Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-04-29 Thread intrigeri
Hi,

intrigeri wrote (14 Mar 2016 15:41:50 GMT) :
> sajolida wrote (14 Mar 2016 15:21:21 GMT) :
>> intrigeri:
>>> sajolida wrote (11 Mar 2016 16:40:08 GMT) :
>>> So, dropping the requirement for mirror operators to maintain an
>>> OpenPGP key we can see as valid would not imply any regression,
>>> compared to the current state of things.
>>>
>>> Rather, if we wanted to have "We can authenticate requests sent to us
>>> by mirror operators", we would have to do extra work we're not
>>> doing currently.
>>>
>>> ⇒ If anyone feels like we should really do that, then at this point
>>> they'd better be ready to contribute some time to help with it (in
>>> practice our mirrors team went from 2 active members to 1 in the last
>>> 6-12 months or so). But given we've not had these nice security
>>> properties for months, and our world didn't end anyway, maybe it's no
>>> big deal and we can just forget about it?

>> Sure.

> I'll wait a bit more, to let a chance to people who think differently
> (those who have already expressed it, as well as those who haven't
> yet) to digest the updates we provided, and check how they feel now.

Six weeks later, with no updated argument raised against dropping this
requirement, I am going to consider it's now a decision, and will
update our doc for mirror operators accordingly. For the avoidance of
doubt: I don't intend to drop any reference to OpenPGP communication
from said documentation, I'll just make it optional.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-26 Thread GoodCrypto Support
Yes, it's usually too much pain to encrypt and check sigs by hand, but
security is critical for Tails. So let's do what we almost always do. Use 
software.

> If anyone feels like we should really do that, then at this point
> they'd better be ready to contribute some time to help with it

If it's software we know, we're glad to help.

Ease of use was an OpenPGP issue for decades, but in the last couple 
of years we are finally seeing some good open source solutions.

Doug


GoodCrypto Warning: Anyone could have read this message. Use encryption, it 
works.
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-14 Thread intrigeri
hey,

sajolida wrote (14 Mar 2016 15:21:21 GMT) :
> intrigeri:
>> sajolida wrote (11 Mar 2016 16:40:08 GMT) :
>> ⇒ If anyone feels like we should really do that, then at this point
>> they'd better be ready to contribute some time to help with it (in
>> practice our mirrors team went from 2 active members to 1 in the last
>> 6-12 months or so). But given we've not had these nice security
>> properties for months, and our world didn't end anyway, maybe it's no
>> big deal and we can just forget about it?

> Sure.

I'll wait a bit more, to let a chance to people who think differently
(those who have already expressed it, as well as those who haven't
yet) to digest the updates we provided, and check how they feel now.

>>> Also, this can be dealt with without OpenPGP signature: we can ask
>>> operators to put a token file with some random number on their server
>>> when requesting to be removed (as we've done some times I think).
>> 
>> For this to work, they need to drop --delete from their rsync cronjob,
>> or we have to be able to check the token file within 1 hour (don't
>> count on it), or we need to adjust all rsync cronjobs to ignore a new
>> directory where such token files would live. Nothing impossible, but
>> in this area, frankly I'm personally not going to do more than
>> reviewing good patches.

> Sure, I didn't think about this and that would be a pain. But I proposed
> this because I remember you using similar tricks in the past already,
> no?

I think so too, but I don't remember the details, except that
sometimes the timing was tricky.

> Could we ask people to drop a token file anywhere on they server
> outside of the reach of rsync --delete?

