[liberationtech] How to remain secure against NSA surveillance

2013-09-06 Thread Eugen Leitl

http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance

How to remain secure against NSA surveillance

The NSA has huge capabilities – and if it wants in to your computer, it's in.
With that in mind, here are five ways to stay safe
 
Bruce Schneier

theguardian.com, Thursday 5 September 2013 20.06 BST

A patron works on his laptop during the Tech Crunch Disrupt conference in San
Francisco, California, September 11.

'Trust the math. Encryption is your friend. That's how you can remain secure
even in the face of the NSA.' Photograph: Beck Diefenbach/Reuters

Now that we have enough details about how the NSA eavesdrops on the internet,
including today's disclosures of the NSA's deliberate weakening of
cryptographic systems, we can finally start to figure out how to protect
ourselves.

For the past two weeks, I have been working with the Guardian on NSA stories,
and have read hundreds of top-secret NSA documents provided by whistleblower
Edward Snowden. I wasn't part of today's story – it was in process well
before I showed up – but everything I read confirms what the Guardian is
reporting.

At this point, I feel I can provide some advice for keeping secure against
such an adversary.

The primary way the NSA eavesdrops on internet communications is in the
network. That's where their capabilities best scale. They have invested in
enormous programs to automatically collect and analyze network traffic.
Anything that requires them to attack individual endpoint computers is
significantly more costly and risky for them, and they will do those things
carefully and sparingly.

Leveraging its secret agreements with telecommunications companies – all the
US and UK ones, and many other partners around the world – the NSA gets
access to the communications trunks that move internet traffic. In cases
where it doesn't have that sort of friendly access, it does its best to
surreptitiously monitor communications channels: tapping undersea cables,
intercepting satellite communications, and so on.

That's an enormous amount of data, and the NSA has equivalently enormous
capabilities to quickly sift through it all, looking for interesting traffic.
Interesting can be defined in many ways: by the source, the destination,
the content, the individuals involved, and so on. This data is funneled into
the vast NSA system for future analysis.

The NSA collects much more metadata about internet traffic: who is talking to
whom, when, how much, and by what mode of communication. Metadata is a lot
easier to store and analyze than content. It can be extremely personal to the
individual, and is enormously valuable intelligence.

The Systems Intelligence Directorate is in charge of data collection, and the
resources it devotes to this is staggering. I read status report after status
report about these programs, discussing capabilities, operational details,
planned upgrades, and so on. Each individual problem – recovering electronic
signals from fiber, keeping up with the terabyte streams as they go by,
filtering out the interesting stuff – has its own group dedicated to solving
it. Its reach is global.

The NSA also attacks network devices directly: routers, switches, firewalls,
etc. Most of these devices have surveillance capabilities already built in;
the trick is to surreptitiously turn them on. This is an especially fruitful
avenue of attack; routers are updated less frequently, tend not to have
security software installed on them, and are generally ignored as a
vulnerability.

The NSA also devotes considerable resources to attacking endpoint computers.
This kind of thing is done by its TAO – Tailored Access Operations – group.
TAO has a menu of exploits it can serve up against your computer – whether
you're running Windows, Mac OS, Linux, iOS, or something else – and a variety
of tricks to get them on to your computer. Your anti-virus software won't
detect them, and you'd have trouble finding them even if you knew where to
look. These are hacker tools designed by hackers with an essentially
unlimited budget. What I took away from reading the Snowden documents was
that if the NSA wants in to your computer, it's in. Period.

The NSA deals with any encrypted data it encounters more by subverting the
underlying cryptography than by leveraging any secret mathematical
breakthroughs. First, there's a lot of bad cryptography out there. If it
finds an internet connection protected by MS-CHAP, for example, that's easy
to break and recover the key. It exploits poorly chosen user passwords, using
the same dictionary attacks hackers use in the unclassified world.

As was revealed today, the NSA also works with security product vendors to
ensure that commercial encryption products are broken in secret ways that
only it knows about. We know this has happened historically: CryptoAG and
Lotus Notes are the most public examples, and there is evidence of a back
door in Windows. A few people have told me some recent stories 

Re: [liberationtech] NYTimes and Guardian on NSA

2013-09-06 Thread Ximin Luo
On 05/09/13 21:10, Richard Brooks wrote:
 
 There is a massive difference between cryptanalysis and decade-long,
 well-funded, and top-secret program to subtly weaken international
 cryptographic protocols and sabotage industry implementations.
 
 
 Their job is to collect information for the military. That their
 work is top-secret should be obvious. That they try to weaken
 the crypto not used by the military and US gov. should also be
 taken as a given.
 

You missed his point. subtly weaken international cryptographic protocols and
sabotage industry implementations would be like selling vehicles / buildings /
food with a secret back-channel to the US government to hijack / self-destruct
/ poison the eventual consumer, during peacetime, and to allies.

The NSA does not have a mission to do anything it wants, and you have a
fundamental misunderstanding of the world, and ethics, if you think that it
does, or that it should.

 I'm not necessarily in favor of the NSA doing this, I just find
 some of the shocked outrage silly. It should be obvious that the
 cryptanalysis people work at breaking codes.
 
 (Spying on domestic communications, on the other hand, used to
 be strictly forbidden for good reasons. Among other things, you
 do not want intelligence and counter-intelligence to be friends.)
 
 (Keeping long-term records of domestic communications, is another
 thing that you do not want the intelligence service doing. Their
 are too many temptations for abuse.)
 

-- 
GPG: 4096R/1318EFAC5FBBDBCE
git://github.com/infinity0/pubkeys.git

-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] The US government has betrayed the Internet. We need to take it back

2013-09-06 Thread Eugen Leitl
- Forwarded message from John S. Quarterman jsqna...@quarterman.com 
-

Date: Fri, 06 Sep 2013 06:47:26 -0400
From: John S. Quarterman jsqna...@quarterman.com
To: s...@circlenet.us, John S. Quarterman j...@quarterman.com, 
na...@nanog.org
Subject: Re: The US government has betrayed the Internet. We need to take it 
back


 On 2013-09-06 05:57, Roland Dobbins wrote:

  There are no purely technical solutions to social ills.  Schneier of
  all people should know this.

Schneier does know this, and explicitly said this.

-jsq

 
http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying

Three, we can influence governance. I have resisted saying this up to now,
and I am saddened to say it, but the US has proved to be an unethical
steward of the internet. The UK is no better. The NSA's actions are
legitimizing the internet abuses by China, Russia, Iran and others. We
need to figure out new means of internet governance, ones that makes it
harder for powerful tech countries to monitor everything. For example,
we need to demand transparency, oversight, and accountability from our
governments and corporations.

Unfortunately, this is going play directly into the hands of totalitarian
governments that want to control their country's internet for even more
extreme forms of surveillance. We need to figure out how to prevent that,
too. We need to avoid the mistakes of the International Telecommunications
Union, which has become a forum to legitimize bad government behavior,
and create truly international governance that can't be dominated or
abused by any one country.

Generations from now, when people look back on these early decades of
the internet, I hope they will not be disappointed in us. We can ensure
that they don't only if each of us makes this a priority, and engages in
the debate. We have a moral duty to do this, and we have no time to lose.

Dismantling the surveillance state won't be easy. Has any country that
engaged in mass surveillance of its own citizens voluntarily given up
that capability? Has any mass surveillance country avoided becoming
totalitarian? Whatever happens, we're going to be breaking new ground.

Again, the politics of this is a bigger task than the engineering, but
the engineering is critical. We need to demand that real technologists
be involved in any key government decision making on these issues. We've
had enough of lawyers and politicians not fully understanding technology;
we need technologists at the table when we build tech policy.

To the engineers, I say this: we built the internet, and some of us have
helped to subvert it. Now, those of us who love liberty have to fix it.


- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


[liberationtech] Eccentric Authentication again

2013-09-06 Thread Guido Witmond
Hello all,


I've written two new blog entries on eccentric authentication. The
protocol that uses client certificates and a local CA to distribute
public keys between strangers in a secure way.

I hunbly believe it is the most user friendly way to do cryptography
correctly. End users don't see the crypto at all.


Please read in this order:

http://eccentric-authentication.org/blog/2013/08/31/the-holy-grail-of-cryptography.html

http://eccentric-authentication.org/blog/2013/09/05/a-subversive-idea.html



I'd love to hear comments, remarks, improvements. Feel free to play with
the demo.

Regards, Guido.

PS, it needs Tor or others to protect against traffic analysis.

-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] CFP: WorldCIST'14 - World Conference on IST; Best papers published in ISI Journals

2013-09-06 Thread Maria Lemos
Apologies if you are receiving this mail more than once...

Please disseminate by friends, colleagues, researchers, students, etc. Thanks a 
lot!


**
 WorldCIST'14
The 2014 World Conference on Information Systems and Technologies
April 15 - 18, Madeira Island, Portugal
   http://www.aisti.eu/worldcist14/
**

The 2014 World Conference on Information Systems and Technologies 
(WorldCIST'14: http://www.aisti.eu/worldcist14) is a global forum for 
researchers and practitioners to present and discuss the most recent 
innovations, trends, results, experiences and concerns in the several 
perspectives of Information Systems and Technologies.

We are pleased to invite you to submit your papers to WorldCISTI'14. All 
submissions will be reviewed on the basis of relevance, originality, importance 
and clarity.

 
THEMES

Submitted papers should be related with one or more of the main themes proposed 
for the Conference:

A) Information and Knowledge Management (IKM);

B) Organizational Models and Information Systems (OMIS);

C) Intelligent and Decision Support Systems (IDSS);

D) Software Systems, Architectures, Applications and Tools (SSAAT);

E) Computer Networks, Mobility and Pervasive Systems (CNMPS);

F) Human-Computer Interaction (HCI);

G) Health Informatics (HIS);

H) Information Technologies in Education (ITE).


TYPES OF SUBMISSIONS AND DECISIONS

Four types of papers can be submitted:

Full paper: Finished or consolidated RD works, to be included in one of the 
Conference themes. These papers are assigned a 10-page limit.

Short paper: Ongoing works with relevant preliminary results, open to 
discussion. These papers are assigned a 7-page limit.

Poster paper: Initial work with relevant ideas, open to discussion. These 
papers are assigned to a 4-page limit.

Company paper: Companies' papers that show practical experience, R  D, tools, 
etc., focused on some topics of the conference. These papers are assigned to a 
4-page limit.

Submitted papers must comply with the format of Advances in Intelligent Systems 
and Computing Series (see Instructions for Authors at Springer Website or 
download a DOC example) be written in English, must not have been published 
before, not be under review for any other conference or publication and not 
include any information leading to the authors’ identification. Therefore, the 
authors’ names, affiliations and bibliographic references should not be 
included in the version for evaluation by the Program Committee. This 
information should only be included in the camera-ready version, saved in Word 
or Latex format and also in PDF format. These files must be accompanied by the 
Consent to Publication form filled out, in a ZIP file, and uploaded at the 
conference management system.

All papers will be subjected to a “double-blind review” by at least two members 
of the Program Committee.

Based on Program Committee evaluation, a paper can be rejected or accepted by 
the Conference Chairs. In the later case, it can be accepted as the type 
originally submitted or as another type. Thus, full papers can be accepted as 
short papers or poster papers only. Similarly, short papers can be accepted as 
poster papers only. In these cases, the authors will be allowed to maintain the 
original number of pages in the camera-ready version.

The authors of accepted poster papers must also build and print a poster to be 
exhibited during the Conference. This poster must follow an A1 or A2 vertical 
format. The Conference includes Work Sessions where these posters are presented 
and orally discussed, with a 5 minute limit per poster.

The authors of accepted full papers will have 15 minutes to present their work 
in a Conference Work Session; approximately 5 minutes of discussion will follow 
each presentation. The authors of accepted short papers and company papers will 
have 11 minutes to present their work in a Conference Work Session; 
approximately 4 minutes of discussion will follow each presentation.


PUBLICATION AND INDEXING

To ensure that a full paper, short paper, poster paper or company paper is 
published in the Proceedings, at least one of the authors must be fully 
registered by the 24th of January 2014, and the paper must comply with the 
suggested layout and page-limit. Additionally, all recommended changes must be 
addressed by the authors before they submit the camera-ready version.

No more than one paper per registration will be published in the Conference 
Proceedings. An extra fee must be paid for publication of additional papers, 
with a maximum of one additional paper per registration.

Full and short papers will be published in Proceedings by Springer, in Advances 
in Intelligent Systems and Computing Series. Poster and company papers will be 

Re: [liberationtech] NYTimes and Guardian on NSA

2013-09-06 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 05/09/13 21:10, Richard Brooks wrote:
 
 There is a massive difference between cryptanalysis and
 decade-long, well-funded, and top-secret program to subtly weaken
 international cryptographic protocols and sabotage industry
 implementations.
 
 
 Their job is to collect information for the military. That their 
 work is top-secret should be obvious. That they try to weaken the
 crypto not used by the military and US gov. should also be taken as
 a given.

They have two jobs: to monitor foreign communication, and to secure
domestic communication against foreign monitoring.

http://www.nsa.gov/about/mission/

The argument for trusting NSA/NIST crypto standards has historically
been that weak crypto would make the first job easier but the second
job harder. We now have to re-examine that argument and ask whether
the NSA has been gambling with the security of US commercial,
government and military data (up to top secret level - the highest
level that relies on NSA/NIST-published standards) in order to further
its surveillance mission.

Cheers,
Michael
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJSKemfAAoJEBEET9GfxSfMEOIH/0UEKnJkh+nL2gC2hNRp+N8S
hrQeBqLL5oBy2zBbgunXVTlTBA/3YFAmbqdXwnTlGeO9Oypns0cxap3P8bzBKxVr
V0jAWpe8edzZ47RyaKEI25op7K8pJnRHKPBgVIoUk8x0j6QkqJ+yV/C59in3u2e1
DPSJvddH408yo57qge90zh55OLM/FQKFnRM3U2fUnOAQrWkYkRqAsDDfh1XPYwaY
G0Lyuv/NRuJDoUgqIl8IXuB4ZBNxth72u0iSvoSD1q7npVU/vzkLttEwtb/4fSxc
J/wzGayX+9+zti3VrqGuW9HA7ya6ZYln7TN7ZYXU4CHLz4RuOlkUD9ac5xJzUl4=
=cPKX
-END PGP SIGNATURE-
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] CFP: WorldCIST'14 - World Conference on IST; Best papers published in ISI Journals

2013-09-06 Thread Rich Kulawiec

This is a fraudulent/fake conference being promoted via spam.  I recommend
permanently blacklisting the sender.

