Re: [tor-talk] How evil is TLS cert collection?

2011-06-21 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com):

> On Tue, 21 Jun 2011 11:20:07 -0700
> Mike Perry  wrote:
> 
> > 2. User has private network on RFC 1918 space, yet uses an HTTP proxy
> > to access it (which means we can't tell that it is private IP space).
> > Said user is also using TLS certs signed by a public trusted root CA.
> > This config is less weird, and detectable by us. It makes me think we
> > should handle this user specially somehow?
> 
> This could occur with a SOCKS proxy, too (such as that run by ???ssh
> -D???), since there is no standard way to ask a SOCKS proxy to resolve a
> hostname to an IP address.  (Tor allows this using a non-standard
> extension to SOCKS.)

Ugh, sorry. You've said this a couple times now, but each time I had
assumed that when OpenSSH added SOCKS4A+5, they also added this
extension. Turns out you are right, they did not. You still can't do
resolutions, so this type of SOCKS proxy is the same as an HTTP Proxy
in that respect.. Ugh.

> > > To give users the possibility to contribute while preventing leaks for
> > > specific domains they are concerned it would be great if the submission
> > > addon would have a blacklist feature where one could say
> > > never submit anything for  *.example.com.
> > 
> > This seems to be a reasonable option to me. I've added this to our
> > spec page above.
> > 
> > But is there a better option? Do you think it might be likely that
> > either of these users will disable OCSP for these certs, or otherwise
> > indicate anything about these public-yet-private certs that we can
> > detect in their config?
> 
> There is no better option than a user-specified domain blacklist.  Any
> attempt to automatically detect these private certificates and avoid
> submitting them will defeat the most important purpose of the
> distributed SSL observatory project: detecting SSL MITM attacks.

Yes, the added attack potential worries me too. Does this tradeoff
mean we should turn on "[ ] Check/submit certificates for private DNS
domains" by default? I think it might.

The answer depends on if we prioritize providing protection over
automatically withholding info that may be private. It is my feeling
that since this feature is meant to be opt-in, we should prioritize
security.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpNT6sJzLzGd.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-21 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Mike Perry wrote:
> 1. User has a private network whose DNS is set to resolve private
> names to public IP addresses which normally would not have been
> reachable in the IPv4 scan, and whose TLS certs are also signed by a
> public trusted root CA. This is a weird setup, but it's a big world.
> I guess it could exist somewhere.

Yes, this is the scenario I was concerned about.

> 2. User has private network on RFC 1918 space, yet uses an HTTP proxy
> to access it (which means we can't tell that it is private IP space).
> Said user is also using TLS certs signed by a public trusted root CA.
> This config is less weird, and detectable by us. It makes me think we
> should handle this user specially somehow?

> Your point is that in these two cases, with the default protection
> mechanisms defined in
> https://trac.torproject.org/projects/tor/wiki/doc/HTTPSEverywhere/SSLObservatorySubmission
> these two users could still end up sending their public-yet-private
> certs to EFF.
> 
> Should we somehow warn the HTTP proxy user about the possibility of
> private TLS certs being submitted if they try to opt-in to the
> feature?

I would suggest the following:
- - user opts-in
- - addon performs check if host can resolve hostnames to IPs (possible?)
- - if it can't and the first adv. option isn't enabled, tell the user
that the addon will not do anything, but still give the user the
possibility to override this default check-and-disable procedure

the next question would be: is the addon doing periodic checks to see if
the situation changed?


>> > To give users the possibility to contribute while preventing leaks for
>> > specific domains they are concerned it would be great if the submission
>> > addon would have a blacklist feature where one could say
>> > never submit anything for  *.example.com.
> This seems to be a reasonable option to me. I've added this to our
> spec page above.

Thank you for the inclusion of this feature.

> But is there a better option? Do you think it might be likely that
> either of these users will disable OCSP for these certs, or otherwise
> indicate anything about these public-yet-private certs that we can
> detect in their config?
> 
> And is there anything else?

Another feature request just came to my mind: (actually it became more
than just one)
[ ] do not submit the IP address (server_ip argument) for private DNS
domains
(submits: '-2')
[ ] do not submit the IP address for the following private DNS domains
[input field]

I see this useful in the following scenario:
The user is fine with submitting certificates that would fall into the [
] Check/submit certificates for private DNS domains
option, but doesn't want to disclose the internal IP addresses.
The new option is only available when the user enables the submission of
certificats for private DNS domains.

Or you submit -2 by default for private DNS domains (if he enabled the
submission for private DNS domains) and give the user the possibility to
further opt-in and say: "I'm fine with submitting the IP address for
private DNS domains" (this would probably be the better way from a
privacy point of view but will result in less people submitting that data)


I don't know if you find submissions with empty domain argument
valuable, but if you do, you could also consider adding an option like:
[ ] do not submit the hostname (domain argument) for private DNS domains.
[ ] do not submit the hostname for the following private DNS domains:
[input field]

One might argue, the hostname is also included in the certificate (CN),
but this is not always the case (wilcard certificate).

Giving the users fine grained possibility about what they disclose might
result in more users willing to participate, but I totally agree to keep
them in an "expert section" because non-technical users might be
confused by these options.
These options give a "experts" the possibility to disclose more if they
are fine with that.


-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAk4BCakACgkQyM26BSNOM7b6KgEAlepwfgenzJLP5VaPWi8bIgnh
s1K88Ipz4XSwbqG9YhcBAIfn3M0EARvvZUiB0cJy3wloBKJ0noj6QGro9oQgKaqi
=/zwt
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-21 Thread Robert Ransom
On Tue, 21 Jun 2011 11:20:07 -0700
Mike Perry  wrote:

> Thus spake tagnaq (tag...@gmail.com):
> 
> > Well, after all I guess we can acknowledge that there are scenarios
> > where information disclosures will happen.
> 
> Ok, I probably should recap these scenarios here. I realized I forgot
> to reply to you.
> 
> To make sure we understand one another (and everyone else understands
> us): the remaining information disclosure scenarios we're talking
> about are limited to two:
> 
> 1. User has a private network whose DNS is set to resolve private
> names to public IP addresses which normally would not have been
> reachable in the IPv4 scan, and whose TLS certs are also signed by a
> public trusted root CA. This is a weird setup, but it's a big world.
> I guess it could exist somewhere.
> 
> 2. User has private network on RFC 1918 space, yet uses an HTTP proxy
> to access it (which means we can't tell that it is private IP space).
> Said user is also using TLS certs signed by a public trusted root CA.
> This config is less weird, and detectable by us. It makes me think we
> should handle this user specially somehow?

This could occur with a SOCKS proxy, too (such as that run by ‘ssh
-D’), since there is no standard way to ask a SOCKS proxy to resolve a
hostname to an IP address.  (Tor allows this using a non-standard
extension to SOCKS.)


> Your point is that in these two cases, with the default protection
> mechanisms defined in
> https://trac.torproject.org/projects/tor/wiki/doc/HTTPSEverywhere/SSLObservatorySubmission
> these two users could still end up sending their public-yet-private
> certs to EFF.

Yes.

> Should we somehow warn the HTTP proxy user about the possibility of
> private TLS certs being submitted if they try to opt-in to the
> feature?

Maybe.  I doubt that users with configuration 2 will opt in to SSL
certificate submission without reading all of the documentation they
can find, and configuration 1 seems more likely to occur during an
attack than in a deployed intranet.

> > To give users the possibility to contribute while preventing leaks for
> > specific domains they are concerned it would be great if the submission
> > addon would have a blacklist feature where one could say
> > never submit anything for  *.example.com.
> 
> This seems to be a reasonable option to me. I've added this to our
> spec page above.
> 
> But is there a better option? Do you think it might be likely that
> either of these users will disable OCSP for these certs, or otherwise
> indicate anything about these public-yet-private certs that we can
> detect in their config?

There is no better option than a user-specified domain blacklist.  Any
attempt to automatically detect these private certificates and avoid
submitting them will defeat the most important purpose of the
distributed SSL observatory project: detecting SSL MITM attacks.


Robert Ransom


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-21 Thread Mike Perry
Thus spake tagnaq (tag...@gmail.com):

> Well, after all I guess we can acknowledge that there are scenarios
> where information disclosures will happen.

Ok, I probably should recap these scenarios here. I realized I forgot
to reply to you.

To make sure we understand one another (and everyone else understands
us): the remaining information disclosure scenarios we're talking
about are limited to two:

1. User has a private network whose DNS is set to resolve private
names to public IP addresses which normally would not have been
reachable in the IPv4 scan, and whose TLS certs are also signed by a
public trusted root CA. This is a weird setup, but it's a big world.
I guess it could exist somewhere.

2. User has private network on RFC 1918 space, yet uses an HTTP proxy
to access it (which means we can't tell that it is private IP space).
Said user is also using TLS certs signed by a public trusted root CA.
This config is less weird, and detectable by us. It makes me think we
should handle this user specially somehow?

Your point is that in these two cases, with the default protection
mechanisms defined in
https://trac.torproject.org/projects/tor/wiki/doc/HTTPSEverywhere/SSLObservatorySubmission
these two users could still end up sending their public-yet-private
certs to EFF.

Should we somehow warn the HTTP proxy user about the possibility of
private TLS certs being submitted if they try to opt-in to the
feature?

> To give users the possibility to contribute while preventing leaks for
> specific domains they are concerned it would be great if the submission
> addon would have a blacklist feature where one could say
> never submit anything for  *.example.com.

This seems to be a reasonable option to me. I've added this to our
spec page above.

But is there a better option? Do you think it might be likely that
either of these users will disable OCSP for these certs, or otherwise
indicate anything about these public-yet-private certs that we can
detect in their config?

And is there anything else?


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpphECxwUEv1.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


Well, after all I guess we can acknowledge that there are scenarios
where information disclosures will happen.

To give users the possibility to contribute while preventing leaks for
specific domains they are concerned it would be great if the submission
addon would have a blacklist feature where one could say
never submit anything for  *.example.com.
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAk3qswIACgkQyM26BSNOM7aAcQD+JS078EttKKcUMK22blcwrqjZ
DfeHjMMhGK6imblxAZEA/AimrKqZAvOPkL5zkA+7j2mmhgbCABeocUxtxxK6Wtkn
=UL9T
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Robert Ransom
On Sat, 4 Jun 2011 12:56:15 -0700
Mike Perry  wrote:

> Thus spake Robert Ransom (rransom.8...@gmail.com):
> 
> > On Sat, 4 Jun 2011 12:09:52 -0700
> > Mike Perry  wrote:
> > 
> > > Thus spake Robert Ransom (rransom.8...@gmail.com):
> > 
> > > > My understanding was that EFF would query DNS for a hostname, and if
> > > > the hostname does not exist, assume that it's private.  (This should
> > > > scare you even more.)
> > > 
> > > EFF only needs to do this query if the browser could not (because it
> > > was using an HTTP proxy without a SOCKS proxy). Does this scare you
> > > less or more? I'm getting confused by the reactions in this thread.
> > 
> > If EFF needs to perform a DNS query on each hostname it receives a
> > certificate for, EFF will leak information to an attacker watching its
> > servers.  If EFF tries to not log hostnames which do not exist, EFF
> > will leak a user's request time *every time* that it receives a
> > certificate associated with a non-existent hostname.
> 
> I think you missed the first half of my email where I explicitly said
> EFF shouldn't need to do this under normal circumstances. It only
> needs to do this when the browser fails to do so itself. Do you expect
> this to be common?

Firefox cannot resolve hostnames to IP addresses when it is using *any*
proxy.  Anyone who uses an SSH tunnel as a SOCKS to connect to an
intranet will risk this leakage, and SSH tunnels can be made fairly
easy to use.  I have no information on how widely used that
configuration is.


> The observatory itself could also be running a tor client for these
> resolutions, just in case they do end up being common.

That would be a Good Thing, just to decrease the incentive for
attackers to monitor EFF's Internet connection.


> P.S. When the browser does attempt to do these resolutions, should
> they be done via Tor or via whatever local resolver/proxy was used to
> access the domain? Doing it via Tor exposes potentially private names
> to exits, but doing it locally will fail to detect attacks where the
> MITM is able to operate on the user's own infrastructure (because they
> can just make sure that the domains they MITM resolve to RFC1918).

Either way, the attacker wins -- if you resolve hostnames over Tor, the
attacker can use a homoglyph or near-homoglyph of a target hostname for
its attack, and simply not allow DNS servers accessible outside its
victim network to see the attack hostname.


Robert Ransom


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 06/04/2011 12:37 PM, tagnaq wrote:
> IP address and hostname (and cert.) of intranet-server1.example.com
> using a valid certificate *.example.com will be published even if the
> first two options in the "advanced options" are enabled. Is that correct?
> In such scenarios I'm not worried about the certificate being submitted
> but the hostname and IP address (domain and server_ip arguments).

To make this example clearer:
The internal DNS resolves intranet-server1.example.com to a public IP
address (non RFC1918). The public DNS does not resolve this hostname
(split DNS).
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAk3qk0AACgkQyM26BSNOM7YgjQD/Y5k2f4A5oZ1iN6YHAvlxm76f
imGN4ouFX1BftSTBdJkBAIr1xVUdNg8enYqo8n984ClZ29vzJcKpEfOgVfjYmrFk
=i/Wt
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 06/04/2011 09:56 PM, Mike Perry wrote:
> Thus spake Robert Ransom (rransom.8...@gmail.com):
> 
>> On Sat, 4 Jun 2011 12:09:52 -0700
>> Mike Perry  wrote:
>>
>>> Thus spake Robert Ransom (rransom.8...@gmail.com):
>>
 My understanding was that EFF would query DNS for a hostname, and if
 the hostname does not exist, assume that it's private.  (This should
 scare you even more.)
>>>
>>> EFF only needs to do this query if the browser could not (because it
>>> was using an HTTP proxy without a SOCKS proxy). Does this scare you
>>> less or more? I'm getting confused by the reactions in this thread.
>>
>> If EFF needs to perform a DNS query on each hostname it receives a
>> certificate for, EFF will leak information to an attacker watching its
>> servers.  If EFF tries to not log hostnames which do not exist, EFF
>> will leak a user's request time *every time* that it receives a
>> certificate associated with a non-existent hostname.
> 
> I think you missed the first half of my email where I explicitly said
> EFF shouldn't need to do this under normal circumstances. It only
> needs to do this when the browser fails to do so itself. Do you expect
> this to be common?
> 
> The observatory itself could also be running a tor client for these
> resolutions, just in case they do end up being common.
> 
> 
> P.S. When the browser does attempt to do these resolutions, should
> they be done via Tor or via whatever local resolver/proxy was used to
> access the domain? Doing it via Tor exposes potentially private names
> to exits

Yes, instead of asking the EFF to resolve a hostname an internal client
could just use Tor to get an "outside view" regarding a hostname.
This way hostnames don't have to go through a central point (EFF) for
the 'is this hostname private?' - check.
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAk3qkz0ACgkQyM26BSNOM7ZYBgEAjPYkTkP8R8BpJl5Wl24DvGve
sRKAywVBTv4Vxeql9y4BAJ8AGofNSR5W/Y3HqY1ieWGRJksd+5GD2/QatB0oTEWl
=SreM
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com):

> On Sat, 4 Jun 2011 12:09:52 -0700
> Mike Perry  wrote:
> 
> > Thus spake Robert Ransom (rransom.8...@gmail.com):
> 
> > > My understanding was that EFF would query DNS for a hostname, and if
> > > the hostname does not exist, assume that it's private.  (This should
> > > scare you even more.)
> > 
> > EFF only needs to do this query if the browser could not (because it
> > was using an HTTP proxy without a SOCKS proxy). Does this scare you
> > less or more? I'm getting confused by the reactions in this thread.
> 
> If EFF needs to perform a DNS query on each hostname it receives a
> certificate for, EFF will leak information to an attacker watching its
> servers.  If EFF tries to not log hostnames which do not exist, EFF
> will leak a user's request time *every time* that it receives a
> certificate associated with a non-existent hostname.

I think you missed the first half of my email where I explicitly said
EFF shouldn't need to do this under normal circumstances. It only
needs to do this when the browser fails to do so itself. Do you expect
this to be common?

The observatory itself could also be running a tor client for these
resolutions, just in case they do end up being common.


P.S. When the browser does attempt to do these resolutions, should
they be done via Tor or via whatever local resolver/proxy was used to
access the domain? Doing it via Tor exposes potentially private names
to exits, but doing it locally will fail to detect attacks where the
MITM is able to operate on the user's own infrastructure (because they
can just make sure that the domains they MITM resolve to RFC1918).

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpRu7FHVNWXK.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Robert Ransom
On Sat, 4 Jun 2011 12:09:52 -0700
Mike Perry  wrote:

> Thus spake Robert Ransom (rransom.8...@gmail.com):

> > My understanding was that EFF would query DNS for a hostname, and if
> > the hostname does not exist, assume that it's private.  (This should
> > scare you even more.)
> 
> EFF only needs to do this query if the browser could not (because it
> was using an HTTP proxy without a SOCKS proxy). Does this scare you
> less or more? I'm getting confused by the reactions in this thread.

If EFF needs to perform a DNS query on each hostname it receives a
certificate for, EFF will leak information to an attacker watching its
servers.  If EFF tries to not log hostnames which do not exist, EFF
will leak a user's request time *every time* that it receives a
certificate associated with a non-existent hostname.


