I'd like to bounce an idea off the list and get some feedback, especially on what I missed. say alice has some information, published e.g. on her website. she is afraid that said information may be a thought crime, aka decss or an sdmi hack. bob makes a copy of the information and wants to inform alice that he did so in case a court or some jackboots tell her to take it down, so she can link to him or do twist her dns records, whatever. so far, simple. the new twist is that I want bob to know when alice (or someone else) makes use of the information. at the lowest level, bob may want to simply know when his mirror is being used. or the information may be highly illegal and bob must know that he is now in the line of fire. or maybe he doesn't even actually provide the information until he gets the message that it is now required (think moving target). my solution is as follows: when bob copies the info, he sends a message to alice. the "outer shell" is encrypted to alice private key, to ensure that only alice can make use of it. it contains a URL, a public key and a second, encrypted part. the URL is under bob's control and provides the key to the second part. it is not linked from anywhere and reasonably complicated to make any "accidental" hit to it extremely unlikely. come day X where bob's mirror is needed. alice decrypts her mail and visits bob's URL to get the 2nd key. bob now knows (or at least can know, if he cares) that alice is in posession of the whole message (e.g. containing the URL of his mirror site) and can react accordingly. the 2nd key is also encrypted to alice, so eve can not learn about the whole message until and if alice decides to publish it (e.g. link to the new mirror site). the 2nd key is also signed with the key contained in the 1st message in order to assure alice that the information she now retrieves (possibly months or years later) is from the same source as the original message. problems I know about: legally, this surely puts bob and alice "in cooperation", so a legal injunction against alice will bind bob as well. any ideas on how to solve that would be great. it sure sounds a little heavy for a simple goal. I'm fairly sure there is a more general solution to the problem. it's just so common. "bob sends alice a message. bob needs to know when alice reads it." -- -- http://www.lemuria.org -- http://www.Nexus-Project.net --
At 11:24 AM 2/6/01 +0100, Tom wrote:
so far, simple. the new twist is that I want bob to know when alice (or someone else) makes use of the information. at the lowest level, bob may want to simply know when his mirror is being used. or the information may be highly illegal and bob must know that he is now in the line of fire. or maybe he doesn't even actually provide the information until he gets the message that it is now required (think moving target).
my solution is as follows:
when bob copies the info, he sends a message to alice. the "outer shell" is encrypted to alice private key, to ensure that only alice can make use of it. it contains a URL, a public key and a second, encrypted
One simple approach - have Bob use a CGI script for publishing the material, e.g. http://bob.com/cgi-bin/backups?alice-file-123 that notifies Bob when the URL is accessed, and either returns the desired file or another URL that points to the real file. More complex - have Bob require a signature from Alice on the request. Another approach - have the CGI script tell Alice the URLs for files that belong to her, or tell the recipient the URLS for files that match a given keyword. You have to think about threat models. If Alice is under attack, do the attackers have Alice's mailbox that would contain the URL? Do they have Alice's private key? Do you care? Does Bob have a site like Cryptome where anybody can read everything? Does Bob have a samizdat site where only people who have the password for a file can access that file (and maybe the password is the hash of the file)? If Bob doesn't want legal problems because of Alice, it's safer if he doesn't tell Alice, or at least doesn't do anything different for Alice than he would for any other customer. He can also be much safer if he doesn't store the file in a form he can decrypt. A few years ago, I developed a couple of protocols for variations of this problem. All of these methods were designed so that Bob wouldn't have to return a key to Alice - that lets it work over remailers. The simplest version works like this key = hash(file) filename = hash(key, salt) # One salt for entire site Store Encrypt(file, key) as "filename". The author creates the file, calculates the key, and sends the file to Bob, preferably over a secure channel. Bob calculates the key, calculates the filename, encrypts and stores the file, then forgets the key. If Alice (or somebody she gave the key to) wants to retrieve it, she gives Bob the key, Bob calculates the filename and returns the encrypted file. That still leaves Bob with some risk, because if he someone gives him the key, he can find and decrypt the file, but the only way for somebody (or Bob) to know if he has the file is to know the key. Note that if you try to store multiple copies of the same file, it's detected when Bob calculates the filename, so Bob doesn't need multiple copies of the same Metallica track, unless different people have compressed them creating non-identical files. Because the key is based on the file contents, not just keywords, the attacker needs to know the whole file contents to verify that it's there - the attacker can't just try searching Bob's file system for "Osama" "cocaine" "narcoterrorism". If Alice wants to make it easy for people to find her writing based on keywords, she can store the index in a different file (somewhere else on the web, or perhaps in a different file on Bob's samizdat site.) Some versions that are more paranoid give Bob more protection or the author more control: key = hash(file) handle = hash(key) filename = hash(key, salt) and the retrieval uses "handle" instead of "key", so Bob or an eavesdropper can't decrypt the file at retrieval-time if he didn't save the keys, which is safer for Bob, because he can't tell if the material he's storing is ThoughtCrime. control = hash(file) key = hash(control) handle = hash(key) filename = hash(key, salt) lets Alice give people her friends the key and handle, but gives her a token she can give Bob demonstrating that she's authorized to do things like delete the file. (Also, you could use the control and not the handle, or whatever.) None of these prevent Bob from reading the file he's storing. If Alice cares about this, she should use separate encryption. part.
the URL is under bob's control and provides the key to the second part. it is not linked from anywhere and reasonably complicated to make any "accidental" hit to it extremely unlikely. come day X where bob's mirror is needed. alice decrypts her mail and visits bob's URL to get the 2nd key. bob now knows (or at least can know, if he cares) that alice is in posession of the whole message (e.g. containing the URL of his mirror site) and can react accordingly. the 2nd key is also encrypted to alice, so eve can not learn about the whole message until and if alice decides to publish it (e.g. link to the new mirror site). the 2nd key is also signed with the key contained in the 1st message in order to assure alice that the information she now retrieves (possibly months or years later) is from the same source as the original message.
problems I know about:
legally, this surely puts bob and alice "in cooperation", so a legal injunction against alice will bind bob as well. any ideas on how to solve that would be great. it sure sounds a little heavy for a simple goal. I'm fairly sure there is a more general solution to the problem. it's just so common. "bob sends alice a message. bob needs to know when alice reads it."
Thanks! Bill Bill Stewart, bill.stewart@pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
Bill Stewart wrote:
One simple approach - have Bob use a CGI script for publishing the material, e.g. http://bob.com/cgi-bin/backups?alice-file-123 that notifies Bob when the URL is accessed, and either returns the desired file or another URL that points to the real file. More complex - have Bob require a signature from Alice on the request.
that part is actually the least of my worries.
You have to think about threat models. If Alice is under attack, do the attackers have Alice's mailbox that would contain the URL? Do they have Alice's private key? Do you care? Does Bob have a site like Cryptome where anybody can read everything? Does Bob have a samizdat site where only people who have the password for a file can access that file (and maybe the password is the hash of the file)?
the threat model is that alice's system has possibly been compromised or shut down, but alice herself (and thus the private key or at least the passphrase) is still secure. the story would continue with alice digging out the mirrors and redirecting her web traffic there, so if alice goes down, things are lost anyways.
If Bob doesn't want legal problems because of Alice, it's safer if he doesn't tell Alice, or at least doesn't do anything different for Alice than he would for any other customer.
that's the problem. so how does alice know if bob doesn't tell?
The simplest version works like this key = hash(file) filename = hash(key, salt) # One salt for entire site Store Encrypt(file, key) as "filename".
that's a good start. using a hash of the content as the filename is a really important idea that will surely help me along here.
At 04:03 PM 2/9/01 +0100, Tom wrote:
If Bob doesn't want legal problems because of Alice, it's safer if he doesn't tell Alice, or at least doesn't do anything different for Alice than he would for any other customer.
that's the problem. so how does alice know if bob doesn't tell?
Some options: - Bob is running the "We Mirror Everything" site - "We Mirror Things for Politically Sympathetic People" - "We Mirror Things Unless we sent you a rejection notice" - (back when Cypherpunks believed there would be digicash Real Soon) Alice sent Bob some anonymous digicash to pay for storage - Alice sent Bob some non-anonymous payment outside your threat model - Bob is a random user running a Napster-like space-sharing protocol, and Alice sent mail to Bob1, Bob2, Bob3, etc. hoping one will work - Bob used a non-direct response method, like posting a receipt to Bob's web site or some random free web site or Usenet acknowledging receipt of "Some-Package-ID" which isn't easily identifiable as being Alice's. Maybe the Package-ID is a token sent along with the package, or a timestamp, or maybe your threat model doesn't mind the receipt being hash(hash(hash(hash(Package)))), which is some hash of the package-retrieval token. Thanks! Bill Bill Stewart, bill.stewart@pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
participants (3)
-
Bill Stewart
-
Tom
-
Tom