Re: disks with hardware FDE

2008-07-09 Thread Leichter, Jerry
On Tue, 8 Jul 2008, Perry E. Metzger wrote: | Has anyone had any real-world experience with these yet? Are there | standards for how they get the keys from the BIOS or OS? (I'm | interested in how they deal with zeroization on sleep and such.) | | Most manufacturer (will) implement the TCG

Re: Strength in Complexity?

2008-07-09 Thread Arshad Noor
Ben Laurie wrote: OK, so you still have a PKI problem, in that you have to issue and manage client certificates. How is this done? One man's meat :-). (I don't necessarily view this as a problem Ben. I've built up a career and a small business in the last 9 years doing just that.)

Re: Permanent Privacy - Are Snake Oil Patents a threat?

2008-07-09 Thread David G. Koontz
Ali, Saqib wrote: Quoting the Foxbusiness article: Permanent Privacy (patent pending) has been verified by Peter Schweitzer, one of Harvard's top cryptanalysts, and for the inevitable cynics Permanent Privacy is offering $1,000,000 to anyone who can decipher a sample of ciphertext. I did a

Kaminsky finds DNS exploit

2008-07-09 Thread Udhay Shankar N
I think Dan Kaminsky is on this list. Any other tidbits you can add prior to Black Hat? Udhay http://www.liquidmatrix.org/blog/2008/07/08/kaminsky-breaks-dns/ Kaminsky Breaks DNS Author: Dave Lewis July 8, 2008 at 2:21 pm ยท Filed under Patches, Vulnerability Well, sort of. Today Dan

Re: disks with hardware FDE

2008-07-09 Thread Peter Gutmann
Arshad Noor [EMAIL PROTECTED] writes: Perry E. Metzger wrote: There are now a number of drives on the market advertising AES based FDE in hardware, and a number of laptops available on the market that claim to support them. [...] There is a debate going on on that list about the value of

I don't trust FDE drives.

2008-07-09 Thread Perry E. Metzger
I've now talked to a few people affiliated with drive companies at this point. One of them seems to really know what he's doing. The rest appear not to. One has even spoken to me of keying material being protected by what are effectively one time pads and trust us, this is our business in ways

Re: Kaminsky finds DNS exploit

2008-07-09 Thread Steven M. Bellovin
On Wed, 09 Jul 2008 11:22:58 +0530 Udhay Shankar N [EMAIL PROTECTED] wrote: I think Dan Kaminsky is on this list. Any other tidbits you can add prior to Black Hat? Udhay http://www.liquidmatrix.org/blog/2008/07/08/kaminsky-breaks-dns/ I'm curious about the details of the attack. Paul

Re: Kaminsky finds DNS exploit

2008-07-09 Thread Paul Hoffman
First off, big props to Dan for getting this problem fixed in a responsible manner. If there were widespread real attacks first, it would take forever to get fixes out into the field. However, we in the security circles don't need to spread the Kaminsky finds meme. Take a look at

Re: Kaminsky finds DNS exploit

2008-07-09 Thread John Levine
However, we in the security circles don't need to spread the Kaminsky finds meme. Quite right. Paul Vixie mentioned it in 1995, Dan Bernstein started distributing versions of dnscache with randomized port and sequence numbers in 2001. The take-away here is not that Dan didn't discover the

Re: Permanent Privacy - Are Snake Oil Patents a threat?

2008-07-09 Thread Leichter, Jerry
| ...Obviously patents could be improved by searching further across | disciplines for prior art and by having more USPTO expertise. We're | also seeing a dumbing down of the 'Persons Having Ordinary Skill In | the Art' as the number of practitioners expand rapidly. Patent law and its

Re: Kaminsky finds DNS exploit

2008-07-09 Thread Ben Laurie
Paul Hoffman wrote: First off, big props to Dan for getting this problem fixed in a responsible manner. If there were widespread real attacks first, it would take forever to get fixes out into the field. However, we in the security circles don't need to spread the Kaminsky finds meme. Take a

Re: Kaminsky finds DNS exploit

2008-07-09 Thread Victor Duchovni
On Wed, Jul 09, 2008 at 08:20:33AM -0700, Paul Hoffman wrote: First off, big props to Dan for getting this problem fixed in a responsible manner. If there were widespread real attacks first, it would take forever to get fixes out into the field. However, we in the security circles don't

Re: Kaminsky finds DNS exploit

2008-07-09 Thread Jack Lloyd
On Wed, Jul 09, 2008 at 05:36:02PM +0100, Ben Laurie wrote: Paul Hoffman wrote: First off, big props to Dan for getting this problem fixed in a responsible manner. If there were widespread real attacks first, it would take forever to get fixes out into the field. However, we in the security

Re: Kaminsky finds DNS exploit

2008-07-09 Thread John Kemp
Ben Laurie wrote: Paul Hoffman wrote: First off, big props to Dan for getting this problem fixed in a responsible manner. If there were widespread real attacks first, it would take forever to get fixes out into the field. However, we in the security circles don't need to spread the Kaminsky

Re: Kaminsky finds DNS exploit

2008-07-09 Thread Harald Hanche-Olsen
+ John Kemp [EMAIL PROTECTED]: It does seem he would like an air of some mystery to exist though until he makes his presentation about the issue at Defcon - did he, himself, discover something new? We'll just have to wait, unless we go play with the BIND code ourselves. Unless he is merely

Re: Kaminsky finds DNS exploit

2008-07-09 Thread Ben Laurie
Steven M. Bellovin wrote: On Wed, 09 Jul 2008 11:22:58 +0530 Udhay Shankar N [EMAIL PROTECTED] wrote: I think Dan Kaminsky is on this list. Any other tidbits you can add prior to Black Hat? Udhay http://www.liquidmatrix.org/blog/2008/07/08/kaminsky-breaks-dns/ I'm curious about the

The 2008 IEEE Key Management Summit is Currently Seeking Panelists

2008-07-09 Thread Matt Ball
The 2008 IEEE Key Management Summit (KMS) is currently seeking six panelists to act as the voice of customers who have purchased or plan to purchase a cryptographic key management solution. The panels will be moderated by leading analysts Jon Oltsik of the Enterprise Strategy Group, and Ramon

Securing the Network against Web-based Proxies

2008-07-09 Thread Leichter, Jerry
Ah, where the web is going. 8e6 Technologies sells a hardware box that it claims does signature analysis to detect HTTP proxies and blocks them. It can also block HTTPS proxies that do not have a valid certificate (whatever that means), as well as do such things as block IM, force Google and