Re: [tor-talk] TorBirdy Not Allowing Connections to Servers

2012-07-20 Thread Sebastian G.
Jacob Appelbaum:
> Ethan Lee Vita:
>> Pop servers (I don't use imap) don't connect while using TorBirdy, nor
>> do SMTP servers. It just sticks at 'Connecting to
>> pop.someserver.org...', not even asking for user password. SMTP comes up
>> with Thunderbird didn't connect to SMTP error. TorBirdy did work until I
>> upgraded from v0.0.4 to v0.0.9 and hasn't worked since (currently on
>> v0.0.10). I've been trying to figure this out for some time, but after
>> playing with Thunderbird settings, searching online, and updating to
>> other versions of TorBirdy (trying again every few days), I've had no
>> success and had to disable TorBirdy.
> 
> Are you trying to use pop3 without SSL/TLS? If so, I think this is
> expected behavior - we didn't want anyone to insecurely check
> pop/imap/smtp over Tor unless they *really* know what they're doing.
> 

Despite the fact, that this might not be the reason for the error
shouldn't TorBirdy display some kind of message, when it discards
connections because they are not encrypted?

"TorBirdy has prevented potentially unwanted information disclosure.
Please use SSL/TLS to encrypt the connection(s)."

or something else. At least users should know that TorBirdy is the
reason why they can't connect. Maybe even telling why exactly this is
the case.

If you agree, I could create a ticket.

Regards,
Sebastian
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] secure and simple network time (hack)

2012-07-20 Thread adrelanos
intrigeri:
> There are a few pieces of software called htpdate, and the one Tails
> uses only connects to HTTPS servers, and delegates to wget the X.509
> certificates validation:
> https://tails.boum.org/contribute/design/Time_syncing/#index3h2

Unfortunately wget (nor any other command line downloader) doesn't
support to pin the certificate of the website.
https://lists.gnu.org/archive/html/bug-wget/2012-07/msg7.html

So it still depend on the flawed root CA system.

(Don't take this too harsh. Although there is space for improvement I
seriously consider adding tails_htp to aos. Thanks to the distributed
trust model, I think it's currently the safest method.)

> In addition, the pal/foe/neutral pool system Tails uses gives *some*
> protection against untrustworthy sources of time information, which
> limits what one can do with only a few illegitimate X.509 certificates
> they got from a "trusted" CA:
> https://tails.boum.org/contribute/design/Time_syncing/#index4h2

If I understand correctly, you pick three random servers. One from each
pool. And then build the mediate of the three.

What's the point of asking the foe pool? (Servers which generally do not
care about privacy.)

Why doesn't tails_htp ask more than three servers for the time and build
the mediate? Like 6, 9 or 12.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] secure and simple network time (hack)

2012-07-20 Thread adrelanos
intrigeri:
> Hi,
> 
> adrelanos wrote (18 Jul 2012 18:37:18 GMT) :
>> To make our life even worse... Sorry... But not using NTP and only
>> emmiting Tor traffic is also pretty clearly Tails. Because that puts
>> you in the group of users "Uses Tor, nothing else, but does not use
>> NTP? How many people act like this?". So you should at least emmit
>> a fake NTP query (when others that usuaally do) and drop it.
> 
> This is indeed true for a non-shared public IP, and is mitigated to
> some degree when sharing an IP (e.g. behind home router NAT,
> concurrently with others non-Tails systems).

Yes.

> Looks like we'll need to think a bit more what kind of fingerprinting
> resistance a system like Tails can reasonably pretend to at this scale.

Don't give up too early. Man ntpdate says there is "-q Query only -
don't set the clock.". That's perfect for a fake NTP query.

I just haven't found out how to tell ntpd to do the same. That is
required for a good fake.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] secure and simple network time (hack)

2012-07-20 Thread intrigeri
Hi,

Jacob Appelbaum wrote (19 Jul 2012 23:48:48 GMT) :
> The key difference with htpdate is that one has a cryptographic
> signature. I'll take a subset of possible MITM attackers over fully
> trusting something that anyone could MITM.

I think this is wrong in the context of Tails.

There are a few pieces of software called htpdate, and the one Tails
uses only connects to HTTPS servers, and delegates to wget the X.509
certificates validation:
https://tails.boum.org/contribute/design/Time_syncing/#index3h2

In addition, the pal/foe/neutral pool system Tails uses gives *some*
protection against untrustworthy sources of time information, which
limits what one can do with only a few illegitimate X.509 certificates
they got from a "trusted" CA:
https://tails.boum.org/contribute/design/Time_syncing/#index4h2

Thanks a lot for your detailed answer!
I'll think about the rest later.

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] secure and simple network time (hack)

2012-07-20 Thread intrigeri
Hi,

adrelanos wrote (18 Jul 2012 18:37:18 GMT) :
> To make our life even worse... Sorry... But not using NTP and only
> emmiting Tor traffic is also pretty clearly Tails. Because that puts
> you in the group of users "Uses Tor, nothing else, but does not use
> NTP? How many people act like this?". So you should at least emmit
> a fake NTP query (when others that usuaally do) and drop it.

This is indeed true for a non-shared public IP, and is mitigated to
some degree when sharing an IP (e.g. behind home router NAT,
concurrently with others non-Tails systems).

Looks like we'll need to think a bit more what kind of fingerprinting
resistance a system like Tails can reasonably pretend to at this scale.

(I'm re-adding the Cc to tails-dev, that was lost at some point.
Please don't drop it again.)

Cheers!
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Torbirdy and gpg --throw-keyids

2012-07-20 Thread Tom Ritter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I agree with Jake.  Less information disclosed is better.

Under some circumstances I will encrypt a message to recipients not in the 
email.  For example, if I am emailing on behalf of a group, I will encrypt to 
the group, even if I do not CC/BCC them, because I consider it a 'trust' thing. 
 I never intended them to not be able to read that message, so I portray it.  
(It's also super-handy if I need to forward the email from a phone w/o my key.) 
 Another situation could be encrypting emails to a backup key of my own.  Or 
even (whip me for suggesting it) encrypting to a message escrow service of some 
kind.

So throwing the keyids of everyone but the recipient and sender is very good, 
and should be done.  I argue strongly for that.

Under some strange circumstances, the receiver and/or sender may have a 
non-public key that the message would be encrypted to, that they would not like 
to disclose the existence of.  It could be used to segment working vs personal 
relationships, keep a high-security key under wraps for use with your spouse, 
be a project specific key, or perhaps be used to bypass a previously theorized 
key escrow service.  If I was performing reconnaissance on someone, and say 85% 
of their traffic went to a public key on a keyserver, and 15% went to an 
undisclosed key - that's strange.

But on the flip side, it's obvious the message is encrypted to the recipient(s) 
specified on the email and the sender saw it unencrypted... and in some cases 
those recipients may be greatly inconvenienced by throwing the keyids - as in 
your case.  So throwing the keyids of the recipient(s) is still arguably 
important, but less so than third-parties.  I could go either way on it.

It almost seems like it could be worth codifying a preference in the OpenPGP 
standard. Potentially interpreting 
http://tools.ietf.org/html/rfc4880#section-5.2.3.17 to also imply throw-keyid 
or adding a new option.

- -tom
-BEGIN PGP SIGNATURE-

iEYEARECAAYFAlAJ/DwACgkQJZJIJEzU09tWhwCfbW9CKWhr5O4ulukjokJdRtqr
wLIAniS+G5NaBQr5HX1BFWvGfygRze2I
=XazV
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TorBirdy Not Allowing Connections to Servers

2012-07-20 Thread Ethan Lee Vita
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Jacob Appelbaum:
> Are you trying to use pop3 without SSL/TLS? If so, I think this is
> expected behavior - we didn't want anyone to insecurely check
> pop/imap/smtp over Tor unless they *really* know what they're doing.

I've had SSL/TLS enabled from the beginning of my Thunderbird use, with
and without TorBirdy, so that shouldn't be the problem. I've been using
port 465, which I read was the proper port for SSL to work with. And
using normal password authentication. I don't think it gets that far
though as it shows no sign of any successful connection and when not
working, doesn't prompt for any password.

> It could be - feel free to document your expected setup here?

What exactly do you want to know? I have both riseup & Google accounts,
having followed their config settings for server names & default ports
(995 for pop & 465 for SMTP), which I've rechecked repeatedly.

