Re: What happened to the Cryptography list...?

2003-08-07 Thread Bill Stewart
At 07:05 PM 08/06/2003 +0100, Adam Back wrote:
The problems with closed lists relying on a single human for
forwarding and filtering...
Couldn't he just let people post in his absence?  It kind of detracts
from a list if it disappears for weeks at a time on a regular basis.
Also there are delays, and then there's Perry decisions that a
discussion is no longer worth persuing when contributors are still
interested to discuss.
If it's too quiet on Perry's list, you can always overflow discussions
back to the Cypherpunks list or sci.crypt.


Re: What happened to the Cryptography list...?

2003-08-06 Thread Bill Stewart
Bob - Perry's cryptography list moved from wasabisystems to
[EMAIL PROTECTED]
a few months ago.  [EMAIL PROTECTED] says:
-
 lists
[EMAIL PROTECTED] serves the following lists:
  bsd-api-announceThe BSD APIs Announcement Mailing List
  bsd-api-discuss The BSD APIs Discussion Mailing List
  cryptographyThe Cryptography and Cryptography Policy Mailing 
List
  spkiThe Simple PKI Mailing List

Use the 'info ' command to get more information
about a specific list.
 info cryptography
"Cryptography" is a low-noise moderated mailing list devoted to
cryptographic technology and its political impact. Occasionally,
the moderator allows the topic to veer more generally into security
and privacy technology and its impact, but this is rare.
WHAT TOPICS ARE APPROPRIATE:
  "On topic" discussion includes technical aspects of cryptosystems,
  social repercussions of cryptosystems, and the politics of
  cryptography such as export controls or laws restricting cryptography.
  Discussions unrelated to cryptography are considered off topic.

  Please try to keep your postings on topic.

MODERATION POLICY:
  In order to keep the signal to noise ratio high, the mailing list
  is moderated. The moderator does not forward off topic messages,
  messages that have substantially the same content as earlier messages,
  etc.
  Please not that the moderator does not always have the time to send an
  explanation of why a message was not forwarded.
TO POST: send mail with your message to
 [EMAIL PROTECTED]
TO UNSUBSCRIBE: send mail to
 [EMAIL PROTECTED]
  with the line
 unsubscribe cryptography
  in the body of your mail.
 info spki
 No info available for spki.
 end
END OF COMMANDS
--


Re: They never learn: "Omniva Policy Systems"

2003-08-06 Thread Bill Stewart
At 06:52 PM 08/05/2003 -0700, Tim May wrote:

On Tuesday, August 5, 2003, at 01:00  PM, Bill Stewart wrote:

It's nice to see that they're still around, unlike so many dot.bombs.
Why is it "nice"?
They had what looked like a legitimate security / privacy product,
and were upfront about the threat models being regulators and anti-trust cops.
He started off by being very clear about what problems they were
and weren't trying to solve.  They were trying to solve the problem of
making messages expire when all the parties involved are cooperating.
He viewed the problem of preventing non-cooperating parties from
saving copies to be unsolvable snake oil and he wasn't trying to solve it.
This may or may not have been what Jeff believed, or wanted to believe, or 
told you was the case, but I don't buy that this is their business model.. 
Their Web site is filled with stuff about how "Save" menus are subverted, 
so as to, they claim, make it impossible for copies to be saved, blah 
blah. This hardly fits with your view of a bunch of benign little bears 
all sitting around cooperating.
While it's hard to tell from the web site, it looks like
they've still got the same basic technical model -
instead of sending raw text, you're sending text encrypted using a key
that you fetch from a key server, and when the recipient wants to view it,
the recipient runs a viewer that fetches a decryption key.
The policy enforcement runs on the key server,
which deletes keys when the policy says the document should expire,
and apparently places some controls on who it's willing to hand keys to.
People save stuff all the time, and forget it, and backup systems often save it
even if they didn't explicitly try to save it themselves.
By shipping the sensitive messages as encrypted files,
the Save functions are only saving the encrypted version, not the cleartext.
On the other hand, I don't know how much their integration with Outlook 
breaks it.

Further, the site natters about how Omnivora will support government 
requirements about unauthorized persons seeing mail (how? how will even 
their crude expiry approach stop unauthorized viewings of mail?).
You can set up your policy servers to set who's allowed to fetch keys.
There's no indication on the web site about how much granularity this has,
or how much protection or authentication they really do.
This is again inconsistent with the picture of friendly little bears all 
cooperating. Friendly little bears don't need to have their "Save As" 
buttons elided (not that this will stop screen grabs and photos, as I 
mentioned). Nor would friendly little cooperating bears show their 
messages to "unauthorized viewers," now would they?

(Speculatively, I would not be even slightly surprised if Omnivora is 
doing more than just nominally erasing some messages. To wit, storing 
copies for later examination by Authorities with Ministerial Warrants. As 
Jeff Ubois no longer seems to be attached to Omnivora, perhaps his vision 
was rejected.)
Policy servers are run by the company using the system, not by Omniva,
so you're still dependent on their competence as well as their honesty,
and if they want to ship a broken system, it's not hard to hide it
(e.g. use a compromised random number generator for the keys.)



In your other message, you mentioned that several Extropians were doing 
really
squishy stuff, and mentioned that Jeff Ubois's resume also appeared to be.
Something called "Ryze" and something else called "Minciu Sodas."
I didn't see Ryze.  Looks like some kind of job-hunting thing.
Minciu Sodas does look like a weird site - I'm not sure how much it's
just a self-hyping conference board and how many people agree with each 
other like bloggers,
but I didn't see anything on there that was actual content by Jeff,
but it was too cluttery to spend much time hunting through.

But not as bad as the squishiness poor Max has gotten himself into, granted.
There's a whole subculture of bottom feeders who think high tech needs 
some new version of Werner Erhard (originally born Nathan Goldfarb, or 
somesuch...there was a Jew with major self-doubt).
Jack Rosenberg, actually.  Car salesman, with no self-doubt at all.

While I thought Andrew Orlowski's Register article was pretty shoddy reporting,
the Extropians Secret Handshake bit was funny.


Re: They never learn: "Omniva Policy Systems"

2003-08-05 Thread Bill Stewart
At 11:30 AM 08/05/2003 -0700, Tim May wrote:
I ran across a reference to this company, which says it has raised $20 M 
in VC financing and which claims it has a system which implements the 
digital equivalent of "disappearing ink."
(Perhaps distilled from snake oil?)
The URL is still called disappearing.com, but the company is now called 
Omniva Policy Systems. A URL is:

http://www.disappearing.com/

I guarantee that anything a human eye can read can be captured for later 
use, whether by bypassing the probably-weak program, by using other tools 
to read the mail spool, by capturing the screen buffer, or, if worst comes 
to worst, simply photographing the screen with an inexpensive digital 
camera and then either using the captured image as is or by running it 
through an OCR.
It's nice to see that they're still around, unlike so many dot.bombs.
The founder came and talked to Cypherpunks just after their PR launch
(IIRC, Bill Scannell was involved in getting them into US today.)
He started off by being very clear about what problems they were
and weren't trying to solve.  They were trying to solve the problem of
making messages expire when all the parties involved are cooperating.
He viewed the problem of preventing non-cooperating parties from
saving copies to be unsolvable snake oil and he wasn't trying to solve it.
They're more concerned with data retention problems,
aka the "Ollie North Email Backups" problem or
"Embarassing Bill Gates Memo" problem -
making sure that when things are supposed to be deleted
that they stay deleted, and that if you don't explicitly
make sure you keep sensitive material that it'll disappear.
~
In your other message, you mentioned that several Extropians were doing really
squishy stuff, and mentioned that Jeff Ubois's resume also appeared to be.
Maybe you found a resume that I didn't, but http://www.ubois.com/id24.htm
mostly lists working with technology companies plus writing articles
for various technical magazines and less-technical newspapers.
There was some marketing in there, but I didn't see any "motivational"
or "coaching" stuff except other people's material on a website he's got 
stuff on.
Googling for "Ubois" picks up a lot of "Dubois" references, though :-)

I may rant separately about Orlowski's hit piece on Robin Hanson...



RE: Secure IDE? (fwd)

2003-08-03 Thread Bill Stewart
Sarath or maybe Mike Rosing wrote:
If the IV is not a secret how are we going to prevent
block replay attacks on cipher text?
If you look at the usage models and threat models,
it's simply not a problem.  This is a disk drive.
Anybody who has access to disk drive transactions
sufficient to try replay attacks already has deep-level
access to your hardware, so you're toast anyway
because they can see the unencrypted data before it's written.
What this kind of system is normally good for
is making sure that anybody who steals your hardware
when it's not running can't read your disk's data.
(Steals includes thieves with and without warrants or subpoenas...)
There's not really a risk of replay attacks there.
However, there's an emerging application for which
disk drives are more vulnerable, which is remote storage.
Some of the new disk interface standards, like Fibre Channel,
and probably some of the flavors of iSCSI,
can operate over distances of 20km and longer over fiber,
leading to businesses like colocation centers in New Jersey
providing big disk drive farms for New York City financial businesses
which have their mainframes in Manhattan.
For applications like that, it is important to do good IVs,
because control of the disk drive doesn't imply control of the machine.


Re: Digicash Patents

2003-08-03 Thread Bill Stewart
At 10:19 PM 07/31/2003 -0500, Mac Norton wrote:
I'm not sure that Paypal has met the needs of any enduser yet,
so I'd question whether it "succeeded."
Huh?  Paypal was wildly successful at meeting the
perceived needs of end users.  Whether it met the needs of
stockholders before EBay bought it is a separate question.
It wasn't pretending to be a perfect cypherpunks solution.
Paypal gave people who wanted to occasionally sell things
on the net a way to receive payments online, quasi-immediately,
without going to the major hassle of becoming a registered
credit-card-accepting business, and let
people who wanted to buy things online send money immediately
without sending their credit cards directly to random individuals,
and let both sides avoid the delay and bounceability of checks-by-snail,
and reduced the likelihood of fraud in the payment process.


Re: CA Gov calls Shrub Shrub

2003-08-02 Thread Bill Stewart
At 06:40 PM 08/01/2003 -0400, Sunder wrote:
http://theglobeandmail.com/servlet/story/RTGAM.20030731.ushrub0730/BNStory/National/


I'd interpreted "CA Gov" as "The Governor of California"
rather than "The Government of Canada" (or a province thereof),
and was hoping for some good flames about our recallable incompetent :-)


Re: Poindexter to Resign

2003-08-01 Thread Bill Stewart
At 08:41 AM 08/01/2003 -0700, Steve Schear wrote:
Report: Poindexter to Resign
Wired News 2:43 PM Jul. 31, 2003 PT
WASHINGTON -- John Poindexter, the Iran-Contra scandal figure who headed 
two criticized Pentagon projects, including one that would have enabled 
investors to profit by predicting terrorist attacks, will quit his post 
within weeks, U.S. defense officials said Thursday.   
> http://www.wired.com/news/politics/0,1283,59853,00.html
> http://reuters.com/newsArticle.jhtml?type=topNews&storyID=3198102
It's nice that some of the news media have changed from
their previous policy of toadying up to "Admiral Poindexter"
and are now starting out their article by referring to his
known dishonesty and unfitness for public service before getting
down to explaining what they're talking about.
It may not be Fair, but it's a bit more Balanced :-)
Of course, much of this may be a play by the "Senior US Defense Officials"
to make sure he gets the point and does resign,
rather than commentary by the news media,
and/or an attempt to distance themselves from a couple of
unpopular programs by sticking it on the designated fall guy,
but it still couldn't happen to a nicer guy.
Wired is a lot more enthusiastic in its comments than Reuters,
which was terser.  WaPo toadies up to him by starting out
"John M. Poindexter, the retired rear admiral involved in the Pentagon's 
ill-fated plan",
while Fox News says "The admiral who developed two controversial
Pentagon database programs quickly killed by Congress" and
goes on to make it clear that it's that nasty Congress's fault
for refusing to fund Poindexter's cool programs.

The real question is whether the administration and officials
that rehired Poindexter and hired Ashcroft and Homeland Security
will continue the same kinds of attacks on US civil liberties
now that he's gone, and unfortunately, the answer is presumably yes.


RE: Digicash Patents

2003-07-31 Thread Bill Stewart
Tim replied to Bob -
> > On the other other hand, :-), it's entirely clear that people could be
> > developing code right now in anticipation of the patent expiration and
> > go live with some kind of land rush when it's possible to do so.
>
> Some people expected a "land rush" when the main RSA patents expired
> several years ago. Parties were even thrown. The land rush never happened.
Hey, the parties were pretty good, and RSA gave out T-shirts :-)
In practice, everybody who really needed to use RSA had
either licensed the technology for a reasonable (or too high) price,
or else was a free software developer violating the patents,
or else was a free or low-key software developer living within RSAREF.
At 01:18 PM 07/31/2003 -0600, Patrick lucrative.thirdhost.com wrote:
The beauty of a marketplace is that many different parties get
to try every which way of satisfying a need. Most will fail.
Even the first several attempts can fail,
disguising a real opportunity as a guaranteed failure.
The Mark Twain Bank people had licensed Chaum's patents,
and their failure had a lot less to do with the cost of licensing
the patent than with their inability to figure out how to
get customers and merchants, and their ability to make it
too difficult to get an account.
Mondex wasn't Chaumian, and it failed, along with a number of
other vaguely cash-like payment systems during the boom.
(I'm referring to the payment systems that handled actual money,
not just the silly Green-stamp emulators like Beenz and Flooz.)
By contrast, the Austin Cypherpunks Credit Union project
figured out that making money would be hard before starting a business,
as well as discovering that dealing with Chaum was also hard,
so they didn't get far enough to fail.
Eric Hughes had some good insights into why
"it's really hard to start a new payment system".
I supposed I'd categorize the efforts into two basic groups
- projects run by banks or bank-like companies that
wanted to actually run a service and hoped to make a profit
- startups funded by VC money that wanted to make startup money,
which depends on VCs and IPOs and Other People's Money,
and is only marginally related to actually making a profit,
though most of them also hoped they'd wildly succeed like other dotcoms.
There may have been a few other types of projects,
but this was most of them.


Japan making RFID-trackable cash

2003-07-30 Thread Bill Stewart
http://theregister.com/content/55/32061.html
Japan's starting to add RFIDs to their 1-yen (~$100) bills.
Notes will come with Hitachi's 0.3mm "mew-chip" which
responds to radio signals by sending out a 128-bit number.
Each chip costs about 50 yen.
The article says that each number _could_ be a serial number,
but doesn't say that they know it is; the alternative would be
something that indicated the production batch or whatever.
The Reg's report sounds like it's based on
what someone saw on a TV show,
but also indicates they're starting production.


Re: Pentagon discovers Assasination Politics, deadpools

2003-07-30 Thread Bill Stewart
At 11:23 AM 07/29/2003 -0700, Bill Frantz wrote:
Note that properly run, this "Ideas Futures" market would be a money maker,
not a cost center.  For only a modest percentage of the winnings, it could
be self sustaining.  Perhaps someone with a profit motive will pick up the 
idea.
Assuming it can be legally structured as a "Futures Market",
rather than as "Illegal Gambling", it could make money.
(There are obviously some bets it's unlikely to handle,
such as the bet that Idea Futures markets would be successfully prosecuted
as illegal gambling :-)
If they don't want the label of "Assasination Politics", they can forbid
bets on individual deaths, and still have nearly the full field, including
wars, revolutions, "nonstandard" attacks, and elections available for play.
(c.f. the way eBay and Yahoo limit themselves.)
This provides a number of Doubleplus-Good Things.

- Government agencies can be funded by private ideas futures speculation
rather than by taxes, freeing them from the tiresome needs of
Congressional budget requests and oversight.  No more Ollie North trials!
- Private organizations can fund government agencies to do specific things
and launder the money through the market, rather than needing to lobby
Congresscritters to fund them.  There's a bit less leverage this way,
but surely there are some Congresscritters who'd appreciate that
private organizations were betting they'd live to 100 like Strom Thurmond.
- All those boring old Neutrality Act laws that keep companies like
ITT and Halliburton from overthrowing foreign governments
and forbid patriotic Americans to be foreign mercenaries
can be avoided, because they won't need to do that any more -
they can just bet sufficient sums that governments will be overthrown
and they'll go overthrow themselves, and those patriotic Americans
can be working as, ummm, investment logistics expediters instead of mercs.
- The system will be completely Anonymous, and
Anonymity is Strength!
- Of course Oceania has always had an Idea Futures position about
the downfall of WestAsia.  Why do you ask?


Re: Someone at the Pentagon read Shockwave Rider over the weekend

2003-07-29 Thread Bill Stewart
Also, NYT Article was http://www.nytimes.com/2003/07/29/politics/29TERR.html?th

But it sounds like they've chickened out, because  various people freaked
about the implications.  (And they only got as far as it being
"an incentive to commit terrorism", without getting to
"a funding method for terrorism" or to "Assassination Politics".)
>July 29, 2003
>Pentagon Said to Abandon Plan for Futures Market on Terror
>By THE ASSOCIATED PRESS
>
>WASHINGTON -- The Pentagon will abandon a plan to establish a futures market
>to help predict terrorist strikes, the chairman of the Senate Armed Services
>Committee said Tuesday.
>
>Sen. John Warner, R-Va., said he spoke by phone with the program's director,
>"and we mutually agreed that this thing should be stopped."
>
>Warner announced the decision not long after Senate Democratic Leader Thomas
>Daschle took to the floor to denounce the program as "an incentive actually
>to commit acts of terrorism."
>
>Warner made the announcement during a confirmation hearing for retired Gen.
>Peter J. Schoomaker, nominated to be Army chief of staff.


Re: Dead Body Theatre

2003-07-29 Thread Bill Stewart
At 06:33 PM 07/25/2003 -0700, Steve Schear wrote:
At 16:33 2003-07-25 -0700, you wrote:
On 24 Jul 2003 at 9:16, Eric Cordian wrote:
> Now that the new standard for pre-emptive war is to murder
> the legitimate leader of another sovereign nation and his
> entire family, an "artist's rendering" of Shrub reaping what
> he sows would surely be an excellent political statement.
You are a moron.

If today warfare means wiping out the family of the enemy ruler
man woman and child and showing their horribly mangled bodies
on TV, this is a big improvement on the old deal where the
rulers had a gentlemen's agreement that only the common folk
would get hurt, and the defeated ruler would get a luxurious
retirment on some faraway island.
Here, here!
Steve, did you mean "Hear, hear!"?
Or were you calling for it to happen "here"?  :-)
Back when we had a First Amendment, that was probably legal,
but since Bush inherited the presidency, it might not be...
Perhaps we may even become as smart as some Pacific Islanders
whose wars were fought by surrogates, the logic being that the
death of one man can serve as well as the death of many in
determining the outcome of a disagreement between heads of tribes, states, 
etc.
European feudalism did that also, though Europeans were
less likely to eat the bodies of the losers.
Trial by Combat was tossed out of British law in ~1850,
but hadn't been used for a long time before that,
though dueling was still around in the early 1800s.


Re: kinko spying: criminal caught Scarfing keydata

2003-07-23 Thread Bill Stewart
The real question is whether the FBI's keyloggers caught Jiang's passwords,
or whether it was the NSA or Mossad caught the FBI's keyloggers
catching Jiang's keylogger catching other passwords.
At 01:13 PM 07/23/2003 -0700, Major Variola (ret.) wrote:
Kinko's spy case: Risks of renting PCs

 NEW YORK (AP) -- For more than a
 year, unbeknownst to people who used
 Internet terminals at Kinko's stores in
 New York, Juju Jiang was recording
 what they typed, paying particular
 attention to their passwords.
 Jiang had secretly installed, in at least 14
 Kinko's copy shops, software that logs
 individual keystrokes. He captured more
 than 450 user names and passwords, and
 used them to access and open bank
 accounts online.
http://www.cnn.com/2003/TECH/internet/07/23/cybercafe.security.ap/index.html



Jude Milhon has passed away

2003-07-21 Thread Bill Stewart
Forwarded from another list

Date: Sun, 20 Jul 2003 16:35:28 -0700 (PDT)
From: Linda Hull
Subject: Jude Milhon has passed away
To those who knew her...I thought I would mention
that Jude has passed away.
To those who did not know her, she was the woman
who coined the phrase cypherpunk. Jude was also an
editor at Mondo 2000, among many other things.
http://abcnews.go.com/sections/tech/WiredWomen/wiredwomen000223.html
She had been fighting cancer and was losing her
battle; last night she embraced the inevitable
by taking her own life.
In all honesty, I never met her, though I had
often heard of her. It strikes me that she
finished her life the way she had always seemed
to live it - an empowered woman.
Condolences to her friends and family.

