Re: Who's afraid of Mallory Wolf?

2003-03-24 Thread Peter Clay
On Sun, 23 Mar 2003, Ian Grigg wrote:

 Consider this simple fact:  There has been no
 MITM attack, in the lifetime of the Internet,
 that has recorded or documented the acquisition
 and fraudulent use of a credit card (CC).
 
 (Over any Internet medium.)

How do you view attacks based on tricking people into going to a site
which claims to be affiliated with e.g. Ebay or Paypal, getting them to
enter their login information as usual, and using that to steal money?

It's not a pure MITM attack, but the current system at least makes it
possible for people to verify with the certificate whether or not the site
is a spoof.

 So, let's guess the cost of each CC lost to our
 MITM as $1000.  (Pick your own number if you
 don't like that one.)
 
 Then, how many attacks?  None, from the above.
 
 Multiplied together, and you get ... nothing.

So, you claim that a system designed to make MITM attacks impossible has
not suffered a successful MITM attack. Sounds rather tautologous to me.

 The software mandates it:  mostly the browsers,
 but also the servers, are configured to kick up
 a stink at the thought of talking to a site that
 has no certificate.

 As such, SSL, as implemented, shows itself to
 include a gross failure of engineering.

The system was engineered very well to requirements with which you
disagree.

 [2] AFAIR, Anonymous-Diffie-Hellman, or ADH, is
 inside the SSL/TLS protocol, and would represent
 a mighty fine encrypted browsing opportunity.
 Write to your browser coder today and suggest
 its immediate employment in the fight against
 the terrorists with the flappy ears.

Just out of interest, do you have an economic cost/benefit analysis for
the widespread deployment of gratuitous encryption?

It's just not that important. If your browsing privacy is important,
you're prepared to click through the alarming messages. If the value of
privacy is less than the tiny cost of clicking accept this certificate
forever for each site, then it's not a convincing argument for exposing
people who don't understand crypto to the risk of MITM.

Pete


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Palladium

2002-10-21 Thread Peter Clay
I've been trying to figure out whether the following attack will be
feasible in a Pd system, and what would have to be incorporated to prevent
against it.

Alice runs trusted application T on her computer. This is some sort of
media application, which acts on encoded data streamed over the
internet. Mallory persuades Alice to stream data which causes a buffer
overrun in T. The malicious code, running with all of T's privileges:

- abducts choice valuable data protected by T (e.g. individual book keys
for ebooks)
- builds its own vault with its own key
- installs a modified version of T, V, in that vault with access to the
valuable data
- trashes T's vault

The viral application V is then in an interesting position. Alice has two
choices:

- nuke V and lose all her data (possibly including all backups, depending
on how backup of vaults works)
- allow V to act freely

I haven't seen enough detail yet to be able to flesh this out, but it does
highlight some areas of concern:

- how do users back up vaults?
- there really needs to be a master override to deal with misbehaving
trusted apps.

Pete
-- 
Peter Clay | Campaign for   _  _| .__
   | Digital   /  / | |
   | Rights!   \_ \_| |
   | http://uk.eurorights.org


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: RSA's RC5-64 Secret Key Challenge has been solved.

2002-09-27 Thread Peter Clay

On Thu, 26 Sep 2002, Lucky Green wrote:

 Software defined radios would be well-suited to task, but those who
 expended the effort of writing software-defined cellular telephony
 modules so far understandably chose to sell the fruits of their labor to
 paying customers rather than releasing the code as Open Source.

The GNU project has a SDR implementation, which claims to implement at
least a plain FM receiver, and has GSM as a future direction:
http://www.gnu.org/software/gnuradio/gnuradio.html

Of course, as soon as someone implements a satellite PPV decoder on top of
it the entire technology will probably be banned :(

Pete
-- 
Peter Clay | Campaign for   _  _| .__
   | Digital   /  / | |
   | Rights!   \_ \_| |
   | http://uk.eurorights.org


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]