Yes, this can work if they (can) host other stuff than ours on
their webserver.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-14 Thread sajolida
intrigeri:
> sajolida wrote (11 Mar 2016 16:40:08 GMT) :
>> intrigeri:
>>> I think the main advantages of requiring OpenPGP -enabled
>>> communication with mirror operators are:
>>>
>>>  * We can authenticate requests sent to us by mirror operators: e.g.
>>>"please remove my mirror from the pool", that could otherwise be
>>>used to degrade our pool of mirrors, just by spoofing the sender
>>>address.
>>>
>>>- Are we seriously checking the OpenPGP signature on such requests?
>>>  I used to do it, and used to require a good trust path for key
>>>  updates, but I am under the impression that this might all have
>>>  been handled in a more flexible way recently. sajolida?
>> 
>> I'm definitely not. It's been a while since I gave up on bugging mirror
>> operators for their key if they don't provide me one themselves or ask
>> for a trust path on key updates. I gave up on this because I was never
>> really convinced that the advantages ("preventing artificial degradation
>> of the pool") outweighs the disadvantages (sending additional email just
>> for that, asking people to do obscure OpenPGP rituals that often fail,
>> dealing with mismatching key ids, do manual trust path verifications,
>> sending and monitoring Schleuder commands, raising the bar for new
>> mirrors, etc.).
> 
> I was indeed under this impression.
> 
>>>- Perhaps we would notice if too many mirrors were removed (this
>>>  calls for a monitoring check, I guess), and perhaps mirror
>>>  operators would notice if they don't get the traffic they expect?
>>>  IOW, perhaps we have other ways to avoid such attacks from being
>>>  effective enough to be attractive in the first place.
> 
>> I saw the scenario "please remove my mirror from the pool" mentioned
>> several times in this thread and almost be the foundation of all this
>> and I don't think it. Until now we've been managing the pool manually
>> and we would have noticed and reacted if the pool was being seriously
>> degraded.
> 
> ACK.
> 
> So, dropping the requirement for mirror operators to maintain an
> OpenPGP key we can see as valid would not imply any regression,
> compared to the current state of things.
> 
> Rather, if we wanted to have "We can authenticate requests sent to us
> by mirror operators", we would have to do extra work we're not
> doing currently.
> 
> ⇒ If anyone feels like we should really do that, then at this point
> they'd better be ready to contribute some time to help with it (in
> practice our mirrors team went from 2 active members to 1 in the last
> 6-12 months or so). But given we've not had these nice security
> properties for months, and our world didn't end anyway, maybe it's no
> big deal and we can just forget about it?

Sure.

>> Also, this can be dealt with without OpenPGP signature: we can ask
>> operators to put a token file with some random number on their server
>> when requesting to be removed (as we've done some times I think).
> 
> For this to work, they need to drop --delete from their rsync cronjob,
> or we have to be able to check the token file within 1 hour (don't
> count on it), or we need to adjust all rsync cronjobs to ignore a new
> directory where such token files would live. Nothing impossible, but
> in this area, frankly I'm personally not going to do more than
> reviewing good patches.

Sure, I didn't think about this and that would be a pain. But I proposed
this because I remember you using similar tricks in the past already,
no? Could we ask people to drop a token file anywhere on they server
outside of the reach of rsync --delete?

But I don't mind dropping this idea as well :)

>>>  * Mirror operators can authenticate instructions we send them, e.g.
>>>"please add this option to your nginx configuration". Without this,
>>>anyone can quite trivially DoS our pool of HTTP mirrors, until
>>>someone notices. The thing is, we have no idea if the operators of
>>>our mirrors check this, i.e. whether they would notice if some
>>>email apparently coming from us was not signed.
> 
>> This is about *us* sending authenticated email and doesn't require
>> having the keys of the mirror operators. I'm all for continuing doing
>> this (supposing that this comes for free from Schleuder though I didn't
>> check).
> 
> Confirmed.
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-12 Thread intrigeri
hi,

sajolida wrote (11 Mar 2016 16:40:08 GMT) :
> intrigeri:
>> I think the main advantages of requiring OpenPGP -enabled
>> communication with mirror operators are:
>> 
>>  * We can authenticate requests sent to us by mirror operators: e.g.
>>"please remove my mirror from the pool", that could otherwise be
>>used to degrade our pool of mirrors, just by spoofing the sender
>>address.
>>
>>- Are we seriously checking the OpenPGP signature on such requests?
>>  I used to do it, and used to require a good trust path for key
>>  updates, but I am under the impression that this might all have
>>  been handled in a more flexible way recently. sajolida?

> I'm definitely not. It's been a while since I gave up on bugging mirror
> operators for their key if they don't provide me one themselves or ask
> for a trust path on key updates. I gave up on this because I was never
> really convinced that the advantages ("preventing artificial degradation
> of the pool") outweighs the disadvantages (sending additional email just
> for that, asking people to do obscure OpenPGP rituals that often fail,
> dealing with mismatching key ids, do manual trust path verifications,
> sending and monitoring Schleuder commands, raising the bar for new
> mirrors, etc.).

I was indeed under this impression.

>>- Perhaps we would notice if too many mirrors were removed (this
>>  calls for a monitoring check, I guess), and perhaps mirror
>>  operators would notice if they don't get the traffic they expect?
>>  IOW, perhaps we have other ways to avoid such attacks from being
>>  effective enough to be attractive in the first place.

> I saw the scenario "please remove my mirror from the pool" mentioned
> several times in this thread and almost be the foundation of all this
> and I don't think it. Until now we've been managing the pool manually
> and we would have noticed and reacted if the pool was being seriously
> degraded.

ACK.

So, dropping the requirement for mirror operators to maintain an
OpenPGP key we can see as valid would not imply any regression,
compared to the current state of things.

Rather, if we wanted to have "We can authenticate requests sent to us
by mirror operators", we would have to do extra work we're not
doing currently.

⇒ If anyone feels like we should really do that, then at this point
they'd better be ready to contribute some time to help with it (in
practice our mirrors team went from 2 active members to 1 in the last
6-12 months or so). But given we've not had these nice security
properties for months, and our world didn't end anyway, maybe it's no
big deal and we can just forget about it?

> Also, this can be dealt with without OpenPGP signature: we can ask
> operators to put a token file with some random number on their server
> when requesting to be removed (as we've done some times I think).

For this to work, they need to drop --delete from their rsync cronjob,
or we have to be able to check the token file within 1 hour (don't
count on it), or we need to adjust all rsync cronjobs to ignore a new
directory where such token files would live. Nothing impossible, but
in this area, frankly I'm personally not going to do more than
reviewing good patches.

>>  * Mirror operators can authenticate instructions we send them, e.g.
>>"please add this option to your nginx configuration". Without this,
>>anyone can quite trivially DoS our pool of HTTP mirrors, until
>>someone notices. The thing is, we have no idea if the operators of
>>our mirrors check this, i.e. whether they would notice if some
>>email apparently coming from us was not signed.

> This is about *us* sending authenticated email and doesn't require
> having the keys of the mirror operators. I'm all for continuing doing
> this (supposing that this comes for free from Schleuder though I didn't
> check).

Confirmed.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-11 Thread sajolida
intrigeri:
> We'll soon be in a position to add more servers to the pool of HTTP
> mirrors that server our ISO images and IUKs. Before I publish the
> corresponding call for help, and get in touch with operators of
> potential fast mirrors (#11079), I'd like to make sure we get the
> requirements right.
> 
> So far, we (or was it perhaps just me?) have insisted on having a way
> to communicate using OpenPGP with each operator of a HTTP mirror in
> our pool. I'm starting to question this. [In case anyone here didn't
> get that memo: yes, it often takes me years to change my mind.]
> 
> This requirement has one clear disadvantage: it excludes some fast
> mirrors, e.g. lots of those that are run in universities (I have to
> trust people who are more in touch with operators of such candidate
> mirrors, on this one, as I have personally no idea). Also, on our side
> it adds to the burden of maintaining our pool of mirrors: maintaining
> a keyring isn't easy, and it gets quite hard if one wants to try to do
> it seriously.
> 
> We are in the process of dropping at least another requirement of ours
> (the need for a dedicated hostname) that might have been a blocker, so
> I think it's time to check our list of requirements.
> 
> I think the main advantages of requiring OpenPGP -enabled
> communication with mirror operators are:
> 
>  * We can authenticate requests sent to us by mirror operators: e.g.
>"please remove my mirror from the pool", that could otherwise be
>used to degrade our pool of mirrors, just by spoofing the sender
>address.
>
>- Are we seriously checking the OpenPGP signature on such requests?
>  I used to do it, and used to require a good trust path for key
>  updates, but I am under the impression that this might all have
>  been handled in a more flexible way recently. sajolida?

I'm definitely not. It's been a while since I gave up on bugging mirror
operators for their key if they don't provide me one themselves or ask
for a trust path on key updates. I gave up on this because I was never
really convinced that the advantages ("preventing artificial degradation
of the pool") outweighs the disadvantages (sending additional email just
for that, asking people to do obscure OpenPGP rituals that often fail,
dealing with mismatching key ids, do manual trust path verifications,
sending and monitoring Schleuder commands, raising the bar for new
mirrors, etc.).

>- Perhaps we would notice if too many mirrors were removed (this
>  calls for a monitoring check, I guess), and perhaps mirror
>  operators would notice if they don't get the traffic they expect?
>  IOW, perhaps we have other ways to avoid such attacks from being
>  effective enough to be attractive in the first place.

I saw the scenario "please remove my mirror from the pool" mentioned
several times in this thread and almost be the foundation of all this
and I don't think it. Until now we've been managing the pool manually
and we would have noticed and reacted if the pool was being seriously
degraded.

Also, this can be dealt with without OpenPGP signature: we can ask
operators to put a token file with some random number on their server
when requesting to be removed (as we've done some times I think). Having
a template answer for this would make it a breeze to enforce.

>  * Mirror operators can authenticate instructions we send them, e.g.
>"please add this option to your nginx configuration". Without this,
>anyone can quite trivially DoS our pool of HTTP mirrors, until
>someone notices. The thing is, we have no idea if the operators of
>our mirrors check this, i.e. whether they would notice if some
>email apparently coming from us was not signed.

This is about *us* sending authenticated email and doesn't require
having the keys of the mirror operators. I'm all for continuing doing
this (supposing that this comes for free from Schleuder though I didn't
check).
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-08 Thread intrigeri
Hi,

u wrote (06 Mar 2016 19:03:30 GMT) :
> Encrypting would keep a veil on who of the Tails team sends which
> requests for which reasons.

I think that using Schleuder's remailing capabilities already provide
this property, and I'm not sure I follow how encryption impacts it.

>> I'm now less convinced that these advantages are worth the drawbacks,
>> and could be ready to drop the OpenPGP communication requirement.

> If signing requests in both directions is absolutely necessary (and I am
> in favour of this),

Heard.

So I guess that we're back to wondering if those who maintain the pool
of mirrors check such things strictly enough to make all this work
useful against an actual attacker.

I'll ignore the "who does this work" part for now, because for now I'd
rather discuss "assuming we have people happy to do it, do we think
it's worth it?", and avoid leaning on the discussion with how the
decision may affect my personal commitments.

> then encryption is only a step away and we still need to maintain
> the mirror keyring.

Yes, absolutely (I didn't mention it initially because I agree that
encryption comes for free if we "keep" authentication).

> I cannot imagine another way of authenticating such requests as of today.

> As for proposing a choice to the operators on whether they'd like to
> encrypt emails or not would probably add even more overhead of
> maintaining such a list.

... and I think that Schleuder doesn't allow us to have authentication
only when emailing someone, so if we have their pubkey, we're going to
sign + encrypt; and if we don't have their pubkey, then we're only
going to sign.

Cheers!
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-06 Thread u
Hi,

intrigeri:
[...]
> This requirement has one clear disadvantage: it excludes some fast
> mirrors, e.g. lots of those that are run in universities (I have to
> trust people who are more in touch with operators of such candidate
> mirrors, on this one, as I have personally no idea). Also, on our side

I don't know how exactly universities or ISPs proceed when hosting ISO
images of distributions.

> it adds to the burden of maintaining our pool of mirrors: maintaining
> a keyring isn't easy, and it gets quite hard if one wants to try to do
> it seriously.

Ack.

[..]