---rsk
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Iranian users vs. FB new policy

2013-09-06 Thread Amin Sabeti
It was helpful :)

Thanks,

A


On 5 September 2013 06:26, Jillian C. York jilliancy...@gmail.com wrote:

 Individuals on the SDN list can be searched here:
 http://sdnsearch.ofac.treas.gov/default.aspx


  On Tue, Sep 3, 2013 at 11:45 AM, Amin Sabeti aminsab...@gmail.comwrote:

 Then can we say FB can block the Iran's Supreme Leader page or the
 Rouhani one?

 Sent from my iPhone

 On 3 Sep 2013, at 18:50, Collin Anderson col...@averysmallbird.com
 wrote:

 No, this is clearly covered by General License D for Iran and the
 'personal communications' exemptions in other sanctions regimes -- it's a
 nice find, but I suspect it targets individuals designated under the SDN
 list.


 On Tue, Sep 3, 2013 at 12:55 PM, Amin Sabeti aminsab...@gmail.comwrote:

 Hi,

 I was reading the new FB policy and this part was interesting for me as
 an Iranian:

 *Special Provisions Applicable to Users Outside the United States.*  We
 made clear that you are not allowed to use Facebook if you are prohibited
 from receiving products or services from the United States.


 Regarding this article, Facebook can block and remove all users from
 Iran. Am I right?

 I think this article is a bit tricky. What do you think guys?

 Amin

 --
 Liberationtech is a public list whose archives are searchable on Google.
 Violations of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu.




 --
 *Collin David Anderson*
 averysmallbird.com | @cda | Washington, D.C.

 --
 Liberationtech is a public list whose archives are searchable on Google.
 Violations of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu.


 --
 Liberationtech is a public list whose archives are searchable on Google.
 Violations of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu.




 --
 *Note: *I am slowly extricating myself from Gmail. Please change your
 address books to: jilliancy...@riseup.net or jill...@eff.org.

 US: +1-857-891-4244 | NL: +31-657086088
 site:  jilliancyork.com http://jilliancyork.com/* | *
 twitter: @jilliancyork* *

 We must not be afraid of dreaming the seemingly impossible if we want the
 seemingly impossible to become a reality - *Vaclav Havel*

 --
 Liberationtech is a public list whose archives are searchable on Google.
 Violations of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu.

-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] NYTimes and Guardian on NSA

2013-09-06 Thread Matt Johnson
Hello Shava,

You wrote: ...the president essentially struck down posse comitatus
in May, they won't know what you are talking about... I don't know
what you are talking about either, but I am curious. Could you send a
link or two.


Thanks
-- Matt Johnson

On Thu, Sep 5, 2013 at 5:00 PM, Shava Nerad shav...@gmail.com wrote:
 Part of the tone is also adopted in order to wake the sleeping baby
 anti-intellectual giants either side of the pond.  The smart magazines can
 publish smart crypto articles, but mass market newspapers have to bring
 their audiences along, even the Times and Guardian.

 Very few stories even bother to explain what the NSA does or what its
 function in government is, which actually rather stuns me, because I find
 that when I ask the general public that question I find that most of them
 don't know what the NSA does for the government.  Most of them assume it
 works for the executive branch, but for the DOJ as part of the whole
 civilian/State/FBI sort of DHS bits, because those lines are so muddied.
 (And yes, I am conflating Justice and State on purpose there because it's
 been done in conversation with The (Wo)Man on the Street.).

 People don't know basic civics.  At all.  If you tell them they should be
 upset because the military is conducting domestic surveillance, they look at
 you like what?  East Germany?  you say.  Stasi? you say.  Blank looks.
 No history.  Those who do not learn from history, etc.

 If you tell them that they should be upset because the president essentially
 struck down posse comitatus in May, they won't know what you are talking
 about, but if you say, Basically, if a local SWAT team decides they need
 backup in some kind of emergency situation and they can't get hold of the
 governor to call for National Guard?  They can call a local military airbase
 for an airstrike if they want to.   Then the people will decide you are
 cold stoned mad and a total tin hat.  Sherman?  you say.  And if they're
 from the south, they might go off in a rant, but they still won't relate it
 to current affairs or do anything.  But that is literally what the law says
 in the US now.  That's a bit beyond elementary civics, but it's a bit beyond
 what the press is reporting on here too.  Because the press doesn't really
 have much literacy in elementary civics or history either.  They seem to be
 drawing mostly on marcom majors these days.

