zlacker

Inside the NSA's War on Internet Security

submitted by Fabian+(OP) on 2014-12-28 20:23:23 | 595 points 137 comments
[view article] [source] [links] [go to bottom]
replies(16): >>0x006A+91 >>diafyg+S1 >>pointe+R3 >>revela+95 >>dmix+Y5 >>driver+z6 >>dicroc+67 >>scrapc+J7 >>nsansa+y8 >>nullc+x9 >>misiti+rg >>ck2+zG >>acd+UN >>avz+KR >>marcos+EX >>eyeare+PX
1. 0x006A+91[view] [source] 2014-12-28 20:42:50
>>Fabian+(OP)
There was also just a talk about this at 31C3. Recording is still running, you have to seek back to the beginning: http://streaming.media.ccc.de/relive/6258/
2. diafyg+S1[view] [source] 2014-12-28 20:54:14
>>Fabian+(OP)
THESE DOCUMENTS CONTAIN EVIDENCE OF ATTACKS ON VPN, SSL, TLS, SSH, TOR. What do we do now? No seriously, what do we do?

The full list of documents: http://www.spiegel.de/international/world/nsa-documents-atta...

The accompanying lecture: http://streaming.media.ccc.de/relive/6258/

Also, obligatory: https://eff.org/donate

replies(7): >>Zirro+G3 >>spacef+q4 >>nodata+r4 >>freedu+z4 >>oneway+K5 >>uncleb+Se >>logn+6r
◧◩
3. Zirro+G3[view] [source] [discussion] 2014-12-28 21:28:41
>>diafyg+S1
"What do we do now? No seriously, what do we do?"

In addition to encouraging the NSA (and equivalent agencies in other countries) to change its approach, developers will do what we always do and build new secure protocols and tools with the lessons from previous attempts in mind.

It is a cat-and-mouse game that will never cease.

replies(1): >>jmnico+fu
4. pointe+R3[view] [source] 2014-12-28 21:32:24
>>Fabian+(OP)
In the age of information this is how an overpowered super power gets "nerfed":

By "targeting" its information gathering capabilities by providing information about its activities.

Information is power.

replies(1): >>pointe+GU
◧◩
5. spacef+q4[view] [source] [discussion] 2014-12-28 21:45:08
>>diafyg+S1
One goodie is how they break VPN, inclusive some targets: http://www.spiegel.de/media/media-35515.pdf Airlines: - Iran Air

- Royal Jordanian

- Transaero Airlines

Govs:

- Mexico

- Pakistan

- Turkey

- Afghanistan

Slides 41/42.

replies(2): >>yuhong+Q6 >>selimt+Pb
◧◩
6. nodata+r4[view] [source] [discussion] 2014-12-28 21:45:08
>>diafyg+S1
Let's adopt a new protocol that is less tested! Oh wait, we can't do that. Let's fix what is broken!
◧◩
7. freedu+z4[view] [source] [discussion] 2014-12-28 21:48:32
>>diafyg+S1
Earlier this year at goto copenhagen I heard a good talk by Tim bray:

http://gotocon.com/cph-2014/presentation/Privacy%20and%20Sec...

Where he argues that even though we can not achieve complete security there is great value in raising the bar. If we continuously make it increasingly harder for NSA, MOSAD, GCHQ and the rest of them to spy on us, we can achieve good enough privacy. Where most communication will be secure. But he also argues that if one of these agencies really wants to target YOU specifically they will get to the information. By breaking into your house and installing cameras, if necessary.

replies(3): >>userna+u9 >>ChrisA+Ma >>uncleb+9f
8. revela+95[view] [source] 2014-12-28 22:00:09
>>Fabian+(OP)
I mostly read this thinking "good news". No, seriously, the documents suggest that the NSA hasn't made fundamentally important advances in decryption or uncovered significant weaknesses that academia doesn't know about. Now, that's not too much of a reassurance, because what academia (and the NSA) know is that HTTPS is in pretty terrible state, end-point security remains a significant problem, IPSec is a terrible protocl and so on.

It does raise the question what all the mathematicians are doing at NSA, and why they don't seem to have come up with any meaningful results. Suggests they are a waste of money, but then that's all of the NSA.

I suggest all of you check the original material (powerpoints w/ screenshots). A lot of people here suffer from the action movie mentality where they think the NSA is not like any other government agency, i.e. inefficient, behind the times, filled with horrible middle managers, deadweight, .. you get the idea. Things like the enterprise Java web interface, the CSV mass data export and "genericIPSec_wrapper.pl" can quickly dispel that myth.

replies(6): >>EthanH+L5 >>oneway+W5 >>colord+D6 >>spacef+19 >>higher+q9 >>kchoud+Gf
◧◩
9. oneway+K5[view] [source] [discussion] 2014-12-28 22:11:58
>>diafyg+S1
Why the need to do anything? Do you think the NSA, etc. cares about you? They don't.
replies(2): >>ss03kk+r6 >>dombil+48
◧◩
10. EthanH+L5[view] [source] [discussion] 2014-12-28 22:12:23
>>revela+95
Or at the very least they have compartmentalized serious mathematical cryptanalytic capabilities.

For instance:

* We know that the NSA has a novel md5 collision capability since they have used it in their malware. None of the Snowden docs, that I have seen, have talked about this.

* It is likely based on public research that the NSA can break 1024-bit RSA, but this has not showed up in the documents either.

My personal belief is that we are missing compartments dealing with cryptanalysis because Snowden did not have access to them. His work and access were focused on Computer Network Operations and not cryptanalysis.

replies(6): >>dogma1+a6 >>yuhong+t6 >>tptace+Yd >>xnull2+kl >>erglkj+fq >>Alyssa+oL
◧◩
11. oneway+W5[view] [source] [discussion] 2014-12-28 22:16:05
>>revela+95
It doesn't matter how many mathematicians they have, they can't break good encryption. Unless the NSA has a super secret quantum computer that even Snowden didn't know about...
replies(1): >>dogma1+g6
12. dmix+Y5[view] [source] 2014-12-28 22:16:53
>>Fabian+(OP)
This would be a good time to wait and let security professionals analyze the documents and take what you read in this article lightly, as I've found a number of sensationalist examples.

For example, they claim Canada is monitoring hockey sites:

> Canada's Communications Security Establishment (CSEC) even monitors sites devoted to the country's national pastime: "We have noticed a large increase in chat activity on the hockeytalk sites. This is likely due to the beginning of playoff season," it says in one presentation.

But if you look at the actual slide https://i.imgur.com/2GO8H6L.png, it is clearly a fake sample report of what a real one might look like. It even uses the name 'Canukistan' as the country name.

There are 44 slide decks, one of the biggest leaks so far. It will take time to make sense of the noise. And any misinformation from reporting by non-technical journalists doesn't help the cause.

replies(4): >>nsansa+g8 >>glitch+6g >>combri+SC >>rdl+F61
◧◩◪
13. dogma1+a6[view] [source] [discussion] 2014-12-28 22:20:32
>>EthanH+L5
I would not see any news organizations publishing any leaked document relating to actual technical capabilities. I don't even think that Snowden shared them with the reporters, the only ones who probably seen the besides Snowden are the FSB officers who "debriefed" him once he arrived in Russia. That's actually the thing that worries me the most about this incident, Snowden him self said that he kept the truely "nasty" stuff safe to be released in case something happens to him. But while he might not shared this with the press anyone who thinks he didn't had to buy his freedom in Russia with the full uncensored documents is fooling him self. This means that if he had any operational documents Russia and it's allies (N. Korea, Iran, China) just got a free upgrade to their own computer and communication intelligence apparatus. While people might not like their privacy being violated for the most part the NSA uses it's capabilities against unquestionably bad people, while in places like Russia and Iran it will be used against anything from reporters to political activists with much more severe consequences.
◧◩◪
14. dogma1+g6[view] [source] [discussion] 2014-12-28 22:23:50
>>oneway+W5
Well until 2 Israeli guys "rediscovered" differential cryptanalysis against DES in the late 80's no one knew about it either, no one with the exception of the NSA and the DES working group at IBM that is, even tho to them that weakness was known for almost 2 decades.

Additionally something like an effective attack against AES, RSA, or any other major encryption standard will probably be so compartmentalized that it won't even have a code word.

But on the other hand S31176 refers to a program which provides cryptanalysis against VPN (IPSEC, SSL and more) and it claims that they can decrypt (some of) the traffic. http://www.spiegel.de/media/media-35515.pdf

◧◩◪
15. ss03kk+r6[view] [source] [discussion] 2014-12-28 22:29:00
>>oneway+K5
And when some group which fits your definition of "bad guys" finds the same flaws and uses that to attack "good guys"?
replies(1): >>venoms+r7
◧◩◪
16. yuhong+t6[view] [source] [discussion] 2014-12-28 22:30:22
>>EthanH+L5
It is likely based on public research that the NSA can break 1024-bit RSA, but this has not showed up in the documents either.

It would be expensive though. This is one reason why I consider 1024-bit end entity certificates much less of a threat than 1024-bit CA roots.

replies(2): >>skuhn+4s >>raverb+Lv
17. driver+z6[view] [source] 2014-12-28 22:32:07
>>Fabian+(OP)
Has anyone found which docs say how they attack SSH? The intro slides don't go into any detail. It could just be known SSH-1 vulnerabilities.

My overall impression is that this doesn't reveal any new attacks. They are most likely using known vulnerabilities. For example, they decrypt PSK IPSec by exploiting routers and getting the keys, not breaking the encryption.

replies(1): >>ProfOa+5t
◧◩
18. colord+D6[view] [source] [discussion] 2014-12-28 22:32:56
>>revela+95
Here is yet another example of an unprovoked comment pushed to the top of a forum promoting the idea that three letter agencies like the NSA are incompetent and no better than the public sector at what they do, and that we don't need to worry about them. Go back to bed America, everything is OK.

Just like the rest of the government, the NSA is not a monolithic entity with no separation of concerns. There are people who clean the floor and people who are at the extreme cutting edge of research.

Don't let anyone convince you otherwise.

replies(1): >>revela+27
◧◩◪
19. yuhong+Q6[view] [source] [discussion] 2014-12-28 22:37:07
>>spacef+q4
I wonder what exactly do they use to brute force DES, especially in the PPTP attacks.
replies(1): >>zaroth+H7
◧◩◪
20. revela+27[view] [source] [discussion] 2014-12-28 22:42:42
>>colord+D6
Of course we need to worry about them? Even by what acamedia knows, it's pretty bad right now for security and encryption in practice.

The belief that the NSA is at the extreme cutting edge and just so far ahead is exactly what stops us from making iterative, simple improvements on the technology we use. It's plain unhelpful, and as the data suggests, probably wrong.

(The separation of concerns part is hilarious. Remember, this is the same agency where Snowden managed to wget -r their wiki and various other databases and then go on an extended vacation unnoticed.)

replies(1): >>xorcis+7v
21. dicroc+67[view] [source] 2014-12-28 22:44:03
>>Fabian+(OP)
Domestic spying + Immunity from insider trading laws... It's a good time to be in the government.
replies(2): >>xnull2+Ol >>bostik+lv
◧◩◪◨
22. venoms+r7[view] [source] [discussion] 2014-12-28 22:51:13
>>ss03kk+r6
We have the Sony hack. Although this was like bad guys attacking unpleasant guys.
◧◩◪◨
23. zaroth+H7[view] [source] [discussion] 2014-12-28 22:56:29
>>yuhong+Q6
Something like this: https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-cha...
24. scrapc+J7[view] [source] 2014-12-28 22:58:22
>>Fabian+(OP)
Even though we know that the NSA does collect data on Americans, let's assume that they didn't. By using a network such as a VPN or a Tor Node that is located outside of the United States, would they "legally" be able to use the data collected on you received from those networks as if you weren't an US Citizen?
replies(1): >>Camper+F8
◧◩◪
25. dombil+48[view] [source] [discussion] 2014-12-28 23:05:52
>>oneway+K5
How do you explain the fact that they spend hundreds of millions of dollars just to break these protocols then? Enough with this "NSA doesn't care about you" argument already.
replies(1): >>oneway+39
◧◩
26. nsansa+g8[view] [source] [discussion] 2014-12-28 23:11:39
>>dmix+Y5
> reporting by non-technical journalists doesn't help the cause

non-technical journalists

Ever heard of a certain Jacob Appelbaum?

replies(2): >>acqq+G8 >>sneak+hh
27. nsansa+y8[view] [source] 2014-12-28 23:16:11
>>Fabian+(OP)
The comments that try to reassure the reader seem to have become more frequent. Scary.
◧◩
28. Camper+F8[view] [source] [discussion] 2014-12-28 23:18:02
>>scrapc+J7
No, but that's where the Five Eyes concept comes into play, previously known as ECHELON. The idea is that agencies such as CIA and NSA can work around the limitations imposed by their own charters by cooperating with foreign agencies who have no such prohibitions. Then, the doctrine of parallel construction takes care of any remaining legal hangups.
◧◩◪
29. acqq+G8[view] [source] [discussion] 2014-12-28 23:18:37
>>nsansa+g8
That guy you mention in spite of his very technical background also avoided the technical details and possibly also tried to sensationalize: I was worried as he claimed that the SSH is broken, but it seems that there is no document that states that for the passive capture of the SSH traffic (at least the documents are there and everybody can analyse them).

However we already knew for a while that the active attacks are being done:

http://www.theguardian.com/technology/2014/dec/07/north-kore...

The active attack can of course obtain enough information to decrypt the traffic automatically afterwards or even record it unencrypted. It appears that's the context of the SSH decryption in the documents.

replies(1): >>spacef+W8
◧◩◪◨
30. spacef+W8[view] [source] [discussion] 2014-12-28 23:23:02
>>acqq+G8
When will you guys all wake up? GCHQ does the full take on the cables, and there is no document yet, that claims NSA doesn't.

So, all your sessions are hosed at some point in time. Either now or in the future.

And yes, sensationalize is sometimes necessary to get more folks onboard to work with the documents.

replies(1): >>dmix+f9
◧◩
31. spacef+19[view] [source] [discussion] 2014-12-28 23:25:11
>>revela+95
Also, most docs are from 2012. Who knows what happened since then. There is a reason, they have an army of mathematicians at hand.

I look forward to the day when they walk away from their jobs.

◧◩◪◨
32. oneway+39[view] [source] [discussion] 2014-12-28 23:25:25
>>dombil+48
That's literally their job. You should want the NSA looking into every protocol. What they do if they find weaknesses is a different question.
replies(1): >>dombil+N9
◧◩◪◨⬒
33. dmix+f9[view] [source] [discussion] 2014-12-28 23:30:01
>>spacef+W8
So what if they are stored? There has been a big shift towards using perfect-forward-secrecy as default in the last 18 months.
replies(1): >>spacef+L9
◧◩
34. higher+q9[view] [source] [discussion] 2014-12-28 23:33:31
>>revela+95
SSL was sort of expected. There are tons of bad SSL implementations out there using ciphers with RC4 and SHA1, but I don't think virtually all VPNs being bypassed and decrypted is "good news".
◧◩◪
35. userna+u9[view] [source] [discussion] 2014-12-28 23:34:05
>>freedu+z4
It's Michens' MOSSAD/not-MOSSAD question[1]. Any half-decent encryption will protect you from bulk collection and monitoring, but if you're targeted, you lose.

[1] http://research.microsoft.com/en-us/people/mickens/thisworld...

replies(5): >>peterk+Bj >>merrua+ow >>Interm+Fw >>Jacque+Lw >>throwa+ry
36. nullc+x9[view] [source] 2014-12-28 23:35:57
>>Fabian+(OP)
The fact that they broke some but not all the OTR messages in the log suggests to me that their attack is not a MITM, but instead a compromise of the 1024 bit DH or CTR mode AES.
replies(2): >>tptace+3e >>meowfa+8i
◧◩◪◨⬒⬓
37. spacef+L9[view] [source] [discussion] 2014-12-28 23:40:17
>>dmix+f9
Can't you see the pattern? Take all, break the crypto later. PFS might be next, who knows.

Yes, for now OTR and PGP is fine. There must be a big speculation on future breakthroughs regarding breaking crypto - otherwise they wouldn't build Bluffdale.

Edit: Instead of downvoting, how about taking position?

replies(2): >>acqq+V9 >>tptace+qd
◧◩◪◨⬒
38. dombil+N9[view] [source] [discussion] 2014-12-28 23:40:43
>>oneway+39
I didn't say that's not their job. I'm opposing to what you're saying. Their job is to spy on us, yet you claim they don't care about us. Can you see why I'm confused?

>What they do if they find weaknesses is a different question.

Is it? It's obvious what they're going to do when they find those weaknesses. If they let people know of those weaknesses, they wouldn't be doing their job. Their job is to expose those weaknesses, so they can spy on us and take away whatever we have left, in this case is strong encryption.

replies(1): >>cubano+Ee
◧◩◪◨⬒⬓⬔
39. acqq+V9[view] [source] [discussion] 2014-12-28 23:44:30
>>spacef+L9
It's not that the PFS is known to be broken, it's that it's actually still very rarely used (1)

The present is problematic enough, we don't even need to hypothesize on the future breakages.

1) http://en.wikipedia.org/wiki/Forward_secrecy

"As of December 2014, 20.0% of TLS-enabled websites are configured to use cipher suites that provide forward secrecy to web browsers."

IPSEC is also often configured with the disabled PFS, even if the RFC is from 1998 ( http://tools.ietf.org/html/rfc2412 )

◧◩◪
40. ChrisA+Ma[view] [source] [discussion] 2014-12-29 00:12:51
>>freedu+z4
> If we continuously make it increasingly harder for NSA, MOSAD, GCHQ and the rest of them to spy on us, we can achieve good enough privacy

Right now everyone's digital communications are being collected by those agencies, via fiber optic cable taps [1]. This could be called bulk surveillance. Different people & groups have access to these databases of communications. Some are government employees, some are contractors. Now, what if an activist or a Senator starts speaking out against bulk surveillance? Would those with access to the databases be tempted to run a few queries?

  'SELECT * FROM `sms` WHERE `person_id`="$senator_id"'
Note: Most analysts would never run that query. But it just takes one.

[1] http://www.pbs.org/wgbh/pages/frontline/homefront/interviews...

replies(2): >>cmyr+kf >>karmac+Vl
◧◩◪
41. selimt+Pb[view] [source] [discussion] 2014-12-29 00:34:10
>>spacef+q4
I like how slides 24/25 are basically "No means Yes! Yes means Anal!"
◧◩◪◨⬒⬓⬔
42. tptace+qd[view] [source] [discussion] 2014-12-29 01:15:13
>>spacef+L9
"PFS might be next, who knows"? What does that even mean? OTR and TLS PFS are closely related.
replies(1): >>acqq+Ss
◧◩◪
43. tptace+Yd[view] [source] [discussion] 2014-12-29 01:25:54
>>EthanH+L5
It's plausible based on public research that any well-funded adversary can break 1024-bit RSA. You should assume 1024-bit RSA is simply broken.
replies(1): >>EthanH+8e
◧◩
44. tptace+3e[view] [source] [discussion] 2014-12-29 01:28:46
>>nullc+x9
Do you really think NSA has compromised AES-CTR? That would have to be a pretty fundamental attack, wouldn't it?
replies(2): >>teduna+Lo >>nullc+xy
◧◩◪◨
45. EthanH+8e[view] [source] [discussion] 2014-12-29 01:31:02
>>tptace+Yd
Yes and given that I'm kinda surprised we haven't seen any docs talking about breaking 1024-bit RSA. That should have been their bread and butter, at least as far as DNI is concerned, a few years ago.
replies(1): >>tptace+de
◧◩◪◨⬒
46. tptace+de[view] [source] [discussion] 2014-12-29 01:33:18
>>EthanH+8e
What 'yuhong said: it could be expensive, with NSA having the capability to break only one every couple months. They might need to carefully coordinate which keys they break, in which case it would be an important secret which CA keys were broken.
replies(1): >>xnull2+El
◧◩◪◨⬒⬓
47. cubano+Ee[view] [source] [discussion] 2014-12-29 01:45:13
>>dombil+N9
Their job is to expose those weaknesses

No...their job is to exploit them, not expose.

Big difference.

◧◩
48. uncleb+Se[view] [source] [discussion] 2014-12-29 01:51:30
>>diafyg+S1
>EVIDENCE OF ATTACKS ON VPN, SSL, TLS, SSH, TOR. What do we do now?

This is why advocating for technical defenses alone is doomed to fail. It's great to employ as much technology as we can, but playing cat-and-mouse with our own government is a losing proposition. They are determined and have unlimited resources (read our money plus the printing press).

There needs to be much more pressing on the legal front, such that unwarranted breach of privacy is criminally punishable in very clear ways. If an individual is not the subject of an investigation, for which proper warrants have been obtained, then no records of any kind should be collected or maintained. Full-stop. And efforts to decrypt private communications, etc. should be considered criminal acts. All of this needs to be protected with very clear and robust whistle-blower laws.

Otherwise, thinking that we will deploy some tech to permanently stymie our government is fantasy. And over-focus on that aim tacitly cedes that our government is entitled to whatever it can crack.

◧◩◪
49. uncleb+9f[view] [source] [discussion] 2014-12-29 01:59:48
>>freedu+z4
>If we continuously make it increasingly harder for NSA, MOSAD, GCHQ and the rest of them to spy on us, we can achieve good enough privacy

Good enough privacy is no privacy.

Anyway, this is completely the wrong mindset. This is a legal problem which requires, not pretty good tech, but clear, strict laws, with whistle-blower protection. We have to stop ceding that this is legal or should be legal.

Otherwise, we've already lost.

replies(1): >>derf_+8h
◧◩◪◨
50. cmyr+kf[view] [source] [discussion] 2014-12-29 02:03:53
>>ChrisA+Ma
Although I'm not familiar with the _actual_ operating procedures involved, one would hope/expect this not to be available to lone analysts at their own discretion.
replies(3): >>raintr+4g >>xnull2+Rk >>ChrisA+cl
◧◩
51. kchoud+Gf[view] [source] [discussion] 2014-12-29 02:15:56
>>revela+95
Yeah -- a competent organization would have rewritten genericIPSec_wrapper.pl to genericIPsec_wrapper.rb ages ago!
◧◩◪◨⬒
52. raintr+4g[view] [source] [discussion] 2014-12-29 02:31:08
>>cmyr+kf
I thought the source of some of this data was Snowden's access at his own discretion, with his own keys and others' that he obtained?

I say "some" since Schneier has stated he now considers there to be at least 3 leakers... https://www.schneier.com/blog/archives/2014/08/the_us_intell...

The other two leakers got their information from somewhere, and it could have also included access at their own discretion.

◧◩
53. glitch+6g[view] [source] [discussion] 2014-12-29 02:31:30
>>dmix+Y5
If I didn't know that the government is manipulating social media all the time, I totally would not think you're a shill trying to discredit these news reports by claiming that Jake Appelbaum is a non-technical journalist.

* Revealed: US spy operation that manipulates social media (http://www.theguardian.com/technology/2011/mar/17/us-spy-ope...)

* How Covert Agents Infiltrate The Internet To Manipulate, Deceive, And Destroy Reputations (https://firstlook.org/theintercept/2014/02/24/jtrig-manipula...)

replies(2): >>xnull2+Bk >>teduna+lo
54. misiti+rg[view] [source] 2014-12-29 02:40:05
>>Fabian+(OP)
does anyone know why spiegel leaked these docs - and not greenwald via the intercept?
replies(2): >>xnull2+fn >>noinsi+yq
◧◩◪◨
55. derf_+8h[view] [source] [discussion] 2014-12-29 02:59:35
>>uncleb+9f
Why would laws be sufficient? There are plenty of people who would like to do the same things the NSA would like to do who are not concerned with laws. As Schneier says, "today's top-secret NSA programs become tomorrow's PhD theses and the next day's hacker tools."

Changing economics by deploying more PFS ciphersuites and shifting to technology which requires active attacks instead of passive ones can give real, practical improvements in privacy, even against state actors.

replies(1): >>uncleb+Zk
◧◩◪
56. sneak+hh[view] [source] [discussion] 2014-12-29 03:04:43
>>nsansa+g8
If Jake Appelbaum had any technical credibility, he would have claimed something other than a break in SSH for his talk. :(
replies(1): >>tete+Kj
◧◩
57. meowfa+8i[view] [source] [discussion] 2014-12-29 03:29:24
>>nullc+x9
The impression I got was that the person they were monitoring used OTR for some messages and plaintext for others.
replies(2): >>nullc+qy >>Alyssa+CL
◧◩◪◨
58. peterk+Bj[view] [source] [discussion] 2014-12-29 04:23:50
>>userna+u9
That has to be the best paper I've ever read
replies(1): >>STRML+oq
◧◩◪◨
59. tete+Kj[view] [source] [discussion] 2014-12-29 04:28:01
>>sneak+hh
You might want to look at page 19 and 35:

http://www.spiegel.de/media/media-35515.pdf

Did he actually say break?

replies(1): >>xorcis+ds
◧◩◪
60. xnull2+Bk[view] [source] [discussion] 2014-12-29 04:58:24
>>glitch+6g
Reprising a relevant comment:

The United States and allies do use the internet to spread Western culture and ideas, start revolutions, and kindle insurrection.

The United States CIA attempted (and nearly succeeded) in inciting a revolution against Castro by pretending to be a series of grassroots movements on a Twitter-like platform and by inciting anti-administration feelings within the Cuban population. That was earlier this year.

"USAID effort to undermine Cuban government with fake ‘Twitter’ another anti-Castro failure" [1]

The United States has an ongoing effort to use Internet media to 'deradicalize' the next generation of Middle Easterners and actively manipulates public opinions in Jordan, Cairo, Syria and other Middle Eastern states. Here are some quotes from one DoD MINERVA paper:

"...it is imperative that we develop empirically-based procedures for countering messages that promote violent extremism and anti-Western beliefs..."

"...Neural predictors of Twitter impact in Cairo (UCLA & Egypt). Our prior work (Falk et al., 2012), indicates that neural responses of a small group can predict which persuasive messages will be more successful in mass media campaigns..."

"... Defense Group Inc. already tracks Twitter trends specific to Egypt and will identify which of the selected Twitter topics went on to be highly influential over the next month and which did not..." - Matthew Lieberman, UCLA, September 30, 2012, Department of Defense MINERVA Initiative [2]

Here's one US company that does it. MARAYA MEDIA - "Driving Intelligent Dialog". [3]

The United States engages in targeted mass media and social manipulation to stir dissent in target nations, and to quell dissent where destabilization would hurt policy objectives. The DoD's MINERVA project specifically looks to understand the cultural components of stability of various countries and mechanisms to encourage or disrupt that stability. Among a great number of social studies you will find DoD research on how to seed information inside of specific Asian countries, including China, for the targeted introduction of instability. I will leave speculations of possible connections to the Hong Kong protests to the reader. [4] During the Iraq war US officials were known to detain Iraqi journalists and bloggers and force them to write articles in favor of the American efforts or to spread misinformation useful to ongoing campaigns. The CIA purposefully slipped misinformation into American media outlets to fool counterinsurgents who were reading American media (the infamous "Fallujah PysOp").

This should not come as a surprise given the history of the US: The United States and allies are known to target media in other countries to stir dissent. Radio Free Europe, "Voice of Iraq" (cough American), the Lincoln Group infiltrations and partnerships, etc.

But now with global interconnectedness it is easy to set up 'foreign media', blogs and other politicizing content to influence other nations' populations.

In the past decade it has become a global issue.

This year Egypt sentenced Al Jazeera journalists that they believed were partnered with geopolitical interests of other states. Putin's administration is now requiring bloggers to register if they have a certain number of readers, so that his administration can curtail international influence. China blocks many American services including Facebook and Google. The usual story in America is that they are censoring free speech. The truth is that they do not want foreign influence to destabilize their population and that they do not want their citizen's data in America's PRISM program (there's a reason it's called the FISA "Foreign Intelligence Surveillance Act" court).

The Snowden revelations showed us how intelligence agencies are involved in PsyOps - the term for 'psychological operations' used by the CIA and others. The GCHQ's BIRDSONG/BADGER/GATEWAY/SLIPSTREAM/ETC and partnership with the NSA are used to influence online polls, discussion forums and to vote up and down content that aligns with policy goals. [5][6][7] The giant meta-data graph created by the NSA is also particularly valuable for 'influencer' and 'social contagion' analysis (leaks showed they do use it to understand internal chain-of-command and organization structure for target selection). It's why metadata matters. A nice illustration of this is the article "Finding Paul Revere."

And so we have issues here with the use of targeted social influence in America as well. First there are instances where other countries are trying to incite disruption in the US - the US wants to study and curtail it. [8]

A number of journalists have called out that the state has been extremely aggressive to dissenting opinions, even to go so far as labeling current policy on the issue "War on Journalism". American officials have exported a number of journalists with Middle Eastern descent and journalists like Ayman Mohyeldin have been pulled from Gaza and other conflicts when reporting has erred on the side of other state interests. The crackdown on journalism is worth another post I don't have time to write.

Just look at how central a role controlling internet dialog is for running a modern US presidency. A Google search for "Obama internet campaign" [9] results in headlines "How Obama's Internet Campaign Changed Politics", "How Obama won the internet", "Barack Obama and the Facebook Election", "Propelled by Internet, Barack Obama Wins Presidency" - this isn't because of grassroots discussion but because both Obama and McCain (and Romney before him) had cyber centers in control of internet PR engaging tens of millions of dollars in Twitter messages, etc.

You can nudge public opinion by bombarding them with an influx of the same message, slightly disguised in one way and then another. The MINERVA program has plenty of good reading with regard to this. Anyway, the USG does this overseas and, to a limited degree (you decide how limited) presidential campaigns and journalistic partnerships (anyone want me to write a blurb on that...?) have them doing it inside the United States as well.

[1] http://www.washingtonpost.com/lifestyle/style/usaid-effort-t...

[2] http://minerva.dtic.mil/doc/samplewp-Lieberman.pdf

[3] http://www.marayamedia.com/company.php

[4] https://firstlook.org/theintercept/2014/02/24/jtrig-manipula...

[5] https://firstlook.org/theintercept/2014/02/24/jtrig-manipula...

[6] http://www.theguardian.com/commentisfree/cifamerica/2011/jun...

[7] http://www.dailykos.com/story/2011/02/16/945768/-UPDATED-The...

[8] http://www.washingtonpost.com/opinions/truthy-project-is-unw...

[9] https://www.google.com/?q=obama+internet+campaign

Comment reprised from here: https://news.ycombinator.com/item?id=8709976

replies(5): >>karmac+Il >>dang+tr >>raverb+9u >>vixen9+Px >>honeyb+JH
◧◩◪◨⬒
61. xnull2+Rk[view] [source] [discussion] 2014-12-29 05:06:52
>>cmyr+kf
One can hope. When Binney blew the whistle on the NSA he specifically said that he saw a request for Senator Obama's communications during his time there, as well as other elected officials.
replies(1): >>ChrisA+9l
◧◩◪◨⬒
62. uncleb+Zk[view] [source] [discussion] 2014-12-29 05:10:47
>>derf_+8h
>There are plenty of people who would like to do the same things the NSA would like to do

My comment was specifically with regard to the NSA, as is the topic of this article.

Certainly the NSA should be concerned with laws, and laws should be sufficient.

replies(1): >>olifan+5b1
◧◩◪◨⬒⬓
63. ChrisA+9l[view] [source] [discussion] 2014-12-29 05:16:54
>>xnull2+Rk
Was that Binney or Tice?
replies(1): >>xnull2+el
◧◩◪◨⬒
64. ChrisA+cl[view] [source] [discussion] 2014-12-29 05:18:18
>>cmyr+kf
> Although I'm not familiar with the _actual_ operating procedures involved

Their official line is that the data isn't being collected, correct?

◧◩◪◨⬒⬓⬔
65. xnull2+el[view] [source] [discussion] 2014-12-29 05:18:31
>>ChrisA+9l
It was Tice. My mistake. Thank you for the check.
◧◩◪
66. xnull2+kl[view] [source] [discussion] 2014-12-29 05:22:25
>>EthanH+L5
Appelbaum also mentioned they have advanced crypt-analytic capabilities against AES, but the evidence right now supports that these advances are not enough to break AES in the general case.
replies(1): >>Michae+Bw1
◧◩◪◨⬒⬓
67. xnull2+El[view] [source] [discussion] 2014-12-29 05:33:46
>>tptace+de
Do you think that the NSA would bother breaking CA keys? We know that they have shadow certificates and have much success infiltrating CAs to steal their keys and that they have been able to forge them without having to break the keys (via the previously unknown MD5 collision - as they did for Stuxnet. Seems to me like there are more valuable certs to go after (diplomats' certs, smartcard certs, OS update certs, ...).
replies(1): >>spacef+Yr
◧◩◪◨
68. karmac+Il[view] [source] [discussion] 2014-12-29 05:36:04
>>xnull2+Bk
All of this makes seems and is well sourced. But there is a huge difference between inciting revolutions that are beneficial to the US in foreign countries, one of the stated purposes of the intelligence community, and "shilling" comments on hackernews or reddit. Covert US involvement in swaying public opinion against opposing ideologies is a proud tradition that goes back to at least the 1930s and beyond. Using social media is just an extension of that. Most of the sources you provided are about creating fake social media sites to be used in foreign countries or broad discussions about psychological influence techniques that mention social media. There are no detailed plans that mention hackernews, reddit or any other online social news aggregator. It would be incredibly costly for the NSA to have agents posting pro-government comments on every thread that pops up on the hundreds of online tech communities and I don't see how they would benefit from it in any way. The idea is frankly laughable.

It's fun to think that we're so important that the US government cares enough to intervene in our political discussions. But we are not, not a single one of us. If pg himself called for open insurrection in his next essay, no one in the NSA would lift an eyebrow or raise a finger. Until this or any community becomes known as a hotbed for muslim extremism or communist agitation we're simply not on the radar in any way. As far as hackernews and reddit are concerned, "shill" is a synonym for "someone who disagrees with me" and always will be.

replies(4): >>xnull2+Lm >>logn+Ip >>logfro+0Z >>razste+Ab1
◧◩
69. xnull2+Ol[view] [source] [discussion] 2014-12-29 05:38:44
>>dicroc+67
You got downvoted. I think people have forgotten "Team Themis", HBGary and JPMorgan Chase.
◧◩◪◨
70. karmac+Vl[view] [source] [discussion] 2014-12-29 05:44:36
>>ChrisA+Ma
FWIW, if I were a senator who was considering taking on the intelligence community I would probably think it through and have my house in order first. Politicians aren't known for being tech savvy, but they aren't known for being stupid either. People took on McCarthy, Hoover and Nixon and they survived.

Most people here don't have a lot of faith in our system of government these days and even less faith in those that do the governing. But the truth is that the american democracy has been around for hundreds of years and it will take more than a SQL statement to bring it down. There are checks and balances and highly motivated and intelligent people with a lot to lose on both sides of every issue. This too shall pass.

replies(1): >>ChrisA+Pn
◧◩◪◨⬒
71. xnull2+Lm[view] [source] [discussion] 2014-12-29 06:11:14
>>karmac+Il
We do know that the United States Government and allies manipulate both foreign and domestic press.

I agree with the sentiment that this does not imply reddit or hackernews are subject to influence by the United States Government or allies.

I do not agree that the idea is preposterous or laughable. This is because we do know that the NSA infiltrates domestic technical groups as they did with the IETF to affect standards discussions, that they infiltrate activist groups inside the United States to disrupt them, that they are aware of social contagion theory and its usefulness in affecting public opinion, that they have done studies with at least the UCLA on viral messaging for Americans (to compare to, with and against foreign countries), that political campaigns use social targeting techniques without branding and will comment on news articles (to be 'first to post') to color conversation on hot button issues during the races, and that companies with political interests and who share a revolving door with elected office also advertise political discourse online in this way. Thinkst researchers studied how easy it is to manipulate online social conversation, news media outlets and platforms. We know that the GCHQ have JTRIG capabilities to perform internet manipulation and that there are documents from Snowden that specifically mention their use in derailing conversations on online forums. There have been reports of PR firms of private companies astroturfing reddit and others. And we know that HBGary Federal and other cyberoperations contractors for the US Government sell astroturfing services.

What we don't know is that reddit or hackernews are targeted specifically or for domestic purposes by the US Government. We have a few indications that this is done for large media outlets (recently Judith Miller, Ken Dilanian, CNN on Bahrain) in tandem with other leverage like access to officials, exclusive press passes and permission to report at the edges of no-reporting zones. Unfortunately there isn't enough evidence to be conclusive yet about the reddit/HN case as there have not been leaks that speak directly about it, so any debate in this area is bound to be speculation versus speculation.

◧◩
72. xnull2+fn[view] [source] [discussion] 2014-12-29 06:24:20
>>misiti+rg
Doesn't Der Speigel have access to different documents and a second leaker? Or are these also Snowden documents?
◧◩◪◨⬒
73. ChrisA+Pn[view] [source] [discussion] 2014-12-29 06:57:35
>>karmac+Vl
> I would probably think it through and have my house in order first

The bulk collection has been going on for at least a decade now.

> Politicians aren't known for being tech savvy, but they aren't known for being stupid either.

I've observed politicians get away with certain behaviors, to a point. For example, Eliot Spitzer, or Bill Clinton. Once they become a target, their trespasses aren't necessarily forgiven.

> This too shall pass.

The Snowden revelations are "The Jungle" of our time. We'll adapt to these issues. Still, our adaption won't be free, and a proactive attitude will benefit us.

replies(1): >>logfro+001
◧◩◪
74. teduna+lo[view] [source] [discussion] 2014-12-29 07:11:52
>>glitch+6g
So what you're saying is that Canada really is monitoring hockey fans in Canukistan?
replies(2): >>nsansa+5p >>brymas+uq
◧◩◪
75. teduna+Lo[view] [source] [discussion] 2014-12-29 07:27:50
>>tptace+3e
I have little doubt they have compromised some system that reuses keys or nonces (or fails to increment the counter :)). If I were making a powerpoint to brag to my bosses, I would definitely put that on a slide.
◧◩◪◨
76. nsansa+5p[view] [source] [discussion] 2014-12-29 07:42:00
>>teduna+lo
What he's saying is: We are being pushed into a total surveillance state without a democratic vote, which means it is not normal to say "don't worry, go back to sleep" unless you're being paid to say that.

(But I guess you knew that already.)

replies(1): >>teduna+Bs
◧◩◪◨⬒
77. logn+Ip[view] [source] [discussion] 2014-12-29 08:10:19
>>karmac+Il
You're splitting hairs here. Yes, I don't recall a leak specifically stating "we have sock puppets on US social media sites" however there have been documents leaked describing high level tactics which might logically include US sock puppetry.

Additionally, domestic US propaganda is now legal:

https://www.techdirt.com/articles/20130715/11210223804/anti-...

Further, sock puppetry is an established tactic:

http://www.theguardian.com/technology/2011/mar/17/us-spy-ope...

http://mashable.com/2011/03/17/centcom-social-media-personal...

http://www.fbodaily.com/archive/2010/06-June/24-Jun-2010/FBO...

So the only question is, specifically which sites are targeted and to what ends. If the metadata shows that HN or your favorite sub-reddit has out-sized influence on matters of national concern, then they're probably targeted.

◧◩◪
78. erglkj+fq[view] [source] [discussion] 2014-12-29 08:37:57
>>EthanH+L5
It is about economics. The attacks on crypto systems have complexities, and still at the end of the day they require things like raw calculation power. Could they break even single 16384-bit RSA key pair? Probably yes, but they wouldn't be doing anything else on that year. It would be simply way too uneconomical.

Presented by Spiegel are internal services that are designed on purpose to be more economical. They exploit more bad implementations. It doesn't really matter as long as the dirty tricks get the work done.

Also, NSA seems to troll for targets from the vicinity of their targets of interest. It is again more economical, and can be just as revealing. The risk there is that the broken target has nothing of use. The real movie style "let's break the encryption keys" stuff is done for sure targets when they get the extremely rare high value target on platter.

replies(1): >>ryan-c+dN
◧◩◪◨⬒
79. STRML+oq[view] [source] [discussion] 2014-12-29 08:40:02
>>peterk+Bj
I thought you were joking, but I had to click anyway. You're right, this paper is fantastic. I thought Micken's stopped writing, I'm so glad he didn't.
◧◩◪◨
80. brymas+uq[view] [source] [discussion] 2014-12-29 08:41:02
>>teduna+lo
Your sarcastic and denialist schtick got old about a year ago:

https://news.ycombinator.com/item?id=6469701

https://news.ycombinator.com/item?id=6360115

◧◩
81. noinsi+yq[view] [source] [discussion] 2014-12-29 08:42:28
>>misiti+rg
They were released by Jacob Appelbaum and Laura Poitras who did a 3C31 talk about this too.
◧◩
82. logn+6r[view] [source] [discussion] 2014-12-29 08:52:04
>>diafyg+S1
I do not have confidence in an engineering fix. Fixes will be broken. It's possible to use encryption to thwart marketers or cyber-crime rings, but we'll never have a sustainable edge on intel agencies without policy changes.

That said, better encryption will raise the cost of NSA's surveillance which might eventually lead to policy reform (when budget hawks are forced to act). And it might mean their dragnets have to be more targeted which could slow the expanding the definition of "terrorist".

I think the most effective actions would be to make the public outraged over cracked encryption and surveillance. And even with all these leaks, that hasn't happened IMO (debatable I know). Outrage would happen if people understood how this has real-life effects. Storytelling is what's needed, not white-papers and tech blogs.

edit: wanted to add that Bruce Schneier gave an excellent talk on the topic of your question, https://www.youtube.com/watch?v=3v9t_IoOgyI

replies(1): >>jmnico+Ut
◧◩◪◨
83. dang+tr[view] [source] [discussion] 2014-12-29 08:59:03
>>xnull2+Bk
> Reprising a relevant comment

Please don't reprise comments on Hacker News. This is a place for conversation, not boilerplate.

(Just to be clear, your other comments are part of the conversation and are thus fine.)

◧◩◪◨⬒⬓⬔
84. spacef+Yr[view] [source] [discussion] 2014-12-29 09:14:59
>>xnull2+El
So many "diplomats' certs" are used in machines by Crypto AG from Switzerland. And guess what, they had one major incident years ago - and even people working there have simply no clue who owns and control the company.

I'd say most of commercial crypto systems are rigged. https://pbs.twimg.com/media/B5-aW_8CEAAUzji.jpg:large

replies(1): >>EthanH+tC
◧◩◪◨
85. skuhn+4s[view] [source] [discussion] 2014-12-29 09:20:33
>>yuhong+t6
I don't totally agree. I think that factoring in the risk of exposure leaves a CA root with a worse price / performance ratio versus an individual cert.

While you could use a faux CA root to sign faux certs for any site you want (ideally ones who are customers of that CA), in practice your use is severely limited. If faux certs are spotted and no one knows where they came from, suspicions are going to be raised. Not only is your faux CA root compromised, but now you may have tipped your hand regarding your capabilities.

To limit that possibility, your attacks would have to be extremely targeted. The more often a fake cert is used and the more people exposed to it, the higher the likelihood that someone will notice what is going on.

It also doesn't help you decrypt the real traffic to the site, or historical traffic, which busting the site's actual SSL key can yield. This presumes that you have a way of intercepting said traffic, but I think it's pretty clear that that is not out of the question (public wifi / ISP cooperation / fiber optic taps / malware). It's more work to bust individual certs, but you're leaving a smaller trail and you aren't sending out examples of your RSA cracking capabilities to your opponents over the public Internet.

Lowering the risk of exposure will let an attacker use the same methods over a much longer period of time, which I think is the goal here.

As to how to combat this: there is a lot of low hanging fruit. Besides the obvious, I would love to see much shorter expiration times for certs become the norm (as in weeks, if not days). For this to realistically happen in a widespread fashion, at minimum CAs need to embrace the concept from a pricing perspective.

replies(1): >>yuhong+gG1
◧◩◪◨⬒
86. xorcis+ds[view] [source] [discussion] 2014-12-29 09:23:47
>>tete+Kj
No, he did not say break in his talk. He said something along the lines of "at one point, the NSA mentions SSH together with SSL and IPsec as technologies which there are methods against" which could mean just about anything. They could break into the host and steal the host keys for example, without having to do costly cryptanalysis.

But the moment he breathed SSH, pretty much all of IRC and the whole Saal 1 could not think of anything else. Everyone and their brother wanted to know what to use instead of SSH now that it's broken. It was a bit of panic in the air.

My suggestion is to go to the leaked slide and make your own conclusions. There are among the most credible people we have behind openssh and the crypto primitives are used in a very straightforward way.

replies(1): >>Alyssa+cK
◧◩◪◨⬒
87. teduna+Bs[view] [source] [discussion] 2014-12-29 09:35:40
>>nsansa+5p
I don't think dmix was quite saying "go back to sleep." My concern is that "The NSA also has a program with which it claims it can sometimes decrypt the Secure Shell protocol (SSH)." (something I'm very much interested in) is in the very next paragraph. And still part of the "Hockey sites monitored" section (why??).

Do I take the ssh claim seriously? Do I just pretend the hockey monitoring paragraph isn't there?

Perhaps I should read the source for myself. http://www.spiegel.de/media/media-35515.pdf

Alas, there's very little in the way of detail. There's exactly one slide (19) dedicated to ssh, which says it can "potentially recover usernames and passwords." That would adequately describe a simple mitm attack where somebody either accepts an unknown server key or uses a client that doesn't even check (e.g. Prompt for iOS). Slides 35 and 36 mention ssh and decryption, but it sounds like they're talking about further processing after decryption. How is that decryption being done?

replies(2): >>acqq+Rt >>cpach+o81
◧◩◪◨⬒⬓⬔⧯
88. acqq+Ss[view] [source] [discussion] 2014-12-29 09:39:32
>>tptace+qd
Even when the PFS is configured, the defaults can be faulty:

https://www.imperialviolet.org/2013/06/27/botchingpfs.html

"I'm not aware of any open source servers that support anything like that."

The article is from June 2013, has anything changed since?

replies(1): >>tptace+bX
◧◩
89. ProfOa+5t[view] [source] [discussion] 2014-12-29 09:43:53
>>driver+z6
In the talk they say that the papers only suggest that it can be broken into.
◧◩◪◨⬒⬓
90. acqq+Rt[view] [source] [discussion] 2014-12-29 10:01:16
>>teduna+Bs
We have one real "case study":

https://firstlook.org/theintercept/2014/12/13/belgacom-hack-...

Active attacks allow access to the keys, and once the attackers have the keys, unless the PFS is properly used, the old captured streams are readable. But often it's even easier to read the documents on the attacked machine directly.

Still, all this was known before the material we comment now. Which doesn't mean we should let PFS remain unused or wrongly used as it is now and that we shouldn't try to protect us from the active attacks.

If we worry about the decryption of our SSH traffic, do we properly use PFS? What do we do to prevent or detect active attacks?

◧◩◪
91. jmnico+Ut[view] [source] [discussion] 2014-12-29 10:03:33
>>logn+6r
"cracked encryption" is not the problem, after all it's their job to do it. The problem is that they use it to listen on non legitimate targets like random civilians.
◧◩◪◨
92. raverb+9u[view] [source] [discussion] 2014-12-29 10:07:35
>>xnull2+Bk
There is an EXTREMELY THIN LINE between "sponsored dissent" and "spontaneous dissent"

Shutting down opposing dissent usually means that all your press is now only good as toilet paper (like the Pravda in Cuba)

"inciting anti-administration feelings within the Cuban population"

So, the population love the Castro administration then? And whoever opposes is an US shill, sure...

◧◩◪
93. jmnico+fu[view] [source] [discussion] 2014-12-29 10:10:08
>>Zirro+G3
Sure but their job is infinitely easier than ours : they have the resources, unity and will to breach us.

We are a bunch of disorganized folks with no budget and with no agreed goal on what is the best way to achieve this.

Also in defense you have to protect all the walls, in attack you just have to breach one.

I'm not saying we should do nothing, but that they will almost always be several steps ahead of us.

replies(1): >>razste+Dg1
◧◩◪◨
94. xorcis+7v[view] [source] [discussion] 2014-12-29 10:31:16
>>revela+27
The only data we have points to that the NSA is ahead of the academic community, from differential cryptanalysis onwards.
◧◩
95. bostik+lv[view] [source] [discussion] 2014-12-29 10:38:59
>>dicroc+67
To give some credence to your comment about insider trading immunity, I performed a quick search. (My guess is that you got downvoted for not providing any evidence to support your, arguably acerbic and snarky, comment.)

http://www.forbes.com/sites/kylesmith/2011/06/01/insider-tra...

The money quote: "There is no limit to how much money you can earn on insider trading in the House or Senate. Lawmakers and their staffers are specifically exempted."

While I would consider it unlikely that NSA feeds senators with free stock market tips, the members of the oversight committee are sure to have an extensive advance view to foreign (and domestic) market-changing intelligence. There has been systematic resistance to reforms - the members probably consider making a quick and safe half-million on the stock market a necessary perk of the job.

◧◩◪◨
96. raverb+Lv[view] [source] [discussion] 2014-12-29 10:50:27
>>yuhong+t6
"Expensive"

With public funding, lots of hardware and expert math/algorithm experts, it's less expensive

That is, even if the generated key-pair is really 1024-bit strong (and doesn't have any biases known by them)

◧◩◪◨
97. merrua+ow[view] [source] [discussion] 2014-12-29 11:13:13
>>userna+u9
That was fun. I'm going to read all the rest of his stuff now. Thats dangerous linking, username223.
◧◩◪◨
98. Interm+Fw[view] [source] [discussion] 2014-12-29 11:20:51
>>userna+u9
Wow, I think Mickens may oversimplify a few points for comedic effect, but that is a wonderful read!
◧◩◪◨
99. Jacque+Lw[view] [source] [discussion] 2014-12-29 11:23:07
>>userna+u9
Amazing
◧◩◪◨
100. vixen9+Px[view] [source] [discussion] 2014-12-29 11:56:28
>>xnull2+Bk
'spread(ing) Western culture and ideas'? Would you care to expand on that? You presumably disapprove.
◧◩◪
101. nullc+qy[view] [source] [discussion] 2014-12-29 12:13:17
>>meowfa+8i
One normally does not turn off OTR in the middle of a conversation.
◧◩◪◨
102. throwa+ry[view] [source] [discussion] 2014-12-29 12:14:03
>>userna+u9
here's another i read some time ago

https://www.usenix.org/system/files/1309_14-17_mickens.pdf

i don't know how he gets paid to write these. perhaps as class clown for the fine folks at microsoft research? in any case, very amusing.

replies(1): >>userna+ef1
◧◩◪
103. nullc+xy[view] [source] [discussion] 2014-12-29 12:16:42
>>tptace+3e
I am not trying to draw any conclusions. Just exploring what the data seems to support.

Another alternative (mentioned on otr-dev) is an implementation which uses a low quality rng feeding the ECDH might result in some messages being recoverable and others not.

An attack on CTR would indeed be pretty fundamental. Though some of the other documents appeared to support some level of cryptanalysis capability against some implementations of at least some symmetric ciphers.

replies(1): >>tptace+xQ
◧◩◪◨⬒⬓⬔⧯
104. EthanH+tC[view] [source] [discussion] 2014-12-29 13:43:18
>>spacef+Yr
I've been interested in Crypto AG for many years and would like to know more. Do you have a source that Crypto AG is still used to store certs that diplomats use?

I guess there is this: http://www.crypto.ch/en/solutions/crypto-secure-diplomatic-m...

◧◩
105. combri+SC[view] [source] [discussion] 2014-12-29 13:49:22
>>dmix+Y5
New attack against AES? - The Tau statistic:

From the Spiegel article: "Electronic codebooks, such as the Advanced Encryption Standard, are both widely used and difficult to attack cryptanalytically. The NSA has only a handful of in-house techniques. The TUNDRA project investigated a potentially new technique -- the Tau statistic -- to determine its usefulness in codebook analysis."

replies(1): >>lstamo+Z41
106. ck2+zG[view] [source] 2014-12-29 14:48:47
>>Fabian+(OP)
As a google security engineer once said, "f-ck these guys"

According to an NSA document, the agency intended to crack 10 million intercepted https connections a day by late 2012.

By the end of 2012, the system was supposed to be able to "detect the presence of at least 100 password based encryption applications" in each instance some 20,000 times a month.

◧◩◪◨
107. honeyb+JH[view] [source] [discussion] 2014-12-29 15:07:16
>>xnull2+Bk
See www.corbettreport.com for more information (and the way out of the Matrix). I think I'm shadowbanned already, but maybe you'll see this anyway.
◧◩◪◨⬒⬓
108. Alyssa+cK[view] [source] [discussion] 2014-12-29 15:40:31
>>xorcis+ds
They talk about decrypts of SSH tunnelling as a "potential", if they can later steal the keys. SSH, I note, does have an RSA-based key exchange as well as its usual Diffie-Hellman: if their targets have been using plain RSA, that would make an attacker's life easier for historical decrypts! Based on their typical methodology, I think that is probably what they are talking about, because they mention stealing IPsec pre-shared keys from router configurations in a very similar context.

Of course, all we have is a probably - this selection of documents is not anywhere near as comprehensive as we'd perhaps like here. We're having to fill in the blanks - and there's too many blanks to fill in clearly. There seems to be relatively little in this leak from NSA's PICARESQUE/PIEDMONT, or GCHQ's STRAP3 (which covers specific operational details: purely by way of hypothetical example :-), where individual full-take feed taps actually are in Telehouse North, or specific details about SIGINT enabling via the Cavium Nitrox chips), sadly. Alternative ideas (or leaks!) are welcomed.

Recent versions of OpenSSH have using some non-NIST primitives from djb, including Curve25519-SHA256 key exchange, Ed25519 keys and ChaCha20-Poly1305 transports. I am quite confident neither NSA nor GCHQ have any good cryptanalytic attacks against those primitives.

There is mention of some exploitation against finite-field Diffie-Hellman in TLS (PHOENIX). That lacks context, however, and we can only guess about what's missing. One possibility is it's an active attack which tricks the peers into agreeing keys over an unsafe field (TLS 1.2 has no way to date for peers to suggest or agree on lists of named fields; however, the recent ffdhe draft does provide one) - however active attacks don't really fit the context under discussion in the slides. The TLS Working Group at IETF is currently discussing this, and a suggestion's been made to remove the old finite-field DHE transports due to their poor performance and apparent vulnerability, replacing them with ECDHE over secp256r1 (a NIST curve), and quite possibly in the near future X25519 over Curve25519 (a non-NIST curve). I don't know how that's going to resolve yet.

replies(1): >>pbsd+mM
◧◩◪
109. Alyssa+oL[view] [source] [discussion] 2014-12-29 15:58:52
>>EthanH+L5
That, at least, is the case. Specific operational cryptanalytic capabilities are indeed in separate compartments: PICARESQUE, PIEDMONT; focus on PAWLEYS for backdoors in, say, routers. GCHQ use STRAP3 protection measures for their CRYPTO compartments in CESG.

As a sysadmin, Snowden basically had root, and probably had access to pretty much everything that wasn't thoroughly airgapped. However, very few computing resources would have been cleared for that Exceptionally Compartmented Information. The documents he gathered were focused more on activities like mass surveillance and standard undermining, that he sought to blow the whistle on, rather than their targeted cryptanalytic capabilities in general.

640-bit RSA could be broken essentially in real-time by the computing resources available to GCHQ a couple years ago. Of course, they don't actually have to work in real-time, so I suspect that 1024-bit RSA is entirely within their capabilities currently, given that. Diffie-Hellman is slightly harder, but if they're prepared to throw some in the bin or lag behind, they can probably do it, but that's just guesswork.

◧◩◪
110. Alyssa+CL[view] [source] [discussion] 2014-12-29 16:00:38
>>meowfa+8i
I believe this is correct.
◧◩◪◨⬒⬓⬔
111. pbsd+mM[view] [source] [discussion] 2014-12-29 16:10:25
>>Alyssa+cK
That TLS thread is nonsense. Take Dan Boneh's latest TLS survey paper [1], and notice that 34% (!) of DHE-supporting servers still support 512-bit ephemeral primes, and virtually every server defaults to 1024 bits. Who needs fancy new cryptanalysis?

Removing DHE is a mistake. The discrete log in prime fields is fine---as fine as RSA is, anyway---and it's a handy PFS backup in the (unlikely) case deployed elliptic curves turn out to be significantly wounded.

[1] http://www.w2spconf.com/2014/papers/TLS.pdf

replies(1): >>Alyssa+6S
◧◩◪◨
112. ryan-c+dN[view] [source] [discussion] 2014-12-29 16:22:09
>>erglkj+fq
> Could they break even single 16384-bit RSA key pair? Probably yes

There is no known algorithm that can break a properly generated RSA key of that size - the work required with GNFS is equivalent to brute forcing a symmetric key of something like 280 bits. Anything that could do that should be able to break even 4096 bit RSA keys (~144 bit security) pretty much instantaneously, and their problems with PGP pretty heavily imply they cannot do that.

113. acd+UN[view] [source] 2014-12-29 16:29:49
>>Fabian+(OP)
Most proprietary and mainstream software and protocols are insecure. If you care about your security use open source and open standards so that security professionals can test and verify its security.

Skype insecure Cloud email popular ones used by end users insecure Whatsapp insecure Facebook messenger insecure Email insecure Dropbox insecure

So in conclusion they are tapping into mainstream communication channels, its their job.

People have become a bit lazy with cloud solutions and proprietary software because of their fast setup and convenience. People pay with their privacy for the convenience/laziness.

replies(1): >>edrafe+cU
◧◩◪◨
114. tptace+xQ[view] [source] [discussion] 2014-12-29 17:00:24
>>nullc+xy
Can you think through a scenario in which CTR could be broken? CTR, in particular. What's a hypothetical here?
replies(1): >>nullc+oa3
115. avz+KR[view] [source] 2014-12-29 17:16:31
>>Fabian+(OP)
One topic I find missing from the privacy and security debate following Snowden's revelations is an explicit consideration of the adequate threat model.

If the public thinks that the most prominent attackers on their privacy, security or identify are the best founded intelligence agencies on the planet, then the likely outcome will be grumpy resignation and consequent failure to protect against more mundane (and more likely) threats. Security and encryption are considered difficult and tricky. Even for software engineers. Raising the bar by highlighting the scale of resources of the most competent attackers is counterproductive.

I think a practical threat model for an average internet user should highlight cyber-criminals, accidental misconfiguration, and careless handling of private information. Not NSA or GCHQ.

Edit: The discussion of mischief by NSA and GCHQ belongs to the debate on public oversight of government agencies. The article above is about using encryption on the internet.

◧◩◪◨⬒⬓⬔⧯
116. Alyssa+6S[view] [source] [discussion] 2014-12-29 17:18:55
>>pbsd+mM
I know, right? Chilling. I could crack those (the 512-bit ones, anyway). Why on earth would we want to keep those around?

Your first sentence seems to me like an excellent reason to remove DHE altogether from TLS 1.3, considering those servers do not support, and presumably may never support, (the draft) Finite Field DHE parameter negotiation.

Discrete log in prime fields does have the index calculus problem; it won't keep being good forever, and the performance gets worse. I'm banking on having enough different backup between ECDHE over secp256r1 and X25519 over Curve25519 that any elliptic curve difficulty won't be a problem.

replies(1): >>pbsd+hX
◧◩
117. edrafe+cU[view] [source] [discussion] 2014-12-29 17:41:53
>>acd+UN
WhatsApp's recent integration of TextSecure [1] makes it one of the most secure communication options available to lay users. The vast majority of people simply can't manage without hosted tools. This lack of sophistication shouldn't damn them.

[1] https://whispersystems.org/blog/whatsapp/

◧◩
118. pointe+GU[view] [source] [discussion] 2014-12-29 17:47:40
>>pointe+R3
Anyone care to explain why the downvotes? I still think all this revelations will lead to a more balanced state of affairs.
◧◩◪◨⬒⬓⬔⧯▣
119. tptace+bX[view] [source] [discussion] 2014-12-29 18:16:37
>>acqq+Ss
Most sites that enable PFS do so with solid ECDH. It's hard to find PFS configuration guidelines that will give you breakable conventional DH groups.

The latter half of AGL's post is about systems security, not (really) the cryptographic security of TLS. It's about things you can do that would make NSA owning up your servers a greater or lesser threat to previously encrypted TLS sessions.

◧◩◪◨⬒⬓⬔⧯▣
120. pbsd+hX[view] [source] [discussion] 2014-12-29 18:17:58
>>Alyssa+6S
When I say DHE, I mean finite field DH in general; I have no beef with replacing the old TLS DHE mechanism by the one from the ffdhe draft, with curated prime fields to work with.

Index calculus. Over prime fields it has seen essentially no major progress (beyond small complexity tweaks, some of which are useful) since 1992 with the number field sieve. Index calculus also exists for elliptic curves, under some conditions: once again, over prime fields things seem fine (modulo MOV, anomalous, etc curves). I suspect we will also have to drop RSA if the index calculus for prime field discrete logs ever improves significantly. Likewise, some efficient attack against P-256 or curve25519 has a good chance to eliminate most or all curves in that size range.

121. marcos+EX[view] [source] 2014-12-29 18:24:27
>>Fabian+(OP)
Ok, now that I've finally read the slides. They take usernames and passwords out of SSH.

People, if the private botnets didn't made you disable password authentication already, do it for the NSA.

122. eyeare+PX[view] [source] 2014-12-29 18:26:47
>>Fabian+(OP)
It makes you wonder if the NSA/five eyes is actively working to keep topics/threads such as this one down played in the media, or even on HN.

I did my part and upvoted the story to get it more exposure here:)

◧◩◪◨⬒
123. logfro+0Z[view] [source] [discussion] 2014-12-29 18:41:56
>>karmac+Il
Did you seriously just make an argument that a government would choose not to do something just because it would be expensive and ineffective?

"Incredibly costly" + "I don't see how they would benefit" is only an effective argument against individuals and businesses whose continued existence depends on not wasting money. The state runs on taxes and executive orders.

You may not realize that one of the non-publicized goals of recent executive administrations has been to keep the official unemployment rate of war veterans low enough that it stays out of the public consciousness. This has been accomplished in large part by steering them into make-work jobs with strict citizenship or clearance requirements along with hiring preference points for military service.

The government probably does not care to intervene in our nerd talk, but it can afford to, and if that provides a minor political benefit beyond sticking loyalists in dubious, relatively-high-paying desk jobs, then so be it. If I were to attempt to promote state interests with respect to encryption and network security, HN is certainly one of the sites I would pay my subordinates to read and influence.

Don't assume that just because you think it is stupid and pointless, no one is actually doing it. That doesn't mean that anyone is, but you can't realistically argue that everyone is not.

◧◩◪◨⬒⬓
124. logfro+001[view] [source] [discussion] 2014-12-29 18:54:43
>>ChrisA+Pn
Remember that Sinclair aimed for the heart and hit the stomach. His goal was reform of industrialized labor conditions, but he got food purity and safety laws.

To use his book as a metaphor implies that Snowden's leaks will do nothing to stop domestic dragnet surveillance and everything to seal the system against future whistleblower leaks.

I find that I must agree.

◧◩◪
125. lstamo+Z41[view] [source] [discussion] 2014-12-29 19:55:40
>>combri+SC
Related: https://twitter.com/csoghoian/status/549328365422145537

And: http://blog.erratasec.com/2014/12/that-spiegel-nsa-story-is-...

Which isn't to say the NSA isn't legitimately participating in IETF and taking such notes ... but that codenames can be taken out of context. ;-)

◧◩
126. rdl+F61[view] [source] [discussion] 2014-12-29 20:20:05
>>dmix+Y5
There isn't enough in those documents to really analyze. Apparently all the good malware info is going to be released "in a couple weeks".
◧◩◪◨⬒⬓
127. cpach+o81[view] [source] [discussion] 2014-12-29 20:47:34
>>teduna+Bs
Prompt doesn’t check the server’s key? That’s incredible. Do you have any sources on that?
replies(1): >>teduna+lI1
◧◩◪◨⬒⬓
128. olifan+5b1[view] [source] [discussion] 2014-12-29 21:19:25
>>uncleb+Zk
no laws are going to change the behaviour of the NSA or any other foreign agency with similar capabilities. Once they have it, they will lie, obfuscate and stall to make sure they never lose it. It's time to stop being angry at the NSA and realize than only open-source end-to-end encryption will help us regain some of the privacy that we lost. The web has to become secure by default.
replies(1): >>uncleb+Cn1
◧◩◪◨⬒
129. razste+Ab1[view] [source] [discussion] 2014-12-29 21:25:41
>>karmac+Il
What if there is a program which can do all of this? The part about posting on HN and Reddit? Just wondering if it is something they, with all their $$$$ and resources, could do.
◧◩◪◨⬒
130. userna+ef1[view] [source] [discussion] 2014-12-29 22:15:19
>>throwa+ry
He does real systems research:

http://research.microsoft.com/en-us/people/mickens/

He just also has a sense of humor, and makes time to exercise it.

◧◩◪◨
131. razste+Dg1[view] [source] [discussion] 2014-12-29 22:34:15
>>jmnico+fu
Little do you know about some of these "disorganized" folks. All in due time.

Seems your doubts are what helps the NSA.

◧◩◪◨⬒⬓⬔
132. uncleb+Cn1[view] [source] [discussion] 2014-12-30 00:23:50
>>olifan+5b1
I sincerely don't understand this notion of capitulation to the whims of a rogue government in what is supposed to be a nation of laws. Currently, we don't even have a set of clear laws on the books that outlaw the behavior. This is what enables the current stalling and obfuscation. I am not saying we should simply trust them. Their actions have to be made clearly illegal, with full oversight and robust whistleblower protection. We must start with the law.

I also don't get the idea of "some privacy". It seems to me along the lines of "somewhat pregnant". But, you (and many others) are advocating an approach that says, "let's untether our government from even the pretense of adherence to any laws, allow them to attack us with impunity, and simply do the best we can with what we have to fend them off".

If I were of the lying, obfuscating NSA-worker ilk, what you are advocating is exactly the response that would make me salivate.

I know that many people have this romanticized notion that we will do tech battle against our government and win, but we simply won't. If years of battling virus writers, rootkits, and zero days have taught us nothing, it should have taught us that a determined adversary will own us. Add to that unlimited resources and claimed legal authority to compel cooperation from tech/infrastructure providers.

You really want to unleash the lying, obfuscating NSA and trust that your open-source encryption and ciphers won't be cracked, that your full software and hardware stacks have not been compromised, and that the same is true for everyone with whom you communicate, etc., then patch things up and try again if and when you are made aware of a compromise? Sorry, friend. That's a losing proposition.

◧◩◪◨
133. Michae+Bw1[view] [source] [discussion] 2014-12-30 03:33:13
>>xnull2+kl
might be of interest in light of possible AES breakage: i have a small project that encrypts/decrypts the whole message with RSA (of course the message is also signed before encryption and result is verified on decryption);

runs on as much cores as available; also for this it goes into some length to avoid multithreading locks in openssl (where possible).

http://mosermichael.github.io/cstuff/all/projects/2014/02/24...

◧◩◪◨⬒
134. yuhong+gG1[view] [source] [discussion] 2014-12-30 08:15:56
>>skuhn+4s
Yea, if one was signed for www.google.com it would be a serious problem. If it is targeting specific obscure domain names where the customer is willing to accept the risk, that is a different matter.
◧◩◪◨⬒⬓⬔
135. teduna+lI1[view] [source] [discussion] 2014-12-30 09:37:01
>>cpach+o81
I used it. It never showed me the server key or asked to verify it.
replies(1): >>cpach+Kt2
◧◩◪◨⬒⬓⬔⧯
136. cpach+Kt2[view] [source] [discussion] 2014-12-30 21:31:03
>>teduna+lI1
Wow. That’s really craptastic.
◧◩◪◨⬒
137. nullc+oa3[view] [source] [discussion] 2014-12-31 14:43:44
>>tptace+xQ
Sure.

Improve the existing key-recovery attacks (http://research.microsoft.com/en-us/projects/cryptanalysis/a...) on AES from 2^126 to 2^80 (through unknown methods, potentially exploiting the trivial relation of CTR plaintexts), which is a scale at which a state level party could perform computation, especially on specialized hardware. Observe a CTR block on known plaintext and recover the key.

Practical key recovery attacks have existed against many block ciphers. AES is pedantically weaker than it should be (since an attack exists at 2^126).

Do I think this is likely? I don't have enough information to answer, and in the absence of information I'd default to "probably not". It wouldn't be inconceivable, however.

[go to top]