__



Re: Attacking networks using DHCP, DNS - probably kills DNSSEC

2003-06-29 Thread Bill Stewart
At 11:15 PM 06/28/2003 -0400, Steven M. Bellovin wrote:
In message <[EMAIL PROTECTED]>, Bill Stewart writes:
>This looks like it has the ability to work around DNSSEC.
>Somebody trying to verify that they'd correctly reached yahoo.com
>would instead verify that they'd correctly reached
>yahoo.com.attackersdomain.com, which can provide all the signatures
>it needs to make this convincing.
>
>So if you're depending on DNSSEC to secure your IPSEC connection,
>do make sure your DNS server doesn't have a suffix of echelon.nsa.gov...
No, that's just not true of DNSsec.  DNSsec doesn't depend on the
integrity of the connection to your DNS server;
rather, the RRsets are digitally signed.
In other words, it works a lot like certificates,
with a trust chain going back to a magic root key.
I thought about that, and I think this is an exception,
because this attack tricks your machine into using the
trust chain yahoo.com.attackersdomain.com., which it controls,
instead of the trust chain yahoo.com., which DNSSEC protects adequately.
So you're getting a trustable answer to the wrong query.
I'm less sure of the implementation issues of the
"Connection-specific DNS suffix", and I've seen conflicting documentation.
If the resolver looks up "domain.suffix" before "domain",
then the attacker's DNS doesn't need to control the DNS access,
and only needs to provide the attacker's certificates,
but if the resolver looks up "domain" before "domain.suffix",
then the attacker also needs to make sure that the lookup of "domain" fails,
which is most easily done by telling the DHCP client to use
the attacker's DNS server along with telling it the suffix.
(That doesn't add any extra work to the attack, but does make it
a bit easier to trace the attacker after the fact;
if you're not replacing the attacker's DNS server entry,
then all you need is a legitimate-looking server for
"*.attackersdomain.com".  In either case, somebody who can
pull off this kind of an attack probably uses a compromised machine
to run the DNS server on anyway.)
I'm not saying that
there can't be problems with that model, but compromised DNS servers
(and poisoned DNS caches) are among the major threat models it was
designed to deal with.  If nothing else, the existence of caching DNS
servers, which are not authoritative for the information they hand out,
makes a transmission-based solution pretty useless.
DNSSEC seems to do a pretty thorough job of making sure that
if you look up the correct domain name, you'll get the correct answer,
in spite of attackers trying to prevent it.
But this attack tricks you into looking up the wrong domain name,
and DNSSEC makes sure that you get the correct answer for the wrong name,
which isn't the result you want.


Re: Attacking networks using DHCP, DNS - probably kills DNSSEC

2003-06-29 Thread Bill Stewart
At 11:49 PM 06/29/2003 +0200, Simon Josefsson wrote:
No, I believe only one of the following situations can occur:

* Your laptop see and uses the name "yahoo.com", and the DNS server
  translate them into yahoo.com.attackersdomain.com.  If your laptop
  knows the DNSSEC root key, the attacker cannot spoof yahoo.com since
  it doesn't know the yahoo.com key.  This attack is essentially a
  man-in-the-middle attack between you and your recursive DNS server.
That doesn't happen.  (Well, it could, but as you point out,
it's not a successful attack methodology, because DNSSEC was designed
to correctly take care of this.)
* Your laptop see and uses the name "yahoo.com.attackersdomain.com".
  You may be able to verify this using your DNSSEC root key, if the
  attackersdomain.com people have set up DNSSEC for their spoofed
  entries, but unless you are using bad software or judgment, you will
  not confuse this for the real "yahoo.com".
The DNS suffix business is designed so that your laptop tries
to use "yahoo.com.attackersdomain.com", either before "yahoo.com"
or after unsuccessfully trying "yahoo.com", depending on implementation.
It may be bad judgement, but it's designed to support intranet sites
for domains that want their web browsers and email to let you
refer to "marketing" as opposed to "marketing.webservers.example.com",
and Netscape-derived browsers support it as well as IE.
Of course, everything fails if you ALSO get your DNSSEC root key from
the DHCP server, but in this case you shouldn't expect to be secure.
I wouldn't be surprised if some people suggest pushing the DNSSEC root
key via DHCP though, because alas, getting the right key into the
laptop in the first place is a difficult problem.
I agree with you and Steve that this would be a Really Bad Idea.
The only way to make it secure is to use an authenticated DHCP,
which means you have to put authentication keys in somehow,
plus you need a reasonable response for handling authentication failures,
which means you need a user interface as well.
It's also the wrong scope, since the DNSSEC is global information,
not connection-oriented information, so it's not really DHCP's job.


Attacking networks using DHCP, DNS - probably kills DNSSEC

2003-06-28 Thread Bill Stewart
Somebody did an interesting attack on a cable network's customers.
They cracked the cable company's DHCP server, got it to provide a
"Connection-specific DNS suffic" pointing to a machine they owned,
and also told it to use their DNS server.
This meant that when your machine wanted to look up yahoo.com,
it would look up yahoo.com.attackersdomain.com instead.
This looks like it has the ability to work around DNSSEC.
Somebody trying to verify that they'd correctly reached yahoo.com
would instead verify that they'd correctly reached
yahoo.com.attackersdomain.com, which can provide all the signatures
it needs to make this convincing.
So if you're depending on DNSSEC to secure your IPSEC connection,
do make sure your DNS server doesn't have a suffix of echelon.nsa.gov...
--
RISKS-LIST: Risks-Forum Digest  Saturday 17 June 2003  Volume 22 : Issue 78
http://catless.ncl.ac.uk/Risks/22.78.html
--
Date: Fri, 20 Jun 2003 15:33:15 -0400
From: Tom Van Vleck <[EMAIL PROTECTED]>
Subject: ISP's DHCP servers infiltrated
http://ask.slashdot.org/article.pl?sid=03/06/19/2325235&mode=thread&tid=126&tid=172&tid=95

"... It turns out, Charter Communications' DHCP servers were
infiltrated and were providing p5115.tdko.com as the
'Connection-specific DNS suffix', causing all non-hardened Windows
(whatever that means in a Windows context) machines to get lookups
from a hijacked subdomain DNS server which simply responded to every
query with a set of 3 addresses (66.220.17.45, 66.220.17.46,
66.220.17.47).
On these IPs were some phantom services. There were proxying Web
servers (presumably collecting cookies and username/password combos),
as well as an ssh server where the perpetrators were most likely
hoping people would simply say 'yes' to the key differences and enter
in their username/password..."
Hmm, my cable ISP was down this morning.  Maybe coincidence.



Re: Is Hatch a Mormon or a crypto Satanist?

2003-06-22 Thread Bill Stewart
At 10:24 AM 06/21/2003 -0700, Major Variola (ret) wrote:
 > Is Hatch a Mormon?

Surely you jest.  Anyone in any office in Utah is a Mormon.
And most of the profs at the universities there.
Good luck trying to buy a beer, BTW.
I was pleasantly surprised when I went to Salt Lake City
ten years ago that not only was it no trouble to get a drink,
it was also no trouble to get espresso, which is my usual vice -
the Nordstrom's in the mall had their little stand out front.
It's apparently more trouble to get liquor up in ski country.
I've also found it was less trouble to get a beer and _dinner_
late at night than in much of California, though perhaps they
have rules requiring bars to also be restaurants.
(~midnight, about 6 blocks from the temple.)
The catch was that they were also less fascist about smoking in bars,
so I had to sit off at the less-crowded end of the bar
rather than near the TV with most of the other gentiles.


Re: Destroying computers

2003-06-20 Thread Bill Stewart
> > > Methinks Mr Hatch is not a very bright man.

> > A Southern senator.  Need I say more?

Utah is Southern?  I do not want directions from you. :-)
I think people have been mixing up Orrin Hatch with Jesse Helms.
Both are right-wingers who didn't really like the 20th century,
much less the 21st, both have right-wing religious constituencies
(though radically different religions),
but they're really quite different.


Re: weird logic

2003-06-18 Thread Bill Stewart
At 06:15 PM 06/17/2003 -0500, Harmon Seaver wrote:
http://news.bbc.co.uk/2/hi/middle_east/2998870.stm
"With Iraq's judicial system in disarray after the end of the war, Paul Bremer
said a special criminal court would be set up.
He said the court would try people, "in particular senior Baathists... may 
have
committed crimes against the coalition, who are trying to destabilise the
situation"."

   So you invade a country, and the patriots who resist you are no longer
soldiers, even guerillas, but "criminals" to be tried in the US's weird new
courts, probably secretly with no representation.
Yup.  And USA Today was referring to the US military reserve soldiers
who were sent there as "Citizen Soldiers", but of course
*Iraqis* who fought the invaders weren't "citizen soldiers",
they were "terrorists" or "illegal combatants" or "evil" or
"failing to act sufficiently French by surrendering".
And since the US Constitution doesn't apply to
US forces operating outside the US, there's no prohibition
against "ex post facto" laws about "crimes against the coalition",
and of course the Bush Administration bullied Brussels into exempting
their armed forces from war crimes laws.


Re: MS Format Flames Re: An attack on paypal --> secure UI for browsers

2003-06-14 Thread Bill Stewart
> Oh get over it.  There are other formats.
You ever heard of XML?  HTML? RTF?
There are output formats and input formats.

It's easy to output data in formats other people can read -
if you want something prettier than ASCII,
HTML is usually fine, though there's not much support
for embedded pictures as opposed to separate files.
XML is a meta-format - you can't really guarantee that
anybody else's XML tool can read your XML tool's documents,
because they may not have all the same objects.
If you want to give them something quasi-immutable,
there's always PDF.  That lets you be rude _and_ proprietary :-)
Postscript is more flexible, but too many people don't have
tools to read it with.
Input formats are harder, because Microsoft keeps adding
backwards-incompatibility every time they upgrade Office,
just to force everybody else to upgrade.
OpenOffice can often help, but not always.
Microsoft does make free readers for Word and Powerpoint.
They're only intended for running on Windows,
but perhaps they work on WINE?


RE: layered deception

2001-05-03 Thread Bill Stewart

At 07:45 AM 05/02/2001 -0700, David Honig wrote:
>Yeah but is there a (contract etc.) *law* being broken or is this a
>legally-null claim?  After all, if click-through EULAs are legally binding...

Maybe a real lawyer could tell you.  The answer may depend on whether
there's valuable consideration exchanged, and viewing banner ads
probably doesn't count (especially since the banner ads typically
come from banner ad companies who aren't giving you any
promises of keeping your information private.)

While occasionally there may be a web site deliberately lying
about whether they're keeping logs "No, we won't sell your
information to spammers!", a more likely scenario is
- web site content provider isn't keeping logs of content access
 but they're using a shared hosting service.
- web hosting provider is keeping logs for technical support,
 debugging, problem resolution, etc.
- banner ad vendor keeps everything they can get
- web site's ISP keeps logs of connections (e.g. IP addresses and
 TCP port numbers, but not content of communications.)


>Actually, many corps have explicitly decided to shred their email after a 
>while.
>You can thank Ollie North & the MS judges for cluing in the public.  So the
>corp counsels are actively blowing off the suggestion you're claiming.

A long time ago, in a phone company far, far away, we had incredibly
detailed sets of requirements for record-keeping because of the
regulatory environment.  My wife had a summer job in college translating
one database from a hand-rolled mostly-undocumented format into
a (then-)current commercial database system so they could get the data
just in case they got sued about it - something along the lines of
promptness or pricing of wholesale telecom services in PacBellLand.
Of course, the commercially available database also rotted into
technical obsolescence after a few years, but by then nobody'd sued them
about it in enough years that there was no need to preserve it longer.




Re: layered deception

2001-05-02 Thread Bill Stewart

At 11:00 PM 05/01/2001 -0500, Harmon Seaver wrote:
>   Has anyone given any though to how log files could be accepted as
>evidence in the first place? They're just text files, and exceedingly
>trivial to alter, forge, erase, whatever. They get edited all the time
>by hackers -- how can anyone, even the sysadmin, swear that they are "true"?


Certainly that's a reason that doing anything with your logs that
doesn't begin with encrypting them and sending them to a
secure offsite location violates due diligence :-)
Wouldn't want the records you're keeping around for lawsuit-insurance
to get damaged by equipment problems or Haqkerz, would you?
No, judge, the records we're showing you are kept at vaults-r-us.com,
where they store them on this gunnery platform with a big moat
to prevent any tampering from occuring.  I'm sorry the security's
a bit extreme and they can't be retrieved without public notice...




Re: The Well-Read Cypherpunk [ Samuelson-bashing ]

2001-04-24 Thread Bill Stewart

At 09:08 AM 04/22/2001 -0700, Tim May wrote:
>I haven't found Samuelson's textbook useful for any of the
>interesting discussions of markets, black markets, offshore havens, ...

I used Samuelson's textbooks to study micro and macro in college.
*Terrible*!  Badly written, verbose, not structured well at all,
especially for the mathematically literate student,
and heavily tied up in the Keynesian government-knows-what's-best
command economy view of the world.  OK, the dude *did* have a Nobel
prize in economics, but as near as I could tell, what he *really*
specialized in was the economics of textbook sales,
updating this heavy tome every year or two so students had to
buy new ones instead of getting them used and selling them back
to the campus bookstore at the end of the year.
Most of the chapters had an appendix at the end which said
most of the same material half as verbosely,
but even that was still wading through molasses.
I don't mind a certain amount of excess material if the
author can write well and enjoyably, but this wasn't it.

Some of the micro classes switched to a different textbook
a year or two later - I think the author may have been Peterson?
which was much thinner and more readable.

My micro class was taught by a University of Chicago guy
who was a good speaker, clear without oversimplifying,
and who did a good job of balancing depth for his audience.
Micro being what it is, this involved a certain amount of
"Ok, engineers, this is an integral, go back to sleep while
I show the liberal arts majors areas under curves".
That's easier to do well with micro than macro,
but it still ain't that hard.  I'd also taken economics in high school,
and once Mrs. Borish was sick and the old retired guy who used to teach
the course came in and subbed - he covered more in
two days than we did the rest of the semester and a good
third or half of the Micro 102 college course,
though not in as much depth as the college material.

It's worth reading Samuelson if you discuss economics much with
people who learned it using Samuelson, just so you can balance the
jargon and understand the themes they work with, but it's really dreck.
Get the Cliff Notes if there are any :-)




Re: chaffing and winnowing

2001-04-15 Thread Bill Stewart

At 07:40 PM 04/15/2001 -0400, Faustine wrote:
>Does anyone know of any serious work being done on developing the concepts of
>winnowing and chaffing, as outlined in Ronald L. Rivest's 1998
>paper 'Confidentiality without Encryption'?

Other than the initial flurry of activity around the announcement,
there isn't much in chaffing and winnowing that's
really useful in most real-world environments
that would encourage development of new variations.

The fundamental point was that if *any* kind of digital signature
system is permitted, it can be used to implement encryption,
so bans on encryption technology are inherently bogus.
That doesn't mean that various governments won't try it,
or won't make laws requiring users of digital signature systems
to give up their signature keys when ordered by a court
or sometimes by police, but it doesn't really affect the
forced disclosure of encryption keys problem.




RE: Mr. Choate, an important message from Justice Scalia....

2001-03-30 Thread Bill Stewart

Discussion by Jim Choate, Declan, and Aimee -

> > But wasn't Scalia -- who made a reasonable point -- talking about the
> > nomination of judges, not executive branch political appointees?
>
>Yes. Indeed, it is the province of the Courts to interpret the Constitution
>(according to some, not including Mr. Choate), not executive branch
>political appointees. The very fact that we ask the executive branch these
>questions is pause for thought. I was trying to uncover any pragmatic
>distinction between a "political view" versus an opinion on the mechanics of
>constitutional interpretation. I raised more questions than I answered.


Marbury vs. Madison was an entertaining power grab by the Supremes,
but while it may not have been explicitly planned by the bunch of
politicians who wrote the messy compromise that's the Constitution,
the Constitutional requirement that there be a hierarchy of courts
with one Supreme Court means that something like it should happen.

If you don't like the idea that the Supreme's job is interpreting
the constitutionality of laws made by the legislature,
their job at minimum involves deciding appeals in specific cases,
and it's possible under Constutionally implied-but-unspecified
conditions to appeal cases up the hierarchy.
Some of those cases will involve questions where a law made by Congress
or by a state (at least after the 14th amendment)
conflicts with the majority of Supreme Court judges' opinions
about what the Constitution (and amendments) directly states
or with what they believe are fundamental civil rights
which the 9th and 10th amendments confirm may exist even though they
are not specifically enumerated.

So even if, in a Choatian World, they couldn't say
"We're the Supreme Arbiters Of The Meaning Of The Constitution",
they can still say "We're the top of the judicial hierarchy,
and we say that X is a bad law, and will rule in any case that
is appealed to us that that the accused is not guilty
and award legal costs to the accused."
Under common law, throwing out cases of unjust laws is not only
the job of the jury, it's also the job of the judge
(though the judge also works for the King, and it may also
be his job to enforce unjust laws.)
Lower courts don't like getting overturned, so they'd generally
stay in line given a ruling like that, and if not,
the accused can spend the costs of the appeal and win.

And since most courts generally follow precedents,
once the Supremes have announced that X is a bad law,
they'll generally stick to it for quite a while,
or at least until the political climate changes and
they decide some case doesn't quite fit the conditions
that the precedent was set under, or weasel-word around it,
or decide to do a rare break with tradition and issue a
contradictory opinion.




Re: semi-anon test from a throwaway account part deux

2001-03-28 Thread Bill Stewart

It's been 30 years since I read The Time Machine,
but didn't the Eloi only have 1 L in their name?

 > Received: from [204.156.156.63] by web13205.mail.yahoo.com; Wed, 21 Mar 
2001 18:37:14 PST

How fast they trace Yahoo is an open question -
If you care, find an anonymizer to read your webmail through.

I'm reading off-line, but the IP address is probably that of
the machine at the internet cafe you're using -
depending on how organized the cafe and someone tracing you are,
they may be able to find you quickly, or not.
For instance, if you're at joesinternetcafe.com,
Joe's Internet Cafe, 1234 5th street, San Francisco,
and Joe's system adminstrator can tell that
.63 is the table in the corner, you may be toast.
On the other hand, if your IP address is a
NAT box on a DSL line connected to Pac Bell Internet,
at a chain of coffeeshops staffed by non-technical baristas,
 "I don't know how the router thing works.  Want donuts?"
and you're a 17-year-old kid in a room full of
15-20-year-old kids playing Quake, you'll have plenty of time
to boogie out of there before the cops show up,
or certainly before they figure out it was you -
unless you've threatened to nuke Washington now,
any investigation will be after the fact,
so the real issue is whether you paid by credit card or cash
and whether any name you used is traceable to you.


At 06:37 PM 03/21/2001 -0800, you wrote:
>OK, the first one didn't work.
>
>Any idea how long does it take for LEA to request
>yahoo
>logs, get the IP, go to ISP and figure out who I am ?
>
>Or is it fully automated by now, so if I mention AP my
>name (as ISP knows it) flashes on some screen ?
>
>Or someone is sent to the internet cafe I am posting
>from ?
>
>Questions, questions.
>Get email at your own domain with Yahoo! Mail.
>http://personal.mail.yahoo.com/