 This is what the attention economy has done to us.  Our culture is a deep,
 nutrient rich ocean, full of wonders and cthonic monsters that can eat us.
 And we all surf.  Nothing below the surf-ace is important anymore.

 Yay.

 SN

 On Sep 5, 2013 3:31 PM, Richard Brooks r...@acm.org wrote:

 Latest articles:


 http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?emc=edit_na_20130905_r=0pagewanted=print


 http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security


 I find most of this (if not all) silly. They seem shocked that the
 NSA does cryptanalysis. It would be nice if the newspapers had
 people with some knowledge of the domain writing articles.

 --
 Liberationtech is a public list whose archives are searchable on Google.
 Violations of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
 change to digest, or change password by emailing moderator at
 compa...@stanford.edu.


 --
 Liberationtech is a public list whose archives are searchable on Google.
 Violations of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
 change to digest, or change password by emailing moderator at
 compa...@stanford.edu.
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] CFP: WorldCIST'14 - World Conference on IST; Best papers published in ISI Journals

2013-09-06 Thread Yosem Companys
Done.  Sender was indeed a spammer and has been removed from list and
permanently blacklisted.


On Fri, Sep 6, 2013 at 8:05 AM, Rich Kulawiec r...@gsp.org wrote:


 This is a fraudulent/fake conference being promoted via spam.  I recommend
 permanently blacklisting the sender.

 ---rsk
 --
 Liberationtech is a public list whose archives are searchable on Google.
 Violations of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu.

-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] NYTimes and Guardian on NSA

2013-09-06 Thread Maxim Kammerer
On Fri, Sep 6, 2013 at 7:18 PM, Michael Rogers mich...@briarproject.org wrote:
 Yes, that anecdote often accompanied the argument that NSA wouldn't
 risk peddling weak crypto. Clearly the balance of priorities within
 the agency has shifted since DES.

I don't see any evidence of said shift in priorities. NSA supported
escrowed encryption in the 90's, and the alleged subversion of
standards is most likely similar to escrowed encryption, but at the
algorithmic level [1], where an adversary gaining access to key escrow
requires computational / cryptanalysis effort that's equivalent to
breaking the cryptosystem in question.

[1] https://en.wikipedia.org/wiki/Dual_EC_DRBG

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Recommend consultant to discuss pen test?

2013-09-06 Thread Maxim Kammerer
On Fri, Sep 6, 2013 at 8:03 AM, Tom O winterfi...@gmail.com wrote:
 Posting a news article without context or response from Veracode is weak.

That was just a reminder for a topic that has already been discussed
on this list. My main intention was to provide an example (in the form
of a post similar to yours) for Jonathan Wilkes' remark wrt. affected
reputation.

 Chris Wysopal stated the static crypto checks were run to check if the API's
 were implemented correctly, not implementation of custom keygen.

I am sure there are after-the-fact excuses. Since you didn't provide a
reference, I assume that this specific excuse if not something worthy
of attention. Veracode's report is here, if you are interested:
https://blog.crypto.cat/wp-content/uploads/2013/02/Cryptocat_Attestation_Veracode_20130222_final.pdf

Looking at the code is indeed not mentioned in the report, so it's all
fine, I guess — just make sure something like that is in the next
contract.

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] NYTimes and Guardian on NSA

2013-09-06 Thread Richard Brooks
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 They have two jobs: to monitor foreign communication, and to secure
 domestic communication against foreign monitoring.
 
 http://www.nsa.gov/about/mission/
 
 The argument for trusting NSA/NIST crypto standards has historically
 been that weak crypto would make the first job easier but the second
 job harder. We now have to re-examine that argument and ask whether
 the NSA has been gambling with the security of US commercial,
 government and military data (up to top secret level - the highest
 level that relies on NSA/NIST-published standards) in order to further
 its surveillance mission.
 
That has always been an inherent conflict. It is, however,
difficult to decouple the cryptography and cryptanalysis
expertise.

Interestingly, with the DES standard there were some changes
introduced by NSA that were thought at the time to be backdoors,
since they were never justified.

Many years later, the community realized that these changes made
some obscure attacks less likely.



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlIp7mMACgkQEwFPdUjsHjAkCACg6eajrd6sSr2Gz3aw0Q8dJQ2y
fmoAoNHILC4gjgQV9tS4d/QRg1KupU3g
=lr8i
-END PGP SIGNATURE-
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] getting past that first turtle

2013-09-06 Thread Jonathan Wilkes

On 09/06/2013 12:26 PM, Maxim Kammerer wrote:

On Sat, Aug 31, 2013 at 2:08 AM, Jonathan Wilkes jancs...@yahoo.com wrote:

For example, if it turns out that Bitcoin has a backdoor in it, a
lot of people (some on this list) would take a big reputation hit.