I've barely touched the config editor.
- - Changed network.proxy.socks_remote_dns to true when I attempted to
torify Thunderbird before TorBirdy. It didn't work so I changed it back
to false.
- - mail.server.default.autosync_offline_stores to true
- - use_status_for_biff to false (I don't use imap, but tweaked this in
case I ever changed my mind and forgot this existed)

- -- 
Ethan Lee Vita
Professional Agorist
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=WGCW
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Torbirdy and gpg --throw-keyids

2012-07-20 Thread Tim Wilde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 7/18/2012 6:19 PM, Jacob Appelbaum wrote:
> The gpg manpage says the following:
> 
> Do not put the recipient key IDs into encrypted  messages.  This 
> helps  to  hide  the  receivers  of the message and is a limited 
> countermeasure against traffic analysis. ([Using a little social 
> engineering  anyone who is able to decrypt the message can check 
> whether one of the other recipients is the  one  he  suspects.]) On
> the  receiving side, it may slow down the decryption process 
> because all available secret keys must  be  tried.   --no-throw- 
> keyids disables this option. This option is essentially the same as
> using --hidden-recipient for all recipients.
> 
> So lets say that I use gpg to encrypt the message to you, to me,
> and to an additional key. I would reveal my own gpg key (which you
> may not know, which may not be public), your key (which may be used
> to ask you to disclose a specific key), and finally - it reveals
> the third party which is not otherwise involved in the email
> message headers at all.
> 
> I'd prefer that this isn't revealed at all and lucky for us, gpg
> allows us to hide that information.

Jake,

Maybe I'm being dense, but under what circumstances does it make sense
for a GPG public key to be ... not public?  I genuinely would like to
better understand your position.  My specific questions on your example:

* If you want to hide your key from me, how do you expect me to reply
to the communication while maintaining the confidentiality?  I don't
understand a use case in which this would make sense.  Hiding it from
the public is one thing, but hiding it from the recipient?

* What do you mean by "may be used to ask you to disclose a specific
key", exactly?  The only thing doing the "asking" is my trusted local
GPG instance, and in the case of --throw-keyids, it will actually be
asking me /more/ questions and causing significantly more risk of
information disclosure in the case of system compromise (but if my
system is already compromised, I've already lost, so I still don't
understand the threat profile here either).

* I won't argue about the third party, but that's already handled
automatically by Enigmail when you BCC, which is typically the only
way that third party key would get in the mix in a standard Enigmail
use case scenario.

Additional to all of this, the GPG key itself is never being disclosed
here, just its key ID.  It's still giving a unique identifier from
which you can build a social graph, I'll grant you, but again, I'd
argue that it's a real stretch to say this information is anything
more than is already disclosed in the required SMTP headers.

Please, educate me!

Thanks,
Tim

- -- 
Tim Wilde, Software Engineer, Team Cymru, Inc.
twi...@cymru.com | +1-847-378- | http://www.team-cymru.org/
-BEGIN PGP SIGNATURE-

iQIcBAEBAgAGBQJQCcEUAAoJED1BdOFPDWdbd94QAI6gQk5olrEDWXOa8J4Hh1Q+
OsOvFXYyxnDgbrZ8GycjAh9JeA5+I6wJwyrw0azpXbULQpYFcAnhngyTzkyYzPCn
eR80Vohj72KwMNCoFyO8LpKlLmdtnLi3ZsfEq5aF2Ou+cVCGOsUUNxiDhBEUsI8P
lgSzGWIa6x2g1+Qz4ZwMvFf5w62oJITdVQbmDOTgvExzivvtuMC5HYFNHKsanEVD
HeQJve0RO1jAYJnlr20J6Bx6gD/vdBoxNb4OnEbv+u1y+An7WcHu9al7/OpesIw5
dFPkzLI++ZHPVK4be9NdNEQpRZZbxdc7+nWGcZvUQ3nGH6UY/4zpJDaZXShY4tmG
aL/iRWGBH9QfiZj65lFreBELIqBtaYHJjnj4hQccE4Ee30VaSYgXXwCIUKVpDeNG
NYOExSCEaiKyx34jb/Q3gLhykLe6cjOQ6RKYwOca56BFc6wJ67ge6Jq9+1olyZKJ
WUmLWs/J2n4EvnuG/hkh6T0ivRgvUIuX1XUc8VvZfgSpUp5Hv1znwCW2MV38U4t0
TSoWsMFgFjDZrxa+6/kwKMIup0nK5fqhAAAI9fFAy5UhAtd2PtsSEdmE4x37tH9l
yjH63PsqZ8zBMb6n/72ynuuXTDEvPKI9lzUqSTdEv+/IpAM1a4CLoYV2K8Y2pN0B
v+gjuVV5L4I0kB17Ze3x
=q6+s
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TorBirdy Not Allowing Connections to Servers

2012-07-20 Thread Sukhbir Singh
Hi,

Ethan Lee Vita:
> Could someone share some advice on where to look for a solution? I've
> not seen any mention via online searches, this list, or the bug tracker
> regarding anyone else having this problem, so I suspect its something on
> my end.

To add to what Jake said, either try accessing POP/SMTP over SSL, or to
help you better diagnose this: install TorBirdy 0.0.10 and then
configure your account manually (TorBirdy will set the recommended
security settings itself).

Let us know if this issue persists.

-- 
Sukhbir
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Tails-dev] secure and simple network time (hack)

2012-07-20 Thread adrelanos
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Jacob Appelbaum:
> So does that mean you do or do not like DNSSEC? :)

Can't say, I didn't dig into that deep enough.

> I'd like to see a normal ntp client that runs over Tor safely - can
> you show us an example of a way to do that? If so, I'd gladly
> consider running such an NTP service. I already run a normal UDP
> OpenNTP server in the pool.

>> The system can not be adapted since you will have a hard time
>> finding public, free NTP servers, which support authenitcated
>> NTP. And even if you find a very few, you can not rely on a small
>> amount of servers. A big pool is required for distribiuted
>> trust.
> 
> That's a resource issue, not a technical issue. We can solve both,
> I think. I'd like to know if someone has actually used normal NTP
> clients over Tor, even with private servers and found that it was
> suitable?

Ok, I am sorry, I messed up. There is no way to run NTP *directly*
over TCP. I found the following interesting posts about this issue:
http://lists.ntp.org/pipermail/questions/2007-October/015832.html
http://lists.ntp.org/pipermail/questions/2007-October/015834.html
http://lists.ntp.org/pipermail/questions/2007-October/015859.html

We could run NTP over Tor, if we tunnel UDP over OnionCat. Due to
usage of hidden services, Tor would provide authentication. (NTP
autokey could be added for another layer of authenication.) But it
were NTP over TCP over UDP, which wouldn't be (according to the posts
above) exact as ordinary NTP over TCP.

I don't know how less accurate it were and if that is a good idea or
not. Or if we find willing people to run it. Please discuss. If there
is intererest, it could be tried to develop some instructions how to
provide NTP as hidden service and share the result in the tpo wiki.
-BEGIN PGP SIGNATURE-
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=/rsw
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Tails-dev] secure and simple network time (hack)

2012-07-20 Thread Jacob Appelbaum
adrelanos:
> Jacob Appelbaum:
>> I think adding an option to verify the leaf certificate's
>> fingerprint, rather than just the signature alone would be a fine
>> idea.
> 
> Yes, then we could ask eff, tpo and similars about their policy to
> change the certificates. If we pin their certificates, we don't have
> to trust any CAs.
> 

I'd prefer to trust a CA (or well, Tor identity) run by EFF, Tor or
someone else.

>> so, it depends a lot on what you mean by "getting rid of all CAs"
> 
> In this particlar discussion I meant "no need to use any CAs". (In
> general I would be happy to see a widespread replacement for the CAs
> as a whole.)
> 

So does that mean you do or do not like DNSSEC? :)

>>> And even if you use only a single source over TLS (pinned) as
>>> time source... How is it better than using a single authenticated
>>> NTP server over TCP?
>>
>> I've never seen a system that shipped with authenticated NTP
>> enabled.
> 
> It doesn't exist, unfortunately. It's also a critical security
> vulnarability in all major operating system, not only for Tor users,
> for anyone. No one cares about as long as no one uses it for a big
> scale attack. If an attacker moves back the time several years he can
> use revoked certificates.

I agree. That's one of the reasons why I have been working on tlsdate.

> 
>> I'm sure it has happened but generally, ntp is unauthenticated and
>> is run as a UDP service.
> 
> Yes.
> 
>> I'd be interested to see a client configuration that works over TCP
>> and has strong integrity protection of the remote time.
> 
> It's certainly possible but almost no one is using it. I found two
> guides about adding authenication to NTP.
> https://ntp3.sp.se/howto.html
> http://support.ntp.org/bin/view/Support/ConfiguringAutokey
> 
> (Over TCP is possible as well, Google tells.)

I'd like to see a normal ntp client that runs over Tor safely - can you
show us an example of a way to do that? If so, I'd gladly consider
running such an NTP service. I already run a normal UDP OpenNTP server
in the pool.

> 
> As Tails pointed out...
> https://tails.boum.org/todo/authenticate_time_servers/
> https://tails.boum.org/contribute/design/Time_syncing/
> 
> The system can not be adapted since you will have a hard time finding
> public, free NTP servers, which support authenitcated NTP. And even if
> you find a very few, you can not rely on a small amount of servers. A
> big pool is required for distribiuted trust.

That's a resource issue, not a technical issue. We can solve both, I
think. I'd like to know if someone has actually used normal NTP clients
over Tor, even with private servers and found that it was suitable?

All the best,
Jacob
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TorBirdy Not Allowing Connections to Servers

2012-07-20 Thread Jacob Appelbaum
Ethan Lee Vita:
> Pop servers (I don't use imap) don't connect while using TorBirdy, nor
> do SMTP servers. It just sticks at 'Connecting to
> pop.someserver.org...', not even asking for user password. SMTP comes up
> with Thunderbird didn't connect to SMTP error. TorBirdy did work until I
> upgraded from v0.0.4 to v0.0.9 and hasn't worked since (currently on
> v0.0.10). I've been trying to figure this out for some time, but after
> playing with Thunderbird settings, searching online, and updating to
> other versions of TorBirdy (trying again every few days), I've had no
> success and had to disable TorBirdy.

Are you trying to use pop3 without SSL/TLS? If so, I think this is
expected behavior - we didn't want anyone to insecurely check
pop/imap/smtp over Tor unless they *really* know what they're doing.

> 
> Could someone share some advice on where to look for a solution? I've
> not seen any mention via online searches, this list, or the bug tracker
> regarding anyone else having this problem, so I suspect its something on
> my end.
> 

It could be - feel free to document your expected setup here?

> I only have copies of github versions, so if someone could share the
> xpis 5 & 6, I could report on which version I started having problems with.
> 

It's likely that you started to have problems when we forced the
connections to be secure by default.

All the best,
Jacob
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] TorBirdy Not Allowing Connections to Servers

2012-07-20 Thread Ethan Lee Vita
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Pop servers (I don't use imap) don't connect while using TorBirdy, nor
do SMTP servers. It just sticks at 'Connecting to
pop.someserver.org...', not even asking for user password. SMTP comes up
with Thunderbird didn't connect to SMTP error. TorBirdy did work until I
upgraded from v0.0.4 to v0.0.9 and hasn't worked since (currently on
v0.0.10). I've been trying to figure this out for some time, but after
playing with Thunderbird settings, searching online, and updating to
other versions of TorBirdy (trying again every few days), I've had no
success and had to disable TorBirdy.

Could someone share some advice on where to look for a solution? I've
not seen any mention via online searches, this list, or the bug tracker
regarding anyone else having this problem, so I suspect its something on
my end.

I only have copies of github versions, so if someone could share the
xpis 5 & 6, I could report on which version I started having problems with.

- -- 
Ethan Lee Vita
Professional Agorist
-BEGIN PGP SIGNATURE-
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=j18X
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Tails-dev] secure and simple network time (hack)

2012-07-20 Thread adrelanos
Jacob Appelbaum:
> I think adding an option to verify the leaf certificate's
> fingerprint, rather than just the signature alone would be a fine
> idea.

Yes, then we could ask eff, tpo and similars about their policy to
change the certificates. If we pin their certificates, we don't have
to trust any CAs.

> so, it depends a lot on what you mean by "getting rid of all CAs"

In this particlar discussion I meant "no need to use any CAs". (In
general I would be happy to see a widespread replacement for the CAs
as a whole.)

>> And even if you use only a single source over TLS (pinned) as
>> time source... How is it better than using a single authenticated
>> NTP server over TCP?
> 
> I've never seen a system that shipped with authenticated NTP
> enabled.

It doesn't exist, unfortunately. It's also a critical security
vulnarability in all major operating system, not only for Tor users,
for anyone. No one cares about as long as no one uses it for a big
scale attack. If an attacker moves back the time several years he can
use revoked certificates.

> I'm sure it has happened but generally, ntp is unauthenticated and
> is run as a UDP service.

Yes.

> I'd be interested to see a client configuration that works over TCP
> and has strong integrity protection of the remote time.

It's certainly possible but almost no one is using it. I found two
guides about adding authenication to NTP.
https://ntp3.sp.se/howto.html
http://support.ntp.org/bin/view/Support/ConfiguringAutokey

(Over TCP is possible as well, Google tells.)

As Tails pointed out...
https://tails.boum.org/todo/authenticate_time_servers/
https://tails.boum.org/contribute/design/Time_syncing/

The system can not be adapted since you will have a hard time finding
public, free NTP servers, which support authenitcated NTP. And even if
you find a very few, you can not rely on a small amount of servers. A
big pool is required for distribiuted trust.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] More secure hidden service as client or relay?

2012-07-20 Thread HardKor
When you run a relay, your ip become public so it gives some information
about you and your potential location. If your enemy knows that you are in
a specific region for exemple it could become dangerous for you !
On the other hand, it would be more difficult for your enemy to exploit the
dump of your communications to conclude that you are de hidden service
owner than if you run a client.

Don't forget to restrict the access to your service, don't let it open
world wide ;)

On Fri, Jul 20, 2012 at 1:16 AM, Daniel Dennis  wrote:

> I read about a successful attack on hidden services. The two major
> attacks i remember were 1) Looking at IP addresses in the network and
> check if the hidden service is up. When its down you can narrow the ip
> address down. 2) Disconnecting and reconnecting to the hidden service
> hoping you become a peer and use a timing attack. This is prevented by
> node guards which was talked about in the PDF (before and after the
> guards).
>
> That same pdf mention clients were easier to find then relays. I'm not
> sure why.
> Right now at this moment what is more secure when running a hidden
> service. When being a client or relay?
>
> --
> http://www.fastmail.fm - Or how I learned to stop worrying and
>   love email again
>
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Tails-dev] secure and simple network time (hack)

2012-07-20 Thread Jacob Appelbaum
adrelanos:
> Jacob Appelbaum:
>>> If anything, TLS is much harder to get right (see issue #16 on
>>> GitHub, for instance — tlsdate is currently susceptible to a MITM
>>> attack).
>>
>> It's a work in progress, of course. I use it with a pinned CA, so
>> in such a case, users are not vulnerable to a MITM attack unless
>> one can get certs from that specific CA.
> 
> Wouldn't it be better to get ride of all CAs? Rather pin the CA
> certificate of certain websites instant of pinning a CA?
> 

Sure - practically this is the same thing - except, you might run a CA
yourself, with a rotating key on the server. The abstraction is nice as
it allows you to keep the trusted key offline.

I think adding an option to verify the leaf certificate's fingerprint,
rather than just the signature alone would be a fine idea.

Also, there is a TODO item that specifically addresses this with
TLSA/DANE/CAA but that relies on DNSSEC. DNSSEC is basically the CA
system done slightly differently, so, it depends a lot on what you mean
by "getting rid of all CAs" - Moxie has said a lot about this topic but
I suspect he's not on the list.

> And even if you use only a single source over TLS (pinned) as time
> source... How is it better than using a single authenticated NTP
> server over TCP?

I've never seen a system that shipped with authenticated NTP enabled.
I'm sure it has happened but generally, ntp is unauthenticated and is
run as a UDP service. I'd be interested to see a client configuration
that works over TCP and has strong integrity protection of the remote time.

All the best,
Jacob
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Tails-dev] secure and simple network time (hack)

2012-07-20 Thread adrelanos
Jacob Appelbaum:
>> If anything, TLS is much harder to get right (see issue #16 on
>> GitHub, for instance — tlsdate is currently susceptible to a MITM
>> attack).
> 
> It's a work in progress, of course. I use it with a pinned CA, so
> in such a case, users are not vulnerable to a MITM attack unless
> one can get certs from that specific CA.

Wouldn't it be better to get ride of all CAs? Rather pin the CA
certificate of certain websites instant of pinning a CA?

And even if you use only a single source over TLS (pinned) as time
source... How is it better than using a single authenticated NTP
server over TCP?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk