Hi, [email protected] wrote (19 Jan 2015 20:44:29 GMT) : >> > namely the mirrors serving the updates can be made to serve malicious >> > iso's with >> > fake verification keys. >> >> Either I don't understand what you mean, or you didn't understand the >> security discussion you're referring to. May you please clarify what >> you mean with "fake verification keys", and what exact section of the >> aforementioned security discussion you're referring to?
> Hi, no specific section, OK, I misunderstood then. > is the basic principle of insecure networks that you are > pushing updates through that im pointing out is inheriently at fault. Namely > theres > two main attack vectors, that tails.org and its mirrors can be made malicious > by > intruders, and that the connection to the mirrors/tails.org can be modified in > transit by a malicious 3rd party. In what follows, I'll assume that when you write "tails.org", you really mean "https://tails.boum.org/". Note that this website has no mirror, and we've got no plans to change that currently. Also, it would be helpful if you were using the same well-defined nomenclature as the one we're using in our incremental upgrades security discussion (which is the same nomenclature that the current research on this topic uses, by the way). This would make the discussion much clearer and would save me a lot of time. > On the first point, when a sites IP is known its server can be located > rendering it > vulnerable to physical seizure or attacks, im assuming your servers arent > guarded > 24/7 by 2 armed men then you are leaving everyone wide open to what is a > fairly > common technique amongst governments to access and control a server locally. > The obvious solution is to create a tails.org .onion located on a new server > separate > from the clearnet one as to insure its location remains a secret, allowing > for its > users to reference it as a secure verifiable source of info. As for the > possibility > of remote hacking i will assume since the tails devs are capable of securing > an OS > that they are capable of securing a website. Indeed, anyone who takes control of our website, but not of our signing key, can perform "Indefinite freeze attacks" and "Endless data attacks". I agree that serving the upgrade-description files from a Tor Hidden Service hosted in a secret location would make physical attacks harder. It would not make remote attacks any harder, though (in passing, note that securing a client OS is not the same as securing a public web server). Both attacks are slightly mitigated by the fact that we are announcing new releases in other ways: * one that does not rely on our website at all (Twitter); * one that does not rely on our website to be safe at the time Tails Upgrader checks for available upgrades, as long as it was safe at the time the new release was published (<[email protected]> announce mailing-list). [Adding this information to the design documentation.] Given this, the current weaknesses of Tor hidden services, and our limited resources when it comes to maintaining infrastructure, I'm not convinced at all that it's worth it to create and maintain a HS with the upgrade information. It's a matter of priorities, and for now, I'm pretty sure that our focus (on the infra side) on making the Tails project more maintainable and sustainable is the way to go. Now, if we got substantially more help in this area [1], of course we could do more useful things in the same time scope :) [1] https://tails.boum.org/contribute/how/sysadmin/ <Off-topic in this thread> > On this point it seems wholly irresponsible that tails users upon connecting > to Tor > and loading the browser are connected to a clearnet site with scripts > enabled, what > sort of security model opens users up to scripting attacks every single time > they > connect to the internet?? We've got a ticket open about blocking JavaScript coming from our website with NoScript => what we need isn't any more arguing and name calling, it needs good patches. </Off-topic in this thread> > On the second point, traditionally to prevent MITM's from modifying traffic in > transit websites use SSL which is a most basic of security protocols. > Tails.org and > its distro mirrors do not even bother with this, the arguement supplied by > the devs > is "they can just attack the mirrors anyways"....see point 1. I've no idea what specific attack, using the aforementioned nomenclature, you are referring to here. Your introduction suggests that you're talking about a MitM modifying target files (.iuk), which our current system protects users against, so it must be something else => please clarify. > And why does tails.org provide such > lengthy guides on verifying the .iso's using information that could just as > easily be > forged (SHA256/signing keys)?. If the devs would create a distrobution > channel that > ran over tor as an .onion then none of these problems would exist. It seems to me that you're assuming a pool of 100% trusted mirrors that are all run in a very secure way, and a super-strong Tor Hidden Services system. Unfortunately, that's not what we have right now :( I'm also curious what method users would use to bootstrap trust into that .onion *address*, that would safe in the threat model you're reasoning about in this thread. Cheers, -- intrigeri _______________________________________________ tails-support mailing list [email protected] https://mailman.boum.org/listinfo/tails-support To unsubscribe from this list, send an empty email to [email protected].
