Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-15 Thread grarpamp
On Thu, Mar 13, 2014 at 11:13 AM, Jason Iannone wrote: > And remain undetected? That's a nontrivial task and one that I would > suspect generates interesting CPU or other resource utilization anomalies. > It's a pretty high risk activity. The best we can hope for is someone > discovering the exp

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Peter Gutmann
Greg Rose writes: >You get the routers to create valid-looking certificates for the endpoints, >to mount man-in-the-middle attacks. This is relatively easy for home routers, since the self-signed certs they're configured with are frequently CA certs. In other words they ship from the factory in

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Jason Iannone
And remain undetected? That's a nontrivial task and one that I would suspect generates interesting CPU or other resource utilization anomalies. It's a pretty high risk activity. The best we can hope for is someone discovering the exploit and publicly dissecting it. On Thu, Mar 13, 2014 at 8:50

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Greg Rose
You get the routers to create valid-looking certificates for the endpoints, to mount man-in-the-middle attacks. On Mar 13, 2014, at 6:28 , Jason Iannone wrote: > The First Look article is light on details so I don't know how one gets from > "infect[ing] large-scale network routers" to "perform

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Jason Iannone
The First Look article is light on details so I don't know how one gets from "infect[ing] large-scale network routers" to "perform[ing] "exploitation attacks" against data that is sent through a Virtual Private Network." I'd like to better understand that. On Thu, Mar 13, 2014 at 7:22 AM, Jeffre

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Jeffrey Walton
On Thu, Mar 13, 2014 at 9:17 AM, Jason Iannone wrote: > Are there details regarding Hammerstein? Are they actually breaking > routers? Cisco makes regular appearances on Bugtraq an Full Disclosure. Pound for pound, there's probably more exploits for Cisco gear than Linux and Windows combined. Je

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Jason Iannone
Are there details regarding Hammerstein? Are they actually breaking routers? On Thu, Mar 13, 2014 at 2:40 AM, Jeffrey Walton wrote: > On Thu, Mar 13, 2014 at 1:57 AM, coderman wrote: > > > https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pd

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Jeffrey Walton
On Thu, Mar 13, 2014 at 1:57 AM, coderman wrote: > https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf > > "TAO implants were deployed via QUANTUMINSERT to targets that were > un-exploitable by _any_ other means." > And Schneier's Guardian arti

[cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-12 Thread coderman
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf "TAO implants were deployed via QUANTUMINSERT to targets that were un-exploitable by _any_ other means." if you were on this short list of 300 - you were doing something right! --- Snowde