Re: [cryptography] Which encryption chips are compromised?
On Wed, Dec 11, 2013 at 06:28:31PM -0800, Steve Weis wrote:
On Wed, Dec 11, 2013 at 6:00 PM, coderman <coderman@gmail.com> wrote:
unredacted: https://peertech.org/dist/nsa-cpp-goals-FY2013-unredact.png
"Intel Ivy Bridge"
Is this a guess because "Intel Ivy Bridge" fits into the redacted space or is there some other evidence?
I believe it's just a guess based on fit.
Ivy Bridge processors are general purpose x86 CPUs. It doesn't make sense to me to refer to it as an "encryption chip" for "web encryption devices". Do you know of products using IVB processors for SSL offloading or in VPN appliances?
Suppose I'm the manager writing this document, reporting the expected accomplishments of my group. We do cryptanalysis. If we're projecting success against FooBarCo chips' encryption sub-core, and everybody knows FooBarCo chips are used in both encryption and non-encryption products, it makes sense to cite the specific applications where FooBarCo chips are used. So "for FooBarCo chips used in VPN and SSL" makes sense, even if FooBarCo chips are not *solely* VPN and SSL. However, in "for FooBarCo encryption chips used in VPN", the "encryption" seems to me to denote a special purpose chip, rather than a general purpose chip with an encryption sub-core. I've seen worse manglings of language in similar documents, though, so I would not put it past said middle manager to write "for Intel Ivy Bridge encryption chips used in VPN and SSL", even though that's a bit of word salad to anyone who knows the technology.
To me, the redacted document sounds like it's referring to a security processor used for SSL offloading. For example, something like a Cavium Nitrox (which I'm not implying is the subject of the document).
"Cavium Networks" or "Cavium Nitrox" are approximately the right length to fit. Other vendors that might be interesting include F5, Barracuda, Riverbed, Cisco SCA 11000, Radware (an Israeli/American company), and everybody listed on http://en.wikipedia.org/wiki/SSL_Acceleration The document looks like Word and appears to be fully justified; anyone with that software want to match the fonts and try out various substitutions to see what fits best? Note that http://s3.documentcloud.org/documents/784159/sigintenabling-clean-1.pdf seems to have been digitally processed and redacted; the font baselines are perfectly aligned, to the sub-pixel antialiasing limit; while http://s3.documentcloud.org/documents/784280/sigint-enabling-project.pdf appears to have gone out to paper and then been scanned in on a non-flatbed scanner; there is significant vertical slew across the line of text in question. Since the source document appears to be the same for both, an enterprising DTP jockey could use -clean-1.pdf to tune the document settings precisely, and then use -project.pdf to search for better unredaction matches. -andy
On Wed, Dec 11, 2013 at 9:15 PM, Andy Isaacson <adi@hexapodia.org> wrote:
... Since the source document appears to be the same for both, an enterprising DTP jockey could use -clean-1.pdf to tune the document settings precisely, and then use -project.pdf to search for better unredaction matches.
i remember seeing software to do this, but for the life of me cannot find it. anyone? my favorite redaction technique is still the Adobe white text on white background in PDF trick; combine with a filter for CONFIDENTIAL / PROPRIETARY and you've got a fire hose of informative flotsam...[0] best regards, 0. "The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure" http://arxiv.org/abs/cond-mat/0310427 back when Sean Goreman's work and post 9/11 hysteria combined to drive critical infrastructure information into access controlled obscurity (not even FCC outage reports public!) i used this technique with custom deep web crawlers for court documents and other technical references. code doesn't care about color ;) thus fiber counts along specific rights of way allocated to named customers provided the specific capacity information needed to make useful models for measuring "spatial implications of telecommunications infrastructure susceptibility to targeted attack". this was the first time i wrote code that actually scared/disturbed me :o
i see your skepticism, and i raise you a retort! ;) i even have a list of candidates you can experiment with to confirm Intel Ivy Bridge as best fit. [0] On Wed, Dec 11, 2013 at 9:15 PM, Andy Isaacson <adi@hexapodia.org> wrote:
... Suppose I'm the manager writing this document, reporting the expected accomplishments of my group. We do cryptanalysis.
plus a few more things, e.g. your ~250-300million $USD/year budget goes toward: "actively engag[ing] the US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs [... to] make the systems in question exploitable through SIGINT collection (e.g., Endpoint, MidPoint, etc.) with foreknowledge of the modification. and, Insert vulnerabilities into commercial encryption systems, IT systems, networks and endpoint communications devices used by targets. only with "foreknowledge of the modification" are you able to utilize this backdoor. (NSA does not like to share) also, this year by end of year, in 2013 you expect to: - Make gains in enabling decryption and Computer Network Exploitation (CNE) access to fourth generation/Long Term Evolution (4GL/LTE) networks by inserting vulnerabilities. - Complete enabling for [well recognized name] encryption chips used in Virtual Private Network and Web encryption devices. and last but not least, - Shape the worldwide commercial cryptography marketplace to make it more tractable to advanced cryptanalytic capabilities being developed by NSA/CSS. Ok, given those requirements. Who fits the bill? High end platform: http://www.techweekeurope.co.uk/news/intel-networks-high-end-platform-133501 """ Intel targets what it believes is a significant growth opportunity to bring the Intel Architecture into a rapidly evolving networking space. ... Intel added to its portfolio with the introduction of the Highland Forest platform, which combines the vendor’s Xeon E5-2600 v2 CPU with its new Coleto Creek chipset. Price said Highland Forest – which can pack up to 20 2.4GHz “Ivy Bridge” CPU cores – will offer two to six times the performance of the previous Crystal Forest platform, which was launched in October 2012. Highland Forest, with Intel’s Data Plane Development Kit, can deliver up to 255 million packets per second (p/s) – more than the 140 million p/s from Crystal Forest – as well as security capabilities of 110 Gigabits per second of IPsec and 200 Gb/s SSL security for encrypted traffic. """ IPsec (VPN) and SSL (Web crypto) and lots of it! sounds interesting. tell me more! other market points of note: - "Intel currently has over 15 SDN/NFV qualification trials underway with carriers in all major regions. Schooler emphasized that Intel has no intention to sell directly to service providers and is fully committed to launching an Intel Network Builders Ecosystem of industry players supporting the Intel Architecture." - "6WIND Announces Availability of Support for Intel® Xeon® Processor Platform for Large-Scale Communications Infrastructure Systems, Formerly Called “Highland Forest” 6WIND announces the availability of support within the 6WINDGate™ software for the Intel® Xeon® Processor Platform for Large-Scale Communications Infrastructure Systems, formerly called “Highland Forest.” With its optimized support for the Intel® QuickAssist Technology that provides hardware acceleration for encryption and compression, 6WINDGate delivers best-in-class performance for networking applications such as WAN optimization, VPN appliances, firewalls and Unified Threat Management (UTM) systems." - funny they seem to distance themselves from "Highland Forest" and "Ivy Bridge" in this press release and product launch... [ http://www.prweb.com/releases/2013/12/prweb11387583.htm ] they sound interesting, like they sell to many industries at large scale. are they a popular company/product? ""“6WINDGate is already deployed in tens of commercial LTE networks throughout Asia, Europe and North America, while also being used by multiple tier-1 suppliers of enterprise and cloud networking equipment."" hey look, LTE! ... ok, so that's a little suspect. what's that, there's more you say? https://plus.google.com/+TheodoreTso/posts/SDcoemc9V3J "I am so glad I resisted pressure from Intel engineers to let /dev/random rely only on the RDRAND instruction." , "Oh, I should add that just today I had to fight back an attempt by a Red Hat engineer to add a configuration option to blindly trust RDRAND and bypass the entropy pool" ... then the FreeBSD change of heart. hey Wind River, how are you using RDRAND? now what about Intel themselves, are they also pushing the chip? """ Intel officials are making aggressive moves to expand the reach of its silicon beyond servers and into other parts of the data centre. Schooler said the company has been making products for networking gear for about a decade, and has made significant strides in recent years. It’s also made several acquisitions – such as of Sensory Networks, Ethernet chip maker Fulcrum Microsystems and networking software maker Aepona, whose technology enables telecoms and cloud service providers to offer more services on their networks. Intel is looking to take advantage of the growth opportunity networking represents, Schooler said. The market Intel is targeting is about $16 billion (£9.7bn), and the chip maker currently has about 5 percent of it. Along with its x86 architecture, Intel also is developing accelerator chips for such jobs as packet inspection and encryption. """ whew. that's a lot of context and circumstance. let's look back over your goals for 2013: Make gains in enabling decryption and Computer Network Exploitation (CNE) access to fourth generation/Long Term Evolution (4GL/LTE) networks... - AFFIRMATIVE! Complete enabling for [Intel Ivy Bridge] encryption chips used in Virtual Private Network and Web encryption devices. - AFFIRMATIVE! Shape the worldwide commercial cryptography marketplace to make it more tractable to advanced cryptanalytic capabilities being developed by NSA/CSS. - AFFIRMATIVE! i will admit that i am continually impressed by NSA/SCS achievements. they're extremely competent!
If we're projecting success against FooBarCo chips' encryption sub-core, and everybody knows FooBarCo chips are used in both encryption and non-encryption products, it makes sense to cite the specific applications where FooBarCo chips are used.
agreed.
However, in "for FooBarCo encryption chips used in VPN", the "encryption" seems to me to denote a special purpose chip, rather than a general purpose chip with an encryption sub-core.
my reading between the lines: it is not a special chip, it is a special collection of many of them (20+) handling tier-1 core traffic encryption, which is an excellent point to aggregate a vulnerability in keying ciphers. (ignore public key for now, since we can just focus directly on session/temporal keys!)
"Cavium Networks" or "Cavium Nitrox" are approximately the right length to fit. Other vendors that might be interesting include F5, Barracuda, Riverbed, Cisco SCA 11000, Radware (an Israeli/American company), and everybody listed on http://en.wikipedia.org/wiki/SSL_Acceleration
0. please to be experimenting with datas: Interface Masters Technologies Freescale Semiconductor Alteon SSL Accelerator Nortel SSL Accelerator Strangeloop Networks Riverbed Technology Coyote point systems Crescendo Networks Microchip PIC32MZ Barracuda Networks Kemp Technologies STMicroelectronics Check Point VPN-1 Sun Microsystems Foundry Networks Cavium Networks Cavium NITROX Juniper Networks Nortel Networks Array Networks Intel Ivy Bridge <- only this is right length in justified context shown Forum Systems Cavium Nitrox CAI Networks A10 Networks Cisco Systems Citrix Systems Sun SCA6000 MIFARE Plus Network Box Coleto Creek F5 Networks jetNEXUS Cisco PIX Radware Cotendo Exinda Hifn IBM --- parting words: """ On April 17 at the Open Networking Summit, Intel executives laid out the company’s strategy around data center networking and the burgeoning trend of software-defined networking (SDN). They also showed that their efforts will expand beyond simply supplying the processors for networking hardware. The company unveiled reference architectures designed to help enterprises, cloud service providers and telecommunications companies more quickly create hardware and software for SDN and network-function virtualization (NFV), moves that could bring Intel into closer competition with the likes of networking giant Cisco Systems and chip maker Broadcom. - http://www.eweek.com/networking/intel-makes-push-into-competitive-sdn-space/ """ don't let them get away with it! open up raw access to entropy sources!! don't discriminate against the unit, one is prime!!!
one last amusing note, Google has gone whole hog on SDN: http://www.networkcomputing.com/data-networking-management/inside-googles-so... how amusing would it be if they implemented inter-DC IPsec keyed with RDRAND directly on compromised cores in one of these Highland Forest like SDN deployments? i can already see the updated napkin sketch now, and imagine the streaming swears pouring forth from the googlies once uncovered...
participants (2)
-
Andy Isaacson
-
coderman