[pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Adrian Zaugg

Dear all

After having read the whole NSA thread on this list, it came up to my
mind that pfsense web GUI could declare itself conform to US laws upon
the point when there are known backdoors included or otherwise the code
was compromised on pressure of govermental authorities. It would be the
sign for the users to review the code and maybe to fork an earlier
version and host it in a free country, where the protection of personal
data is a common sense and national security is not so much an issue.

Regards, Adrian.
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Can pfSense be considered trusted? What implementations of VPNs can now be trusted?

2013-10-11 Thread Eugen Leitl
- Forwarded message from James A. Donald jam...@echeque.com -

Date: Fri, 11 Oct 2013 07:41:56 +1000
From: James A. Donald jam...@echeque.com
To: cypherpu...@cpunks.org, Giles Coochey gi...@coochey.net
Subject: Re: [pfSense] Can pfSense be considered trusted? What implementations 
of VPNs can now be trusted?
Message-ID: 52571f24.4030...@echeque.com
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:24.0) Gecko/20100101 
Thunderbird/24.0

On 2013-10-11 00:39, Eugen Leitl wrote:
 - Forwarded message from Giles Coochey gi...@coochey.net -
 2. Cipher Selection - we're not all cryptoanalysts, so statements like
 'trust the math' don't always mean much to us, given the reports in
 the media, what is considered a safe cypher? I recently switched from
 AES-256 to Blowfish-256, hashing from SHA-1 to SHA-512 and pfs group 2
 to pfs group 5, and I reduced my SA lifetimes from 28800 to 1800.
 Could that be considered overkill? What Cipher's are others using?
 Have any of you, who have been made recently aware of the media
 coverage recently, also changed your cipher selection? What kind of
 changes did you make?

Overkill is a rational and appropriate response to recent revelations.
NIST is actually out to get you, so you might as well put on a tinfoil
hat to be on the safe side.  Yes, there really is a gigantic
government conspiracy, no kidding.

While I am pretty sure AES and SHA 256 is perfectly safe, in view of
recent events, I would follow the lead of the highly competent
cryptographer Jon Callas,
http://www.mail-archive.com/infowarrior@attrition.org/msg10926.html
and use non NIST algorithms:

Use Twofish in place of AES if convenient to do so, and Skein hash in
place of SHA hash.



- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Crypto/RNG Suggestions

2013-10-11 Thread Eugen Leitl
- Forwarded message from James A. Donald jam...@echeque.com -

Date: Fri, 11 Oct 2013 07:53:02 +1000
From: James A. Donald jam...@echeque.com
To: cypherpu...@cpunks.org, li...@pingle.org
Subject: Re: [pfSense] Crypto/RNG Suggestions
Message-ID: 525721be.3050...@echeque.com
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:24.0) Gecko/20100101 
Thunderbird/24.0

On 2013-10-10 22:21, Eugen Leitl wrote:
 - Forwarded message from Jim Pingle li...@pingle.org -
 
 I haven't yet seen anything conclusive. People have called into question
 some or all of ECC, NSA's suggested Suite B, and so on. I put some links
 in a previous message[1]. If anyone knows of some solid research showing
 specific ciphers have been compromised, I'd love to see it so we can
 inform users.

There is a smoking gun on one of random number generators.

There is strong circumstantial evidence, reason for suspicion, on
suggested Suite B.

AES and SHA look to be fine, but using them gives the appearance to
end users that you might be playing footsie with NIST.   Jon Callas
has therefore made Twofish and Skein the default for silent circle.


- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


[pfSense] cipher suites and NIST

2013-10-11 Thread James A. Donald


There is a smoking gun on one of random number generators.

There is strong circumstantial evidence, reason for suspicion, on 
suggested Suite B.


AES and SHA look to be fine, but using them gives the appearance to end 
users that you might be playing footsie with NIST. Cryptographer Jon 
Callas has therefore made Twofish and Skein the default for silent circle.


I recommend that everyone follow Jon Callas on symmetric cryptography, 
and DJ Bernstein on asymmetric cryptography.  The best people are 
putting as much distance as possible between themselves and NIST.


Oh, and about tinfoil hats:

There really is a great big government conspiracy, and they really are 
out to get you.  Tinfoil hats may not be effectual, but Bernstein's 
curve25519 will help.



___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Przemysław Pawełczyk
Excellent idea. Really. But that would kill the project probably.

Regards,

On Fri, 11 Oct 2013 11:57:52 +0200
Adrian Zaugg a...@ente.limmat.ch wrote:

 (...)
 mind that pfsense web GUI could declare itself conform to US laws
 (...) It would be the sign for the users
 Regards, Adrian.

-- 
Przemysław Pawełczyk (P2O2) - p...@blast.pl 
The Snapshots My Way - http://pp.blast.pl


pgpOHBlwduczr.pgp
Description: PGP signature
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Yehuda Katz
Probably would not work (or would get whoever did that thrown in jail).
This is similar to a Warrant Canary, but the USDoJ has indicated that
Warrant Canaries would probably be grounds for prosecution of violation of
the non-disclosure order.

- Y

On Friday, October 11, 2013, Adrian Zaugg wrote:


 Dear all

 After having read the whole NSA thread on this list, it came up to my
 mind that pfsense web GUI could declare itself conform to US laws upon
 the point when there are known backdoors included or otherwise the code
 was compromised on pressure of govermental authorities. It would be the
 sign for the users to review the code and maybe to fork an earlier
 version and host it in a free country, where the protection of personal
 data is a common sense and national security is not so much an issue.

 Regards, Adrian.
 ___
 List mailing list
 List@lists.pfsense.org javascript:;
 http://lists.pfsense.org/mailman/listinfo/list



-- 
Sent from a gizmo with a very small keyboard and hyper-active auto-correct.
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Seth Mos
On 11-10-2013 11:57, Adrian Zaugg wrote:
 Dear all
 
 After having read the whole NSA thread on this list, it came up to my
 mind that pfsense web GUI could declare itself conform to US laws upon
 the point when there are known backdoors included or otherwise the code
 was compromised on pressure of govermental authorities. It would be the
 sign for the users to review the code and maybe to fork an earlier
 version and host it in a free country, where the protection of personal
 data is a common sense and national security is not so much an issue.

?

And which country would that be? I mean the Brittish MI4? tapped the
Belgian telecom network for over a year to listen into the EU politicians...

I don't see the point in this.

I've been a developer since november 2005 and since that time I have
never seen any evidence that this is the case. Not to downplay the trust
issue, it is always good to do a background check on what we put into
pfSense (which we do).

Pretty much everything we have in pfSense is checked in the version
control system. Even in the beginnings (0.83) with CVS. Even our builder
scripts are in a RCS system, and it verifies all checksums on external
(mostly FreeBSD ports) software we download for the build.

The most realistic way to get a backdoor in pfSense would have to come
from a upstream source. And FreeBSD generally has this properly in order
and a security team that acts properly.

The way the most intelligence agencies these days perform the wire
tapping is by getting a switch mirror port at a internet exchange. Even
fiber optics can be tapped without too much problems.

In .NL all large ISPs have a mandatory wiretap in place that stores
datetime stamped headers of the internet traffic for discovery purposes
from the authorities. The best part of this, it is paid for by the
customers, since the ISP needs to pay for the system and storage.

Regards,

Seth
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Seth Mos
On 11-10-2013 11:57, Adrian Zaugg wrote:
 Dear all
 
 After having read the whole NSA thread on this list, it came up to my
 mind that pfsense web GUI could declare itself conform to US laws upon
 the point when there are known backdoors included or otherwise the code
 was compromised on pressure of govermental authorities. It would be the
 sign for the users to review the code and maybe to fork an earlier
 version and host it in a free country, where the protection of personal
 data is a common sense and national security is not so much an issue.

?

And which country would that be? I mean the Brittish MI4? tapped the
Belgian telecom network for over a year to listen into the EU politicians...

I don't see the point in this.

I've been a developer since november 2005 and since that time I have
never seen any evidence that this is the case. Not to downplay the trust
issue, it is always good to do a background check on what we put into
pfSense (which we do).

Pretty much everything we have in pfSense is checked in the version
control system. Even in the beginnings (0.83) with CVS. Even our builder
scripts are in a RCS system, and it verifies all checksums on external
(mostly FreeBSD ports) software we download for the build.

The most realistic way to get a backdoor in pfSense would have to come
from a upstream source. And FreeBSD generally has this properly in order
and a security team that acts properly.

The way the most intelligence agencies these days perform the wire
tapping is by getting a switch mirror port at a internet exchange. Even
fiber optics can be tapped without too much problems.

In .NL all large ISPs have a mandatory wiretap in place that stores
datetime stamped headers of the internet traffic for discovery purposes
from the authorities. The best part of this, it is paid for by the
customers, since the ISP needs to pay for the system and storage.

Regards,

Seth
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] cipher suites and NIST

2013-10-11 Thread mayak
On 10/11/2013 06:23 AM, James A. Donald wrote:

 There is a smoking gun on one of random number generators.

 There is strong circumstantial evidence, reason for suspicion, on
 suggested Suite B.

 AES and SHA look to be fine, but using them gives the appearance to
 end users that you might be playing footsie with NIST. Cryptographer
 Jon Callas has therefore made Twofish and Skein the default for silent
 circle.

 I recommend that everyone follow Jon Callas on symmetric cryptography,
 and DJ Bernstein on asymmetric cryptography.  The best people are
 putting as much distance as possible between themselves and NIST.

 Oh, and about tinfoil hats:

 There really is a great big government conspiracy, and they really are
 out to get you.  Tinfoil hats may not be effectual, but Bernstein's
 curve25519 will help.

hi james,

indeed -- i read the post -- seems rather intersesting. question is --
how do you actually implement it in pfsense? i am assuming a custom
openvpn build, custom android build, linux build, etc?

thanks
m

___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Chris Bagnall

On 11/10/13 2:37 pm, Seth Mos wrote:

And which country would that be? I mean the Brittish MI4? tapped the
Belgian telecom network for over a year to listen into the EU politicians...


Who is this MI4 of whom you speak? :-)

In very broad terms, UK to USA equivalents would be as follows:

GCHQ = NSA
MI5 = FBI (though the FBI has a much wider remit)
SIS (sometimes erroneously referred to as MI6) = CIA

On 11/10/13 2:37 pm, Seth Mos wrote:

In .NL all large ISPs have a mandatory wiretap in place that stores
datetime stamped headers of the internet traffic for discovery purposes
from the authorities. The best part of this, it is paid for by the
customers, since the ISP needs to pay for the system and storage.


There have been attempts to do similar in the UK, but ISPA (our industry 
body) has fought pretty hard against it. It seems to have died for now, 
but I've no doubt that future governments (or home secretaries) will try 
and resurrect it at every possible opportunity.


Kind regards,

Chris
--
This email is made from 100% recycled electrons
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] cipher suites and NIST

2013-10-11 Thread Ian Bowers
On Fri, Oct 11, 2013 at 12:23 AM, James A. Donald jam...@echeque.comwrote:


 There is a smoking gun on one of random number generators.

 There is strong circumstantial evidence, reason for suspicion, on
 suggested Suite B.

 AES and SHA look to be fine, but using them gives the appearance to end
 users that you might be playing footsie with NIST. Cryptographer Jon Callas
 has therefore made Twofish and Skein the default for silent circle.

 I recommend that everyone follow Jon Callas on symmetric cryptography, and
 DJ Bernstein on asymmetric cryptography.  The best people are putting as
 much distance as possible between themselves and NIST.

 Oh, and about tinfoil hats:

 There really is a great big government conspiracy, and they really are out
 to get you.  Tinfoil hats may not be effectual, but Bernstein's curve25519
 will help.


 __**_
 List mailing list
 List@lists.pfsense.org
 http://lists.pfsense.org/**mailman/listinfo/listhttp://lists.pfsense.org/mailman/listinfo/list



To play devil's advocate, I'd say using AES and SHA gives the appearance to
end users that it's business as usual in enterprise-town. Right now most
people are still going to be using some flavor of AES and some flavor of
SHA.  And it has nothing to do with some intentional close relationship
with NIST.  It's just that big gears turn slowly.  On the practical side of
things, interoperability is a big deal for a lot of people.  And a wider
array of ciphers will certainly be coming down the pipeline soon, but for
now if I want to connect to John Q. Client, I'm at the mercy of what their
systems support in terms of transform sets.
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Thinker Rix

On 2013-10-11 16:37, Seth Mos wrote:

On 11-10-2013 11:57, Adrian Zaugg wrote:

Dear all

After having read the whole NSA thread on this list, it came up to my
mind that pfsense web GUI could declare itself conform to US laws upon
the point when there are known backdoors included or otherwise the code
was compromised on pressure of govermental authorities. It would be the
sign for the users to review the code and maybe to fork an earlier
version and host it in a free country, where the protection of personal
data is a common sense and national security is not so much an issue.

?

And which country would that be?


There are many countries which would be a possibility . If wiretapping 
is done there or not is not so relevant. Relevant is, if the authorities 
can and do inject backdoors into the project by legal force.



Pretty much everything we have in pfSense is checked in the version
control system. Even in the beginnings (0.83) with CVS. Even our builder
scripts are in a RCS system, and it verifies all checksums on external
(mostly FreeBSD ports) software we download for the build.


I am not an expert, but in the NSA-thread above there have been examples 
given, how CVS can be circumvented. Also, the gap between the sources 
and the binaries could possibly be an port of entry for nasty stuff I guess.
Again: The real threat by my comprehension is not some guy in the 
internet trying to place malicious code into the code base, but simply 
and plainly some NSA officers knock the door an force the project 
leaders to do it.



The way the most intelligence agencies these days perform the wire
tapping is by getting a switch mirror port at a internet exchange. Even
fiber optics can be tapped without too much problems.


Yes, they do that. And much more, because they do not restrict 
themselves to a single source. They e.g. get the data from the data 
providers (google, facebook, amazon, etc.) AND wiretap the internet 
backbones AND program trojan horses to send them to their peoples (see 
e.g. https://en.wikipedia.org/wiki/Bundestrojaner#Staatstrojaner) AND 
collect geolocation data from your mobile phone provider AND force your 
encrypted-email provider to hand out their SSL keys to them AND ... etc. 
etc. etc.


But: With all those methods they can only collect EXTERNAL data. With 
exception the mentioned trojan horse, they do not as easily get your 
INTERNAL data, e.g. the data that circulates between the computers of 
your intranet.
By infiltrating a firewall software such as pfSense, they could get a 
grip onto the most important neuralgic point of the intranet, since much 
of the internal traffic flows over this box. Think e.g. about all that 
VPN traffic that flows over the firewall, e.g. because a company 
connects many branches via VPN...
So: Getting a grip onto the firewall would surely be highly interesting 
for them...



In .NL all large ISPs have a mandatory wiretap in place that stores
datetime stamped headers of the internet traffic for discovery purposes
from the authorities. The best part of this, it is paid for by the
customers, since the ISP needs to pay for the system and storage.


Yes, but see above.


Regards,

Seth


Regards
Thinker Rix
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Thinker Rix

On 2013-10-11 13:54, Przemysław Pawełczyk wrote:


On Fri, 11 Oct 2013 11:57:52 +0200
Adrian Zaugg a...@ente.limmat.ch wrote:



(...)
mind that pfsense web GUI could declare itself conform to US laws
(...) It would be the sign for the users
Regards, Adrian.

Excellent idea. Really. But that would kill the project probably.


I am not sure that I understand what you mean. Is it what you want to 
say: In the case that the security software that you use gets 
infiltrated, you would prefer not learning about this fact, but just 
continue using it?


Greetings
Thinker Rix
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Thinker Rix

On 2013-10-11 12:57, Adrian Zaugg wrote:

After having read the whole NSA thread on this list, it came up to my
mind that pfsense web GUI could declare itself conform to US laws upon
the point when there are known backdoors included or otherwise the code
was compromised on pressure of govermental authorities. It would be the
sign for the users to review the code and maybe to fork an earlier
version and host it in a free country, where the protection of personal
data is a common sense and national security is not so much an issue.


I think that your idea is worth further consideration.

As I just answered to other postings of this thread, by my comprehension 
infiltrating firewall software such as pfSense should be highly 
interesting for NSA, etc. because they would get a grip onto your 
internal and VPN traffic.
So it should be only a matter of time, that they knock the door at ESF 
and force them to do things they don't like. We all - as a community - 
should think and act pro-actively to that and take appropriate measures 
to protect pfSense, ESF and the key people such as Chris Buechler and 
his partners from this realistic thread in time.


Best regards
Thinker Rix
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Thinker Rix

On 2013-10-11 16:20, Yehuda Katz wrote:
Probably would not work (or would get whoever did that thrown in 
jail). This is similar to a Warrant Canary, but the USDoJ has 
indicated that Warrant Canaries would probably be grounds for 
prosecution of violation of the non-disclosure order.


- Y

On Friday, October 11, 2013, Adrian Zaugg wrote:


Dear all

After having read the whole NSA thread on this list, it came up to my
mind that pfsense web GUI could declare itself conform to US
laws upon
the point when there are known backdoors included or otherwise the
code
was compromised on pressure of govermental authorities. It would
be the
sign for the users to review the code and maybe to fork an earlier
version and host it in a free country, where the protection of
personal
data is a common sense and national security is not so much an issue.

Regards, Adrian.




Hi Yehuda,

inspired by the keyword you dropped, I researched a little bit and 
found: https://en.wikipedia.org/wiki/Warrant_canary
It seems that you are correct: What Adrian suggests, is called a Warrant 
canary.
In the wikipedia article it says that: The intention is to allow the 
provider to inform customers of the existence of a subpoena passively, 
without violating any laws. The legality of this method has not been 
tested in any court. Is that wrong or in conflict with what you wrote?


In the case that it would indeed be prosecuted in the USA, we could 
consider to host the project in another country.
In this case it would be interesting to investigate what needs to be 
hosted elsewhere: The source code versioning control system? The company 
behind pfSense (ESF)?


I guess that the best solution would be to incorporate pfSense itself 
and untie it from ESF. Many other free software projects have done so 
recently. The most prominent example is Libre Office which is now 
owned by the Document Foundation 
(https://en.wikipedia.org/wiki/Document_Foundation). The owned refers 
to e.g. the brand name, since the software itself is free software, it 
is not owned by anybody.


So summarizing:
If pfSense would be incorporated as a foundation at some place (many 
countries would be possible) outside the USA, it could be a solution to 
this I guess.


Regards
Thinker Rix
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Walter Parker
As I see it, there are are two things that can happen here

1) NSA breaks into pfSense without knowledge of the staff = The only
solution is source code and binary review. This is not an option for people
like Thinker Rix or other non coders. The mostly spot for this to happen is
upstream from the project (in FreeBSD itself, in the libraries that FreeBSD
uses). This will require resources outside of the pfSense project to
validate.

2) NSA forces pfSense to put a backdoor in the software. Tells pfSense to
be quite about it.

The results of 2) are that either pfSense stays quite or they tell.
i) If they stay quite, then the only solution is the same answer as for 1),
independent evaluation.
ii) If they tell, then the project is over as they will be busy fighting
the government. They can be arrested for telling. Depending on the Judge,
any said or done that tips off someone that the project has a NSL, can be
taken as a violation.

What do you expect from the project? That they promise that they have not
been subverted and further promise to tell you when/if there are subverted,
regardless of the personal and financial costs to them?

This is a free project...  What is reasonable to expect from any project
like this?

Once we question trust in the project, the only reasonable course of action
is independent evaluation. Guess what, that is what the Government does
when it evaluates software. In fact, that is one of the NSA's other jobs.
This does, however, make software much more expensive. How to we get a
trusted evaluation of the software?



On Fri, Oct 11, 2013 at 10:46 AM, Thinker Rix thinke...@rocketmail.comwrote:

 On 2013-10-11 12:57, Adrian Zaugg wrote:

 After having read the whole NSA thread on this list, it came up to my
 mind that pfsense web GUI could declare itself conform to US laws upon
 the point when there are known backdoors included or otherwise the code
 was compromised on pressure of govermental authorities. It would be the
 sign for the users to review the code and maybe to fork an earlier
 version and host it in a free country, where the protection of personal
 data is a common sense and national security is not so much an issue.


 I think that your idea is worth further consideration.

 As I just answered to other postings of this thread, by my comprehension
 infiltrating firewall software such as pfSense should be highly interesting
 for NSA, etc. because they would get a grip onto your internal and VPN
 traffic.
 So it should be only a matter of time, that they knock the door at ESF and
 force them to do things they don't like. We all - as a community - should
 think and act pro-actively to that and take appropriate measures to protect
 pfSense, ESF and the key people such as Chris Buechler and his partners
 from this realistic thread in time.

 Best regards
 Thinker Rix

 __**_
 List mailing list
 List@lists.pfsense.org
 http://lists.pfsense.org/**mailman/listinfo/listhttp://lists.pfsense.org/mailman/listinfo/list




-- 
The greatest dangers to liberty lurk in insidious encroachment by men of
zeal, well-meaning but without understanding.   -- Justice Louis D. Brandeis
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Walter Parker
Who would you trust more that ESF? Why,specifically, would you trust
another group of people to be more trustworthy? I admit to have a USA bias,
but for the issue in question, I don't there being a much better choice.
The UK has less freedoms in this matter. But then this is turning into a
case of I'm worried about things, here lets have you [The project] spend
time and money to fix the problem?

Unless, of course, you are willing to contribute time and money to fixing
this issue. Otherwise this just an armchair general telling other people
how to run the project.







On Fri, Oct 11, 2013 at 10:41 AM, Thinker Rix thinke...@rocketmail.comwrote:

  On 2013-10-11 16:20, Yehuda Katz wrote:

 Probably would not work (or would get whoever did that thrown in jail).
 This is similar to a Warrant Canary, but the USDoJ has indicated that
 Warrant Canaries would probably be grounds for prosecution of violation of
 the non-disclosure order.

