Re: Proposal to Change the Default TLS Ciphersuites Offered by Browsers

2013-08-23 Thread Gervase Markham
On 22/08/13 19:21, Robert Relyea wrote:
 The attack profile protection of PFS versus non-PFS is basically two points:
 1) some government agency could force a server to give up it's private
 keys and decrypt all the traffic sent to that server. But we already
 know that government agencies with such power simply ask for the the
 data on the server.
 2) some well funded attacker could spend the resources to attack the
 server's private key and get all the traffic sent to it. However, we
 don't actually check to see that the server is giving us a unique key in
 the ephemeral case. A way to cut some of the server cost of DHE/ECDHE is
 to generate a single them key as use it for all connections. We have
 know way of knowing the server is doing this, which brings back this
 particular attack.

3) Someone who has captured some or all of the traffic could use a 0-day
to get into the server and pinch the private key.

This sort of thing is much more likely if the victim is a person of
noteworthiness and the attacker is a government (perhaps that person's
government), but is not the government of the jurisdiction where the
server is based.

As for 2), there are lots of ways a server can sabotage a
seemingly-encrypted connection if it chooses. Why is this one special?

Gerv

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Proposal to Change the Default TLS Ciphersuites Offered by Browsers

2013-08-23 Thread Robert Relyea
On 08/23/2013 02:03 AM, Gervase Markham wrote:
 On 22/08/13 19:21, Robert Relyea wrote:
 The attack profile protection of PFS versus non-PFS is basically two points:
 1) some government agency could force a server to give up it's private
 keys and decrypt all the traffic sent to that server. But we already
 know that government agencies with such power simply ask for the the
 data on the server.
 2) some well funded attacker could spend the resources to attack the
 server's private key and get all the traffic sent to it. However, we
 don't actually check to see that the server is giving us a unique key in
 the ephemeral case. A way to cut some of the server cost of DHE/ECDHE is
 to generate a single them key as use it for all connections. We have
 know way of knowing the server is doing this, which brings back this
 particular attack.
 3) Someone who has captured some or all of the traffic could use a 0-day
 to get into the server and pinch the private key.

 This sort of thing is much more likely if the victim is a person of
 noteworthiness and the attacker is a government (perhaps that person's
 government), but is not the government of the jurisdiction where the
 server is based.
This has the same characteristics as 1. Once in the server, it's more
likely the attacker will fetch the data at rest than try to decrypt
recorded SSL connection.  Once the private key is pinched, future
connections are vulnerable even if they are PFS.

 As for 2), there are lots of ways a server can sabotage a
 seemingly-encrypted connection if it chooses. Why is this one special?

Most ways the server could sabotage the connection are detectable to the
client. I'm also pointing out that PFS is not a panacea. It's often
touted as such, but it's relatively easy to defeat.

To be clear, I'm not against PFS, and I don't disagree that it should be
placed forward, what I am pointing out is that any argument based on
performance to put 128 over 256 is completely ignoring the fact that PFS
is at least 3 times as expensive as the equivalent non-PFS algorithms
for only marginal theoretic security enhancement.

I think we need to be consistent in our choices here (of course as a
security guy, I'm quite happy with security over performance as the
default).

bob




smime.p7s
Description: S/MIME Cryptographic Signature
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

NSS+JSS in FIPS mode for Encryption and Decryption in java

2013-08-23 Thread raj
Need help in doing the NSS+JSS in FIPS mode for Encryption/Decryption in FIPS
mode?



--
View this message in context: 
http://mozilla.6506.n7.nabble.com/NSS-JSS-in-FIPS-mode-for-Encryption-and-Decryption-in-java-tp288733.html
Sent from the Mozilla - Cryptography mailing list archive at Nabble.com.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto