[tw] Re: Tiddlywiki lost password recovery...

2014-11-10 Thread PMario
On Sunday, November 9, 2014 7:08:03 PM UTC+1, Ed Dixon wrote:

 Of course any encryption mechanism can be cracked given enough time


That's a major topic for every encryption method. Encryption is used to 
protect valuable content.
As long as the cost (work + resources + time) to break the encryption, is 
much much higher than the cost to get the information over a different 
channel, we can say the encryption works. 

As soon, as a different channel is much cheaper, it doesn't make sense to 
hack the encryption. 

So imo at the moment the best way to break TWs encryption, is to attack the 
workflow. 
eg: The node js version uses plain text passwords on the command line 
level. So every one, who has access to your computer just needs to do type

history | grep tiddlywiki

to get what's needed. You may say: Me not using unix . I may say: That 
doesn't matter. Windows forgets the session history... but since that's 
super boring, there is a good chance that some additional software is 
installed at a power users PC, that persists command line session 
histories. .. So its an easy task so search for those profiles.  there 
is a good chance, they are not protected very well ...

and so on, and so on.
 

 but, are there any known means to defeat our encryption as is


TW uses the:  Stanford Javascript Crypto Library
That's what they say: http://bitwiseshiftleft.github.io/sjcl/

Quote: 

(Unforunately, this is not as great as in desktop applications because it 
 is not feasible to completely protect against code injection, malicious 
 servers and side-channel attacks.)


The important part here is: code injections. ... IMO TiddlyWiki has a big 
attack vector here, with TW plugins. 
Plugins can be easily installed using drag and drop. 
So If I would want to attack your TW, I'd create a useful plugin that 
contains some additional functions + a little trojan, that is very well 
hidden. 
 

 or with the added functionality to encrypt individual tiddlers as provided 
 by Danielo's plugin? What I am working towards relies on this functionality 
 to be rock solid?


So imo rock solid at the moment is defined by your code review workflow 
and by your users workflow. 
If the users aren't aware of the rock solid workflow, it's cheaper and 
saver, not using encryption at all :)
Since encryption may give your users the feeling of security. But there is 
no security if they are sloppy. 

have fun!
mario

-- 
You received this message because you are subscribed to the Google Groups 
TiddlyWiki group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to tiddlywiki+unsubscr...@googlegroups.com.
To post to this group, send email to tiddlywiki@googlegroups.com.
Visit this group at http://groups.google.com/group/tiddlywiki.
For more options, visit https://groups.google.com/d/optout.


Re: [tw] Re: Tiddlywiki lost password recovery...

2014-11-10 Thread Ed Dixon
Thanks Mario!

I have been holding my breath on this one. I had forgotten but did look
into the Stanford Javascript Crypto Library weeks ago and did decided it
was sufficient for the task planned. When I saw this post the concern was
more about backdoors or other designed mechanisms to allow access if the
password was forgotten. Your points regarding plain text, code injection,
ease of dropping a trojan using drag and drop functionality, and code
review are
well thought out and expertly explained. You obviously have some experience
working with computer security. I have a current security+ certification
but doubt if I had researched all this myself and worked with TW for much
longer, I would have done as good a job providing this explanation.

I have assumed that Danielo's code also uses makes use of the library,
while we are on the subject do you know if this is the case?

Thanks,

On Mon, Nov 10, 2014 at 5:11 AM, PMario pmari...@gmail.com wrote:

 On Sunday, November 9, 2014 7:08:03 PM UTC+1, Ed Dixon wrote:

 Of course any encryption mechanism can be cracked given enough time


 That's a major topic for every encryption method. Encryption is used to
 protect valuable content.
 As long as the cost (work + resources + time) to break the encryption, is
 much much higher than the cost to get the information over a different
 channel, we can say the encryption works.

 As soon, as a different channel is much cheaper, it doesn't make sense
 to hack the encryption.

 So imo at the moment the best way to break TWs encryption, is to attack
 the workflow.
 eg: The node js version uses plain text passwords on the command line
 level. So every one, who has access to your computer just needs to do type

 history | grep tiddlywiki

 to get what's needed. You may say: Me not using unix . I may say: That
 doesn't matter. Windows forgets the session history... but since that's
 super boring, there is a good chance that some additional software is
 installed at a power users PC, that persists command line session
 histories. .. So its an easy task so search for those profiles.  there
 is a good chance, they are not protected very well ...

 and so on, and so on.


 but, are there any known means to defeat our encryption as is


 TW uses the:  Stanford Javascript Crypto Library
 That's what they say: http://bitwiseshiftleft.github.io/sjcl/

 Quote:

 (Unforunately, this is not as great as in desktop applications because it
 is not feasible to completely protect against code injection, malicious
 servers and side-channel attacks.)


 The important part here is: code injections. ... IMO TiddlyWiki has a
 big attack vector here, with TW plugins.
 Plugins can be easily installed using drag and drop.
 So If I would want to attack your TW, I'd create a useful plugin that
 contains some additional functions + a little trojan, that is very well
 hidden.


 or with the added functionality to encrypt individual tiddlers as
 provided by Danielo's plugin? What I am working towards relies on this
 functionality to be rock solid?


 So imo rock solid at the moment is defined by your code review
 workflow and by your users workflow.
 If the users aren't aware of the rock solid workflow, it's cheaper and
 saver, not using encryption at all :)
 Since encryption may give your users the feeling of security. But there is
 no security if they are sloppy.

 have fun!
 mario

  --
 You received this message because you are subscribed to a topic in the
 Google Groups TiddlyWiki group.
 To unsubscribe from this topic, visit
 https://groups.google.com/d/topic/tiddlywiki/mbP52rti9RU/unsubscribe.
 To unsubscribe from this group and all its topics, send an email to
 tiddlywiki+unsubscr...@googlegroups.com.
 To post to this group, send email to tiddlywiki@googlegroups.com.
 Visit this group at http://groups.google.com/group/tiddlywiki.
 For more options, visit https://groups.google.com/d/optout.


-- 
You received this message because you are subscribed to the Google Groups 
TiddlyWiki group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to tiddlywiki+unsubscr...@googlegroups.com.
To post to this group, send email to tiddlywiki@googlegroups.com.
Visit this group at http://groups.google.com/group/tiddlywiki.
For more options, visit https://groups.google.com/d/optout.


Re: [tw] Re: Tiddlywiki lost password recovery...

2014-11-10 Thread PMario
On Monday, November 10, 2014 5:05:36 PM UTC+1, Ed Dixon wrote:

 Your points regarding plain text, code injection, ease of dropping a 
 trojan using drag and drop functionality, and code review are well 
 thought out and expertly explained. You obviously have some experience 
 working with computer security.


I'm very interested in computer security. I'm following the development of 
PGP since the `90s, when the first international version was available. ...
Anyway. What I found out for me is, that its much more fun to have a closer 
look at how users deal with sensible information. 
 

 I have assumed that Danielo's code also uses makes use of the library, 
 while we are on the subject do you know if this is the case?


Yes. Danielos code uses the library but I didn't have a closer look at the 
implementation.

Danielos plugin leaves some fields of a tiddler untouched for convenience 
reasons. 
For some usecases this may be no problem. For others it is.

eg:

created   20140828081424710 
creatorpmario
modified  20141103103734401 
modifier   pmario 
tags plugins 
title  test tile

So if someone gets this info there are still some questions that can be 
answered very easily. 
eg: Who did the last edit and when. ... So if you need plausible deniable 
encryption [2] some more changes may be needed. 

-

There is a talk from Tim Taubert about the upcoming native browser 
WebCrypto API [1]. This mechanism is less vulnerable against code 
injection into the library, since javascript doesn't have access to the 
crypto functions.  The mechanisms used in the video are the same as 
used by the tw crypto library. ... The problem at the moment is browser 
support. 

But imo it is still an area to have a closer look. 

have fun!
mario

[1] https://timtaubert.de/blog/2014/10/keeping-secrets-with-javascript/
[2] http://en.wikipedia.org/wiki/Deniable_encryption

-- 
You received this message because you are subscribed to the Google Groups 
TiddlyWiki group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to tiddlywiki+unsubscr...@googlegroups.com.
To post to this group, send email to tiddlywiki@googlegroups.com.
Visit this group at http://groups.google.com/group/tiddlywiki.
For more options, visit https://groups.google.com/d/optout.


[tw] Re: Tiddlywiki lost password recovery...

2014-11-09 Thread Stephan Hradek
I hope this helps: http://goo.gl/9hsd6u

-- 
You received this message because you are subscribed to the Google Groups 
TiddlyWiki group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to tiddlywiki+unsubscr...@googlegroups.com.
To post to this group, send email to tiddlywiki@googlegroups.com.
Visit this group at http://groups.google.com/group/tiddlywiki.
For more options, visit https://groups.google.com/d/optout.


[tw] Re: Tiddlywiki lost password recovery...

2014-11-09 Thread Ed Dixon
Hi,

Recovering firefox passwords aside for the moment, this does bring up a 
very important question and one that I should have looked into on the 
onset. Of course any encryption mechanism can be cracked given enough time 
but, are there any known means to defeat our encryption as is or with the 
added functionality to encrypt individual tiddlers as provided by Danielo's 
plugin? What I am working towards relies on this functionality to be rock 
solid?

Thanks, 

On Saturday, November 8, 2014 11:27:22 PM UTC-7, Nicholas Ratliff wrote:

 I have a rather massive tiddlywiki that I have been working on for a 
 number of years. I no longer possess the password, and am unable to update 
 the wiki or augment it without the password. It is linked to a computer I 
 use rather regularly, which has the password saved on it through firefox. 
 Is there a way to recover this password? Please advise. Otherwise, is there 
 a way I can rapidly make a copy of this wiki so that I may assign another 
 password without hassle?




-- 
You received this message because you are subscribed to the Google Groups 
TiddlyWiki group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to tiddlywiki+unsubscr...@googlegroups.com.
To post to this group, send email to tiddlywiki@googlegroups.com.
Visit this group at http://groups.google.com/group/tiddlywiki.
For more options, visit https://groups.google.com/d/optout.