  - Y

 On Friday, October 11, 2013, Adrian Zaugg wrote:


 Dear all

 After having read the whole NSA thread on this list, it came up to my
 mind that pfsense web GUI could declare itself conform to US laws upon
 the point when there are known backdoors included or otherwise the code
 was compromised on pressure of govermental authorities. It would be the
 sign for the users to review the code and maybe to fork an earlier
 version and host it in a free country, where the protection of personal
 data is a common sense and national security is not so much an issue.

 Regards, Adrian.



 Hi Yehuda,

 inspired by the keyword you dropped, I researched a little bit and found:
 https://en.wikipedia.org/wiki/Warrant_canary
 It seems that you are correct: What Adrian suggests, is called a Warrant
 canary.
 In the wikipedia article it says that: The intention is to allow the
 provider to inform customers of the existence of a subpoena passively,
 without violating any laws. The legality of this method has not been tested
 in any court. Is that wrong or in conflict with what you wrote?

 In the case that it would indeed be prosecuted in the USA, we could
 consider to host the project in another country.
 In this case it would be interesting to investigate what needs to be
 hosted elsewhere: The source code versioning control system? The company
 behind pfSense (ESF)?

 I guess that the best solution would be to incorporate pfSense itself and
 untie it from ESF. Many other free software projects have done so recently.
 The most prominent example is Libre Office which is now owned by the
 Document Foundation (https://en.wikipedia.org/wiki/Document_Foundation).
 The owned refers to e.g. the brand name, since the software itself is
 free software, it is not owned by anybody.

 So summarizing:
 If pfSense would be incorporated as a foundation at some place (many
 countries would be possible) outside the USA, it could be a solution to
 this I guess.

 Regards
 Thinker Rix

 ___
 List mailing list
 List@lists.pfsense.org
 http://lists.pfsense.org/mailman/listinfo/list




-- 
The greatest dangers to liberty lurk in insidious encroachment by men of
zeal, well-meaning but without understanding.   -- Justice Louis D. Brandeis
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Yehuda Katz
On Fri, Oct 11, 2013 at 1:41 PM, Thinker Rix thinke...@rocketmail.comwrote:

  Probably would not work (or would get whoever did that thrown in jail).
 This is similar to a Warrant Canary, but the USDoJ has indicated that
 Warrant Canaries would probably be grounds for prosecution of violation of
 the non-disclosure order.

 inspired by the keyword you dropped, I researched a little bit and found:
 https://en.wikipedia.org/wiki/Warrant_canary
 It seems that you are correct: What Adrian suggests, is called a Warrant
 canary.
 In the wikipedia article it says that: The intention is to allow the
 provider to inform customers of the existence of a subpoena passively,
 without violating any laws. The legality of this method has not been tested
 in any court. Is that wrong or in conflict with what you wrote?


I do not know of any prosecution for using a Warrant Canary, but that does
not change whether the government would intend to prosecute it (and I have
discussed it with lawyers in the DoJ and other areas). It just means that
the situation has not come up: either because no place that uses a Warrant
Canary has received a secret order or because no place that has received
one has been willing to really use it as designed. This is what it boils
down to: Do you want to go in front of a federal judge and say I did not
say we received a subpoena, I just stopped saying we did not receive one.?
I know I would not want to.

If anyone wants to talk more about Warrant Canaries, email me off the list.

- Y
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Thinker Rix

On 2013-10-11 21:20, Walter Parker wrote:
Who would you trust more that ESF? Why,specifically, would you trust 
another group of people to be more trustworthy?


The point is not untrusting ESF or anybody else. The point is that ESF 
is based in the USA, a country where the current government can force 
you to do things against your community without having any chance to 
escape from it; they just force you to do so.
So the point of the whole idea that we evaluate here is: How can we 
secure pfSense from this nasty government so that they can not just 
force ESF or anybody else to comply with them.


I admit to have a USA bias, but for the issue in question, I don't 
there being a much better choice. The UK has less freedoms in this matter.


As far as I am informed there are some more countries on the globe than 
the USA and the UK...


But then this is turning into a case of I'm worried about things, 
here lets have you [The project] spend time and money to fix the 
problem?


Unless, of course, you are willing to contribute time and money to 
fixing this issue. Otherwise this just an armchair general telling 
other people how to run the project.


Seems like a killer argument to me, which is kind of couterproductive in 
such an early stage of an idea/proposition, as this is.

___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Walter Parker
Yes, you have been informed correctly. There are more than 2. According the
World Atlas (http://www.worldatlas.com/nations.htm#.UlhOHVFDsnY) the number
is someone between 189 and 196.

But you did not answer the question asked: Name the country that you would
move the project to and why you believe that country would do a better job?

Then because the USA can't be trusted, who is going to replace the
Americans on the project? The name and logo are owned by an American
company. I doubt they want to give them up to a foreign company owned by
non-Americans just to make it harder for the American government to
pressure the project. If the rest of world wants to fork the project
because of concerns about the US government, fine, but I don't think you
will get buy in from ESF [the American company that owns the rights to the
name pfSense].

Once again, name some names. Who do you consider more trustworthy? Follow
the link, which of the 188-195 countries on that list do you propose to
trust more and why? I'd suggest you pick once that is not already in bed
with the NSA (which includes most of major western governments, plus some
of the Middle East and Far East governments). But that is me, maybe you
prefer to decide to move first and then figure out where you are going
after you have left (rather than planning where you are going before you
leave).



Walter


On Fri, Oct 11, 2013 at 12:11 PM, Thinker Rix thinke...@rocketmail.comwrote:

 On 2013-10-11 21:20, Walter Parker wrote:

 Who would you trust more that ESF? Why,specifically, would you trust
 another group of people to be more trustworthy?


 The point is not untrusting ESF or anybody else. The point is that ESF is
 based in the USA, a country where the current government can force you to
 do things against your community without having any chance to escape from
 it; they just force you to do so.
 So the point of the whole idea that we evaluate here is: How can we secure
 pfSense from this nasty government so that they can not just force ESF or
 anybody else to comply with them.


  I admit to have a USA bias, but for the issue in question, I don't there
 being a much better choice. The UK has less freedoms in this matter.


 As far as I am informed there are some more countries on the globe than
 the USA and the UK...


  But then this is turning into a case of I'm worried about things, here
 lets have you [The project] spend time and money to fix the problem?

 Unless, of course, you are willing to contribute time and money to fixing
 this issue. Otherwise this just an armchair general telling other people
 how to run the project.


 Seems like a killer argument to me, which is kind of couterproductive in
 such an early stage of an idea/proposition, as this is.

 __**_
 List mailing list
 List@lists.pfsense.org
 http://lists.pfsense.org/**mailman/listinfo/listhttp://lists.pfsense.org/mailman/listinfo/list




-- 
The greatest dangers to liberty lurk in insidious encroachment by men of
zeal, well-meaning but without understanding.   -- Justice Louis D. Brandeis
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Adrian Zaugg


On 10/11/13 8:20 PM, Walter Parker wrote:
 Unless, of course, you are willing to contribute time and money to
 fixing this issue. Otherwise this just an armchair general telling other
 people how to run the project.
I don't think it is a problem to find a sponsered hosting here in
Switzerland for example. Our law protects citizens from govermental
despotism quite well. National security is not an issue here.

But this is not the question. The question is wether software projects
hosted in the US are still trustworthy because of the legal situation
there. If the pfsense community has the opinion, that it is too risky,
then it is time to start acting. Once this point is reached, me and
others would certainly try to contribute. Most of the people here are
network specialists and do have their connections to hosting
possibilities, I think.

Regards, Adrian.
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Walter Parker
Don't be too sure about Switzerland...
https://www.schneier.com/blog/archives/2008/01/nsa_backdoors_i.html

Which talks about a story that was in the German papers in the late 90's..

For half a century, Crypto AG, a Swiss company located in Zug, has sold to
more than 100 countries the encryption machines their officials rely upon
to exchange their most sensitive economic, diplomatic and military
messages. Crypto AG was founded in 1952 by the legendary (Russian born)
Swedish cryptographer Boris Hagelin. During World War II, Hagelin sold
140,000 of his machine to the US Army.

In the meantime, the Crypto AG has built up long standing cooperative
relations with customers in 130 countries, states a prospectus of the
company. The home page of the company Web site says, Crypto AG is the
preferred top-security partner for civilian and military authorities
worldwide. Security is our business and will always remain our business.

And for all those years, US eavesdroppers could read these messages without
the least difficulty. A decade after the end of WWII, the NSA, also known
as No Such Agency, had rigged the Crypto AG machines in various ways
according to the targeted countries. It is probably no exaggeration to
state that this 20th century version of the Trojan horse is quite likely
the greatest sting in modern history.



On Fri, Oct 11, 2013 at 12:49 PM, Adrian Zaugg a...@ente.limmat.ch wrote:



 On 10/11/13 8:20 PM, Walter Parker wrote:
  Unless, of course, you are willing to contribute time and money to
  fixing this issue. Otherwise this just an armchair general telling other
  people how to run the project.
 I don't think it is a problem to find a sponsered hosting here in
 Switzerland for example. Our law protects citizens from govermental
 despotism quite well. National security is not an issue here.

 But this is not the question. The question is wether software projects
 hosted in the US are still trustworthy because of the legal situation
 there. If the pfsense community has the opinion, that it is too risky,
 then it is time to start acting. Once this point is reached, me and
 others would certainly try to contribute. Most of the people here are
 network specialists and do have their connections to hosting
 possibilities, I think.

 Regards, Adrian.
 ___
 List mailing list
 List@lists.pfsense.org
 http://lists.pfsense.org/mailman/listinfo/list




-- 
The greatest dangers to liberty lurk in insidious encroachment by men of
zeal, well-meaning but without understanding.   -- Justice Louis D. Brandeis
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Adrian Zaugg
This story is about a private company and about technology. We talk
about the legal situation. And btw. it is a criminal act to eavesdrop
and to hack into other's systems under Swiss law.

Regards, Adrian.

On 10/11/13 9:54 PM, Walter Parker wrote:
 Don't be too sure about Switzerland...
 https://www.schneier.com/blog/archives/2008/01/nsa_backdoors_i.html
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Alix Update 2.0.3 to 2.1 fails with 11 interfaces (/var full)

2013-10-11 Thread Jens Kühnel
Hi,

I just tried it on an VMware based NanoBSD Version and it allways
happens and it is not Memory based, because the VM has 1GB.

I'm not a FreeBSD expert, but /dev/md's are MemDiscs right?
Is there a reason why only 60MB (/var) and 40MB(/tmp/) are used?
and are where are possibilities to change that? It's not in the fstab!

I will next try to install a normal (non-NanoBSD) version and do a
update there. I hope that will help.

CU
Jens

___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Alix Update 2.0.3 to 2.1 fails with 11 interfaces (/var full)

2013-10-11 Thread David Burgess
On Fri, Oct 11, 2013 at 2:58 PM, Jens Kühnel pfse...@jens.kuehnel.orgwrote:


 and are where are possibilities to change that? It's not in the fstab!


/etc/rc.embedded
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread David Ross

On 10/11/13 2:13 PM, Walter Parker wrote:

As I see it, there are are two things that can happen here


Not yelling at Walter.

The problem with all of this is that as long as our Congress (and the 
equivalent in other countries) passes laws that allow such backdoors 
with a threat of jail if you talk about it at any level we will have 
these issues.


If you want this to go away, then we need to elect folks to Congress who 
will change the laws.


But for most of us that's too big a hill to climb in terms of personal 
effort so we don't do it.



David
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Alix Update 2.0.3 to 2.1 fails with 11 interfaces (/var full)

2013-10-11 Thread Jim Pingle
On 10/11/2013 4:58 PM, Jens Kühnel wrote:
 I'm not a FreeBSD expert, but /dev/md's are MemDiscs right?
 Is there a reason why only 60MB (/var) and 40MB(/tmp/) are used?
 and are where are possibilities to change that? It's not in the fstab!

They are that small because ALIX is the usual NanoBSD target and it only
has 256MB of RAM so it's a safe low default. NanoBSD wasn't originally
intended to run on device with gobs of RAM, but times are a-changin' and
before long all of the viable new hardware will have 1GB of RAM.

On 2.1 you can adjust the /var and /tmp sizes under System  Advanced on
the Miscellaneous tab.

It might be possible to auto-scale the sizes with a bit of extra logic
in rc.embedded if someone wants to take a crack at it.

Jim
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Alix Update 2.0.3 to 2.1 fails with 11 interfaces (/var full)

2013-10-11 Thread David Burgess
On Fri, Oct 11, 2013 at 3:25 PM, Jim Pingle li...@pingle.org wrote:

 On 2.1 you can adjust the /var and /tmp sizes under System  Advanced on
 the Miscellaneous tab.



Right! I had forgot about that.

So following the original topic, could one more probably ensure a
successful upgrade to 2.1 by increasing the size of /var by some amount? I
have a nanoBSD system with 4G of RAM sitting at 10% usage. If I dedicated
3G of that to /var and upgraded, will the RRD bug in question still kill my
upgrade?

On a related note, does this bug affect upgrades from older 2.1 betas and
RCs? This system happens to be running 2.1RC0 and I'd very much like to
upgrade it to 2.1 without going on site if I can avoid it.

db
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Alix Update 2.0.3 to 2.1 fails with 11 interfaces (/var full)

2013-10-11 Thread Adam Thompson

On 13-10-11 04:25 PM, Jim Pingle wrote:

They are that small because ALIX is the usual NanoBSD target and it only
has 256MB of RAM so it's a safe low default. NanoBSD wasn't originally
intended to run on device with gobs of RAM, but times are a-changin' and
before long all of the viable new hardware will have 1GB of RAM.

On 2.1 you can adjust the /var and /tmp sizes under System  Advanced on
the Miscellaneous tab.

It might be possible to auto-scale the sizes with a bit of extra logic
in rc.embedded if someone wants to take a crack at it.


Challenge accepted.

I have no idea how to clone the repo and do a pull request, so I'm just 
attaching a simple diff instead.


I believe sysctl is available at this point in the boot process.  If 
not, then the solution will be quite a bit more difficult...


I'm not sure what the point would be in continuing if sysctl *failed*, 
but what the heck, I just assume a 256MB machine.


Obviously a lot more special-casing could be done to ensure lower- and 
upper-bound cases function correctly; I only handled one simplistic case.


The invocation to get $physmem ensures we don't needlessly fork()/exec() 
on an embedded platform.


--
-Adam Thompson
 athom...@athompso.net

--- rc.embedded.orig	2013-10-11 16:35:10.691385354 -0500
+++ rc.embedded	2013-10-11 17:26:55.779500598 -0500
@@ -8,7 +8,12 @@
 if [ ! -z ${USE_MFS_TMP_SIZE} ]  [ ${USE_MFS_TMP_SIZE} -gt 0 ]; then
 	tmpsize=${USE_MFS_TMP_SIZE}m
 else
-	tmpsize=40m
+	physmem=${physmem:-$(/sbin/sysctl -n hw.physmem)}
+	# in case we can't execute /sbin/sysctl, assume 256MB machine
+	physmem=${physmem:-282563637}
+	tmpsize=$((physmem*15/104857600))
+	if [ $tmpsize -le 40 ]; then varsize=40; fi
+	tmpsize=${tmpsize}m
 fi
 
 # Size of /var
@@ -16,7 +21,11 @@
 if [ ! -z ${USE_MFS_VAR_SIZE} ]  [ ${USE_MFS_VAR_SIZE} -gt 0 ]; then
 	varsize=${USE_MFS_VAR_SIZE}m
 else
-	varsize=60m
+	physmem=${physmem:-$(/sbin/sysctl -n hw.physmem)}
+	physmem=${physmem:-282563637}
+	varsize=$((physmem*25/104857600))
+	if [ $varsize -lt 60 ]; then varsize=60; fi
+	varsize=${varsize}m
 fi
 
 # Run some initialization routines
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Alix Update 2.0.3 to 2.1 fails with 11 interfaces (/var full)

2013-10-11 Thread Walter Parker
So, if I have an ALIX that I would like to upgrade, how much would I have
to increase /tmp and /var by to have the upgrade run to completion without
filling the partitions?


Walter


On Fri, Oct 11, 2013 at 2:25 PM, Jim Pingle li...@pingle.org wrote:

 On 10/11/2013 4:58 PM, Jens Kühnel wrote:
  I'm not a FreeBSD expert, but /dev/md's are MemDiscs right?
  Is there a reason why only 60MB (/var) and 40MB(/tmp/) are used?
  and are where are possibilities to change that? It's not in the fstab!

 They are that small because ALIX is the usual NanoBSD target and it only
 has 256MB of RAM so it's a safe low default. NanoBSD wasn't originally
 intended to run on device with gobs of RAM, but times are a-changin' and
 before long all of the viable new hardware will have 1GB of RAM.

 On 2.1 you can adjust the /var and /tmp sizes under System  Advanced on
 the Miscellaneous tab.

 It might be possible to auto-scale the sizes with a bit of extra logic
 in rc.embedded if someone wants to take a crack at it.

 Jim
 ___
 List mailing list
 List@lists.pfsense.org
 http://lists.pfsense.org/mailman/listinfo/list




-- 
The greatest dangers to liberty lurk in insidious encroachment by men of
zeal, well-meaning but without understanding.   -- Justice Louis D. Brandeis
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


[pfSense] Assign tun0 (created by vpnc at command line) to OPT interface

2013-10-11 Thread Robert Gormley
Hi,

I’ve tried the assign interfaces option at the command line, and the Web 
Configurator, but neither option in 2.1 recognized the tun0 interface (which is 
up) as a valid interface for assignment.

How can I make this happen?

Robert
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Gé Weijers
On Fri, Oct 11, 2013 at 11:13 AM, Walter Parker walt...@gmail.com wrote:


 2) NSA forces pfSense to put a backdoor in the software. Tells pfSense to
 be quite about it.


The problem with doing that to open source is that it's easy to verify that
it happened (especially after someone provides an anonymous hint). It's
hard to keep secrets these days.
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Mike McLaughlin
Thank you for the final word Jim.

I have a real issue brought up by this thread; Gmail now considers a
significant amount of the list.pfSense.org mail spam, and this thread (and
a few others) was just that.

I'd complain more but others told Thinker exactly what I would say and he
doesn't care.

Mike McLaughlin


On Fri, Oct 11, 2013 at 5:16 PM, Gé Weijers g...@weijers.org wrote:


 On Fri, Oct 11, 2013 at 11:13 AM, Walter Parker walt...@gmail.com wrote:


 2) NSA forces pfSense to put a backdoor in the software. Tells pfSense to
 be quite about it.


 The problem with doing that to open source is that it's easy to verify
 that it happened (especially after someone provides an anonymous hint).
 It's hard to keep secrets these days.




 ___
 List mailing list
 List@lists.pfsense.org
 http://lists.pfsense.org/mailman/listinfo/list


___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] naive suggestion: conform to US laws

2013-10-11 Thread Mehmasarja Darks
I second nixing the thread. pfSense does not benefit from this. 

Mehma

On Oct 11, 2013, at 3:40 PM, Jim Thompson j...@netgate.com wrote:

 
 On Oct 11, 2013, at 12:39, Thinker Rix thinke...@rocketmail.com wrote:
 
 Again: The real threat by my comprehension is not some guy in the internet 
 trying to place malicious code into the code base, but simply and plainly 
 some NSA officers knock the door an force the project leaders to do it.
 
 Please cite the law they might use to so this. 
 
 Hint: it doesn't exist.
 
 Hint 2: if you think Lavabit applies, you're part of the problem.
 
 Otherwise: get off my lawn. 
 
 I'm willing to listen to:
 
 I've dreamed up this possible attack that could inject bad code into 
 pfSense.
 
 And especially, I think I've found a problem.
 
 I'm not willing to endure this uninformed Alex Jonesian crapfest. 
 
 Now that I'm back on US soil, I promise that if the later continues, I will 
 kill the thread. People who hijack threads will be dealt with. 
 
 I simply don't have time for it, and the people who actually work on pfSense 
 don't gave time for it. 
 
 Nor will I endure the besmirching of pfSense's good name and trademark. 
 
 If you have real issues, or even theories supported by minimal evidence, 
 bring them forward. 
 
 Otherwise: STFU. 
 
 Jim
 
 
 ___
 List mailing list
 List@lists.pfsense.org
 http://lists.pfsense.org/mailman/listinfo/list
___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Alix Update 2.0.3 to 2.1 fails with 11 interfaces (/var full)

2013-10-11 Thread Jens Kuehnel
Hi,
 On 2.1 you can adjust the /var and /tmp sizes under System 
 Advanced on the Miscellaneous tab.
 Right! I had forgot about that.
and would not help because it is needed to be done before (or during)
the upgrade.

 So following the original topic, could one more probably ensure a
 successful upgrade to 2.1 by increasing the size of /var by some amount?
 I have a nanoBSD system with 4G of RAM sitting at 10% usage. If I
 dedicated 3G of that to /var and upgraded, will the RRD bug in question
 still kill my upgrade?
I kust did that. I increated it to 2*100MB and now it is enough for my
upgrade on my virtual machine. I will do the real upgrade tomorrow, with
deletion of the rrd Data before the update and a restore of the rrd-data
after the upgrade with the already converted rrd backup.

 On a related note, does this bug affect upgrades from older 2.1 betas
 and RCs? This system happens to be running 2.1RC0 and I'd very much like
 to upgrade it to 2.1 without going on site if I can avoid it.
I have a identically setup with ony 4 networks and that works without
problem. Only embedded setups with a large number of interface
statistics has this kind of problem.

CU
Jens

___
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list