Re: [Sks-devel] Tor hidden service - what's the rationale?

2015-11-13 Thread Christoph Anton Mitterer
On Sat, 2015-11-14 at 01:15 +0100, Hendrik Grewe wrote:
> I would imagine not leaving the tor network through an exit is the
> benefit.
And what should be the benefit of that?
If tor works right, there is none, if it doesn't there wouldn't be any
either, when you "not leave it" when you hit the hidden service.


> Why does facebook run a Hidden Service [0]?
Wild guess: Marketing & hype

Why do google/Yahoo/MS/whatsapp, etc. propagate their "cool" crypto
stuff, which is actually useless in the end?
People feel good.



> There where some thoughts one could create a profile by just looking
> at
> the metadata (from keyserver operator or eavesdropper on the line)
> while
> key-refresh request from a given peer. Thats why tools like
> parcimonie
> [1a/b] where developed. Those use  a new circuit for every single
> key-refresh.
I think there's a lot difference  between that, which works on the
client side, and what we'd need on the server side.
We share all keys, and every single update... this hughe pile of data
flow possibly makes it way easier for an attacker... than the few 100
or perhaps 1000 keys a normal user may have.


Cheers,
Chris.

smime.p7s
Description: S/MIME cryptographic signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] Tor hidden service - what's the rationale?

2015-11-13 Thread Daniel Kahn Gillmor
On Fri 2015-11-13 20:36:40 -0500, Alain Wolf wrote:
> On 14.11.2015 at 01:23, Christoph Anton Mitterer wrote:
>> On Sat, 2015-11-14 at 01:15 +0100, Hendrik Grewe wrote:
>>> I would imagine not leaving the tor network through an exit is the
>>> benefit.
>> And what should be the benefit of that?
> What is the benefit of leaving Tor?

There are definitely more benefits to operating a Tor "hidden service"
than server location privacy.

The Tor folks even acknowledge as much with their proposal for "direct
onion" services:

https://gitweb.torproject.org/user/special/torspec.git/tree/proposals/xxx-direct-onion.txt?h=xxx-direct-onion

For example, this allows the server operator to accept traffic that is
indistinguishable from Tor relay traffic.  It also allows end users to
look up the location of the service without using the DNS at all.

Those of us who have set up Tor hidden services are under no illusion
that we are some kind of superspooks or that this makes our users
magically invisible.  We're simply offering a service to eliminate one
more piece of visible metadata from the network for people who prefer to
minimize metadata.

Yes, there are more pieces of metadata that leak elsewhere.  Some of us
are actually working on those too.  That doesn't mean we shouldn't stop
the gaps we know how to stop.

--dkg

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] Tor hidden service - what's the rationale?

2015-11-13 Thread Alain Wolf
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 14.11.2015 at 01:23, Christoph Anton Mitterer wrote:
> On Sat, 2015-11-14 at 01:15 +0100, Hendrik Grewe wrote:
>> I would imagine not leaving the tor network through an exit is the
>> benefit.
> And what should be the benefit of that?
What is the benefit of leaving Tor?
> If tor works right, there is none, if it doesn't there wouldn't be any
> either, when you "not leave it" when you hit the hidden service.
The benefit is, that no exit node and no one else on the Internet
(outside tor) can profile your communications habits and partners.
Its your address book which you send over there. I assume most clients
do that unencrypted (partly because of the manual steps needed to
install Kris root cert for hkps).
As a agency, with this meta-data I won't even need your client IP. Its
worth a lot more.
We made good progress in encrypting mail-client-to-server connections in
the last years. We are still working, but slowly progressing on
server-to-server mail encryption. But people continue to happily send
their complete address-books over the net unencrypted trough HKP.

And as you seem not to like HKPS either ...
> hkps is IMHO only little help there, especially as it has the big
> problem of the strict hierarchical trust... 
But now that you have been given the possibility of an encrypted
connection for your client, without hierarchy, but with the added
benefit of the clients IP anonymity, and yet you still complain.
What is it that you want?

> 
> 
>> Why does facebook run a Hidden Service [0]?
> Wild guess: Marketing & hype
All services I provide, public or private, or just personal, are also
reachable as Tor hidden services.
The time and cost I need to set up a hidden service is a fraction of
what I need for any conventional service, by adding a real IP, firewall
rules, DNS entries, TLS keys and certificates etc. etc. .

As long as this is easier to setup, why make clients leave the the Tor
network, if we both are already inside it?

> 
> Why do google/Yahoo/MS/whatsapp, etc. propagate their "cool" crypto
> stuff, which is actually useless in the end?
> People feel good.
> 
I know anybody could just smash the glass of any window to break into my
apartment.

Still I lock the front-door every morning when I leave my home.

Cheers
Alain

-BEGIN PGP SIGNATURE-
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=MhUf
-END PGP SIGNATURE-

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] Tor hidden service - what's the rationale?

2015-11-13 Thread Robert J. Hansen
> I'm not sure whether burn care would be really an issues for (most of)
> us... at least not as long cryptography itself isn't made "illegal".
> Our services are typically not illegal or morally questionable...so
> even if "they" would come after you... well... so what?

The "so what?" is, if "they" come after you then you're no longer
anonymous.  Your anonymous server is no longer anonymous.  You need to
start over again in order to re-establish a new anonymous server.  And
that's burn care -- "how do I resume normal operations after I've been
burned?"

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] Tor hidden service - what's the rationale?

2015-11-13 Thread Christoph Anton Mitterer
On Sat, 2015-11-14 at 02:36 +0100, Alain Wolf wrote:
> >And what should be the benefit of that?
> What is the benefit of leaving Tor?
Well you can't argue like that, can you? At least it alone wouldn't be
argument enough for me to set up such service.
Running additional code, here tor, always means additional risk for the
server operator. More code, more possible vulnerabilities.
And more important... it easily gives people a wrong sense of
security... "oh... that keyserver is a hidden tor service, so the bad
guys can't catch them and temper with"

> > If tor works right, there is none, if it doesn't there wouldn't be
> > any
> > either, when you "not leave it" when you hit the hidden service.
> The benefit is, that no exit node and no one else on the Internet
> (outside tor) can profile your communications habits and partners.
And, to my knowledge (though I must admit that I'm not a Tor theorist),
this is no difference to just the client running tor.
As I server operator, I still see some IP,... just that it's not an
exit node, but the last hop.

Or is there any statement from the Tor guys or any paper which shows
that tor get's more secure for the client, when there is no exiting?

The only thing I know would be the encryption, but that's not really
helpful for our usage scenario - the encryption that tor would have,
and that we wouldn't have between the exit node and the non-hidden
server, doesn't really give us anything, as there is already no trust
relationship between server and client.

> Its your address book which you send over there. I assume most
> clients
> do that unencrypted (partly because of the manual steps needed to
> install Kris root cert for hkps).
Still, the hidden server doesn't prevent this... at least not more as
normal Tor would do it until there's another exit node chosen.
The only thing, AFAIU, that helps here is that the client rotates his
requests between many servers.


> We made good progress in encrypting mail-client-to-server connections
> in
> the last years. We are still working, but slowly progressing on
> server-to-server mail encryption. But people continue to happily send
> their complete address-books over the net unencrypted trough HKP.
Valid point, but I don't see how Tor alone would solve this, and
especially not how hidden services improve that.


> And as you seem not to like HKPS either ...
> > hkps is IMHO only little help there, especially as it has the big
> > problem of the strict hierarchical trust... 
> But now that you have been given the possibility of an encrypted
> connection for your client, without hierarchy, but with the added
> benefit of the clients IP anonymity, and yet you still complain.
> What is it that you want?
The strict hierarchy of X509, which we have with hkps is only the tip
of the iceberg, as Kristian would be ultimately the one who's in
control (@Kristian, don't take that personally :) ... sure you're a
good guy, but in principle we must assume that each of us could be
evil).
What you apparently miss, is that the HKPS gives you no trust relation
to the server, at least nothing more than TOFU like.
You know (more or less certain) that you connected to the same server
again,... great,... so what?
It doesn't even give you a small hint of identity of the operator
(Kristian doesn't verify this) and more importantly, even if it would,
there was no prof that the operator gives you proper data.
Anyone can set up a keyserver, ask Kristian for a cert or do the tor
hidden server, even Agent Smith.


> > > Why does facebook run a Hidden Service [0]?
> > Wild guess: Marketing & hype
> All services I provide, public or private, or just personal, are also
> reachable as Tor hidden services.
> The time and cost I need to set up a hidden service is a fraction of
> what I need for any conventional service, by adding a real IP,
> firewall
> rules, DNS entries, TLS keys and certificates etc. etc. .
> 
> As long as this is easier to setup, why make clients leave the the
> Tor
> network, if we both are already inside it?
Uhm that seems a bit strange... how could it be easier? You still have
to do all the real IP stuff, at least for Tor itself.

Anyway, as long as there's no true security benefit behind, I remain
sceptic that this rather lures people into a false sense of security.


Cheers,
Chris.


smime.p7s
Description: S/MIME cryptographic signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel