RE: Another Snake Oil Candidate

2007-09-14 Thread lists
On  12 Sep 2007 20:18:22 -0700, Aram Perez wrote:
 I don't about you, but when I hear terms like (please pardon my
 cynicism):

   with military grade AES encryption - Hum, I'll have
 to ask NIST
 about that.

AES can be permitted for use in classified environments. See
http://csrc.nist.gov/CryptoToolkit/aes/CNSS15FS.pdf. And, yes, the DoD
does use AES in certain circumstances.

  The encryption keys used to protect your data are generated
  in hardware by a FIPS 140-2 compliant True Random Number
 
 As opposed to a FIPS 140-2 compliant False Random Number Generator.

While I don't understand this quibble about standard terminology, I do
note that the IronKey language is somewhat misleading. There are no
FIPS-approved non-deterministic RNGs at this point, as all of the
FIPS-approved RNGs are deterministic (pseudo) RNGs. (See
http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexc.pdf) It
is possible to use a non-deterministic RNG to seed a FIPS-approved PRNG,
but I don't know of anyone in the FIPS 140-2 world that claims doing so
makes the non-deterministic RNG FIPS 140-2 compliant. 

(Also, if random data is utilized during key generation within a FIPS
140-2 module, then a FIPS-approved RNG must be utilized to generate that
data in order to meet FIPS 140-2 requirements. Since all the
FIPS-approved RNGs are PRNGs, a true RNG is not going to meet the FIPS
140-2 requirement here.)

Overall, colorful language and FIPS 140 hand-waving seem like the
marketing norm in the security products that utilize crypto world. I
think the language used by IronKey falls right in line with that, but I
don't get a sense of snake oil. Then again, I don't really care either.

-Andrew

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another Snake Oil Candidate

2007-09-14 Thread Russ Nelson
Damien Miller writes:
  It protects against the common threat model of lost/stolen USB keys.

Remember, crypto without a threat model is like cookies without
milk.

-- 
--my blog is athttp://blog.russnelson.com   | People have strong opinions
Crynwr sells support for free software  | PGPok | about economics even though
521 Pleasant Valley Rd. | +1 315-323-1241   | they've never studied it.
Potsdam, NY 13676-3213  | Sheepdog  | Curious how that is!

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: Another Snake Oil Candidate

2007-09-14 Thread Russ Nelson
Dave Korn writes:
So by your exacting standards, PGP, gpg, openssh, in fact basically
  _everything_ is snake oil.

No.  In fact Aram is saying nothing of interest.  Cryptography without
a threat model is like motherhood without apple pie.  Can't say that
enough times.  More generally, security without a threat model is by
definition going to fail.

-- 
--my blog is athttp://blog.russnelson.com   | People have strong opinions
Crynwr sells support for free software  | PGPok | about economics even though
521 Pleasant Valley Rd. | +1 315-323-1241   | they've never studied it.
Potsdam, NY 13676-3213  | Sheepdog  | Curious how that is!

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another Snake Oil Candidate

2007-09-13 Thread Ian G

Hagai Bar-El wrote:

Hi,

On 12/09/07 08:56, Aram Perez wrote:

The IronKey appears to provide decent security while it is NOT plugged
into a PC. But as soon as you plug it in and you have to enter a
password to unlock it, the security level quickly drops. This would be
the case even if they supported Mac OS or *nix.

As I stated in my response to Jerry Leichter, in my opinion, their
marketing department is selling snake oil.


I think there is a difference between a product that is susceptible to
an attack and the pure distilled 100% natural snake oil, as we usually
define it.



So, is snake oil:

   * a crap product?
   * a fine product with weaknesses?
   * a marketing campaign that goes OTT?
   * a term used to slander the opposing security model?
   * an adjective that applies to any of the above?

iang

OTT == over-the-top, excessive and dangerous.  Derives from 
WW1 trench warfare.


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: Another Snake Oil Candidate

2007-09-13 Thread Dave Korn
On 13 September 2007 04:18, Aram Perez wrote:

   to circumvent keylogging spyware - More on this later...

   The first time you plug it in, you initialize it with a password -
 Oh, wait until I disable my keylogging spyware.
   You enter that password to unlock your secure files - Did I
 disable my keyloggin spyware?
 
 Protected by a password that is entered on whatever PC you plug the
 IronKey into and that is somehow auto-magically protected against all
 keylogging spyware that may exist on that PC.

 Decrypting your files is then as easy as dragging and dropping them
 onto the desktop and by any malware that detects that the IronKey is
 present and has been unlocked and copies the files to a hidden folder.

  So by your exacting standards, PGP, gpg, openssh, in fact basically
_everything_ is snake oil.  Endpoint security is a real issue, but it's not
within the remit of this product to address.  I feel your complaint is
overblown.  Marketspeak alone doesn't make a product snakeoil, its security
has to actually be bogus too.


  Encryption Keys
 
  The encryption keys used to protect your data are generated
  in hardware by a FIPS 140-2 compliant True Random Number
 
 As opposed to a FIPS 140-2 compliant False Random Number Generator.

  No, as opposed to a *Pseudo* Random Number Generator.  This is a really
silly thing to attempt to complain about; they're correctly using technical
terminology that you should be perfectly familiar with.


cheers,
  DaveK
-- 
Can't think of a witty .sigline today

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another Snake Oil Candidate

2007-09-13 Thread Jeffrey Altman
Damien Miller wrote:

 It protects against the common threat model of lost/stolen USB keys. Why is
 this snake oil? Your criticism seems akin to calling a physical lock insecure
 because it doesn't protect you from burglars once you have unlocked it.

Many many years ago an office that a startup I was working for was
burglarized by picking the lock on the office door.  They took a number
of computers.  The police recommended that we replace the locks with XYZ
super lock that could not be picked and we did so at significant expense
prior to replacing all of the computers.

Three or four weeks later the office was burglarized again.  They could
not pick the lock so they took a sledgehammer to the wall next to the
door, reached in unlocked the door from the inside and proceeded to go
about their business.

This wasn't a failure of the lock.  The lock did its job.

---

The product you are describing is not snake oil.  You have a valid gripe
that the product is not marketed along with a description of the attack
vectors it protects against and those that it does not.

Jeffrey Altman



smime.p7s
Description: S/MIME Cryptographic Signature


RE: Another Snake Oil Candidate

2007-09-13 Thread Charles Jackson
I looked at the Ironkey website and, although there is obviously a little
marketing-speak, my snake-oil and BS detectors do not go off.  Some of the
criticisms by Aram Perez appear to be somewhat unjustified.


Perez states:

Protected by a password that is entered on whatever PC you plug the  
IronKey into and that is somehow auto-magically protected against all  
keylogging spyware that may exist on that PC.

Relevant Ironkey assertion in their FAQs:
A word of caution: if your computer is infected with a keystroke logger
before you purchase your IronKey, and if you initially enter your passwords
into your IronKey on the computer that is already infected with a keystroke
logger, then your passwords of course will be tracked by that keystroke
logger. For this reason, we recommend that you setup your IronKey and
initially enter your passwords into the Password Manager from a computer
that you control and that has anti-spyware and anti-virus software
installed. We recommend that you update your anti-spyware and anti-virus
definitions and run a sweep of your PC before setting up your IronKey.


Perez  also states: 
They imply that you can use an IronKey with any PC and be completely safe.

Relevant Ironkey assertion in their FAQs:
If I get an IronKey, will I be 100% protected from malware?

No. The IronKey does not replace the need good security practices, such as
regular anti-virus and anti-spyware scans, not sharing passwords, and
avoiding websites that you do not trust. The IronKey does equip you to
further protect your data, identity, and privacy-an increasingly necessary
tool for today's security-minded consumer.

Additionally, new threats are constantly surfacing, so even today's best
solutions cannot guarantee future-proof protection. But since you have the
ability to securely update your IronKey, you can make sure you have the
latest and most secure software and firmware for maximum protection today
and tomorrow.


Chuck Jackson 


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another Snake Oil Candidate

2007-09-13 Thread Hagai Bar-El
Hi,

On 13/09/07 15:14, Ian G wrote:
 Hagai Bar-El wrote:
 Hi,

 On 12/09/07 08:56, Aram Perez wrote:
 The IronKey appears to provide decent security while it is NOT plugged
 into a PC. But as soon as you plug it in and you have to enter a
 password to unlock it, the security level quickly drops. This would be
 the case even if they supported Mac OS or *nix.

 As I stated in my response to Jerry Leichter, in my opinion, their
 marketing department is selling snake oil.

 I think there is a difference between a product that is susceptible to
 an attack and the pure distilled 100% natural snake oil, as we usually
 define it.
 
 
 So, is snake oil:
 
* a crap product?
* a fine product with weaknesses?
* a marketing campaign that goes OTT?
* a term used to slander the opposing security model?
* an adjective that applies to any of the above?


Just like any term, it can have many interpretations.
However, the most useful definition is the one that you can find at
http://en.wikipedia.org/wiki/Snake_oil_(cryptography) and which quite
accurately reflects what the people who first brought this term into use
used it for.

Hagai.

-- 
Hagai Bar-El - Information Security Analyst
T/F: 972-8-9354152 Web: www.hbarel.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another Snake Oil Candidate

2007-09-12 Thread Jon Callas
I'm a beta-tester for it, and while I can understand a small twitch  
when they talk about miltary and beyond military levels of  
security, it is very cool.


It has hardware encryption and will erase itself if there are too  
many password failures. I consider that an issue, personally, but it  
appeals to people. The reason I consider it an issue is that I have  
had to use a brain-dead-simple password I'm not going to forget  
because if I get cute and need to try a number of things, poof, I'm  
dead.


Yeah, it's using AES CBC mode, but that's a good deal better than a  
lot of encrypted drives that are using ECB.


It also has their own little suite of Mozilla plus Tor and Privoxy  
for browsing and they've set it up so that you can run that on  
another computer from the drive.


It's not bad at all. My only real complaint is that it requires Windows.

Jon

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another Snake Oil Candidate

2007-09-12 Thread Aram Perez

Hi Jon,

On Sep 11, 2007, at 5:35 PM, Jon Callas wrote:

I'm a beta-tester for it, and while I can understand a small twitch  
when they talk about miltary and beyond military levels of  
security, it is very cool.


It has hardware encryption and will erase itself if there are too  
many password failures. I consider that an issue, personally, but  
it appeals to people. The reason I consider it an issue is that I  
have had to use a brain-dead-simple password I'm not going to  
forget because if I get cute and need to try a number of things,  
poof, I'm dead.


Yeah, it's using AES CBC mode, but that's a good deal better than a  
lot of encrypted drives that are using ECB.


It also has their own little suite of Mozilla plus Tor and Privoxy  
for browsing and they've set it up so that you can run that on  
another computer from the drive.


It's not bad at all. My only real complaint is that it requires  
Windows.


The IronKey appears to provide decent security while it is NOT  
plugged into a PC. But as soon as you plug it in and you have to  
enter a password to unlock it, the security level quickly drops. This  
would be the case even if they supported Mac OS or *nix.


As I stated in my response to Jerry Leichter, in my opinion, their  
marketing department is selling snake oil.


Regards,
Aram

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another Snake Oil Candidate

2007-09-12 Thread Hagai Bar-El
Hi,

On 12/09/07 08:56, Aram Perez wrote:
 The IronKey appears to provide decent security while it is NOT plugged
 into a PC. But as soon as you plug it in and you have to enter a
 password to unlock it, the security level quickly drops. This would be
 the case even if they supported Mac OS or *nix.
 
 As I stated in my response to Jerry Leichter, in my opinion, their
 marketing department is selling snake oil.

I think there is a difference between a product that is susceptible to
an attack and the pure distilled 100% natural snake oil, as we usually
define it.

Indeed, the encrypted USB token is susceptible to sniffing of the
password on the PC where it is entered. But in my opinion this is not
the type of flaw that snake oils the product, because:

1. It's a limitation that also exists in the state of the art products
of its type. That is, nobody could ever do better (I think).
2. It therefore does not reflect complete lack of understanding on the
developer's side...

So perhaps it's not pure snake oil but just a product with an attack
vector; most products have at least one.

Actually, this product is (almost) the first one that I saw which
actually bothers to deal with the brute-force attack vector, which does
exist in many other similar products. So it's not perfect, and I would
certainly not bet my life on it, probably not even my life's data, but
it's reasonable.

Hagai.

-- 
Hagai Bar-El - Information Security Analyst
T/F: 972-8-9354152 Web: www.hbarel.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another Snake Oil Candidate

2007-09-11 Thread Ali, Saqib
On 9/11/07, Aram Perez [EMAIL PROTECTED] wrote:
 The world's most secure USB Flash Drive: https://www.ironkey.com/demo.

you didn't explain why it is a Snake Oil Candidate..

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Another Snake Oil Candidate

2007-09-11 Thread Leichter, Jerry
| The world's most secure USB Flash Drive: https://www.ironkey.com/demo.
What makes you call it snake oil?  At least the URL you point to says
very reasonable things:  It uses AES, not some home-brew encryption; the
keys are stored internally; the case is physically protected, and has
some kind of tampering sensor that wipes the stored keys when attacked.
In fact, they make some of the same points:

Your IronKey is literally packed with the latest and most
secure encryption technologies, all enabled by the powerful
onboard Cryptochip. Rather than employing homegrown
cryptographic algorithms that have not undergone rigorous
cryptoanalysis, IronKey follows industry best practices and
uses only well-established and thoroughly tested
cryptographic algorithms.

All of your data on the IronKey drive is encrypted in
hardware using AES CBC-mode encryption.


   1. Encryption Keys
   2. Always-On Encryption
   3. Two-Factor Authentication

Encryption Keys

The encryption keys used to protect your data are generated
in hardware by a FIPS 140-2 compliant True Random Number
Generator on the IronKey Cryptochip.  This ensures maximum
protection via the encryption ciphers. The keys are
generated in the Cryptochip when you initialize your
IronKey, and they never leave the secure hardware to be
placed in flash memory or on your computer.

Always-On Encryption

Because your IronKey implements data encryption in the
hardware Cryptochip, all data written to your drive is
always encrypted. There is no way to accidentally turn it
off or for malware or criminals to disable it. Also, it runs
many times faster than software encryption, especially when
storing large files or using the on-board portable Firefox
browser.

Two-Factor Authentication

Beyond simply protecting the privacy of your data on the
IronKey flash drive, the IronKey Cryptochip incorporates
advanced Public Key Cryptography ciphers that allow you to
lock down your online IronKey account. That way you must
have your IronKey device, in addition to your password, to
access your online account. This highly complex process runs
behind the scenes, giving you state-of-the-art protection
from phishers, hackers and other online threats.

The management team lists some people who should know what they are
doing.  They have a FAQ which gives a fair amount of detail about
what they do.

I have nothing at all to do with this company - this is the first I've
heard of them - but it's hardly advancing the state of security if
even those who seem to be trying to do the right thing get tarred as
delivering snake-oil.

If you know something beyond the publicly-available information about
the company, let's hear it.  Otherwise, you owe them an apology -
whether they actually do live up to their own web site or not.

-- Jerry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]