Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-26 Thread Chris McKenzie

Yes, Diffie was one of the first, the first being some guy that worked for
the UK government a few years earlier (early 70's).  The ^ operator means
the logical "and".  And yes, I was trying to describe open/public key --
If there is a difference -- please explain.  The third thing in the
definition list should be asymmetric, I don't know how I missed that mistake.

Sincerely,
Christopher J. McKenzie

[EMAIL PROTECTED]
[EMAIL PROTECTED]
(530) 297-6110
609 Anderson 161
Davis, CA

___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-26 Thread nbs

On Fri, Apr 26, 2002 at 03:08:17AM -0400, [EMAIL PROTECTED] wrote:
 
> Chris,
> 
>   Okay, Pete was absolutely correct, the rest of your email was talking 
> about software programs, then switched context to encryption without
> using the word encryption, so I was trying to figure out how a executable
> was safer being asymmetric...  ;)

That confused me too, but I just figured I wasn't familiar with what
Chris was talking about. ;)

-bill!
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-26 Thread Peter Jay Salzman

begin Chris McKenzie <[EMAIL PROTECTED]> 
> I hate long threads to I'll cut some stuff out here.
> 
> Well I took the idea from an old book I read, I think it was by Diffie ...
> The idea is to avoid transferring of keys.  In some older system there may
> be some very tricky clever method of encrypting data and the same code
> encrypts and decrypts it.  Therefore these codes are very valuable.  How
> do I get them to you?  Well I send some big hefty armed guy with a
> suitcase locked to his wrist to deliver it to you or something like that.
> 
> The asymmetric nature eliminates the need for a key exchange.  I can give
> you the encrypt key, and it will not help you decrypt what you encrypt.
 
yeah, but what you just described here is an open key crypto system,
like gpg.  and if by "key" you mean "that which unlocks the code", then
you've exactly described a public key system.

you tell people how to encrypt the package, but don't tell them how to
decrypt it.
 
in fact, isn't diffie one of the inventers of public key cryptography?

> > - Does symmetric encryption require that sort of combination to work?
> >   (A.lock, B.lock, A.unlock, B.unlock)
> 
> Symmetric _encryption_ is defined mathematically somewhere and I think it
> is out of the scope of my concentration but if you are fluent in mathlish and
> read proofs as you have breakfast every morningthat I encourage you to
> hunt it down.  As for you argument above, I don't think it is symmetric
> simply because the undoing of the process is not the reverse of the actual
> doing of it.

i'm not sure i want to think about whether public key systems are
asymmetic or not.  it's 8am and i just woke up...

> The distinction between nearly-asymmetric and symmetric is not always an
> easy one and I wish I could buffer it with a nice formal definition.  I
> can sure try:
> Given a set of values m that go through a transformation n=[A->B]m, a
> process
> is symmetric if
>   1. The Operations of the transformation B->A are valid
>   2. The Operations of the transformation B->A are identicle to A->B
> Corollary: This would imply that m=[A->B]n ^ m=[B->A]n.

this clearly described DES and IDEA.
 
> A process is nearly asymmetric if
>   1. The operations of the transformation B->A are valid
>   2. The operations of the transformation B->A are not identicle to
> A->B however, m=[A->B]n ^ m=[B->A]n.
> 
> A process is symmetric if
>   1. The operations of the transformation B->A can be valid, so long
>   as if m=[A->B]n then m != [B->A]n.
>   2. To get from n back to m will involve a process D->C which is
> not identicle to A->B or B->A but will still yeild m.
 
should this have been asymmetric?

what does the operator ^ mean?

pete
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-26 Thread Rod Roark

On Friday 26 April 2002 03:00 am, ME wrote:
> ...
> Sorry if this offended. :-/ That was not the point. It was to bring humor
> for other to laugh at my stupid statement, not as an unkind word to their
> intelligent realization.

I understood perfectly, but thanks anyway.  ;-)

-- Rod
   http://www.sunsetsystems.com/

___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-26 Thread ME

On Thu, 25 Apr 2002 [EMAIL PROTECTED] wrote:
> Subject: Re: [vox-tech] Linux's Vulnerability to E-mail Viruses
> 
> On Thu, 25 Apr 2002, ME wrote:
> 
> > On Thu, 25 Apr 2002, Rod Roark wrote:
> > > Interesting, I never thought about that before.  The "locking" 
> > > (and corresponding unlocking) could easily be done by xor'ing 
> > > against some string of pseudo-random characters that only 
> > > the encryptor knows how to produce.
> > 
> > The most advanced encryption available is found when you use 2XOR
> > (double-XOR) with your data and the same key.
> > 
> > You also get a huge cost savings in performance, as some stes can be
> > skipped and, 8 bit 2XOR is just as secure as 2048bit 2XOR (assuming the
> > same key in both passes.
> > 
> > (Tongue in cheek - biteing down hard.)
> > 
> > (This would have been better posted April, 1,2002  ;-)
> > 
> > -ME
> 
> Ouch...

Oh! Just so the other list members note, I was not making fun of the
original poster! XOR-ing against a key with equal bit length to the number
of bits being encrypted (so long as the key is not reused "as-is" has been
used before as a form of encryption. (When shorter keys are used or the
same key is used in this simple kind of system is one place where security
can easilu breakdown.) (A shared secret equal in size of the message can
be rather strong - especially for very long messages if the key is not
easily predictable or brute-forced.) 
[For example, I'm Alice sending Bob 8 bytes of data that have been XOR-ed
once against an 8 byte key (non predictable bit sequence). If the key is a
shared secret between us (Bob and Alice) then even the best code crackers
might have a tough time knowing what 8-bytes of intended content were
actually sent. Of course, using an 8-byte key in repeating sequence to
"encrypt" 100 Mb of text file data might be just a little bit weak.

The comment about 2XOR was supposed to be funny, and not making fun of the
posters! (It was their comment that reminded me of this.)

What the poster described is often used to describe earlier encryption
systems, and is often used as part of a step in modern data-hiding.

Sorry if this offended. :-/ That was not the point. It was to bring humor
for other to laugh at my stupid statement, not as an unkind word to their
intelligent realization.

Sorry, :-/
-ME

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GCS/CM$/IT$/LS$/S/O$ !d--(++) !s !a+++(-) C++$() U$(+$) P+$>+++ 
L+++$(++) E W+++$(+) N+ o K w+$>++>+++ O-@ M+$ V-$>- !PS !PE Y+ !PGP
t@-(++) 5+@ X@ R- tv- b++ DI+++ D+ G--@ e+>++> h(++)>+ r*>? z?
--END GEEK CODE BLOCK--
decode: http://www.ebb.org/ungeek/ about: http://www.geekcode.com/geek.html

___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-26 Thread Chris McKenzie

I hate long threads to I'll cut some stuff out here.

>   Okay, Pete was absolutely correct, the rest of your email was talking
> about software programs, then switched context to encryption without
> using the word encryption, so I was trying to figure out how a executable
> was safer being asymmetric...  ;)

Yeah sorry...I was trying to speak in abstract without relating directly
to a computer

>   That is an novel method of secured transmission that would not
> have come to mind and I ditto Pete's question...

> On Thu, Apr 25, 2002 at 07:13:02PM -0700, Peter Jay Salzman wrote:
> # this isn't how modern crypto systems work, is it?   this assumes that
> # the "locks" commute.

Well I took the idea from an old book I read, I think it was by Diffie ...
The idea is to avoid transferring of keys.  In some older system there may
be some very tricky clever method of encrypting data and the same code
encrypts and decrypts it.  Therefore these codes are very valuable.  How
do I get them to you?  Well I send some big hefty armed guy with a
suitcase locked to his wrist to deliver it to you or something like that.

The asymmetric nature eliminates the need for a key exchange.  I can give
you the encrypt key, and it will not help you decrypt what you encrypt.


> - Does symmetric encryption require that sort of combination to work?
>   (A.lock, B.lock, A.unlock, B.unlock)

Symmetric _encryption_ is defined mathematically somewhere and I think it
is out of the scope of my concentration but if you are fluent in mathlish and
read proofs as you have breakfast every morning that I encourage you to
hunt it down.  As for you argument above, I don't think it is symmetric
simply because the undoing of the process is not the reverse of the actual
doing of it.

>   Something like (gzip | bzip2 | gunzip | bunzip2) would fail miserably
> at the gunzip stage... come to think of it even
> (rot13 | bzip2 | rot13 | bunzip2) wouldn't work... I think that scheme
> requires all locking methods involved to have that can be combined
> attribute.

No, I think that they are nearly-assymetric.  gunzip does not require you
to have or know, and it is essentiallt the same process different
procedure.

Difference between a process and a procedure is pretty much the following
The process of shattering a crystal can be done by the procedure of things
like hitting it with a hammer or throwing it on the ground, you are still
doing the process of shattering, just a different procedure.

In computer terms, it may be like a template in c++ but not exactly.
Another stab:
sorting will sort something no matter what you tell it to
sort, it is
really the same process, the process of sorting, just a different
procedure based on the data structure.

> > So I put a lock on the box and send it to you.  You can't open that
> > lock so in a ridiculous notion, you put another lock on it, one that you
> > have the key for and send the doubly locked box back to me.  I unlock my
> > lock but the box is still locked by you.  I send it back, and you unlock
> > your lock and have the software.
>
>   For physical world stuff I don't understand why you wouldn't just lock
> the explosive box with some new random lock, ship the box to the person.
> Then once you know they have the box, ship them a copy of the key... you
> are always risking interception and destruction of the item during
> first shipment.

Ok here is the problem: I send you the key, the key is something I have,
it is authentication.  I am letting go of my authentication token.
therefore anyone can authenticate themselves as me with the key for the
sake of the box.  However, if I hold on to my key and if you hold on to
yours then the authentication is perserved.

>   ... and while I'm thinking about it, it seems like it would be more
> straight forward in for the end receiver to send you the lock (for
> which only he has a key), you apply the lock to the explosive package
> and ship it, the receiver then uses his key to unlock.

Symmetric example:

In order to secure my food while camping I tie a bunch of tricky knots
around my food bag.  However, some ingenious gypsies come by and do
EXACTLY the opposite of what I did and the knots are unlocked.  They need
no authentication to do so.  They don't need anything but the security
measure itself and knowledge of the system.

The distinction between nearly-asymmetric and symmetric is not always an
easy one and I wish I could buffer it with a nice formal definition.  I
can sure try:
Given a set of values m that go through a transformation n=[A->B]m, a
process
is symmetric if
1. The Operations of the transformation B->A are valid
2. The Operations of the transformation B->A are identicle to A->B
Corollary: This would imply that m=[A->B]n ^ m=[B->A]n.

A process is nearly asymmetric if
1. The operations of the transformation B->A are valid
2. The operations of the transformation B->A are not identicle to
A->B however, m=[A->B]n ^ m=

Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread msimons

On Thu, Apr 25, 2002 at 06:51:46PM -0700, Chris McKenzie wrote:
> Modern encryption, assymetric processes.

On Thu, Apr 25, 2002 at 07:13:02PM -0700, Peter Jay Salzman wrote:
# also, i could be totally way off base here, but i think you and mike
# were talking about different types of "processes".  i'm pretty sure mike
# is familiar with reversible processes.  i'm guessing he thought you meant
# something that goes into a process table.   (?)

Chris,

  Okay, Pete was absolutely correct, the rest of your email was talking 
about software programs, then switched context to encryption without
using the word encryption, so I was trying to figure out how a executable
was safer being asymmetric...  ;)


On Thu, Apr 25, 2002 at 06:51:46PM -0700, Chris McKenzie wrote:
> me lock
> you lock
> me unlock
> you unlock

  That is an novel method of secured transmission that would not
have come to mind and I ditto Pete's question... 

On Thu, Apr 25, 2002 at 07:13:02PM -0700, Peter Jay Salzman wrote:
# this isn't how modern crypto systems work, is it?   this assumes that
# the "locks" commute.

- Does symmetric encryption require that sort of combination to work?
  (A.lock, B.lock, A.unlock, B.unlock)


  Something like (gzip | bzip2 | gunzip | bunzip2) would fail miserably 
at the gunzip stage... come to think of it even 
(rot13 | bzip2 | rot13 | bunzip2) wouldn't work... I think that scheme
requires all locking methods involved to have that can be combined 
attribute.

btw: the '|' characters above are meant to be unix pipes not logical ORs ;)


> So I put a lock on the box and send it to you.  You can't open that
> lock so in a ridiculous notion, you put another lock on it, one that you
> have the key for and send the doubly locked box back to me.  I unlock my
> lock but the box is still locked by you.  I send it back, and you unlock
> your lock and have the software.

  For physical world stuff I don't understand why you wouldn't just lock
the explosive box with some new random lock, ship the box to the person.
Then once you know they have the box, ship them a copy of the key... you
are always risking interception and destruction of the item during
first shipment.

  ... and while I'm thinking about it, it seems like it would be more
straight forward in for the end receiver to send you the lock (for 
which only he has a key), you apply the lock to the explosive package
and ship it, the receiver then uses his key to unlock.  

  This second thing is basically what is public key encryption amounts 
to, and you were trying to explain symmetric systems... so I still don't
understand symmetric, but now I know you are talking about encryption.

TTFN,
  Mike

I think in the physical world you a problem:
- I want _this_ to get to _you_.

In the electronic world it's different:
- I want _only you_ to be able to get _this_.

to explain the use of explosives above, my understanding of encryption:
==
  To draw on a physical world analogy, encryption is a lock box that goes 
around something.  This lock box has two very interesting properties: 
- some explosives such that if people tamper with the box it implodes 
  so they can't get the contents inside without being bomb experts :)
- a little magic button on the lock box that when pressed the box 
  perfectly replicates itself and it's contents so people can try 
  lock-picking the box for years if they have the motivation.
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread Jeff Newmiller

On Thu, 25 Apr 2002, Rod Roark wrote:

> Interesting, I never thought about that before.  The "locking" 
> (and corresponding unlocking) could easily be done by xor'ing 
> against some string of pseudo-random characters that only 
> the encryptor knows how to produce.

I suspect the statistics of this process would allow a significant
fraction (on average half?) of the hidden bits to peek through... which
doesn't sound very secure to me.

> 
> -- Rod
>http://www.sunsetsystems.com/
> 
> On Thursday 25 April 2002 07:13 pm, Peter Jay Salzman wrote:
> > begin Chris McKenzie <[EMAIL PROTECTED]>
> >
> > > Sure, I wasn't trying to intend a pun, I just mispelled.
> > >
> > > Modern encryption, assymetric processes.
> > >
> > > Alright, say I had a very rare piece of software, OpenStep 4.2/i386 and I
> > > wanted to send it to you.  However, you live in some remote jungle where
> > > you can't copy a key.  But I don't want the item to be stolen along the
> > > way.  So I put a lock on the box and send it to you.  You can't open that
> > > lock so in a ridiculous notion, you put another lock on it, one that you
> > > have the key for and send the doubly locked box back to me.  I unlock my
> > > lock but the box is still locked by you.  I send it back, and you unlock
> > > your lock and have the software.
> >
> > hi chris,
> >
> > cool post.
> >
> > this isn't how modern crypto systems work, is it?   this assumes that
> > the "locks" commute.   that for a given message A, a chris lock C and
> > peter lock P:
> >
> > chris CA --> peter PCA --> chris C^(-1)PCA --> peter P^(-1)C^(-1)PCA
> >
> > but i can't actually unlock the software unless
> >
> > P^(-1)C^(-1) = C^(-1)P^(-1)
> >
> > i don't know much about modern crypto systems other than RSA type
> > things.  is this how they work?  or am i reading too much into an
> > analogy?

I don't know much about them either (I just use them) but if

  P = peter's public key
  p = peter's private key
  C = chris's public key
  c = chris's private key

and

  ptxt =  decode( encode( ptxt, P ), p )
  ptxt =  decode( encode( ptxt, p ), P )
  ptxt != decode( encode( ptxt, P ), P )
  ptxt != decode( encode( ptxt, C ), C )

(critical assumptions) then

  ctxt = encode( encode( ptxt, c ), P )

encoded by chris is a secure message unencodeable only by peter using

  ptxt = decode( decode( ctxt, p ), C )

[...]

