The item I find interesting in all this is one I have not seen
commented on:

        "the FBI implemented a number of backdoors and
         side channel key leaking mechanisms into the OCF, 
         for the express purpose of monitoring the site to 
         site VPN encryption system implemented by EOUSA"

Two things come immediately to mind:

        1. If I legitimately need access to monitor traffic over 
           a VPN I either have access to an endpoint, or I have
           the keys. Or a warrant.
        2. OpenBSD was (is) by this report used by at least one US
           agency. There are lots of other little reports and
           snippets over time that suggest use by many other
           US government agencies.

Therefore, over and above any technical security issues, we have
the allegation that:

        1. An agency is (possibly illegitimately) trying to sniff the 
           traffic of another agency.
        2. To do so, that agency deliberately weakened a tool used 
           by other US government agencies, thereby compromising 
           their security.

I call fantasy. (On the other hand: prove a backdoor, create a
political tempest where OpenBSD's involvement is almost incidental.)

Carson

-- 
Carson Harding - harding (at) motd (dot) ca

Reply via email to