosophy/right-to-read.html

Adam



Re: Reverse Palladium?

2005-07-14 Thread Bill Stewart

At 11:47 AM 7/12/2005, Tyler Durden wrote:
How secure can I make a Java sandbox from the rest of the network I'm on? 
Can I make it so that my network administrator can't see what I'm typing? 
In other words, a secure environment that's sitting on an insecure machine.



There's the network and there's the computer.
If you're on a computer you can't trust, you can't trust it.
If you're the sysadmin for the box, and nobody else is,
then you're only exposed to eavesdropping on the network.
If you can't trust the sysadmins for the computer not to
do keystroke logging and CarbonCopy your screen,
you've got a much tougher threat model.

If you've got a machine you're willing to trust,
you can tunnel everything else you do through encrypted tunnels;
the network administrator will be able to see where
the outside of the outer tunnel is, if that bothers you.

There are a number of SSL-based VPN tunnel products on the market,
including some that just use the browser's SSL capabilities,
some that use a browser with Java app clients,
and some that use actual installed client software.
Aventail is one vendor, Cisco's another, there are lots more,
but I haven't seen any open-source server versions (e.g. Apache plugins),
though some servers do at least run on Linux.

Some of Aventail's products are made to run on a
publicly-accessible machine, e.g. cybercafe model,
and give you a virtual desktop that looks like your home system
and clean up after themselves when you log off.





Re: Reverse Palladium?

2005-07-13 Thread Michael Silk
Well not with java ...? Any keylogger would catch what you type; or
any mouse-logger could catch what you click.

You could either attempt to remove/bypass keyloggers with a
lower-level language, or type in code.

..

-- Michael

On 7/13/05, Tyler Durden [EMAIL PROTECTED] wrote:
 How secure can I make a Java sandbox from the rest of the network I'm on?
 Can I make it so that my network administrator can't see what I'm typing? In
 other words, a secure environment that's sitting on an insecure machine.
 
 And of course, there's a short term 'solution' (which will work until they
 catch on) and then a long-term solution (which they can't very easily stop
 even when they know such a thing exists).
 
 Oh, and it helps to remember that a network admin AIN'T an engineer: If
 Microsoft or someone hasn't built an app for it, then they can't do anything
 about it.
 
 -TD



Re: Reverse Palladium?

2005-07-13 Thread cypherpunk
On 7/12/05, Tyler Durden [EMAIL PROTECTED] wrote:
 How secure can I make a Java sandbox from the rest of the network I'm on?
 Can I make it so that my network administrator can't see what I'm typing? In
 other words, a secure environment that's sitting on an insecure machine.

Although you asked about Reverse Palladium what you really want is
Palladium itself. This is precisely the security model which has so
many people upset: the system owner (the network admin) is giving up
control over his machine, running software which he cannot control,
molest or modify. You, a third party, are protected against the
computer's owner. The ability for owners to voluntarily and verifiably
give up a degree of control over their computers is anathema to
Trusted Computing opponents, the height of evil and a threat to be
fought at all costs. The fact that it is voluntary for all concerned
means nothing to them. They don't want people even to have the chance
to be tempted to utilize this technology, and they will stop at
nothing to keep it from coming into existence. So far they have been
extremely successful.

See 
http://invisiblog.com/1c801df4aee49232/article/9d481af00c898ae91748f2f0cd97cf80
for discussion about how to use Palladium to add security to Internet
voting applications, even for cases where people are voting on
machines owned by others. This is very similar to the threat model in
your situation.

CP



Reverse Palladium?

2005-07-12 Thread Tyler Durden
How secure can I make a Java sandbox from the rest of the network I'm on? 
Can I make it so that my network administrator can't see what I'm typing? In 
other words, a secure environment that's sitting on an insecure machine.


And of course, there's a short term 'solution' (which will work until they 
catch on) and then a long-term solution (which they can't very easily stop 
even when they know such a thing exists).


Oh, and it helps to remember that a network admin AIN'T an engineer: If 
Microsoft or someone hasn't built an app for it, then they can't do anything 
about it.


-TD