Re: Red team attacks vs. cracking

2006-06-01 Thread Henning Makholm
Scripsit Gunnar Wolf [EMAIL PROTECTED]
 Henning Makholm dijo [Wed, May 31, 2006 at 04:10:51AM +0200]:

 A KSP that depends on there being any pre-existing trust to abuse is
 *completely worthless* as a KSP whether or not that trust is abused
 or not.

 Ummm... There is a certain metric of pre-existing trust that _does_
 exist here. Lets go back to Martin's specific case, to exemplify.

I'm not saying that the trust does not _exist_, just that it should
not be _necessary_ for the proper functioning of the keysigning
process.

-- 
Henning Makholm   Der er ingen der sigter på slottet. D'herrer konger agter
 at triumfere fra balkonen når de har slået hinanden ihjel.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-31 Thread Gunnar Wolf
Henning Makholm dijo [Wed, May 31, 2006 at 04:10:51AM +0200]:
 Scripsit Javier Fernández-Sanguino Peña [EMAIL PROTECTED]
 
  I do agree with Manoj that this was *not* a legitimate experiment (i.e.
  not a red team test) and that Martin *did* abuse our [0] trust [1]
 
 A KSP that depends on there being any pre-existing trust to abuse is
 *completely worthless* as a KSP whether or not that trust is abused
 or not.

Ummm... There is a certain metric of pre-existing trust that _does_
exist here. Lets go back to Martin's specific case, to exemplify.

Many people have known Martin in person for several years. The people
that do know him already will be very surprised and react right away
if he wants to impersonate someone else (as an example, Alexander
Schmehl, who was at Debconf and was part of the prepared sheets, but
didn't take part in the end at the KSP). 

Of course, Martin could keep track of who knows him personally, and
maybe even extrapolate on who is right away familiar with Alexander,
and cleverly switch the fake and real IDs, not to raise
suspiciousness. 

If he is standing in spot 104 (which in our list means between Jeroen
and Adeodato - who didn't participate, so Nicolas stands next to
him), however, he won't be allowed to present an ID with Alexander's
name, as Alexander should have been standing in spot 38 (between me
and Rodrigo Gallardo).

Ok, so Martin, who is a bad person and a very good and clever actor,
will play as he were taking part in the KSP, standing between Rodrigo
and me. If somebody comes that probably knows Alexander or him
personally, he will pretend he is just hanging around, chatting with
people, and not signing keys.

But here comes the bit of pre-existing trust we _do_ have: I know
personally Alexander, have worked with him and can recognize him
easily. And although I haven't talked as much with Martin, I can also
easily recognize his face. If he is standing next to me the whole
time, even if he is a great actor and doesn't allow me to doubt he is
presenting a fake ID, it will be obvious for me he is impersonating
somebody else. So, I denounce he is a fake, and nobody signs the fake
Alexander's key.

Yes, I'm picking the names of two well-known people in the project. It
could be easier to impersonate, say, Raúl Odria or Mario Oyorzabal
(both of which didn't attend), so this pre-existing trust is
limited. But it clearly exists and counts for something, specially in
well-connected groups such as ours. And this is an important factor to
request people who are well known in the project not to skip the KSP
if it happens as it happened this time (and as in the other proposals
I've seen).

Greetings,

-- 
Gunnar Wolf - [EMAIL PROTECTED] - (+52-55)5623-0154 / 1451-2244
PGP key 1024D/8BB527AF 2001-10-23
Fingerprint: 0C79 D2D1 2C4E 9CE4 5973  F800 D80E F35A 8BB5 27AF


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-30 Thread Michael Banck
Manoj,

On Tue, May 30, 2006 at 09:52:11AM -0500, Manoj Srivastava wrote:
 This is to forestall those of you who seem to be be arguing
  that the debconf6 KSP crack was a red team attack -- here is how that
  attack differed from a legitimate red team effort (I have been a
  member of red teams before, and have lead a number of red team
  attacks in my time).

I don't think this mail is on-topic on -devel, could you please repost
it on project?


thanks,

Michael

-- 
Michael Banck
Debian Developer
[EMAIL PROTECTED]
http://www.advogato.org/person/mbanck/diary.html


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-30 Thread Thomas Bushnell BSG
Manoj Srivastava [EMAIL PROTECTED] writes:

 This is to forestall those of you who seem to be be arguing
  that the debconf6 KSP crack was a red team attack -- here is how that
  attack differed from a legitimate red team effort (I have been a
  member of red teams before, and have lead a number of red team
  attacks in my time).

I haven't heard anyone make such a claim.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-30 Thread Javier Fernández-Sanguino Peña
On Tue, May 30, 2006 at 09:28:19AM -0700, Thomas Bushnell BSG wrote:
 Manoj Srivastava [EMAIL PROTECTED] writes:
 
  This is to forestall those of you who seem to be be arguing
   that the debconf6 KSP crack was a red team attack -- here is how that
   attack differed from a legitimate red team effort (I have been a
   member of red teams before, and have lead a number of red team
   attacks in my time).
 
 I haven't heard anyone make such a claim.

Claiming that what Martin did was good since he was showing something useful
for our community is equivalent to saying it was a red team attack. Nobody
used that term explicitly probably because they are unfamiliar with it. I
know what it means, I've done my share of pen-testing to companies.

I do agree with Manoj that this was *not* a legitimate experiment (i.e.
not a red team test) and that Martin *did* abuse our [0] trust [1]

I find this akin to people finding and exploiting web app vulnerabilities
(without being payed for by the company and without their approval). 
To show that webapps are vulnerable.

Regards

Javier

[0] The assistants to the KSP

[1] By not providing  a *proper* ID as required by the KSP organisers (and
all KSPs protocols I've read ). Notice that he himself has described his ID
as not being *proper* and that it was the whole point of his excercise.


signature.asc
Description: Digital signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Thomas Bushnell BSG
Javier Fernández-Sanguino Peña [EMAIL PROTECTED] writes:

 Claiming that what Martin did was good since he was showing
 something useful for our community is equivalent to saying it was a
 red team attack. Nobody used that term explicitly probably because
 they are unfamiliar with it. I know what it means, I've done my
 share of pen-testing to companies.

Perhaps some people have argued that it was good what he did; I have
not.  I have constrained my comments to arguing only that what he did
was not, so far as we know, either fraudulent or forgery.

What he did may have beneficial consequences, if it encourages people
to be more careful in the future, but certainly I would agree that
this does not justify it.

I am actually quite ambivalent about whether I think what he did was
wrong; I think to determine that I would need to read carefully what
the KSP organizers said.  Martin certainly should follow the protocols
established, but I would only count established as being what is
actually written down by the KSP organizers, and not just some kind of
general unspoken expectation.  (Where can I read about those written
protocols, if there are any?)

 I find this akin to people finding and exploiting web app vulnerabilities
 (without being payed for by the company and without their approval). 
 To show that webapps are vulnerable.

Indeed, if he did violate the written rules of the KSP, then it is
much like this.  (That still doesn't make it forgery, fraud, or
dishonesty, however.)

At the same time, we should *also* recognize that anyone who signed on
the basis of the Transnational Republic ID (unless they have more
information about that organization than the rest of us do) has *also*
broken the rules of the KSP.

Moreover, the harm caused by people who did not properly check the ID
is *worse* than the harm caused by not following the written KSP rules
(if indeed he didn't follow them).  So I ask, ONE MORE TIME, HOPING
FOR AN ANSWER:

Manoj, did you sign the key on the basis of the Transnational Republic
ID?

Javier, did you?

Thomas



Re: Red team attacks vs. cracking

2006-05-30 Thread Joe Smith


Javier Fernández-Sanguino Peña [EMAIL PROTECTED] wrote in message 
news:[EMAIL PROTECTED]


Claiming that what Martin did was good since he was showing something 
useful
for our community is equivalent to saying it was a red team attack. 
Nobody

used that term explicitly probably because they are unfamiliar with it. I
know what it means, I've done my share of pen-testing to companies.

I do agree with Manoj that this was *not* a legitimate experiment (i.e.
not a red team test) and that Martin *did* abuse our [0] trust [1]


Had Martin never mentioned this, it would have been a non-issue.
There is no real damage. While signatures may have been based on
a non-offical ID, Martin did indeed own the key in question, so
the end harm is zero. But Martin decided to publish this experiment.
Is this really a bad thing? He proved that KSP are bad for the web of trust.
A legitimate attacker could abuse the KSP just as easilly as Martin, but
would result in actual damage, and would most likely not have been caught.

So, if KSPs are not changed, then the Web of trust becomes effectively 
worthless.
Manoj should be far more concerned about that, then about Martin's 
demonstration
of this. 




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-30 Thread Thomas Bushnell BSG
Joe Smith [EMAIL PROTECTED] writes:

 So, if KSPs are not changed, then the Web of trust becomes
 effectively worthless.  Manoj should be far more concerned about
 that, then about Martin's demonstration of this.

Personally, I'm especially worried about the developers who were taken
in by the Transnational Republic ID.  So, can we have a fess up time
now?  Manoj, did you sign the key on this basis?

The people who we really shouldn't trust are the ones who thought the
Transnational Republic is a real country, or didn't bother to check.
Manoj has already admitted that he doesn't bother to check as a rule,
but hasn't said whether in fact he was taken in and signed the key on
this basis.

Manoj, you?

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-30 Thread martin f krafft
also sprach Javier Fernández-Sanguino Peña [EMAIL PROTECTED] [2006.05.30.1920 
+0200]:
 I do agree with Manoj that this was *not* a legitimate experiment (i.e.
 not a red team test) and that Martin *did* abuse our [0] trust [1]

I acknowledge this and would like to apologise to everyone.

My experiment was indeed not at all prepared. I am very pleased,
however, with the result. Should I ever conduct something similar in
the future (I don't have any plans), I will follow a protocol based
on the one suggested by Manoj.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer and author: http://debiansystem.info
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
menschen, welche rasch feuer fangen,
 werden schnell kalt und sind daher im ganzen unzuverlässig.
 - friedrich nietzsche


signature.asc
Description: Digital signature (GPG/PGP)


Re: Red team attacks vs. cracking

2006-05-30 Thread martin f krafft
also sprach Thomas Bushnell BSG [EMAIL PROTECTED] [2006.05.30.2002 +0200]:
 Personally, I'm especially worried about the developers who were
 taken in by the Transnational Republic ID.  So, can we have
 a fess up time now?  Manoj, did you sign the key on this basis?

He did not.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer and author: http://debiansystem.info
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
arguments are extremely vulgar,
 for everyone in good society
 holds exactly the same opinion.
-- oscar wilde


signature.asc
Description: Digital signature (GPG/PGP)


Re: Red team attacks vs. cracking

2006-05-30 Thread Paul Johnson
On Tuesday 30 May 2006 10:40, Joe Smith wrote:
 But Martin decided to publish this experiment.
 Is this really a bad thing? He proved that KSP are bad for the web of
 trust. 

Isn't what Martin and this thread actually demonstrated is that signing keys 
based on IDs you cannot reasonably authenticate as real, with a focus on 
quantity instead of quality among KSP participants is the real problem at 
hand?

Even the guy at 7-Eleven has the big book of north american ID cards with 
pictures and descriptions of what makes a real one for when they encounter an 
ID that they've never seen before.  Surely Debian can do as well as the guy 
selling cigarettes and beer at the 7-Eleven when it comes to verification...

-- 
Paul Johnson
Email and IM (XMPP  Google Talk): [EMAIL PROTECTED]
Jabber: Because it's time to move forward  http://ursine.ca/Ursine:Jabber


pgpLY2p77Nn1U.pgp
Description: PGP signature


Re: Red team attacks vs. cracking

2006-05-30 Thread martin f krafft
also sprach Paul Johnson [EMAIL PROTECTED] [2006.05.30.2120 +0200]:
 Even the guy at 7-Eleven has the big book of north american ID cards with 
 pictures and descriptions of what makes a real one for when they encounter an 
 ID that they've never seen before.  Surely Debian can do as well as the guy 
 selling cigarettes and beer at the 7-Eleven when it comes to verification...

fun context=true story
  I once had the 7-Eleven guy refuse my German driver's licence,
  because it had VOID printed over it in this very book
/fun

The idea is a nice one, let's compile a book with descriptions of
valid IDs. However, this really won't help at all during a KSP.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer and author: http://debiansystem.info
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Most Intelligent Customers Realise Our Software Only Fools Them.


signature.asc
Description: Digital signature (GPG/PGP)


Re: Red team attacks vs. cracking

2006-05-30 Thread Adam Borowski
On Tue, May 30, 2006 at 12:20:14PM -0700, Paul Johnson wrote:
 Even the guy at 7-Eleven has the big book of north american ID cards with 
 pictures and descriptions of what makes a real one for when they encounter an 
 ID that they've never seen before.  Surely Debian can do as well as the guy 
 selling cigarettes and beer at the 7-Eleven when it comes to verification...

How can you check if an ID card is real based only on what is written
on the card, even if it has all the hallmarks mentioned in that book?

See, if you visit a bazaar, I bet a helpful guy with a Russian accent
can sell you a perfectly valid passport for less than $50.  Several
years ago, a friend of mine actually asked someone at the Stadion
10-lecia in Warsaw, and was led to a guy with a number of blank Polish
IDs for ~$25 each...

That's about what checking government-issued IDs is worth.

-- 
1KB // Microsoft corollary to Hanlon's razor:
//  Never attribute to stupidity what can be
//  adequately explained by malice.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-30 Thread Paul Johnson
On Tuesday 30 May 2006 13:02, Adam Borowski wrote:
 On Tue, May 30, 2006 at 12:20:14PM -0700, Paul Johnson wrote:
  Even the guy at 7-Eleven has the big book of north american ID cards with
  pictures and descriptions of what makes a real one for when they
  encounter an ID that they've never seen before.  Surely Debian can do as
  well as the guy selling cigarettes and beer at the 7-Eleven when it comes
  to verification...

 How can you check if an ID card is real based only on what is written
 on the card, even if it has all the hallmarks mentioned in that book?

If you don't trust the ID, you don't sign the key.  But having the book to be 
able to get a bad feeling about the ID from sure beats the apparent current 
system of Sign the key and hope the ID is for real.

 See, if you visit a bazaar, I bet a helpful guy with a Russian accent
 can sell you a perfectly valid passport for less than $50.  Several
 years ago, a friend of mine actually asked someone at the Stadion
 10-lecia in Warsaw, and was led to a guy with a number of blank Polish
 IDs for ~$25 each...

 That's about what checking government-issued IDs is worth.

Perhaps in that part of the world, yes.

-- 
Paul Johnson
Email and IM (XMPP  Google Talk): [EMAIL PROTECTED]
Jabber: Because it's time to move forward  http://ursine.ca/Ursine:Jabber


pgpPuTShOxbea.pgp
Description: PGP signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Linas Žvirblis
Paul Johnson wrote:

 See, if you visit a bazaar, I bet a helpful guy with a Russian accent
 can sell you a perfectly valid passport for less than $50.  Several
 years ago, a friend of mine actually asked someone at the Stadion
 10-lecia in Warsaw, and was led to a guy with a number of blank Polish
 IDs for ~$25 each...

 That's about what checking government-issued IDs is worth.
 
 Perhaps in that part of the world, yes.

Oh, THAT part of the world. Wait a minute, what part of the world? Can
you name any country in which you cannot buy fake IDs?

I might have misunderstood you, but you comment sounded like an insult
towards Eastern Europe.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-30 Thread Stephen Gran
This one time, at band camp, Paul Johnson said:
 On Tuesday 30 May 2006 13:02, Adam Borowski wrote:
  See, if you visit a bazaar, I bet a helpful guy with a Russian
  accent can sell you a perfectly valid passport for less than $50.
  Several years ago, a friend of mine actually asked someone at the
  Stadion 10-lecia in Warsaw, and was led to a guy with a number of
  blank Polish IDs for ~$25 each...
 
  That's about what checking government-issued IDs is worth.
 
 Perhaps in that part of the world, yes.

What are you talking about, that part of the world?  Teenagers where
you're from don't have fake IDs?  I know I did when I was a teenager in
Philadelphia.  They may not have been printed on authentic passport
blanks, but they were close enough to fool people who looked at them for
a living.

I'm not really sure why the idea that ID's are forgeable is so
surprising, though.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Steve Langasek
On Tue, May 30, 2006 at 01:57:18PM -0700, Paul Johnson wrote:
 On Tuesday 30 May 2006 13:02, Adam Borowski wrote:
  See, if you visit a bazaar, I bet a helpful guy with a Russian accent
  can sell you a perfectly valid passport for less than $50.  Several
  years ago, a friend of mine actually asked someone at the Stadion
  10-lecia in Warsaw, and was led to a guy with a number of blank Polish
  IDs for ~$25 each...

  That's about what checking government-issued IDs is worth.

 Perhaps in that part of the world, yes.

As opposed to California, where per the news story I heard a couple weeks
ago, a counterfeit state ID good enough to elude an arrest warrant can be
had for $100-$200?

Thanks for playing, you arrogant jerk.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Paul Johnson
On Tuesday 30 May 2006 14:26, Steve Langasek wrote:
 On Tue, May 30, 2006 at 01:57:18PM -0700, Paul Johnson wrote:
  On Tuesday 30 May 2006 13:02, Adam Borowski wrote:
   See, if you visit a bazaar, I bet a helpful guy with a Russian accent
   can sell you a perfectly valid passport for less than $50.  Several
   years ago, a friend of mine actually asked someone at the Stadion
   10-lecia in Warsaw, and was led to a guy with a number of blank Polish
   IDs for ~$25 each...
  
   That's about what checking government-issued IDs is worth.
 
  Perhaps in that part of the world, yes.

 As opposed to California, where per the news story I heard a couple weeks
 ago, a counterfeit state ID good enough to elude an arrest warrant can be
 had for $100-$200?

California's it's own little world, generally speaking if you assume the worst 
in Americans, you're describing Californians.

-- 
Paul Johnson
Email and IM (XMPP  Google Talk): [EMAIL PROTECTED]
Jabber: Because it's time to move forward  http://ursine.ca/Ursine:Jabber


pgpalcZHcRjmu.pgp
Description: PGP signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Paul Johnson
On Tuesday 30 May 2006 14:15, Linas Žvirblis wrote:
 Paul Johnson wrote:
  See, if you visit a bazaar, I bet a helpful guy with a Russian accent
  can sell you a perfectly valid passport for less than $50.  Several
  years ago, a friend of mine actually asked someone at the Stadion
  10-lecia in Warsaw, and was led to a guy with a number of blank Polish
  IDs for ~$25 each...
 
  That's about what checking government-issued IDs is worth.
 
  Perhaps in that part of the world, yes.

 Oh, THAT part of the world. Wait a minute, what part of the world? Can
 you name any country in which you cannot buy fake IDs?

 I might have misunderstood you, but you comment sounded like an insult
 towards Eastern Europe.

No, I'm saying that the availability and penalties for a fake ID vary enough 
by international jurisdiction that what may be true for eastern Europe is not 
necessarily true for the rest of the world.  If you want to construe an 
observation about variations in availability of certain goods and services as 
an insult, so be it, but that was not the intent.

-- 
Paul Johnson
Email and IM (XMPP  Google Talk): [EMAIL PROTECTED]
Jabber: Because it's time to move forward  http://ursine.ca/Ursine:Jabber


pgpe5NisdV5Ce.pgp
Description: PGP signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Javier Fernández-Sanguino Peña
On Tue, May 30, 2006 at 10:32:15AM -0700, Thomas Bushnell BSG wrote:
 I am actually quite ambivalent about whether I think what he did was
 wrong; I think to determine that I would need to read carefully what
 the KSP organizers said.  Martin certainly should follow the protocols
 established, but I would only count established as being what is
 actually written down by the KSP organizers, and not just some kind of
 general unspoken expectation.  (Where can I read about those written
 protocols, if there are any?)

From http://debconf6.debconf.org/ksp/ksp-dc6.html:

 The next step is to verify each participant's identity by checking
 preferably a passport or, alternatively, some other form of government
 issued ID. Please don't show very old, doubtful or easy-to-fake documents as
 people will not sign your key if you do so. 

I guess that answers the questions you brought up in your e-mail. An ID from
a political party is *not* a government issued ID and *is* a doubtful
document.

Regards

Javier


signature.asc
Description: Digital signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Adam Borowski
On Tue, May 30, 2006 at 01:57:18PM -0700, Paul Johnson wrote:
 On Tuesday 30 May 2006 13:02, Adam Borowski wrote:
  On Tue, May 30, 2006 at 12:20:14PM -0700, Paul Johnson wrote:
   Even the guy at 7-Eleven has the big book of north american ID cards with
   pictures and descriptions of what makes a real one for when they
   encounter an ID that they've never seen before.
  How can you check if an ID card is real based only on what is written
  on the card, even if it has all the hallmarks mentioned in that book?
 If you don't trust the ID, you don't sign the key.  But having the book to be 
 able to get a bad feeling about the ID from sure beats the apparent current 
 system of Sign the key and hope the ID is for real.

What I mean is, it makes no sense to believe that IDs provide any
real security.  I would rather trust some common sense.  A brief
Google search on the person's name where you look at page 6 and pick
something that the person whose key you're signing should know.

For example, my name is pretty popular, but it's still pretty easy to
pick a reference to me.  Taking a few random links yields:

* an ELinks patch for a bug with xterm detection
= ask me what was wrong

* a translation of a task from the Polish Olympiad in Informatics,
  the task was authored by me
= ask me to briefly describe a solution for the task

* a Usenet-to-webforum mirror of r.g.r.nethack with a post about
  termrec, my enhanced implementation of ttyrec
= you can assume that the upstream of a piece of software will know
   its inner workings pretty well

Generally, you can learn a few things about the person you're trying
to impersonate, but there is no way you can know everything.  And the
real person can describe things in detail...


Thus, given:
A) someone with a government-issued ID, or
B) someone with a random card that bears a photo: a chess club card,
   a Transnational Republic passport, etc
I see hardly any difference between person A and B.  I would trust
common sense, not any passport.


  See, if you visit a bazaar, I bet a helpful guy with a Russian accent
  can sell you a perfectly valid passport for less than $50.
  [...]
  That's about what checking government-issued IDs is worth.
 Perhaps in that part of the world, yes.

Yes, you're right.  In the US, the ID may set me back perhaps even
$100 or more.  And the point is...?

Cheers and schtuff,
-- 
1KB // Microsoft corollary to Hanlon's razor:
//  Never attribute to stupidity what can be
//  adequately explained by malice.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-30 Thread Javier Fernández-Sanguino Peña
On Tue, May 30, 2006 at 01:40:39PM -0400, Joe Smith wrote:
 Is this really a bad thing? He proved that KSP are bad for the web of trust.
 A legitimate attacker could abuse the KSP just as easilly as Martin, but
 would result in actual damage, and would most likely not have been caught.

Ask yourself: is it a good thing to covertly attack X? Is it good to then
publish of the results [1] claiming^Wboasting that you have broken X? Do you
really need to be proven that X can be broken?

Now change X to KSP or Web server of company Y or (your country's)
national security servers. What are your answers?

In the place I work at, attacks are only done either on your head (that's
what attack trees [0] and risk analysis are for) or with the keyboard (or
phone) after whomever is in charge of X has asked for, acknowledged and
*approved* the attack. Why?  Because given enough resources (money, time, you
name it) most attacks will succeed against X. So the question is not *if* you
can break X but *when* and *how* can you break it. The attack is introduced
to see if there could be changes implemented to make it more difficult for a
wannabe attacker or to detect an ongoing attack and, consequently, minimise
the risk.

We are not talking about national security or public safety here, if Martin
wanted to prove that attacks against KSPs can happen he could have managed
his attack in an open way (as Manoj said contact management and get their
approval) and then use that to enlighten us all.

What he did is wrong (and dishonest), even if the end result is good: these
long threads, knowledgeable people discussing the effectiveness of KSPs and
non-knowledgeable people getting a clue. You might think that the ends
justify the means [2], I don't.

Regards

Javier

[0] http://www.schneier.com/paper-attacktrees-ddj-ft.html

[1] I will call it publish even if it was done in a rather obscure way.
Not all developers are required to read Martin's blog, they are only required
to read d-devel-announce

[2] Google found this Wired article for me, which is nice:
http://www.wired.com/news/politics/0,1283,58082,00.html


signature.asc
Description: Digital signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Tyler MacDonald
Javier Fern?ndez-Sanguino Pe?a [EMAIL PROTECTED] wrote:
  Is this really a bad thing? He proved that KSP are bad for the web of trust.
  A legitimate attacker could abuse the KSP just as easilly as Martin, but
  would result in actual damage, and would most likely not have been caught.
 
 Ask yourself: is it a good thing to covertly attack X? Is it good to then
 publish of the results [1] claiming^Wboasting that you have broken X? Do you
 really need to be proven that X can be broken?
 
 Now change X to KSP or Web server of company Y or (your country's)
 national security servers. What are your answers?

I have no opinion that I wish to state in this *particular* case,
but in general, I support it.

I like this page:

http://www.dataloss.net/papers/how.defaced.apache.org.txt

From the bottom of the page:

We would like to compliment the Apache admin team on their swift response
when they found out about the deface, and also on their approach, even
calling us 'white hats' (we were at the most 'grey hats' here, if you ask
us).

I'm not saying everybody should be as accommodating as the ASF when
their security gets compromised, but if somebody *does* hack you, then tells
you how they did it, and they doesn't invade your privacy or do any harm to
your stuff, then they have done you a service.

 [1] I will call it publish even if it was done in a rather obscure way.
 Not all developers are required to read Martin's blog, they are only
 required to read d-devel-announce

If Martin didn't tell the debian team right away after he illegally
crossed the fence, then that was irresponsible, but I still have no opinion
as to what should be done with him.

- Tyler


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Red team attacks vs. cracking

2006-05-30 Thread Steve Langasek
On Tue, May 30, 2006 at 03:11:23PM -0700, Paul Johnson wrote:
 On Tuesday 30 May 2006 14:26, Steve Langasek wrote:
  On Tue, May 30, 2006 at 01:57:18PM -0700, Paul Johnson wrote:
   On Tuesday 30 May 2006 13:02, Adam Borowski wrote:
See, if you visit a bazaar, I bet a helpful guy with a Russian accent
can sell you a perfectly valid passport for less than $50.  Several
years ago, a friend of mine actually asked someone at the Stadion
10-lecia in Warsaw, and was led to a guy with a number of blank Polish
IDs for ~$25 each...
   
That's about what checking government-issued IDs is worth.

   Perhaps in that part of the world, yes.

  As opposed to California, where per the news story I heard a couple weeks
  ago, a counterfeit state ID good enough to elude an arrest warrant can be
  had for $100-$200?

 California's it's own little world, generally speaking if you assume the 
 worst 
 in Americans, you're describing Californians.

plonk

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Paul Johnson
On Tuesday 30 May 2006 16:02, Javier Fernández-Sanguino Peña wrote:
 We are not talking about national security or public safety here, if Martin
 wanted to prove that attacks against KSPs can happen he could have managed
 his attack in an open way (as Manoj said contact management and get their
 approval) and then use that to enlighten us all.

On the other hand, in real life, people who are out there to deliberately harm 
the web of trust for whatever reason do not do so by contacting management 
and getting approval first.  Attacks in the real world don't happen with 
warning, so why should security only happen with warning or by accident?

-- 
Paul Johnson
Email and IM (XMPP  Google Talk): [EMAIL PROTECTED]
Jabber: Because it's time to move forward  http://ursine.ca/Ursine:Jabber


pgpOC7Ci6vBBk.pgp
Description: PGP signature


Re: Red team attacks vs. cracking

2006-05-30 Thread Jacob S
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, 30 May 2006 15:09:25 -0700
Paul Johnson [EMAIL PROTECTED] wrote:

 On Tuesday 30 May 2006 14:15, Linas Žvirblis wrote:
  Paul Johnson wrote:
   See, if you visit a bazaar, I bet a helpful guy with a Russian
   accent can sell you a perfectly valid passport for less than
   $50.  Several years ago, a friend of mine actually asked someone
   at the Stadion 10-lecia in Warsaw, and was led to a guy with a
   number of blank Polish IDs for ~$25 each...
  
   That's about what checking government-issued IDs is worth.
  
   Perhaps in that part of the world, yes.
 
  Oh, THAT part of the world. Wait a minute, what part of the world?
  Can you name any country in which you cannot buy fake IDs?
 
  I might have misunderstood you, but you comment sounded like an
  insult towards Eastern Europe.
 
 No, I'm saying that the availability and penalties for a fake ID vary
 enough by international jurisdiction that what may be true for
 eastern Europe is not necessarily true for the rest of the world.  If
 you want to construe an observation about variations in availability
 of certain goods and services as an insult, so be it, but that was
 not the intent.

We have to remember, after all, that severe fines and penalties are
enough to deter people from doing bad things on the black market. This
is why there are no illegal drugs in the United States.

Jacob
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEfOHgkpJ43hY3cTURAtDDAKCEXnPZ7UQqM4s0pYaqvStc4huZfwCgjynU
HNxQg1SXgAQ7+Y/iHqAZWFo=
=a9NF
-END PGP SIGNATURE-


Re: Red team attacks vs. cracking

2006-05-30 Thread Thomas Bushnell BSG
Javier Fernández-Sanguino Peña [EMAIL PROTECTED] writes:

 On Tue, May 30, 2006 at 10:32:15AM -0700, Thomas Bushnell BSG wrote:
 I am actually quite ambivalent about whether I think what he did was
 wrong; I think to determine that I would need to read carefully what
 the KSP organizers said.  Martin certainly should follow the protocols
 established, but I would only count established as being what is
 actually written down by the KSP organizers, and not just some kind of
 general unspoken expectation.  (Where can I read about those written
 protocols, if there are any?)

 From http://debconf6.debconf.org/ksp/ksp-dc6.html:

  The next step is to verify each participant's identity by checking
  preferably a passport or, alternatively, some other form of government
  issued ID. Please don't show very old, doubtful or easy-to-fake documents as
  people will not sign your key if you do so. 

 I guess that answers the questions you brought up in your e-mail. An ID from
 a political party is *not* a government issued ID and *is* a doubtful
 document.

Indeed, but it doesn't sound like he violated the rules.  This was
worded as a suggestion, not as a demand.  Indeed, notice that the
people who signed the key violated it just as much as he did.  Where
is the hue and cry against them?

I still want to know who they are, because it is *their* signatures I
have to start distrusting.

Thomas



Re: Red team attacks vs. cracking

2006-05-30 Thread Henning Makholm
Scripsit Javier Fernández-Sanguino Peña [EMAIL PROTECTED]

 I do agree with Manoj that this was *not* a legitimate experiment (i.e.
 not a red team test) and that Martin *did* abuse our [0] trust [1]

A KSP that depends on there being any pre-existing trust to abuse is
*completely worthless* as a KSP whether or not that trust is abused
or not.

Shooting the messenger will not change that, however loudly you try to
make it look as if it was his fault that the thing is so broken that
betrayal of trust is even a meaningful term to apply to any behavior
a KSP participant coul exhibit.

-- 
Henning Makholm  Jeg har tydeligt gjort opmærksom på, at man ved at
   følge den vej kun bliver gennemsnitligt ca. 48 år gammel,
   og at man sætter sin sociale situation ganske overstyr og, så
   vidt jeg kan overskue, dør i dybeste ulykkelighed og elendighed.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]