---
Jeff NewmillerThe .   .  Go Live...
DCN:<[EMAIL PROTECTED]>Basics: ##.#.   ##.#.  Live Go...
  Live:   OO#.. Dead: OO#..  Playing
Research Engineer (Solar/BatteriesO.O#.   #.O#.  with
/Software/Embedded Controllers)   .OO#.   .OO#.  rocks...2k
---




___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread Ryan

On Thursday 25 April 2002 09:43 pm, nbs wrote:
> Like those ebooks!  Wait, no that was ROT13

not ROT26?

> -bill!
> ___
> vox-tech mailing list
> [EMAIL PROTECTED]
> http://lists.lugod.org/mailman/listinfo/vox-tech
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread nbs

On Thu, Apr 25, 2002 at 08:47:34PM -0700, ME wrote:
> The most advanced encryption available is found when you use 2XOR
> (double-XOR) with your data and the same key.

Like those ebooks!  Wait, no that was ROT13

-bill!
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread foo

On Thu, 25 Apr 2002, ME wrote:

> On Thu, 25 Apr 2002, Rod Roark wrote:
> > Interesting, I never thought about that before.  The "locking" 
> > (and corresponding unlocking) could easily be done by xor'ing 
> > against some string of pseudo-random characters that only 
> > the encryptor knows how to produce.
> 
> The most advanced encryption available is found when you use 2XOR
> (double-XOR) with your data and the same key.
> 
> You also get a huge cost savings in performance, as some stes can be
> skipped and, 8 bit 2XOR is just as secure as 2048bit 2XOR (assuming the
> same key in both passes.
> 
> (Tongue in cheek - biteing down hard.)
> 
> (This would have been better posted April, 1,2002  ;-)
> 
> -ME

Ouch...

___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread ME

On Thu, 25 Apr 2002, Rod Roark wrote:
> Interesting, I never thought about that before.  The "locking" 
> (and corresponding unlocking) could easily be done by xor'ing 
> against some string of pseudo-random characters that only 
> the encryptor knows how to produce.

The most advanced encryption available is found when you use 2XOR
(double-XOR) with your data and the same key.

You also get a huge cost savings in performance, as some stes can be
skipped and, 8 bit 2XOR is just as secure as 2048bit 2XOR (assuming the
same key in both passes.

(Tongue in cheek - biteing down hard.)

(This would have been better posted April, 1,2002  ;-)

-ME

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GCS/CM$/IT$/LS$/S/O$ !d--(++) !s !a+++(-) C++$() U$(+$) P+$>+++ 
L+++$(++) E W+++$(+) N+ o K w+$>++>+++ O-@ M+$ V-$>- !PS !PE Y+ !PGP
t@-(++) 5+@ X@ R- tv- b++ DI+++ D+ G--@ e+>++> h(++)>+ r*>? z?
--END GEEK CODE BLOCK--
decode: http://www.ebb.org/ungeek/ about: http://www.geekcode.com/geek.html

___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread Rod Roark

Interesting, I never thought about that before.  The "locking" 
(and corresponding unlocking) could easily be done by xor'ing 
against some string of pseudo-random characters that only 
the encryptor knows how to produce.

-- Rod
   http://www.sunsetsystems.com/

On Thursday 25 April 2002 07:13 pm, Peter Jay Salzman wrote:
> begin Chris McKenzie <[EMAIL PROTECTED]>
>
> > Sure, I wasn't trying to intend a pun, I just mispelled.
> >
> > Modern encryption, assymetric processes.
> >
> > Alright, say I had a very rare piece of software, OpenStep 4.2/i386 and I
> > wanted to send it to you.  However, you live in some remote jungle where
> > you can't copy a key.  But I don't want the item to be stolen along the
> > way.  So I put a lock on the box and send it to you.  You can't open that
> > lock so in a ridiculous notion, you put another lock on it, one that you
> > have the key for and send the doubly locked box back to me.  I unlock my
> > lock but the box is still locked by you.  I send it back, and you unlock
> > your lock and have the software.
>
> hi chris,
>
> cool post.
>
> this isn't how modern crypto systems work, is it?   this assumes that
> the "locks" commute.   that for a given message A, a chris lock C and
> peter lock P:
>
> chris CA --> peter PCA --> chris C^(-1)PCA --> peter P^(-1)C^(-1)PCA
>
> but i can't actually unlock the software unless
>
> P^(-1)C^(-1) = C^(-1)P^(-1)
>
> i don't know much about modern crypto systems other than RSA type
> things.  is this how they work?  or am i reading too much into an
> analogy?
>
>
> also, i could be totally way off base here, but i think you and mike
> were talking about different types of "processes".  i'm pretty sure mike
> is familiar with reversible processes.  i'm guessing he thought you meant
> something that goes into a process table.   (?)
>
> pete
> ___
> vox-tech mailing list
> [EMAIL PROTECTED]
> http://lists.lugod.org/mailman/listinfo/vox-tech

___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread Peter Jay Salzman

begin Chris McKenzie <[EMAIL PROTECTED]> 
> Sure, I wasn't trying to intend a pun, I just mispelled.
> 
> Modern encryption, assymetric processes.
> 
> Alright, say I had a very rare piece of software, OpenStep 4.2/i386 and I
> wanted to send it to you.  However, you live in some remote jungle where
> you can't copy a key.  But I don't want the item to be stolen along the
> way.  So I put a lock on the box and send it to you.  You can't open that
> lock so in a ridiculous notion, you put another lock on it, one that you
> have the key for and send the doubly locked box back to me.  I unlock my
> lock but the box is still locked by you.  I send it back, and you unlock
> your lock and have the software.

hi chris,

cool post.

this isn't how modern crypto systems work, is it?   this assumes that
the "locks" commute.   that for a given message A, a chris lock C and
peter lock P:

chris CA --> peter PCA --> chris C^(-1)PCA --> peter P^(-1)C^(-1)PCA

but i can't actually unlock the software unless

P^(-1)C^(-1) = C^(-1)P^(-1)

i don't know much about modern crypto systems other than RSA type
things.  is this how they work?  or am i reading too much into an
analogy?


also, i could be totally way off base here, but i think you and mike
were talking about different types of "processes".  i'm pretty sure mike
is familiar with reversible processes.  i'm guessing he thought you meant
something that goes into a process table.   (?)

pete
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread Chris McKenzie

Sure, I wasn't trying to intend a pun, I just mispelled.

ok.  I will give you examples for have and know.
Being "carded" before buying alcohol is a process that requires you to
have ID as opposed to buying anything else in which case it only requires
you to have money.  If you don't have it, money/id, whatever, then you
cannot complete the process.

Sometimes, having is not good enough however.  For you ATM card, not only
do you need to have the card but you need to know the pin to access your
account at the ATM.  This is so someone that has a pin and not the card or
visa versa can't do top much (ideally).  Computer login can be the same.
I can restrict login to be from a list of friendly computers.  So you have
to first have access to the friendly computers then know the login on the
system, simply having access to the friendly computeris not enough and
simply knowing the login is not enough.

Microsoft displays a horrible implementation of this with registration
keys.  Not only do you need to have the software but you need to know this
long incoherent string of characters which you can get from most friends
and easily with internet access.  The .NET will eliminate one of these.
After it is implemented then either the computer itself must be uniquely
identified somehow as something you have or you must uniquely be
identified somehow through fingerprints or something like that.  This
would be coupled with something you know, a login/password pair probably.

Asymmetric/Symmetric processes.

A Symmetric Process is something that is reversible, like a ball bouncing,
if you reverse a video of someone bouncing a ball you might not be able to
tell which way is forward and which way is backward.  However if someone
breaks some crystal on the ground then it is very distinct because crystal
magically reassembling itself to some dove shape is not a normal
occurance.

And if you were to reassemble the shattered crystals (it is possible given
a lot of time and effort)  There would be only one way to do it.  And a
major clue of how to do it depends on what it looked like initially.

In comes almost modern encryption

Pretend that you had some fantastic device that could figure out how the
crystal breaks and it some how magnificantly tracks every piece of the
crystal, then you throw the pieces into this mystical machine and the
crystal is reassembled.

It would be easy to assume that the device for putting the crystal back
together would be much more difficult then a device for taking it apart,
say a hammer.

This process is nearly-asymmetric.  Although it is much more difficult to
do the reverse it is still possible, and in fact, it is the same process
in reverse as long as you know how it broke although a different
procedure.

An example of this in real life is a door.  The magnificant machine in
this case is something I have, a key.  I put it in the lock and turn,
simple enough, the door no longer opens.  Some nefarious person comes
along and uses some much much more sophisticated device and reverses the
process.  Because what I did is quite difficult to undo without something
I have or know, it is somewhat secure.  This is essentially how modern
algorithms work.

Modern encryption, assymetric processes.

Alright, say I had a very rare piece of software, OpenStep 4.2/i386 and I
wanted to send it to you.  However, you live in some remote jungle where
you can't copy a key.  But I don't want the item to be stolen along the
way.  So I put a lock on the box and send it to you.  You can't open that
lock so in a ridiculous notion, you put another lock on it, one that you
have the key for and send the doubly locked box back to me.  I unlock my
lock but the box is still locked by you.  I send it back, and you unlock
your lock and have the software.
By the same idea, I can come up with some very sophisticated lock
-- one Dr Seuss would be proud to put in a book.  I design it in such a
way so that whenever you lock the lock the lock is designed in such a way
that you need a different key to unlock it.
Ah, this is the asymmetric part -- if someone wanted to unlock it,
reversing what they just did was not enough because it is some mystical
lock that must be unlocked by a different process.  Thus I can give out
these locks and the locking keys freely and say "if you want to send me
anything throw my lock on it and lock it.  I have the only key to unlock
it".
An example of an asymmetric process in nature is a chemical
reaction.  Say I throw two chemicals together and they bond and turn
green.  How would I seperate them?  I definitely can't go in there and
break the bonds by hand...more than likely, I may have to do something
entirely different, say make the chemical some scorching temperature to
get what I started with.  Perhaps I may get three different chemicals as a
result of this.  Then I may have to combine two to get my original two
chemicals

0
Symmetric is where doin

Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread msimons

On Thu, Apr 25, 2002 at 04:23:30PM -0700, Chris McKenzie wrote:
> Also, be aware
> of symmetric versus assymetric processes and processes that require you
> to have something or know something.  Assymetric processes that require
> you to have or know something are usually preferred.

Chris,

  The two sentences above lost me.  Could you explain a little more
what context you are talking about...

I've not heard the phrases:
  "symmetric processes", 
  "assymetric processes", 
  "processes that require you to have or know something"...

  Thanks,
Mike

my spell checker says "asymmetric"
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-25 Thread Chris McKenzie

The most famous e-mail "virus" of the 80's used the assumption that
everyone was using the UNIX elm e-mail client, it was the famous XMAS
tree and was headline news at the time.
Generally speaking, *NIX networking software does not make as many
fundamentally bad assumptions about the users.  For example, in IRC, DCC
auto-receiving of files is easy to enable and the LifeStages.txt.vbs is
rampant.
The main insecurity about a windows system with respect to viruses
is I think two fold:
First, by default, the final extension is hidden of a file.
However, Windows uses this final extension to determine what to do
with the file.

Second, a mere extension changes a file type, so the noun-verb
analogy works well, however, the verb is sometimes ambiguous -- especially
when it cannot be implied.

Although *NIX does not have these inherent security flaws, it does not
mean that a user of this system is generally *safe*.  Watching out for a
virus in a computer is like watching out for sickness in real life.  There
isn't some boxed pill that you buy at a drug store, it is a lifestyle
choice that leads to a healthier life.  Similarly, securing yourself
should be a proactive measure.  Use checksums whenever possible.  Also
choose ssh over telnet when reasonable.  Use sufficiently secure passwords
and know what you are getting into before you get into it.  Also, be aware
of symmetric versus assymetric processes and processes that require you
to have something or know something.  Assymetric processes that require
you to have or know something are usually preferred.

On Wed, 24 Apr 2002, Richard S. Crawford wrote:

> I'm operating under the assumption that while viruses for Linux that
> spread like Windows viruses are very rare, there are still some out
> there.
>
> So, given that, what level of vigilance is necessary against incoming
> viruses in a Linux system?
> --
> Sliante,
> Richard S. Crawford
>
> mailto:[EMAIL PROTECTED]http://www.mossroot.com
> AIM:  Buffalo2K   ICQ: 11646404  Yahoo!: rscrawford
> MSN:  [EMAIL PROTECTED]
>
> "It is only with the heart that we see rightly; what is essential is
> invisible to the eye."  --Antoine de Saint Exupery
>
> ___
> vox-tech mailing list
> [EMAIL PROTECTED]
> http://lists.lugod.org/mailman/listinfo/vox-tech
>

Sincerely,
Christopher J. McKenzie

[EMAIL PROTECTED]
[EMAIL PROTECTED]
(530) 297-6110
609 Anderson 161
Davis, CA

___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-24 Thread msimons

On Wed, Apr 24, 2002 at 10:00:56PM -0700, Micah Cowan wrote:
> On Wed, 2002-04-24 at 21:21, Richard S. Crawford wrote:
> > I'm operating under the assumption that while viruses for Linux that
> > spread like Windows viruses are very rare, there are still some out
> > there.
> > 
> > So, given that, what level of vigilance is necessary against incoming
> > viruses in a Linux system?
> 
> ...Linux has no problems of this sort, for the simple reason that nobody
> has been stupid enough to write mail clients which are capable of
> automatically running executables.

  I'm not sure I agree about open-software developers 'not being stupid
enough to automatically run executables'... from the angle of most 
open-software programs have a few buffer overrun bugs and depending
on exactly how the overrun is arranged many of these are as good as
"execute the following machine instructions for me please", when in the
hands of someone intimately familiar with the target environment.


  There have been a number of bugs in mail handling components which 
translate to automatic stack overflows in the the system.  Bugs in
fetchmail, procmail, and mutt all come to mind.  Although I don't think
any proof of concept demos where created.

  There are also some very user friendly email clients which, may not
ship with the option on but, can be asked to automatically open
files of certain mime-types with a specific program.  If the processing
program (like xpdf, mozilla, etc) has *ANY* stack overflow from input
file style bugs this would also provide an automatic method into
the machine for users of those clients.

  Until all programming switches to a languages or environments which
remove overrun possibilities there will always be a risk.

   Later,
 Mike

(java is *not* the solution... but perl might be ;)
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-24 Thread msimons

On Wed, Apr 24, 2002 at 09:55:22PM -0700, Richard Crawford wrote:
> I'd like to pass this on to another list that I'm on which is discussing
> just this issue.  May I?

Richard,

  Certainly.  

  Please leave my email address and authorship in whatever you forward
so people know who to contact about errors...

Later,
  Mike

> On Wed, 2002-04-24 at 21:47, [EMAIL PROTECTED] wrote:
> > On Wed, Apr 24, 2002 at 09:21:12PM -0700, Richard S. Crawford wrote:
> > > I'm operating under the assumption that while viruses for Linux that
> > > spread like Windows viruses are very rare, there are still some out
> > > there.
> > > 
> > > So, given that, what level of vigilance is necessary against incoming
> > > viruses in a Linux system?
> > 
> > Richard,
> > 
> >   Short answer: don't read email as root, don't open attachments from 
> > email ever, do update your mail handling system from time to time
> > especially if you heard about an exploit in some component you use,
> > and do think before you react to an email.
> > 
> > 
> > Email borne viruses fall into three main categories:
> > 
> > - Vulnerabilities in your mail handing system,
> >   (mail server, fetchmail, procmail, email client, etc...)
> > 
> > Which typically stack overflow problems and should be very rare
> >   and fixed by the upstream maintainers in a heart-beat once found 
> >   (sometimes quietly fixed) however these fixes get a fair amount of 
> >   publicity if found in the wild.
> > 
> > - Vulnerabilities in your attachment processing system or programs,
> >   (mail client auto-open-attachments, mailcap, 
> >openoffice, abiword, gnumeric, etc...)
> > 
> > A mailcap configuration _can_ be extremely dangerous, because you
> >   can elect to do anything you want with a data stream based on it's 
> >   mimetype.  If you pass a outside data stream to a vulnerable program 
> >   with mailcap or even manually you are at risk of any exploits against
> >   that program.
> > 
> > There are a large number of these holes which exist, and some
> >   get created or closed every day.  Basically any program you run 
> >   that can be feed an input file and crashes is a hole should not
> >   be trusted with a mail borne data stream.  Fixes are not generally
> >   well published, as long as you stick to text based email you are safe.
> > 
> > If you are doing mail as your own user the good news is you can
> >   not damage the system, just wipe out the files owned by your user
> >   account.  This is until someone builds a super virus which would 
> >   get initial user access through an application vulnerability then 
> >   run a collection local-root exploits to take over root.  This will
> >   be front page news practically ever where.
> > 
> > - Vulnerabilities in wetware processing the mail,
> >   ("send to all your friends or else", "Make money fast", 
> >"do X and your hair won't fall out"
> >save-to-file/change-to-file/chmod-to-executable/run-[as-root])
> > 
> > There isn't much that can be done about these people, short
> >   of turning on spam filters, education, or execution (depending
> >   on your stance).
> > 
> > TTFN,
> >   Mike
> > ___
> > vox-tech mailing list
> > [EMAIL PROTECTED]
> > http://lists.lugod.org/mailman/listinfo/vox-tech
> -- 
> Sliante,
> Richard S. Crawford
> 
> mailto:[EMAIL PROTECTED]http://www.mossroot.com
> AIM:  Buffalo2K   ICQ: 11646404  Yahoo!: rscrawford
> MSN:  [EMAIL PROTECTED]
> 
> "It is only with the heart that we see rightly; what is essential is
> invisible to the eye."  --Antoine de Saint Exupery
> ___
> vox-tech mailing list
> [EMAIL PROTECTED]
> http://lists.lugod.org/mailman/listinfo/vox-tech
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-24 Thread Richard Crawford

Mike,

I'd like to pass this on to another list that I'm on which is discussing
just this issue.  May I?

Richard


On Wed, 2002-04-24 at 21:47, [EMAIL PROTECTED] wrote:
> On Wed, Apr 24, 2002 at 09:21:12PM -0700, Richard S. Crawford wrote:
> > I'm operating under the assumption that while viruses for Linux that
> > spread like Windows viruses are very rare, there are still some out
> > there.
> > 
> > So, given that, what level of vigilance is necessary against incoming
> > viruses in a Linux system?
> 
> Richard,
> 
>   Short answer: don't read email as root, don't open attachments from 
> email ever, do update your mail handling system from time to time
> especially if you heard about an exploit in some component you use,
> and do think before you react to an email.
> 
> 
> Email borne viruses fall into three main categories:
> 
> - Vulnerabilities in your mail handing system,
>   (mail server, fetchmail, procmail, email client, etc...)
> 
> Which typically stack overflow problems and should be very rare
>   and fixed by the upstream maintainers in a heart-beat once found 
>   (sometimes quietly fixed) however these fixes get a fair amount of 
>   publicity if found in the wild.
> 
> - Vulnerabilities in your attachment processing system or programs,
>   (mail client auto-open-attachments, mailcap, 
>openoffice, abiword, gnumeric, etc...)
> 
> A mailcap configuration _can_ be extremely dangerous, because you
>   can elect to do anything you want with a data stream based on it's 
>   mimetype.  If you pass a outside data stream to a vulnerable program 
>   with mailcap or even manually you are at risk of any exploits against
>   that program.
> 
> There are a large number of these holes which exist, and some
>   get created or closed every day.  Basically any program you run 
>   that can be feed an input file and crashes is a hole should not
>   be trusted with a mail borne data stream.  Fixes are not generally
>   well published, as long as you stick to text based email you are safe.
> 
> If you are doing mail as your own user the good news is you can
>   not damage the system, just wipe out the files owned by your user
>   account.  This is until someone builds a super virus which would 
>   get initial user access through an application vulnerability then 
>   run a collection local-root exploits to take over root.  This will
>   be front page news practically ever where.
> 
> - Vulnerabilities in wetware processing the mail,
>   ("send to all your friends or else", "Make money fast", 
>"do X and your hair won't fall out"
>save-to-file/change-to-file/chmod-to-executable/run-[as-root])
> 
> There isn't much that can be done about these people, short
>   of turning on spam filters, education, or execution (depending
>   on your stance).
> 
> TTFN,
>   Mike
> ___
> vox-tech mailing list
> [EMAIL PROTECTED]
> http://lists.lugod.org/mailman/listinfo/vox-tech
-- 
Sliante,
Richard S. Crawford

mailto:[EMAIL PROTECTED]  http://www.mossroot.com
AIM:  Buffalo2K   ICQ: 11646404  Yahoo!: rscrawford
MSN:  [EMAIL PROTECTED]

"It is only with the heart that we see rightly; what is essential is
invisible to the eye."  --Antoine de Saint Exupery
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-24 Thread Micah Cowan

On Wed, 2002-04-24 at 21:21, Richard S. Crawford wrote:
> I'm operating under the assumption that while viruses for Linux that
> spread like Windows viruses are very rare, there are still some out
> there.
> 
> So, given that, what level of vigilance is necessary against incoming
> viruses in a Linux system?

Viruses for Linux exist, but are rare.  E-mail viruses, as per your
subject line, don't exist at all (yet).  This is because Windows has
default settings which will actively run any scripts embedded in HTML
mail, which means that as soon as you read your email, that embedded
script can run, say, an attached executable with massively destructive
capabilities >:] >:] >:]

...Linux has no problems of this sort, for the simple reason that nobody
has been stupid enough to write mail clients which are capable of
automatically running executables.

However, if you have an attachment which is some sort of script, or is a
file which takes advantage of a buffer overflow, etc. it could still do
damage if you have mailcap settings which will automatically run it or
load it into an insecurely buggy program - that latter, however, is
extremely unlikel - still, with the zlib buffer problem that was
recently discovered, such things are certainly not impossible.  So, the
rule for Linux is basically the same as for Windows:  never view
attachments when you don't know the source.

But, as to Linux viruses in general: the reason they are so rare is that
they are not very effective unless the victim is unusually moronic. 
Because they can only do damage to things over which the victim has
privileges.  If you're an average joe-type user, the best it can do is
wipe out your particular files.  It can't touch anybody elses files, and
can't screw up your system, generally speaking.  Most of the "viruses"
around today aren't really viruses at all - they're trojans, which
require the user to run them as root (or at least a very priveleged
user).  Since root tends to be suspicious (hopefully) of strange
programs, such problems are rare indeed.

-Micah

___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-24 Thread Ryan

Erm, well, that doesn't work right in kmail, but if your email client went by 
mime types, you'd see

[ryan@bob ryan]$ ./diagram.gif
Don't run suspisious attachments!


On Wednesday 24 April 2002 09:45 pm, Ryan wrote:
> You mean like email viruses? They aren't feasable, you'd have to post one
> on a linux mailing list or something to get one passed around.
>
> See the attached diagram for more info.
>
> On Wednesday 24 April 2002 09:21 pm, Richard S. Crawford wrote:
> > I'm operating under the assumption that while viruses for Linux that
> > spread like Windows viruses are very rare, there are still some out
> > there.
> >
> > So, given that, what level of vigilance is necessary against incoming
> > viruses in a Linux system?
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-24 Thread msimons

On Wed, Apr 24, 2002 at 09:21:12PM -0700, Richard S. Crawford wrote:
> I'm operating under the assumption that while viruses for Linux that
> spread like Windows viruses are very rare, there are still some out
> there.
> 
> So, given that, what level of vigilance is necessary against incoming
> viruses in a Linux system?

Richard,

  Short answer: don't read email as root, don't open attachments from 
email ever, do update your mail handling system from time to time
especially if you heard about an exploit in some component you use,
and do think before you react to an email.


Email borne viruses fall into three main categories:

- Vulnerabilities in your mail handing system,
  (mail server, fetchmail, procmail, email client, etc...)

Which typically stack overflow problems and should be very rare
  and fixed by the upstream maintainers in a heart-beat once found 
  (sometimes quietly fixed) however these fixes get a fair amount of 
  publicity if found in the wild.

- Vulnerabilities in your attachment processing system or programs,
  (mail client auto-open-attachments, mailcap, 
   openoffice, abiword, gnumeric, etc...)

A mailcap configuration _can_ be extremely dangerous, because you
  can elect to do anything you want with a data stream based on it's 
  mimetype.  If you pass a outside data stream to a vulnerable program 
  with mailcap or even manually you are at risk of any exploits against
  that program.

There are a large number of these holes which exist, and some
  get created or closed every day.  Basically any program you run 
  that can be feed an input file and crashes is a hole should not
  be trusted with a mail borne data stream.  Fixes are not generally
  well published, as long as you stick to text based email you are safe.

If you are doing mail as your own user the good news is you can
  not damage the system, just wipe out the files owned by your user
  account.  This is until someone builds a super virus which would 
  get initial user access through an application vulnerability then 
  run a collection local-root exploits to take over root.  This will
  be front page news practically ever where.

- Vulnerabilities in wetware processing the mail,
  ("send to all your friends or else", "Make money fast", 
   "do X and your hair won't fall out"
   save-to-file/change-to-file/chmod-to-executable/run-[as-root])

There isn't much that can be done about these people, short
  of turning on spam filters, education, or execution (depending
  on your stance).

TTFN,
  Mike
___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech



Re: [vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-24 Thread Ryan

You mean like email viruses? They aren't feasable, you'd have to post one on 
a linux mailing list or something to get one passed around.

See the attached diagram for more info.

On Wednesday 24 April 2002 09:21 pm, Richard S. Crawford wrote:
> I'm operating under the assumption that while viruses for Linux that
> spread like Windows viruses are very rare, there are still some out
> there.
>
> So, given that, what level of vigilance is necessary against incoming
> viruses in a Linux system?



diagram.gif
Description: Attached diagram


[vox-tech] Linux's Vulnerability to E-mail Viruses

2002-04-24 Thread Richard S. Crawford

I'm operating under the assumption that while viruses for Linux that
spread like Windows viruses are very rare, there are still some out
there.

So, given that, what level of vigilance is necessary against incoming
viruses in a Linux system?
-- 
Sliante,
Richard S. Crawford

mailto:[EMAIL PROTECTED]  http://www.mossroot.com
AIM:  Buffalo2K   ICQ: 11646404  Yahoo!: rscrawford
MSN:  [EMAIL PROTECTED]

"It is only with the heart that we see rightly; what is essential is
invisible to the eye."  --Antoine de Saint Exupery

___
vox-tech mailing list
[EMAIL PROTECTED]
http://lists.lugod.org/mailman/listinfo/vox-tech