That's most certainly not what would happen in that case. People will
just find excuses — see e.g. people defending Veracode after it failed
to detect basic incompetence in Cryptocat code.


You're shifting the argument so that it suits what you want to say.

The proper comparison with my imagined Bitcoin scenario in this
case would be to Cryptocat and its dev, not Veracode. The core
developer of Cryptocat as well as the software itself has most
certainly taken a reputation hit.

But I have no doubt that in my imagined scenario many companies
who promote and market Bitcoin wouldn't take much of a reputation
hit.  Human affairs are a complex thing.

-Jonathan


The reason is that
those who are most equipped to affect someone's reputation are also
those most likely to have professional relationships with affected
people / companies. The thread continued from [1] clearly illustrates
that — there is no lack of people who can professionally criticize
Veracode's failure, yet they carefully avoid that. Reputation might
suffer, of course, but you would not be aware of that from laymen
discussions.

[1] https://mailman.stanford.edu/pipermail/liberationtech/2013-July/009774.html



--
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Random number generation being influenced - rumors

2013-09-06 Thread Andy Isaacson
On Fri, Sep 06, 2013 at 10:45:46AM -0700, Joe Szilagyi wrote:
 Does anyone put any stock into the rumors floating lately that the
 government may have influenced Intel and/or AMD into altering in
 subtle ways that CPUs handle random number generation? I keep seeing
 this possible FUD floating around in comments here and there on
 other articles.

I agree with some of your premises, but disagree with the conclusion you
seem to be drawing.

Yes, it's just a fear of uncertainty.  We do not have evidence, nor even
a claim based on knowledge, that HWRNG backdooring has occurred.

However, I claim that the fear is well founded and should be taken into
account by all threat models.

HWRNG is a nearly-uniquely difficult security problem to crack.  By
definition it is impossible to prove that a black-box HWRNG is safe.
This is different from the security properties of a blackbox AES or
MODMUL accelerator, which can be demonstrated to conform to a known
specification.  If your AES instructions don't do AES, then testing
against a software implementation will show it!  The AES logic unit
will have a hard time leaking the AES keybits since there's nowhere
nondeterministic to put them.  etc.

By contrast, a properly functioning HWRNG cannot be tested in a way that
distinguishes it from the output of a stream cipher seeded with a
backdoor key.  And there's no way to test the behavior of HWRNG on an
ongoing basis; even if you had a test to run, it might switch to stream
cipher mode under the covers.

This is not to say that RdRand is completely unusable.  Putting RdRand
entropy into a software pool implementation like /dev/urandom (or
preferably, a higher-assurance multipool design like Fortuna) is a cheap
way to prevent a putative backdoor from compromising your system state.

Now, there is a way that we can learn that a backdoor was included; if
someone does a tear-down of a HWRNG and finds circuitry that has no
purpose other than being a backdoor, that would be conclusive.  AFAIK
nobody has tried that experiment.

Weighing towards distrusting HWRNG we have the fact that NSA is reported
(yesterday) to have intentionally backdoored Dual_EC_DRBG, and to have
spent significant amounts of money to backdoor chip implementations,
with enough success that they brag about it in administrative summaries.

So, I put a lot of credence in distrusting HWRNG black box
implementations.  But unfortunately we need a lot more reliable entropy.
A fully open source, nothing up my sleeve hardware entropy source would
be a huge improvement.

-andy
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Recommend consultant to discuss pen test?

2013-09-06 Thread Tom O
I wasn't going to post the twitter stream relating to this. You can look it
up. Veracode was questioned and Chris responded rather quickly. Most were
fine with Veracodes response.

**disclaimer - I have no affiliation with Veracode and have not used their
services. I do know some members in their team though and have found them
to be very competent operators.

On Saturday, September 7, 2013, Maxim Kammerer wrote:

 On Fri, Sep 6, 2013 at 8:03 AM, Tom O winterfi...@gmail.comjavascript:;
 wrote:
  Posting a news article without context or response from Veracode is weak.

 That was just a reminder for a topic that has already been discussed
 on this list. My main intention was to provide an example (in the form
 of a post similar to yours) for Jonathan Wilkes' remark wrt. affected
 reputation.

  Chris Wysopal stated the static crypto checks were run to check if the
 API's
  were implemented correctly, not implementation of custom keygen.

 I am sure there are after-the-fact excuses. Since you didn't provide a
 reference, I assume that this specific excuse if not something worthy
 of attention. Veracode's report is here, if you are interested:

 https://blog.crypto.cat/wp-content/uploads/2013/02/Cryptocat_Attestation_Veracode_20130222_final.pdf

 Looking at the code is indeed not mentioned in the report, so it's all
 fine, I guess — just make sure something like that is in the next
 contract.

 --
 Maxim Kammerer
 Liberté Linux: http://dee.su/liberte
 --
 Liberationtech is a public list whose archives are searchable on Google.
 Violations of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu javascript:;.

-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Random number generation being influenced - rumors

2013-09-06 Thread Leif Ryge
The NYT article doesn't explicitly say they've backdoored hardware RNGs, but
it separately says they've backdoored hardware somehow and and are recovering
keys somehow:

 By this year, the Sigint Enabling Project had found ways inside some of the
 encryption chips that scramble information for businesses and governments,
 either by working with chipmakers to insert back doors or by exploiting
 security flaws, according to the documents.
[...]
 N.S.A. documents show that the agency maintains an internal database of
 encryption keys for specific commercial products, called a Key Provisioning
 Service, which can automatically decode many messages. If the necessary key is
 not in the collection, a request goes to the separate Key Recovery Service,
 which tries to obtain it.
 
 How keys are acquired is shrouded in secrecy, but independent cryptographers
 say many are probably collected by hacking into companies’ computer servers,
 where they are stored.

Sure, the Key Recovery Service might sometimes involve hacking into companies’
computer servers. But, if they're in the business of inserting hardware
backdoors, going after RNGs seems like one of the most obvious things to do
because they could use those backdoors passively without risk of being caught.

There is a lengthy ongoing discussion right now between Theodore Ts'o
(maintainer of Linux's /dev/random) and David Johnston (designer of Intel's
RDRAND) about using RDRAND directly vs mixing it into Linux's entropy pool:
https://plus.google.com/117091380454742934025/posts/SDcoemc9V3J

Here are a few highlights:

David Johnston:
 I've examined my own RNG with electron microscopes and picoprobes. So I and a
 number of test engineers know full well that the design hasn't been
 subverted. For security critical systems, having multiple entropy sources is
 a good defense against a single source being subverted. But if an Intel
 processor were to be subverted, there are better things to attack, like the
 microcode or memory protection or caches. 
[...]
 I understand that I'm in the privileged position of being able to understand
 and examine my own design, where most people cannot. What I would like is for
 people to stop presenting the straw-man argument that the government leant on
 someone, so they must have subverted my RNG design. I would like (and we've
 made this argument to the kernel developers) that there should be a policy
 option so people can choose to benefit from the hardware they paid for and
 choose to trust, or can decide to be more conservative and require the kernel
 to mix more sources.

Theodore Ts'o:
 I never said that the NSA had definitely subverted your design.  Just that it
 is prudent and responsible to acknowledge that they might have done so, and
 so we need to make sure the Linux kernel is robust against that kind of
 failure.  And remember, the random driver is generic code.  Even if Intel is
 clean, maybe AMD, TI, or Qualcomm were successfully leaned on by the US
 Government, and their chips are dirty.   We don't know, and we can't know.
 
 As far as making it be an option to the user, I fail to see the benefit. If
 you can't trust the kernel because the attacker can read arbitrary kernel
 memory, you're doomed anyway.   But unlike the proprietary intel chip, at
 least it's possible to audit the kernel to look for security breaches.
[...]
 If I were the NSA, I'd much rather compromise RDRAND, and then try to
 convince people that it's safer and faster to just use the raw RDRAND when
 creating session keys for IPSEC and GPG and VPN's.  You wouldn't need to get
 compromised code into the target machines, other getting out a meme out to
 developers that using the output of RDRAND directly as a session key was
 somehow best practice.   Wouldn't that be much easier than introducing a
 vulnerability into the page table handling, especially if the goal is to do
 bulk data collection, dragnet-style?

-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] NYTimes and Guardian on NSA

2013-09-06 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/09/13 19:25, Maxim Kammerer wrote:
 I don't see any evidence of said shift in priorities. NSA
 supported escrowed encryption in the 90's, and the alleged
 subversion of standards is most likely similar to escrowed
 encryption, but at the algorithmic level [1], where an adversary
 gaining access to key escrow requires computational / cryptanalysis
 effort that's equivalent to breaking the cryptosystem in question.
 
 [1] https://en.wikipedia.org/wiki/Dual_EC_DRBG

Depends on what you mean by breaking the cryptosystem. Cracking all
instances of the Dual EC DRBG takes equivalent effort to cracking a
single instance of a backdoor-free elliptic curve cryptosystem.

http://rump2007.cr.yp.to/15-shumow.pdf

So the analogy with key escrow is a bit strained. With key escrow, the
adversary has to crack every key individually, whereas with a backdoor
the adversary only has to crack a single key to compromise all users.

Cheers,
Michael

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJSKlLAAAoJEBEET9GfxSfMr9cH/10ZDmMVU+izR62V3KgcKHOT
dJ+HwF0gkJ0FxeBd2xVA47XHbU3Shnni23XdJhS9l7YPlQdSGt07nu3O1srYALYg
a4vt/OCbkREov9F92OpAEsmkTFw0b2eE4+AwTjU5cJ6KnZ2zm7Fr312Z4m5D4SKQ
h2YNNzXimFCQ4GtTZvelqd7gYfpY7P6TFZWVz5uPqLAaX444Fo8ZsH6u6F4vlJMa
/gxDPjXS+5yPHHeYvsHjiiRBBcBYM4SfkmM2emuuOVOdmQOWmD4zRdHjXR82kYca
ZXpZnzXcfqZ5uma5n4tYXuexs+hjt88KCZQ5uBxwE8JMCxn0uyszsWHuazzrf6k=
=SzwW
-END PGP SIGNATURE-
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] getting past that first turtle

2013-09-06 Thread Maxim Kammerer
On Sat, Aug 31, 2013 at 2:08 AM, Jonathan Wilkes jancs...@yahoo.com wrote:
 For example, if it turns out that Bitcoin has a backdoor in it, a
 lot of people (some on this list) would take a big reputation hit.

That's most certainly not what would happen in that case. People will
just find excuses — see e.g. people defending Veracode after it failed
to detect basic incompetence in Cryptocat code. The reason is that
those who are most equipped to affect someone's reputation are also
those most likely to have professional relationships with affected
people / companies. The thread continued from [1] clearly illustrates
that — there is no lack of people who can professionally criticize
Veracode's failure, yet they carefully avoid that. Reputation might
suffer, of course, but you would not be aware of that from laymen
discussions.

[1] https://mailman.stanford.edu/pipermail/liberationtech/2013-July/009774.html

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


[liberationtech] a free, unlimited, encrypted content sharing app

2013-09-06 Thread cont...@ansamb.com
Dear members of the Liberation Technology,
 
I contact you as the co-founder of ]ansamb[. 
]ansamb[ is a Reunion Island (France) based startup that designed a massively 
distributed architecture for content sharing from computer to computer in a 
full encrypted, unlimited and free maner. 

The first product of ]ansamb[ is Places. Places is an open-source framework 
that runs on top of the ]ansamb[ architecture that lets users to create 
multiple virtual shared spaces named “places”. 

For TechCrunch Disrupt @SFO 2013 (this monday!), Places framework is first 
released (the alpha) with two applications for emailing and filesharing. Using 
Place by ]ansamb[, a user is able to share an message or its all hard drive 
with friends. All private, all secure, all free.


With ]ansamb[ and from now on, filesharing is FREE, UNLIMITED and PRIVATE… as 
long as the user have a computer and an Internet connection. 

Please visit www.ansamb.com and particularly 
http://www.ansamb.com/about-us.html to have a deeper idea of our vision.
A short video that describe Places by ]ansamb[ is available here : 
https://www.facebook.com/photo.php?v=1388783941351493l=342686668131697786
You can follow us on Twitter @PlacesByAnsamb and on Facebook at 
https://www.facebook.com/places.ansamb

We will open the alpha test within the next days and hope you to join us to 
build the Internet we want to live in!
Best regards 

The ]ansamb[ team
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] a free, unlimited, encrypted content sharing app

2013-09-06 Thread Andy Isaacson
On Fri, Sep 06, 2013 at 08:59:26PM -0700, cont...@ansamb.com wrote:
 I contact you as the co-founder of ]ansamb[. 
 ]ansamb[ is a Reunion Island (France) based startup that designed a
 massively distributed architecture for content sharing from computer
 to computer in a full encrypted, unlimited and free maner. 
 
 The first product of ]ansamb[ is Places. Places is an open-source
 framework

If it's open source, where is the source code?

 Using Place by ]ansamb[, a user is able to share an
 message or its all hard drive with friends. All private, all secure,
 all free.

Also please provide design documents for how you plan to keep it
private and secure.

-andy
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] a free, unlimited, encrypted content sharing app

2013-09-06 Thread Griffin Boyce
On 09/07/2013 12:51 AM, Andy Isaacson wrote:
 Also please provide design documents for how you plan to keep it
 private and secure. -andy 

  Defining terms also helps a lot. Define encrypted -- what protocols
are you using? Is Places based on established technology or new
research? Do you offer perfect forward secrecy, and if so, how are you
defining *that*? Why should people trust a cloud-based system rather
than keeping files encrypted on a USB stick?  Why should people trust
*your* cloud-based system, rather than someone like Least Authority?  If
it's free, what's your business model?

  I like and use lots of closed-source software, and am totally okay
with being pitched on new stuff. ~But~ a lot of these companies coming
out seem to target an interesting market: people who know enough to be
interested in security, but don't know enough about security that they
overlook the total absence of details.  This is a market that nearly
every company targets, so I'm not trying to single Ansamb out, but in an
arena that is so marked by bad providers, transparency is a serious asset.

~Griffin

-- 
Cypherpunks write code not flame wars. --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts are my own, not my employer's.

-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.