> I think the main advantages of requiring OpenPGP -enabled
> communication with mirror operators are:
> 
>  * We can authenticate requests sent to us by mirror operators: e.g.
>"please remove my mirror from the pool", that could otherwise be
>used to degrade our pool of mirrors, just by spoofing the sender
>address.
> 
>- Are we seriously checking the OpenPGP signature on such requests?
>  I used to do it, and used to require a good trust path for key
>  updates, but I am under the impression that this might all have
>  been handled in a more flexible way recently. sajolida?
> 
>- Perhaps we would notice if too many mirrors were removed (this
>  calls for a monitoring check, I guess), and perhaps mirror
>  operators would notice if they don't get the traffic they expect?
>  IOW, perhaps we have other ways to avoid such attacks from being
>  effective enough to be attractive in the first place.
> 
>  * Mirror operators can authenticate instructions we send them, e.g.
>"please add this option to your nginx configuration". Without this,
>anyone can quite trivially DoS our pool of HTTP mirrors, until
>someone notices. The thing is, we have no idea if the operators of
>our mirrors check this, i.e. whether they would notice if some
>email apparently coming from us was not signed.
> 
>  * More?

Encrypting would keep a veil on who of the Tails team sends which
requests for which reasons. That might be information which does not
seem interesting at the moment, but it's some kind of interesting
metadata after all :)

> I'm now less convinced that these advantages are worth the drawbacks,
> and could be ready to drop the OpenPGP communication requirement.

If signing requests in both directions is absolutely necessary (and I am
in favour of this), then encryption is only a step away and we still
need to maintain the mirror keyring.

I cannot imagine another way of authenticating such requests as of today.

As for proposing a choice to the operators on whether they'd like to
encrypt emails or not would probably add even more overhead of
maintaining such a list.

Cheers!
u.
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-04 Thread Tobias Frei
PS: If the OpenPGP requirement is removed, I'd strongly suggest at least
asking for a confirmation for significant requests (e.g. removal of a
server from the pool). The confirmation should contain a full quote of the
e-mail it is sent in reply to. That way, at least easy spoofing is
prevented. It provides no additional security against a man-in-the-middle
attacker, but sending an e-mail with a forged "From" header is probably
much, much easier ("trivial & legal" vs. "requiring illegal cracking or
being the NSA") than circumventing this additional protection.

2016-03-04 21:39 GMT+01:00 Tobias Frei :

> Hi,
>
> the requirement to use OpenPGP encryption has been somewhat annoying for
> me personally in the past, especially because it did not allow me to read
> mirror-related e-mails (sometimes relatively time-critical ones) on my
> smartphone. This has happened to me on vacation in another country (I don't
> have a laptop) and at the local university, during breaks that I could have
> used to fix a problem if I had known which one it was.
>
> Also, the information shared via encrypted e-mail about my mirror in any
> direction has never been so confidential that encryption would have been
> necessary in my opinion. I know that it is probably best to encrypt all
> communication to prevent an attacker (e.g. NSA) from understanding which
> e-mails are really interesting, but the cost of encryption has outweighed
> the benefits for me so far.
>
> What I'd absolutely keep, though, is the *signing* of e-mails. I need to
> be able to check if a request has really been sent by the undersigning
> person. If can be sure that the request is valid (e.g. "your server is
> down") without verifying the OpenPGP signature, I might react directly
> (e.g. restart the server) instead of verifying the signature. If I can't, I
> must verify the signature.
> Also, I hope that the same level of verification is applied when I send an
> e-mail about my mirror. If I quote the sender's e-mail in my reply and
> simply confirm fixing a problem, checking my signature might be
> unnecessary. If I request the removal of my mirror from the pool, I really
> hope that the request will be properly verified. If my signature is
> missing, I hope that I'd be asked to provide a valid OpenPGP signature, a
> message on my website or whatever else would be sufficient to identify me
> as the sender of the request.
>
> Sending and receiving encrypted e-mails is rather annoying, sending and
> receiving signed e-mails is necessary, I'd say.
>
> Best regards,
> Tobias Frei
>
>
> 2016-03-04 20:18 GMT+01:00 intrigeri :
>
>> Hi,
>>
>> We'll soon be in a position to add more servers to the pool of HTTP
>> mirrors that server our ISO images and IUKs. Before I publish the
>> corresponding call for help, and get in touch with operators of
>> potential fast mirrors (#11079), I'd like to make sure we get the
>> requirements right.
>>
>> So far, we (or was it perhaps just me?) have insisted on having a way
>> to communicate using OpenPGP with each operator of a HTTP mirror in
>> our pool. I'm starting to question this. [In case anyone here didn't
>> get that memo: yes, it often takes me years to change my mind.]
>>
>> This requirement has one clear disadvantage: it excludes some fast
>> mirrors, e.g. lots of those that are run in universities (I have to
>> trust people who are more in touch with operators of such candidate
>> mirrors, on this one, as I have personally no idea). Also, on our side
>> it adds to the burden of maintaining our pool of mirrors: maintaining
>> a keyring isn't easy, and it gets quite hard if one wants to try to do
>> it seriously.
>>
>> We are in the process of dropping at least another requirement of ours
>> (the need for a dedicated hostname) that might have been a blocker, so
>> I think it's time to check our list of requirements.
>>
>> I think the main advantages of requiring OpenPGP -enabled
>> communication with mirror operators are:
>>
>>  * We can authenticate requests sent to us by mirror operators: e.g.
>>"please remove my mirror from the pool", that could otherwise be
>>used to degrade our pool of mirrors, just by spoofing the sender
>>address.
>>
>>- Are we seriously checking the OpenPGP signature on such requests?
>>  I used to do it, and used to require a good trust path for key
>>  updates, but I am under the impression that this might all have
>>  been handled in a more flexible way recently. sajolida?
>>
>>- Perhaps we would notice if too many mirrors were removed (this
>>  calls for a monitoring check, I guess), and perhaps mirror
>>  operators would notice if they don't get the traffic they expect?
>>  IOW, perhaps we have other ways to avoid such attacks from being
>>  effective enough to be attractive in the first place.
>>
>>  * Mirror operators can authenticate instructions we send them, e.g.
>>"please add this option to your nginx configuration". Without this,
>>   

Re: [Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-04 Thread Tobias Frei
Hi,

the requirement to use OpenPGP encryption has been somewhat annoying for me
personally in the past, especially because it did not allow me to read
mirror-related e-mails (sometimes relatively time-critical ones) on my
smartphone. This has happened to me on vacation in another country (I don't
have a laptop) and at the local university, during breaks that I could have
used to fix a problem if I had known which one it was.

Also, the information shared via encrypted e-mail about my mirror in any
direction has never been so confidential that encryption would have been
necessary in my opinion. I know that it is probably best to encrypt all
communication to prevent an attacker (e.g. NSA) from understanding which
e-mails are really interesting, but the cost of encryption has outweighed
the benefits for me so far.

What I'd absolutely keep, though, is the *signing* of e-mails. I need to be
able to check if a request has really been sent by the undersigning person.
If can be sure that the request is valid (e.g. "your server is down")
without verifying the OpenPGP signature, I might react directly (e.g.
restart the server) instead of verifying the signature. If I can't, I must
verify the signature.
Also, I hope that the same level of verification is applied when I send an
e-mail about my mirror. If I quote the sender's e-mail in my reply and
simply confirm fixing a problem, checking my signature might be
unnecessary. If I request the removal of my mirror from the pool, I really
hope that the request will be properly verified. If my signature is
missing, I hope that I'd be asked to provide a valid OpenPGP signature, a
message on my website or whatever else would be sufficient to identify me
as the sender of the request.

Sending and receiving encrypted e-mails is rather annoying, sending and
receiving signed e-mails is necessary, I'd say.

Best regards,
Tobias Frei


2016-03-04 20:18 GMT+01:00 intrigeri :

> Hi,
>
> We'll soon be in a position to add more servers to the pool of HTTP
> mirrors that server our ISO images and IUKs. Before I publish the
> corresponding call for help, and get in touch with operators of
> potential fast mirrors (#11079), I'd like to make sure we get the
> requirements right.
>
> So far, we (or was it perhaps just me?) have insisted on having a way
> to communicate using OpenPGP with each operator of a HTTP mirror in
> our pool. I'm starting to question this. [In case anyone here didn't
> get that memo: yes, it often takes me years to change my mind.]
>
> This requirement has one clear disadvantage: it excludes some fast
> mirrors, e.g. lots of those that are run in universities (I have to
> trust people who are more in touch with operators of such candidate
> mirrors, on this one, as I have personally no idea). Also, on our side
> it adds to the burden of maintaining our pool of mirrors: maintaining
> a keyring isn't easy, and it gets quite hard if one wants to try to do
> it seriously.
>
> We are in the process of dropping at least another requirement of ours
> (the need for a dedicated hostname) that might have been a blocker, so
> I think it's time to check our list of requirements.
>
> I think the main advantages of requiring OpenPGP -enabled
> communication with mirror operators are:
>
>  * We can authenticate requests sent to us by mirror operators: e.g.
>"please remove my mirror from the pool", that could otherwise be
>used to degrade our pool of mirrors, just by spoofing the sender
>address.
>
>- Are we seriously checking the OpenPGP signature on such requests?
>  I used to do it, and used to require a good trust path for key
>  updates, but I am under the impression that this might all have
>  been handled in a more flexible way recently. sajolida?
>
>- Perhaps we would notice if too many mirrors were removed (this
>  calls for a monitoring check, I guess), and perhaps mirror
>  operators would notice if they don't get the traffic they expect?
>  IOW, perhaps we have other ways to avoid such attacks from being
>  effective enough to be attractive in the first place.
>
>  * Mirror operators can authenticate instructions we send them, e.g.
>"please add this option to your nginx configuration". Without this,
>anyone can quite trivially DoS our pool of HTTP mirrors, until
>someone notices. The thing is, we have no idea if the operators of
>our mirrors check this, i.e. whether they would notice if some
>email apparently coming from us was not signed.
>
>  * More?
>
> I'm now less convinced that these advantages are worth the drawbacks,
> and could be ready to drop the OpenPGP communication requirement.
>
> Thoughts?
>
> Cheers,
> --
> intrigeri
> ___
> Tails-dev mailing list
> Tails-dev@boum.org
> https://mailman.boum.org/listinfo/tails-dev
> To unsubscribe from this list, send an empty email to
> tails-dev-unsubscr...@boum.org.
>
___

[Tails-dev] [RFC] Dropping requirement for OpenPGP communication with HTTP mirror operators?

2016-03-04 Thread intrigeri
Hi,

We'll soon be in a position to add more servers to the pool of HTTP
mirrors that server our ISO images and IUKs. Before I publish the
corresponding call for help, and get in touch with operators of
potential fast mirrors (#11079), I'd like to make sure we get the
requirements right.

So far, we (or was it perhaps just me?) have insisted on having a way
to communicate using OpenPGP with each operator of a HTTP mirror in
our pool. I'm starting to question this. [In case anyone here didn't
get that memo: yes, it often takes me years to change my mind.]

This requirement has one clear disadvantage: it excludes some fast
mirrors, e.g. lots of those that are run in universities (I have to
trust people who are more in touch with operators of such candidate
mirrors, on this one, as I have personally no idea). Also, on our side
it adds to the burden of maintaining our pool of mirrors: maintaining
a keyring isn't easy, and it gets quite hard if one wants to try to do
it seriously.

We are in the process of dropping at least another requirement of ours
(the need for a dedicated hostname) that might have been a blocker, so
I think it's time to check our list of requirements.

I think the main advantages of requiring OpenPGP -enabled
communication with mirror operators are:

 * We can authenticate requests sent to us by mirror operators: e.g.
   "please remove my mirror from the pool", that could otherwise be
   used to degrade our pool of mirrors, just by spoofing the sender
   address.

   - Are we seriously checking the OpenPGP signature on such requests?
 I used to do it, and used to require a good trust path for key
 updates, but I am under the impression that this might all have
 been handled in a more flexible way recently. sajolida?

   - Perhaps we would notice if too many mirrors were removed (this
 calls for a monitoring check, I guess), and perhaps mirror
 operators would notice if they don't get the traffic they expect?
 IOW, perhaps we have other ways to avoid such attacks from being
 effective enough to be attractive in the first place.

 * Mirror operators can authenticate instructions we send them, e.g.
   "please add this option to your nginx configuration". Without this,
   anyone can quite trivially DoS our pool of HTTP mirrors, until
   someone notices. The thing is, we have no idea if the operators of
   our mirrors check this, i.e. whether they would notice if some
   email apparently coming from us was not signed.

 * More?

I'm now less convinced that these advantages are worth the drawbacks,
and could be ready to drop the OpenPGP communication requirement.

Thoughts?

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.