Robert Ransom


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com):

> > >> Someone running this (SSLObservatorySubmission) in a non-public network
> > >> (i.e. an internal corporate network) with Internet access will probably
> > >> disclose internal hostnames including IP addresses, if that is the case
> > >> I would identify this as an issue. What do you think about it?
> > > 
> > > We're going to try really hard to avoid this by default. See the first
> > > two options in the client UI section under "advanced options":
> > > https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission#ClientUIandconfigurationVariables
> > 
> > These two options will prevent disclosure in many scenarios but I don't
> > think it will avoid the problem in a common scenario (internal hosts use
> > a valid FQDN and a valid cert).
> > 
> > IP address and hostname (and cert.) of intranet-server1.example.com
> > using a valid certificate *.example.com will be published even if the
> > first two options in the "advanced options" are enabled. Is that correct?
> > In such scenarios I'm not worried about the certificate being submitted
> > but the hostname and IP address (domain and server_ip arguments).
> >
> > I'm not sure if I understand "private DNS domains" correct.
> > "[x] Do not check/submit certificates for private DNS domains"

If this option is set, the browser addon itself will try to check the
server IP and determine if it is RFC1918 ("Address Allocation for
Private Internets"). If the domain resolves to a private range, it is
considered private. The browser should be able to perform this lookup
so long as the user isn't *only* using an HTTP proxy.

Are you saying that you expect there to be a lot of publicly routable
IP addresses that use certificates signed by CAs in the default root
set out there? How can these be considered private? They are already
in the observatory DB from the IPv4 scan..

Or are you saying you expect there to be a lot of HTTP proxy users out
there who do not have a SOCKS proxy but who access certs signed by
public CAs?

> > Are private DNS domains just non-existing TLDs? Something like
> > "foobar.localnet"?
> 
> My understanding was that EFF would query DNS for a hostname, and if
> the hostname does not exist, assume that it's private.  (This should
> scare you even more.)

EFF only needs to do this query if the browser could not (because it
was using an HTTP proxy without a SOCKS proxy). Does this scare you
less or more? I'm getting confused by the reactions in this thread.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpp9vGEWtTs1.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Robert Ransom
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Sat, 04 Jun 2011 12:37:14 +0200
tagnaq  wrote:

> >> Someone running this (SSLObservatorySubmission) in a non-public network
> >> (i.e. an internal corporate network) with Internet access will probably
> >> disclose internal hostnames including IP addresses, if that is the case
> >> I would identify this as an issue. What do you think about it?
> > 
> > We're going to try really hard to avoid this by default. See the first
> > two options in the client UI section under "advanced options":
> > https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission#ClientUIandconfigurationVariables
> 
> These two options will prevent disclosure in many scenarios but I don't
> think it will avoid the problem in a common scenario (internal hosts use
> a valid FQDN and a valid cert).
> 
> IP address and hostname (and cert.) of intranet-server1.example.com
> using a valid certificate *.example.com will be published even if the
> first two options in the "advanced options" are enabled. Is that correct?
> In such scenarios I'm not worried about the certificate being submitted
> but the hostname and IP address (domain and server_ip arguments).
> 
> 
> I'm not sure if I understand "private DNS domains" correct.
> "[x] Do not check/submit certificates for private DNS domains"
> 
> Are private DNS domains just non-existing TLDs? Something like
> "foobar.localnet"?

My understanding was that EFF would query DNS for a hostname, and if
the hostname does not exist, assume that it's private.  (This should
scare you even more.)


Robert Ransom
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (FreeBSD)

iQEcBAEBAgAGBQJN6g6FAAoJENmcrTGPJVyVilYH/iVcZd4GbSA19BIYUWCWJwah
tImYDiS+5v1ai2fXgPLabvSrNHdxqrfgoUnXOaaHMiZiSqJx8ekVOe5ah5rfd67E
d+ONg5NWX9qyB+wpEtCJ0hHooMuBt9jcUlrVZAYNkyRy1BoyjB4PkqkXBh8S3mF1
xEtC/SDAoDU3g6hWC3q5OW3USykETKH2lI0WF0QFt4lY9GnUz8cn+l+HV9uCU/0C
sMo9Q0BhhoSwyzr10VBLyuSm2HG1AzbJfS2eT2UPtitBbxNPjaCni/abvRlfzRxn
CcOjl79oQ+xaM7qJrQt/tmMnD0t2LbkRdEbSM8vU5XAe4nPB7HmZ5+lV+VM3/BQ=
=cCCI
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

>> Someone running this (SSLObservatorySubmission) in a non-public network
>> (i.e. an internal corporate network) with Internet access will probably
>> disclose internal hostnames including IP addresses, if that is the case
>> I would identify this as an issue. What do you think about it?
> 
> We're going to try really hard to avoid this by default. See the first
> two options in the client UI section under "advanced options":
> https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission#ClientUIandconfigurationVariables

These two options will prevent disclosure in many scenarios but I don't
think it will avoid the problem in a common scenario (internal hosts use
a valid FQDN and a valid cert).

IP address and hostname (and cert.) of intranet-server1.example.com
using a valid certificate *.example.com will be published even if the
first two options in the "advanced options" are enabled. Is that correct?
In such scenarios I'm not worried about the certificate being submitted
but the hostname and IP address (domain and server_ip arguments).


I'm not sure if I understand "private DNS domains" correct.
"[x] Do not check/submit certificates for private DNS domains"

Are private DNS domains just non-existing TLDs? Something like
"foobar.localnet"?

thanks,
tagnaq

-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAk3qCtoACgkQyM26BSNOM7bktQD/U/GuTCz8AAu8zfexN6FcVB5x
702U2AnIaoj/nL5BYyYA/jQ6ZLfpVXRqoeYJGcSW4v8ysgej5duMO4I2L2fn/1Ae
=719C
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 06/04/2011 12:52 PM, Robert Ransom wrote:
> My understanding was that EFF would query DNS for a hostname, and if
> the hostname does not exist, assume that it's private.  (This should
> scare you even more.)

Well, if the EFF is able to ask the DNS regarding the hostname then the
submission to the EFF took already place :)
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAk3qFHUACgkQyM26BSNOM7ZcgQEAnDKTd0GGldwsnrElSs7FON/B
f425GsmZ466/SzuzmXsA/ROi6wNEt3W21TcsGJMFOIwdnmjs+SrrUuG3tbUIfKY2
=S0u2
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Mike Perry
Thus spake tagnaq (tag...@gmail.com):

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 03/21/2011 01:58 AM, Mike Perry wrote:
> > I've spent some time working with the EFF recently to build a
> > distributed version of the SSL Observatory
> > (https://www.eff.org/observatory) to be included with HTTPS
> > Everywhere. The draft API and design sketch is here:
> > https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission
> > 
> > The brief summary is that it will be submitting rare TLS certificates
> > through Tor to EFF for analysis and storage. We will also leverage the
> > database of certificates to provide notification in the event of
> > targeted MITM attacks**.
> > 
> > I am trying to decide if this is a bad thing to enable by default for
> > users.
>
> Someone running this (SSLObservatorySubmission) in a non-public network
> (i.e. an internal corporate network) with Internet access will probably
> disclose internal hostnames including IP addresses, if that is the case
> I would identify this as an issue. What do you think about it?

We're going to try really hard to avoid this by default. See the first
two options in the client UI section under "advanced options":
https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission#ClientUIandconfigurationVariables

However, the tricky bit is that we may not know the real IP address of
the destination server with certainty. We may have to rely on the DNS
cache and/or an additional resolution (which may not even be possible
if the user is using an HTTP proxy without SOCKS).

This means that for the intersection of HTTP Proxy users who do not
have a SOCKS proxy set who ALSO use private sites that are actually
signed by a CA in the default root set may still have these "private"
certs submitted to the observatory.

We don't expect this set to be very large, but just in case, the EFF
intends to do server-side scrubbing if the private_opt_in post
parameter is set to false. Hopefully this will not be needed, but
we'll need to see what the prevalance of this case is in the field to
be sure.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpFMzMXMRljm.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-06-03 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 03/21/2011 01:58 AM, Mike Perry wrote:
> I've spent some time working with the EFF recently to build a
> distributed version of the SSL Observatory
> (https://www.eff.org/observatory) to be included with HTTPS
> Everywhere. The draft API and design sketch is here:
> https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission
> 
> The brief summary is that it will be submitting rare TLS certificates
> through Tor to EFF for analysis and storage. We will also leverage the
> database of certificates to provide notification in the event of
> targeted MITM attacks**.
> 
> I am trying to decide if this is a bad thing to enable by default for
> users.
> 
> On the one hand, we have taken a lot of precautions to ensure that the
> EFF is given the minimal amount of useful information, and retains
> even less (such as no high-resolution timing information). The EFF is
> extremely trustworthy, and has an army of lawyers on-hand to defend
> against subpoenas or legal requests for excessive data retention.
> 
> Furthermore, the OCSP revocation servers have just as much or more
> information, and who knows what they do with this same information.
> In all likelihood, they probably sell it to netcraft and whoever else.
> It is valuable.
> 
> On the other hand, the EFF intends to publish as much of the
> information gathered with this system as it can for analysis by the
> wider Internet community. This will likely include raw SQL dumps of
> the resulting certificate database.
> 
> 
> So, the question for the bikeshed discussion then is what should the
> default state of this collection be? Our thought is to provide
> HTTPS-Everywhere users with this dialog on first-run
> https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission#ClientUIandconfigurationVariables
> 
> However, I'm not sure that this is going to work for Tor Browser
> Bundle users (which ships with HTTPS Everywhere) who may have the TBB
> on readonly USB keys or live cds.  They may end up being asked each
> time they start.
> 
> Is this a decent compromise? The other option is to not even bother to
> ask users who have a working tor installed, on the assumption that
> since we can submit certs through tor, it is always safe to do so. We
> may end up doing this instead of always asking them. Is this wrong? If
> so, why?

Someone running this (SSLObservatorySubmission) in a non-public network
(i.e. an internal corporate network) with Internet access will probably
disclose internal hostnames including IP addresses, if that is the case
I would identify this as an issue. What do you think about it?


btw: sorry for my late reply to this topic, but it was still 'unread'
till now on my side.
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAk3pgi8ACgkQyM26BSNOM7bfAQEAmib2/dGbUwP/kLJz9Dus2S3e
8h8KKCrFOQEypUz6SHAA+QFRPKGt7UJROpeCkd/aG0jZ4WuOXfQppGnPm+qeQFLW
=6Ad/
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-25 Thread grarpamp
> But, if the EFF runs an exit enclave at observatory.eff.org, shouldn't

Always thought it would be useful to have a third party service
where you could feed it a cert's sha1 fingerprint and it would
return 0 or 1 if it felt that fp was legit.
Many people have only one supposedly 'clear' view of the net
from which to see. Tor exits certainly cannot be trusted to
have a taint free view. And verification with CA issuer/subject
is a pain. Call it a looking glass without guarantee.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-25 Thread grarpamp
> if EFF was presented with a national security letter
> or other legal demand under seal demanding the
> existence of a given certificate not be exposed,
> would they be bound to not present a MITM alert for
> that cert?
>> Leaving this for pde and/or Seth.
> It's a question for our legal team. I'll ask them.

>From various side channels, I've been led to believe
that a certain portion of the legal community feels
that NSL's are not, in fact, legal/constitutional... and
they are awaiting a good test case before presenting
that question.

