Re: CDR: Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-14 Thread John Kelsey
At 01:40 PM 5/10/04 -0500, Brian Dunbar wrote:

On May 10, 2004, at 1:30 PM, Jack Lloyd wrote:

Like it matters. Do you really think that the government would really allow
Intel and AMD to sell CPUs that didn't have tiny transmitters in them? 
Your CPU
is actually transmitting every instruction it executes to the satellites.
That's a subtle bit of humor, right?
Actually, pretty much all unshielded computer hardware effectively has a 
transmitter in it.  Google for side-channel attacks DPA and TEMPEST 
for more info.  That's not a matter of transmitting to the satellites, but 
it may be a matter of transmitting to the van parked outside your house

~~brian
--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re: Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-11 Thread Bill Stewart

 Like it matters. Do you really think that the government would really
 allow Intel and AMD to sell CPUs that didn't have tiny transmitters in 
them?
 Your CPU is actually transmitting every instruction it executes to the 
satellites.
That's why you keep your CPU under your tin-foil hat, isn't it?
Certainly works for me...








Bill Stewart  [EMAIL PROTECTED] 



Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-11 Thread Justin
John Young (2004-05-11 00:09Z) wrote:

 Brian Dunbar wrote:
  Like it matters. Do you really think that the government would really 
  allow Intel and AMD to sell CPUs that didn't have tiny transmitters in
 them? 
  Your CPU is actually transmitting every instruction it executes to the 
  satellites.
 
 That's a subtle bit of humor, right?
 
 Whenever this truth is repeated, first revealed here in 1992 by a person
 who worked at Intel in its early days when it was desperate for government
 contracts, it is taken to be humorous. 
 ...
 What remains of this story on the Internet is a bowderlized version of 
 the original truth, sometimes commingled with Tempest apochryphia -- 

Truth like this?


Forwarded
From [EMAIL PROTECTED]  Wed Dec 17 23:17:14 2003
From: [EMAIL PROTECTED] (Timothy C. May)
Date: Thu, 18 Feb 93 10:50:25 PST
To: [EMAIL PROTECTED]
Subject: Re: Trapdoors
Message-ID: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain

How do we know the proposed legislation wasn't just a smoke
screen?  Isn't it possible that the Feds have already compromised
Intel or MicroSoft?  Is there some way to be sure that the new
486 chip running your computer isn't recording each PGP or RSA
private key you generate?

Sandy has discovered the deep dark secret of crypto! I worked for Intel
from 1974 to 1986 and can confirm this to be the case.

Every crypto key is secretly recorded by Intel microprocessors. Motorola
processors do not yet record keys, which I why use a Macintosh. The
specific instruction is the so-called NSA instruction which John Gilmore
identified some time ago. 

Sun Microsystems was ordered by the NSA to redesign their chips to capture
keys, which is why the SPARC processor was introduced. SPARC stands for
Sun Processor Allowing Remote Capture.

Once the keys have been captured and stored on the user's hard disk (notice
how the drives occasionally turn on a night?), they are forwarded to the
NSA and National Surveillance Organization by screen saver programs, like
After Dark, which were actually written by the Berkeley Microsystems
cut-out operation of the NSO. Real hackers don't use cutesy screen saver
programs.

This new automated system is much more convenient than the previous system,
where the FBI and NSO had to break into homes and offices in order to
retrieve the keys the Intel processors had recorded.

End

-- 
Not your decision to make.
Yes.  But it's the right decision, and I made it for my daughter.
 - Bill, Beatrix; Kill Bill Vol. 2



Re: CDR: Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-10 Thread Brian Dunbar
On May 10, 2004, at 1:30 PM, Jack Lloyd wrote:

Like it matters. Do you really think that the government would really 
allow
Intel and AMD to sell CPUs that didn't have tiny transmitters in them? 
Your CPU
is actually transmitting every instruction it executes to the 
satellites.
That's a subtle bit of humor, right?

~~brian



Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-10 Thread Jack Lloyd
Like it matters. Do you really think that the government would really allow
Intel and AMD to sell CPUs that didn't have tiny transmitters in them? Your CPU
is actually transmitting every instruction it executes to the satellites.

On Mon, May 10, 2004 at 11:14:49AM -0700, Hasan Diwan wrote:
  AES is the American Encryption Standard, formerly known as 
 Rijndael. Does anyone really think the US Government would be so daft 
 as to adopt an algorithm they don't know how to break?
 On May 9, 2004, at 1:36 PM, Eugen Leitl wrote:
 
  - Forwarded message from Enzo Michelangeli [EMAIL PROTECTED] -
 
  From: Enzo Michelangeli [EMAIL PROTECTED]
  Date: Thu, 29 Apr 2004 20:01:57 +0800
  To: [EMAIL PROTECTED]
  Cc: Axel H Horns [EMAIL PROTECTED]
  Subject: Re: Can Skype be wiretapped by the authorities?
  X-Mailer: Microsoft Outlook Express 6.00.2800.1409
 
  - Original Message -
  From: Axel H Horns [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Sent: Wednesday, April 28, 2004 4:49 AM
  Subject: Can Skype be wiretapped by the authorities?
 
 
  Is something known about the details of the crypto protocol within
  Skype? How reliable is the encryption?
 
  See e.g.
 
  http://www.financialcryptography.com/mt/archives/76.html
 
  Can Skype be wiretapped by the authorities? With collaboration of the
  Skype operator? Without?
 
  What do you mean with operator? AFAIK, the system is fully 
  peer-to-peer
  (http://www.skype.com/skype_p2pexplained.html ).
 
  Regarding the crypto, at http://www.skype.com/help_faq.html#Technical 
  they
  say:
 
   What type of encryption is used?
 
   Skype uses AES (Advanced Encryption Standard) - also known as Rijndel
   - which is also used by U.S. Government organizations to protect
   sensitive, information. Skype uses 256-bit encryption, which has a
   total of 1.1 x 1077 possible keys, in order to actively encrypt the
   data in each Skype call or instant message. Skype uses 1536 to 2048
   bit RSA to negotiate symmetric AES keys. User public keys are
   certified by Skype server at login.
 
  OK, so Rijndael is misspelled and the RSA-based key exchange does not
  provide forward secrecy, but apart from that it doesn't smell like 
  snake
  oil. Not too bad, at least.
 
  BUT, unfortunately, the implementation is closed source, so there are 
  no
  guarantees that the software is not GAKked. And yes, definitely an
  opensource (and multiplatform) alternative would be a cool thing to 
  have.
  A message I posted a while ago to the list p2p-hackers was reposted by
  Eugene Leitl to cypherpunks
  (http://www.mail-archive.com/[EMAIL PROTECTED]/msg81814.html ) but
  the couple of followups it elicited didn't seem to center the issues I
  raised. I didn't reply then because I'm not a subscriber of cypherpunks
  any longer, so I'd like to take this occasion for doing it here now:
 
  Major Variola (ret) commented (indented lines, followed by my comment):
  [...]
  Skype claims to use RSA-based key exchange, which is good for
  multi-party conferencing but does not preserve forward secrecy.
  Maybe some variant of ephemeral D-H authenticated by RSA
  signatures, with transparent renegotiation every time someone
  joins the conference, could do the job better.
 
   RSA (ie persistant keys) may be an option but MUST NOT be
   required, for secrecy reasons as mentioned.  (At worst RSA keys
   can be used once, then discarded.  Lots of primes out there :-)
 
  Well, I don't see why RSA signatures (only for authentication of the 
  key
  exchange) could endanger forward secrecy.
 
   Also, this is *voice*, ie biometric auth,
   so public-key-web-o-trust verislime scam is
   unnecessary at best.
 
  It's not only voice, it's also IM-style text chat. And even with voice,
  biometric authentication becomes awkward to use with conference calls.
 
  [...]
  One could always implement a brand new
  network, using Distributed Hash Table algorithms such as Chord or
  Kademlia,
 
   We don't give a flying fuck as to which shiny new algorithm you use,
   although were we a graph theory wonk, we might care.
 
  The issue here is that DHT algorithms allow to implement a fully
  distributed directory, which means one much more resistant to attacks
  (especially from institutional attackers) than implementations based on
  centralized servers (see, in a related fild, the different destinies of
  Napster and its distributed successors such as Overnet or the less
  efficient Gnutella). Still, a full search takes O(log(n)) steps, making
  them practical for implementing directory/presence services.
 
  [...]
  but it would be much easier to rely from the very beginning upon
  a large number of nodes (at least for directory and presence
  functionality, if not for the reflectors which require specific
  UDP code).
 
   What the NAT world (yawn) needs is free registry services
   exploitable by any protocol.  Those NAT-users with RSA-clue can
   sign their registry entry.
 
  Not only that: 

Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-10 Thread Hasan Diwan
AES is the American Encryption Standard, formerly known as 
Rijndael. Does anyone really think the US Government would be so daft 
as to adopt an algorithm they don't know how to break?
On May 9, 2004, at 1:36 PM, Eugen Leitl wrote:

- Forwarded message from Enzo Michelangeli [EMAIL PROTECTED] -

From: Enzo Michelangeli [EMAIL PROTECTED]
Date: Thu, 29 Apr 2004 20:01:57 +0800
To: [EMAIL PROTECTED]
Cc: Axel H Horns [EMAIL PROTECTED]
Subject: Re: Can Skype be wiretapped by the authorities?
X-Mailer: Microsoft Outlook Express 6.00.2800.1409
- Original Message -
From: Axel H Horns [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, April 28, 2004 4:49 AM
Subject: Can Skype be wiretapped by the authorities?

Is something known about the details of the crypto protocol within
Skype? How reliable is the encryption?
See e.g.

http://www.financialcryptography.com/mt/archives/76.html

Can Skype be wiretapped by the authorities? With collaboration of the
Skype operator? Without?
What do you mean with operator? AFAIK, the system is fully 
peer-to-peer
(http://www.skype.com/skype_p2pexplained.html ).

Regarding the crypto, at http://www.skype.com/help_faq.html#Technical 
they
say:

 What type of encryption is used?

 Skype uses AES (Advanced Encryption Standard) - also known as Rijndel
 - which is also used by U.S. Government organizations to protect
 sensitive, information. Skype uses 256-bit encryption, which has a
 total of 1.1 x 1077 possible keys, in order to actively encrypt the
 data in each Skype call or instant message. Skype uses 1536 to 2048
 bit RSA to negotiate symmetric AES keys. User public keys are
 certified by Skype server at login.
OK, so Rijndael is misspelled and the RSA-based key exchange does not
provide forward secrecy, but apart from that it doesn't smell like 
snake
oil. Not too bad, at least.

BUT, unfortunately, the implementation is closed source, so there are 
no
guarantees that the software is not GAKked. And yes, definitely an
opensource (and multiplatform) alternative would be a cool thing to 
have.
A message I posted a while ago to the list p2p-hackers was reposted by
Eugene Leitl to cypherpunks
(http://www.mail-archive.com/[EMAIL PROTECTED]/msg81814.html ) but
the couple of followups it elicited didn't seem to center the issues I
raised. I didn't reply then because I'm not a subscriber of cypherpunks
any longer, so I'd like to take this occasion for doing it here now:

Major Variola (ret) commented (indented lines, followed by my comment):
[...]
Skype claims to use RSA-based key exchange, which is good for
multi-party conferencing but does not preserve forward secrecy.
Maybe some variant of ephemeral D-H authenticated by RSA
signatures, with transparent renegotiation every time someone
joins the conference, could do the job better.
 RSA (ie persistant keys) may be an option but MUST NOT be
 required, for secrecy reasons as mentioned.  (At worst RSA keys
 can be used once, then discarded.  Lots of primes out there :-)
Well, I don't see why RSA signatures (only for authentication of the 
key
exchange) could endanger forward secrecy.

 Also, this is *voice*, ie biometric auth,
 so public-key-web-o-trust verislime scam is
 unnecessary at best.
It's not only voice, it's also IM-style text chat. And even with voice,
biometric authentication becomes awkward to use with conference calls.
[...]
One could always implement a brand new
network, using Distributed Hash Table algorithms such as Chord or
Kademlia,
 We don't give a flying fuck as to which shiny new algorithm you use,
 although were we a graph theory wonk, we might care.
The issue here is that DHT algorithms allow to implement a fully
distributed directory, which means one much more resistant to attacks
(especially from institutional attackers) than implementations based on
centralized servers (see, in a related fild, the different destinies of
Napster and its distributed successors such as Overnet or the less
efficient Gnutella). Still, a full search takes O(log(n)) steps, making
them practical for implementing directory/presence services.
[...]
but it would be much easier to rely from the very beginning upon
a large number of nodes (at least for directory and presence
functionality, if not for the reflectors which require specific
UDP code).
 What the NAT world (yawn) needs is free registry services
 exploitable by any protocol.  Those NAT-users with RSA-clue can
 sign their registry entry.
Not only that: NATted agents cannot be called unless they first 
register
with some reflector on the open Internet. And centralized reflectors 
are,
again, easy to attack, and also expensive to operate, as the bandwidth
requirements are substantial (all the traffic flows through them): see
e.g. John Walker's analysis of the reasons that led him to abandon
SpeakFreely at http://www.fourmilab.ch/speakfree/ .

Thomas Shaddack suggested to leverage on Jabber, but:

1. Jabber uses TCP as transport, and therefore can't be 

Re: Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-10 Thread John Young

Brian Dunbar wrote:

 Like it matters. Do you really think that the government would really 
 allow Intel and AMD to sell CPUs that didn't have tiny transmitters in
them? 
 Your CPU is actually transmitting every instruction it executes to the 
 satellites.

That's a subtle bit of humor, right?

Whenever this truth is repeated, first revealed here in 1992 by a person
who worked at Intel in its early days when it was desperate for government
contracts, it is taken to be humorous. 

The detailed description of the chip broadcasting technology was once 
retrievable from the cypherpunks archives but the earliest archives have 
disappeared, possibly with the intent of erasing information on this very 
topic. 

The original anonymous explained that Intel was going to be withdrawn 
as a public company and do only black work for governments, not only
the US. That that is likely to have happened except that a public shell 
was allowed to continue and succeed as a cover -- early investors 
were induced to keep this quiet with bountiful payouts, among them 
former Intel employees.

What remains of this story on the Internet is a bowderlized version of 
the original truth, sometimes commingled with Tempest apochryphia -- 
Tempest the fountain head of dissimulation about electromagnetic 
transmitting technology more fancifully described than told the truth 
about.

As a corollary AMD is an illusory chip fabricator, set up and fed by 
Intel to give the appearance of competition. There are others to delude 
foreign customers into trusting their homegrown.






Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-09 Thread Eugen Leitl
- Forwarded message from Enzo Michelangeli [EMAIL PROTECTED] -

From: Enzo Michelangeli [EMAIL PROTECTED]
Date: Thu, 29 Apr 2004 20:01:57 +0800
To: [EMAIL PROTECTED]
Cc: Axel H Horns [EMAIL PROTECTED]
Subject: Re: Can Skype be wiretapped by the authorities?
X-Mailer: Microsoft Outlook Express 6.00.2800.1409

- Original Message - 
From: Axel H Horns [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, April 28, 2004 4:49 AM
Subject: Can Skype be wiretapped by the authorities?


 Is something known about the details of the crypto protocol within
 Skype? How reliable is the encryption?

 See e.g.

 http://www.financialcryptography.com/mt/archives/76.html

 Can Skype be wiretapped by the authorities? With collaboration of the
 Skype operator? Without?

What do you mean with operator? AFAIK, the system is fully peer-to-peer
(http://www.skype.com/skype_p2pexplained.html ).

Regarding the crypto, at http://www.skype.com/help_faq.html#Technical they
say:

 What type of encryption is used?

 Skype uses AES (Advanced Encryption Standard) - also known as Rijndel
 - which is also used by U.S. Government organizations to protect
 sensitive, information. Skype uses 256-bit encryption, which has a
 total of 1.1 x 1077 possible keys, in order to actively encrypt the
 data in each Skype call or instant message. Skype uses 1536 to 2048
 bit RSA to negotiate symmetric AES keys. User public keys are
 certified by Skype server at login.

OK, so Rijndael is misspelled and the RSA-based key exchange does not
provide forward secrecy, but apart from that it doesn't smell like snake
oil. Not too bad, at least.

BUT, unfortunately, the implementation is closed source, so there are no
guarantees that the software is not GAKked. And yes, definitely an
opensource (and multiplatform) alternative would be a cool thing to have.
A message I posted a while ago to the list p2p-hackers was reposted by
Eugene Leitl to cypherpunks
(http://www.mail-archive.com/[EMAIL PROTECTED]/msg81814.html ) but
the couple of followups it elicited didn't seem to center the issues I
raised. I didn't reply then because I'm not a subscriber of cypherpunks
any longer, so I'd like to take this occasion for doing it here now:

Major Variola (ret) commented (indented lines, followed by my comment):
[...]
 Skype claims to use RSA-based key exchange, which is good for
 multi-party conferencing but does not preserve forward secrecy.
 Maybe some variant of ephemeral D-H authenticated by RSA
 signatures, with transparent renegotiation every time someone
 joins the conference, could do the job better.

 RSA (ie persistant keys) may be an option but MUST NOT be
 required, for secrecy reasons as mentioned.  (At worst RSA keys
 can be used once, then discarded.  Lots of primes out there :-)

Well, I don't see why RSA signatures (only for authentication of the key
exchange) could endanger forward secrecy.

 Also, this is *voice*, ie biometric auth,
 so public-key-web-o-trust verislime scam is
 unnecessary at best.

It's not only voice, it's also IM-style text chat. And even with voice,
biometric authentication becomes awkward to use with conference calls.

[...]
 One could always implement a brand new
 network, using Distributed Hash Table algorithms such as Chord or
 Kademlia,

 We don't give a flying fuck as to which shiny new algorithm you use,
 although were we a graph theory wonk, we might care.

The issue here is that DHT algorithms allow to implement a fully
distributed directory, which means one much more resistant to attacks
(especially from institutional attackers) than implementations based on
centralized servers (see, in a related fild, the different destinies of
Napster and its distributed successors such as Overnet or the less
efficient Gnutella). Still, a full search takes O(log(n)) steps, making
them practical for implementing directory/presence services.

[...]
 but it would be much easier to rely from the very beginning upon
 a large number of nodes (at least for directory and presence
 functionality, if not for the reflectors which require specific
 UDP code).

 What the NAT world (yawn) needs is free registry services
 exploitable by any protocol.  Those NAT-users with RSA-clue can
 sign their registry entry.

Not only that: NATted agents cannot be called unless they first register
with some reflector on the open Internet. And centralized reflectors are,
again, easy to attack, and also expensive to operate, as the bandwidth
requirements are substantial (all the traffic flows through them): see
e.g. John Walker's analysis of the reasons that led him to abandon
SpeakFreely at http://www.fourmilab.ch/speakfree/ .

Thomas Shaddack suggested to leverage on Jabber, but:

1. Jabber uses TCP as transport, and therefore can't be efficiently used
as transport for telephony, i.e. using encapsulation of the voice packets
in the Jabber protocol in order to traverse NAT devices.

2. Jabber is based on a client-server paradigm similar to e-mail. 

Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-09 Thread Thomas Shaddack

On Sun, 9 May 2004, Eugen Leitl wrote:

 Not only that: NATted agents cannot be called unless they first register
 with some reflector on the open Internet. And centralized reflectors are,
 again, easy to attack, and also expensive to operate, as the bandwidth
 requirements are substantial (all the traffic flows through them): see
 e.g. John Walker's analysis of the reasons that led him to abandon
 SpeakFreely at http://www.fourmilab.ch/speakfree/ .

 Thomas Shaddack suggested to leverage on Jabber, but:

 1. Jabber uses TCP as transport, and therefore can't be efficiently used
 as transport for telephony, i.e. using encapsulation of the voice packets
 in the Jabber protocol in order to traverse NAT devices.

Oh! There is a little misunderstanding here!

I proposed using Jabber for the presence/location/directory thing, and for
negotiation between the clients about what method to use, if they can do
direct peer-to-peer call or have to use a reflector (and what one), what
cipher and key to use, etc. - the Jabber protocol is rather unsuitable for
VoIP.

 2. Jabber is based on a client-server paradigm similar to e-mail. Running
 a Jabber server requires an always-on machine with its own domain name;
 and, although dynamic DNS can help, the model again tend to be
 hierarchical, easy to attack etc. That pretty much rules it out also for
 session initiation, directory/presence etc.

That's true - but it can be implemented with relative ease, with lots of
infrastructure already existing. Next generation of the system then can
be built atop this.

 The beauty of Skype, encryption aside, is that it's based on an overlay
 network solely based on P2P servents, relies (if their FAQ tells the
 truth) upon NO central registry for presence and directory services, and
 each client that runs non-NATted can transparently act as reflector
 supporting NATted users. Plus, all this (including, besides voice,
 text-based instant messaging) works with zero configuration with an
 idiotproof UI.

But it's closed-source and so can't be fully trusted :(