It would seem prudent for an ISP or node op to be quite
concerned about following any demand that was not
signed by a judge having jurisdiction... mostly to avoid
doing anything that could later become a criminal or
civil liability for them. Such as say installing and operating
a wiretap under the guise/authority of such an extrajudicial
letter or demand. For that reason alone, it would seem
wise to seek review of any such thing before blindly
producing or performing work.

Note also that federal, state and even most county
jurisdictions have 24hr judges on call, plus the FISA
court for particularly sensitive 'national security' issues.

ianal, call one :)
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-23 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com):

> On Tue, 22 Mar 2011 21:19:46 -0700
> Mike Perry  wrote:
> > Yeah, we need to start issuing requests for the IP, because the DNS
> > request itself is an anonymity set fragmentation issue (since it won't
> > go to the enclave, but will be mixed with other tor traffic). The EFF
> > says using the IP for submission should be doable: the IP address they
> > plan to use should be stable in the medium term.
> 
> Will you be able to get a certificate valid for that IP address (rather
> than hostname)?

Supposedly some CAs will sign certs for IPs. We can alternatively
distribute a self-signed cert with the xpi and install it
pragmatically. Not sure which route to take. The latter is more
secure, but the cert will show up in the user's "trusted certs" window
in Firefox, which may or may not bother people.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpGJJdWC9ljP.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-23 Thread Robert Ransom
On Tue, 22 Mar 2011 21:19:46 -0700
Mike Perry  wrote:

> > > But, if the EFF runs an exit enclave at observatory.eff.org, shouldn't
> > > this solve the same-circuit correlation problem? Tor should prefer
> > > using that exit enclave in all cases when it is up in this case.
> > 
> > This won't work if an exit node lies about the IP address of
> > ???observatory.eff.org??? (and it won't work reliably in any case).  Using
> > an EFF-run hidden service would fix that problem if we can make hidden
> > services work reliably again.
> 
> Yeah, we need to start issuing requests for the IP, because the DNS
> request itself is an anonymity set fragmentation issue (since it won't
> go to the enclave, but will be mixed with other tor traffic). The EFF
> says using the IP for submission should be doable: the IP address they
> plan to use should be stable in the medium term.

Will you be able to get a certificate valid for that IP address (rather
than hostname)?


Robert Ransom


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-22 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com):

> > > This ???phone-home??? behaviour is not safe for users who browse the web
> > > over Tor until proposal 171 is implemented in Tor.  At best, it would
> > > *only* fragment the anonymity set of Tor users.
> > 
> > The problem with 171 (SOCKS username/password to split streams across
> > different circuits, for those playing at home) is that Firefox also
> > lacks username and password fields in the proxy APIs for SOCKS, so we
> > cannot do this for anyone except for TBB users.
> 
> Could you include a native-code SOCKS client library in the extension?

In Firefox 3.x, yes. But the threading support in FF4 is such that we
cannot expect to have access to very many XPCOM interfaces or share JS
objects with new threads, and post-FF4 we may be stuck with the XUL
version of WebWorker threads, which have even less access. Not the way
we want to go, I think.
https://developer.mozilla.org/en/The_thread_manager

We should patch TBB to send a u+p and try to get this patch merged
upstream for post-FF4.

> > But, if the EFF runs an exit enclave at observatory.eff.org, shouldn't
> > this solve the same-circuit correlation problem? Tor should prefer
> > using that exit enclave in all cases when it is up in this case.
> 
> This won't work if an exit node lies about the IP address of
> ???observatory.eff.org??? (and it won't work reliably in any case).  Using
> an EFF-run hidden service would fix that problem if we can make hidden
> services work reliably again.

Yeah, we need to start issuing requests for the IP, because the DNS
request itself is an anonymity set fragmentation issue (since it won't
go to the enclave, but will be mixed with other tor traffic). The EFF
says using the IP for submission should be doable: the IP address they
plan to use should be stable in the medium term.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgp6Ch08XUpGd.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-22 Thread Robert Ransom
On Mon, 21 Mar 2011 17:09:38 -0700
Mike Perry  wrote:

> Thus spake Robert Ransom (rransom.8...@gmail.com):
> 
> > On Sun, 20 Mar 2011 17:58:06 -0700
> > Mike Perry  wrote:
> > 
> > > However, I'm not sure that this is going to work for Tor Browser
> > > Bundle users (which ships with HTTPS Everywhere) who may have the TBB
> > > on readonly USB keys or live cds.  They may end up being asked each
> > > time they start.
> > > 
> > > Is this a decent compromise? The other option is to not even bother to
> > > ask users who have a working tor installed, on the assumption that
> > > since we can submit certs through tor, it is always safe to do so. We
> > > may end up doing this instead of always asking them. Is this wrong? If
> > > so, why?
> > 
> > This ???phone-home??? behaviour is not safe for users who browse the web
> > over Tor until proposal 171 is implemented in Tor.  At best, it would
> > *only* fragment the anonymity set of Tor users.
> 
> The problem with 171 (SOCKS username/password to split streams across
> different circuits, for those playing at home) is that Firefox also
> lacks username and password fields in the proxy APIs for SOCKS, so we
> cannot do this for anyone except for TBB users.

Could you include a native-code SOCKS client library in the extension?


> But, if the EFF runs an exit enclave at observatory.eff.org, shouldn't
> this solve the same-circuit correlation problem? Tor should prefer
> using that exit enclave in all cases when it is up in this case.

This won't work if an exit node lies about the IP address of
‘observatory.eff.org’ (and it won't work reliably in any case).  Using
an EFF-run hidden service would fix that problem if we can make hidden
services work reliably again.


Robert Ransom


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-21 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com):

> On Mon, 21 Mar 2011 09:05:30 -0400
> Joseph Lorenzo Hall  wrote:
> 
> > It strikes me that I'd want notice (or the option to get notice)
> > before submitting rare certs to the database... say a dialog like:
> > "We're about to submit the certificate for the following site, [x] ok,
> > [ ] no, do not submit this certificate. ([ ] remember this preference
> > for this certificate)." My reasoning is that I should usually have a
> > good idea when I'm expecting a rare/self-signed cert, and if I'm not
> > expecting it, I'd probably want to submit it. Does that make sense?
> > best, Joe
> 
> 1. The extension cannot determine whether you have a ???rare??? certificate
>without querying the database.

Well, we are planning on shipping a list of the most popular TLS leaf
fingerprints in the addon itself to reduce load on the observatory.
This would be what "rare" means for deciding when to submit.

But this is still likely too common to ask every time. 

> 2. If users do not report self-signed certificates that they expect to
>see, the database cannot be used to detect man-in-the-middle attacks
>on sites that use self-signed certificates.

For those users, yes. But even if only one user is submitting
self-signed certs, each observatory instance can also check the site
itself, much like Perspectives.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpmmzAPFOHaG.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-21 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com):

> On Sun, 20 Mar 2011 17:58:06 -0700
> Mike Perry  wrote:
> 
> > However, I'm not sure that this is going to work for Tor Browser
> > Bundle users (which ships with HTTPS Everywhere) who may have the TBB
> > on readonly USB keys or live cds.  They may end up being asked each
> > time they start.
> > 
> > Is this a decent compromise? The other option is to not even bother to
> > ask users who have a working tor installed, on the assumption that
> > since we can submit certs through tor, it is always safe to do so. We
> > may end up doing this instead of always asking them. Is this wrong? If
> > so, why?
> 
> This ???phone-home??? behaviour is not safe for users who browse the web
> over Tor until proposal 171 is implemented in Tor.  At best, it would
> *only* fragment the anonymity set of Tor users.

The problem with 171 (SOCKS username/password to split streams across
different circuits, for those playing at home) is that Firefox also
lacks username and password fields in the proxy APIs for SOCKS, so we
cannot do this for anyone except for TBB users.

But, if the EFF runs an exit enclave at observatory.eff.org, shouldn't
this solve the same-circuit correlation problem? Tor should prefer
using that exit enclave in all cases when it is up in this case.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpGzPhhS24fR.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-21 Thread Chris Palmer
On 03/20/2011 08:05 PM, Mike Perry wrote:

>> if EFF was presented with a national security letter or other legal
>> demand under seal demanding the existence of a given certificate not
>> be exposed, would they be bound to not present a MITM alert for that
>> cert?
> 
> Leaving this for pde and/or Seth.

It's a question for our legal team. I'll ask them.

The main thing is that this feature is not intended for true real-time
MITM alerts. It's for research and study, and I hesitate to overload it
for MITM detection for all sorts of technical reasons, including those
Mike has raised.


-- 
Chris Palmer
Technology Director, Electronic Frontier Foundation
https://www.eff.org/code
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-21 Thread Robert Ransom
On Mon, 21 Mar 2011 09:05:30 -0400
Joseph Lorenzo Hall  wrote:

> It strikes me that I'd want notice (or the option to get notice)
> before submitting rare certs to the database... say a dialog like:
> "We're about to submit the certificate for the following site, [x] ok,
> [ ] no, do not submit this certificate. ([ ] remember this preference
> for this certificate)." My reasoning is that I should usually have a
> good idea when I'm expecting a rare/self-signed cert, and if I'm not
> expecting it, I'd probably want to submit it. Does that make sense?
> best, Joe

No.

1. The extension cannot determine whether you have a ‘rare’ certificate
   without querying the database.

2. If users do not report self-signed certificates that they expect to
   see, the database cannot be used to detect man-in-the-middle attacks
   on sites that use self-signed certificates.


Robert Ransom


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-21 Thread Robert Ransom
On Sun, 20 Mar 2011 17:58:06 -0700
Mike Perry  wrote:

> So, the question for the bikeshed discussion then is what should the
> default state of this collection be? Our thought is to provide
> HTTPS-Everywhere users with this dialog on first-run
> https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission#ClientUIandconfigurationVariables
> 
> However, I'm not sure that this is going to work for Tor Browser
> Bundle users (which ships with HTTPS Everywhere) who may have the TBB
> on readonly USB keys or live cds.  They may end up being asked each
> time they start.
> 
> Is this a decent compromise? The other option is to not even bother to
> ask users who have a working tor installed, on the assumption that
> since we can submit certs through tor, it is always safe to do so. We
> may end up doing this instead of always asking them. Is this wrong? If
> so, why?

This ‘phone-home’ behaviour is not safe for users who browse the web
over Tor until proposal 171 is implemented in Tor.  At best, it would
*only* fragment the anonymity set of Tor users.


Robert Ransom


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-21 Thread Joseph Lorenzo Hall
It strikes me that I'd want notice (or the option to get notice)
before submitting rare certs to the database... say a dialog like:
"We're about to submit the certificate for the following site, [x] ok,
[ ] no, do not submit this certificate. ([ ] remember this preference
for this certificate)." My reasoning is that I should usually have a
good idea when I'm expecting a rare/self-signed cert, and if I'm not
expecting it, I'd probably want to submit it. Does that make sense?
best, Joe

On Sunday, March 20, 2011, Mike Perry  wrote:
> Thus spake coderman (coder...@gmail.com):
>
>> > The brief summary is that it will be submitting rare TLS certificates
>> > through Tor to EFF for analysis and storage. We will also leverage the
>> > database of certificates to provide notification in the event of
>> > targeted MITM attacks**.
>> >
>> > I am trying to decide if this is a bad thing to enable by default for
>> > users.
>>
>> if EFF was presented with a national security letter or other legal
>> demand under seal demanding the existence of a given certificate not
>> be exposed, would they be bound to not present a MITM alert for that
>> cert?
>
> Leaving this for pde and/or Seth.
>
>> (said another way, could this potentially be a false sense of
>> security, if all trust for anomaly notification was placed in the EFF
>> alone?)
>
> The reality is we won't have the Firefox APIs to actually prevent
> content load after certificate inspection any time soon, so it's not
> feasible to trust this as your only security measure. Monsterous hacks
> might make this possible sooner, though...
>
> On a timescale where we can provide real security rather than just
> analysis and post-pwnage notification, we can build multiple databases
> to submit to/query, just like Perspectives.
>
> There's also no real reason why you can't use both Perspectives and
> HTTPS-Everywhere. Then you can get both of our half-assed
> after-the-fact notifications that you were owned :)
>
>
> --
> Mike Perry
> Mad Computer Scientist
> fscked.org evil labs
>

-- 
Joseph Lorenzo Hall
ACCURATE Postdoctoral Research Associate
UC Berkeley School of Information
Princeton Center for Information Technology Policy
http://josephhall.org/
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-20 Thread Moritz Bartl
On 21.03.2011 01:58, Mike Perry wrote:
> The brief summary is that it will be submitting rare TLS certificates
> through Tor to EFF for analysis and storage. We will also leverage the
> database of certificates to provide notification in the event of
> targeted MITM attacks**.

Awesome. :)

-- 
Moritz Bartl
https://www.torservers.net/
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-20 Thread Mike Perry
Thus spake coderman (coder...@gmail.com):

> > The brief summary is that it will be submitting rare TLS certificates
> > through Tor to EFF for analysis and storage. We will also leverage the
> > database of certificates to provide notification in the event of
> > targeted MITM attacks**.
> >
> > I am trying to decide if this is a bad thing to enable by default for
> > users.
> 
> if EFF was presented with a national security letter or other legal
> demand under seal demanding the existence of a given certificate not
> be exposed, would they be bound to not present a MITM alert for that
> cert?

Leaving this for pde and/or Seth.

> (said another way, could this potentially be a false sense of
> security, if all trust for anomaly notification was placed in the EFF
> alone?)

The reality is we won't have the Firefox APIs to actually prevent
content load after certificate inspection any time soon, so it's not
feasible to trust this as your only security measure. Monsterous hacks
might make this possible sooner, though...

On a timescale where we can provide real security rather than just
analysis and post-pwnage notification, we can build multiple databases
to submit to/query, just like Perspectives. 

There's also no real reason why you can't use both Perspectives and
HTTPS-Everywhere. Then you can get both of our half-assed
after-the-fact notifications that you were owned :)


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpMrHf3HRp2M.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How evil is TLS cert collection?

2011-03-20 Thread coderman
On Sun, Mar 20, 2011 at 5:58 PM, Mike Perry  wrote:
> I've spent some time working with the EFF recently to build a
> distributed version of the SSL Observatory
> (https://www.eff.org/observatory) to be included with HTTPS
> Everywhere. The draft API and design sketch is here:
> https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission

cool!


> The brief summary is that it will be submitting rare TLS certificates
> through Tor to EFF for analysis and storage. We will also leverage the
> database of certificates to provide notification in the event of
> targeted MITM attacks**.
>
> I am trying to decide if this is a bad thing to enable by default for
> users.

if EFF was presented with a national security letter or other legal
demand under seal demanding the existence of a given certificate not
be exposed, would they be bound to not present a MITM alert for that
cert?

(said another way, could this potentially be a false sense of
security, if all trust for anomaly notification was placed in the EFF
alone?)
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] How evil is TLS cert collection?

2011-03-20 Thread Mike Perry
I've spent some time working with the EFF recently to build a
distributed version of the SSL Observatory
(https://www.eff.org/observatory) to be included with HTTPS
Everywhere. The draft API and design sketch is here:
https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission

The brief summary is that it will be submitting rare TLS certificates
through Tor to EFF for analysis and storage. We will also leverage the
database of certificates to provide notification in the event of
targeted MITM attacks**.

I am trying to decide if this is a bad thing to enable by default for
users.

On the one hand, we have taken a lot of precautions to ensure that the
EFF is given the minimal amount of useful information, and retains
even less (such as no high-resolution timing information). The EFF is
extremely trustworthy, and has an army of lawyers on-hand to defend
against subpoenas or legal requests for excessive data retention.

Furthermore, the OCSP revocation servers have just as much or more
information, and who knows what they do with this same information.
In all likelihood, they probably sell it to netcraft and whoever else.
It is valuable.

On the other hand, the EFF intends to publish as much of the
information gathered with this system as it can for analysis by the
wider Internet community. This will likely include raw SQL dumps of
the resulting certificate database.


So, the question for the bikeshed discussion then is what should the
default state of this collection be? Our thought is to provide
HTTPS-Everywhere users with this dialog on first-run
https://trac.torproject.org/projects/tor/wiki/HTTPSEverywhere/SSLObservatorySubmission#ClientUIandconfigurationVariables

However, I'm not sure that this is going to work for Tor Browser
Bundle users (which ships with HTTPS Everywhere) who may have the TBB
on readonly USB keys or live cds.  They may end up being asked each
time they start.

Is this a decent compromise? The other option is to not even bother to
ask users who have a working tor installed, on the assumption that
since we can submit certs through tor, it is always safe to do so. We
may end up doing this instead of always asking them. Is this wrong? If
so, why?



** Due to a limitation of the Firefox APIs, we cannot actually prevent
the load of any content that is delivered by a MITM attacker. We will
resort to an after-the-fact message that will inform you of compromise
and advise you get to a more secure Internet connection immediately to
change your password.

Perspectives (http://www.networknotary.org/) has this same limitation,
but it uses DOM manipulation to make you believe it has actually
prevented the page load, when in fact your authentication tokens have
also already been transmitted at the time of notification of MITM.

Perspectives also has just enough differences that we decided to work
on a different implementation. The EFF wants to turn every user into a
vantage point, so that we can gather information on the extent of
targeted, CA-authenticated MITM events. They want to find a silver
bullet against the CA model, to conclusively prove that it can't
possibly provide the security properties it claims. The Perspectives
protocol is not set up to do this.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpXkSFqxBnOb.pgp
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk