From altitude at cic.net Sun Oct 1 00:36:51 1995 From: altitude at cic.net (Alex Tang) Date: Sun, 1 Oct 95 00:36:51 PDT Subject: RSA's comments on RC4 weak keys In-Reply-To: <199510010537.AAA09694@alpha.jpunix.com> Message-ID: <199510010736.DAA09592@petrified.cic.net> -----BEGIN PGP SIGNED MESSAGE----- On Sun Oct 1 01:37:01 1995: you scribbled... > > Robert W. Baldwin wrote: > > > Here is our response to the excellent work that Andrew Roos has been > > doing on RC4. I am glad that people are looking at RC4 critically. Hi. This is a pretty intresting statement. Does this mean that RSA acknowledges the fact that RC4 can no longer claim "Trade Secret" status, and therefore will stop trying to make people get a license to use RC4? Thanx. ...alex... -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Alex Tang or Alex Tang iQCVAwUBMG5E9qNd+TOtm9v5AQGWbAP9EtKLfLsz5Vw1ltkyFxhFoTGCBmxngMzg wlNQfDJ4Qp52HwKnVZGUgxeYYzH5SNT5xRnYzjITUd6tRBI5SRO+/5DQYYLcT1/N GXYqT7nZ5R5+SXd4XGDmzqNweW42E0HD4QPpc1Qmr+QxoCpmFb9WJZ6Onh++rAu7 abH3sNIWQsk= =FZer -----END PGP SIGNATURE----- From stewarts at ix.netcom.com Sun Oct 1 01:12:58 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Sun, 1 Oct 95 01:12:58 PDT Subject: NetScape's dependence upon RSA down for the count! Message-ID: <199510010812.BAA11516@ix4.ix.netcom.com> >What you have described is the classic 'man in the middle' attack. >Netscape claims that SSL V.3 is immune to the MITM attack in >appendix D.4 of the SSL V.3 spec. > >You will need to get the 'filter' (MITM) key signed by Verisign. >Or hack Verisign's server-key-signing key. Or hack the Web of Trust used to verify the server's identity. It _is_ still a Web of Trust even if it's a fascistly-hierarchical tree; as long as it's possible to get a certificate without heavy contractual obligations, you can hack it, since the software has no way to check, now that Netscape is being nice and open and allowing non-Verisign certs. Remember that anybody can be a CA, and keys can be signed by multiple CAs. Verisign Business CA signs Carol's Certification Consultants' key. Carol signs Bob's Better Browser Business's key. Bob runs a server, selling really cool web tools. Verisign Business CA signs Moriarty's Mallet Makers' key. Moriarty signs Mr. X's personna key (trust us.) Mr. X makes a key called Bob's Better Browser Business, looking suspiciously like the real thing, only it's signed by M . X, and nobody bothered telling Bob about it. Alice, using Netscape, encounter's http://www.Bob'sBetterBrowser.com/, and decides to order a Better Browser. She gets Bob's public key and X.509 certificates by pressing a button, and receives a key and a pile of certs. Since it's not a secure session yet, is Mr. X intercepting them and sending her _his_ key and cert for "Bob" and his personna key with cert from Moriarty and his key and cert from Verisign? So Mr. X rips off Alice and/or Bob somewhere here, and Alice decides to sue Bob, who says "Hey, that's not my key, see my real set of certs", so they go off after Mr. X, who they can't find, and then go after Moriarty, who says "Hey, it's just a personna certificate; all I guaranteed was that I didn't sign more than one with the same name on it", which in fact appears to be true, and while after one case you can't be sure that there really wasn't a Mr. X somewhere, if three or four people start walking in saying Mr. X ripped them off using a key that Moriarty signed, maybe somebody'll think it's a movement... And remember that if you can finesse a signature, you can fake a Diffie-Hellman session with authenticated keyparts into tolerating your MITM attack, because you can convince Alice's browser into accepting the fake key for Bob, and as far as Bob knows, Alice is just another web-client that he doesn't know from Adam. Now, X.509 certs don't limit themselves to hierarchical or Web use, and most advice on using them recommends limiting the depth of a tree/web that you're willing to trust. Unfortunately, X.509 certs don't even have a comment field, much less a standardized "how much do you trust this person you're signing" field, though I suppose you can cram a bit into the X.400/500-style name formats. So if people want to really trust their digital signature system to prevent forgeries, then either there's got to be a law demanding lots of government- approved is-a-person nationalized ID card Internet Driver's License stuff, or else there's a market need for companies providing heavy-duty contractual backing for their key signatures (e.g. "In return for us signing your CA key with our high-trust CA key, you agree to accept $XM of liability for any misuse of keys you sign with it and to force anybody whose key you sign to also sign a contract like this one"). Probably a need for some standards to go with it. There's also a need for browsers and any associated certificate checkers to provide good user interfaces (so the _user_ can read the signature chain) and good tools to help the user decide what to trust. At minimum, the user interface probably should support things like different required amounts of trust for different categories of communication, e.g. business vs. personal letters vs. politics vs. smuggling. [This whole posting has been very annoying to write; I've just gone and argued that you can munge an X.509 hierarchy back into the Web of Trust and avoid the special-case treatment of Very Important CAs by just signing the top nodes of a hierarchy yourself and treating them like any other web-of-trust chain, and been thanking Netscape for allowing us to use open protocols instead of depending on Big Organizational Infrastructures that are run by the CON, and now I find myself posting a counter-example that says sometimes you have to be very careful and/or reinvent Bigness to avoid getting ripped off. But, hey, while it's not a demonstated hack, it's at least the theory for pulling one off, so even if it doesn't get me a T-shirt, at least it wins me a GIF of one :-) ] #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From rivaud at rain.org Sun Oct 1 05:50:42 1995 From: rivaud at rain.org (rivaud at rain.org) Date: Sun, 1 Oct 95 05:50:42 PDT Subject: WHERE did this come from? Message-ID: <44kgtb$88i@news.rain.org> Attatched to this is, (I hope), the header text from a unsolicited e-mail message I received. The return address does not work. WHY? How can I inform the sender that I hope to never receive there material again? I tried "reply-all" through Eudora, but my reply got bounced back to me as undeliverable. I have removed the content of the original message. I don't know why it was sent to me, but it contained material that I found offensive. Any help, or words of wisdom and enlightenment would be appreciated. Information would be nice too. Thanks. -------------header should be below here-------------- i hope...-------- From rivaud at rain.org Sun Oct 1 06:16:21 1995 From: rivaud at rain.org (rivaud at rain.org) Date: Sun, 1 Oct 95 06:16:21 PDT Subject: WHERE did this come from? In-Reply-To: <44kgtb$88i@news.rain.org> Message-ID: <44kh2m$8sa@news.rain.org> OK, I screwed up. Sorry to take up all the space with the text of it. But, whether you agree with it or not, if you know from whence it came and how they sent it, I would like to know. Thanks again. From dakidd at cris.com Sun Oct 1 07:06:58 1995 From: dakidd at cris.com (Don Bruder) Date: Sun, 1 Oct 95 07:06:58 PDT Subject: WHERE did this come from? In-Reply-To: <44kgtb$88i@news.rain.org> Message-ID: In article <44kgtb$88i at news.rain.org>, rivaud at rain.org wrote: :This is a multi-part message in MIME format. : :---------------------------------17921121372935 :Content-Transfer-Encoding: 7bit :Content-Type: text/plain; charset=us-ascii : :Attatched to this is, (I hope), the header text from a unsolicited e-mail :message I received. The return address does not work. WHY? How can I :inform the sender that I hope to never receive there material again? : :I tried "reply-all" through Eudora, but my reply got bounced back to me :as undeliverable. : :I have removed the content of the original message. I don't know why it :was sent to me, but it contained material that I found offensive. : :Any help, or words of wisdom and enlightenment would be appreciated. :Information would be nice too. : :Thanks. : :-------------header should be below here-------------- i hope...-------- : : : :---------------------------------17921121372935 :Content-Transfer-Encoding: quoted-printable :Content-Type: text/plain : :Return-Path: Crusader at national-alliance.org Received: from asso.nis.garr.it (asso.nis.garr.it [192.12.192.10]) by coyote.rain.org (8= :6.12/CSE) with SMTP id FAA20270; Sat, 30 Sep 1995 05:58:42 -0700 From: Crusader at national-alliance.org :Received: by asso.nis.garr.it (4.1/1.34/ABB950929) : id AA14320; Sat, 30 Sep 95 13:02:20 +0100 Received: by mercury.sfsu.edu (5.0/SMI-SVR4) : id AA21676; Sat, 30 Sep 95 03:43:27 -0700 Date: Sat, 30 Sep 95 03:43:27 -0700 :Message-Id: <91324721788 at National-Alliance.org> Subject: The Long March :Apparently-To: Crusader at National-Alliance.org : : : :If you are concerned about the fate Western/American civiliztion and its people, please take the time to read this artcle. Welcome to the club, guy... I found this drivel in my mailbox this morning too. Here's the headers from mine, if anybody thinks it will help track these morons. Return-Path: Received: from asso.nis.garr.it by deathstar.cris.com [1-800-745-CRIS (voice)] From: Errors-To: Crusader at national-alliance.org Received: by asso.nis.garr.it (4.1/1.34/ABB950929) id AA09169; Sat, 30 Sep 95 03:14:27 +0100 Received: by mercury.sfsu.edu (5.0/SMI-SVR4) id AA21676; Fri, 29 Sep 95 19:23:27 -0700 Date: Fri, 29 Sep 95 19:23:27 -0700 Message-Id: <91324721846 at National-Alliance.org> Subject: The Long March Apparently-To: Crusader at National-Alliance.org Looks to me like it originally gated into the mail-system at mercury.sfsu.edu, wherever that is. From who is beyond my understanding. Hopefully somebody can find out and let the apropriate people know so it can be stopped from happening again. I get enough junk in my paper mailbox without having to wade through it in my email box! -- +-------------------+ \__ Roadkill on the information superhighway... |Don Bruder | | \ AUGH! +-------------------------------+ |dakidd at cris.com | |_ at _\____& / | I will choose a purpose clear:| |I eat my roadkill! |_|____|__@| @ | I will choose Free-will -Rush | +/.\/.\--------+ /.\/.\=(__)/.\] \|/ +-------------------------------+ _\_/\_/__________\_/\_/_____\_/__/_\__ Finger for PGP public key From nobody at alpha.c2.org Sun Oct 1 09:18:27 1995 From: nobody at alpha.c2.org (Anonymous) Date: Sun, 1 Oct 95 09:18:27 PDT Subject: WHERE did this come from? In-Reply-To: <44kgtb$88i@news.rain.org> Message-ID: <199510010427.VAA28730@infinity.c2.org> In article <44kgtb$88i at news.rain.org>, wrote: > >Attatched to this is, (I hope), the header text from a unsolicited e-mail >message I received. The return address does not work. WHY? How can I >inform the sender that I hope to never receive there material again? > >I tried "reply-all" through Eudora, but my reply got bounced back to me >as undeliverable. > >I have removed the content of the original message. I don't know why it >was sent to me, but it contained material that I found offensive. > >Any help, or words of wisdom and enlightenment would be appreciated. >Information would be nice too. [...] >Return-Path: Crusader at national-alliance.org Received: from asso.nis.garr.it (asso.nis.garr.it [192.12.192.10]) by coyote.rain.org (8= >6.12/CSE) with SMTP id FAA20270; Sat, 30 Sep 1995 05:58:42 -0700 From: Crusader at national-alliance.org >Received: by asso.nis.garr.it (4.1/1.34/ABB950929) > id AA14320; Sat, 30 Sep 95 13:02:20 +0100 Received: by mercury.sfsu.edu (5.0/SMI-SVR4) > id AA21676; Sat, 30 Sep 95 03:43:27 -0700 Date: Sat, 30 Sep 95 03:43:27 -0700 >Message-Id: <91324721788 at National-Alliance.org> Subject: The Long March >Apparently-To: Crusader at National-Alliance.org > > >If you are concerned about the fate Western/American civiliztion and its people, please take the time to read this artcle. [remainder of political rant deleted] I got it too. It was a pretty good forgery, but the web pages mentioned seem to be owned by treborle at netcom.com. It looks like a hit-and-run spam, as he hasn't logged in for awhile. But since netcom charges for disk space, I took the liberty of mailing him a few uuencoded core files. :) You might want to send a few to his compuserve address too for good measure. (73323.603 at compuserve.com) It looks like their web site www.natvan.com got taken out already, tho they still have the netcom one. From jbass at dmsd.com Sun Oct 1 09:50:03 1995 From: jbass at dmsd.com (John L. Bass) Date: Sun, 1 Oct 95 09:50:03 PDT Subject: MITM attacks, the day after ... Message-ID: <9510011649.AA12871@dmsd.com> I suppose C2 got as many "do you know how hard it is" complaints as I have, or more. But dispite that, several people broke keys. There seem at this point to be two messenger or man in the middle attacks on SSL that have enough merit to explore further. #1 Attack client binaries to suppress certificate validation, and accept ones forged by the filter/MITM. The binary attack could occur during down load from NetScape (a good ISP level attack) or after the fact with a virus. The client binary would be normally functioning with servers other than the attacking MITM filter. #2 Present client with the filters valid certificate and hope that in the rare case the user looks, that they will not question it, or even know what a valid one from the real server is. Since detection is possible in both of these, attack only a few percent of the traffic until the heat is on, then lay dormant or move to a different site. Suggested to me this morning was taking a harder look proxy servers. John From VMARX at ix.netcom.com Sun Oct 1 10:04:45 1995 From: VMARX at ix.netcom.com (Vincent Marx ) Date: Sun, 1 Oct 95 10:04:45 PDT Subject: WHERE did this come from? In-Reply-To: <44kgtb$88i@news.rain.org> Message-ID: <44leli$s38@ixnews6.ix.netcom.com> In <44kgtb$88i at news.rain.org> rivaud at rain.org writes: > >This is a multi-part message in MIME format. > >---------------------------------17921121372935 >Content-Transfer-Encoding: 7bit >Content-Type: text/plain; charset=us-ascii > >Attatched to this is, (I hope), the header text from a unsolicited e-mail >message I received. The return address does not work. WHY? How can I >inform the sender that I hope to never receive there material again? > >I tried "reply-all" through Eudora, but my reply got bounced back to me >as undeliverable. > >I have removed the content of the original message. I don't know why it >was sent to me, but it contained material that I found offensive. > >Any help, or words of wisdom and enlightenment would be appreciated. >Information would be nice too. > I got the SAME dammed letter. I don't know who the facist bastard is that sent it to me, but I sent him a reply ALSO telling him to stop sending it to me (he sent me 3 copies) and I couldn't connect to his server. From brianm at cs.bu.edu Sun Oct 1 10:09:39 1995 From: brianm at cs.bu.edu (Brian Mancuso) Date: Sun, 1 Oct 95 10:09:39 PDT Subject: WWW Proxy Server Vulnerabilities Message-ID: <199510011708.NAA29261@csa.bu.edu> Regarding WWW SSL middle-man attacks, John L. Bass writes: : Ok, several people have asked: : : client -> filter Client sends packet with K(c) : filter -> Server filter forwards packet with K(f) : filter <- Server Server sends encrypts with K(f) : client <- filter filter re-encrypts with K(c) : : hacking a DMS server is one way, spoofing a DNS reply to named is easier, : simply packaging the filter into a router/bridge close to the server : is more effective ... even if hacking the incoming phoneline/T1 line : to the server and inserting a very transparent bridge AKA a phone tap. : Consider the following attack: Many organizations, especially ones with low bandwidth localnet-to-internet connections and those with firewalls, have implemented `proxy-servers' to retrieve documents from the outside world and cache them for fast future localnet access. ALL WEB TRAFFIC FROM THE LOCALNET TO THE INTERNET GOES THROUGH THESE PROXY SERVERS, transparently to the client and web servers after the client has been configured to do so. If one of these servers were to be compromised, an attacker could easily implement the the middle-man scheme described above. Note that proxy servers are fairly common (especially since firewalls require them), so the apparatus already exists for the middle-man attack outside of modifying DNS servers and routers. The irony of the situation is that it is the most secure organizations who have implemented firewalls that are the most vulnerable to the middle-man attack. Brian Mancuso Boston University Computer Science Dept. PGP DF FA C0 EF 51 B0 23 54 Tel: 617.352.6552 Net: brianm at cs.bu.edu KFP 5C 8D E0 50 C6 39 C6 0F From ses at tipper.oit.unc.edu Sun Oct 1 10:19:44 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Sun, 1 Oct 95 10:19:44 PDT Subject: NetScape's dependence upon RSA down for the count! In-Reply-To: <9510010614.AA08538@icenine.Eng.Sun.COM> Message-ID: On Sat, 30 Sep 1995, Don Stephenson wrote: > I don't think binding hostnames to certificates helps much because > both hostnames and IP addresses can be spoofed and DNS servers can be > subverted. The important thing is the binding to the "service" name or In this particular case, hostnames do help, because they are information imbedded in the url used to access the server. By verifying the hostname in the certificate with the hostname in the url, you can state with a high degree of confidence that the object retrieved is precisely the desired object covered by this url. > Well of course, if the secret key of the server (or worse yet, certificate > authority) is compromised, all bets are off. That's true of just about any > protocol you can dream up. I'm not referring to the secret key of _the_ server; I'm referring to the secret key of _ANY_ server. In the limiting case, such a key can be obtained by buying one from the CA. Simon From jmrubin at ix.netcom.com Sun Oct 1 10:23:06 1995 From: jmrubin at ix.netcom.com (Joel Rubin) Date: Sun, 1 Oct 95 10:23:06 PDT Subject: WHERE did this come from? In-Reply-To: <44kgtb$88i@news.rain.org> Message-ID: <44lh9u$qoh@ixnews7.ix.netcom.com> In article <44leli$s38 at ixnews6.ix.netcom.com>, VMARX at ix.netcom.com says... > >In <44kgtb$88i at news.rain.org> rivaud at rain.org writes: >> >>This is a multi-part message in MIME format. >> >>---------------------------------17921121372935 >>Content-Transfer-Encoding: 7bit >>Content-Type: text/plain; charset=us-ascii >> >>Attatched to this is, (I hope), the header text from a unsolicited >e-mail >>message I received. The return address does not work. WHY? How can I > >>inform the sender that I hope to never receive there material again? >> >>I tried "reply-all" through Eudora, but my reply got bounced back to >me >>as undeliverable. >> >>I have removed the content of the original message. I don't know why >it >>was sent to me, but it contained material that I found offensive. >> >>Any help, or words of wisdom and enlightenment would be appreciated. >>Information would be nice too. >> > >I got the SAME dammed letter. I don't know who the facist bastard is >that sent it to me, but I sent him a reply ALSO telling him to stop >sending it to me (he sent me 3 copies) and I couldn't connect to his >server. > There was a posting allegedly from a Harvey S. Cohen at AT&T on soc.culture.jewish to the effect that the "Long March" email is, in fact, a fraud intended to get the National Alliance in trouble. (a noble cause if not necessarily appropriate means) I don't know if this is connected but I notice that a "let's use these big lie tactics on Usenet" posting allegedly from the National Alliance's Compuserve address seems to have somehow gone through the University of Pennsylvania. "Things are seldom what they seem. Skim milk masquerades as cream." William S. Gilbert (H.M.S. Pinafore) From ericm at lne.com Sun Oct 1 10:25:46 1995 From: ericm at lne.com (Eric Murray) Date: Sun, 1 Oct 95 10:25:46 PDT Subject: MITM attacks, the day after ... In-Reply-To: <9510011649.AA12871@dmsd.com> Message-ID: <199510011740.KAA01644@slack.lne.com> > There seem at this point to be two messenger or man in the middle attacks > on SSL that have enough merit to explore further. > > #1 Attack client binaries to suppress certificate validation, and accept > ones forged by the filter/MITM. The binary attack could occur during down > load from NetScape (a good ISP level attack) or after the fact with a virus. > The client binary would be normally functioning with servers other than the > attacking MITM filter. That's not an attack on SSL. It's an attack on an application. It's no different, conceptually, than attacking sendmail or MS Word. The point to attacking SSL is to be able to decode a message from any browser, without having to do anything extraordinary to the victim's host. No cryptosystem is proof against an attacker who can see and control everything you do on the client side (i.e. has root in UNIX parlance). So, while your idea #1 might be interesting or fun to do as far as computer security goes, it's not an attack on SSL. > #2 Present client with the filters valid certificate and hope that in the > rare case the user looks, that they will not question it, or even know what > a valid one from the real server is. That points out the flaw in Netscape's authentication model that others have already pointed out on this list. Admittedly, like Don Stephenson just posted, there's not really a good way to distribute and authenticate certificates until there's a ubiquitous global CA chain. -- Eric Murray ericm at lne.com ericm at motorcycle.com http://www.lne.com/ericm PGP keyid:E03F65E5 fingerprint:50 B0 A2 4C 7D 86 FC 03 92 E8 AC E6 7E 27 29 AF From ses at tipper.oit.unc.edu Sun Oct 1 10:26:10 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Sun, 1 Oct 95 10:26:10 PDT Subject: WWW Proxy Server Vulnerabilities In-Reply-To: <199510011708.NAA29261@csa.bu.edu> Message-ID: PRoxy servers are just an easy way to implement a demonstration attack. Fortunately, they are also a way to improve security, as long as you can set one up on a machine to which you have a relatively trusted path (localhost) Simon From ericm at lne.com Sun Oct 1 10:42:01 1995 From: ericm at lne.com (Eric Murray) Date: Sun, 1 Oct 95 10:42:01 PDT Subject: NetScape's dependence upon RSA down for the count! In-Reply-To: Message-ID: <199510011756.KAA01707@slack.lne.com> > On Sat, 30 Sep 1995, Don Stephenson wrote: > > > I don't think binding hostnames to certificates helps much because > > both hostnames and IP addresses can be spoofed and DNS servers can be > > subverted. The important thing is the binding to the "service" name or > > In this particular case, hostnames do help, because they are information > imbedded in the url used to access the server. By verifying the hostname > in the certificate with the hostname in the url, you can state with a > high degree of confidence that the object retrieved is precisely the > desired object covered by this url. Assume that the attacker Mallet is in the middle and has control of the http stream. Alice clicks on 'open Widget order form' to order a Widget and Mallet sends her browser a redirect pointing to his evil web server. Alice doesn't notice that the hostname in the url has changed, or if she does, she figures that the catalog people have arranged to have Mallet's server host their 'secure' transactions (not an unreasonable assumption). Mallet takes the order and pockets the money. The hostname in the certificate (Mallet's) matches the hostname in the URL (also Mallet's). Of course this isn't really an attack on SSL per se. It's an attack on the certificate-granting policy- the CA gave a certificate to an unscrupulous person (Mallet). > > > Well of course, if the secret key of the server (or worse yet, certificate > > authority) is compromised, all bets are off. That's true of just about any > > protocol you can dream up. > > I'm not referring to the secret key of _the_ server; I'm referring to the > secret key of _ANY_ server. In the limiting case, such a key can be > obtained by buying one from the CA. Right. That's what I pointed out in an earlier message, although I didn't elaborate on it. The security of Netscape browsers depends on Verisign's policy in handing out server certificates. Backing up for a minute, the same problem holds for those neeto credit-card readers that Visa and MasterCharge give out to merchants. The merchant can be a crook setting up a 'store-front' operation to charge to bogus/stolen card numbers, or the employees can steal using the numbers they get in the corse of doing business, etc. There are already procedures in place for dealing with this sort of crime. I'm not sure that tricking Verisign into giving out a certificate to a group of crackers is really any different than tricking Visa into giving a card reader to a group of theives. -- Eric Murray ericm at lne.com ericm at motorcycle.com http://www.lne.com/ericm PGP keyid:E03F65E5 fingerprint:50 B0 A2 4C 7D 86 FC 03 92 E8 AC E6 7E 27 29 AF From asgaard at sos.sll.se Sun Oct 1 10:51:13 1995 From: asgaard at sos.sll.se (Mats Bergstrom) Date: Sun, 1 Oct 95 10:51:13 PDT Subject: Europe Message-ID: Perry M. wrote: > I was wondering if the Europeans had an equivalent of EPIC or EFF > lobbying against crypto restrictions there, given the disturbing news > a week or so ago. Europe, in this regard, is still mostly every country on it's own. Lobbying in Brussels is not for mortals, and decisions are in closed chambers anyway (the Commission; inter-governmental level). Sweden: The authorities have not yet said anything at all about where they stand in the GAK controversy. Probably very few have heard about it. A national IT-Commission was formed by the former government a year and a half ago, then they lost the elections a year ago and the new IT-Commission (yes, very partisan) has just settled down. The only thing that has come up on a public (television) level is demands from the police of access to decoded GSM traffic, which I believe is under implementation now (the obstacle has mainly been who is going to pay for the software updates of the GSM nodes). Sweden has rather strict rules for wiretapping (at least officially) and their is no public pressure for any change in this. On the local networks (the swnet.* newsgroups and Fidonet meetings) there is some discussion of crypto vs computer networking but only in obscure niches. If/when GAK will be proposed this might hopefylly change. I think the basic difference USA vs Sweden in this regard is a time delay of some years. We have lots of Internet nodes per capita (more than in the US, they say) but the net is still largly run by engineers (if only that could last!) and net awareness is rare above the age of 30 (i.e. among those who have a say). The European Council document (posted here in full by Dave Banisar) is certainly worrying. Of course, I've tried to spread it on the Swedish speaking networks For information on Swedish net cencorship there is a 'mini-CAF' at: http://www.dtek.chalmers.se/~d1dd/censorship/ PS Perry, what was your impression of the Swedes you met at the IETF meeting in Stockholm last July? I guess they were so happy about the new 34 Mbit/s connection to the New World that they forgot about the rest? Mats ********************************************************* For a searchable list of products in the Swedish national monopoly liquor-shops, see: http://lupus.physchem.kth.se/systemet.html From dee at cybercash.com Sun Oct 1 11:01:44 1995 From: dee at cybercash.com (Donald E. Eastlake 3rd) Date: Sun, 1 Oct 95 11:01:44 PDT Subject: DNS Security ( was Re: NetScape's dependence upon RSA down...) Message-ID: DNS security is an important point. People not aware of efforts in this area may want to check out draft-ietf-dnssec-secext-05.txt which has more or less passed working group last call and is being considered by th Security Area Directory / IESG. Reference code is also available (see message pasted at end below). Donald ===================================================================== Donald E. Eastlake 3rd +1 508-287-4877(tel) dee at cybercash.com 318 Acton Street +1 508-371-7148(fax) dee at world.std.com Carlisle, MA 01741 USA +1 703-620-4200(main office, Reston, VA) ================================ Date: Mon, 11 Sep 1995 10:24:28 -0400 From: James M Galvin To: dns-security at TIS.COM Subject: ANNOUNCEMENT: TIS/DNSSEC Version 1.2 alpha A new version of TIS/DNSSEC is now available. This version is distinguished from the previous version as follows. in sync with bind Beta26 uses RSAREF For information on how to acquire TIS/DNSSEC retrieve the file /pub/DNSSEC/README on the host ftp.tis.com via anonymous FTP. If you have any questions or problems please send a note to tisdnssec-support at tis.com. Enjoy, Jim From perry at piermont.com Sun Oct 1 11:21:12 1995 From: perry at piermont.com (Perry E. Metzger) Date: Sun, 1 Oct 95 11:21:12 PDT Subject: Simple Hardware RNG Idea In-Reply-To: Message-ID: <199510011820.OAA27233@frankenstein.piermont.com> Timothy C. May writes: > I'm not making an appeal to authority here, just telling you why I'm > skeptical of all of these proposals to make a radioactive decay-based > random number source. There are much easier ways.) I don't believe the "easier" ways are actually really easier, in so far as it is very hard to successfully demonstrate that there are no hidden flaws in most kinds of hardware RNGs -- showing you aren't picking up nearby RFI and turning it into your RNG output and things of that sort. A radioactive source is hard to manipulate at a distance. It will not produce a big volume of random numbers but it will produce pretty high quality ones. If you have a free running /dev/rand implementation that saves a lot of them up you should have enough for most of our purposes. And, as I noted, there are RS232 interfaceable radiation detectors you can buy off the shelf -- no hardware hacking needed. Perry From edgar at highnrg.sbay.org Sun Oct 1 11:26:52 1995 From: edgar at highnrg.sbay.org (Edgar Swank) Date: Sun, 1 Oct 95 11:26:52 PDT Subject: SecureDrive News - Win95, non-USA ftp sites Message-ID: -----BEGIN PGP SIGNED MESSAGE----- I have received the following information about running SecureDrive 1.4 with Win95, thanks to Ed Stone, This is what I sent to a person who asked how to use secdrive on win95...... >>>>>>>>>>>>>>>>>>>>>inserted text follows Try this: in your autoexec.bat file enter this, using your path to secdrive: C:\your-path-to-secdrive\SECTSR C:\your-path-to-secdrive\LOGIN your-encrypted-disk-letter: /S C:\your-path-to-secdrive\login your-encrypted-disk-letter: During normal win95 startup, you will be asked to enter your passphrase. Now when 95 come up, the tsr is running, your passphrase has been entered, and everything operates as if the disk is not encrypted. EXCEPT.... the tsr you have loaded (sectsr) makes windows load real-mode drivers for the disk, instead of protected mode drivers. This will make disk access somewhat slower, but not a big deal. When you startup win95 and you don't need to use secdrive, just hit enter when the boot process asks for your passphrase, and it will behave as if you entered a "wrong passphrase" and that drive will not be visible to win95, and protected mode drivers will load... Hope this helps. In particular that the normal drivers will load even with sectsr resident if the correct passphrase isn't entered is new and valuable information. I have also just learned that SecureDrive 1.4 is now available on some non-USA (and so not export-controlled) ftp sites, ftp://utopia.hacktic.nl/pub/disk/secdr14.zip ftp://ftp.ox.ac.uk/pub/crypto/misc/secdr14.zip I have verified that the hacktic file is an exact copy of the zip I released in the USA. Edgar W. Swank SecureDrive Co-author -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMG2BIt4nNf3ah8DHAQH49AP/YzmRhOLk+JdPx3emgWxv7vcX/2e7KR/Y WK0p1hiPUAHDsG3ZEd3fD+DZyILxq0oJcQSsrdtsAFiSnw955i/g+XsGFVT8UGku YzTXB4LXnJE4IqA2qd8aUKU9xk9S57xN1p+xrLlEK2jJrFMg+h9cPMp1a0lwivvP Ff2lF1+lthI= =DYRV -----END PGP SIGNATURE----- --- edgar at HighNRG.sbay.org Keep Freestyle Alive! From kinney at bogart.Colorado.EDU Sun Oct 1 12:18:16 1995 From: kinney at bogart.Colorado.EDU (W. Kinney) Date: Sun, 1 Oct 95 12:18:16 PDT Subject: Simple Hardware RNG Idea In-Reply-To: <199510011820.OAA27233@frankenstein.piermont.com> Message-ID: <199510011918.NAA22758@bogart.Colorado.EDU> Perry writes, regarding alpha decay counts for random numbers: > And, as I noted, there are RS232 interfaceable radiation detectors you > can buy off the shelf -- no hardware hacking needed. As far as a radiation source goes, the Americium 241 source from a cheap smoke detector is just dandy. A while ago, I took one into the lab and put it on a scintillating counter and got alpha hits at roughly half-microsecond intervals. It was a while ago, so I forget how this compared to the rating in Curies on the package. But that would be fine for a low-to-moderate bandwidth RNG. -- Will From alano at teleport.com Sun Oct 1 12:25:51 1995 From: alano at teleport.com (Alan Olsen) Date: Sun, 1 Oct 95 12:25:51 PDT Subject: WHERE did this [NOISE] come from? Message-ID: <199510011925.MAA17193@desiree.teleport.com> At 10:38 PM 9/30/95 GMT, you wrote: >Attatched to this is, (I hope), the header text from a unsolicited e-mail >message I received. The return address does not work. WHY? How can I >inform the sender that I hope to never receive there material again? > >I tried "reply-all" through Eudora, but my reply got bounced back to me >as undeliverable. > >I have removed the content of the original message. I don't know why it >was sent to me, but it contained material that I found offensive. > >Any help, or words of wisdom and enlightenment would be appreciated. >Information would be nice too. Well, at the bottom of the post, it listed contact info at: >National Alliance can also be reached at: > >WORLD WIDE WEB: http://www.natvan.com (if unavailable, try our ftp site) >FTP SITE: ftp.netcom.com, path /pub/NA/NA (I find it funny that they go through the trouble of forging an e-mail address yet they give ftp and web sites at the end of the page.) Hopefully that bit of targeting information will be of some use... | Visualize whirled keys | alano at teleport.com | |"It's only half a keyserver. I had to split the | Disclaimer: | |other half with the government man." - Black Art | Ignore the man | | -- PGP 2.6.2 key available on request -- | behind the keyboard.| | http://www.teleport.com/~alano | | From kinney at bogart.Colorado.EDU Sun Oct 1 12:29:19 1995 From: kinney at bogart.Colorado.EDU (W. Kinney) Date: Sun, 1 Oct 95 12:29:19 PDT Subject: Quantum Crypto: Anecdote Message-ID: <199510011929.NAA29289@bogart.Colorado.EDU> Given the regularity with which fears of factoring by quantum compters comes up around here, I thought I'd share a brief story: At a party last night, I ran into a couple of acquantances, and was delighted to learn that they are working on the current NIST quantum computing project, making quantum gates out of atomic traps similar to those used by Cornell and Weiman to get a Bose condensate with Rubidium (crypto relevance comes from odd places, eh?) Anyway, I talked them up a bit, and so far they've managed to construct a working "or" gate. The long-term project is to construct a quantum computer capable of factoring 15, which they expect to take at least several years. I mentioned crypto and they literally laughed at me. The word from the trenches is "don't worry about it for a very long time." -- Will From kinney at bogart.Colorado.EDU Sun Oct 1 12:39:05 1995 From: kinney at bogart.Colorado.EDU (W. Kinney) Date: Sun, 1 Oct 95 12:39:05 PDT Subject: Simple Hardware RNG Idea In-Reply-To: <199510011918.NAA22758@bogart.Colorado.EDU> Message-ID: <199510011938.NAA04391@bogart.Colorado.EDU> I write: > put it on a scintillating counter and got alpha hits at roughly > half-microsecond intervals. ^^^^^^^^^^^^^^^^ Um, sorry about that. That's half _millisecond_ intervals. What's three orders of magnitude between friends? As long as I'm correcting myself, I just sent another message with subject "Quantum Crypto..." which should have been "Quantum Computing..." Sigh. Sundays. -- Will From wilcoxb at nag.cs.colorado.edu Sun Oct 1 13:22:43 1995 From: wilcoxb at nag.cs.colorado.edu (Bryce Wilcox) Date: Sun, 1 Oct 95 13:22:43 PDT Subject: "alt.cypherpunks" Newsgroup vs. Mailing List? In-Reply-To: <19950930064113.AXK11529@cm.org> Message-ID: <199510012022.OAA07852@nag.cs.colorado.edu> -----BEGIN PGP SIGNED MESSAGE----- "Cancelmoose[tm]" wrote: > > I apologize for the delay in responding to your message -- I will be > putting a lot of information about NoCeM up on http://www.cm.org in > the next day or so. You can also find information in the newsgroup > alt.nocem.misc (if you get it). > > If these don't work for you, feel free to write to me, and I'd be > happy to send you whatever you need. I've had a look at the web site and it looks really interesting. It would make a great project if a bunch of cypherpunks installed NoCeM and then piped the list to a newsgroup. We could then develop reputation servers to help us use NoCeM, start charging cyberbucks for our recommendations, and, in short, make cpunks into a slightly larger outpost in Cyberlibertaria. (a.k.a. The Free Net) Bryce signatures follow To strive, to seek, to find and not to yield. bryce at colorado.edu http://ugrad-www.cs.colorado.edu/~wilcoxb/Niche.html -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Automatic PGP clearsigning under Unix with Bryce's Auto-PGP v1.0 iQCVAwUBMG72U/WZSllhfG25AQEbAAP+Kh8aNRsqfk9TmEtwhbIkhaKGeHh0CyNC lSQ+vak2IknE2QTxVP01hRGEXfQBZ9JOlxvEQK/ka3SqISmNl1WXo7mGBtk65t+R 42WehIoSuMGJ9maagCK+EPZM+o0PEyqGBA9n4m4GWb1ufM5FiBJISQDIkOQtHy+y +U07bKuw6lI= =vxTn -----END PGP SIGNATURE----- From jsw at neon.netscape.com Sun Oct 1 13:33:37 1995 From: jsw at neon.netscape.com (Jeff Weinstein) Date: Sun, 1 Oct 95 13:33:37 PDT Subject: NetScape's dependence upon RSA down for the count! In-Reply-To: <9510010446.AA11983@dmsd.com> Message-ID: <44mtu4$59h@tera.mcom.com> In article <9510010446.AA11983 at dmsd.com>, jbass at dmsd.com (John L. Bass) writes: > Another is since the clients are often distributed > over the net, that another filter is installed recognize clients and alter > them on the fly to avoid the client/filter problem in the future. This is kind of silly. If someone can patch the binary on the fly as you are downloading it, then all is lost, since they could just patch it to send them copies of any information they wanted. > Another tack is based on getting very close to the server (in a bridge or > router in the direct path to the server) in which the filter might acutally > be able to get the get valid certificates signed in the servers name, while > eating the real requests. I really don't understand what you are saying here. Do you mean that you could intercept a real server's certificate request, and substitute your own private key, and then intercept the response? This could be easily detected by the CA and the server operator, and I think is just a policy issue for the CA. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at neon.netscape.com Sun Oct 1 13:44:28 1995 From: jsw at neon.netscape.com (Jeff Weinstein) Date: Sun, 1 Oct 95 13:44:28 PDT Subject: NetScape's dependence upon RSA down for the count! In-Reply-To: <199510010812.BAA11516@ix4.ix.netcom.com> Message-ID: <44muie$59h@tera.mcom.com> In article <199510010812.BAA11516 at ix4.ix.netcom.com>, stewarts at ix.netcom.com (Bill Stewart) writes: > Or hack the Web of Trust used to verify the server's identity. > It _is_ still a Web of Trust even if it's a fascistly-hierarchical tree; > as long as it's possible to get a certificate without heavy contractual > obligations, you can hack it, since the software has no way to check, > now that Netscape is being nice and open and allowing non-Verisign certs. > Remember that anybody can be a CA, and keys can be signed by multiple CAs. > > Verisign Business CA signs Carol's Certification Consultants' key. > Carol signs Bob's Better Browser Business's key. > Bob runs a server, selling really cool web tools. > Verisign Business CA signs Moriarty's Mallet Makers' key. > Moriarty signs Mr. X's personna key (trust us.) > Mr. X makes a key called Bob's Better Browser Business, > looking suspiciously like the real thing, only it's > signed by Mr. X, and nobody bothered telling Bob about it. > > Alice, using Netscape, encounter's http://www.Bob'sBetterBrowser.com/, > and decides to order a Better Browser. She gets Bob's public key > and X.509 certificates by pressing a button, and receives a key > and a pile of certs. Since it's not a secure session yet, is Mr. X > intercepting them and sending her _his_ key and cert for "Bob" and his > personna key with cert from Moriarty and his key and cert from Verisign? > > So Mr. X rips off Alice and/or Bob somewhere here, and Alice decides to sue > Bob, who says "Hey, that's not my key, see my real set of certs", > so they go off after Mr. X, who they can't find, and then go after > Moriarty, who says "Hey, it's just a personna certificate; all I > guaranteed was that I didn't sign more than one with the same name on it", > which in fact appears to be true, and while after one case you can't > be sure that there really wasn't a Mr. X somewhere, if three or four > people start walking in saying Mr. X ripped them off using a key > that Moriarty signed, maybe somebody'll think it's a movement... You are making a lot of assumptions here. Lets say that the browser software is allowing certificate chaining (browser traverses certificate issuers until it finds one it trusts, then accepts the entire chain). There could be an attribute in the certificate that indicates whether the issuer is certifying it to be a subordinate CA. Presumably when Moriarty signs a persona certificate, it does not have this attribute. > Now, X.509 certs don't limit themselves to hierarchical or Web use, and most > advice on using them recommends limiting the depth of a tree/web that you're > willing to trust. Unfortunately, X.509 certs don't even have a comment field, > much less a standardized "how much do you trust this person you're signing" > field, > though I suppose you can cram a bit into the X.400/500-style name formats. X509 version 3 does support arbitrary extensions. We are making use of this feature in Netscape Navigator 2.0. Giving certificates attributes such as "how was their identity verified" and "what operations are they certified for" is an obvious application of this. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From William.Soley at Eng.Sun.COM Sun Oct 1 13:44:42 1995 From: William.Soley at Eng.Sun.COM (William Soley) Date: Sun, 1 Oct 95 13:44:42 PDT Subject: NetScape's dependence upon RSA down for the count! Message-ID: <199510012043.NAA06905@illilouette.Eng.Sun.COM> On Sun, Oct 1 1995, Simon Spero wrote: > On Sat, 30 Sep 1995, Don Stephenson wrote: > > > I don't think binding hostnames to certificates helps much because > > both hostnames and IP addresses can be spoofed and DNS servers can be > > subverted. The important thing is the binding to the "service" name or > > In this particular case, hostnames do help, because they are information > imbedded in the url used to access the server. By verifying the hostname > in the certificate with the hostname in the url, you can state with a > high degree of confidence that the object retrieved is precisely the > desired object covered by this url. > Hostnames help only a little. Often the host name belongs to the ISP that is providing the server resources. For example when I ordered sushi last night from WOW, the URL was "https://www.ird.net/[...]wow[...]", but the certificate was issued to "www.sunnyside.com" (as displayed by the File->DocumentInformation menu item in Netscape): Version: 00 Serial Number: 02:72:00:00:3C Issuer: C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority Subject: C=US, ST=California, L=Palo Alto, O=Sunnyside Computing, Inc., OU=Internet Services, CN=www.sunnyside.com PROBLEMS: (1) The certificate *was* issued with a host name in the CN field, but it did not match the host name in the URL and my browser did not care to warn me of this discrepency (I had to manually request to see the certificate and check it myself -- not a likely precaution for Joe Sixpack). (2) Even if the certificate did match the URL (and my browser did check it) I still have no way to know that "Sunnyside Computing" or "sunnyside.com" or "ird.net" is actually the authentic/official ISP for WOW and not an imposter or MITM. (3) Netscape is making the problem worse (yes, worse) in the next release by allowing the user to specify their own list of trusted CAs. (I will elaborate on this unpopular view below.) NON-PROBLEMS: (1) SSL did its job. It is only a session layer. It assured the application that a secure session was established with the entity named in the certificate. (2) The sushi was very good. :-) DISCUSSION: Re: problem 2, it would be better to have the certificate issued with the subject ... O=Waiters on Wheels ... CN=www.ird.net ... so that the browser can automatically check it against the URL and the user can be assured that (assuming suitable CA policy) ird.net is an authentic/official ISP for WOW. I think the browser should check the CN and hostname in the URL and display a popup warning if they do not match, and (optionally but by default) display a popup whenever a new session is started with a different certificate -- and of course show the certificate. This is not perfect, of course, its just better. Re: problem 3, about how allowing the user to specify their own list of trusted CAs is bad. All it takes is for any web page to put up text like ... "Dear Joe Sixpack, in order to assure your privacy while viewing these naughty pictures you must add the following certificate to your such-and-such file ..." and Joe Sixpack will be happy to do it. Even Mary Moderately-Savy might be tricked in to doing it on the false assumption that it would only affect security for the naughty pictures site (that she may not care about), and not affect security for her stock-broker. This false assumption might be based on the fact that the (legitimate) stock-broker uses a different CA. -Bill From rah at shipwright.com Sun Oct 1 14:02:34 1995 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 1 Oct 95 14:02:34 PDT Subject: N$ SSL vs M$ PCT Message-ID: --- begin forwarded text From: "John Hemming CEO MarketNet" Date: Sun, 01 Oct 1995 20:36:31 PM PDT To: www-buyinfo at allegra.att.com Mime-Version: 1.0 Subject: N$ SSL vs M$ PCT Having found that Micro$oft have produced a standards document about their alternative to SSL I was interested in comparing it to that written by Net$cape. The big question in my view is why did they produce a new proposal is it: a) Because they have found major flaws in the SSL protocol and wish to correct these (note the protocol not the implementation) or is it b) Because M$ want to "own" the Internet Security Software market and take the initiative off N$ who, notwithstanding their problems with implementation, have produced a working system. My personal view is that b) is the case. Comparison I have compared SSL V3 (available at www.netscape.com) PCT http://www.microsoft.com/windows/ie/pct.htm Both have status of Internet Draft. I have implemented SSL V2 in a browser (ftp://193.119.26.70/mktnet/pub/horse.zip) and a server (https://alpha.mkn.co.uk/) I have not implemented and do not intend implementing PCT Both SSL V3 and PCT now involve a vast number of different alternatives for Ciphers most of these alternatives do not help in any practical sense and I have not compared the lists. PCT allows for supporting SSL as well by using a bit in the SSL version number to indicate PCT. This means that servers can support both protocols. Clients cannot as the first message is sent by the client and there is no provision for SSL/PCT negotiation. Both PCT and SSL start with an initial session (GET or POST in wwwland) which establishes a master key and allow continuations of that key in later sessions. M$ use the following arguments in support of PCT: 1. it is simpler. PCT uses longer messages with more fields in them. It cuts out the final SERVER-FINISHED and CLIENT-FINISHED messages. It puts some of the data in SSL into other records. I quite like the verification in the CLIENT-FINISHED message which means that bad implementatations crash out at that point rather than putting rubbish into the higher level protocol. However, I consider that in essence there is no real difference. I, therefore, disagree with M$. 2. Message authentication uses different keys to the encryption keys. How this helps, apart from making implementation harder, I cannot quite fathom. We should not be using this secure channel protocol for proper message authentication only. The MAC (Message Authentication Code) is not what I would use for authentication from a legal and contractual background. I prefer Digitally Signed Instructions. 3. They say there is a security hole in SSL's client authentication. When the initial session establishing a session key uses (for example) 40 bit encryption. It does mean that subsequent sessions are also essentially just as insecure. This is the case for PCT and SSL. However, client authentication in SSL uses a digital signature using the client's private key. To get hold of this requires something more than simply being man in the middle. I think M$ are well out of order on this one. 4. They introduce a verify prelude field to make sure that the cipher type and other negotiations have not been tampered with. I suppose this is a fair if disingenuous point. If a "man in the middle" is tampering with your negotiations to make sure that you use a low level of encryption so that it can be cracked then your implementations should not be using such crippleware and cypherpunks will have cracked it ages ago. There is a point that should be made that servers and clients should really indicate the encryption cipher being used. Both my client and server do. So in essence M$ make 4 arguments. Two are IMHO wrong. One is irrelevant from a commercial perspective and the other one does not matter. In the end N$'s version is working. M$ are probably coding like mad. The final formula to determine the result may be if (M$>N$) SSL+=PCT; where M$ and N$ are measured in US Dollars. (MarketN�t is a UK company independent of both M$ and N$ although N$ were helpful in debugging the interoperability of my early essays into SSL for which I am grateful.) --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From jsimmons at goblin.punk.net Sun Oct 1 14:13:56 1995 From: jsimmons at goblin.punk.net (Jeff Simmons) Date: Sun, 1 Oct 95 14:13:56 PDT Subject: IBM enters WWW security market Message-ID: <199510012109.OAA00353@goblin.punk.net> > > -------- Forwarded message -------- > Newsgroups: comp.os.os2.announce > Date: Fri, 29 Sep 1995 14:49:59 GMT > From: tsipple at vnet.IBM.COM > Subject: OS/2 NEWS: New, secure version of WebExplorer > > Submitted by: Timothy F. Sipples (tsipple at vnet.ibm.com) > Source: Timothy F. Sipples (tsipple at vnet.ibm.com) > Date received: 1995 September 26 > Date posted: 1995 September 29 > ------------------------------------------------------------------------------ > New, secure version of WebExplorer for OS/2 Warp > > ATLANTA, Sept. 27, 1995--The latest additions to IBM's Internet > Connection software family will enable companies to encrypt > Internet transactions and better protect internal networks with > firewall software as they explore new business opportunities on > the Information Superhighway. > > Today's announcements include: > > * A new secure version of the Web Explorer for OS/2 Warp > > * The IBM Internet Connection Secure Server for OS/2 Warp > > * The Internet Connection Secure Server for AIX > > * An enhanced version of the Internet Connection Secured > Network Gateway > > * an enhanced version of the Internet Connection for OS/2 > Warp > > * an enhanced version of the Internet Connection for Windows > > "Businesses of all kinds are considering the immense opportunity > the Internet offers but are reluctant to take the plunge until > they feel they can do so in a planned, secure manner. The > Internet Connection family provides our customers with that > reassurance, freeing them to explore a whole new world of > possibilities," said Lois Dimpfel, vice president, Networking > Software Products, IBM Networking Software Division. > > The Internet is evolving as a means for conducting electronic > commerce, and the new IBM secure servers and OS/2 Warp client are > superbly positioned to meet customer security needs. The IBM > Internet Connection servers and client support both of the > emerging security technologies -- Secure Hypertext Transfer > Protocol (S-HTTP) and Secure Sockets Layer (SSL) -- to provide > customers with maximum flexibility. > > New OS/2 Warp client and secure servers > > The new version of the Internet Connection for OS/2 Warp, the > first Internet client to be included at no charge in an operating > system, adds security support to an Internet application suite > that has won generous praise in its first year of availability. > OS/2 Magazine recently chose the Internet Connection for OS/2 > Warp as a winner in its editors' choice awards. > > The Internet Connection family of client software was also > enhanced last week. The Internet Connection for OS/2 Warp, > provided at no charge as part of the Warp bonus pack, now > includes table support, streaming graphics, an integrated news > function and other enhancements through HyperText Markup Language > (HTML) 3.0 extensions. These enhancements will also be available > in the secure version being announced today. > > The InternetConnection for Windows was enhanced with improved > performance, additional graphic viewers, audio players and other > features. > > IBM's new web server software provides unmatched scalability for > customers. The OS/2 Warp version can run on cost-effective > desktop systems sold in retail outlets, while the AIX version > runs on highly-scalable RISC System/6000 platforms. > > Both the IBM Internet Connection Secure Server for OS/2 Warp and > the Internet Connection Secure Server for AIX were designed to be > quickly and easily configured using any industry-standard > browser. The installation and configuration is menu-based and > includes online help designed to assist an administrator with > making the correct choice. > > The new Internet Connection secure servers and clients allow > businesses and their customers to conduct transactions over the > 'Net knowing that the data is protected. For example, an auto > parts supplier might create a secure web server containing its > catalog, including high-quality images of the items, on the web > along with the ability to place an order. A customer would use > the Internet Connection secure client -- or an S-HTTP- or > SSL-compliant client from another vendor -- to browse the > online catalog, order a part and pay for it with an encrypted > credit card number. > > Enhanced secured network gateway > > A new version of IBM's Secured Network Gateway, a software > product generally known as an Internet "firewall," today joins > the Internet Connection product family. Formerly part of the > NetSP product family, the Secured Network Gateway operates on an > AIX platform to protect a corporation's internal enterprise > network resources from Internet intruders, while allowing > legitimate traffic to flow through the firewall. > > The Internet Connection Secured Network Gateway offers a number of > advanced features, including: proxy server, SOCKS servers, filters and > domain name service. > > Among several features added to the new version is support for > AIX version 4.13, in addition to AIX version 3.25. The new > operating system support offers customers the option to run the > Secured Network Gateway on PowerPC hardware. > > Another key feature of the new version is data encryption. Data > can safely flow between two firewalls across a public network. > The firewall encrypts IP data packets, creating a private "IP > tunnel" from one secure internal network to another. > > The new secure IP tunnels could be used for a company with the > Secured Network Gateway installed at its various sites to safely > and confidently transmit sensitive financial data from a branch > office over the Internet to corporate headquarters. Customers > could also use the new feature to securely administer a firewall > from a remote location. > > Internet Connection directions > > Just as the Internet itself continues to expand phenomenally, the > Internet Connection family, now consisting of seven generally > available products, will also grow. Current product plans call > for additional web clients on a number of platforms, and web > server software for OS/400, MVS and selected non-IBM systems. > > "We don't intend to just keep pace with the market; we intend to > be the pacesetter," said IBM's Dimpfel. "IBM has worldwide reach > and strengths like no other company. The IBM Global Network, > robust software products, IBM services and gateway software to > link with existing business systems using DB2 and CICS--all this > means customers don't have to deal with patching together > solutions from a collection of vendors." > > The Internet Connection product family is a component of IBM's > imperative to provide people and organizations with > network-centric computing, a new model that combines networking > software, network services and computing devices to facilitate > computing anywhere, anytime. > > IBM, the world's largest software provider, creates, develops and > manufactures the industry's most advanced information technologies, > including networking systems, software, computing systems, storage > devices and microelectronics. > > Pricing and availability > > The secure server software for OS/2 Warp is $2,999 for the first > license with additional licenses available for $2,699 each. The > AIX secure server software is $4,999 for the first license and > $4,499 for an additional license. The Internet Connection Secured > Network Gateway is priced at $9,999 for the first license, with > additional licenses available for $8,999. > > The new secure WebExplorer for OS/2 Warp is $35 per copy and > pricing on the enhanced IBM Internet Connection for Windows has > been reduced to $59. > > Both secure servers and the secure Web Explorer for OS/2 Warp > will be generally available in December of this year. The new > version of the Secured Network Gateway will be available in > October. > > > IBM, OS/2, AIX, CICS, DB2 and RISC System/6000 are trademarks of IBM. > > Windows is a trademark of Microsoft Corp. > -- Jeff Simmons jsimmons at goblin.punk.net From raph at CS.Berkeley.EDU Sun Oct 1 15:32:25 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Sun, 1 Oct 95 15:32:25 PDT Subject: CJR for perl-RSA t-shirt Message-ID: <199510012231.PAA00669@kiwi.cs.berkeley.edu> Here is a draft of the CJR I intend to file, for the perl-RSA t-shirt. Please check it over for technical inaccuracies or other problems. It should sound quite familiar, as I have shamelessly ripped off the CJR that Phil Karn filed for the Applied Cryptography book. Let me know what you think! Raph ======================================================================= ATTN: Maj Gary Oncale - 15 Day CJ Request U.S. Department of State Office of Defense Trade Controls PM/DTC SA-6 Room 200 1701 N. Fort Myer Drive Arlington, VA 22209-3113 Fax +1 703 875 5845 ATTN: 15 Day CJ Request Coordinator National Security Agency P.O. Box 246 Annapolis Junction, MD 20701 Subject: Mass Market Software with Encryption - 15 Day Expedited Review Requested Subject: Commodity Jurisdiction Request for perl-RSA t-shirt, an encryption program INTRODUCTION This is a Commodity Jurisdiction Request for mass market software with encryption capabilities. The name of the software product is "perl-RSA t-shirt", by Adam Back. It is published in the form of a t-shirt by Joel Furr, 916 W. Trinity Ave, #10, Durham NC 27701. I have no DTC registration code. I have reviewed and determined that this t-shirt, the subject of this CJ request, meets paragraph 1 of the "Criteria for Determining the Eligibility of A Mass Market Software Product for Expedited Handling." I base this determination on the following facts: a) this t-shirt is readily available from Joel Furr, and has been shipped in quantity of several hundred copies, thus qualifying it as mass market software; b) sufficient documentation is included to allow installation and use by any end user capable of typing in the software, or scanning the bar code, and running it. Additional documentation is available on the Internet World Wide Web at http://dcs.ex.ac.uk/~aba/rsa/ . To my knowledge the author and publisher provide no "product support" as that term is generally understood; and c) the t-shirt contains encryption software source code listings that provide confidentiality. A duplicate copy of this CJR has been sent to the 15 Day CJ Request Coordinator. DESCRIPTION The t-shirt contains an implementation of the RSA asymmetric cryptographic algorithms. Furthermore, instructions, in the form of a terse usage string, are given for using the implementation to provide confidentiality. The source code of the implementation is featured both as four lines of text and also as a bar code, making the t-shirt machine readable as well as machine washable. The algorithm is implemented in the Perl scripting language, and will run on any standard Unix configuration that includes both an implementation of the Perl language and the common "dc" (desk calculator) program. Two copies of the shirt are included with the filing of this CJ request. ORIGIN OF COMMODITY This t-shirt originates in the United States. While the primary author is a citizen of the United Kingdom, living in England, other contributors to the work are citizens of the US living in the US. The publisher is a United States citizen living in the United States. The t-shirts are manufactured and printed in the United States. The cryptographic algorithm implemented in this t-shirt comes from various sources, at various times, and was produced with both private and public sources of funding. The source code implementation contained in the t-shirt also comes from a variety of countries, including Australia, Canada, the United States and the United Kingdom. The algorithm is thought to be designed for private and commercial civilian use. The t-shirt is currently publicly available from Joel Furr, at a list price of $12.36, including shipping and handling. More ordering information is available on the Internet World Wide Web at http://www.danger.com/ad-perl.html . CURRENT USE The t-shirt is intended as an implementation of the RSA cipher for those who wish to incorporate encryption into their communications. The small size of the implementation makes it particularly useful in contexts in which existing cryptographic infrastructure is not available. Examples of the commercial use of the cipher implemented include integrity verification, authentication and confidentiality of electronic mail, computer software, voice, video and other information in digitized form. For example, the cipher is used either by itself for email privacy, and also as a component in other protocols that provide privacy and authentication, including PGP (Pretty Good Privacy), S/MIME (Secure Multipurpose Internet Mail Extensions), MOSS (MIME Object Security Services), PEM (Privacy Enhanced Mail), and SSL (Secure Sockets Layer). The uses of this cipher have not changed significantly over time, although their popularity has grown substantially. Their present military utility is unknown, except that it is believed that the algorithm is not approved for the protection of US classified information. SPECIAL CHARACTERISTICS There are no military standards or specifications that this t-shirt is designed to meet. There are no special characteristics of the t-shirt, including no radiation-hardening, no ballistic protection, no hard points (the t-shirt is only available in soft 100% cotton), no TEMPEST capability, no thermal and no infrared signature reduction capability (in excess of that provided by a typical black cotton t-shirt), no surveillance, and no intelligence gathering capability. The t-shirt does not use image intensification tubes. OTHER INFORMATION I recommend that this t-shirt be determined to be in the jurisdiction of the Commerce Department. I believe that it qualifies for the general license GTDA for General Technical Data to All Destinations, because it qualifies as "publicly available". ATTACHMENTS I have enclosed two copies of the t-shirt, included with the primary filing of this CJ request. Sincerely, Raphael L. Levien From rsalz at osf.org Sun Oct 1 15:49:06 1995 From: rsalz at osf.org (Rich Salz) Date: Sun, 1 Oct 95 15:49:06 PDT Subject: I am the anti-Ch Message-ID: <9510012248.AA07906@sulphur.osf.org> I got some email responses to my SAIC info. Here's a little more fun on a Sunday evening. All the statements below are true. Among the first two (possibly the very first two) MX records for not-connected sites desiring Internet-style names were: att.com and mirror.tmc.com. That is, the phone company, and a small subsidiary of the Times-Mirror corporation. It was from mirror that mod.sources/comp.sources.unix was moderated -- for many years, the only source of free software available to Usenet. Seismo was the forwarder for both ATT and TMC (via special-case lines in Rick's sendmail.cf file). ATT, through ihnp4 in Chicago (site of the Democratic convention), vied with seismo for the we'll-call-anyone philosophy that a few sugar daddies (er, backbone) sites had that kept uucp Email and Usenet running back then. Under the auspices of the curiously-named "Network Action Central" many ATT sites did dialup UUCP to mirror on a daily basis, ostensibly to pick up mod.sources. I was the administrator of mirror.tmc.com; the tmc.com domain "conflicted" with tmc.edu, the Texas Medical Center. The NIC back then asked me to ask tmc.edu to "reconsider." Do you know where their book depository is/was? Rick started Alternet, now "Shared" with Microsoft. Unlike Sprint and MCI, ATT "curiously" decided to *not* become a network service provider, but instead allied with BBN and sells their technology, equipment and services. I worked at BBN for five years, in the same department that became BBNPlanet, the global ISP and ATT's partner. I also wrote INN, which now handles essentially all the Usenet traffic in the world. So who cares about the latest media mega-deal of Eisner or Time-Warner-Turner? We already control the Internet media; the Web is merely~~~~#@ NO CARRIER From ylo at cs.hut.fi Sun Oct 1 17:05:45 1995 From: ylo at cs.hut.fi (Tatu Ylonen) Date: Sun, 1 Oct 95 17:05:45 PDT Subject: DNS Security ( was Re: NetScape's dependence upon RSA down...) In-Reply-To: Message-ID: <199510020005.CAA26574@shadows.cs.hut.fi> > For information on how to acquire TIS/DNSSEC retrieve the file > /pub/DNSSEC/README on the host ftp.tis.com via anonymous FTP. Does anyone know if this is available outside the United States? If it is, please let me know. I'd like add a link to it from the WWW pages at http://www.cs.hut.fi/crypto. Tatu Ylonen From jbyrd at tiac.net Sun Oct 1 17:16:31 1995 From: jbyrd at tiac.net (Jim Byrd) Date: Sun, 1 Oct 95 17:16:31 PDT Subject: More forged cancels Message-ID: <44n926$2dj@sundog.tiac.net> These were found in control. Note that they all have the string "CANCELLED", and all are timestamped 17:56. The first one is definitely forged. The others look like they probably are. I asked Jukka Santala, and he didn't issue that forgery. I asked Joel Rubin, and haven't gotten a response yet. I haven't asked the other people yet. So I'll go ahead and post this, crossposted to the affected groups. It looks like the Cancelschnauzer is hitting lots of groups. A note to the canceller: if you try to cancel this, I'll just put it back. -----------------begin control message Path: sundog.tiac.net!news.sprintlink.net!in2.uu.net!sunic!mn6.swip.net!seunet!news2..swip..net!plug..ne ws.pipex.net!pipex!tank.news.pipex.net!pipex!usenet.eel.ufl.edu!news.gmi..edu!msunews!netnew s.upenn.edu!ts7-28.upenn.edu!user From: 73323.603 at compuserve.com Newsgroups: soc.culture.german,soc.culture.jewish Subject: cmsg cancel <73323.603-3009951517290001 at ts7-28.upenn.edu> Date: Sun, 1 Oct 1995 17:56 GMT Organization: The National Alliance Message-ID: NNTP-Posting-Host: ts7-28.upenn.edu Approved: 73323.603 at compuserve.com Control: cancel <73323.603-3009951517290001 at ts7-28.upenn.edu> X-Cancelled-By: 73323.603 at compuserve.com Lines: 1 CANCELLED. ----end control message These others are suspicious, the Santala cancel is definitly forged. I don't have the original posts of any of these, I suspect they are all related to National Alliance. ------------rest of the cancels: Path: sundog.tiac.net!news.kei.com!news.mathworks.com!tank.news.pipex.net!pipex!in2..uu..net!howla nd.reston.ans.net!ix.netcom.com!netnews From: jmrubin at ix.netcom.com (Joel Rubin) Newsgroups: soc.culture.german,soc.culture.jewish,rec.radio.shortwave,alt.2600 Subject: cmsg cancel <44lfpn$qoh at ixnews7.ix.netcom.com> Date: Sun, 1 Oct 1995 17:56 GMT Organization: Netcom Message-ID: NNTP-Posting-Host: ix-sf17-08.ix.netcom.com Approved: jmrubin at ix.netcom.com (Joel Rubin) Control: cancel <44lfpn$qoh at ixnews7.ix.netcom.com> X-Cancelled-By: jmrubin at ix.netcom.com (Joel Rubin) Lines: 1 CANCELLED. ======== Path: sundog.tiac.net!news.sprintlink.net!in2.uu.net!sun4nl!xs4all!mail From: nobody at alpha.c2.org (Anonymous) Newsgroups: mail.cypherpunks,alt.privacy.anon-server,alt.2600,alt.stop.spamming,alt..stop- spamming Subject: cmsg cancel <199510010427.VAA28730 at infinity.c2.org> Date: Sun, 1 Oct 1995 17:56 GMT Organization: Mail to Usenet Gateway at Utopia Message-ID: NNTP-Posting-Host: utopia.hacktic.nl Approved: nobody at alpha.c2.org (Anonymous) Control: cancel <199510010427.VAA28730 at infinity.c2.org> X-Cancelled-By: nobody at alpha.c2.org (Anonymous) Lines: 1 CANCELLED. ======== Path: sundog.tiac.net!news.sprintlink.net!in2.uu.net!sunic!sunic!sunic.sunet.se!news..funet..fi!zippo..uwa sa.fi!!jsantala From: jsantala at walli.uwasa.fi (Jukka Santala) Newsgroups: alt.2600,news.admin.net-abuse.misc Subject: cmsg cancel Date: Sun, 1 Oct 1995 17:56 GMT Organization: And you think we're organized? Message-ID: NNTP-Posting-Host: walli.uwasa.fi Approved: jsantala at walli.uwasa.fi (Jukka Santala) Control: cancel X-Cancelled-By: jsantala at walli.uwasa.fi (Jukka Santala) Lines: 1 CANCELLED. ======== Path: sundog.tiac.net!news.texas.net!newshost.comco.com!news.tamu.edu!news.utdallas..edu!news01.. aud.alcatel.com!gatech!news.mathworks.com!zombie.ncsc.mil!simtel!news.sprintlink..net!in2..uu.. net!sunic!mn6.swip.net!seunet!news2.swip.net!plug.news.pipex.net!pipex!tank..news..pipex..net!pi pex!news1.digital.com!nntp-hub2.barrnet.net!nntp-ucb.barrnet.net!well!usenet From: themed at well.com Newsgroups: alt.2600 Subject: cmsg cancel <44mknk$1m0 at nkosi.well.com> Date: Sun, 1 Oct 1995 17:56 GMT Organization: The Whole Earth 'Lectronic Link, Sausalito, CA Message-ID: NNTP-Posting-Host: sf-tty7-ppp.well.com Approved: themed at well.com Control: cancel <44mknk$1m0 at nkosi.well.com> X-Cancelled-By: themed at well.com Lines: 1 CANCELLED. ======== From rsalz at osf.org Sun Oct 1 17:33:58 1995 From: rsalz at osf.org (Rich Salz) Date: Sun, 1 Oct 95 17:33:58 PDT Subject: Kerberos Message-ID: <9510020033.AA08263@sulphur.osf.org> >From: "David J. Bianco" Date: Sun, 24 Sep 1995 16:32:30 -0400 >The Open Software Foundation's Distributed Computing Environment has the >concept of a central security registry (which is currently based on >Kerberos). I haven't delved too deeply into them, but the OSF website has >some DCE RFCs about adding public key capabilities to the registry. They >should be off the OSF home page somewhere at . Sort of. The DCE registry isn't really based on Kerberos. Rather, DCE uses Kerberos code to do its private-key stuff. We're planning on adding the ability to use public key to get initial tickets to the security server. Outside of integration with other security domains, this means that the security server no longer needs to store everyone's private key, reducing exposure if it's been cracked. If anyone wants more details on how current or planned DCE security, drop me a line. Perhaps some of the other folks on this list who also know about it will speak up, too. /r$, DCE whipping boy From banisar at epic.org Sun Oct 1 17:55:22 1995 From: banisar at epic.org (Dave Banisar) Date: Sun, 1 Oct 95 17:55:22 PDT Subject: Europe Message-ID: At 6:45 PM 10/1/95, Mats Bergstrom wrote: >Perry M. wrote: > >> I was wondering if the Europeans had an equivalent of EPIC or EFF >> lobbying against crypto restrictions there, given the disturbing news >> a week or so ago. > There are a few groups in Europe (Privacy International is based in UK, Argedaten in Austria, CLI in Spain, misc EF-X) but none of them are as organized as their US counterparts. However, there are also Privacy Commissions in every country who are also friends to the battle. There was quite a bit of discussion at their last meeting in Copenhagen last month on crypto and the Denmark and Ontario, CA Privacy Commissions just came out with a joint report on crpyto that we are working on scanning in and making available on our web page. Dave David Banisar (Banisar at epic.org) * 202-544-9240 (tel) Electronic Privacy Information Center * 202-547-5482 (fax) 666 Pennsylvania Ave, SE, Suite 301 * HTTP://www.epic.org Washington, DC 20003 * ftp/gopher/wais cpsr.org From alanh at infi.net Sun Oct 1 17:59:05 1995 From: alanh at infi.net (Alan Horowitz) Date: Sun, 1 Oct 95 17:59:05 PDT Subject: SAIC in VA In-Reply-To: <199509301133.HAA22001@light.lightlink.com> Message-ID: You left out their subsidiary in Springfield VA. Plain Vanilla broadcast engineering consulting - mostly.... Alan Horowitz alanh at infi.net From rah at shipwright.com Sun Oct 1 17:59:24 1995 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 1 Oct 95 17:59:24 PDT Subject: CJR for perl-RSA t-shirt Message-ID: >Subject: Mass Market Software with Encryption - 15 Day Expedited Review > Requested > >Subject: Commodity Jurisdiction Request for > perl-RSA t-shirt, an encryption program ROTFL! I haven't had this much fun since the hogs ate my little brother. Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From ccshag at cclabs.missouri.edu Sun Oct 1 18:17:17 1995 From: ccshag at cclabs.missouri.edu (Paul 'Shag' Walmsley) Date: Sun, 1 Oct 95 18:17:17 PDT Subject: WHERE did this come from? In-Reply-To: <44kgtb$88i@news.rain.org> Message-ID: <44ncdp$5gt@news.missouri.edu> Joel Rubin (jmrubin at ix.netcom.com) wrote: : In article <44leli$s38 at ixnews6.ix.netcom.com>, VMARX at ix.netcom.com : says... : > : >In <44kgtb$88i at news.rain.org> rivaud at rain.org writes: : >> : >>This is a multi-part message in MIME format. : >> : >>---------------------------------17921121372935 : >>Content-Transfer-Encoding: 7bit : >>Content-Type: text/plain; charset=us-ascii : >> : >>Attatched to this is, (I hope), the header text from a unsolicited : >e-mail : >>message I received. The return address does not work. WHY? How can I : > : >>inform the sender that I hope to never receive there material again? : >> : >>I tried "reply-all" through Eudora, but my reply got bounced back to : >me : >>as undeliverable. : >> : >>I have removed the content of the original message. I don't know why : >it : >>was sent to me, but it contained material that I found offensive. : >> : >>Any help, or words of wisdom and enlightenment would be appreciated. : >>Information would be nice too. : >> : > : >I got the SAME dammed letter. I don't know who the facist bastard is : >that sent it to me, but I sent him a reply ALSO telling him to stop : >sending it to me (he sent me 3 copies) and I couldn't connect to his : >server. : > : I don't know if this is connected but I notice that a "let's use these : big lie tactics on Usenet" posting allegedly from the National : Alliance's Compuserve address seems to have somehow gone through the : University of Pennsylvania. : "Things are seldom what they seem. : Skim milk masquerades as cream." The E-mails seem to be coming from different sendmails; the copy I got supposedly originated from slip-1.slip.net and bounced through a few French sites. Perhaps s/he's hedging their bets? -- - Paul "Shag" Walmsley "Praise and blame alike mean nothing." -- Virginia Woolf From grigor42 at aurora.eexi.gr Sun Oct 1 18:21:15 1995 From: grigor42 at aurora.eexi.gr (grigor42 at aurora.eexi.gr) Date: Sun, 1 Oct 95 18:21:15 PDT Subject: WHERE did this come from? Message-ID: <199510020118.DAA26188@info.forthnet.gr> This asshole's spam reached Greece too - how do you deal with such crap? (Yes I'm a newbie but I'm interested in crypto - so little about it reaches my country) Thanx G.A.M. +--------------------------------------------------+ | grigor42 at eexi.gr | So long and thanks | | Grigoris A. Miliaresis | for all the fish. | | Athens | DNA | | Greece | | | -INFO WANTS 2 B FREE - | +--------------------------------------------------+ From froomkin at law.miami.edu Sun Oct 1 18:46:29 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Sun, 1 Oct 95 18:46:29 PDT Subject: Netscape and privacy In-Reply-To: <44fin4$rdq@tera.mcom.com> Message-ID: With all respect to you and to Netscape (I am one who thinks that the Netscape participation on this list has reflected very well on the participants and the company), I think that the reply "we only collect IP addresses" is not fully responsive to the issue. While I recognize that there are implementations that assign a new IP address to every login, I understand the current norm to be static IP addresses. I sure have one. Thus, if you keep a file of my IP address, and a fact about that address, you have a database that can be purchased and correllated with another DB, which links IP to somehting else, eg telephone numbers (perhaps from a contest run on the internet?). Pretty soon we are at serious profiling.... **** PLEASE NOTE NEW E-MAIL ADDRESS: froomkin at law.miami.edu ********* A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | New address, but it's still just as hot here. From cman at communities.com Sun Oct 1 18:54:35 1995 From: cman at communities.com (Douglas Barnes) Date: Sun, 1 Oct 95 18:54:35 PDT Subject: Crypto hardware summary Message-ID: [A summary of my points on crypto hardware follows my response to Norm.] Norm Hardy writes: >What key length are you using that takes 3.2 sec? >The DSP can operate concurrently with other processing, giving an >improvement greater than 3.2/1.9. I'm aware of this -- I was using Tim's pessimistic estimate of improvement... to make it clearer for those who didn't read his post, I should have said, "Even if the reduction is only from 3.2 seconds to 1.9 seconds, it would be significant for someone running a server." I'm aware that with DSPs you can get rather better results; an ASIC will get you another order of magnitude over DSPs (assuming equivalent price -- the Moto 96K DSP is a real gem for bignum math but is many times more expensive than an equally effective ASIC. They were also having serious availability problems last year...) Here is a summary of my points on this subject to date, for those who haven't been following this discussion: o Using coprocessors of any sort to achieve speed in cryptography operations is probably not justified for end users; it is almost always justified for servers with a high volume of transactions requiring public key authentication or encryption. o DSPs are not really as attractive as general purpose CPUs for accelerating cryptography for high-volume servers. Although DSP architecture is somewhat more conducive to bignum math, the benefits seem to be offset by the wide availability of standard CPUs and tools for programming them. If a large increase in speed is desired without resorting to single-purpose hardware, I recommend using a large number of standard CPUs as coprocessors, rather than an equivalent approach with DSPs. (The fact that uint multiplies on a 486 take multiple clock cycles is offset by the higher internal clock speeds and lower cost of the 486. You can point out super-fast DPSs, and I can point out their super-large price tags, more expensive tools, and substantially more expensive programmers.) o The real way to go for speed is ASICs, which give you much better bang for the buck, although they have disadvantages, including problems of export, inflexibility, etc. My favorite RSA chip board so far is from Uti-Maco in Belgium, which is a tamper-resistant add-in card with a 8086-compatible controller and a custom BIOS for doing RSA and DES operations in h/w, which allows s/w to be developed using standard tools. (I have ranted at length about the complications involved with _Beligan_ crypto export controls, which seem to stem from NATO pressure and US desire to balkanize the market for cryptography products.) o People doing valuable transactions on servers are going to want tamper resistance and hardware-key security. This is more important in some cases than speed, although speed is also very important. o People running cryptography-based transaction clients on their PCs are going to learn, one way or another, that having valuable secret keys on their hard disks is not a great idea. This, not speed, is the primary motivation for consumer-oriented cryptography hardware. People want their keys and financial transactions on secure, removable, non-mechanical media. Products that provide this are just starting to come on the market, notably from National Semiconductor and Telequip. o End-user software will need to be written to allow, but not require, external cryptography devices. Consequently, consumer software that performs valuable transactions still needs to be written in an extremely paranoid fashion with respect to the reliability and security of the underlying hardware. From froomkin at law.miami.edu Sun Oct 1 18:58:19 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Sun, 1 Oct 95 18:58:19 PDT Subject: Crypto hardware (was: Using sound cards to accelerate RSA?) In-Reply-To: Message-ID: On Thu, 28 Sep 1995, Douglas Barnes wrote: [...] > communications problems, their fear of RSA Labs, new Belgian > export controls they haven't tried to work with yet, and their > belief that I need a US crypto import license, which I can't persuade > anyone to admit _exists_. There is no such animal under US law. Note however (1) you need export permission to re-export the import, just as if it was produced here; (2) the company may have legitimate fears that it may have liability and/or bad PR with the feds under either US or Belgian law if you attempt a re-export; (3) For all I know, Belgian law may require some US paper showing what you will do with the stuff before they are allowed to export it. A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | New address, but it's still just as hot here. From gmiller at grendel.ius.indiana.edu Sun Oct 1 21:40:33 1995 From: gmiller at grendel.ius.indiana.edu (Greg Miller) Date: Sun, 1 Oct 95 21:40:33 PDT Subject: Spoofing HTTP server certificates Message-ID: Since there has been a lot of talk about the "man in the middle" attack on the secure web servers, has anyone actually considered the processing time required to fake a certificate from scratch? I haven't really familiarized myself with how the certificates are generated, etc, but it's my understanding that they are signed with RSA. The few recent factorings of RSA keys have shown that brute force attacks are feasable with distributed processing. Since these projects were done "just for the fun of it", wouldn't it seem likley that someone (or some people) would take the time and effort to factor the certificate signing key? After all, it would actually be worth something. gmiller at grendel.ius.indiana.edu http://www.ius.indiana.edu/~gmiller/ From jamesd at echeque.com Sun Oct 1 21:42:30 1995 From: jamesd at echeque.com (James A. Donald) Date: Sun, 1 Oct 95 21:42:30 PDT Subject: Cryptanalysis of RC4 - Preliminary Results (Repeat) Message-ID: <199510020442.VAA14808@blob.best.net> At 06:39 AM 9/30/95 -0400, Dr. Frederick B. Cohen wrote: >The problem is that if these keys are weak, there may be many others >that are also weak. In fact, by the time we explore all of the >weaknesses, we may find the system is no longer very strong at all. These so called weak keys are far from weak. You have a 1 in 64000 chance of reducing the search space by 64000. Big deal. Use 128 bit session keys. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From tcmay at got.net Sun Oct 1 22:00:58 1995 From: tcmay at got.net (Timothy C. May) Date: Sun, 1 Oct 95 22:00:58 PDT Subject: Restrictions on Munitions _Imports_ Message-ID: At 1:58 AM 10/2/95, Michael Froomkin wrote: >On Thu, 28 Sep 1995, Douglas Barnes wrote: >[...] >> communications problems, their fear of RSA Labs, new Belgian >> export controls they haven't tried to work with yet, and their >> belief that I need a US crypto import license, which I can't persuade >> anyone to admit _exists_. > >There is no such animal under US law. Note however (1) you need export >permission to re-export the import, just as if it was produced here; (2) I don't expect that any specific _crypto_ import licenses exist, but certainly various kinds of _munitions_ import licenses exist (improperly, in my opinion, of course). Specifically, importers of guns must have licenses. And not just because of local laws, as the Feds (U.S. Customs, BATF) get involved in seizures of ammunition, clips, guns, etc. (A recent case here in the Bay Area involved the highly publicized seizure of some large number of crates of Chinese or Russian 7.39 mm ammo...it was alleged that improper licenses had been gotten, or had been forged, or some other such crime. After Feinswine got her media attention, calling the imports "shocking," it was later admitted that the warehouse contents were duly licensed and the news was carried on page C23 that the importers were kosher. (As with most laws, a welter of competing laws are involved. The Gun Control Act of 1968 is involved, as is the McClure-Volkmer Act, etc. And during the recent anti-gun hysteria, new laws were passed about the importation of ammunition, clips, etc.) As far as other munitions go, try "importing" a French Exocet, a Russian Strelka, or any number of other "munitions" items. Given that crypto is classified as "munitions" for the purpose of export control (including the ITARs), it would not surprise me in the least if the same sorts of restrictions on imports of the aforementioned munitions are not applied to at least some crypto imports. If not now, soon. (Given that many folks are talking about a strategy that has been apparent for many years: develop core crypto in less hostile environments than the U.S.) I can't cite a specific law affecting crypto imports at this time--and I doubt any crypto products have been affected so far--but clearly there are restricitions on imports of ammunition, guns, missiles, jet fighters, and--maybe soon--on "crypto munitions." --Tim May ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From orbit at ix.netcom.com Sun Oct 1 22:13:04 1995 From: orbit at ix.netcom.com (Michael R. Grabois) Date: Sun, 1 Oct 95 22:13:04 PDT Subject: More forged cancels In-Reply-To: <44n926$2dj@sundog.tiac.net> Message-ID: <44nmd0$q13@ixnews6.ix.netcom.com> On Sun, 01 Oct 1995 23:45:24 GMT, jbyrd at tiac.net (Jim Byrd) wrote: [snip] >-----------------begin control message >Path: >sundog.tiac.net!news.sprintlink.net!in2.uu.net!sunic!mn6.swip.net!seunet!news2..swip..net!plug..ne >ws.pipex.net!pipex!tank.news.pipex.net!pipex!usenet.eel.ufl.edu!news.gmi..edu!msunews!netnew >s.upenn.edu!ts7-28.upenn.edu!user >From: 73323.603 at compuserve.com >Newsgroups: soc.culture.german,soc.culture.jewish >Subject: cmsg cancel <73323.603-3009951517290001 at ts7-28.upenn.edu> >Date: Sun, 1 Oct 1995 17:56 GMT >Organization: The National Alliance >Message-ID: >NNTP-Posting-Host: ts7-28.upenn.edu >Approved: 73323.603 at compuserve.com >Control: cancel <73323.603-3009951517290001 at ts7-28.upenn.edu> >X-Cancelled-By: 73323.603 at compuserve.com >Lines: 1 >CANCELLED. >----end control message Does this mean that the cancel came from the Compuserve account? Forging cancel notices is definitely against CIS rules, as is unsolicited e-mail. I've already talked to a sysop there about it, and he said he'd pass it along to the CIS Security folks. If nothing else, that may get his account revoked. Hey, small victories. Michael R. Grabois | orbit at ix.netcom.com Houston, TX | CI$: 74737,2600 ------------------------------------------------------- Gravity. It's not just a good idea, it's the law. From futplex at pseudonym.com Sun Oct 1 22:16:19 1995 From: futplex at pseudonym.com (Futplex) Date: Sun, 1 Oct 95 22:16:19 PDT Subject: User-Specified Trusted CAs in Netscape (Was: Re: NetScape's dependence upon RSA down for the count!) In-Reply-To: <199510012043.NAA06905@illilouette.Eng.Sun.COM> Message-ID: <199510020516.BAA21934@giane.cs.umass.edu> Bill Soley writes: > (3) Netscape is making the problem worse (yes, worse) in the next release > by allowing the user to specify their own list of trusted CAs. (I will > elaborate on this unpopular view below.) [...] > Re: problem 3, about how allowing the user to specify their own list of > trusted CAs is bad. [...] > it. Even Mary Moderately-Savy might be tricked in to doing it on the > false assumption that it would only affect security for the naughty > pictures site (that she may not care about), and not affect security for > her stock-broker. This false assumption might be based on the fact > that the (legitimate) stock-broker uses a different CA. You seem to be overstating your point a bit. The real problem here, AFAICS, is that the proposed protocol in the software wouldn't allow sufficiently fine-grained control over the certification authority approval. The user should be able to specify the conditions under which a CA is to be trusted, not simply give a blanket approval or rejection. It looks as though a set of trusted (CA, site) pairs would suffice. How about it, Netscape ? Give the user the opportunity to say "I trust certificates from Alfie's World of Key Certification regarding keys for interactions with Elvira's Copier Shack." -Futplex From tcmay at got.net Sun Oct 1 22:17:33 1995 From: tcmay at got.net (Timothy C. May) Date: Sun, 1 Oct 95 22:17:33 PDT Subject: The Free Speech Implications of Remailers Message-ID: I've seen a bunch of messages in this group, and on Usenet, about what can be done to track down and punish (or otherwise stop) the posters of racist, fascist, inflammatory posts. This in light of several recent widespread postings of racist screeds. People are doing traceroute analyses, asking what can be done, proposing to sue those who send them unwanted spewage, etc. Well, guess what? The very technologies we have been so central in deploying are the technologies that make _conventional_ means of controlling distasteful material so hard. Think about it. Remailers mean the people whose speech we abhor will be untraceable. (I of course mean Chaum-style mixes, and ecologies of mixes, not the "almost mixes" we have now, where a motivated operator can screen posts, stop spams, etc.) All is not lost, in the long run, as "digital postage" schemes may develop. This will reduce Net-wide spamming, though not have an effect on a lot of "distasteful" speech. In that regard, reputation filters will help. A person could insist that he will only read messages from persons or nyms he knows. (Sure, it doesn't stop the problem of the _mail volume_ itself, but first things first. The current delivery paradigm is unlike the paid-transport system of the various mail delivery systems.) Crypto anarchy means the racists, sexists, speciesists, and other "ists" cannot be muzzled. I call this a good thing. It's why I'm here. --Tim May ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From rsalz at osf.org Sun Oct 1 22:26:39 1995 From: rsalz at osf.org (Rich Salz) Date: Sun, 1 Oct 95 22:26:39 PDT Subject: Crypto hardware (was: Using sound cards to accelerate RSA?) Message-ID: <9510020525.AA08599@sulphur.osf.org> >> belief that I need a US crypto import license, which I can't persuade >There is no such animal under US law. Note however (1) you need export Perhaps they're worried about contributing to patent infringement? From gnu at toad.com Sun Oct 1 23:01:58 1995 From: gnu at toad.com (John Gilmore) Date: Sun, 1 Oct 95 23:01:58 PDT Subject: Bryn Mawr talk TODAY on Enigma and Its Effect on the Computing Age Message-ID: <9510020601.AA18855@toad.com> Forwarded-by: Dave Farber and "Steven" Bi-Co Mathematics Talk Series at Bryn Mawr College Charles Terry: "The Cryptography of the Enigma Machine and Its Effect on the Computing Age" Monday, October 2, 1995, Talk at 4pm in room 338, Tea at 3:30 in room 355 Bryn Mawr College, Park Science Center ------------------------------ Steven P.S. I was told he obtained permission to bring an authentic machine to the talk and will demonstrate it's operation afterwards. From hal9001 at panix.com Sun Oct 1 23:19:01 1995 From: hal9001 at panix.com (Robert A. Rosenberg) Date: Sun, 1 Oct 95 23:19:01 PDT Subject: WHERE did this come from? Message-ID: At 18:38 9/30/95, rivaud at rain.org wrote: >Attatched to this is, (I hope), the header text from a unsolicited e-mail >message I received. The return address does not work. WHY? How can I >inform the sender that I hope to never receive there material again? > >I tried "reply-all" through Eudora, but my reply got bounced back to me >as undeliverable. > >I have removed the content of the original message. I don't know why it >was sent to me, but it contained material that I found offensive. > >Any help, or words of wisdom and enlightenment would be appreciated. >Information would be nice too. > >Thanks. This is a KNOWN SPAM (it is currently being talked about in the Net-SPAM Usenet Newsgroup). It has been coming from 3 sites (one in Italy, one in France, and one in Germany). The national Police in all 3 countries (as well as the FBI) are apparently investigating it. To track the situation monitor this Web Page (Which should be Globally Accessible): http://www.panix.com/~lan/crusader From stewarts at ix.netcom.com Mon Oct 2 00:37:33 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Mon, 2 Oct 95 00:37:33 PDT Subject: Spoofing HTTP server certificates Message-ID: <199510020737.AAA27256@ix7.ix.netcom.com> At 12:52 AM 10/2/95 -0400, Greg Miller wrote: > Since there has been a lot of talk about the "man in the middle" >attack on the secure web servers, has anyone actually considered the >processing time required to fake a certificate from scratch? > I haven't really familiarized myself with how the certificates >are generated, etc, but it's my understanding that they are signed with RSA. While I haven't seen Verisign's various public keys posted to the net, and didn't see them anywhere on their web page, I assume they're at least 508 bits long, and the ones for better-than-personna certification (or at least Class 3) ought to be ~1024 bits long, unless they're limiting themselves to 512 bits to support software that's limited by ITAR stupidity (which would be a shame, but is certainly possible.) For the moment, breaking a 512-bit key remains hard, though maybe within the NSA's reach. It's probably one of the next big factoring challenges after the RSA-130 number is taken out by the General Number Field Sieve folks. The better fake, which is much more possible, is to build a chain of certifications (trivial) and convince your victim to accept them instead of the real ones (more doable, especially if some vendor's software isn't written carefully, or is written carefully but requires the user to think about what he's reading.) #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From futplex at pseudonym.com Mon Oct 2 01:11:28 1995 From: futplex at pseudonym.com (Futplex) Date: Mon, 2 Oct 95 01:11:28 PDT Subject: C2 Evaluation of Win NT (was: Hack Microsoft?) In-Reply-To: <199509260404.AAA14297@clark.net> Message-ID: <199510020811.EAA28491@giane.cs.umass.edu> Ray writes: > Microsoft recently got C2-security status approved for Windows NT by > the National Computer Security Center, a division of the NSA. Do you have a pointer to a source for this information ? I've been searching through NCSC Orange Book stuff and M$'s web server, to no avail. http://www.microsoft.com/BackOffice/techbriefs/tech4000.htm, the Win NT Server 3.5 Technology Brief, only says that NT was in the final evaluation phase as of June 1995. I haven't been able to find on-line copies of any NCSC Product Evaluation Bulletins, or a current Evaluated Products List. The closest I've seen is http://www.itd.nrl.navy.mil:80/ITD/5540/xtp1/epl.html, which lists items evaluated or under evaluation, at the A and B levels. The status of NT's evaluation for C2 is a recurrent topic on the firewalls list, so I'm surprised I haven't seen the final approval mentioned there. -Futplex From asb at nexor.co.uk Mon Oct 2 01:27:02 1995 From: asb at nexor.co.uk (Andy Brown) Date: Mon, 2 Oct 95 01:27:02 PDT Subject: VISA and Microsoft STT Specs available In-Reply-To: <199509291902.MAA23808@ix8.ix.netcom.com> Message-ID: On Fri, 29 Sep 1995, Bill Stewart wrote: > Some cryptographic high points, from a brief scan. > - 1024-bit RSA signatures, using PKCS#1 format. > - SHA 160-bit hashes > - Symmetric bulk crypto includes two options (I haven't yet seen > how you choose between them; I assume it's export/domestic?) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > == RC4/64 with 24 bits of salt leaving 40 bits of real key > == DES-CBC - yes, that's single-DES. IV=0. >From http://www.windows.microsoft.com/windows/ie/stt.htm: NOTE: this document covers the International version of the STT protocol, which includes DES encryption of all financial data, direct RSA encryption of bank card account numbers, and 40 bit RC4 encryption of the purchasing order form contents and receipt. A US/Canada version of the protocol with triple-DES encryption of the order, receipt, and all financial data and direct RSA encryption of bank card account numbers will be documented and published in the near future. So it looks like single DES is now OK for export, at least it seems to be in this case where its application is strictly limited to "financial data". - Andy +-------------------------------------------------------------------------+ | Andrew Brown Internet Telephone +44 115 952 0585 | | PGP (2048/9611055D): 69 AA EF 72 80 7A 63 3A C0 1F 9F 66 64 02 4C 88 | +-------------------------------------------------------------------------+ From frissell at panix.com Mon Oct 2 02:57:50 1995 From: frissell at panix.com (Duncan Frissell) Date: Mon, 2 Oct 95 02:57:50 PDT Subject: European Email Police (fwd) Message-ID: This may be of interest to cypherpunk folk (yanked from the UK Electronic Telegraph: http://www.telegraph.co.uk). P. Madden =============================================================== The Electronic Telegraph Monday 2 October 1995 The Front Page Plan to police e-mail seems certain to fail By Adrian Berry, Science Correspondent A EUROPEAN Commission plan to police the use of secret codes in electronic mail appears certain to fail. To detect criminals, the commission is seeking legal powers to prevent people from using secret codes on the Internet which it cannot crack. Nature magazine says this would "effectively end the Internet's status as an unregulated medium for the free flow of information". The plan would require any person or company encrypting e-mail messages to leave the "secret keys" to read them in the hands of a law enforcement agency. But Dr Peter Lammer, managing director of Sophos, the Abingdon-based supplier of encryption software, said: "This plan would never work because people wishing to evade it could legitimately use layers of encryption. "Suppose I send a secret file. I would first encrypt it with my own system. I would then obey the law by encrypting it a second time with the European-approved system. "Even when the government agency had decrypted the message using the keys they had been given, they would still find that the message was totally unintelligible because of the second layer of encryption." In France, it is illegal to use any kind of encryption, and police can arrest the authors of any e-mail which they cannot understand. Codes are used by a vast range of financial companies, sending money orders and sensitive commercial details. Reply to Electronic Telegraph - et at telegraph.co.uk Electronic Telegraph is a Registered Service Mark of The Telegraph plc From dlv at bwalk.dm.com Mon Oct 2 04:41:22 1995 From: dlv at bwalk.dm.com (Dr. Dimitri Vulis) Date: Mon, 2 Oct 95 04:41:22 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m In-Reply-To: Message-ID: <6FBccD15w165w@bwalk.dm.com> In article , Rt. Rev. Modemac writes: >Dr. Dimitri Vulis (dlv at bwalk.dm.com) wrote: >: The National Alliance are not the first despicable racist net.abusers who forge >: cancels for other people's articles critical of them on n.a.n-a.m. Ken Arromdee >: has condemned one such forger, the graduate student Pyotr Vorobiev from Lehigh >: University's Mechanical Engineering and Mechanics Department (+1 610 758 4100) > >When Scientology began cancelling posts by their critics on >alt.religion.scientology, Homer Wilson Smith wrote a program called >"Lazarus" to track for cancels. The idea is simple: whenever a cancel >message appears, Lazarus announces it on the newsgroup. > >Mayhap a Lazaraus-type program can be put into effect on >news.admin.net-abuse.misc? Many other newsgroups are affected by such net.abuse (Vorobiev-style forged cancels based on contents); I just saw some messages on forged cancels in soc.culture.jewish and soc.culture.german. I think running Lazarus-like programs in _all_ newsgroups would be an extremely Good Idea. Alas, the time when people used to contribute their time and equipment for the public good of the net seems to be over. Peraps I'm just dreaming; or perhaps Dave Hayes will like the following idea enough to implement it. Also, I think it's a matter of time before some Cancelpoodle figures to put 'light' into the Path: of its Vorobiev-style forged cancels; then they will not be seen by lighlink.com where Lazarus now runs. This needs to be addressed. Anyway, here are my thoughts on this proposal: There would be a collection (at least 5 or 6) of cancel-watchers (sort of like the deamons that now watch misc.test) all over the world. They should be well-connected (preferrably, one hop away from sites like uunet, howland.reston.ans.net, etc). Each watcher would look at incoming articles in "control", and whenever it sees a cancel, it would replace its own uucp name in the path by something like ellipsis (to keep it confidential) and forward the cancel to a central cataloguer (singly or in batches). E.g., is a watcher at xyzz123.uucp saw a cancel with the header Path: xyz123!howland.reston.ans.net!someplace it would send it to the cataloguer with the Path: replaced by Path: ...!howland.reston.ans.net!someplace The cataloguer would wake up every few hours (for example), group the collected cancels by message-ids of the cancelled articles, and e-mail reports to the (distinct) addresses (other than "usenet@*" or "news@*") mentioned in the "From:", "Sender:", "Authorized:", and "X-Cancelled-By:" headers, and quoting the entire cancel and the Path's as seen at different sites by the cancel-watchers. This way, if the cancel is forged, its author will learn within hours that it has been fraudulently cancelled and will automatically receive enough Path: samples from all over the world to see where it was posted, by comparing the Path headers in several copies of cancels. A user or an entire site should be able to "opt out" of having its cancels reported by sending a command to the cataloguer. There should be a limit of, say, no more than 100 such notifications sent to a site in one batch (to prevent too much traffic in the event of really massive forged cancellation). I don't have the resources to do this right now, but I would be happy if some civic-minder netters took this proposal and ran with it. --- Dr. Dimitri Vulis Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From jya at pipeline.com Mon Oct 2 05:49:37 1995 From: jya at pipeline.com (John Young) Date: Mon, 2 Oct 95 05:49:37 PDT Subject: SAI_cya Message-ID: <199510021249.IAA07948@pipe4.nyc.pipeline.com> 10-2-95. W$Japer: "Internet Users Spooked About Spies' New Role." Web Review reported last week that the company in charge of assigning domain names, Network Solutions Inc., had been acquired by Science Applications International Corp., a closely held company which has many former intelligence and defense officials on its board. Web Review raised questions about whether SAIC is acting as camouflage for the government. Users of the Internet, which was originally created as a communications medium for Defense Department researchers, are reacting to the news with hostility. "I don't want a spook corporation, particularly a private spook corporation, to be anywhere near a control point on the global cooperative Internet," says James Warren. SAI_cya (8 kb) From kerowe at ncsa.uiuc.edu Mon Oct 2 06:16:32 1995 From: kerowe at ncsa.uiuc.edu (Kenneth E. Rowe) Date: Mon, 2 Oct 95 06:16:32 PDT Subject: DNS Security ( was Re: NetScape's dependence upon RSA down...) Message-ID: At 1:58 PM 10/1/95, Donald E. Eastlake 3rd wrote: >DNS security is an important point. People not aware of efforts in this >area may want to check out draft-ietf-dnssec-secext-05.txt which has >more or less passed working group last call and is being considered by >th Security Area Directory / IESG. Reference code is also available >(see message pasted at end below). > >Donald But the proposed DNS extension itself does not deal with CRL and Key Compromise Lists. Ken. ------------------------------------------------------------- Kenneth E. Rowe (kerowe at ncsa.uiuc.edu) Senior Security Engineer (217) 244-5270 (Office) / Security Coordinator (217) 244-0710 (NCSA IRST) National Center for Supercomputing Applications *** email ncsa-irst at ncsa.uiuc.edu for computer incident response *** From junger at pdj2-ra.F-REMOTE.CWRU.Edu Mon Oct 2 06:48:42 1995 From: junger at pdj2-ra.F-REMOTE.CWRU.Edu (Peter D. Junger) Date: Mon, 2 Oct 95 06:48:42 PDT Subject: Restrictions on Munitions _Imports_ In-Reply-To: Message-ID: Timothy C. May writes: : I don't expect that any specific _crypto_ import licenses exist, but : certainly various kinds of _munitions_ import licenses exist (improperly, : in my opinion, of course). . . . . : Given that crypto is classified as "munitions" for the purpose of export : control (including the ITARs), it would not surprise me in the least if the : same sorts of restrictions on imports of the aforementioned munitions are : not applied to at least some crypto imports. If not now, soon. (Given that : many folks are talking about a strategy that has been apparent for many : years: develop core crypto in less hostile environments than the U.S.) : : I can't cite a specific law affecting crypto imports at this time--and I : doubt any crypto products have been affected so far--but clearly there are : restricitions on imports of ammunition, guns, missiles, jet fighters, : and--maybe soon--on "crypto munitions." There is a United States Munitions List for imports that is administered by the Treasury Department, but cryptographic devices and software are not included on that list. -- Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH Internet: junger at pdj2-ra.f-remote.cwru.edu junger at samsara.law.cwru.edu From raph at CS.Berkeley.EDU Mon Oct 2 06:50:39 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 2 Oct 95 06:50:39 PDT Subject: List of reliable remailers Message-ID: <199510021350.GAA12393@kiwi.cs.berkeley.edu> I operate a remailer pinging service which collects detailed information about remailer features and reliability. To use it, just finger remailer-list at kiwi.cs.berkeley.edu There is also a Web version of the same information, plus lots of interesting links to remailer-related resources, at: http://www.cs.berkeley.edu/~raph/remailer-list.html This information is used by premail, a remailer chaining and PGP encrypting client for outgoing mail, which is available at: ftp://ftp.csua.berkeley.edu/pub/cypherpunks/premail/premail-0.33.tar.gz For the PGP public keys of the remailers, finger pgpkeys at kiwi.cs.berkeley.edu This is the current info: REMAILER LIST This is an automatically generated listing of remailers. The first part of the listing shows the remailers along with configuration options and special features for each of the remailers. The second part shows the 12-day history, and average latency and uptime for each remailer. You can also get this list by fingering remailer-list at kiwi.cs.berkeley.edu. $remailer{"extropia"} = " cpunk pgp special"; $remailer{"portal"} = " cpunk pgp hash"; $remailer{"alumni"} = " cpunk pgp hash"; $remailer{"bsu-cs"} = " cpunk hash ksub"; $remailer{"c2"} = " eric pgp hash reord"; $remailer{"penet"} = " penet post"; $remailer{"ideath"} = " cpunk hash ksub reord"; $remailer{"hacktic"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"flame"} = " cpunk mix pgp. hash latent cut post ek reord"; $remailer{"rahul"} = " cpunk pgp hash filter"; $remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord"; $remailer{"syrinx"} = " cpunk pgp hash cut reord mix post"; $remailer{"ford"} = " cpunk pgp hash ksub"; $remailer{"hroller"} = " cpunk pgp hash mix cut ek"; $remailer{"vishnu"} = " cpunk mix pgp hash latent cut ek ksub reord"; $remailer{"crown"} = " cpunk pgp hash latent cut mix ek reord"; $remailer{"robo"} = " cpunk hash mix"; $remailer{"replay"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"spook"} = " cpunk mix pgp hash latent cut ek reord"; $remailer{"gondolin"} = " cpunk mix hash latent cut ek ksub reord"; $remailer{"rmadillo"} = " mix cpunk pgp hash latent cut"; $remailer{"ncognito"} = " cpunk"; $remailer{"precip"} = " cpunk mix pgp hash latent cut ek reord"; $remailer{"ecafe"} = " cpunk"; $remailer{"wmono"} = " cpunk mix pgp hash latent cut ek"; catalyst at netcom.com is _not_ a remailer. lmccarth at ducie.cs.umass.edu is _not_ a remailer. usura at replay.com is _not_ a remailer. Use "premail -getkeys pgpkeys at kiwi.cs.berkeley.edu" to get PGP keys for the remailers. Fingering this address works too. News: the remailer list has been rewritten, and the new version is live! It should be more accurate, reliable, and faster than before. Penet is back up! Enjoy. remailer email address history latency uptime ----------------------------------------------------------------------- syrinx syrinx at c2.org --+-+++----+ 52:32 100.00% ecafe remail at ecafe.org *--********# 7:37 99.99% alumni hal at alumni.caltech.edu *##*#**+#*## 2:47 99.99% hacktic remailer at utopia.hacktic.nl *********+** 9:56 99.98% gondolin mixmaster at gondolin.org --+****+*--+ 2:04:31 99.98% robo robo at c2.org #+###**+#*## :59 99.98% replay remailer at replay.com +**+*-++*++* 11:35 99.95% bsu-cs nowhere at bsu-cs.bsu.edu #*#+###***-# 8:29 99.95% mix mixmaster at remail.obscura.com -++---+---++ 1:35:11 99.94% flame remailer at flame.alias.net *****++**+** 23:08 99.93% portal hfinney at shell.portal.com ## ##*+#*## 2:03 99.79% crown mixmaster at kether.alias.net ---+ --+-+- 1:18:05 99.70% ideath remailer at ideath.goldenbear.com -.-.---.--- 10:24:01 99.68% extropia remail at extropia.wimsey.com -.---.----- 8:06:45 99.54% rmadillo remailer at armadillo.com ++ +++++ ++ 43:52 99.08% vishnu mixmaster at vishnu.alias.net *+--*+ +** 20:36 98.79% c2 remail at c2.org ++++++ +++ 47:07 98.74% spook remailer at spook.alias.net ----------- 3:27:18 98.64% penet anon at anon.penet.fi - ++-++--++ 2:43:34 98.63% hroller hroller at c2.org #+###* **# :57 92.70% rahul homer at rahul.net **#****+### 2:05 99.52% wmono wmono at spook.alias.net **** 7:37 87.49% ford remailer at bi-node.zerberus.de **+*#***+ 6:37 68.05% History key * # response in less than 5 minutes. * * response in less than 1 hour. * + response in less than 4 hours. * - response in less than 24 hours. * . response in more than 1 day. * _ response came back too late (more than 2 days). cpunk A major class of remailers. Supports Request-Remailing-To: field. eric A variant of the cpunk style. Uses Anon-Send-To: instead. penet The third class of remailers (at least for right now). Uses X-Anon-To: in the header. pgp Remailer supports encryption with PGP. A period after the keyword means that the short name, rather than the full email address, should be used as the encryption key ID. hash Supports ## pasting, so anything can be put into the headers of outgoing messages. ksub Remailer always kills subject header, even in non-pgp mode. nsub Remailer always preserves subject header, even in pgp mode. latent Supports Matt Ghio's Latent-Time: option. cut Supports Matt Ghio's Cutmarks: option. post Post to Usenet using Post-To: or Anon-Post-To: header. ek Encrypt responses in reply blocks using Encrypt-Key: header. special Accepts only pgp encrypted messages. mix Can accept messages in Mixmaster format. reord Attempts to foil traffic analysis by reordering messages. Note: I'm relying on the word of the remailer operator here, and haven't verified the reord info myself. mon Remailer has been known to monitor contents of private email. filter Remailer has been known to filter messages based on content. If not listed in conjunction with mon, then only messages destined for public forums are subject to filtering. Raph Levien From m1smf99 at FRB.GOV Mon Oct 2 07:18:31 1995 From: m1smf99 at FRB.GOV (Scott M Fabbri) Date: Mon, 2 Oct 95 07:18:31 PDT Subject: Debt currency In-Reply-To: <199509300658.XAA03050@blob.best.net> Message-ID: <9510021419.AA06092@arcss5.FRB.GOV> > In addition to being totally off topic and spamming lots of lists, > Terra Libra is selling Ponzi schemes and pyramid schemes. > > This is just "make money fast" elaborately dressed in libertarian > rhetoric. > > > At 07:11 AM 9/28/95 +0100, Anonymous wrote: > > This is the best description of debt currency I've seen. Debt currency > >is today's most effective form of slavery. It is today's American slavery. Well, I got a kick out of it. Too bad it's mostly wrong. :-) -- Scott Fabbri m1smf99 at frb.gov I don't speak for the Federal Reserve Board. Mr. Greenspan does, and we're both pretty happy about the status quo. From rfb at lehman.com Mon Oct 2 07:33:50 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Mon, 2 Oct 95 07:33:50 PDT Subject: `Hack Microsoft' challenge is NYT Computer News Daily's top story Message-ID: <9510021434.AA14336@cfdevx1.lehman.com> See http://nytsyn.com/live/Lead/275_100295_074418_19095.html MICROSOFT BECOMES NEW TARGET OF HACKING CHALLENGE (10/2) By HEATHER GREEN c.1995 Bloomberg Business News BERKELEY, Calif. -- Microsoft Corp. has been chosen as a new target for computer hackers. Community Connexion, an Internet service provider that last week promised a free T-shirt to anyone who found a flaw in Netscape Communications Corp.'s software, extended the challenge Friday to include holes in Microsoft products. . . . The article quotes Sameer and includes the URL http://www.c2.org/hackmsoft/ -- Rick Busdiecker Please do not send electronic junk mail! net: rfb at lehman.com or rfb at cmu.edu PGP Public Key: 0xDBD9994D www: http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rfb/http/home.html send mail, subject "send index" for mailbot info, "send pgp key" gets my key A `hacker' is one who writes code. Breaking into systems is `cracking'. From cme at TIS.COM Mon Oct 2 08:15:50 1995 From: cme at TIS.COM (Carl Ellison) Date: Mon, 2 Oct 95 08:15:50 PDT Subject: X.509, S/MIME, and evolution of PGP In-Reply-To: <199509292140.OAA27151@comsec.com> Message-ID: <9510021511.AA10057@tis.com> >Date: Wed, 27 Sep 1995 15:22:08 -0700 >From: Bill Stewart Bill, >I'd always heard X.509 public key certificates were a hierarchical, evil, >anti-WebOfTrust ISOism. But Netscape is now doing them, and talking S/MIME, >so I sat down to read the specs, and they're really not all that bad. I was all set to scream, when I read this first sentence. Then I read on. >(Technically, I've only read PKCS#6 and RFC 1422, and not the real ISOisms...) >Yeah, they've got lots of clunky ASN.1 Ambiguous Encoding Rules and X.500 >Silly Name Format, but those can be lived with, and the X.500 may be possible >to simply ignore in most cases. At this point, I realized that we agree in evaluation but not in weighting. Twice now, I have had to deal with X.509 certificates in real code and it is excruciatingly painful -- especially for someone, like me, with some background in performance engineering and much background in software engineering. ASN.1 is not merely ambiguous, it is actively wrong as part of a design methodology. It encourages people to define structures in the BNF style -- and they do (witness X.509). When you translate this into C or PASCAL structures by an automatic translator, you end up with structures whose definitions are nested so deeply that even with short field names you would have variable names which occupy a substantial part of a line of text. However, ASN.1's BNF-ness encourages people to use longNamesWithEmbeddedCapitals -- so you end up with variable names which turn routine C function calls into multi-line, unreadable blocks. You also end up with too much code. I recently had to deal with X.509 certs for an authentication application (a firewall proxy). The proxy was about 30KB of code prior to the ASN.1. The ASN.1 code, just to do packing and parsing, was over 100KB (.o file sizes, in both cases). You also end up with too many bytes being transferred. I worked out an example of ASN.1 abuse -- defining a triple-DES key structure for encrypting and transmittal -- as a raw C structure (following long established practice and performance engineering (an array of unsigned char, with offsets for each key and the IV)) and as ASN.1 (following modern ASN.1 practice). The raw C structure was 32 bytes long. The ASN.1 structure was 86 bytes. Worse was the code dedicated to structure definition and packing/unpacking. In the raw C case, it took 48 ASCII characters to define the structure and its offsets (including comments) and nothing to pack/unpack. With ASN.1, it took 55085 characters of definition, pack and unpack code. This is a factor of 1148 in source code expansion. -------------------------------- I could go on at length, and have in other fora. Not only is ASN.1 clearly the work of Satan, the Distinguished Name definition is more than a victim of ASN.1 generality, it is a clear reason for the unpopularity of systems which use it. Do you remember when X.400 names started showing up in e-mail (e.g., with Lotus Notes). How many of those names do you see now? It didn't work. The concept is flawed -- but it lives on in X.509. [It reminds me of a flaky grad student's idea of a way to do things -- elevated to standard before people had the chance to try it and discover how completely bogus it was.] It is possible to implement something which reads and writes ASN.1 -- but it is ugly, it inflates your code and it hurts your runtime. I would like to see as many hold-outs against ASN.1 and Distinguished Names as possible. PGP is one such. TIS/MOSS has learned its lesson (from PEM days) and is making all of the ASN.1 and DN stuff (X.509) optional. With luck, the X.509 parts will die away (although MOSS was retarded so strongly in the PEM days that it may never recover -- may never acquire the market share to make it a force). I would strongly encourage others to join the battle. This might not be easy. It is clear that there is an ASN.1 juggernaut. It is taking over all sorts of standards. I believe I know why. It makes the job of the standards writer easier. However, I also believe it needs to be fought...not merely to save future S/W development efforts from the waste and abuse which ASN.1 creates, but also to take a stand against the process by which non-implementors get together on standards committees and come out with standards which preclude good software architectures -- and who, in a kind of old-boy-network, endorse other standards (e.g., the ISO set) as part of their own. Such a design process is destructive. - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ From mark at unicorn.com Mon Oct 2 08:40:32 1995 From: mark at unicorn.com (Rev. Mark Grant) Date: Mon, 2 Oct 95 08:40:32 PDT Subject: One-Time-Pad generation from audio device Message-ID: Over the weekend I hacked up a one-time-pad generator from the random number code I've been writing for Privtool, which uses noise from the audio device to generate random numbers. The code basically reads in a 512-byte block from /dev/audio, then takes the MD5 of that block to generate 16 bytes of the OTP. The raw audio data I'm getting is not particularly random and will compress by 3:1 using gzip or compress, so I'm assuming that using a 32:1 ratio here via MD5 will give a truly random output (it's certainly uncompressible). Before I release the source code to the Net, can anyone give me any good reasons to believe that this won't produce physically random output, or make suggestions on how to test, or improve, the generated output ? There's a #define which can be used to easily increase the amount of data fed into the MD5, but at the moment it will only generate about 1 MB per hour on a Sparcstation (limited by the audio input rate), so I don't want to increase that if I don't have to. Mark From aleph1 at dfw.net Mon Oct 2 08:47:23 1995 From: aleph1 at dfw.net (Aleph One) Date: Mon, 2 Oct 95 08:47:23 PDT Subject: `Hack Microsoft' challenge is NYT Computer News Daily's top story In-Reply-To: <9510021434.AA14336@cfdevx1.lehman.com> Message-ID: BTW, I was just reading in LAN TIMES, I think, that Microsoft NT 3.5 is about to be giving C2 status from the NCSC. They stated that it took over a year to pass it. They also mention that Novell Netware is going the same tests and it should have its C2 status in about 6 months to a year. Though you would like to know. Aleph One / aleph1 at dfw.net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01 From dlv at bwalk.dm.com Mon Oct 2 08:52:45 1995 From: dlv at bwalk.dm.com (Dr. Dimitri Vulis) Date: Mon, 2 Oct 95 08:52:45 PDT Subject: "alt.cypherpunks" Newsgroup vs. Mailing List? In-Reply-To: <199510012022.OAA07852@nag.cs.colorado.edu> Message-ID: Bryce Wilcox writes: > I've had a look at the web site and it looks really interesting. It would > make a great project if a bunch of cypherpunks installed NoCeM and then piped > the list to a newsgroup. We could then develop reputation servers to help us > use NoCeM, start charging cyberbucks for our recommendations, and, in short, > make cpunks into a slightly larger outpost in Cyberlibertaria. (a.k.a. The > Free Net) This sounds like a very good idea to me too. :) --- Dr. Dimitri Vulis Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From froomkin at law.miami.edu Mon Oct 2 08:55:20 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Mon, 2 Oct 95 08:55:20 PDT Subject: More forged cancels (fwd) Message-ID: why is my mailbox full of stuff from mail.cypherpunks? **** PLEASE NOTE NEW E-MAIL ADDRESS: froomkin at law.miami.edu ********* A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | New address, but it's still just as hot here. ---------- Forwarded message ---------- Received: from relay3.UU.NET by law.miami.edu (4.1/3.1.012693-University of Miami Law School); id AA16017 for IFS=' '&&exec /home/faculty/froomkin/proc/procmail -t -f-||exit 75 #froomkin; Mon, 2 Oct 95 01:17:37 EDT Received: from toad.com by relay3.UU.NET with SMTP id QQzjqz13374; Mon, 2 Oct 1995 01:16:43 -0400 Received: by toad.com id AA17355; Sun, 1 Oct 95 22:13:04 PDT Received: from hudson.lm.com by toad.com id AA17346; Sun, 1 Oct 95 22:12:56 PDT Received: (from news at localhost) by hudson.lm.com (8.6.11/8.6.9) id BAA09549 for cypherpunks at toad.com; Mon, 2 Oct 1995 01:15:28 -0400 Path: hudson.lm.com!news.math.psu.edu!news.cac.psu.edu!newsserver.jvnc.net!newsserver2.jvnc.net!howland.reston.ans.net!gatech!news.mathworks.com!newsxfer.itd.umich.edu!agate!news.Stanford.EDU!nntp-hub2.barrnet.net!news1.digital.com!decwrl!amd!netcomsv!uucp3.net >From: orbit at ix.netcom.com (Michael R. Grabois) Newsgroups: news.admin.net-abuse.misc,soc.culture.german,soc.culture.jewish,rec.radio.shortwave,alt.2600,mail.cypherpunks,alt.privacy.anon-server,alt.stop.spamming,alt.stop-spamming Subject: Re: More forged cancels Date: Mon, 02 Oct 1995 03:31:03 GMT Organization: Netcom Lines: 40 Message-Id: <44nmd0$q13 at ixnews6.ix.netcom.com> References: <44n926$2dj at sundog.tiac.net> Reply-To: orbit at ix.netcom.com Nntp-Posting-Host: ix-hou6-03.ix.netcom.com X-Netcom-Date: Sun Oct 01 8:30:40 PM PDT 1995 X-Newsreader: Forte Free Agent 1.0.82 Xref: hudson.lm.com news.admin.net-abuse.misc:16173 soc.culture.german:76152 soc.culture.jewish:188004 rec.radio.shortwave:63171 alt.2600:125976 mail.cypherpunks:18586 alt.privacy.anon-server:4465 Apparently-To: cypherpunks at toad.com Sender: owner-cypherpunks at toad.com Precedence: bulk On Sun, 01 Oct 1995 23:45:24 GMT, jbyrd at tiac.net (Jim Byrd) wrote: [snip] >-----------------begin control message >Path: >sundog.tiac.net!news.sprintlink.net!in2.uu.net!sunic!mn6.swip.net!seunet!news2..swip..net!plug..ne >ws.pipex.net!pipex!tank.news.pipex.net!pipex!usenet.eel.ufl.edu!news.gmi..edu!msunews!netnew >s.upenn.edu!ts7-28.upenn.edu!user >From: 73323.603 at compuserve.com >Newsgroups: soc.culture.german,soc.culture.jewish >Subject: cmsg cancel <73323.603-3009951517290001 at ts7-28.upenn.edu> >Date: Sun, 1 Oct 1995 17:56 GMT >Organization: The National Alliance >Message-ID: >NNTP-Posting-Host: ts7-28.upenn.edu >Approved: 73323.603 at compuserve.com >Control: cancel <73323.603-3009951517290001 at ts7-28.upenn.edu> >X-Cancelled-By: 73323.603 at compuserve.com >Lines: 1 >CANCELLED. >----end control message Does this mean that the cancel came from the Compuserve account? Forging cancel notices is definitely against CIS rules, as is unsolicited e-mail. I've already talked to a sysop there about it, and he said he'd pass it along to the CIS Security folks. If nothing else, that may get his account revoked. Hey, small victories. Michael R. Grabois | orbit at ix.netcom.com Houston, TX | CI$: 74737,2600 ------------------------------------------------------- Gravity. It's not just a good idea, it's the law. From cme at TIS.COM Mon Oct 2 08:57:01 1995 From: cme at TIS.COM (Carl Ellison) Date: Mon, 2 Oct 95 08:57:01 PDT Subject: Certificate proposal Message-ID: <9510021553.AA13756@tis.com> -----BEGIN PGP SIGNED MESSAGE----- X.509 certificates are not totally bad. Their structure contains lessons for anyone designing a certificate structure. [Raw X.509 does not imply a hierarchy, I believe. Steve Kent & Co. do.] However, there are also some serious problems with X.509 certs, aside from their use of ASN.1. Perhaps the biggest problem is the use of a name -- a text string (or some abortion like the DN which can be reduced to a text string) -- as the anchor point. This anchor point needs to be unique. Since it is just a text string, that means that the certificate authority needs to guarantee uniqueness. However, it is also supposed to stand for a unique individual. Since it is not that individual's DNA sequence -- it is not testable. There has to be machinery set up outside the certificate definition for binding this text string to its individual. ------------------------------ PGP certificates have the same problem. In that case, it is an e-mail address and name (by tradition) as the text string. That needs to be bound to some physical body. If it is an e-mail name, there is some binding enforced by whatever access mechanisms protect access to that e-mail account. However, that binding is weak and also outside the certificate definition. ------------------------------ Let me propose an alternative unique name: the public key (or a good hash of it). The public key has an advantage over both X.509 and PGP names. The binding between it and its human being is testable. You can challenge the human in question to sign something. Assuming you use a public key as the unique name, you end up with a much simplified certificate. In fact, the notion of "certificate" may go away, in the sense that the certificate binds a key to a person through a unique name. The person binds himself to his key, on challenge (or on any message signature). What remains is a need for attributes to be bound to a key. For example, someone might testify that E0414C79B5AF36750217BC1A57386478 has brown hair, is balding and wears a pony tail, by signing a message to that effect. Someone else might sign a message stating that the person who owns the private key of 61E2DE7FCB9D7984E9C8048BA63221A2 is authorized to spend money from bank account number 07123 of Provident Savings in Columbia MD. That latter signator needs to be verified as authorized to make such an assertion -- and you end up with a certification chain -- but it is not hierarchical like X.509 and it is not web-of-trust -- it is relational. It is not a chain binding key to person but key's person to attribute or permission. It goes directly to what we need to accomplish without the middleman -- without stopping at a person in the middle. I realize that if you want to revoke a key, then it might help to have bindings be to something other than the key. That way, you can change keys out from under the binding. However, every method I've examined for accomplishing that has security weaknesses. The best method I've found yet has a very long signature key -- used only rarely (e.g., when acquiring an attribute-certificate worth a great deal; and signing more transient keys) -- and never normally revoked (or, if revoked, causing a widespread re-establishment of bindings -- like when you lose your wallet today). ------------------------------ Current certificates are going down a fundamentally wrong path. They are trying to bind keys to people and let Society somehow bind attributes to people -- but the latter binding is too weak to permit keys to be bound to attributes or permissions. The community will discover this, soon, but the farther we play along the X.509 path (especially, but also the PGP path), the more inertia there will be to overcome in trying to fix this problem. I would therefore suggest that the PGP development process address this issue now and continue the established habit of taking the lead into sanity. - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at acm.org http://www.clark.net/pub/cme | |PGP: E0414C79B5AF36750217BC1A57386478 & 61E2DE7FCB9D7984E9C8048BA63221A2 | | ``Officer, officer, arrest that man! He's whistling a dirty song.'' | +---------------------------------------------- Jean Ellison (aka Mother) -+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHAK8FQXJENzYr45AQFsdAP+JswAq/H4JIDE3+VlMsi87PBPCNBA7jg7 0ftkd8v7vrSSNda5aF+HVB7oKHylA/Lb90bvjMK7CKOJJ7aTzRP9IsAiz1i48FAR LAeD59v5SAKmAhaTMMYSRyKFRRXEaqIdEoJW3XKQBJ57b8R38vWKjR/11eTtCKjV joH4c5hhWmY= =ayYh -----END PGP SIGNATURE----- From trei at process.com Mon Oct 2 09:10:05 1995 From: trei at process.com (Peter Trei) Date: Mon, 2 Oct 95 09:10:05 PDT Subject: Yet Another "(Fwd) Internet Euro-Clipper" Message-ID: <9510021610.AA00160@toad.com> > At 5:12 PM 9/29/95, Peter Trei wrote: > >Subject: European Governments Agree to Ban Strong Crypto > The biggest problem I have with this is that this is the third, fourth, or > fifth posting of Ross Anderson's piece to this list [...] > I urge people to read what's on the list and not repost things which have > already appeared. If they don't have time to read all of the messages on > the list, which is understandable, then they need to be even more careful > in posting things. Reading the list does not neccesarily help - I experience a several hour lag between when I post something, and when it comes back from the list server. Thus, even if I'm all caught up on my reading the list (as I was when I posted that article), articles may be 'in the pipe' which duplicate ones I'm thinking of posting. For those curious about the latency, I'm posting this at 12:08, on the US east coast. How long did it take to reach you? > > Not to pick on Peter Trei, as this happens all the time, whenever a hot > issue appears. Short of implementing some content-sensitive form of CSMA/CD, I don't see what we can do (but lowering the list latency would help a lot). > --Tim May Peter Trei Senior Software Engineer Purveyor Development Team Process Software Corporation http://www.process.com trei at process.com From sameer at c2.org Mon Oct 2 09:19:04 1995 From: sameer at c2.org (sameer) Date: Mon, 2 Oct 95 09:19:04 PDT Subject: `Hack Microsoft' challenge is NYT Computer News Daily's top stor In-Reply-To: Message-ID: <199510021614.JAA19159@infinity.c2.org> C2 status isn't worth anything. NT might be one of the only OSes that ship C2-compliant, but just because it is C2 doesn't mean it is secure. > > BTW, I was just reading in LAN TIMES, I think, that Microsoft NT 3.5 is > about to be giving C2 status from the NCSC. They stated that it took over > a year to pass it. They also mention that Novell Netware is going the > same tests and it should have its C2 status in about 6 months to a year. > Though you would like to know. > > Aleph One / aleph1 at dfw.net > http://underground.org/ > KeyID 1024/948FD6B5 > Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01 > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 An Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From cmcmanis at scndprsn.Eng.Sun.COM Mon Oct 2 09:19:56 1995 From: cmcmanis at scndprsn.Eng.Sun.COM (Chuck McManis) Date: Mon, 2 Oct 95 09:19:56 PDT Subject: NetScape's dependence upon RSA down for the count! Message-ID: <9510021608.AA08689@pepper.Eng.Sun.COM> Don wrote: >I haven't read the SSL spec for a while but my understanding was that >the server passed it's public key to the client via a certificate >signed by a mutually trusted certificate authority (i.e., Verisign). > >How would the filter be able to forge such a certificate ? Why forge it? Why not simply buy a netsite server with a valid certificate. Let's say you paid full list for it $5000. It is the classic MITM attack but the protection against that attack was generally that the parties communicating "knew" each other. This is a fundamental weakness of putting the security at the SSL level as opposed to a possibly higher level. With the netscape attack since your client never cares "how" (or to whom) the SSL connection is made, it never shows you the information about where the source key came from. Only that it is valid. --Chuck From tcmay at got.net Mon Oct 2 09:22:41 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 2 Oct 95 09:22:41 PDT Subject: Yet Another "(Fwd) Internet Euro-Clipper" Message-ID: At 12:20 PM 10/2/95, Peter Trei wrote: >For those curious about the latency, I'm posting this at 12:08, on the US >east coast. >How long did it take to reach you? I got it at 09:14, Pacific Daylight Time, so there appears to be no lag. I've generally found that lags are on my end, that my system (got.net currently) is delaying mail from _all_ or _most_ mailing lists. (This was particularly the case last week, when Cypherpunks mail stopped for many hours at a time, then arrived out of sequence when my ISP was (presumably) able to receive the resent mail.) >> Not to pick on Peter Trei, as this happens all the time, whenever a hot >> issue appears. > >Short of implementing some content-sensitive form of CSMA/CD, I don't see >what we >can do (but lowering the list latency would help a lot). Well, the main issue with the "Europe to Ban Crypto" reposts was that several people reposted the same press release over a period of several days, and the case I cited here was where it was posted a week later. I can't see how a latency, even a serious latency of several hours, could cause this to happen. Mostly I think people should try to first of all, _write original stuff_. That is, write their own analyses of things. Their own essays, reactions, etc. Then, secondarily, post pointers to longer stuff. Thirdly, and less to be desired, forward articles. --Tim May ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From tcmay at got.net Mon Oct 2 09:38:23 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 2 Oct 95 09:38:23 PDT Subject: My goof on toad.com lags... Message-ID: A few minutes ago I wrote: --- At 12:20 PM 10/2/95, Peter Trei wrote: >For those curious about the latency, I'm posting this at 12:08, on the US >east coast. >How long did it take to reach you? I got it at 09:14, Pacific Daylight Time, so there appears to be no lag. --- Well, before you all correct me, yes, I now realize it was my copy, sent directly to me, that I received. As of 09:35 I haven't received the toad.com-delivered copy. But my point remains that many times the lags are on local ISP systems, not necessarily on toad. --Tim May ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From hallam at w3.org Mon Oct 2 09:55:52 1995 From: hallam at w3.org (hallam at w3.org) Date: Mon, 2 Oct 95 09:55:52 PDT Subject: WHERE did this come from? In-Reply-To: Message-ID: <9510021655.AA07536@zorch.w3.org> >This is a KNOWN SPAM (it is currently being talked about in the Net-SPAM >Usenet Newsgroup). It has been coming from 3 sites (one in Italy, one in >France, and one in Germany). The national Police in all 3 countries (as >well as the FBI) are apparently investigating it. To track the situation >monitor this Web Page (Which should be Globally Accessible): Does anyone know the officials who are investigating? I have some additional information. It appears that someone may have obtained the cypherpunks mailing list and used it as the basis for the Spam. This is a serious matter. Phill Hallam-Baker From raph at CS.Berkeley.EDU Mon Oct 2 10:13:58 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 2 Oct 95 10:13:58 PDT Subject: Certificate proposal In-Reply-To: <9510021553.AA13756@tis.com> Message-ID: <199510021713.KAA15419@kiwi.cs.berkeley.edu> A non-text attachment was scrubbed... Name: not available Type: application/pgp Size: 14 bytes Desc: not available URL: From weld at l0pht.com Mon Oct 2 10:38:25 1995 From: weld at l0pht.com (Weld Pond) Date: Mon, 2 Oct 95 10:38:25 PDT Subject: NT and C2 Message-ID: Here is the URL to an article in Network World by Winn Schwartau entitled, "One expert shares his views on Microsoft securitey features. http://www.iquest.net/cgi-bin/gate2?|mmMgT008://bbb.PHDx10.ix0/ibLD1P7i/ExUP0e/A1vxiw.T05smgmRibLD1P7iggyR/D1UgM/ppp/6DYsPv/ibLD1P7i/ExUP0e/ExUP0egMmN1xAUvTgrmNvgmwONgOmyMyYnlXkKCfX,ve8TxU8Di31,nlXk6CllpW,ve8TxU8Di31MRmypd If you need a username/password try cypherpunks/cypherpunks Here is an excerpt: Since Microsoft Corp. products are usually robust, I was looking forward to seeing what type of security features the company implemented in Windows NT Workstation Version 3.5. But after walking through the system with Microsoft product managers and developers, I was dismayed to find how woefully short on security features Windows NT is. Despite the fact that the U.S. government is expected to certify Windows NT as a secure operating system, Microsoft's first serious venture into security is not very impressive. Windows NT may pass muster with the federal government, but it does not meet the real-world security needs of corporations running complex, heterogeneous networked environments. Weld Pond - weld at l0pht.com - http://www.l0pht.com/~weld L 0 p h t H e a v y I n d u s t r i e s Technical archives for the people - Bio/Electro/Crypto/Radio From trei at process.com Mon Oct 2 10:44:55 1995 From: trei at process.com (Peter Trei) Date: Mon, 2 Oct 95 10:44:55 PDT Subject: List latency. Message-ID: <9510021744.AA01741@toad.com> > > At 12:20 PM 10/2/95, Peter Trei wrote: > > >For those curious about the latency, I'm posting this at 12:08, on the US > >east coast. > >How long did it take to reach you? > > I got it at 09:14, Pacific Daylight Time, so there appears to be no lag. Here's the relevant headers for the bounceback to me, which took an hour: > Received: from relay3.UU.NET [192.48.96.8] by alcor.process.com > with SMTP-OpenVMS via TCP/IP; Mon, 2 Oct 1995 13:10 -0400 > Received: from toad.com by relay3.UU.NET with SMTP > id QQzjst04916; Mon, 2 Oct 1995 12:51:05 -0400 > Received: by toad.com id AA00166; Mon, 2 Oct 95 09:10:05 PDT > Received: from alcor.process.com by toad.com id AA00160; Mon, 2 Oct 95 > 09:10:02 PDT Message-Id: <9510021610.AA00160 at toad.com> Received: from thunk > [192.42.95.240] by alcor.process.com > with SMTP-OpenVMS via TCP/IP; Mon, 2 Oct 1995 12:10 -0400 > Date: Mon, 2 Oct 1995 12:14:30 -6 Translating: Sent by thunk.process.com 12:14 EDT Received by alcor.process.com 12:10 EDT -4 minutes (thunk's clock is off) Received by toad 9:10 PDT 0 minutes Received by uunet 12:51 EDT 41 minutes Received by alcor 13:10 EDT 19 minutes It looks like there's a considerable delay entering and leaving uunet. I'm not sure which machine gets the blame, but it's either toad&uunet, or uunet&alcor. Peter Trei Senior Software Engineer Purveyor Development Team Process Software Corporation http://www.process.com trei at process.com From dittrich at cac.washington.edu Mon Oct 2 11:17:56 1995 From: dittrich at cac.washington.edu (Dave Dittrich) Date: Mon, 2 Oct 95 11:17:56 PDT Subject: Simple Hardware RNG Idea Message-ID: <9510021817.AA01271@red2.cac.washington.edu> > Perry writes, regarding alpha decay counts for random numbers: > > > And, as I noted, there are RS232 interfaceable radiation detectors you > > can buy off the shelf -- no hardware hacking needed. > > As far as a radiation source goes, the Americium 241 source from a cheap > smoke detector is just dandy. A while ago, I took one into the lab and > put it on a scintillating counter and got alpha hits at roughly > half-microsecond intervals. It was a while ago, so I forget how this compared > to the rating in Curies on the package. But that would be fine for a > low-to-moderate bandwidth RNG. I was thinking about this the other day and wondered if it wouldn't be cheap and relatively easy to build a board that samples and sums several randomly selected signals on various frequencies on the AM broadcast spectrum. This should catch stations in nearly all metropolitan (and most rural areas as well) and would require that someone be able to broadcast at multiple frequencies to "cheat" it. Perhaps this would be affected by RF interference from the motherboard itself. If so, could the RF radiation from the motherboard itself be used to generate random numbers? -- Dave Dittrich Client Services, Computing & Communications dittrich at cac.washington.edu University of Washington Dave Dittrich / dittrich at cac.washington.edu From loki at obscura.com Mon Oct 2 12:28:10 1995 From: loki at obscura.com (Lance Cottrell) Date: Mon, 2 Oct 95 12:28:10 PDT Subject: SSH random numbers Message-ID: I have finaly been goaded into using SSH. I seems like a great tool, but I have one major worry. When I install SSH, it generates the host key right away. When I run ssh-keygen, it generates my user key right away. Where is it getting the random numbers. Before I dive into the source I was wondering if anyone else had looked into this? -Lance no PGP sig because I am on a remote machine. ---------------------------------------------------------- Lance Cottrell loki at obscura.com PGP 2.6 key available by finger or server. Mixmaster, the next generation remailer, is now available! http://obscura.com/~loki/Welcome.html or FTP to obscura.com "Love is a snowmobile racing across the tundra. Suddenly it flips over, pinning you underneath. At night the ice weasels come." --Nietzsche ---------------------------------------------------------- From hal9001 at panix.com Mon Oct 2 12:36:47 1995 From: hal9001 at panix.com (Robert A. Rosenberg) Date: Mon, 2 Oct 95 12:36:47 PDT Subject: CJR for perl-RSA t-shirt Message-ID: At 20:58 10/1/95, Robert Hettinga wrote: >>Subject: Mass Market Software with Encryption - 15 Day Expedited Review >> Requested >> >>Subject: Commodity Jurisdiction Request for >> perl-RSA t-shirt, an encryption program > >ROTFL! > I agree. I especially laughed at the part that stated "... also as a bar code, making the t-shirt machine readable as well as machine washable." From joelm at eskimo.com Mon Oct 2 12:44:03 1995 From: joelm at eskimo.com (Joel McNamara) Date: Mon, 2 Oct 95 12:44:03 PDT Subject: List latency. Message-ID: <199510021942.MAA12424@mail.eskimo.com> As a non-crypto, latency-related, aside. The USENET newsfeed coming out of uunet to my ISP was non-existent last week. It's improved somewhat, but is still lagging behind by 2 or 3 days (never did this in the past). uunet has not provided my ISP with an explanation as to what is happening. Perhaps it's related to the delay in list messages appearing. Unfounded speculation has been the .edu sites are active again after the summer and are swamping things. Joel McNamara joelm at eskimo.com - http://www.eskimo.com/~joelm for PGP key Thomas Jefferson used strong crypto, shouldn't you? >It looks like there's a considerable delay entering and leaving uunet. I'm not sure which >machine gets the blame, but it's either toad&uunet, or uunet&alcor. From patrick at Verity.COM Mon Oct 2 12:48:51 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Mon, 2 Oct 95 12:48:51 PDT Subject: Time Lag (was Re: Yet Another "(Fwd) Internet Euro-Clipper") Message-ID: <9510021945.AA16056@cantina.verity.com> > > At 12:20 PM 10/2/95, Peter Trei wrote: > > >For those curious about the latency, I'm posting this at 12:08, on the US > >east coast. > >How long did it take to reach you? > > I got it at 09:14, Pacific Daylight Time, so there appears to be no lag. I got it at 11:53 PDT. I just checked the headers and the delay was split in a couple of places. (Correcting all times for PDT) thunk -> 9:10 -> alcor.process.com. (And they're off and running!) alcor.process.com. -> 9:10 -> toad.com. (delivered in 0 time:) toad.com. -> 11:29 -> relay3.uu.net. (Sat on toad 2hrs, 19 min) relay3.uu.net. -> 11:54 -> mail2.pilot.net. (Sat on relay3 25 mins ) mail2.pilot.net. -> 11:53 -> verity.com. (delivered into the past!) Of course these delays can vary a few minutes either way because of inaccuracies of time clocks on various machines. Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From baldwin at RSA.COM Mon Oct 2 12:51:40 1995 From: baldwin at RSA.COM (baldwin (Robert W. Baldwin)) Date: Mon, 2 Oct 95 12:51:40 PDT Subject: Certificate proposal & X509 clarifications Message-ID: <9509028126.AA812663445@snail.rsa.com> The Distinguished Name of X509 is NOT intended to be the unique identifier of a person or a public key. In the X509 world two different DNs can have the same public key, and a single DN can have multiple certificates with possibly different public keys. The same public key naturally appears in multiple certificates when each certificate is only valid for a certain period of time (e.g., weekly certificates have been proposed for applications that do not want to implement revocation lists). The unique identifier in an X509 certificate is the DN of the issuer and the serial number that the issuer attached to the certificate. Both of these fields appear in the version 1 X509 certificate. Of course, this assumes that issuers are following the rule of not issuing two certificates with the same serial number. The designers of version 1 of the X509 certificate format have realized that they need to allow issuers to attach all kinds of different attributes to a public key. This lead to version 3 of the X509 format, which provides for general extensions. Of course, this means that there is more rope to hang yourself with when it comes to designing an overall system, but with careful design, lots of good things can be done. For example, for the S/MIME secure mail effort, the certificates include the email address of the owner, as certified by the company that is providing the email post office (e.g., the employer or service provider). Note that Netscape Navigator 2.x will support Version 3 X509 certificates and S/MIME. Question: what's a good way to have the existing PGP public key infrastructure interoperate with the X509 infrastructure? --Bob From mab at crypto.com Mon Oct 2 13:18:02 1995 From: mab at crypto.com (Matt Blaze) Date: Mon, 2 Oct 95 13:18:02 PDT Subject: Crypto APIs Message-ID: <199510022029.QAA05671@crypto.com> A couple of weeks ago I attended a meeting at the NATO SHAPE Technical Center in the Hague to discuss international cryptographic APIs. Several high-ranking NSA types were there, as well as their counterparts from various NATO countries plus a handful of industry crypto people (like me). The idea of the meeting was to find a way to separate cryptographic function from cryptographic interfaces, in a way that allows the applications that call the cryptographic functions to be more freely exported. That is, I can write and export an application that calls the crypto API but that doesn't actually implement the cryptography, and then, when it reaches its destination, the locally-preferred cryptosystem can be plugged right in. Crypto might be implemented in hardware (e.g., Fortezza) or software (e.g., with a shared library or pseudo-device driver). Obviously, this idea is somewhat (completely?) at odds with the criteria presented at last month's NIST workshops for exportable software key escrow systems. One of the requirements given for such systems is that it be difficult to replace the crypto with something that doesn't implement key escrow. But who ever said the government was consistent? Interestingly, it was clear that many people in NSA believe that applications that call an API are controlled under ITAR, but there is some recognition that this may be wishful thinking or may change soon. So while some (maybe most) of NSA wants to prevent development of standard APIs and prevent the export of applications that use them, others recognize that these will evolve by themselves anyway and will be very hard to control once they do. Anyway, the situation is far from clear. It seems best to encourage the realistic side of NSA as much as possible... I learned a few interesting things at the meeting. First of all, overwhelmingly, there is recognition, especially on the part of the non-US government security agencies, that there is enormous value in being able to buy off-the-shelf applications like Microsoft Word or Netscape Navigator and just plugging in the local military cryptosystem and using it for classified traffic. Everyone seemed to agree that there is a growing need for this and that it's too expensive to rely on custom software. There is also movement away from the traditional military ``link encryption'' approach that involves centrally- controlled secure networks in favor of a ``risk management'' approach that favors end-to-end security with off-the-shelf products. In other words, the parts of the military that are concerned with actually securing communications want exactly what we want, and are just starting to realize it. While lots of us have always known this, I had never heard it articulated as quite clearly (or as loudly) by actual comsec/infosec people before. Second, the senior NSA guy mentioned a few things I hadn't heard before. Fortezza is now approved for classified traffic through the SECRET level. Also, the ``type 1'' (classified) through ``type 4'' (unevaluated) cryptography standard is being scrapped in favor of a three ``tier'' system, as follows (these are approximate quotes, from my rough notes): Tier 1 traffic is stuff related to ``national command authority''. (Seems to be secret and top secret and up). It will require NSA cryptosystems, hardware implementation, and will NOT employ key escrow (because of the ``obvious risks''!). Tier 2 traffic is information that, if disclosed, would have ``national implications'' if revealed. Examples given include things like the national power grid, the banking system, etc. It was unclear whether any classified traffic would be included in tier 2. Clearly, some of what is now called ``sensitive but unclassified'' (SBU) will be in tier 2. Anyway, tier 2 systems will be approved by NIST (not NSA, although there will obviously be NSA input into the standards) and will require hardware implementation. Tier 2 traffic will be escrowed, and the government will escrow its own keys. Fortezza is an example tier 2 device (but read on...) Tier 3 traffic will be that which would have ``private implications'' if disclosed. Examples given included personal financial and medical records, etc. Current SBU traffic not in tier 2. Tier 3 would also be handled by NIST, employ commercial or government key escrow (like tier 2) and would be permitted to be implemented in software. Here's the surprise: Tiers 2 and 3 will be interoperable. So there will be published algorithms for tier 3. It is possible that tiers 2 and 3 will have the same algorithms, and that the government will suggest them. It was unclear with interoperability will require that all tier 2 algorithms will be published and implementable in tier 3 software or whether this means that tier 2 devices will also have to implement the tier 3 algorithms. There is an obvious choice of a tier 2/3 algorithm: Skipjack (although there were concerns that this is ``too slow''). So we may eventually find out whether ``S1'' was really Skipjack after all.... -matt From cs95rro at brunel.ac.uk Mon Oct 2 13:51:14 1995 From: cs95rro at brunel.ac.uk (Ryan Richard O'Connell) Date: Mon, 2 Oct 95 13:51:14 PDT Subject: More forged cancels In-Reply-To: <44n926$2dj@sundog.tiac.net> Message-ID: <44pftr$4jf@ccsp-25.brunel.ac.uk> Michael R. Grabois (orbit at ix.netcom.com) wrote: : >From: 73323.603 at compuserve.com : Does this mean that the cancel came from the Compuserve account? No - he was the original sender of the message. The cancel message must appear to come from the originator of the post. -- ********************************************** * Ryan O'Connell * * http://http1.brunel.ac.uk:8080/~cs95rro/ * * finger:cs95rro at molnir.brunel.ac.uk * * (Includes PGP key and talk location) * ********************************************** From mlm at netscape.com Mon Oct 2 13:52:22 1995 From: mlm at netscape.com (Mike McCool) Date: Mon, 2 Oct 95 13:52:22 PDT Subject: Netscape and privacy In-Reply-To: <44fin4$rdq@tera.mcom.com> Message-ID: <44pjd7$22b@tera.mcom.com> Michael Froomkin (froomkin at law.miami.edu) wrote: : With all respect to you and to Netscape (I am one who thinks that the : Netscape participation on this list has reflected very well on the : participants and the company), I think that the reply "we only collect IP : addresses" is not fully responsive to the issue. While I recognize that : there are implementations that assign a new IP address to every login, I : understand the current norm to be static IP addresses. I sure have one. : Thus, if you keep a file of my IP address, and a fact about that address, : you have a database that can be purchased and correllated with another DB, : which links IP to somehting else, eg telephone numbers (perhaps from a : contest run on the internet?). Pretty soon we are at serious : profiling.... Well, I'm the one who wrote the server extension in question; I will describe exactly how it works. Let me start off by saying that it does not work by IP address, and I would not have implemented anything I thought was violating privacy. Originally, the program was called a bean counter. Why? Because there is exactly one file kept on the server: a file with a number in it. This number is the total number of "cookies" given out. When a client connects to www.netscape.com, the server checks to see if the client sent a cookie with the request. This cookie has no information in it, and even if it did, the server doesn't look at it. If the client sent a cookie, the server simply goes on to the next task in completing the request. If it does not send a cookie, the extension increments the counter, and sends the cookie back to the client. The client records the cookie and sends it in the future when it is connecting to the server. So all it does is count the number of "unique" browser installations there are. That's all. The very most information you could get from this is that "this particular browser has connected to netscape.com once in the past." Of course this method isn't foolproof, but it gives us a ballpark figure of how many people are using our browser, which is all we wanted. I hope this clears things up. --MLM -- Mike McCool * mlm at netscape.com * http://www.netscape.com/people/mlm/ From walrus at ans.net Mon Oct 2 13:54:35 1995 From: walrus at ans.net (michael shiplett) Date: Mon, 2 Oct 95 13:54:35 PDT Subject: Crypto APIs In-Reply-To: <199510022029.QAA05671@crypto.com> Message-ID: <199510022054.QAA80371@bugsy.aa.ans.net> "mb" == Matt Blaze writes: mb> A couple of weeks ago I attended a meeting at the NATO SHAPE mb> Technical Center in the Hague to discuss international mb> cryptographic APIs. Is there any overlap between this effort and TIS' International Cryptography Experiment (ICE)? michael From mab at crypto.com Mon Oct 2 13:59:33 1995 From: mab at crypto.com (Matt Blaze) Date: Mon, 2 Oct 95 13:59:33 PDT Subject: Crypto APIs In-Reply-To: <199510022054.QAA80371@bugsy.aa.ans.net> Message-ID: <199510022110.RAA05985@crypto.com> > "mb" == Matt Blaze writes: > > mb> A couple of weeks ago I attended a meeting at the NATO SHAPE > mb> Technical Center in the Hague to discuss international > mb> cryptographic APIs. > > Is there any overlap between this effort and TIS' International > Cryptography Experiment (ICE)? > > michael Yes. (ICE, by the way, is funded by ARPA and run by TIS. Strange notion of "experiment", given that the result of the "experiment" will be to see whether the government will allow it. So one part of DoD is funding TIS to find out how another part of DoD behaves...) -matt From cme at TIS.COM Mon Oct 2 14:09:07 1995 From: cme at TIS.COM (Carl Ellison) Date: Mon, 2 Oct 95 14:09:07 PDT Subject: worldwide announce: New OTP Mail/FTP apps In-Reply-To: <199510020556.WAA01007@comsec.com> Message-ID: <9510022103.AA10569@tis.com> -----BEGIN PGP SIGNED MESSAGE----- >From: Doug Hughes >Date: Thu, 28 Sep 1995 19:31:00 -0500 >A company in Israel named Elementrix has just announce at Interop an >entirely new paradigm in secure transactions. They have a secure >one time pad that allows people to exchange mail and ftp files back >in forth in complete security without the worries of key management >or storage or secure random number generation or synchronization. As far as I could tell from your description, this is an autokey cipher -- not a OTP. An autokey cipher starts with a shared secret key and uses previous plaintext or ciphertext as part of the key. DES CBC is an autokey cipher. The original autokey used previous plaintext or ciphertext as the only key. More modern ones mix in the previous text. I had a design for one, several years ago, which kept a mapping in memory and changed the mapping based on incoming plaintext. Therefore, there is state information kept at both sides which keeps changing. One might think that if the attacker never gets in, today's randomness is just as good as yesterday's. That might even be true. However, there are many openings for finding relationships between yesterday's and today's ciphertexts. I look forward to seeing the actual algorithm. - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHBTU1QXJENzYr45AQHRigP/Yqw0T3n2SDubgRZIrKx8WpUSJtmBwcuf nIBxxwsOwu10sQti7hw3Zcj9tRM6JAcqFNh1U2LbYT3u7ELgh2Hicq0jLcr+3r4h B0H3LlbU9iv7WlETQF8Tw2KQcfDKLkYkeMRnS27cKnJIFHK9w0g4UTwabfB+m5SV sjnUZbv6Q1A= =P9X7 -----END PGP SIGNATURE----- From jcaldwel at iquest.net Mon Oct 2 14:19:47 1995 From: jcaldwel at iquest.net (James Caldwell) Date: Mon, 2 Oct 95 14:19:47 PDT Subject: The Free Speech Implications of Remailers Message-ID: On 1 Oct 95 at 22:32, Timothy C. May wrote: > Crypto anarchy means the racists, sexists, speciesists, and other > "ists" cannot be muzzled. I call this a good thing. It's why I'm > here. I don't mind the mail, it's in a bit bucket, just the cowardly nature of it. It was not sent anonymously which can be filtered. I appologize for spamming the list in response to hi message, it upset me. From yihchun at u.washington.edu Mon Oct 2 14:22:16 1995 From: yihchun at u.washington.edu (Yih-Chun Hu) Date: Mon, 2 Oct 95 14:22:16 PDT Subject: One-Time-Pad generation from audio device In-Reply-To: Message-ID: On Mon, 2 Oct 1995, Rev. Mark Grant wrote: > > Over the weekend I hacked up a one-time-pad generator from the random > number code I've been writing for Privtool, which uses noise from the > audio device to generate random numbers. > > The code basically reads in a 512-byte block from /dev/audio, then takes > the MD5 of that block to generate 16 bytes of the OTP. The raw audio data > I'm getting is not particularly random and will compress by 3:1 using gzip > or compress, so I'm assuming that using a 32:1 ratio here via MD5 will > give a truly random output (it's certainly uncompressible). I wouldn't bet on it. I did a similar hack with perl, with a much more conservative 5 seconds to 32 bytes. That didn't cut it, when I ent'ed the result it gave 6 bits of entropy / 8 bits of output. I do recall posting it here. > > Before I release the source code to the Net, can anyone give me any good > reasons to believe that this won't produce physically random output, or > make suggestions on how to test, or improve, the generated output ? There's > a #define which can be used to easily increase the amount of data fed into > the MD5, but at the moment it will only generate about 1 MB per hour on a > Sparcstation (limited by the audio input rate), so I don't want to > increase that if I don't have to. Um.. I would try to generate bits quickly, then securely, so for example you get a 2k buffer and do it 5 sec / 128 bits. Then slow down and overwrite the buffer and give warnings if the user wants to use the bits too early. > > Mark > > > +---- Yih-Chun Hu (finger:yihchun at cs.washington.edu) ----------------------+ | http://www.cs.washington.edu/homes/yihchun yihchun at cs.washington.edu | | http://weber.u.washington.edu/~yihchun yihchun at u.washington.edu | +--------------------------------------------------------------------------+ From dee at cybercash.com Mon Oct 2 14:25:45 1995 From: dee at cybercash.com (Donald E. Eastlake 3rd) Date: Mon, 2 Oct 95 14:25:45 PDT Subject: DNS Security ( was Re: NetScape's dependence upon RSA down...) In-Reply-To: Message-ID: Earlier versions of the dsn-security draft did have a revocation mechanism but the overwhelming consensus in the dns-security working group was to leave that out of the first version. I have on my queue writing up my ideas in this area a separate draft. Feel free to write up yours. Donald On Mon, 2 Oct 1995, Kenneth E. Rowe wrote: > At 1:58 PM 10/1/95, Donald E. Eastlake 3rd wrote: > >DNS security is an important point. People not aware of efforts in this > >area may want to check out draft-ietf-dnssec-secext-05.txt which has > >more or less passed working group last call and is being considered by > >th Security Area Directory / IESG. Reference code is also available > >(see message pasted at end below). > > > >Donald > But the proposed DNS extension itself does not deal with CRL and Key > Compromise Lists. > > Ken. > > ------------------------------------------------------------- > Kenneth E. Rowe (kerowe at ncsa.uiuc.edu) > Senior Security Engineer (217) 244-5270 (Office) > / Security Coordinator (217) 244-0710 (NCSA IRST) > National Center for Supercomputing Applications > *** email ncsa-irst at ncsa.uiuc.edu for computer incident response *** > > > ===================================================================== Donald E. Eastlake 3rd +1 508-287-4877(tel) dee at cybercash.com 318 Acton Street +1 508-371-7148(fax) dee at world.std.com Carlisle, MA 01741 USA +1 703-620-4200(main office, Reston, VA) From daw at CS.Berkeley.EDU Mon Oct 2 14:27:04 1995 From: daw at CS.Berkeley.EDU (David_A Wagner) Date: Mon, 2 Oct 95 14:27:04 PDT Subject: NetScape's dependence upon RSA down for the count! Message-ID: <199510022126.OAA06234@lagos.CS.Berkeley.EDU> In article <9509301910.AA10970 at dmsd.com> you write: > > The "messenger attack" as described in my earlier posts regarding > public key encryption and key management seems to apply to NetScape's SSL. > I have a Fifty dollar bill for the first person to submit to the mail box > nethack at dmsd.com a working Unix server (with cleartext session logs) which > accepts all connections on a unix based host to the www port and redirects > them to netscape.com leaving a clear text log of each session's SSL packets > in /tmp by session. All entries become the property of DMS Design. The winner > and I will submit a claim for one of Community COnneXion's "I HACKED NETSCAPE" > tee shirts as a server hack. (Have Fun!!) > This is a trivial program! I can't believe anyone considers this technically difficult. But hey, who am I to question, if you'll pay $50! Ok, let me back that up with real code. Here's a proxy I've been using for experimenting, in lieu of root access & tcpdump. Usage: proxy localport remotehost remoteport > capturefile Try: $ ./proxy 2999 www.netscape.com 80 > capturefile & $ netscape http://localhost:2999/home/welcome.html & or $ ./proxy 3999 alpha.mkn.co.uk 443 > capturefile & $ netscape https://localhost:3999/ & Here's the source. It's a bit unstable, and could be a improved a little, but was fine for a quick kludge. So feel free send the $50 to the following address at your convenience!! :-) David Wagner UC Berkeley 330 Soda Hall Berkeley, CA 94720 #include #include #include #include #include #include #include #include /* dump bytes, sorta similar to tcpdump's style */ dump(char *p, int len) { int i, j; while (len > 0) { for (i=0; i<16 && i < len; i++) { printf("%2.2x", (unsigned char) p[i]); if (i & 1) printf(" "); } j = i; for (; i<16; i++) { printf(" "); if (i & 1) printf(" "); } printf(" # "); for (i=0; ih_addrtype; memcpy(&(si.sin_addr), hp->h_addr, hp->h_length); strncpy(hostname, hp->h_name, MAXHOSTNAMELEN-1); if (si.sin_family == AF_INET) printf("Connecting to %s (%s)\n", hostname, inet_ntoa(*(struct in_addr *)&si.sin_addr.s_addr)); else printf("Connecting to %s\n", hostname); if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) { perror("socket"); exit(1); } if (connect(fd, &si, sizeof(si)) < 0) { perror("connect"); exit(1); } return(fd); } int localinit(int port) { struct sockaddr_in thissock; int s, i; if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0) { perror("socket"); exit(1); } memset((char *)&thissock, 0, sizeof(struct sockaddr_in)); thissock.sin_family = AF_INET; thissock.sin_port = port; thissock.sin_addr.s_addr = htonl(INADDR_ANY); i = 1; setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *)&i, sizeof(int)); if (bind(s, (struct sockaddr *)&thissock, sizeof(struct sockaddr_in)) < 0) { perror("bind"); exit(1); } if (listen(s, 5) < 0) { perror("listen"); exit(1); } return(s); } usage() { fprintf(stderr, "Usage: proxy localport remotehost remoteport\n"); exit(1); } int main(int argc, char **argv) { int partialxfd, xfd, yfd, i, localport, remoteport; struct sockaddr_in thatsock; char *remotehost; if (argc != 4) usage(); localport = atoi(argv[1]); remotehost = argv[2]; remoteport = atoi(argv[3]); if (localport < 1024 || remoteport <= 0) usage(); partialxfd = localinit(localport); for (;;) { i = sizeof(struct sockaddr_in); if ((xfd = accept(partialxfd, (struct sockaddr *)&thatsock, &i)) < 0) { perror("accept"); exit(1); } yfd = remoteinit(remotehost, remoteport); proxy(xfd, yfd); } } From mark at unicorn.com Mon Oct 2 14:27:40 1995 From: mark at unicorn.com (Rev. Mark Grant) Date: Mon, 2 Oct 95 14:27:40 PDT Subject: One-Time-Pad generation from audio device In-Reply-To: Message-ID: On Mon, 2 Oct 1995, Yih-Chun Hu wrote: > I wouldn't bet on it. I did a similar hack with perl, with a much more > conservative 5 seconds to 32 bytes. That didn't cut it, when I ent'ed the > result it gave 6 bits of entropy / 8 bits of output. How did you measure the entropy of the output ? > Um.. I would try to generate bits quickly, then securely, so for example > you get a 2k buffer and do it 5 sec / 128 bits. Then slow down and overwrite > the buffer and give warnings if the user wants to use the bits too early. Ah, well the idea is that they can just generate a OTP when they have a few spare hours, not that they'd be generating it in real-time. The Privtool code does use realtime generation of random numbers, but it has a lot of input data other than the audio (e.g. mouse movements, MD5 hashes, etc). Mark From stewarts at ix.netcom.com Mon Oct 2 14:48:34 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Mon, 2 Oct 95 14:48:34 PDT Subject: Certificate proposal Message-ID: <199510022148.OAA26396@ix7.ix.netcom.com> At 11:53 AM 10/2/95 EDT, Carl Ellison wrote: >X.509 certificates are not totally bad. Their structure contains lessons >for anyone designing a certificate structure. [Raw X.509 does not imply a >hierarchy, I believe. Steve Kent & Co. do.] I agree with you about hierarchies, and even RFC1422 doesn't really force you to use hierarchy, much less a government-enforced one, though it clearly prefers it, and it definitely does support the concept of having a key signed by more than one CA, at least for CA's keys. The most important differences, from my perspective, are 1) X.509 explicitly addresses Certificate Revocation Lists, though it isn't real precise about how they should be distributed, and the hierarchical approach isn't necessarily the best. (Maybe put the location of the preferred CRL for a key certificate in the cert itself?) 2) X.509 certificates, unlike PGP, only support once signer per certificate; this is a slight hierarchical bias, which forces you to haul around a pile of certificates to have multiply signed keys, without specifying a syntax, so simple key-cert programs may not know what to do with multiples, and hence force hierarchy; the rest of us will just have to deal with multiply syntaxes. But that's mainly a verbosity problem, duplicating Distinguished Names and key info. 3) Neither PGP nor X.509 (as documented in the RFC1422 and PKCS#6) have any mechanism for additional information other than cramming it into the username, but supposedly X.509 Version 3 includes something? >Perhaps the biggest problem is the use of a name -- a text string (or some >abortion like the DN which can be reduced to a text string) -- as the >anchor point. [.... use the public key instead ....] >What remains is a need for attributes to be bound to a key. ... >Current certificates are going down a fundamentally wrong path. They are >trying to bind keys to people and let Society somehow bind attributes to >people -- but the latter binding is too weak to permit keys to be bound to >attributes or permissions. Eventually, there may be a way to represent most of the attributes you want to describe in some format, which I dare say will look _far_ uglier than ASN.1 :-) Binding a key to a text-string usually representing a person does give you the slack to use other mechanisms rather than wait for the release of /standard-name="Attribute Semantics Notation"/version=32769/ORG="International Slowness Organization"/Country=none/reliability=ExtremelyHighTrustUsThisTime/versionh istory= For now, there do seem to be some kinds of attributes that would benefit from better representations than a human-name plus free-form text, such as "which application does the user want you to use this key for?" "how much should I trust the user's desire to have me use that key for that application?" "how do I get this key's owner to give me money?" "does the key-holder have the authority to speak for a given organization/human/bank account?" If you look at Verisign's DNs, or the text in my PGP keys, you'll see various ugly attempts at this. And then there's "WHICH person named Bill Stewart does this key belong to?" For the latter, I'm interested in solutions other than "Social Security Number", "Citizen-Unit Nationalized ID Card Number", etc. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From dl at hplyot.obspm.fr Mon Oct 2 14:49:09 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Mon, 2 Oct 95 14:49:09 PDT Subject: List latency. In-Reply-To: <9510021744.AA01741@toad.com> Message-ID: <9510022148.AA06696@hplyot.obspm.fr> Peter Trei writes: [...] > It looks like there's a considerable delay entering and leaving uunet. I'm not sure which > machine gets the blame, but it's either toad&uunet, or uunet&alcor. sending mail to myself (not going through list processing), via toad.com, It took 32 seconds for my host to find, contact and send the mail to toad.com, then it took more than 5 minutes for it to come back, and specially it came back as : Received: from relay3.UU.NET by hplyot.obspm.fr with SMTP (1.36.108.10/16.2.5) id AA05486; Mon, 2 Oct 1995 19:48:39 +0100 Return-Path:
Received: from toad.com by relay3.UU.NET with SMTP id QQzjtb16149; Mon, 2 Oct 1995 14:47:28 -0400 Received: from hplyot.obspm.fr by toad.com id AA02554; Mon, 2 Oct 95 11:42:59 PDT Received: by hplyot.obspm.fr (1.36.108.10/16.2.5) id AA05454; Mon, 2 Oct 1995 19:42:31 +0100 So the question now is : "Why the toad.com send its mail through *.uu.net instead of sending it directly ?" [it would/should cut at least by half the delay {at the coast of more DNS traffic for toad.com}] Also I suspect the long delays we sometime see comes from toad<->uu.net interactions [besides the normal overhead of sending one mail to thousands of people] (the service is great anyhow) dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept Chirac Panama Peking Serbian Treasury smuggle Saddam Hussein From dl at hplyot.obspm.fr Mon Oct 2 14:55:45 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Mon, 2 Oct 95 14:55:45 PDT Subject: `NOISE' what crypto is that ? [was Re: NT and C2] In-Reply-To: Message-ID: <9510022154.AA06732@hplyot.obspm.fr> Weld Pond writes: [...] > http://www.iquest.net/cgi-bin/gate2?|mmMgT008://bbb.PHDx10.ix0/ibLD1P7i/ExUP0e/A1vxiw.T05smgmRibLD1P7iggyR/D1UgM/ppp/6DYsPv/ibLD1P7i/ExUP0e/ExUP0egMmN1xAUvTgrmNvgmwONgOmyMyYnlXkKCfX,ve8TxU8Di31,nlXk6CllpW,ve8TxU8Di31MRmypd > What kind of (en)coding is that ? some kind of rot13++ ? dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept Legion of Doom mururoa explosion NSA cryptographic NORAD Treasury From cme at TIS.COM Mon Oct 2 15:03:37 1995 From: cme at TIS.COM (Carl Ellison) Date: Mon, 2 Oct 95 15:03:37 PDT Subject: Certificate proposal In-Reply-To: <199510021713.KAA15419@kiwi.cs.berkeley.edu> Message-ID: <9510022200.AA15553@tis.com> -----BEGIN PGP SIGNED MESSAGE----- >From: Raph Levien >Date: Mon, 02 Oct 1995 10:13:08 -0700 >I am extremely glad to hear Carl propose this. Let me propose something >just a bit more concrete (Carl might not like it because it contains just >a hint of ASN.1, but what the hell). I'll hold my nose while reading :-). >I propose that the unique name be the MD5 hash of the MOSS public key, as >formatted according to the MOSS specification (ASCII and all). PGP keys >can easily be converted into MOSS ones, so it's pretty easy. The hash >should be expressed as 32 hex digits, so that it can easily be typed in >or spoken. The only ambiguity in this proposal is where to put the >newlines, if any. For concreteness, I propose that there be no newlines >in the public key value. I see no problem using a hash. I might use SHA rather than MD5. MD5 is a wee bit too short. But, for what we're doing, MD5 is just fine -- and as a hash of a public key, the cost of finding alternatives is high enough that MD5's shortness probably isn't a problem. However, why convert PGP keys to MOSS and then hash? Hash the PGP key straight. You're right that my proposal was not concrete at all. To make it concrete, you'd want to specify the signed message which takes the place of a certificate. I tried this once before, roughly, but I never gave it the effort it deserves. Let me call this non-certificate a blurk (waiting for a real name). ------------------------------ For example, you need to identify: the signee (a public key or hash of a key) the public key needs to be identified as to type (RSA, D-H, DSA, ...) and the package using it can also be identified (e.g., PGP, MOSS, ...) the signer (a public key or hash of a key -- as used in the blurk which grants authority to the signer) a text string (or paragraph) giving the attribute being attested to -- and possibly giving validity dates, etc. the signature (in some algorithm) [You might want to allow for multiple signatures in different algorithms and/or different packages -- to keep the signee from having to send out dozens of blurks or storing dozens in a database.] ------------------------------ The entire thing could be a signed cleartext message: signer's key; [signee's key; text] signature (of []) Alternatively, you could modify the PGP UserID field (or make something very similar) with raw text (not treated as an ID on the key) and a sig on the text and signed key. Signing a cleartext message has some appeal. As for how this would be used -- my guess from looking at X.509 is that it's meant for machine parsing and understanding (although I know of no programs which follow them beyond sig checking). A cleartext signed message requires human reading and filing. However, that's fine. After all, it is a human who decides whether to act or not. If there is a computer deciding whether to act based on the blurk, the signed text could include SMTP-style tagged text lines for the program to go find. Looking forward to more concrete elaborations.... - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHBgrVQXJENzYr45AQG7wgP+MzX/uQsIw5G4YjaRFzPFGV1z6MV5RV5g xvH6/wv6XLyeZ3DTn/akiwiFO5nl8aSUEq5F7huMByiYctXjlI/05l5KFUxpjNY5 QpQH8hRAIO8PnrItyK0Fg3uFbDzfloSuhhCoJIFlrkAxEXj1CoMKWkN6hlEz1jmy fY2ceAz6KPo= =Jdrm -----END PGP SIGNATURE----- From cme at TIS.COM Mon Oct 2 15:16:12 1995 From: cme at TIS.COM (Carl Ellison) Date: Mon, 2 Oct 95 15:16:12 PDT Subject: Certificate proposal & X509 clarifications In-Reply-To: <9509028126.AA812663445@snail.rsa.com> Message-ID: <9510022213.AA15923@tis.com> -----BEGIN PGP SIGNED MESSAGE----- >Date: Mon, 02 Oct 95 12:51:11 PST >From: "baldwin" > The designers of version 1 of the X509 certificate format >have realized that they need to allow issuers to attach all kinds >of different attributes to a public key. This lead to version 3 >of the X509 format, which provides for general extensions. However, in true ASN.1 form, they called for these extensions to be tied to object identifiers (defining the attribute being defined). Therefore, you have to get someone owning an OBJID tree branch to define meanings for you - -- and you have to publish some worldwide book of mappings, etc. To me, this needs nothing more elaborate than text. In fact, text is a fine machine-independent coding. [Thought experiment: imagine Postscript using ASN.1 coding rather than ASCII. How many Postscript printers would there be today?] > Question: what's a good way to have the existing PGP public >key infrastructure interoperate with the X509 infrastructure? Answer: wait until X.509 dies under its own weight and let them ask how to interoperate with PGP. - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHBj0VQXJENzYr45AQHVUAP/Xrb199NEwRoYydDGQK5l424k7neMRpp/ XZtU+7QO760v2YEPmf5EdWZ6S25wKLtaIVUhVr1MLyCRLyfRedXLdYzBqEVlHd2k dGarIqkB/HOcmjYvZGxnYE+s2gLiTJ1FShgdWWGtC3qCMqlE3h4r5WuiGIotg/IL WbzKq2oGzYA= =qBPm -----END PGP SIGNATURE----- From ses at tipper.oit.unc.edu Mon Oct 2 17:11:33 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Mon, 2 Oct 95 17:11:33 PDT Subject: De Re ASN.1 and encoding rules ( was Re: X.509,...) In-Reply-To: <9510021511.AA10057@tis.com> Message-ID: In his message Carl make several statements, some of which I agree with, and some which I disagree with. Since I'm a protocol wonk, and since I've been doing ASN.1 and PER/BER stuff recently, I'd like to respond to some of his points. (I spent most of last week off work with a nasty cold, semi-comatose on the couch, smothered in vapo-rub, surrounded by the 93 specs for ASN.1, BER/DER, and PER, and with nothing on TV but the OJ trial. What a choice :-) [A lot of this is leading up to a big rant about the truly ghastly packet formats given to us by STT, which I've found loosens more mucus than a gallon of cough syrup, and with much the same affect on your mental state :-)] I'm not going to be defending BER (BrainDamaged Encoding Rules), because, lets face it, they suck. I'm also not going to be defending X.500, because, to a first approximation it completely sucks too. In this message I'm just going to address the issue of the inherent in-efficiency- I'll address the rest in a follow-up message, most specifically the claim that making mashalling and de-mashalling hard on the implementor is a good thing. It's hard to speak to the issue of code size, since the ISODE compilers, which are frequently used as a benchmark in this area are so goddam awful. Even the most naive compilers will generally generate code orders of magnitude smaller. Instead, we'll take a look at bits on the wire, and compare the struct dump to what can be done by a 20th century compiler using a smart set of encoding rules (PER - the packed encoding rules). [ as a side note, I recently wrote some code that had to parse and process X.509 certificates - this was for my SSL Keep-Away proxy (it needed to crunch the certificate, look for hostname matches in any CN values, and possible convert the DN into RFC1485 text format). The source was only a few K. I was using C++ though (and this didn't hurt for once)] Lets use 3DES as our example. We'll start with a naive specification: -- LongLong ::= OCTET STRING (SIZE(8)) -- a long long is 8 bytes, er, long DesKey ::= LongLong ThreeDes ::= SEQUENCE { IV LongLong, K1 DesKey, K2 DesKey, K3 DesKey } -- Lets apply the packed encoding rules to this: ThreeDes is a SEQUENCE. It has no optional components, so no bits are added to the encoding. The first item, IV, is an OCTET STRING of fixed length 8 bytes. Since the length is fixed, no length is encoded - the 8 bytes of the IV are appended to the encoding. The same applies to each of the des keys. Thus, we have a bits on the wire total of 32 bytes. The same as in the hand crafted encoding. The encoding and decoding are then implemented as memcpys. If more information is known about the alignment and position in memory of the fields, and of the key within the buffer, these memcpys can be coaleced- this is a local optimisation, rather than a requirement that every interoperable implementation use the same language with the same compiler. Now, this example is pretty simple, but with not much thought, we can set about improving it to generate fewer bits on the wire. I'll avoid the obvious kludge, which is to strip of the parity bytes on each key to save three bytes - instead we'll look to the big wins. There are several different ways of using 3des which can help us reduce the size of the encodings in some cases. The first thing we can do is support variable size IVs (like in rfc1851). We'll restrict the IV to be either 1 or 2 32 bit chunks. Then we can add extra support for 1des mode of 3des where all the keys are the same. Here's the new definitions: -- Long ::= OCTET STRING (SIZE(4)) ThreeDes ::=SEQUENCE { IV SEQUENCE OF (SIZE(1..2) LONG, Key1 DesKey, Key2 DesKey OPTIONAL, Key3 DesKey OPTIONAL } -- Now lets see how the PER treat this value. The first thing we encode is the sequence. Since this sequence has optional components, we stick one bit onto the output stream for each field - if the bit is one, the optional element is present - otherwise, it ain't. Since there are two optional components, we need two bits. Next, we need to encode the IV. Since this field is of variable length, we do need to encode a length this time. The length is constrainted to be between 1 and 2 - a range of 1- the minimum number of bits needed to encode this is 1, and so a 1 bit field is appended to the encoding. Now we encode the longs in the IV; because these values are OCTET STRINGS, we need to align ourself on an octet boundary, if we're not there already. Once we've emitted any necessary pad bits, we encode the IV as the indicated number of 4 byte values. After that we encode the first key as described above, and if the second and third key are present, we encode those as well. If there is room for 3 bits in the byte preceding this encoding (a likely occurence, especially if the application supports several different key types (RC4 & IDEA, etc)), this encoding is still 32 bytes in the worst case, and 12 in the best case. To be continued... (unless I get flamed off the list) From MIGUELDIAZ at megaweb.com Mon Oct 2 18:38:32 1995 From: MIGUELDIAZ at megaweb.com (MIGUELDIAZ at megaweb.com) Date: Mon, 2 Oct 95 18:38:32 PDT Subject: `Hack Microsoft' challenge is NYT Computer News Daily's top story Message-ID: <199510030135.VAA17223@mail-e1a.megaweb.com> >Date: Mon, 02 Oct 1995 10:34:32 -0400 >From: Rick Busdiecker >Sender: owner-cypherpunks at toad.com >To: cypherpunks at toad.com >bcc: Lehman Brothers Inc. >Subject: `Hack Microsoft' challenge is NYT Computer News > Daily's top story > >See http://nytsyn.com/live/Lead/275_100295_074418_19095.html > > MICROSOFT BECOMES NEW TARGET OF HACKING CHALLENGE (10/2) > > By HEATHER GREEN c.1995 Bloomberg Business News > > BERKELEY, Calif. -- Microsoft Corp. has been chosen as a > new target > for computer hackers. > > Community Connexion, an Internet service provider that > last week > promised a free T-shirt to anyone who found a flaw in > Netscape > Communications Corp.'s software, extended the challenge > Friday to > include holes in Microsoft products. > > . . . > I don't know about everyone else, but a T-shirt seems a very small reward for uncovering a "hole" in the encryption algorithm of Microsoft products. Does that apply to any and all bugs?? i.e. not necessarily security problems?? From jbass at dmsd.com Mon Oct 2 18:48:00 1995 From: jbass at dmsd.com (John L. Bass) Date: Mon, 2 Oct 95 18:48:00 PDT Subject: NetScape's dependence upon RSA down for the count! Message-ID: <9510030147.AA15570@dmsd.com> > The point to attacking SSL is to be able to decode a message from any > browser, without having to do anything extraordinary to the victim's host. > No cryptosystem is proof against an attacker who can see and > control everything you do on the client side (i.e. has root in UNIX > parlance). > > So, while your idea #1 might be interesting or fun to do as far as computer > security goes, it's not an attack on SSL. Agreed, within limits. Security as "Marketed" by NetScape goes far past just claiming SSL to be secure, including the use of NetScape client and servers as secure. With this expanded model, attacking NetScapes claim of security includes attacking the process and enviornment that they provide to endusers and info mall businesses. In this case electronicaly distributing clients in a hostile environment is a gross disregard for endusers security needs, traded off for ease of distribution. I probably should not have included virus attacks, and just focused upon the main problem ... unsecured network transmission of clients. As it stands, a third party with minimal trouble can compromise a very large number of NetScape clients and capture the dredit card data for those users who would otherwise expect their transactions to be secure. To take the ground that their product is secure in a secure environment is meaningless ... the product value they seem to offer is security in a non-secure environment - which I don't think is true, and I gather you might agree? > That points out the flaw in Netscape's authentication model that > others have already pointed out on this list. Admittedly, like Don > Stephenson just posted, there's not really a good way to distribute > and authenticate certificates until there's a ubiquitous global > CA chain. Again, we agree that this reflect negatively on NetScapes claims of security in an unsecure environment? As an aside, readers in private have suggested that a signature by Verilog as the CA my not be required, quoting that until receintly, NetScape signed their own certificates. This seems that the MITM can choose his own CA, possibly of his own design to sign false certificates. > Assume that the attacker Mallet is in the middle and has control of the http > stream. Alice clicks on 'open Widget order form' to order a Widget > and Mallet sends her browser a redirect pointing to his evil web server. > Alice doesn't notice that the hostname in the url has changed, or > if she does, she figures that the catalog people have arranged to > have Mallet's server host their 'secure' transactions (not an unreasonable > assumption). Mallet takes the order and pockets the money. > The hostname in the certificate (Mallet's) matches the hostname > in the URL (also Mallet's). Or Mallet places the order in Alice's name defering the chances of detection until enough cards numbers are aquired to make a run on the bank. There is tremendous value in forstalling the point of detection and the location of the MITM becoming known. If Alice get's her goods promptly she is much less likely to question the transaction. > Of course this isn't really an attack on SSL per se. It's an attack on > the certificate-granting policy- the CA gave a certificate to > an unscrupulous person (Mallet). But it is a clear attack on NetScape's advertised "security" for end users. Almost all sucessfull crooks/thieves have a front business to launder their money thru. In this case you can steal customers just by redirecting your competitor's DNS records to your server ... With a similar home page and ordering/catalog screens they might never notice the switch, certainly not first time customers. Gee nobody would probably own up to the occasional named failures that could also cause this. Somehow I don't think this is what endusers of info mall owners consider security. > > > Well of course, if the secret key of the server (or worse yet, certificate > > > authority) is compromised, all bets are off. That's true of just about any > > > protocol you can dream up. > > > > I'm not referring to the secret key of _the_ server; I'm referring to the > > secret key of _ANY_ server. In the limiting case, such a key can be > > obtained by buying one from the CA. > > Right. That's what I pointed out in an earlier message, although I > didn't elaborate on it. The security of Netscape browsers depends > on Verisign's policy in handing out server certificates. and on the physical security of the site plus it's network connections, the trustworthyness of it's internal staff and contractors, and it's ability to deliver service in the face of failures and disasters, both man made and natural. Security includes more than just crypto correctness, in this case it include denial of service attacks as well has physical site attacks. In this case I strongly suspect that bombing Verilog would shutdown net commerce for a while. Certainly it's employees are in a position to earn high six figures for the key algorithm or a copy of the key database. As for the policy, it has to include mom & pops and young business owners setting out to make their honest fortune on the net ... unfortunately this profile includes the evil side as well. I don't think restricting info mall business to the fortune 500 is that we have in mind here. As such, I don't think screening by the CA takes us very far at all. > Backing up for a minute, the same problem holds for those neeto > credit-card readers that Visa and MasterCharge give out to merchants. > The merchant can be a crook setting up a 'store-front' operation to charge > to bogus/stolen card numbers, or the employees can steal using the numbers > they get in the corse of doing business, etc. There are already > procedures in place for dealing with this sort of crime. I'm not > sure that tricking Verisign into giving out a certificate to a group > of crackers is really any different than tricking Visa into giving > a card reader to a group of theives. Volume greatly affect the risk factor. Giving a merchant number to a business means that only the number of people that can walk-in or phone in to that merchants store are at risk. Stolen cards are handled differently than stolen numbers. Stolen numbers are cross correlated by past purchase locations by store, and if possible by register location and employee. There is a strong pointer to the person(s) involved. Skimming card numbers off the net has the potential to cross vendors, geographic areas, and other determinates that would aid in locating the source of the tap. The number of card numbers exposed has the potential to be several orders of magnitude higher, and remain undetected for quite some time. The net offers the ability to place a large number of orders in a short period of time for very high valued merchandice for delivery to what would appear proper customers ... and using the UPS/FedX example picking off the proceeds in a centralized low security location. With another computer store front on the net, you turn the same hijacked goods into full value shipments in a few days ... and maybe coordinate the bogus orders and hijackings to meet your customers demands. Or for an economic terrorist create $100 million in bogus orders and deliveries to drive the system into failure. Gone are the days when sheer man-power limited your exposure. Gone are the days when a sturdy building, good doors and locks, and a security system backed by Well Fargo staff would protect your business. Security in our network context includes not only the protection of the individual consumer, but the info mall vendors and the future of the medium as a viable way to do business. NetScape I believe is working toward all three of these goals, I strongly disagree with the short cuts and risks they are taking to get there. John Bass From MIGUELDIAZ at megaweb.com Mon Oct 2 18:49:44 1995 From: MIGUELDIAZ at megaweb.com (MIGUELDIAZ at megaweb.com) Date: Mon, 2 Oct 95 18:49:44 PDT Subject: One-Time-Pad generation from audio device Message-ID: <199510030146.VAA09247@mail-e1a.megaweb.com> >Date: Mon, 2 Oct 1995 16:42:04 +0100 (BST) >From: "Rev. Mark Grant" >Sender: owner-cypherpunks at toad.com >To: cypherpunks at toad.com >Subject: One-Time-Pad generation from audio device > > >Over the weekend I hacked up a one-time-pad generator from > the random >number code I've been writing for Privtool, which uses noise > from the >audio device to generate random numbers. > >The code basically reads in a 512-byte block from > /dev/audio, then takes >the MD5 of that block to generate 16 bytes of the OTP. The > raw audio data >I'm getting is not particularly random and will compress by > 3:1 using gzip >or compress, so I'm assuming that using a 32:1 ratio here > via MD5 will >give a truly random output (it's certainly uncompressible). > >Before I release the source code to the Net, can anyone give > me any good >reasons to believe that this won't produce physically random > output, or >make suggestions on how to test, or improve, the generated > output ? There's >a #define which can be used to easily increase the amount of > data fed into >the MD5, but at the moment it will only generate about 1 MB > per hour on a >Sparcstation (limited by the audio input rate), so I don't > want to >increase that if I don't have to. > > Mark There are many ways to test for randomness. you might want to start by accumulating instance of "1" and "0" and over a long time you should have roughly an equal number of both. If you have access to a spectrum analyzer with an auto-correlation function (or cross-correlation will do) feed in similar lengths of output at different time intervals and check to ensure a low (close to zero) correlation exists. Also while you are at it you might want to checks the ouput's frequency spectrum, it should be fairly uniform accross the generating range. Noise (or randomness) which is not normally distributed can lead to nasty hacks. Be Well!! > From weld at l0pht.com Mon Oct 2 18:56:52 1995 From: weld at l0pht.com (Weld Pond) Date: Mon, 2 Oct 95 18:56:52 PDT Subject: `NOISE' what crypto is that ? [was Re: NT and C2] Message-ID: >Weld Pond writes: >[...] > > http://www.iquest.net/cgi-bin/gate2?|mmMgT008://bbb.PHDx10.ix0/ibLD1P7= >i/ExUP0e/A1vxiw.T05smgmRibLD1P7iggyR/D1UgM/ppp/6DYsPv/ibLD1P7i/ExUP0e/Ex= >UP0egMmN1xAUvTgrmNvgmwONgOmyMyYnlXkKCfX,ve8TxU8Di31,nlXk6CllpW,ve8TxU8Di31= >MRmypd > > >What kind of (en)coding is that ? some kind of rot13++ ? > I know it looks funny but that is the actual URL. I think it is some kind of verity search engine they use at IQuest. To get it to work I had to paste in the 4 lines individually into Netscape because the URL edit windows doesn't seem to do linefeeds. It's getting pretty bad when you feel like you should uuencode the URL so that people get it straight. Here is the URL again: http://www.iquest.net/cgi-bin/gate2?|mmMgT008://bbb.PHDx10.ix0/ibLD1P7i /ExUP0e/A1vxiw.T05smgmRibLD1P7iggyR/D1UgM/ppp/6DYsPv/ibLD1P7i/ExUP0e/Ex UP0egMmN1xAUvTgrmNvgmwONgOmyMyYnlXkKCfX,ve8TxU8Di31,nlXk6CllpW,ve8TxU8D i31MRmypd Weld Pond - weld at l0pht.com - http://www.l0pht.com/~weld L 0 p h t H e a v y I n d u s t r i e s Technical archives for the people - Bio/Electro/Crypto/Radio From tcmay at got.net Mon Oct 2 19:01:41 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 2 Oct 95 19:01:41 PDT Subject: `Hack Microsoft' challenge is NYT Computer News Daily's top story Message-ID: At 9:37 PM 10/2/95, MIGUELDIAZ at megaweb.com () wrote: >I don't know about everyone else, but a T-shirt seems a very >small reward for uncovering a "hole" in the encryption >algorithm of Microsoft products. Does that apply to any and >all bugs?? i.e. not necessarily security problems?? You are of course welcome to offer a richer prize. Meanwhile, Sameer is the one making the offer, so it's not for us to say he's being cheap. Also, the history of science is filled with cases where bets with trivial payoffs intensely motivated people. --Tim May ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From glenn at border.com Mon Oct 2 19:03:51 1995 From: glenn at border.com (Glenn Mackintosh) Date: Mon, 2 Oct 95 19:03:51 PDT Subject: Information, We want information Message-ID: <95Oct2.221648edt.4998@janus.border.com> > From: todd at lgt.com (Todd Glassey) > I an immediate need of info on the liabilities of BSD type systems, and in > particular the BorderWare products. > > I heard that in the BorderWare product itself, there are several recently > discovered potential "holes"... > > I have a particular interest in both the Attack MO against the BSD > platforms in general and the Border products in particular... > > Please do not send the reply to the lists but to me personally > (todd at lgt.com). I will summarize if I get enough info to be worth the > effort. > > Any comments? Let me make a very clear statement. No site protected by BorderWare has ever had its Firewall penetrated. Never. This is the second time I've heard rumors about insecurities in the BorderWare software with nothing being brought out to substantiate them. I guess this is just an unfortunate part of doing business - especially in the security domain. I get a bit annoyed by this kind of thing since, regardless of whether we refute such comments, after the discussion itself is forgotten people will often remember that they heard something about a problem with product X. This isn't a criticism of you Todd - you are just reporting that you've heard rumors and asking about them, which is a perfectly reasonable thing to do. Obviously the rumors you heard haven't come along with any facts since you're asking here for the "Attack MO". I would very much like to here about any problem that is real, since if there were any weaknesses we would want to fix them and disseminate the fix as fast as possible. Border takes any potential problem very seriously. A couple of months ago there was a potential weakness that was discovered in the process of Border's ongoing efforts to ensure the security of the product. It was only a security risk with a very specific configuration. No customer has ever reported seeing this. Within two days of this discovery we had a fix and the fix was being actively pushed through the distribution channels to the customer base. It was given high priority and we had our support people calling down to the reseller channels to ensure that they were aware and that they got it out to their clients. We intended to make sure that this potential problem was immediately removed from the firewall even though no one had actually reported a problem. The fix was given free of charge to anyone whether they had a support contract or not. Some customers were even upgraded to a newer version of BorderWare so they could receive the fix. We strongly believe that our customers are entitled to the best available protection. They bought a Firewall for security and they should expect it to be secure. Border will do everything that we can to ensure this is always the case. So, anyone out there if you believe you have some real attack mechanism we want to know. Now that you've sat through the general ranting part of my comments, let me try to answer the BSD specific part. As far as BSD based OS's in general I don't think there is reason to believe that they are any more or less secure than System V based Unix's (or other non-Unix based operating systems for that matter). They all have pro's and con's and they have all had problems and I don't think that one variant has had more problems historically than the other. That said, Border doesn't use a stock BSD based OS anyway. We have put a large amount of effort into "hardening" the kernel so that it is a solid base upon which to build a secure firewall. We don't believe that any stock OS which was designed for a dynamic environment with users on it will really be secure. There are far too many instances (with just about any OS, Unix or otherwise) where someone has gained privilege or increased access to a system by taking advantage of some feature once they managed to get on the box. A firewall should be a static, non-user environment which means that many features are just not required and can be removed or their behavior significantly changed and limited. We spent a considerable amount of manpower stripping down the kernel and leaving only what was really needed. We removed the mechanisms which can be used to gain privilege or increase the levels of access to the system. The BorderWare kernel is in fact one of its strongest assets, and not a potential weakness. Glenn Mackintosh V.P. Technology ------------------------------------------------------------------------ Border Network Technologies Inc. Email: glenn at border.com 20 Toronto Street, Suite 400, Tel: +1 416 368 7157 Toronto, Ontario, Canada, M5C 2B8 Fax: +1 416 368 7789 From anonymous at freezone.remailer Mon Oct 2 19:12:23 1995 From: anonymous at freezone.remailer (anonymous at freezone.remailer) Date: Mon, 2 Oct 95 19:12:23 PDT Subject: SAIC Ideas SCI Message-ID: <199510030212.WAA01489@light.lightlink.com> URL: http://baretta.ideas.com/capabilities SAIC Ideas Group 7120 Columbia Gateway Dr. Columbia, MD 21046-2115 (410) 312-2000 Fax:(410) 312-2250 Contact: Bill Howard (410) 312-2060 wjh at ideas.com [Snip] 1.2 SAIC acquired the government sectors of IDEAS, Inc. in November 1994. Now known as the SAIC Ideas Group, this business area encompasses 230 technical people (165 SCI cleared) located in a company owned 100,000 Sq. Ft. Columbia, Maryland facility. [Snip] 2. TECHNICAL SKILLS The SCI cleared skills mix for the SAIC Ideas Group is listed in the table below. Table 1: Ideas Group SCI Cleared Skills Mix (7/95) Skill Category SCI Cleared Staff Project Management 8 Software Engineering 48 Hardware Engineering 10 Hardware Technician 14 Test Engineering 24 ILS 12 Training 12 Systems Engineers 28 Administrative 9 3. COLUMBIA, MD FACILITIES The SAIC, Ideas Group, 100,000 square foot building is located at 7120 Columbia Gateway Drive, Columbia, MD. This facility offers "one-stop shopping" for your system and hardware needs. [Snip] 3.2 Sensitive Compartmented Information Facility (SCIF) features: 13,000 square foot certified SCIF Secure conference areas Secure office spaces Project rooms Raised floor staging areas Two large shielded rooms Class A storage vault Secure STU-III telephone Secure Facsimile The largest SCIF conference room will support approximately 65-75 people; smaller conference rooms are available. Secure staging areas have self-contained environmental control and AC wiring for single or three phase, 50 or 60 Hz, power. The staging areas also provide separate digital and analog ground radials referenced to a single-point independent earth ground to effectively emulate most customer locations. Several SCIF areas can be arranged to provide secure space -- screened if necessary. Systems with 200 racks of equipment have been staged and operated in the Ideas Group SCIF. [Long snip] _________________________________________________________________ webmaster at ideas.com // (c) Copyright 1995 by Science Application International Corporation From jbass at dmsd.com Mon Oct 2 19:28:43 1995 From: jbass at dmsd.com (John L. Bass) Date: Mon, 2 Oct 95 19:28:43 PDT Subject: NetScape's dependence upon RSA down for the count! Message-ID: <9510030228.AA15693@dmsd.com> Sorry David, The offer was for a server/filter/MITM/proxy that logged clear text not cyphered text for the SSL stream. Combine your program with SLL code from other sources and 95% of the program is complete. Add to that a way to produce a valid certificate for the client and you will earn the $50 and a lot of praise for a job well done from everybody. > > I have a Fifty dollar bill for the first person to submit to the mail box > > nethack at dmsd.com a working Unix server (with cleartext session logs) which > > accepts all connections on a unix based host to the www port and redirects > > them to netscape.com leaving a clear text log of each session's SSL packets > > in /tmp by session. All entries become the property of DMS Design. The winner > > and I will submit a claim for one of Community COnneXion's "I HACKED NETSCAPE" > > tee shirts as a server hack. (Have Fun!!) > > > > This is a trivial program! I can't believe anyone considers this > technically difficult. But hey, who am I to question, if you'll > pay $50! > > Ok, let me back that up with real code. Here's a proxy I've been > using for experimenting, in lieu of root access & tcpdump. For the rest of you, David gave you a small jump start. Checkout the web pages at C2.org and netscape.com for access to the ssl prototype code. Have fun, John Bass Owner, DMS Design From anonymous at freezone.remailer Mon Oct 2 19:34:19 1995 From: anonymous at freezone.remailer (anonymous at freezone.remailer) Date: Mon, 2 Oct 95 19:34:19 PDT Subject: SAIC Snags INFOSEC Message-ID: <199510030234.WAA02732@light.lightlink.com> URL: http://www.disa.mil/ciss/itsc/docs/brochure.html INFOSEC Technical Services Contract The Solution to Your Security Needs Now! What is INFOSEC Information Systems Security (INFOSEC) is defined as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized user�s, including those measures necessary to detect, document, and counter such threats. For operations and for economic efficiencies INFOSEC is an enabling feature. It is the discipline that protects the integrity, availability, and confidentiality of our information assets and systems. All information is important and valuable to its users and requires some level of protection from unauthorized disclosure (confidentiality), assured access by users (availability), and protection from unauthorized change (integrity). We believe that good security is a mission enhancer, not a mission detractor! Our overall approach to information systems is security is to PROTECT information using a layered defense based on risk management and cost benefit analysis. We must be able to monitor all our systems and networks in real time to DETECT intrusions or hostile actions at all levels, and then REACT to isolate the systems, correct the security breach, restore service to the users, and act to prevent future attempts. Center for Information Systems Security Background In July 1990, the Assistant Secretary of Defense for Command, Control, Communications, and Intelligence ASD(C3I), started an investigation effort for coordinated DOD-level management of defense INFOSEC initiatives. DCA, now DISA, was designated as the lead agency with assistance from the National Security Agency (NSA). A DISA/Center for Information Systems Security (CISS) and NSA plan was developed and approved for establishment of the Defense Information Systems Security Program (DISSP). CISS has its origin in the Defense Information Systems Security Program (DISSP), a joint DISA/NSA program. Continuing as a joint program office CISS�s mission is to manage, coordinate and provide direct INFOSEC application support to DOD programs, develop standards and protocols for INFOSEC and expedite the implementation of MLS command, control and communications systems for DOD. The CISS provides a means to fully review, coordinate, and make recommendations concerning the implementation of policy, architecture, and products to support DOD objectives. Mission The Center for Information Systems Security (CISS) is a joint DISA/NSA organization charged with executing the centrally managed Defensive Information Warfare (IW-D) and INFOSEC functions within DOD. CISS is the focal point for assuring availability, integrity, and confidentiality of all DII systems and information. We provide direct support to DOD services and agencies, and define requirements for DII INFOSEC standards. Additionally, CISS provides central coordination and reporting response to all DOD INFOSEC incidents, and operational protection, detection, reaction, and vulnerability analysis to the DII. What is the INFOSEC Technical Services Contract? DISA awarded the INFOSEC Technical Services Contract (INFOSEC TSC) on 12 July 1995 to two large businesses (CSC and SAIC) and one small business (MERDAN Group, Inc.). CISS, a joint DISA/National Security Agency (NSA) program, has been chartered to provide INFOSEC services throughout DoD. INFOSEC support will be provided by CISS infrastructure resources with contractual assistance from the INFOSEC TSC. The primary responsibility of the joint program office is to assure the effective and coherent application of INFOSEC to the overall Defense Information Infrastructure (DII). The contract offers technical support in the areas of: * INFOSEC Security Policy * INFOSEC Requirements Support * INFOSEC Architecture and Engineering * INFOSEC Independent Validation and Applications Verifications * INFOSEC Products and Applications DoD Goal Security Architecture (DGSA) * INFOSEC Certification and Accreditation Master Transition Plan * INFOSEC Technology and Training Documentation, and Countermeasures Information Dissemination * INFOSEC Multilevel Security Technology * INFOSEC Technical Managemet and Capabilities Planning (TMP) * INFOSEC ProfessionalizationProgram and Project Management * INFOSEC Standards and Protocols The contract is not a Federal Information Processing (FIP) hardware or software procurement contract. All DOD departments and agencies requiring INFOSEC services can utilize the INFOSEC TSC. The contracts are Indefinite Delivery, Indefinite Quantity (IDIQ) with individual firm fixed price, cost plus fixed fee, and time and material Delivery Orders (DOs) awarded for each requirement. Ceiling on the INFOSEC TSC is $1.095B which includes authority for other Federal (non-DOD) Agency use of 10% of current contract value. An additional 10% authority for non-DOD federal agencies is anticipated from GSA. There will be a 2 percent fee applied to all Delivery Orders. Details for submitting requirements are spelled out in the �Guide for the INFOSEC TSC. Advantages of Using the INFOSEC Technical Services Contract * Provides contractual assistance in support of INFOSEC and INFOWAR requirements * Provides a means to obtain assistance in addressing complex systems security issues * Provides a high level of expertise to support systems certification and accreditation * Provides necessary DII/NII security support for DII/NII open systems architecture * Provides hardware and software support for INFOSEC prototyping and incidental hardware/software required to perform the task _________________________________________________________________ The INFOSEC TSC guide can be obtained from the: INFOSEC Technical Support Office (ITSO) Center for Information Systems Security 5111 Leesburg Pike, Suite 100 Falls Church, VA 22041-3201 Attention: Ms. Nanette Chopin (703) 681-1331 ---or--- Attention: Mr. James Lindou (703) 681-1333 FAX (703)681-1393 ---or--- through the World Wide Web at http://www.disa.mil/ciss/itso.html. _________________________________________________________________ SAIC Team Members * Bell Atlantic * Bellcore * CTA, Inc. * George Mason University * Information Security Systems, Inc. * JANUS Associates * Lockheed Martin * MICON Services Company * Pailen-Johnson Associates, Inc. * Secure Solutions, Inc. * Sprint * Technautics, Inc. * TeleCommunication Systems (TCS) * TELOS CSC Team Members * A.B. Floyd * Automation Research Systems (ARS), Ltd. * Bowie State * Computer Associates * DEC * DMR Group * Group Technologies * Intermetrics * IRE * Metters Industry * MIS Training Institute * Northrop Grumman * ORA * Oracle * RSSI * Space Applications Corporation * Systems Engineering Solutions, Inc. * Sparta * Spyrus * SRA * TASC * USATREX * Xerox Merdan Group, Inc. Team Members * Advanced Data Concepts, Inc. * Management Technology Strategic Association, Ltd. _________________________________________________________________ For More Information Contact the INFOSEC Technical Support Office Ms. Nanette Chopin, COR/DPM Voice: (703) 681-1331 Fax: (703) 681-1393 E-Mail to Ms. Nanette Chopin Mr. Jim Lindou, ACOR/PM Voice: (703) 681-1333 Fax: (703) 681-1393 E-Mail to Mr. Jim Lindou Defense Information Systems Agency 5111 Leesburg Pike, Suite 100 Falls Church, Virginia 22041 _________________________________________________________________ Return to: CISS TSC Home Page DISA CISS Home Page DISA Home Page _________________________________________________________________ You can mail any questions about these documents to: Ms. Nanette Chopin You can mail any questions about the DISA server to: yorkw at ncr.disa.mil - Last revision: 16 August 1995 okonw at ncr.disa.mil _________________________________________________________________ From dl at hplyot.obspm.fr Mon Oct 2 19:48:34 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Mon, 2 Oct 95 19:48:34 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) In-Reply-To: <9510030147.AA15570@dmsd.com> Message-ID: <9510030248.AA08909@hplyot.obspm.fr> On the topic of risks for a "major browser" to be tempered/targetted as a virus : I asked monthes ago netscape folks to make md5sum and/or PGP digital signatures (preferably md5sum of each files, this in a file, itself pgp signed) of the binaries available on their page and on relevant newsgroup to reduce possibility of tempering. [ok it won't help mythical joe six pack's but...] Maybe I'll got more luck calling from here :-) dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept SEAL Team 6 SDI NORAD Nazi mururoa cryptographic Panama From futplex at pseudonym.com Mon Oct 2 20:06:38 1995 From: futplex at pseudonym.com (Futplex) Date: Mon, 2 Oct 95 20:06:38 PDT Subject: `Hack Microsoft' challenge is NYT Computer News Daily's top story In-Reply-To: <199510030135.VAA17223@mail-e1a.megaweb.com> Message-ID: <199510030306.XAA24030@thor.cs.umass.edu> MIGUEL DIAZ writes: > I don't know about everyone else, but a T-shirt seems a very > small reward for uncovering a "hole" in the encryption > algorithm of Microsoft products. I don't know about anyone else, but helping to protect the confidential data of millions of users around the world seems a very large reward for uncovering a hole in the encryption algorithms of M$ products. Clearly, YMMV. -Futplex From rsalz at osf.org Mon Oct 2 20:09:41 1995 From: rsalz at osf.org (Rich Salz) Date: Mon, 2 Oct 95 20:09:41 PDT Subject: Certificate proposal & X509 clarifications Message-ID: <9510030308.AA10671@sulphur.osf.org> > Therefore, you >have to get someone owning an OBJID tree branch to define meanings for you >- -- and you have to publish some worldwide book of mappings, etc. While I am no big fan of OID's (and I really dislike ASN.1 -- and nobody ever explained to my why the ISO RPC standard doesn't use it), if anybody really needs an ISO OID tree, I will probably be willing to tear off a piece of OSF's: 1.3.22 { iso(1) identified-org(3) osf(22) } From rsalz at osf.org Mon Oct 2 20:14:02 1995 From: rsalz at osf.org (Rich Salz) Date: Mon, 2 Oct 95 20:14:02 PDT Subject: Time Lag Message-ID: <9510030313.AA10680@sulphur.osf.org> Internet email is highly dynamic. Hosts can be up/down. Routers can be up/down. Gateways can be up/down. Routing databases can be out of date. Cables can be cut. Load averages can affect whether a host accepts SMTP connections. And so on. Sending one message and rigorously studying timestamps in the Received lines and using that to draw conclusions about mail propagation is a complete waste of time. /r$ From ravage at einstein.ssz.com Mon Oct 2 20:24:46 1995 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 2 Oct 95 20:24:46 PDT Subject: RNG's and time-stamps Message-ID: <199510030340.WAA06046@einstein.ssz.com> Now that is an idea, exploit the dynamic nature of Internet. Us the difference in times between the stamp and when the mail arrives to generate a RNG. Just a thought. From TechSupport at jgc.com Mon Oct 2 20:35:24 1995 From: TechSupport at jgc.com (Publisher Program) Date: Mon, 2 Oct 95 20:35:24 PDT Subject: Introducing Johnson-Grace Message-ID: <95Oct2.185011pdt.21953@mail.jgc.com> Dear Web Publisher: You may have never heard of Johnson-Grace Company, but you have probably seen the benefits of our image compression technology in America Online and Apple's eWorld. "ART" compression substantially speeds up image transfers. In fact, ART formatted images transmit three times faster over conventional telephone lines than old-style GIFs and JPEGs. The immediate benefit is dramatically more compelling online content. Many of the hottest areas on AOL and eWorld are taking advantage of ART technology, including ABC, Business Week, The Smithsonian, NY Times, and 800-Flowers. Now, Johnson-Grace is able to offer the same benefit to Web publishers. To help you immediately reap the rewards of ART image compression on your Web site, Johnson-Grace is offering publishers the latest copy of our ART Press(TM) on a FREE trial basis for the remainder of calendar 1995. ART Press lets you easily convert your images to the ART format with its unique Web and online publishing features. For example, our proprietary Splash(TM) feature displays a full-size image in roughly one second; the image then becomes sharper as more detail is received and decompressed in additional layers, producing a high-quality final image within seconds. To get your free trial copy of ART Press, simply sign up for the "Johnson-Grace Publishers Program," a new program designed specially for Web and online publishers. At the foot of this email is an enrollment form. Just fill it out and email or fax it back to us. We'll send you the software right away (usually within 24 hours). For even faster results, just sign up online through the Johnson-Grace Web site (http://www.jgc.com/). Besides receiving ART Press, another prime benefit of joining our Publishers Program is that you will be automatically notified when any new versions of the software become available. Here are two more benefits: * FREE Technical Support -- For the remainder of calendar 1995 you will receive free expert technical advice on using ART Press. Support is available by email or by phone. * FREE Image Compression -- To help you get started with ART Press, Johnson-Grace will compress your original images into the ART format free of charge. Simply provide them to us in BMP, TIFF, or PICT format, and we'll do the rest. We've devised a method for allowing both ART and non-ART images to be accessed from your Web site depending on whether or not an ART-enabled browser is being used. Johnson-Grace and some of the larger browser companies have introduced a new extension to HTML, the X-ALTSRC attribute in the tag. ( is the standard tag used to insert images into a Web page.) It indicates to ART-enabled Web browsers that an ART image is present. When an X-ALTSRC attribute is found, ART-enabled browsers will automatically use the ART image named in it, bypassing a SRC attribute it may find naming a GIF (or JPEG) image. Browsers that do not recognize the X-ALTSRC attribute will ignore it and read the SRC attribute instead, so there's no risk of incompatibility with these "old-style" browsers. Currently, AOL's built-in TurboWeb browser as well as other Web browsers including GNN and TeacherSoft recognize this new HTML attribute, representing a community of well over three and a half million users. As announced by Netscape, Johnson-Grace will be one of the first companies to provide a free plug-in for Netscape 2.0 which will allow Netscape users to take advantage of the ART format. This plug-in will be delivered as a "virtual bundle" so that support for the ART format will be automatically added to the browser the first time an ART image is encountered. Additionally, Johnson-Grace is in discussions with all the other major Web browser companies to include ART technology in their products. We expect broad support by the end of the year. Check out the Johnson-Grace Web site (http://www.jgc.com) to learn more about how to use ART's triple-speed advantage on your Web site. You'll also find a host of other useful information there designed specifically for publishers. In the months ahead, look for Johnson-Grace to provide additional "Instant Publishing" capabilities for Web and online service publishers. For example, later this year you'll see news of ART speech compression technology that will enable publishers to author interleaved sound and images for real-time playback at 14,400 bits per second. Think about what real-time sound can do for your Web pages! If you have any questions about the program, feel free to email techsupport at jgc.com. You can also call Tech Support at (714) 759-0700, or fax us at (714) 729-4643. Best regards, Geoff LeBlond VP, Licensing Johnson-Grace Company Enrollment for Johnson-Grace Publishers Program Please provide the following information to enroll in the Johnson-Grace Publishers Program Name: Title: Company Name: Company Address1: Company Address2: Company Address3: Company Address4: Telephone Number: Fax Number: email Address (email address is required to process your request) : Version of Software needed [ ] Windows [ ] Macintosh [ ] Both Type of Publisher (select one) [ ] Newspaper, Magazine, or Newsletter [ ] Merchant [ ] Company (e.g., product and sales information) [ ] Government or Non-Profit Organization [ ] Other (please specify) : Target Audience (check all that apply) [ ] Web [ ] Online Service(s) [ ] Both Web Site Information (1) Home Page Location (URL): (2) Launch Date: (3) Webmaster e-mail address: Note: By sending this registration form to Johnson-Grace Company, you agree to follow the following Publishers Program restrictions. (1) Do not use a trial version of ART Press after the end of the trial evaluation period. (2) Only Web and online service publishers -- defined as companies, organizations, or entities that offer content or information for display on the Web or on an online service for commercial purposes -- may qualify to participate in the Johnson-Grace Publishers Program. (3) Do not distribute copies of the program (all users must enroll), or attempt to reverse engineer the program. (4) Report any problems with the program to the Publisher Support Hotline at internet address techsupport at jgc.com, fax 714-729-4643, or telephone 714-759-0700 (ext. 215 or ext. 230). From lharrison at mhv.net Mon Oct 2 21:16:18 1995 From: lharrison at mhv.net (Lynne L. Harrison) Date: Mon, 2 Oct 95 21:16:18 PDT Subject: The Free Speech Implications of Remailers Message-ID: <9510030417.AA14938@mhv.net> At 10:32 PM 10/1/95 -0700, Tim May wrote: >Well, guess what? The very technologies we have been so central in >deploying are the technologies that make _conventional_ means of >controlling distasteful material so hard. >system of the various mail delivery systems.) >Crypto anarchy means the racists, sexists, speciesists, and other "ists" >cannot be muzzled. I call this a good thing. It's why I'm here. Excellent analysis. One can't argue with logic, nor should one forget the purpose and spirit of this list. The fact that spamming is in poor taste is irrefutable. However, some of the "where did this come from"? responses are starting to sound like some people are suddenly against the use of anonymous remailers. I, for one, would hope that people are simply rising to the challenge of tracing the routers. Kill the message if you are so moved -- not the technological messenger. ******************************************************************** Lynne L. Harrison, Esq. Poughkeepsie, New York lharrison at mhv.net "Say not, 'I have found the truth', but rather, 'I have found a truth.'" - Kahlil Gibran from "The Prophet" ******************************************************************** From patrick at Verity.COM Mon Oct 2 21:28:47 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Mon, 2 Oct 95 21:28:47 PDT Subject: Time Lag Message-ID: <9510030425.AA00286@cantina.verity.com> > Sending one message and rigorously studying timestamps in the Received > lines and using that to draw conclusions about mail propagation is a > complete waste of time. Ah, but when there seems to be an ongoing pattern of delays, and many people check many messages and find that indeed there is a pattern, it's not a waste of time, no? Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From adam at homeport.org Mon Oct 2 21:34:52 1995 From: adam at homeport.org (Adam Shostack) Date: Mon, 2 Oct 95 21:34:52 PDT Subject: One-Time-Pad generation from audio device In-Reply-To: Message-ID: <199510030437.AAA05775@homeport.org> If there is no microphone plugged into the audio port, the random numbers tend to be of very poor quality. (At least on a sun, visual inspection of the output shows how poor the numbers are.) I suspect a few quick tests, followed by warnings to the user to turn on the microphone, would be quite useful. Adam % head /dev/audio | od | head 0000000 077776 077777 077377 177577 177777 177377 177576 077776 0000020 077776 177577 077376 077376 077577 177576 177177 077376 0000040 077576 077776 077377 177777 177576 177377 077377 077377 0000060 077576 177775 077576 177776 177576 177377 177176 177177 | The code basically reads in a 512-byte block from /dev/audio, then takes | the MD5 of that block to generate 16 bytes of the OTP. The raw audio data | I'm getting is not particularly random and will compress by 3:1 using gzip | or compress, so I'm assuming that using a 32:1 ratio here via MD5 will | give a truly random output (it's certainly uncompressible). | | Before I release the source code to the Net, can anyone give me any good | reasons to believe that this won't produce physically random output, or | make suggestions on how to test, or improve, the generated output ? There's | a #define which can be used to easily increase the amount of data fed into | the MD5, but at the moment it will only generate about 1 MB per hour on a | Sparcstation (limited by the audio input rate), so I don't want to | increase that if I don't have to. -- "It is seldom that liberty of any kind is lost all at once." -Hume From perry at piermont.com Mon Oct 2 21:45:15 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 2 Oct 95 21:45:15 PDT Subject: Simple Hardware RNG Idea In-Reply-To: <9510021817.AA01271@red2.cac.washington.edu> Message-ID: <199510030445.AAA29715@frankenstein.piermont.com> Dave Dittrich writes: > > > Perry writes, regarding alpha decay counts for random numbers: > > > > > And, as I noted, there are RS232 interfaceable radiation detectors you > > > can buy off the shelf -- no hardware hacking needed. > I was thinking about this the other day and wondered if it wouldn't be > cheap and relatively easy to build a board that samples and sums > several randomly selected signals on various frequencies on the AM > broadcast spectrum. Radio signals can be interfered with or listened to -- never underestimate the opponent. Computer interfaced radiation detectors, in spite of Tim's claim to the contrary, are pretty cheap and very hard to interfere with. Perry From adam at homeport.org Mon Oct 2 21:51:48 1995 From: adam at homeport.org (Adam Shostack) Date: Mon, 2 Oct 95 21:51:48 PDT Subject: WHERE did this come from? In-Reply-To: <9510021655.AA07536@zorch.w3.org> Message-ID: <199510030454.AAA06674@homeport.org> hallam at w3.org wrote: | It appears that someone may have obtained the cypherpunks mailing | list and used it as the basis for the Spam. This is a serious matter. You mean the list of folks subscribed to cypherpunks? The list that you get by sending mail to majordomoe at toad.com with a body of 'who cypherpunks'? Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From blancw at accessone.com Mon Oct 2 21:55:48 1995 From: blancw at accessone.com (blancw at accessone.com) Date: Mon, 2 Oct 95 21:55:48 PDT Subject: `Hack Microsoft' challenge is NYT Computer News Daily's top story Message-ID: <9510030455.AA11218@accessone.com> > Community Connexion, an Internet service provider that last week > promised a free T-shirt to anyone who found a flaw in Netscape > Communications Corp.'s software, extended the challenge Friday to > include holes in Microsoft products. ....................................... So what message will the T-shirts have on the front, Sameer? .. Blanc From Ironwolf at Minotaur.com Mon Oct 2 22:22:26 1995 From: Ironwolf at Minotaur.com (Robert McNally) Date: Mon, 2 Oct 95 22:22:26 PDT Subject: CYPHERPUNK considered harmful. Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Recently Peter Trei called for new names and slogans to replace the negatively loaded name "Cypherpunks." Here is one effort (partially based on his suggestion, but with refinements.) Note that I intend the term "strong privacy" to include both cryptography-based tools, and other tools such as remailers. I hereby place the following into the public domain. * * * I lock my car. I secure my house. I send my letters in envelopes. I store my valuables in safe places. I don't let strangers hold my wallet. I don't wear a name tag everywhere I go. I carry my cash and credit cards out of sight. I don't show off my key number when visiting the ATM. I protect my e-mail and files with strong privacy tools. Don't you? A message from SPAN: the Strong Privacy Advocates Network -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMGvwfwsQtf7CdTI1AQFSGwP9HWusresWaRsQig2fSNW/nXt+oKVv6Np7 5EuziM3v1ihP4Clr4dqUtEE+Yujf7o71I7nb1UrVvwpIOt5yWXtiZc2/5VPZFBUY bTUHlQ/NkgKum9RMnntb8BprtpiTSrb+o2s9iYDJLfFnCeT8n2zEn97GgandKA2o rbXWVIEKSpc= =mBAk -----END PGP SIGNATURE----- ------------------------------------------------------------------------- NOTE: Currently travelling on sabbatical. Expect responses within 7 days. ------------------------------------------------------------------------- ROBERT McNALLY - MINOTAUR CONSULTING Ironwolf at Minotaur.com * 714/648-2248 Specializing in Computer Games and Digital Entertainment Software Over 15 Years of Industry Experience: Creative * Technical * Managerial ------------------------------------------------------------------------- From ses at tipper.oit.unc.edu Mon Oct 2 22:55:17 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Mon, 2 Oct 95 22:55:17 PDT Subject: Simple Hardware RNG Idea In-Reply-To: <199510030445.AAA29715@frankenstein.piermont.com> Message-ID: On Tue, 3 Oct 1995, Perry E. Metzger wrote: > > Radio signals can be interfered with or listened to -- never > underestimate the opponent. Computer interfaced radiation detectors, > in spite of Tim's claim to the contrary, are pretty cheap and very > hard to interfere with. What about a beam of high intensity ionising radiation aimed at the detector? Since we're dealing with lo intensity sources, this could force the RNG into a small part of its range. Beware of black helicopters carrying cyclotrons :-) Simon From mpd at netcom.com Mon Oct 2 23:02:32 1995 From: mpd at netcom.com (Mike Duvos) Date: Mon, 2 Oct 95 23:02:32 PDT Subject: Introducing Johnson-Grace In-Reply-To: <95Oct2.185011pdt.21953@mail.jgc.com> Message-ID: <199510030602.XAA18317@netcom17.netcom.com> In an unsolicited advertisement, Publisher Program writes: > You may have never heard of Johnson-Grace Company, but you > have probably seen the benefits of our image compression > technology in America Online and Apple's eWorld. Two painfully slow online services. > In fact, ART formatted images transmit three times faster > over conventional telephone lines than old-style GIFs and > JPEGs. This might very well be true for a restricted set of images, but I seriously doubt that arbitrary color photographic images take three times less space with this system than with JPEG given comparable retention of detail. Also, are we suggesting that images transmit exactly three times faster as both GIF and JPEG. This is somewhat odd, given that the difference in size between the two latter formats is often a factor of ten? If you can beat JPEG by a factor of three, you can beat GIF by about a factor of 30. If you really can do this, you should be working on MPEG-4, and not spamming our nice little list with advertising material. I should point out that neither Fractals, Lapped transforms, or Wavelets can beat JPEG by a factor of three, and neither, I suspect, can you. [Huge Self-Promotion and Wonders of the Product Elided] > For example, our proprietary Splash(TM) feature displays a > full-size image in roughly one second; the image then > becomes sharper as more detail is received and decompressed > in additional layers, producing a high-quality final image > within seconds. JPEG can do this quite easily with either the progressive or hierarchical modes of transmission. Why reinvent the wheel? The engineering graveyard is littered with the bodies of various entities who announced spectacular image compression advances. In each case, reality dawned shortly after the hype died down. > Additionally, Johnson-Grace is in discussions with all the > other major Web browser companies to include ART technology > in their products. We expect broad support by the end of the > year. Translation: We've learned how to use the "associate" command in WinDoze File Manager. > For example, later this year you'll see news of ART speech > compression technology that will enable publishers to author > interleaved sound and images for real-time playback at > 14,400 bits per second. It's been done. Do the words "low bandwidth videoconferencing" ring a bell? I'll be truely surprised if you can beat PictureTel's complex proprietary algorithm for sound and image compression. [Silly Form Deleted] -- Mike Duvos $ PGP 2.6 Public Key available $ mpd at netcom.com $ via Finger. $ From mark at lochard.com.au Mon Oct 2 23:12:37 1995 From: mark at lochard.com.au (Mark) Date: Mon, 2 Oct 95 23:12:37 PDT Subject: `Hack Microsoft' challenge is NYT Computer News Daily's top story In-Reply-To: <199510030306.XAA24030@thor.cs.umass.edu> Message-ID: <199510030504.AA51368@junkers.lochard.com.au> >> I don't know about everyone else, but a T-shirt seems a very >> small reward for uncovering a "hole" in the encryption >> algorithm of Microsoft products. > >I don't know about anyone else, but helping to protect the confidential data >of millions of users around the world seems a very large reward for >uncovering a hole in the encryption algorithms of M$ products. My reward would be the satisfaction of showing M$ code to be the substandard, elitist, money grubbing and dictatorial junk it is. The size of their payroll should not be the reason they want to be able to dictate what programs Joe Deskset runs on the internet. I can see the progression where their CC transportation software is coupled with a Registration Wizard to automatically purchase any software on your HD that they have no record of you purchasing... "just in case and as a service on your behalf". Mark The above opinions are rumoured to be my own. From jsw at neon.netscape.com Mon Oct 2 23:13:30 1995 From: jsw at neon.netscape.com (Jeff Weinstein) Date: Mon, 2 Oct 95 23:13:30 PDT Subject: Spoofing HTTP server certificates In-Reply-To: <199510020737.AAA27256@ix7.ix.netcom.com> Message-ID: <44qk8v$igc@tera.mcom.com> In article <199510020737.AAA27256 at ix7.ix.netcom.com>, stewarts at ix.netcom.com (Bill Stewart) writes: > At 12:52 AM 10/2/95 -0400, Greg Miller wrote: > > Since there has been a lot of talk about the "man in the middle" > >attack on the secure web servers, has anyone actually considered the > >processing time required to fake a certificate from scratch? > > I haven't really familiarized myself with how the certificates > >are generated, etc, but it's my understanding that they are signed with RSA. > > While I haven't seen Verisign's various public keys posted to the net, > and didn't see them anywhere on their web page, I assume they're at least > 508 bits long, and the ones for better-than-personna certification > (or at least Class 3) ought to be ~1024 bits long, unless they're limiting > themselves to 512 bits to support software that's limited by ITAR stupidity > (which would be a shame, but is certainly possible.) You can see the certificate(including public key) for RSA/Verisign's sercure server authority by looking at: http://home.netscape.com/newsref/ref/rsa-server-ca.html It is a >1000 bit key. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at neon.netscape.com Mon Oct 2 23:20:12 1995 From: jsw at neon.netscape.com (Jeff Weinstein) Date: Mon, 2 Oct 95 23:20:12 PDT Subject: User-Specified Trusted CAs in Netscape (Was: Re: NetScape's dependence upon RSA down for the count!) In-Reply-To: <199510012043.NAA06905@illilouette.Eng.Sun.COM> Message-ID: <44qklr$igc@tera.mcom.com> In article <199510020516.BAA21934 at giane.cs.umass.edu>, futplex at pseudonym.com (Futplex) writes: > Bill Soley writes: > > (3) Netscape is making the problem worse (yes, worse) in the next release > > by allowing the user to specify their own list of trusted CAs. (I will > > elaborate on this unpopular view below.) > [...] > > Re: problem 3, about how allowing the user to specify their own list of > > trusted CAs is bad. > [...] > > it. Even Mary Moderately-Savy might be tricked in to doing it on the > > false assumption that it would only affect security for the naughty > > pictures site (that she may not care about), and not affect security for > > her stock-broker. This false assumption might be based on the fact > > that the (legitimate) stock-broker uses a different CA. > > You seem to be overstating your point a bit. The real problem here, AFAICS, > is that the proposed protocol in the software wouldn't allow sufficiently > fine-grained control over the certification authority approval. The user > should be able to specify the conditions under which a CA is to be trusted, > not simply give a blanket approval or rejection. > > It looks as though a set of trusted (CA, site) pairs would suffice. > How about it, Netscape ? Give the user the opportunity to say "I trust > certificates from Alfie's World of Key Certification regarding keys for > interactions with Elvira's Copier Shack." We've already thought of a lot of the stuff you guys have brought up, and tried to address them in our design. I'm also taking note on things we didn't think of. There will be various "domains" that you can trust a CA for, including SSL, e-mail, and payment. You will be able to enable and disable trust for specific server certs as well. You could say, "I don't trust verisign, but I will trust Joe's Internet Coffee Shop(which happens to be signed by verisign)". --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From Don.Stephenson at Eng.Sun.COM Mon Oct 2 23:22:34 1995 From: Don.Stephenson at Eng.Sun.COM (Don Stephenson) Date: Mon, 2 Oct 95 23:22:34 PDT Subject: NetScape's dependence upon RSA down for the count! Message-ID: <9510030606.AA09386@icenine.Eng.Sun.COM> > From cmcmanis at scndprsn Mon Oct 2 09:07:33 1995 > Why forge it? Why not simply buy a netsite server with a valid certificate. > Let's say you paid full list for it $5000. It is the classic MITM attack > but the protection against that attack was generally that the parties > communicating "knew" each other. Of course, the attacker would be leaving a very strong pointer back to themselves as evidence. > This is a fundamental weakness of putting the security at the SSL level as > opposed to a possibly higher level. With the netscape attack since your > client never cares "how" (or to whom) the SSL connection is made, it never > shows you the information about where the source key came from. Only that > it is valid. I'm not sure this is really an issue of where the security is layered, but rather a flaw in the use of it, in not requiring the unambiguous specification of the "service name" (what's in the certificate) beforehand, or confirming it after the connection is established. You must have a binding between the target URL and the desired "service name", regardless of whether you have the security protocol in the session layer (SSL) or the application/http layer (Secure-HTTP). - Don From jsw at neon.netscape.com Mon Oct 2 23:34:59 1995 From: jsw at neon.netscape.com (Jeff Weinstein) Date: Mon, 2 Oct 95 23:34:59 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) In-Reply-To: <9510030147.AA15570@dmsd.com> Message-ID: <44qlhk$igc@tera.mcom.com> In article <9510030248.AA08909 at hplyot.obspm.fr>, dl at hplyot.obspm.fr (Laurent Demailly) writes: > > On the topic of risks for a "major browser" to be tempered/targetted > as a virus : > > I asked monthes ago netscape folks to make md5sum and/or PGP digital > signatures (preferably md5sum of each files, this in a file, itself > pgp signed) of the binaries available on their page and on relevant > newsgroup to reduce possibility of tempering. > > [ok it won't help mythical joe six pack's but...] > > Maybe I'll got more luck calling from here :-) I've been thinking about this recently for obvious reasons. My concern is that if someone can attack your download of netscape, they could also attack your download of the program that validates netscape. Is there really any way out of this one? --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From mark at lochard.com.au Mon Oct 2 23:56:49 1995 From: mark at lochard.com.au (Mark) Date: Mon, 2 Oct 95 23:56:49 PDT Subject: SAIC bought InterNic, but who is SAIC? A spook contractor! In-Reply-To: <9510010616.AA06860@sulphur.osf.org> Message-ID: <199510030655.AA59891@junkers.lochard.com.au> >SAIC ran the Center for Seismic Studies in Arlington, VA. Rick Adams, >co-founder of UUnet, made one of their machines, seismo, the UUCP hub of the >world for a couple of years. I wonder how much intel that gained them. Mark The above opinions are rumoured to be mine. From cman at communities.com Tue Oct 3 00:00:30 1995 From: cman at communities.com (Douglas Barnes) Date: Tue, 3 Oct 95 00:00:30 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape'sdependence upon RSA down for the count!) Message-ID: The idea here is to use multiple alternative channels for distributing the checksums (newsgroups, mailing lists, telephone support lines, fax-back service, e-mail, etc.), in addition to the ftp sites. Also, since you guys use (relatively untrusted) mirror sites, you can distribute the checksums on your official sites, so that people can verify them from you directly, even if it's more practical for their main download to be from a "local" mirror. > > I've been thinking about this recently for obvious reasons. My concern >is that if someone can attack your download of netscape, they could also >attack your download of the program that validates netscape. Is there >really any way out of this one? > > --Jeff From liberty at gate.net Tue Oct 3 00:04:11 1995 From: liberty at gate.net (Jim Ray) Date: Tue, 3 Oct 95 00:04:11 PDT Subject: Crypto APIs Message-ID: <199510030459.AAA71133@tequesta.gate.net> -----BEGIN PGP SIGNED MESSAGE----- Matt writes: >Yes. (ICE, by the way, is funded by ARPA and run by TIS. Strange notion >of "experiment", given that the result of the "experiment" will be to see >whether the government will allow it. So one part of DoD is funding TIS >to find out how another part of DoD behaves...) Your tax dollars at work. JMR -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Freedom isn't Freeh iQCVAwUBMHC9lW1lp8bpvW01AQHg4gQAge0AzJBK7zlQux8Mc6evJZm/Z87noNYM qtS9cc6OPtcBP7kvrwf/sAa1X+vsHQkKec/WsJ3xH944P8m8WuDgTa2/gMoro50E rymwS6ZtIftrmCis4vpTg6xSPhMXDSHg9NcffLNrKXDQh4xW1aRzIgiixRbBCg1s gXyQ5GoGPqk= =TVrb -----END PGP SIGNATURE----- Regards, Jim Ray "One of the penalties for refusing to participate in politics is that you end up being governed by your inferiors." -- Plato ----------------------------------------------------------------------- PGP key Fingerprint 51 5D A2 C3 92 2C 56 BE 53 2D 9C A1 B3 50 C9 C8 Key id. # E9BD6D35 James Milton Ray ----------------------------------------------------------------------- Help Phil! email zldf at clark.net or see http://www.netresponse.com/zldf _______________________________________________________________________ From rjc at clark.net Tue Oct 3 01:36:55 1995 From: rjc at clark.net (Ray Cromwell) Date: Tue, 3 Oct 95 01:36:55 PDT Subject: New Netscape bug (in version 1.12) Message-ID: <199510030836.EAA09080@clark.net> C'punks, I just got back from a vacation in Raleigh, and downloaded the new "fixed" Netscape 1.12. It took me about an hour, but I've discovered another bug and potential security hole. This one relates to mailto:. The bug is as follows. Create a HTML file with a hyperlink containing the following URL foo This bug doesn't seem to crash Netscape, instead, it crashes my XServer as soon as the mail window pops op. I'm too tired right now to try to analyze it, but it might be another stack bug, this time, in the X libraries because Netscape isn't doing any sanity checking. I need help testing this bug on other platforms. I have created a test page. Go to http://www.gl.umbc.edu/~rcromw1/crash.html to test. I have also found 2 other bugs that cause stack trashing in v1.1 however, they are random and I haven't been able to isolate them completely yet. (I have created a page on my system, such that if you visit it, after you visit about 3 more pages, it crashes) What's my point in pursuing this? Netscape's browser is a piece of software that runs on millions of computers and in effect, allows outside agents to input arbitrary data into that software. As such, it is unlike most applications made. Sure, Microsoft Word may have bugs, but how many people are downloading hundreds of MS Word documents everyday and viewing them? Users of Web browsers are exposing themselves like this everyday, and so I think, that web browsers must have higher standards of robustness. I think Netscape represents an enormous risk to computer security, and while I think they are heading in the right direction, there are some very basic implementation issues they need to clear up which are orthogonal to SSL and credit card transactions. All the cryptography in the world won't help you if someone can subvert your cryptobox. Netscape needs to do some serious quality assurance work. I've never been a QA person in my life, but within a few minutes, I have been able to find serious bugs in the software. And while I'm sure Netscape's coders are fine people, proof reading your own code, code that you look at everyday, becomes rather hard because you tend to "see through it". (just like proof reading essays, or messages) I think Netscape should hire some outside firm/group to review their code under non-disclosure for potential implementation holes. -Ray Cromwell P.S. I am running Netscape v1.12 under BSDI2.0 and the XAccel/2.0 server From sameer at c2.org Tue Oct 3 01:45:32 1995 From: sameer at c2.org (sameer) Date: Tue, 3 Oct 95 01:45:32 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510030836.EAA09080@clark.net> Message-ID: <199510030840.BAA04677@infinity.c2.org> Doesn't crash on SunOS 4.1.3_U1 running X11R6. > I need help testing this bug on other platforms. I have created > a test page. Go to http://www.gl.umbc.edu/~rcromw1/crash.html > to test. -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 An Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From rjc at clark.net Tue Oct 3 01:57:17 1995 From: rjc at clark.net (Ray Cromwell) Date: Tue, 3 Oct 95 01:57:17 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510030840.BAA04677@infinity.c2.org> Message-ID: <199510030857.EAA10604@clark.net> > > Doesn't crash on SunOS 4.1.3_U1 running X11R6. > > > I need help testing this bug on other platforms. I have created > > a test page. Go to http://www.gl.umbc.edu/~rcromw1/crash.html > > to test. Thanks for the info. It may be a bug in BSDI's Xserver then. However, the overlong domain bug is also a bug in the NIS code. So while the crash may not occur within Netscape code itself, I am a little wary that it is not performing sanity checking. If it turns out to do nasty stuff to Windows clients, then it may be significant. -Ray From rjc at clark.net Tue Oct 3 02:20:50 1995 From: rjc at clark.net (Ray Cromwell) Date: Tue, 3 Oct 95 02:20:50 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510030840.BAA04677@infinity.c2.org> Message-ID: <199510030920.FAA12203@clark.net> > > Doesn't crash on SunOS 4.1.3_U1 running X11R6. Just tried it under NT 3.5 with Netscape 1.1. It didn't crash as soon as the mail window popped up (like it does under my BSDI2.0), however clicking on "send" caused Netscape to quit/die (but not with any GPF or failure) Varying the length and data in the mailto may have other effects. -Ray From barrett at iafrica.com Tue Oct 3 02:32:42 1995 From: barrett at iafrica.com (Alan Barrett) Date: Tue, 3 Oct 95 02:32:42 PDT Subject: IETF "Voluntary Access Control" working group In-Reply-To: <199510012022.OAA07852@nag.cs.colorado.edu> Message-ID: > It would make a great project if a bunch of cypherpunks installed > NoCeM and then piped the list to a newsgroup. We could then develop > reputation servers to help us use NoCeM, start charging cyberbucks for > our recommendations, and, in short, make cpunks into a slightly larger > outpost in Cyberlibertaria. (a.k.a. The Free Net) The IETF "Voluntary Access Control" working group could probably use a few more people who are interested in the type of access control enabled by reputation servers, as opposed to the type of access control imposed by censorship servers. Subscribe to the mailing list via vac-wg-request at naic.nasa.gov. --apb (Alan Barrett) From jsw at neon.netscape.com Tue Oct 3 02:50:31 1995 From: jsw at neon.netscape.com (Jeff Weinstein) Date: Tue, 3 Oct 95 02:50:31 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510030836.EAA09080@clark.net> Message-ID: <44r106$moh@tera.mcom.com> I tested your crash page on 1.12 for SGI, and 2.0 on SGI and Windows NT, and none of them had any problem. I spent five years working on the X server, and my credo then was that if the X server crashes, its a bug in the X server, no matter what wild shit the client throws at it. (I feel the same way about netscape now...) I suggest you complain to your X server vendor. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From frissell at panix.com Tue Oct 3 03:02:16 1995 From: frissell at panix.com (Duncan Frissell) Date: Tue, 3 Oct 95 03:02:16 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510030836.EAA09080@clark.net> Message-ID: It doesn't crash Windoze (hardly surprising). DCF From anonymous at freezone.remailer Tue Oct 3 04:15:50 1995 From: anonymous at freezone.remailer (anonymous at freezone.remailer) Date: Tue, 3 Oct 95 04:15:50 PDT Subject: CISS TSP MISSI Message-ID: <199510031115.HAA21583@light.lightlink.com> URL: http://www.disa.mil/ciss/tsp.html INFOSEC TRAINING AND SECURITY PRODUCTS (TSP) DEPARTMENT The INFOSEC Training and Security Products Department is responsible for developing, coordinating and executing a DoD-wide INFOWAR education, training and awareness program; creating an INFOWAR Career Management Program for DoD; and developing, coordinating, documenting and executing DoD-wide procedures to identify and disseminate INFOSEC products to meet DoD-wide INFOWAR requirements. This department of CISS is also responsible for the update and distribution of the Multilevel Information Systems Security Initiative (MISSI) Implementation Guide. The MISSI Guide is a planning tool, enabling DoD and other agencies to determine resource requirements to implement various MISSI services into their infrastructure. [Insert Multilevel Security (MLS) excerpt] The MLS Program is partnered with NSA's Multilevel Information Systems Security Initiative (MISSI). The MISSI Program is intended to provide a set of MLS technologies that comply with the DoD Goal Security Architecture. These technologies, when developed over the next five years, will be implemented in operational environments by the MLS Program. In the meantime, the MLS Program will continue to identify, assess, and implement commercially available MLS technologies to satisfy immediate MLS requirements throughout DoD. [End insert] The DISSPATCH newsletter, an INFOSEC publication is published 4 times per year by TSP. Electronic copies will be loaded here soon. The Security Products Database is a stand-alone database containing information on over 400 security products, to include their technical characteristics and points of contact. TSP is also building an INFOSEC Training Facility (ITF) at our Falls Church, Virginia location. The ITF will provide state of the art information systems security training to include the suite MISSI educational offerings. Commercial telephone: (703) 681-1325, DSN: 761-1325 Back to the CISS Page yorkw at cc.ims.disa.mil Last Revision - 31 August 1995 From akjoele at ee.siue.edu Tue Oct 3 05:59:07 1995 From: akjoele at ee.siue.edu (Arve Kjoelen) Date: Tue, 3 Oct 95 05:59:07 PDT Subject: New Netscape bug (in version 1.12) Message-ID: <199510031259.HAA01229@shiva.ee.siue.edu> It doesn't crash Solaris 2.4 running X11R5 (Netscape 1.1N) > I need help testing this bug on other platforms. I have created > a test page. Go to http://www.gl.umbc.edu/~rcromw1/crash.html > to test. -Arve From jya at pipeline.com Tue Oct 3 06:18:06 1995 From: jya at pipeline.com (John Young) Date: Tue, 3 Oct 95 06:18:06 PDT Subject: Telco Blob Message-ID: <199510031308.JAA10163@pipe1.nyc.pipeline.com> Financial Times of October 3 has a humongous 40-page insert on international telecommunications -- markets, business, technology, and, to be sure, the tele-players lying, cheating, fearing the "computer hacking industry," whimpering with delirious greed at the bountiful, multicultured consumer's mindless credulity of tekkie- gadgets. For the mil-beguiled Colin Powells there's even a colored global map of Big Blob telco strategic rapacity. A tiny cheering blip of machine-wash-n-readable T-stupidity on p. 34: Sutton dismisses worries out security -- despite a recent successful attempt to break the security on Internet financial transactions. An incident in August, when a researcher at the French National Institute of Computer Science and Control (INRIA) broke into the Internet security system, raised concerns about security. "A lot of security is about perception -- after all, every code can be broken. The INRIA incident only involved breaking a single code and needed massive computer resources to do it," says Mr Sutton. From Olivier.Galibert at mines.u-nancy.fr Tue Oct 3 06:20:28 1995 From: Olivier.Galibert at mines.u-nancy.fr (Olivier GALIBERT) Date: Tue, 3 Oct 95 06:20:28 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510031259.HAA01229@shiva.ee.siue.edu> Message-ID: <199510031312.OAA18079@mines.u-nancy.fr> > > It doesn't crash Solaris 2.4 running X11R5 (Netscape 1.1N) > > > I need help testing this bug on other platforms. I have created > > a test page. Go to http://www.gl.umbc.edu/~rcromw1/crash.html > > to test. I doesn't crash on SunOS 4.1.3_U1/NCD X Terminal either, but the way the "Mail To" field is written is funny (three lines of x's on the same horizontal line with 2pix horz. spacing :-). Sarayan From jya at pipeline.com Tue Oct 3 06:51:14 1995 From: jya at pipeline.com (John Young) Date: Tue, 3 Oct 95 06:51:14 PDT Subject: ZIT_pus Message-ID: <199510031351.JAA09367@pipe4.nyc.pipeline.com> 10-3-95. Wash Rag: "Employment Database Proposal Raises Cries of 'Big Brother'." Critics say that in its zeal to combat illegal immigration, Congress is steering the nation toward an "Orwellian nightmare," an era of all-knowing federal oversight whereby officials will be able to verify citizenship by using high-tech national identification cards. So far, no member of Congress has openly called for a national ID card, at least by that name. Rep. Bill McCollurn (R-Fla.) said he intends to offer an amendment on the House floor to create a "more secure" Social Security card with a photo, a hologram and "perhaps a biometric identifier." Microchip technology can make ID cards especially intrusive. According to an analysis by the Cato Institute, one newly patented ID card can hold a photo and 1,600 pages of text. Another identification system developed by a major defense contractor consists of a microchip the size of a grain of rice that can be implanted under the skin with a syringe and read with a scanner. ZIT_pus (7 kb) From schampeo at imonics.com Tue Oct 3 06:56:10 1995 From: schampeo at imonics.com (Steven Champeon - Imonics Development) Date: Tue, 3 Oct 95 06:56:10 PDT Subject: New Netscape bug (in version 1.12) Message-ID: <9510031355.AA18290@fugazi.imonics.com> | From owner-cypherpunks at toad.com Tue Oct 3 04:39:23 1995 | Subject: New Netscape bug (in version 1.12) | X-Mailer: ELM [version 2.4 PL24alpha3] | Content-Transfer-Encoding: 8bit | Sender: owner-cypherpunks at toad.com | X-Status: | | | C'punks, | I just got back from a vacation in Raleigh, and downloaded the | new "fixed" Netscape 1.12. It took me about an hour, but I've | discovered another bug and potential security hole. This one relates | to mailto:. Well, I'm still in Raleigh :-) but this doesn't do much of anything to my Macintosh, Netscape 1.1N, under System 7.5. Looks like a bug in your X server. However, Netscape 1.1N for Solaris, running under X11R6 X server, dumps core fairly quickly. I haven't had a chance to try out the 1.12 version on UNIX or Mac, but the 1.22 32-bit Windoze version handles it fine under NT 3.5.1. Steve -- Steven Champeon (919) 469-7833 Technical Lead, schampeo at imonics.com Imonics Web Services webmaster at imonics.com From goedel at tezcat.com Tue Oct 3 07:16:06 1995 From: goedel at tezcat.com (Dietrich J. Kappe) Date: Tue, 3 Oct 95 07:16:06 PDT Subject: New Netscape bug (in version 1.12) Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Ray Cromwell wrote: > The bug is as follows. Create a HTML file with a hyperlink containing >the following URL > > foo > >This bug doesn't seem to crash Netscape, instead, it crashes my XServer >as soon as the mail window pops op. I'm too tired right now to try to >analyze it, but it might be another stack bug, this time, in the X >libraries because Netscape isn't doing any sanity checking. > >I need help testing this bug on other platforms. I have created >a test page. Go to http://www.gl.umbc.edu/~rcromw1/crash.html >to test. Nothing on Mac Netscape 1.12 nor on the latest Windows 3.x Netscape. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQBgAwUBMHFRwHIf3YegbdiBAQGR6wJXTcCiqgHeunkdLyd1kGUhRTx2JP0p1PN3 UKdThUKLTL7utPDFevRORjF/3B/ziVszJlk+5PASfQeF6DlKYG8ib9Fr0OdW1E0p CPRK =6T18 -----END PGP SIGNATURE----- Dietrich Kappe | Red Planet http://www.redweb.com Red Planet, LLC| "Chess Space" | "MS Access Products" | PGP Public Key 1-800-RED 0 WEB| /chess | /cobre | /goedel/key.txt Web Publishing | Key fingerprint: 8C2983E66AB723F9 A014A0417D268B84 From perry at piermont.com Tue Oct 3 07:23:49 1995 From: perry at piermont.com (Perry E. Metzger) Date: Tue, 3 Oct 95 07:23:49 PDT Subject: Simple Hardware RNG Idea In-Reply-To: Message-ID: <199510031423.KAA01406@frankenstein.piermont.com> Simon Spero writes: > On Tue, 3 Oct 1995, Perry E. Metzger wrote: > > Radio signals can be interfered with or listened to -- never > > underestimate the opponent. Computer interfaced radiation detectors, > > in spite of Tim's claim to the contrary, are pretty cheap and very > > hard to interfere with. > > What about a beam of high intensity ionising radiation aimed at the > detector? If you are paranoid, put the detector in a lead box and you are done. Its not hard to get the lead thick enough that tampering attempts would be noticed very easily. Trying to shield an object from radio signals and still manage to get meaningful numbers out (rather than self generated signal) is a hard problem, but this can be done by a high school student. Perry From cme at TIS.COM Tue Oct 3 07:25:35 1995 From: cme at TIS.COM (Carl Ellison) Date: Tue, 3 Oct 95 07:25:35 PDT Subject: Certificate proposal In-Reply-To: <199510022148.OAA26396@ix7.ix.netcom.com> Message-ID: <9510031421.AA18121@tis.com> -----BEGIN PGP SIGNED MESSAGE----- >Date: Mon, 02 Oct 1995 14:48:26 -0700 >From: Bill Stewart > >1) X.509 explicitly addresses Certificate Revocation Lists, though it > isn't real precise about how they should be distributed, and the > hierarchical approach isn't necessarily the best. (Maybe put the > location of the preferred CRL for a key certificate in the cert itself?) The whole issue of CRLs is on shaky ground with me. I think it's gotten lost in debates about how to distribute them offline (or perhaps via e-mail) and have them work. CRLs are like the old credit card or check stop lists which used to be at every supermarket checkout station. They aren't there any more. Checkout stations are now on-line. I see nothing wrong with having a "certificate" which says ``certificate available online only at xxx at yyy.zzz''. >3) Neither PGP nor X.509 (as documented in the RFC1422 and PKCS#6) have any > mechanism for additional information other than cramming it into > the username, but supposedly X.509 Version 3 includes something? Yup -- and it's ugly. It counts on a defined OBJECT ID to define the attribute. That means that if you want to say something about a person ("Boy, she's good looking!") you need to get someone tied to the OBJID hierarchy to issue you a number. If that number is low enough in the tree, (is long enough), then you have the problem that no one knows what it means. For that matter, even numbers high in the tree are unknown to me. I've never seen a dictionary of OBJECT IDs. >Binding a key to a text-string usually representing a person does give you >the slack to use other mechanisms rather than wait for the release of >/standard-name="Attribute Semantics Notation"/version=32769/ORG="International >Slowness >Organization"/Country=none/reliability=ExtremelyHighTrustUsThisTime/versionh >istory= Clearly. One should never wait for ISO. In fact, ISO should probably be ignored from now on. (Have you seen on-line Dilbert today?) but back to the question: the slack to use other mechanisms is the weak link I was talking about. You are building a chain from attribute or permission or authorization over to a person where one link (certificate) is a steel link and the other (binding to person) is mercerized cotton. If you want to strengthen the second link, you have to do things like the national ID card -- or restrict the second link to corporate use (the current approach) -- or otherwise regiment the human body in physical space. By chaining directly from key to authorization, the human can be anonymous in physical space while still being known in cyberspace. The thing to avoid is the following: >Make a determination in your own mind whether this key actually >belongs to the person whom you think it belongs to, based on available >evidence. If you think it does, then based on your estimate of >that person's integrity and competence in key management, answer >the following question: The only way to make that determination is to look at the text string and the list of other people who have signed it -- to see if I think they might know a different Bill Stewart from the person I know. But then, since I don't know Bill Stewart at all (except by postings), that's irrelevant to me. Therefore, I can not meet that test. However, there is no reason for me to reject your key as invalid. What's invalid is the assumption that there must be a relationship (or even a person) in physical space *before* one can have a relationship (or a person) in cyberspace. >For now, there do seem to be some kinds of attributes that would benefit from >better representations than a human-name plus free-form text, such as >"which application does the user want you to use this key for?" "how much >should I >trust the user's desire to have me use that key for that application?" >"how do I get this key's owner to give me money?" "does the key-holder >have the authority to speak for a given organization/human/bank account?" I prefer text. I didn't say it had to be free form -- only that it had to include free form so that I could say, from one human to another, something which no one had anticipated and sign that. If you want a machine to read it, you can use SMTP-style "tag: value". The idea that machine readability requires binary transfer and/or ASN.1 encoding (e.g., OBJECT IDs) is ludicrous. >If you look at Verisign's DNs, or the text in my PGP keys, you'll see various >ugly attempts at this. I looked at your keys, just now, and see a whole bunch of keys but no statements like: "this person is allowed to withdraw money from bank account 017123 of xxx" or "this person is a trusted co-conspirator in the group called Cypherpunks" or anything else useful to me. I tried adding an informative UserID to my key on the MIT server -- and it came out as my primary ID. ...big mistake.. >And then there's "WHICH person named Bill Stewart does this key belong to?" Exactly. Back to my point: the fact that you're named ``Bill Stewart'' and are a person is probably important to you -- but if I'm accepting your e-check, I don't give a damn about either. What I care about is whether the signature on the e-check (ie., the public key) is certified by the bank. In checking that authorization (attribute), I don't need to refer to a person's name. That's an irrelevant step in the process, brought on by the way X.509 and PGP both define certificates. >For the latter, I'm interested in solutions other than "Social Security Number", >"Citizen-Unit Nationalized ID Card Number", etc. Amen! - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHFF/lQXJENzYr45AQEMwQP8Dw1yd4vHzYGY57FpwWlWxquJLHsS3LrJ tVYEEpCXu7/lGcHVd2o2KDeZHZy7r6qiQ7zo5eayFQlIkRPYjBmRzuvADwLisR7D NK7l6dFVY2fA+SAmLiMtwz2VzsByZGB8HYw3joc+erNfmAmjeOLyVeg5pTaP9Rnu /Xb2SWE4d14= =WVyj -----END PGP SIGNATURE----- From tomw at orac.engr.sgi.com Tue Oct 3 07:38:58 1995 From: tomw at orac.engr.sgi.com (Tom Weinstein) Date: Tue, 3 Oct 95 07:38:58 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: Message-ID: <199510031438.HAA06918@orac.engr.sgi.com> In article , Ray Cromwell writes: > C'punks, > I just got back from a vacation in Raleigh, and downloaded the > new "fixed" Netscape 1.12. It took me about an hour, but I've > discovered another bug and potential security hole. This one relates > to mailto:. > The bug is as follows. Create a HTML file with a hyperlink containing > the following URL > foo > This bug doesn't seem to crash Netscape, instead, it crashes my XServer > as soon as the mail window pops op. I'm too tired right now to try to > analyze it, but it might be another stack bug, this time, in the X > libraries because Netscape isn't doing any sanity checking. This is a bug in your X server, not in netscape. The X server should never crash no matter what you send to it. > I need help testing this bug on other platforms. I have created > a test page. Go to http://www.gl.umbc.edu/~rcromw1/crash.html > to test. This doesn't crash my X server (SGI Irix 6.2), so it's probably specific to XAccel. -- Sure we spend a lot of money, but that doesn't mean | Tom Weinstein we *do* anything. -- Washington DC motto | tomw at engr.sgi.com From rjc at clark.net Tue Oct 3 07:39:36 1995 From: rjc at clark.net (Ray Cromwell) Date: Tue, 3 Oct 95 07:39:36 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <9510031355.AA18290@fugazi.imonics.com> Message-ID: <199510031439.KAA13026@clark.net> > > Well, I'm still in Raleigh :-) but this doesn't do much of anything > to my Macintosh, Netscape 1.1N, under System 7.5. Looks like a bug > in your X server. However, Netscape 1.1N for Solaris, running under > X11R6 X server, dumps core fairly quickly. I haven't had a chance > to try out the 1.12 version on UNIX or Mac, but the 1.22 32-bit > Windoze version handles it fine under NT 3.5.1. Could someone try this on Solaris using 1.12? -Ray From rsalz at osf.org Tue Oct 3 07:44:55 1995 From: rsalz at osf.org (Rich Salz) Date: Tue, 3 Oct 95 07:44:55 PDT Subject: CISS TSP MISSI Message-ID: <9510031443.AA11367@sulphur.osf.org> I don't know which is more annoying: The silly 3/4K of Comments that the freezone remailer puts out. (The use constraints are useless to email recipients, after all); or That some anonymous bozo is posting open WWW data to cypherpunks. I hope that the first, at least, can be fixed. Avoid clutter; note the reply-to. /r$ From nobody at REPLAY.COM Tue Oct 3 07:53:59 1995 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Oct 95 07:53:59 PDT Subject: economic espionage (@#$%^&*) (fwd) Message-ID: <199510031453.PAA12535@utopia.hacktic.nl> NY Times, Oct 3, 1995, Business Employment Ad. 1984 Sarajevo, Olympics; 1995 Sarajevo, Battleground Every day in our world, new threats, new challenges, new missions emerge. The people of the Central Intelligence Agency are dedicated to meeting the missions of the day, providing information and resources that aid decision makers in solving the problems and responding to issues that affect us all. You can play an integral role in our mission, while advancing your own career. The Central Intelligence Agency is currently seeking professional men and women who will be comfortable living and working abroad. These positions entail extended overseas assignments in various parts of the world. Previous service in long-term foreign assignments, in either business or government positions, is a definite advantage. Changing international economic, political and social conditions make a broad range of professional backgrounds suitable for these positions. Your experience may be in economics finance, marketing, or general business. Scientific or technical experience in engineering disciplines, physical sclences, biological sciences, or any area of high technology research and development is of particular interest. These overseas positions require more than appropriate professional experience. Successful candidates must also demonstrate a high degree of individual initiative, self reliance and personal integrity. Naturally, the ability to speak or learn a foreign language is expected along with above average communications skills, both oral and written. A Bachelor's degree is a minimum requirement. Advanced degree or military service is a plus. All applicants must successfully complete a thorough medical and psychiatric exam, a polygraph interview, and an extensive background investigation. U.S. citizenship, or eligibility for citizenship, is required. CIA encourages applications from men and women of every racial and ethnic background from all parts of the nation -- we represent America and we want to be representative of America. We will respond within 30 days if your application is evaluated as being of interest. Central Intelligence Agency Dept. 15FS P.O. Box 12002 Arlington, VA 22209-8727 Fax: 703-482-7395 CIA is an equal opportunity employer [CIA eagle-headed all-points shield logo] [Motto] Meet the Challenge of a Changing World ----- From cme at TIS.COM Tue Oct 3 07:57:18 1995 From: cme at TIS.COM (Carl Ellison) Date: Tue, 3 Oct 95 07:57:18 PDT Subject: De Re ASN.1 and encoding rules ( was Re: X.509,...) In-Reply-To: Message-ID: <9510031453.AA22371@tis.com> (my friend Tom is cc:'d as the Multics expert, re: the ref below) -----BEGIN PGP SIGNED MESSAGE----- >Date: Mon, 2 Oct 1995 17:13:21 -0700 (PDT) >From: Simon Spero >Lets use 3DES as our example. We'll start with a naive specification: [etc.] You're starting down the same road I did in writing my example of how ASN.1 seduces you into bad design. ..very good, but you stopped short. [The PER sounds much better than BER -- but I've never seen PER before. I learned enough about ASN.1 to have decided it is a lost cause -- far easier to let ASN.1 advocates talk to themselves while I go off to do something independent and good.] Back to the example. >-- >LongLong ::= OCTET STRING (SIZE(8)) -- a long long is 8 bytes, er, long Really? There is an OCTET STRING (SIZE(8)) and you can make it a datatype? I suppose you can make an OCTET STRING (SIZE(9)) too? That can be really convenient. You can have a tagged quantity (using the top byte). Alternatively, someone could define: DesKey ::= SEQUENCE { encr BIT STRING (SIZE(1)), -- encrypt mode if 1, decrypt if 0 value OCTET STRING (SIZE(8)) } and now you can use DesKey as your data type with no bad effects and only good ones (as far as the ASN.1 user is concerned). Of course, the code to pack/unpack just exploded. So did the packet size (maybe, depending on effort spent in pack/unpack) and so did the internal struct, probably. [Truth in advertising: the example above is adapted from early Multics where PL/I allowed you to do such nonsense and some programmer saw the power of it -- so he used it in the file system, until he got caught.] Lesson from this: there is a reason not to give a designer generality you would not use in an actual implementation. Anyway -- my example of ASN.1 abuse is along these lines but I won't reproduce it here. We can leave this as a parlor game for computer geeks. :-) >Here's the new definitions: > >-- >Long ::= OCTET STRING (SIZE(4)) > >ThreeDes ::=SEQUENCE { > IV SEQUENCE OF (SIZE(1..2) LONG, > Key1 DesKey, > Key2 DesKey OPTIONAL, > Key3 DesKey OPTIONAL >} See -- ASN.1 is powerful in its seductiveness. Even though you were trying to convince me that it can be the same as my primitive example (and therefore just as efficient), you couldn't resist using the power of the generality to elaborate on the structure. This is not a good feature of ASN.1. This is its primary fault. This is why I call it a work of Satan. (BER/DER helps in that evaluation, of course). >To be continued... (unless I get flamed off the list) As I said, this could be a wonderful parlor game -- or list topic, if people want to waste the time. Think of it as the Crossword Puzzle page of the cypherpunks on-line newspaper. :-) - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHFNJFQXJENzYr45AQFV2AP9H1/A5bY4H8C/Ms3dhHIPOWiLCYhqLzFR qKdvQaBYvPDCrr8jXLwQhTogvzu/9gkZ2DwnXVya7MxEpyy+1A5WrO3Jlqu+6Euy bBcl1idhoomMzmzOga/F7YasXsFkoZoSqNYQKX/ZKcFvEuDGrzohlBNV5ubDEL7G E3hdsak0f2Y= =cjU/ -----END PGP SIGNATURE----- From hallam at w3.org Tue Oct 3 08:05:29 1995 From: hallam at w3.org (hallam at w3.org) Date: Tue, 3 Oct 95 08:05:29 PDT Subject: Simple Hardware RNG Idea In-Reply-To: Message-ID: <9510031505.AA11622@zorch.w3.org> >What about a beam of high intensity ionising radiation aimed at the >detector? Since we're dealing with lo intensity sources, this could force >the RNG into a small part of its range. Beware of black helicopters >carrying cyclotrons :-) Thermal noise is a much less hazardous mechanism. Ionising radiation is a pain to deal with, it is something one generally attempts to get rid of in a fabrication process if possible. Environmental radiation is a strong polluting source. There are plenty of other quantum phenomena which can be tapped. Essentially all one needs to do is to build a very high gain amplifier "baddly". The main difficulty is removing bias. One can either go through filtering hohaa or use say MD5. The trully paranoid could Xor together an odd number of MD5 samples just in case there were bit pattern dependencies. Phill From schampeo at imonics.com Tue Oct 3 08:22:11 1995 From: schampeo at imonics.com (Steven Champeon - Imonics Development) Date: Tue, 3 Oct 95 08:22:11 PDT Subject: New Netscape bug (in version 1.12) Message-ID: <9510031521.AA18707@fugazi.imonics.com> | From owner-cypherpunks at toad.com Tue Oct 3 11:07:33 1995 | Subject: Re: New Netscape bug (in version 1.12) | Cc: rjc at clark.net, cypherpunks at toad.com | X-Mailer: ELM [version 2.4 PL24alpha3] | Content-Transfer-Encoding: 8bit | Sender: owner-cypherpunks at toad.com Ray wrote, in reply to my message: | > | > Well, I'm still in Raleigh :-) but this doesn't do much of anything | > to my Macintosh, Netscape 1.1N, under System 7.5. Looks like a bug | > in your X server. However, Netscape 1.1N for Solaris, running under | > X11R6 X server, dumps core fairly quickly. I haven't had a chance | > to try out the 1.12 version on UNIX or Mac, but the 1.22 32-bit | > Windoze version handles it fine under NT 3.5.1. | | Could someone try this on Solaris using 1.12? Just tried it, with two different mailhosts - the first gave the following error: An error occurred sending mail: The "To:" header was invalid. Please check the email address(es) and try again. The second accepted the mail. (?) Neither caused it to core dump, under the X11R6 X server, Solaris 2.4, running Openwindows. Cheers, Steve -- Steven Champeon (919) 469-7833 Technical Lead, schampeo at imonics.com Imonics Web Services webmaster at imonics.com From andrewr at vironix.co.za Tue Oct 3 08:40:03 1995 From: andrewr at vironix.co.za (Andrew Roos) Date: Tue, 3 Oct 95 08:40:03 PDT Subject: STT Authentication Message-ID: <9510031738.aa13031@herman.vironix.co.za> Hi All Ramblings from a disturbed mind... I've had a look at Microsoft's Secure Transaction Technology (STT) protocol. The purchase order/authorization/receipt phase is authenticated using the card holder's credential ("cred", in MS speak). The credential is similar to a certificate except the binding is between a credit card and a public key, rather than between an identity and a public key. What interests me is the procedure for issuing cred's to cardholders. If I'm reading the spec right, this is done in response to a "Cardholder Credential Request" message which includes card details and the public keys to be associated with the card. This data, along with a SHA hash of the data, is encrypted and sent to the issuing bank, which then responds with a "Cardholder Credential Response" containing the signature and key-exchange creds, also encrypted. However there does not appear to be any authentication whatsoever on the credential request message, presumably becuase the cardholder does not have a published public key at the time when this message is issued. It may be that authentication is out-of-band - e.g. the bank may phone the registered owner of the card # before issuing a cred response message - but there is no mention of this in the spec. If there isn't OOB authentication, then this is a major hole in the protocol, since anyone who knew a credit card no, name and expiry date could request a cred for that card, and then go shopping... If someone will just tell me what I'm missing (because this is too obviously f'd up for even Uncle Bill) then I'll go sit on top of my mountain again and hum softly to myself. Andrew BTW, same apears to be true for Merchant creds. ________________________________________________________________ Andrew Roos // C++ programmers have class (but not much inheritance) PGP Fingerprint: F6 D4 04 6E 4E 16 80 59 3A F2 27 94 8B 9F 40 26 Full key: ftp.vironix.co.za/PGP-keys/AndrewRoos (or key servers) From mrami at mramirez.sy.yale.edu Tue Oct 3 09:20:11 1995 From: mrami at mramirez.sy.yale.edu (Marc Ramirez) Date: Tue, 3 Oct 95 09:20:11 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510030840.BAA04677@infinity.c2.org> Message-ID: On Tue, 3 Oct 1995, sameer wrote: > Doesn't crash on SunOS 4.1.3_U1 running X11R6. Nor does it crash FreeBSD 2.1-STABLE w/ X11R6 > > I need help testing this bug on other platforms. I have created > > a test page. Go to http://www.gl.umbc.edu/~rcromw1/crash.html > > to test. > > -- > sameer Voice: 510-601-9777 > Community ConneXion FAX: 510-601-9734 > An Internet Privacy Provider Dialin: 510-658-6376 > http://www.c2.org (or login as "guest") sameer at c2.org > From aleph1 at dfw.net Tue Oct 3 09:48:32 1995 From: aleph1 at dfw.net (Aleph One) Date: Tue, 3 Oct 95 09:48:32 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510030836.EAA09080@clark.net> Message-ID: This bug does not crash Netscape 1.1S running on an SGI. Aleph One / aleph1 at dfw.net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01 On Tue, 3 Oct 1995, Ray Cromwell wrote: > Date: Tue, 3 Oct 1995 04:36:44 -0400 (EDT) > From: Ray Cromwell > To: cypherpunks at toad.com > Subject: New Netscape bug (in version 1.12) > > > C'punks, > I just got back from a vacation in Raleigh, and downloaded the > new "fixed" Netscape 1.12. It took me about an hour, but I've > discovered another bug and potential security hole. This one relates > to mailto:. > > The bug is as follows. Create a HTML file with a hyperlink containing > the following URL > > foo > > This bug doesn't seem to crash Netscape, instead, it crashes my XServer > as soon as the mail window pops op. I'm too tired right now to try to > analyze it, but it might be another stack bug, this time, in the X > libraries because Netscape isn't doing any sanity checking. > > I need help testing this bug on other platforms. I have created > a test page. Go to http://www.gl.umbc.edu/~rcromw1/crash.html > to test. > > I have also found 2 other bugs that cause stack trashing in v1.1 > however, they are random and I haven't been able to isolate them > completely yet. (I have created a page on my system, such that if you > visit it, after you visit about 3 more pages, it crashes) > > What's my point in pursuing this? Netscape's browser is a piece of > software that runs on millions of computers and in effect, allows > outside agents to input arbitrary data into that software. As such, > it is unlike most applications made. Sure, Microsoft Word may have bugs, > but how many people are downloading hundreds of MS Word documents > everyday and viewing them? Users of Web browsers are exposing themselves > like this everyday, and so I think, that web browsers must have higher > standards of robustness. > > > I think Netscape represents an enormous risk to computer security, > and while I think they are heading in the right direction, there are > some very basic implementation issues they need to clear up which are > orthogonal to SSL and credit card transactions. All the cryptography > in the world won't help you if someone can subvert your cryptobox. > Netscape needs to do some serious quality assurance work. I've never > been a QA person in my life, but within a few minutes, I have been > able to find serious bugs in the software. And while I'm sure > Netscape's coders are fine people, proof reading your own code, > code that you look at everyday, becomes rather hard because you > tend to "see through it". (just like proof reading essays, or messages) > I think Netscape should hire some outside firm/group to review their > code under non-disclosure for potential implementation holes. > > -Ray Cromwell > P.S. I am running Netscape v1.12 under BSDI2.0 and the XAccel/2.0 server > > > > > > From patrick at Verity.COM Tue Oct 3 10:00:06 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Tue, 3 Oct 95 10:00:06 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) Message-ID: <9510031656.AA00760@cantina.verity.com> > > I've been thinking about this recently for obvious reasons. My concern > is that if someone can attack your download of netscape, they could also > attack your download of the program that validates netscape. Is there > really any way out of this one? > > --Jeff I remember sometime in the last couple of years seeing a cert advisory that said that people's checksumming programs were being replaced by ones that did the normal checksumming except on compromised programs. This was part of one particular attack as I remember. Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From dl at hplyot.obspm.fr Tue Oct 3 10:20:40 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Tue, 3 Oct 95 10:20:40 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) In-Reply-To: <9510030147.AA15570@dmsd.com> Message-ID: <9510031719.AA12326@hplyot.obspm.fr> Jeff Weinstein writes: > In article <9510030248.AA08909 at hplyot.obspm.fr>, dl at hplyot.obspm.fr (Laurent Demailly) writes: > > I asked monthes ago netscape folks to make md5sum and/or PGP digital > > signatures (preferably md5sum of each files, this in a file, itself > > pgp signed) of the binaries available on their page and on relevant > > newsgroup to reduce possibility of tempering. [...] > I've been thinking about this recently for obvious reasons. My concern > is that if someone can attack your download of netscape, they could also > attack your download of the program that validates netscape. Is there > really any way out of this one? I have *already* downloaded, checked,... pgp years ago, and I did multiplatforms cross tests,... so all I need is a pgp signed stuff (obviously i need your (netscape's) pgp public key too, but I think that a "massive" distribution, that is : mail on a couple of mailing lists, your site, newsgroup, eventually adding fingerprint by phone for the paranoid, would ensure that your key is indeed your key (it can probably take few weeks before it's "sure" (you'll get feedback if key have been tempered somehow) Or easiest even manage that your key is signed by some well known folk (PhilZ,...)) See my point ? ps :imo the later your start, the harder it'll be to be "sure" of something. (reputation of a key takes some weeks/monthes,...) dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept $400 million in gold Legion of Doom mururoa assassination break Peking Delta Force From stewarts at ix.netcom.com Tue Oct 3 11:37:47 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Tue, 3 Oct 95 11:37:47 PDT Subject: Certificate proposal Message-ID: <199510031838.LAA27571@ix2.ix.netcom.com> At 10:21 AM 10/3/95 EDT, Carl Ellison wrote: >The whole issue of CRLs is on shaky ground with me. I think it's gotten >lost in debates about how to distribute them offline (or perhaps via >e-mail) and have them work. No surprise; it's a tough job. I don't expect my laptop to be continuously on-line when I'm reading mail, and even on-line use needs to be more realistic than saying "Everybody must use X.400". >CRLs are like the old credit card or check stop lists which used to be at >every supermarket checkout station. They aren't there any more. >Checkout stations are now on-line. >I see nothing wrong with having a "certificate" which says ``certificate >available online only at xxx at yyy.zzz''. Interesting. Aside from the excessive cost of looking up cards in paper booklets, which can be avoided by having checkstands validate on the store's backroom computer system, on-line verification lets the card company not only refuse stolen cards, but also dynamically refuse cards that have reached their credit limits, which you can't do on a slow push-based offline system. However, it's _very_ tough to spoof a credit-card verification system, because the checkout device uses phones or private networks to reach the authorization company, so the response that comes back saying yes/no/stolen can be real dumb. On the internet, the response needs to be signed, though I suppose it could say "Key sssss at xxx at yyy.zzz authorized key uuuuu today yyyy/mm/dd/hh:mm:ss, valid for up to $500", and you'd then have to validate the key that signed it, etc.... On the other hand, you could have the cert require multiple confirmations, e.g. both the bank and the user have to authorize this use. >>3) Neither PGP nor X.509 (as documented in the RFC1422 and PKCS#6) have any >> mechanism for additional information other than cramming it into >> the username, but supposedly X.509 Version 3 includes something? >Yup -- and it's ugly. It counts on a defined OBJECT ID to define the OBJECT IDs solve two problems - one is that you need some kind of format (yuk), but the other is that fields to have mutually agreed on values to be meaningful, and central registration is an easy way to implement it, as long as there's a simple way to register things. I hope it at least supports an OBJECTID with parameters, e.g. "CreditLimitUSDollarsBankFoo integer" rather than needing excessively many OBJECTIDs "CreditLimit3700USDollarsBankFoo"? As you say below, there's certainly no need to use ASN.1 formats instead of readable ones... > What's invalid is the assumption that >there must be a relationship (or even a person) in physical space *before* >one can have a relationship (or a person) in cyberspace. Yeah. I've decided, as an experiment, to start signing keys for pseudonyms, though I haven't settled on how to deal with unauthenticated signatures for realspace people (in the one case where I've been asked, the person didn't have any independent signatures from other people, so so far I've declined, but I may re-evaluate and just do uniqueness.) #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From cme at TIS.COM Tue Oct 3 12:24:19 1995 From: cme at TIS.COM (Carl Ellison) Date: Tue, 3 Oct 95 12:24:19 PDT Subject: X.509, S/MIME, and evolution of PGP In-Reply-To: <199510031837.LAA27564@ix2.ix.netcom.com> Message-ID: <9510031915.AA13386@tis.com> -----BEGIN PGP SIGNED MESSAGE----- >Date: Tue, 03 Oct 1995 11:37:22 -0700 >From: Bill Stewart >At 10:24 AM 10/3/95 EDT, Carl Ellison wrote: >>I hear you but I object. >>Going along with the majority may be the fastest way to get a result out >>but it's morally wrong. > >A zillion and a half people are about to get the next version of Netscape, >which uses X.509 certificates, and they can get free Verisign personna >certificates to go with them; stores can get inexpensive ones. >They will use this for secure email, like it or not, >and as they discover the need for better certification (when there's >money involved), they'll go get it. Wherever they can. Yup. Verisign is probably going to fight hard to keep their certificate model. On top of them, there's the US Postal Service and a few others, fighting over the chance to set up a certificate hierarchy. The whole world is thinking of physical people and of tying things to those people. They think of names as the only handle on (pointer to) people. ...so they see certificates as right and proper. We need to show them a better way. (Tie attributes through the key to the person -- not through the person to the key.) >The question is, will they get a Web of Trust model from us, >or will they stick to the hierarchical model? As several have pointed out, a certificate structure (X.509, PGP or mine) can be used in a hierarchy, if you want it, or not if you don't. We don't care. What I care about is that a signed thing (one link in a chain of assertions) speak directly to what it is signing ("this key is good for _________") or ("the person who demonstrated to me that he knew the private key for this key has red hair and wore glasses") -- rather than try to sidle up to existing people structures (by tying to names of people) and then, on discovering that the people-structures aren't as strong as the digital signatures, make the people structures stronger (e.g., by unique ID number on a national ID card, with thumbprints for verification). > If we get something >halfway decent out there, fast enough, ideally with support >or toleration from Netscape, people will at least have distributed trust >models in their worldview, and will insist that the tools they use and >build around it be compatible. Otherwise, almost all of them _will_ be >using the hierarchical-only structure, and the next big Internet application >that >needs security will latch onto the now-big software base, and may not >be as decent as Netscape about the trust models they accept. Yes -- I agree. We should get cracking on this. >If you can define a better relational trust model than the Web stuff, >fast enough to avoid this, great! Go for it. But it'll be much easier >to get something like that adopted in a non-hierarchical world than in >a world of Drivers' Licenses on the Information Superhypeway. I'm still talking web of trust -- only I'm removing the person's name (or e-mail address) as a link between the assertion and the key. Haven't I described this well enough? Do I need to write it up in more detail? How about some analogies? I could have a driver's license (giving my name and address), a piece of paper saying that I (at my address) own bank account number 01732 at First Security Bank, and a certificate from Verisign also giving my name and address. This ties my public key to my driver's license (assuming I'm the only Carl Ellison at my address (which I wasn't, as a kid) and that I don't move). Alternatively, I can have First Security Bank open account 01732 for me and create a certificate binding my public key to that account number. Now, I can use that key to sign anonymous checks. (The bank knows me, perhaps, but the payee doesn't need to.) To tie my name to the public key, I sign my own certificate saying ``The person who knows the private key for 61E2DE7FCB9D7984E9C8048BA63221A2 goes by the name "Carl Ellison" and receives mail at "cme at acm.org".'' I don't need anyone else to attest to the validity of that statement because it's uni-directional (from key to my name), not the other way. It's only the other assertion direction which requires some witnesses to attest to validity, because the name is not capable of doing a digital signature without a key. [That is, if you were to go the other direction (which is what X.509 or PGP try to do), you need to sign a key with a name (DN or UserID). You can't sign with a DN or UserID. You can sign with a key. So, you have to fall back on human witnesses to use their keys to sign in place of the name (DN or UserID) and you have to decide how to trust those witnesses. If you reverse the arrow of assertion, this particular problem goes away.] - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHGLpVQXJENzYr45AQFS2QQAidMwZMBbv2ap2S4ZNVIWfZO6/W1FHOaw GZYHQk38o0qD5YOrth1Hab2IiyuvLtBG38hHJ8aZf3NsvzswSvNExuBQy+eLns8m ZcM2B4qPMRWOP1XMmAPaoaknRTmonKP/acO4KcKIR0K+x+n1DNwTwyDx4LbRjOnn hHp3fFfD7iI= =Fccl -----END PGP SIGNATURE----- From cme at TIS.COM Tue Oct 3 12:44:41 1995 From: cme at TIS.COM (Carl Ellison) Date: Tue, 3 Oct 95 12:44:41 PDT Subject: Certificate proposal In-Reply-To: <199510031838.LAA27571@ix2.ix.netcom.com> Message-ID: <9510031923.AA14118@tis.com> -----BEGIN PGP SIGNED MESSAGE----- >Date: Tue, 03 Oct 1995 11:37:26 -0700 >From: Bill Stewart >However, it's _very_ tough to spoof a credit-card verification system, >because the checkout device uses phones or private networks to reach the >authorization company, so the response that comes back saying yes/no/stolen >can be real dumb. On the internet, the response needs to be signed, >though I suppose it could say "Key sssss at xxx at yyy.zzz authorized >key uuuuu today yyyy/mm/dd/hh:mm:ss, valid for up to $500", and you'd then have >to validate the key that signed it, etc.... On the other hand, you could >have the cert require multiple confirmations, e.g. both the bank and the >user have to authorize this use. The response does *not* need to be signed. If you want rock solid authentication which you can save for later use in court (e.g., buying an airplane?), you might insist on a digital signature. However, all you need is for the path from the person who knows (AmEx's computer) to your cash register to be trusted. There are lots of ways to establish trust. E.g., you could encrypt the path with a session key (triple-DES) chosen by the cash register and sent at the beginning of the day to AmEx using AmEx's public key. Now anything coming back under that symmetric key is effectively authenticated. >>>3) Neither PGP nor X.509 (as documented in the RFC1422 and PKCS#6) have any >>> mechanism for additional information other than cramming it into >>> the username, but supposedly X.509 Version 3 includes something? >>Yup -- and it's ugly. It counts on a defined OBJECT ID to define the > >OBJECT IDs solve two problems - one is that you need some kind of format (yuk), >but the other is that fields to have mutually agreed on values to be meaningful, >and central registration is an easy way to implement it, as long as there's >a simple way to register things. I hope it at least supports an OBJECTID >with parameters, e.g. "CreditLimitUSDollarsBankFoo integer" rather than needing >excessively many OBJECTIDs "CreditLimit3700USDollarsBankFoo"? As you say below, >there's certainly no need to use ASN.1 formats instead of readable ones... OBJECT IDs are by no means even a sensible way to achieve this end. SMTP's tags work very nicely, thank you, and they allow people to define their own for private-joke extensions to the protocol. (I did just that for e-mail access to the TIS DRC.) - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHGNYlQXJENzYr45AQH8AgQArY71q84bEuPsVRa4Po5ZcHLMoV7yFszX tZBqokbZ0F9ZFh7USHyynlx/J82yzBRdks680p5j6lXbQ4wbr5xSZQNDEzS+FVNq +IObzc+c1qv1nSvb6gcJP6wRNfEMk64bSqprG8sYcN2edD5ksDHFECOGCdxnN4Iy TWT/rpwOYr0= =UsEv -----END PGP SIGNATURE----- From pfarrell at netcom.com Tue Oct 3 13:24:28 1995 From: pfarrell at netcom.com (Pat Farrell) Date: Tue, 3 Oct 95 13:24:28 PDT Subject: Oct 14 DC-area physical meeting Message-ID: <199510032024.NAA29838@netcom3.netcom.com> Sorry to send this to 800+ folks, this is the only announcement I'll send this month. The October DC-area cypherpunks meeting will be on Saturday, Oct. 14 at 3:00 PM at the Digital Express offices in Laurel. For more information (directions, agenda, etc.), please see url: http://www.isse.gmu.edu/~pfarrell/dccp/index.html Additional agenda topics solicited! Thanks Pat Pat Farrell grad student http://www.isse.gmu.edu/students/pfarrell Infor. Systems and Software Engineering, George Mason University, Fairfax, VA PGP key available via finger or request #include standard.disclaimer From rah at shipwright.com Tue Oct 3 13:33:03 1995 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 3 Oct 95 13:33:03 PDT Subject: (fwd) ETO TENDER Message-ID: --- begin forwarded text Date: Tue, 3 Oct 95 09:14:04 -0400 From: "GORD JENKINS" X-Minuet-Version: Minuet1.0_Beta_14.1 Reply-To: X-Popmail-Charset: English To: www-buyinfo at allegra.att.com, untpdc at urgento.gse.rmit.EDU.AU Subject: ETO TENDER For List: Ref UN Trade Point ------------------ Attached is an alternative to the use of electronic brokers who charge per transaction. This sevice is free and very well organized. Check out the UNCTAD Trade Point Web site at: http://www.unicc.org/untpcd Gordon Jenkins Emailjenkins at fox.nstn.ca URL : http://www.infop.com/karoma ----- Forwarded message begins here ----- From: UNTPDC Thu, 28 Sep 1995 11:47:45 +1000 (EST) To: ETO gateway Subject: ETO TENDER TO : ETO ASSOCIATES - TRADE POINTS FROM : Carlos Moreira Head United Nations Trade Point Development Centre UNCTAD Subject : ETO Tenders Dear ETO users, we are introducing a new service to the ETO systems which relates to international tenders. The service ETO Tender is also free and we will disseminate the information via email. The tender data is always free text so we will not codify the information. Please send us your national tenders so we can increase the number of tenders on-line. With my best regards Carlos Moreira ETO TENDER Japan FOREIGN GOVERNMENT TENDER Description: S16 CONSTRUCTION Comments: PRODUCT DATA A. INDUSTRY SECTOR CODE: B. DETAILED PRODUCT DESCRIPTION: CONSTRUCTION TITLE: PRELIMINARY DESIGN OF THE KOYA JUNCTION BRIDGES; SUMMARY: PRELIMINARY DESIGN OF BRIDGES FOR GENERAL AND EXCLUSIVE USE AT THE KOYA JUNCTION (TENTATIVE NAME); DELIVERY DATE: MARCH 25, 1996. C. PRODUCT SPECIFICATIONS/TECHNICAL DATA: N/A (NOT AVAILABLE) D. QUANTITY: N/A E. U.S. DOLLAR VALUE: N/A F. OTHER INFORMATION: N/A RESPONSE DATA A. RESPONSE LANGUAGE: JAPANESE. B. BEST WAY TO RESPOND: LETTER. C. FROM MANUFACTURERS ONLY: N/A D. INFORMATION DESIRED FROM U.S. FIRM: N/A E. PRIMARY BUYING FACTOR: N/A F. OTHER INFORMATION: INTERESTED FIRMS MUST SUBMIT THEIR EXPRESSION OF INTEREST IN THIS DESIGN COMPETITION BY 17:00 PM, SEP. 29. THE PROSPECTUS MUST BE OBTAINED DIRECTLY FROM THE PROCURING AGENCY, NOT FROM U.S. EMBASSY. TENDER LEAD DATA A. ISSUING AGENCY: METROPOLITAN NATIONAL HIGHWAY WORK OFFICE, KANTO REGIONAL CONSTRUCTION BUREAU B. FINANCING AGENCY: SAME AS ABOVE. C. PRICE OF PROSPECTUS: N/A D. OBTAIN PROSPECTUS BY: OCT. 23, 1995. E. TENDER NUMBER REQUIRED IN ALL COMMUNICATIONS: N/A F. PERFORMANCE BONDS REQUIRED: N/A G. CLOSED PROCUREMENT PROCEDURE: NO. H. BIDDING PROCEDURES: SELECTIVE TENDER. I. PROPOSAL DEADLINE: 17:00 PM, OCT. 24, 1995. J. OTHER INFORMATION: "KENSETSU KOGYO SHIMBUN": 9/19/95. CRITERIA FOR QUALIFICATION, SELECTION, AND SCREENING: 1) QUALIFICATION CRITERIA FOR PARTICIPANTS: FIRMS PRE- QUALIFIED FOR OPEN COMPETITIVE OR SELECTIVE BIDDING ON CIVIL ENGINEERING CONSULTING WORK BY THE KANTO REGIONAL CONSTRUCTION BUREAU; 2) SELECTION CRITERIA FOR PARTICIPANTS: A) RECORDS OF SAME TYPE OR SIMILAR WORK; B) CONDITIONS OF REGISTERED BUSINESS; C) AVAILABILITY OF SPECIALIZED ENGINEERS; D) QUALIFICATION, BACKGROUNDS, AND WORK INVOLVED OF ASSIGNED ENGINEERS; E) PLAN FOR SUBCONTRACTING; AND F) RELATIONS WITH CONTRACTORS; AND 3) SCREENING CRITERIA FOR DESIGN PROPOSALS: A) HISTORY OF COMPANY'S BUSINESS: RECORDS OF SAME TYPE OR SIMILAR WORK; AVAILABILITY OF SPECIALIZED ENGINEERS; B) EXPERIENCE AND ABILITY OF ENGINEERS: QUALIFICATION, EXPERIENCE, WORK INVOLVED, AND WORK RECORDS OF ASSIGNED ENGINEERS; AND C) PLAN OF ACTION AND ITS METHOD: LEVEL OF UNDERSTANDING OF PROSPECTUS; APPROPRIATENESS OF PLAN OF ACTION; ADEQUACY, ORIGINALITY, AND FEASIBILITY OF PROPOSAL; AND APPROPRIATENESS OF PROCESS AND MANPOWER PLAN. POST REMARKS: POST CONTACT/PREPARED BY: HAOMORI APPROVED BY: GTAEVS CONTACT: FIRST PLANNING AND DESIGN DIVISION, METROPOLITAN NATIONAL HIGHWAY WORK OFFICE, KANTO REGIONAL CONSTRUCTION BUREAU, MINISTRY OF CONSTRUCTION, 86 TAKEGAHANA, MATSUDO-SHI, CHIBA-KEN 271, JAPAN PHONE: 81/473/62-4115 FAX: N/A Please send a copy of your response to: COMMERCIAL OFFICER (FCS TOP) AMERICAN EMBASSY TOKYO UNIT 45004 APO AP 96337 Refer to TC606 ------ Forwarded message ends here ------ -- GORD JENKINS e maik JENKINS at fox.nstn.ca tel 613 794 6735 fax 613 723 8938 --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From tcmay at got.net Tue Oct 3 13:39:48 1995 From: tcmay at got.net (Timothy C. May) Date: Tue, 3 Oct 95 13:39:48 PDT Subject: Monkeywrenching Certificate Schemes Message-ID: At 7:15 PM 10/3/95, Carl Ellison wrote: >Yup. Verisign is probably going to fight hard to keep their certificate >model. On top of them, there's the US Postal Service and a few others, >fighting over the chance to set up a certificate hierarchy. Almost needless to say, there is nothing particularly wrong with certificate-granting agencies. A big caveat: Providing the process is fully voluntary. (I'm not addressing issues of implementation, of the "X.509" messinesses, etc.) The big danger I see in all this talk of "certificate authorities" is that it won't be a voluntary process. (The same themes as with key escrow.) I'm not suggesting we waste our time arguing against such certificate authorities. Rather, we might better spend our time finding ways to monkeywrench the proposals. I don't want either the "Postal Service" or "Verisign" given the authority to approve or disapprove my identity or any identity I may choose to adopt. Isn't it about time for SAIC to acquire Verisign? --Tim May (Identity Subject to Approval) ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From jsw at netscape.com Tue Oct 3 14:07:15 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Tue, 3 Oct 95 14:07:15 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) In-Reply-To: <9510030147.AA15570@dmsd.com> Message-ID: <9510031403.ZM151@tofuhut> On Oct 3, 6:19pm, Laurent Demailly wrote: > Subject: Re: Netscape finally issuing md5sums/pgp signed binaries ? (was R > > [ text/plain > Encoded with "quoted-printable" ] : Jeff Weinstein writes: > > In article <9510030248.AA08909 at hplyot.obspm.fr>, dl at hplyot.obspm.fr (Laurent Demailly) writes: > > > I asked monthes ago netscape folks to make md5sum and/or PGP digital > > > signatures (preferably md5sum of each files, this in a file, itself > > > pgp signed) of the binaries available on their page and on relevant > > > newsgroup to reduce possibility of tempering. > [...] > > I've been thinking about this recently for obvious reasons. My concern > > is that if someone can attack your download of netscape, they could also > > attack your download of the program that validates netscape. Is there > > really any way out of this one? > I have *already* downloaded, checked,... pgp years ago, and I did > multiplatforms cross tests,... so all I need is a pgp signed stuff > (obviously i need your (netscape's) pgp public key too, but I think > that a "massive" distribution, that is : mail on a couple of mailing > lists, your site, newsgroup, eventually adding fingerprint by phone > for the paranoid, would ensure that your key is indeed your key (it > can probably take few weeks before it's "sure" (you'll get feedback if > key have been tempered somehow) > Or easiest even manage that your key is signed by some well known folk > (PhilZ,...)) > > See my point ? Yes, I get the idea about spewing the signed hashes everywhere. The problem I have is with the user of PGP. That will help cypherpunks, but does absolutely nothing for most of our millions of users, who have no idea what PGP is. Perhaps its enough to assume that if anyone is tampering with the distribution, some cypherpunk will stumble across it... --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jgrubs at left.webcasters.com Tue Oct 3 14:31:31 1995 From: jgrubs at left.webcasters.com (Jim Grubs W8GRT) Date: Tue, 3 Oct 95 14:31:31 PDT Subject: Keyserver keyrings Message-ID: -----BEGIN PGP SIGNED MESSAGE----- The public keyrings at MIT and Uni-Hamburg haven't been updated since August. Does anyone know why? -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: LIBERTY!! Use it or lose it!! iQCVAwUBMHGqnN74r4kaz3mVAQEdjwP8DnOUAYZa4PqtiMprEaRtwnO2d2RvI2KW jPgeL/99bv/8DwlmbpE2+SYv6AXw4E+MQjPVSbxnpFlH/YuZaGEnJ4mMI6xnvD5X /vFaGI9B82YJ9aLx2MD8Lqu82dCPhk91ZxriyhPkAwfPhe8DfihPwtWaohTDygx5 Uwcifpl49eY= =9xkB -----END PGP SIGNATURE----- -- WebCasters(tm) James C. Grubs jgrubs at left.webcasters.com 6817 Maplewood Avenue Tel.: 419-882-2697 Sylvania, Oh 43560 Fax: 419-885-2814 Internet consulting, HTML programming, Information brokering From adam at homeport.org Tue Oct 3 15:59:08 1995 From: adam at homeport.org (Adam Shostack) Date: Tue, 3 Oct 95 15:59:08 PDT Subject: Keyserver keyrings In-Reply-To: Message-ID: <199510032302.TAA12302@homeport.org> | The public keyrings at MIT and Uni-Hamburg haven't been updated since August. | Does anyone know why? There are two servers at MIT, Brian LaMachia's (on swiss.ai?) and the one Derek set up on toxicwaste. The toxicwaste one is probably not being maintained becuase Derek has off and gotten a job, and theres no one to maintain it. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From roy at cybrspc.mn.org Tue Oct 3 16:13:31 1995 From: roy at cybrspc.mn.org (Roy M. Silvernail) Date: Tue, 3 Oct 95 16:13:31 PDT Subject: About that simple hardware RNG Message-ID: <951003.173054.7O1.rnr.w165w@cybrspc.mn.org> -----BEGIN PGP SIGNED MESSAGE----- The idea: noise from an avalanching diode is applied to the input of an 8 bit shift register. The SR is clocked at some fairly high sampling rate. The 8 bits are made available on the printer port. The questions: Does the RNG need to accumulate bits, or can it simply present the most recent 8 random bits from the diode? (I imagine there'll have to be a protection against reading again before the SR has flushed) How fast can you sample an avalanching diode? (how many bits/second can I expect to harvest?) Would a less-than-quartz-accurate sampling rate be acceptable? (555s, resistors and caps are cheaper than oscillator modules) Or would a device driver to supply the sampling frequency be acceptable? What if someone (Mallet?) hacks the driver? (the driver is admittedly less portable) One last question... what aesthetics apply here? Would cypherpunks abide a largish box, or shun anything larger than a typical dongle? (smaller usually equals more expensive) - -- Roy M. Silvernail -- roy at cybrspc.mn.org will do just fine, thanks. "Does that not fit in with your plans?" -- Mr Wiggen, of Ironside and Malone (Monty Python) PGP public key available upon request (send yours) -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHHAPRvikii9febJAQHkIgQApvQh/Lc+5lLpVjJy50TDg6CjIETwmS1p Z+CxMmNiNCRlu8gdbIPiIuT7vrnGaOeuFF4OEzWKzUhokMJ7jNDaRZvgIX8DaNm9 R8+LtCqYmBASHlmq5iHHhFxESwsXCK4ulnWZuMVju4eEF6DNrZqHmSHChr/hQ2L6 df+s+KJ9lWY= =vosV -----END PGP SIGNATURE----- From gnu at toad.com Tue Oct 3 16:30:34 1995 From: gnu at toad.com (John Gilmore) Date: Tue, 3 Oct 95 16:30:34 PDT Subject: Oct 20th SF C'punks meeting: at the ITAR Constitutional trial court Message-ID: <9510032330.AA11251@toad.com> We're having a "Cypherpunks Dress-Up Day" on Friday, October 20th. Meet at the Federal Building in San Francisco, 450 Golden Gate Avenue, at 10:15AM. Hey, I've seen Tim May in a suit once, why not again? The first "oral arguments" in the Bernstein crypto export case will happen there, starting at 10:30, in Judge Patel's courtroom upstairs. We've been fedexing legalese back and forth for months; now we get to explain the case in person. You can meet our intrepid lawyers, who are slaving away without pay, in durance vile, to protect our rights! Shake hands with an NSA lawyer specially flown in for the occasion! Meet some local journalists! And watch the wheels of justice grindin' as the judge first explores our case. We will follow the hearing with a group lunch at Max's Opera Plaza, a block away, and break up at 12:30 or 1PM. In this case, Dan Bernstein, ex-grad-student from UC Berkeley, is suing the State Department, NSA, and other agencies, with help from the EFF. Our main argument is that the export controls on crypto software are a "prior restraint on publication" which is unconstitutional under the First Amendment unless handled very delicately by a court (not just by an agency acting on its own). These agencies restrained Dan's ability to publish a paper, as well as source code, for the crypto algorithm that he invented. There are additional arguments along the lines that the State Department and NSA take a lot more liberties during the export process than their own regulations and laws really permit. Full background and details on the case are in the EFF Web/FTP archives at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case. Like Phil Karn's case, this lawsuit really has the potential to outlaw the whole NSA crypto export scam. We could make your right to publish and export crypto software as well-protected by the courts as your right to publish and export books. Of course, the government would appeal any such decision, and it will take years and probably an eventual Supreme Court decision to make it stick. But you can be there at the very beginning! Please make a positive impression on the judge. Show her -- by showing up -- that this case matters to more people than just the plaintiff and defendant. That how it gets decided will make a difference to society. That the public and the press are watching, and really do care that it gets handled well. We'll have to be quiet and orderly while we're in the courthouse. There will be no questions from the audience (that's us), but the session will be tape-recorded, and you can take notes if you like. The judge is Marilyn Hall Patel, who used to be on the board of directors of the ACLU. I haven't met her, but I hear that she's not afraid to tell the government where to stuff it, when they deserve it. Our lawyers met with her once before, but this will be your first chance to meet the judge in person. The particular issue in front of the judge on the 20th is whether the case should be thrown out. The government is arguing that it should. It's a mess of legal details about whether the Judicial Branch has the right to decide questions like this, and over whether we have really properly claimed a Constitutional rights violation. It will teach most c'punks something about how the courts work, and how the NSA and State Dept use bureaucratic tricks to avoid facing the real issues. We have managed to drag in some of these issues, like whether there is sufficient "expression" in software that the First Amendment should protect publishers of software. It's possible, but unlikely, that the judge will decide then-and-there. We will get some clues to how she is leaning, based on her questions and comments. Her written decision will come out some days or weeks later. Don't bring any interesting devices unless you're willing to check them with the lobby guards for the duration. They seem to want to hold onto guns, "munitions", and even small pocketknives, before they'll let you go upstairs to the courtrooms. So, here's your excuse to put on a nice costume, take an early lunch, and pay a call on the inner sanctum of our civil rights. See you there! John Gilmore From anonymous at wmono.remailer Tue Oct 3 17:04:06 1995 From: anonymous at wmono.remailer (Anonymous) Date: Tue, 3 Oct 95 17:04:06 PDT Subject: meeting on 20th Message-ID: <199510040004.TAA08747@ valhalla.phoenix.net> could someone that goes make a transcript of the hearing??? like to hear it but too far away!! 10x. From rfb at lehman.com Tue Oct 3 17:29:31 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Tue, 3 Oct 95 17:29:31 PDT Subject: Strong authentication for Netscape distributions In-Reply-To: <9510031403.ZM151@tofuhut> Message-ID: <9510040026.AA18012@cfdevx1.lehman.com> -----BEGIN PGP SIGNED MESSAGE----- From: Jeff Weinstein Date: Tue, 3 Oct 1995 14:03:28 -0700 Subject: Re: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) . . . Yes, I get the idea about spewing the signed hashes everywhere. The problem I have is with the user of PGP. That will help cypherpunks, but does absolutely nothing for most of our millions of users, who have no idea what PGP is. Perhaps its enough to assume that if anyone is tampering with the distribution, some cypherpunk will stumble across it... I suspect that most of these millions don't know about md5 or much of anything in the way of strong authentication. However, if you provide any sure-fire mechanism by which someone could detect that the distribution has been tampered with, it would be an improvement over not having any. If someone does happen to notice tampering and send mail to cypherpunks about it, I'd guess that there's a good chance it would be reported in major publications shortly thereafter. You might want to indirect through BETSI . . . . -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHHUeZNR+/jb2ZlNAQHVCQP8CBb5c/0nX41awTf/kt+gGODu4qLcJVI8 rc604+rdr0YUFPVTStwXdUCg7gKgUTOC8werBPK5Dgyse/8u1jczU4Czub9Cd693 EfUW7o2oHN5/3x9E0Yn1rJD+ffwuGC+lf1EMBJMHsTwJzbPmy0FJPfyfyDlvWrDD OQDsJ5DbOHU= =s/t0 -----END PGP SIGNATURE----- -- Rick Busdiecker Please do not send electronic junk mail! net: rfb at lehman.com or rfb at cmu.edu PGP Public Key: 0xDBD9994D www: http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rfb/http/home.html send mail, subject "send index" for mailbot info, "send pgp key" gets my key A `hacker' is one who writes code. Breaking into systems is `cracking'. From warlord at MIT.EDU Tue Oct 3 18:23:46 1995 From: warlord at MIT.EDU (Derek Atkins) Date: Tue, 3 Oct 95 18:23:46 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) In-Reply-To: <9510031403.ZM151@tofuhut> Message-ID: <199510040123.VAA11236@toxicwaste.media.mit.edu> > Yes, I get the idea about spewing the signed hashes everywhere. The > problem I have is with the user of PGP. That will help cypherpunks, > but does absolutely nothing for most of our millions of users, who > have no idea what PGP is. Perhaps its enough to assume that if anyone > is tampering with the distribution, some cypherpunk will stumble across > it... If nothing else, Jeff, it will expose those "millions of users, who have no idea what PGP is" to PGP. And, hopefully, some of those "millions of users" might even take the time to grab PGP and take a look at that, too. In other words, there is nothing to lose (except a little bit of time and effort, and a small amount of storage space) and there is a heck of a lot to gain by including PGP signatures. -derek From warlord at MIT.EDU Tue Oct 3 18:26:31 1995 From: warlord at MIT.EDU (Derek Atkins) Date: Tue, 3 Oct 95 18:26:31 PDT Subject: Keyserver keyrings In-Reply-To: Message-ID: <199510040126.VAA11270@toxicwaste.media.mit.edu> > The public keyrings at MIT and Uni-Hamburg haven't been updated since August. > Does anyone know why? Umm.. To which keyring are you referring at MIT? If you mean the ring at ftp://toxicwaste.mit.edu/pub/keys, then that is because toxicwaste is no longer the pgp.mit.edu keyserver. The name pgp.mit.edu is now pointing at another machine (which I do not maintain). For access to the keyring, send email to pgp-public-keys at pgp.mit.edu -- that is the supported method of access. -derek From jya at pipeline.com Tue Oct 3 18:41:44 1995 From: jya at pipeline.com (John Young) Date: Tue, 3 Oct 95 18:41:44 PDT Subject: HUL_loo Message-ID: <199510040141.VAA00105@pipe3.nyc.pipeline.com> The Economist of September 30-October 6 has a long survey of global telecommunications, excellently researched and written: The death of distance as a determinant of the cost of communications will probably be the single most important economic force shaping society in the first half of the next century. It will alter, in ways that are only dimly imaginable, decisions about where people live and work; concepts of national borders; patterns of international trade. Its effects will be as pervasive as those of the discovery of electricity. Buy it, see it at http://www.economist.com, or, in a pinch: HUL_loo (92 kb in 6 parts) From jirib at sweeney.cs.monash.edu.au Tue Oct 3 19:20:58 1995 From: jirib at sweeney.cs.monash.edu.au (Jiri Baum) Date: Tue, 3 Oct 95 19:20:58 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) In-Reply-To: <9510031403.ZM151@tofuhut> Message-ID: <199510040218.MAA04820@sweeney.cs.monash.edu.au> -----BEGIN PGP SIGNED MESSAGE----- Hello "Jeff Weinstein" and Laurent Demailly
, and jsw at neon.netscape.com (Jeff Weinstein) and cypherpunks at toad.com "Jeff Weinstein" writes: > On Oct 3, 6:19pm, Laurent Demailly wrote: > > Subject: Re: Netscape finally issuing md5sums/pgp signed binaries ? (was R ... > > Yes, I get the idea about spewing the signed hashes everywhere. The > problem I have is with the user of PGP. That will help cypherpunks, > but does absolutely nothing for most of our millions of users, who > have no idea what PGP is. Provided they know at least one person who does, they might well ask that person to come and verify it for them. Then again the tampered-with version might not mention PGP-signatures at all (unless you use it widely in your publicity). > Perhaps its enough to assume that if anyone > is tampering with the distribution, some cypherpunk will stumble across > it... You wouldn't want that to be your only argument, but it helps... If you mention all over the place that the program is PGP-signed to foil {cr,h}ackers and viruses (*), chances are a lot of people will ask their one colleague or friend that does know PGP to verify it for them. Footnotes: (*) well, gotta use the four horse{wo,}men, no? Jiri - -- If you want an answer, please mail to . On sweeney, I may delete without reading! PGP 463A14D5 (but it's at home so it'll take a day or two) PGP EF0607F9 (but it's at uni so don't rely on it too much) -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBMHHu7CxV6mvvBgf5AQHTaAP/W2RKNFiGFc4WjE4saoAls8/Q3N+zlkqm sDOCga9t9ElSY+jf0XQR/MLxMnuJ4n2H1gbzxnK+ELAbubzRBjNfK+I66IsN89nd FYEwtnGMSgmmPtO2Y8X0KaFwkdRS8XUVgvnyYVrrhz/6dh3VvcLy5imLBK0fbIrA r2+u9FL6fuQ= =2WVg -----END PGP SIGNATURE----- From fc at all.net Tue Oct 3 19:25:17 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Tue, 3 Oct 95 19:25:17 PDT Subject: HUL_loo In-Reply-To: <199510040141.VAA00105@pipe3.nyc.pipeline.com> Message-ID: <9510040222.AA12001@all.net> > > The Economist of September 30-October 6 has a long survey > of global telecommunications, excellently researched > and written: > > The death of distance as a determinant of the cost of > communications will probably be the single most > important economic force shaping society in the first > half of the next century. It will alter, in ways that > are only dimly imaginable, decisions about where people > live and work; concepts of national borders; patterns of > international trade. Its effects will be as pervasive as > those of the discovery of electricity. Sounds like an extract from the first chapter of my recent book: "Protection and Security on the Information Superhighway" -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From syrinx at c2.org Tue Oct 3 19:27:27 1995 From: syrinx at c2.org (Syrinx Anonymous Remailer) Date: Tue, 3 Oct 95 19:27:27 PDT Subject: Keyserver keyrings In-Reply-To: <199510040126.VAA11270@toxicwaste.media.mit.edu> Message-ID: <199510040222.TAA02828@infinity.c2.org> According to 'Derek Atkins': > The name pgp.mit.edu is now > pointing at another machine (which I do not maintain). For access to > the keyring, send email to pgp-public-keys at pgp.mit.edu -- that is the > supported method of access. does anybody out there maintain a current keyring that can be grabbed via anon ftp instead? It seems like a waste of time for hundreds of users to continually add updates to their own keyrings when the whole keyserver ring can be picked up at one time, updates and all? ftp is much more convenient than stringing together multiple sections received by e-mail. thx. From sameer at c2.org Tue Oct 3 20:06:30 1995 From: sameer at c2.org (sameer) Date: Tue, 3 Oct 95 20:06:30 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) In-Reply-To: <199510040218.MAA04820@sweeney.cs.monash.edu.au> Message-ID: <199510040300.UAA05650@infinity.c2.org> > > If you mention all over the place that the program is PGP-signed > to foil {cr,h}ackers and viruses (*), chances are a lot of people will > ask their one colleague or friend that does know PGP to verify it for them. Yeah, just imagine the PR possibilities! -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 An Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From futplex at pseudonym.com Tue Oct 3 20:30:54 1995 From: futplex at pseudonym.com (Futplex) Date: Tue, 3 Oct 95 20:30:54 PDT Subject: NYT: WWW Usage Monitoring for Marketing Message-ID: <199510040330.XAA31167@thor.cs.umass.edu> New York Times, National Edition, 95/10/03: A positive sign in the marketing/privacy war on the net: In his regular Advertising column, Stuart Elliott discusses the presentation of a report on the problem of "assuring accurate and comprehensive measurement of consumer exposure to advertisements that appear in interactive media like World Wide Web sites and on-line services." The report was issued by "Casie", the Coalition for Advertising Supported Information and Entertainment, a creation of two main advertising trade groups: the American Assn. of Advertising Agencies, and the Assn. of Nat'l. Advertisers. Elliott's article identifies three main issues covered in the report. One of these is privacy: "Every effort should be made to maintain consumers' privacy," the report urges, adding that identities of computer users "must not be revealed by audience measurement providers." -Futplex If you haven't seen the film "Twelve Angry Men", it's about time you did. From bplib at wat.hookup.net Tue Oct 3 20:55:11 1995 From: bplib at wat.hookup.net (Tim Philp) Date: Tue, 3 Oct 95 20:55:11 PDT Subject: Article requests Message-ID: I have received many requests for the articles that I wrote on Cryptography so I will post them to the list with the subject "ARTICLES" Regards, Tim Philp =================================== For PGP Public Key, Send E-mail to: pgp-public-keys at swissnet.ai.mit.edu In Subject line type: GET PHILP =================================== From norm at netcom.com Tue Oct 3 20:57:05 1995 From: norm at netcom.com (Norman Hardy) Date: Tue, 3 Oct 95 20:57:05 PDT Subject: MD4 collision Message-ID: Hans Dobbertin in Germany has found two messages to which MD4 assigns the same hash. From bplib at wat.hookup.net Tue Oct 3 20:57:47 1995 From: bplib at wat.hookup.net (Tim Philp) Date: Tue, 3 Oct 95 20:57:47 PDT Subject: ARTICLES Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Copyright (C) 1995 Tim Philp Brantford, Ontario Canada Article appeared in The Expositor, Brantford, Ont., Canada June 10th, 1995 - COMPUTER CRYPTOGRAPHY - - PROTECTING YOUR PRIVACY - by Tim Philp Last week I discussed ways that the computer has made our lives less private. Today we take up that thread and talk about the stuff of spy novels.Cryptography, in the context that we are discussing it, is a means of preventing unauthorized people from reading our files or correspondence. Cryptography is not new. It has been used throughout history and has played its part in shaping events. Mary Queen of Scots was beheaded because the cipher that she used to arrange a rebellion against Elizabeth I was decoded by the government. Julius Caesar used a primitive cipher, now known as a Caesar Cipher, to disguise his messages to Rome during his military campaigns. Every letter in his messages was replaced by the letter three letters farther in the alphabet. Thus A would become D, B would become E, until you reached the end of the alphabet. You would then wrap around to make X equal to A, Y equal to B and Z equal to C. In this way the word CAESAR would become FDHVDU. Simple substitution ciphers like this one are easily broken and today are used in puzzle books to provide a few moments diversion to puzzle fanciers. The role of computers in cryptography goes back to the early days of computers. One of the first computers was used to help decode enemy messages in England during the second world war. The 'boffins of Bletchley' were the true progenitors of the computer, not IBM. Cryptography has progressed far beyond the simple Caesar Cipher. Indeed, today's methods of encoding messages have progressed to the point where the ciphers are unbreakable within any reasonable amount of effort. It does no good to break a cipher if it takes 1500 years of computer time to do it! Of interest to computer users is the development of a type of cryptography called Public Key Cryptography. With this method you have two keys, a public key and a private key. Simply speaking, a key is a very long number that is used by your program to encode and decode messages. Each person that you want to communicate with has a public key that is published and is known by everyone. To send a message to your friend you would use his public key to encode the message. Your friend receives the message and uses his private key to decode the message. The beauty of this technique, is an eavesdropper can intercept the encoded message and the public key of the recipient, but he cannot use this information to decode the message without the secret key of the recipient. In older systems you had to transmit the secret key to the recipient. The secret key could be intercepted and used to decode the messages. Public key systems require that only the public key be transmitted to the recipient. The message cannot be decoded using only the public key and the message. The availability to the general public of secure, military grade cryptographic methods has generated considerable controversy. The US government has placed this software under export control and has suggested the use of their own system called Clipper. Clipper has a 'backdoor' that will allow the government to decode secret messages. They claim that they need this power to combat drugs and crime. Civil libertarians claim that the government has no business intercepting private communications. Cryptography can be used to protect E-Mail messages and computer files. The software to do this is freely available on the Internet (search for PGP). The US government, it seems, is locking the barn door after the horses have escaped. This file may not be reproduced by any means without the permission of the author -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBMHM8unseeMISF+fVAQFesQP/YxFgW3BAjnvDCMU4SfksgpKLEGMDMv9M YQpn/0BqUZSUnO3yye1bIN5KsDofePaCd6PcE6RcnvZJTBVu9PiZvxiBkr/a76wf 5Ft+F4p2tH0gxPunXZyjDqEnfHDcXY+X0FM7JgmeMyjDxzbq6GIqEX7gLoPAszwp Ayu4jIl2smg= =76yF -----END PGP SIGNATURE----- =================================== For PGP Public Key, Send E-mail to: pgp-public-keys at swissnet.ai.mit.edu In Subject line type: GET PHILP =================================== From bplib at wat.hookup.net Tue Oct 3 20:59:34 1995 From: bplib at wat.hookup.net (Tim Philp) Date: Tue, 3 Oct 95 20:59:34 PDT Subject: ARTICLES Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Copyright (C) 1995 Tim Philp Brantford, Ontario Canada Article appeared in The Expositor, Brantford, Ont., Canada Sept 9th, 1995 - THE CODEBREAKERS - by Tim Philp A couple of weeks ago an extraordinary event took place that has implications for all users of the Internet. A group on the Internet, who call themselves CYPHERpunks, ran a test of a code system that was considered uncrackable in any reasonable amount of time. This in itself was not the extraordinary event. This code was broken by the cypherpunks in only 31.5 HOURS! That's right, hours. This code, called SSL used a 40 bit encypherment key with 1,099,511,627,776 possible combinations. To give you an example of just how incredible this feat was, let's examine the security of this code. If you were to try 1 key per second it would take you just over 34,841 years to try them all. That is almost five times longer than all of recorded history. How was this done and what does this mean to users of the Internet? The how part is simple to explain, the meaning will be more difficult to divine. The security of a code must rely only upon the key used to encipher the plaintext. It is assumed that the method of encryption is well known, as indeed it would be if it were used in a commercial product. Someone would disassemble the code and figure out the method. It is for this reason that security cannot reside in a secret means of encypherment. SSL is one such code. This group, the Cypherpunks, wrote a program that would try keys in sequence and then they distributed it to the Internet community. They then set up a central computer that people all over the world could call into and get assigned a group of keys to try. These people would then feed these keys into the code cracking program and report the results to the central computer. With hundreds of users taking part, using computers that were sitting idle at nights running screen savers, they cracked the code in 31.5 hours. One of the greatest arguments against people trying this kind of brute force attack on codes, is that the computer time and power required would cost the earth. In actual fact, this successful attack cost nothing at all as the computers used were sitting idle. Everything from little 286 PCs to mini-computer workstations were pressed into service labouring long over the weekend tirelessly trying one possible key after another until they cracked the code. Because this was an academic excersise, there was no harm done. The purpose was to prove how quickly a 40 bit code could be cracked. I confess to be astounded at just how fast this was accomplished. This points out two remarkable possibilities for the new communications technology that we are only now beginning to use. If that code were protecting sensitive information, such as a bank funds transfer, this group could be very rich. It does also point out a new way of using the Internet to solve problems that have long eluded solution because of the shear computational size of the problem. If the problem were to be divided up into small chunks and given to hundreds of computers worldwide, solution may become possible. We are just beginning to understand the possibilities. This file may not be reproduced by any means without the permission of the author -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBMHM8znseeMISF+fVAQEGzgP+L+JQfTSZ1un83/oh2g/5Nthw3tiHVtb9 eDiOtuzvuQiLxMO/SUPnjM5cXlSYhTNCN8wF49IXEO5Istg58oIA8wf4MPr8aDML dsK8h34rBQqVXjaxC9staKtKnTGLfZFLmKGwRShLJECgs6Bzqu25TptSYIa8RRGk ncYhNj6Lalc= =RE7O -----END PGP SIGNATURE----- =================================== For PGP Public Key, Send E-mail to: pgp-public-keys at swissnet.ai.mit.edu In Subject line type: GET PHILP =================================== From norm at netcom.com Tue Oct 3 21:00:14 1995 From: norm at netcom.com (Norman Hardy) Date: Tue, 3 Oct 95 21:00:14 PDT Subject: The Evolution of Cooperation (Towards a mathematical theory of reputation?) Message-ID: I highly recommend Axelrod's short book, The Evolution of Cooperation, for those (like me) who find it hard to think clearly about trust issues. You have probably heard about prisoner's dilemma, tit-for-tat etc. Axelrod is a very early worker in this field. He set up a tournament of programmed bugs that competed with each other in an artificial environment. They could survive only by cooperation with other bugs. The could also cheat. Axelrod does not use the term "reputation" but it what one bug gains or looses as it interacts with other bugs in iterated encounters. I read the book about two years ago. Only last night did I realize that those ideas helped me think about the MITM threat. From chen at intuit.com Tue Oct 3 21:06:50 1995 From: chen at intuit.com (Mark Chen) Date: Tue, 3 Oct 95 21:06:50 PDT Subject: macworld crypto articles In-Reply-To: Message-ID: <9510040358.AA09395@doom> > PGP is probably too unweildy for the non-hobbyist to comfortably use. I= > don't know if anyone else has suggested it but I'd strongly encourage= > Intuit to make CryptDisk for the Mac easily available. I use it to maintain= > an encrypted partition for my financial data and the user interface is= > quite simple. I believe the DOS equivalent is SecureDisk. I think that it's a good idea to make users aware of the options. I haven't used CryptDisk or SecureDisk myself, but I'll check them both out. - Mark - -- Mark Chen chen at intuit.com 415/329-6913 finger for PGP public key D4 99 54 2A 98 B1 48 0C CF 95 A5 B0 6E E0 1E 1D From rickj at microsoft.com Tue Oct 3 21:16:57 1995 From: rickj at microsoft.com (Rick Johnson) Date: Tue, 3 Oct 95 21:16:57 PDT Subject: Comments on STT Spec Implementation Details Message-ID: <9510040519.AA05397@netmail2.microsoft.com> Hi All - Last week our team published jointly with Visa the STT specification. Since then, we've received some comments that the wire formats and protocols section for STT have not been complete enough for developers to implement. We're very interested in feedback and specifics on this. We worked to keep _only_ the detail we felt required to implement STT -- the language is intentionally terse. However, it is in everyone's best interest that the STT spec is completely understood and implementable. We want your participation in this. We've set up an alias direct to our team to respond to your comments: stt at microsoft.com Non-technical flames direct to: Rick - aka - Rick Johnson rickj at microsoft.com From rsalz at osf.org Tue Oct 3 21:20:30 1995 From: rsalz at osf.org (Rich Salz) Date: Tue, 3 Oct 95 21:20:30 PDT Subject: Netscape finally issuing md5sums/pgp signed binaries ? (was Re: NetScape's dependence upon RSA down for the count!) Message-ID: <9510040417.AA12468@sulphur.osf.org> You might want to look at BETSI which was created to do this kind of thing, too. Check out http://info.bellcore.com/BETSI/betsi.html From rjc at clark.net Tue Oct 3 23:13:45 1995 From: rjc at clark.net (Ray Cromwell) Date: Tue, 3 Oct 95 23:13:45 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510031438.HAA06918@orac.engr.sgi.com> Message-ID: <199510040204.WAA22162@clark.net> > In article , Ray Cromwell writes: > > > This bug doesn't seem to crash Netscape, instead, it crashes my XServer > > as soon as the mail window pops op. I'm too tired right now to try to > > analyze it, but it might be another stack bug, this time, in the X > > libraries because Netscape isn't doing any sanity checking. > > This is a bug in your X server, not in netscape. The X server should > never crash no matter what you send to it. That's true, but it is also true that Netscape should also be performing some sanity checking on input rather than relying on the supporting libraries to be secure. Remember, a hole is a hole. The last sendmail bug was a buffer overflow in syslog, however, sendmail still got patched to do bounds checking on the strings it was passing to syslog. It looks like this is only bug on BSDI2.0/XAccel, and NT3.5/NS1.1. But is it wise for netscape to be sending 10,000 character strings to GUI functions anyway? -Ray From jsw at neon.netscape.com Wed Oct 4 00:27:41 1995 From: jsw at neon.netscape.com (Jeff Weinstein) Date: Wed, 4 Oct 95 00:27:41 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510031438.HAA06918@orac.engr.sgi.com> Message-ID: <44td0c$3um@tera.mcom.com> In article <199510040204.WAA22162 at clark.net>, rjc at clark.net (Ray Cromwell) writes: > > In article , Ray Cromwell writes: > > > > > This bug doesn't seem to crash Netscape, instead, it crashes my XServer > > > as soon as the mail window pops op. I'm too tired right now to try to > > > analyze it, but it might be another stack bug, this time, in the X > > > libraries because Netscape isn't doing any sanity checking. > > > > This is a bug in your X server, not in netscape. The X server should > > never crash no matter what you send to it. > > That's true, but it is also true that Netscape should also be > performing some sanity checking on input rather than relying on > the supporting libraries to be secure. Remember, a hole is a hole. > The last sendmail bug was a buffer overflow in syslog, however, > sendmail still got patched to do bounds checking on the strings > it was passing to syslog. > > It looks like this is only bug on BSDI2.0/XAccel, and NT3.5/NS1.1. But > is it wise for netscape to be sending 10,000 character strings to GUI > functions anyway? While I agree that we should probably truncate this string to something smaller than 10000 characters(I've already filed a bug on it here), it is perfectly legal X protocol to send 10,000 characters to the X server. How do I decide what is too long? For example, when tracking down buffer overflow problems for the security patch, we found an undocumented static buffer limit of 64 bytes for the hostname passed to gethostbyname() on IRIX. Before we stumbled across this problem, we had a discussion about what length we should truncate host names to. People thought that 128 characters was a reasonable limit, but it turned out that it was too long. If the X server crash is what I think it is, it could still be hit if we limit the string length, depending on the user's font selections in their .Xdefaults. The fact is that if we are passing documented legal values into X, unix, windows, or some other system software, we may still tickle some bug in the system. We can't test against every patch level of every piece of software that our code may run against. If that code crashes its a bug in that code, and there is little we can do about it other than try to play by the documented rules. That said, there are probably still bugs in Netscape that will cause it to crash. We took care to try to find all such bugs that occured on the stack, which could be used to insert code and jump to it. That was the best we could do in the timeframe of the security patch. For 2.0 we are doing complete code reviews to look for any sort of overflows, stack or not, as well as other latent bugs. We are also beefing up our QA to try to find more of these types of bugs. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From cwe at it.kth.se Wed Oct 4 01:45:49 1995 From: cwe at it.kth.se (Christian Wettergren) Date: Wed, 4 Oct 95 01:45:49 PDT Subject: The Evolution of Cooperation (Towards a mathematical theory of reputation?) In-Reply-To: Message-ID: <199510040842.JAA16000@piraya.electrum.kth.se> | I highly recommend Axelrod's short book, The Evolution of Cooperation, for | those (like me) who find it hard to think clearly about trust issues. You | have probably heard about prisoner's dilemma, tit-for-tat etc. Axelrod is a | very early worker in this field. He set up a tournament of programmed bugs | that competed with each other in an artificial environment. They could | survive only by cooperation with other bugs. The could also cheat. I vaguely remember that Axelrod did a few interesting additional papers, on things like geographical propagation of knowledge in iterated prisoner's dilemma, and of behaviour in which the 'bugs' had limited memory as well. Very interesting reading, I'd say. Do anyone know what he have done recently? -Christian From eamon at cosc.canterbury.ac.nz Wed Oct 4 03:09:55 1995 From: eamon at cosc.canterbury.ac.nz (Eamon Daly) Date: Wed, 4 Oct 95 03:09:55 PDT Subject: NYT: WWW Usage Monitoring for Marketing Message-ID: <199510041009.XAA02338@kiwi> On Tue, 03 Oct 1995, futplex at pseudonym.com (Futplex) wrote: [snip] >In his regular Advertising column, Stuart Elliott discusses the presentation >of a report on the problem of "assuring accurate and comprehensive measurement >of consumer exposure to advertisements that appear in interactive media like >World Wide Web sites and on-line services." [snip] Could someone please scan this article and post it to the list, or email it to me? Thanks. Eamon Daly eamon at cosc.canterbury.ac.nz From adam at powergrid.electriciti.com Wed Oct 4 03:28:44 1995 From: adam at powergrid.electriciti.com (Adam Philipp) Date: Wed, 4 Oct 95 03:28:44 PDT Subject: New Windoze PGP Shell (freeware) worth checking out Message-ID: -----BEGIN PGP SIGNED MESSAGE----- AEgis Research (who I know nothing about) has come out with a very pleasant windows fron end for PGP. It is bone-head compliant, and even works well in Win95. I'm only plugging because I was so impressed. Until Eudora has PGP hooks, this is my shell of choice. Adam Philipp -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBMHJgjm/ZTaRmpgTFAQGp+wf7BO36FpbAdLdDieORKldIe3MvPa8wUDpR Rax38rxSP+aeR0toqtuldmWpfV5I+p40d+6pgWVfOKegS38Qt3k6rEt3r7C++Efi PQZLOE3b4RHT5ZeS4klEZtwu1A8nTWMVZFkwcxTb6s+C3KYv9JxdXFHnrOPlnkcL 5AJhUDvznMnA1WhKmknNjXhGJH9FKtvNuTO/k1fmD6YwclqAbKBiuGwQduWqZfwI 0zGZlpSfbuZ6sCsbHFnw1wJIOONyAEr1dB5qhyV3rX00hm6KfSNsuGqwvlDhaOM9 lODlFwBVt+PJIRHVocCcCdp7/5ffE/hTIXoRNYYF0kcZTotJP05SXg== =fvcQ -----END PGP SIGNATURE----- --=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-+-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\ |PGP key available on my home page|Unauthorized interception violates | | http://www.rosa.com/~adam |federal law (18 USC Section 2700 et| |-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-|seq.). In any case, PGP encrypted | |SUB ROSA: Confidential, |communications are preferred for | |secret, not for publication. |sensitive materials. | \-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-+-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-/ From cwe at it.kth.se Wed Oct 4 04:06:47 1995 From: cwe at it.kth.se (Christian Wettergren) Date: Wed, 4 Oct 95 04:06:47 PDT Subject: Netscape hole without .Xauthority (fwd) In-Reply-To: <306C804A.3CE1CFB@netscape.com> Message-ID: <199510041102.MAA17689@piraya.electrum.kth.se> | Jyri Kaljundi wrote: | > | > There's a huge hole in the Netscape remote control mechanism for the | > X-Windows based clients. | > Potential impact : anybody can become any user that uses Netscape on any | > system without sufficient X security. | | Did you bother to read the spec? This doesn't matter; if I can | connect to your X server at all, you have already lost. The spec | (at http://home.netscape.com/newsref/std/x-remote.html) contains: [snip] This is all true, in a way. But there is a growing number of applications that contains this kind of remote execution capabilities, and whose security is dependant on Xauth. I believe that X is soon becoming the weakest link in the security chain. I guess we don't have to discuss the quality of the 'magic cookie' RNG's, do we? Not to mention the fact that the cookie is in effect a password that is perfectly snoopable. How common is DES-based Xauth-schemes? They are not used very much, as far as I know. And if theyare, as in XDM, then again, what about the RNG? I guess this is just the distinction of breaking the glass window in the back of the house, or to pick up the front door key from beneath the "Welcome" door mat, but anyway. -Christian From A.Back at exeter.ac.uk Wed Oct 4 04:19:00 1995 From: A.Back at exeter.ac.uk (A.Back at exeter.ac.uk) Date: Wed, 4 Oct 95 04:19:00 PDT Subject: More forged cancels Message-ID: <6495.199510041118@olib> [someone crossposting to a ton of alt groups about spam, the headers: Newsgroups: news.admin.net-abuse.misc, soc.culture.german, soc.culture.jewish, rec.radio.shortwave, alt.2600, mail.cypherpunks, ^^^^^^^^^^^^^^^^^ alt.privacy.anon-server, alt.stop.spamming, alt.stop-spamming] It's started already. This is because of "mail.cypherpunks" in the huge newsgroup line? A news to mail gateway pointing at cypherpunks at toad.com? Any chances of disabling this before it gets out of hand? Who runs the gateway(s)? Make it read only please! Or change the gateway so it doesn't forward if there are other groups on the newsgroup line or something. Adam From rah at shipwright.com Wed Oct 4 04:56:55 1995 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 4 Oct 95 04:56:55 PDT Subject: (fwd) ETO Trade Points : Correction Message-ID: --- begin forwarded text Date: Wed, 4 Oct 95 07:49:16 -0400 From: "GORD JENKINS" X-Minuet-Version: Minuet1.0_Beta_14.1 Reply-To: X-Popmail-Charset: English To: www-buyinfo at allegra.att.com Subject: ETO Trade Points : Correction Subject: ETO Trade Points I made a mistake in the Web site address. The correct address is http://www.unicc.org/untpdc Thanks Gordon Jenkins -- GORD JENKINS e maik JENKINS at fox.nstn.ca tel 613 794 6735 fax 613 723 8938 ------ Forwarded message ends here ------ -- GORD JENKINS e maik JENKINS at fox.nstn.ca tel 613 794 6735 fax 613 723 8938 --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From cwe at it.kth.se Wed Oct 4 04:58:26 1995 From: cwe at it.kth.se (Christian Wettergren) Date: Wed, 4 Oct 95 04:58:26 PDT Subject: Europe In-Reply-To: Message-ID: <199510041155.MAA18408@piraya.electrum.kth.se> | Sweden: The authorities have not yet said anything at all about | where they stand in the GAK controversy. Probably very few have | heard about it. This may surface in the swedish media very soon now. There will be an article in Ny Teknik next week about these issues, and they have done some digging at Brussels as well. I've tried to get 'Striptease' (discussion TV-program) interested as well, but I don't know about them. So lets go off and think hard about good (culture-related) arguments why this is a bad idea. We'll gonna have to look really nice, and say some sensible things. :-) I'm personally attacking the assumption that the police cannot get to the encrypted traffic without key escrow. Well, why not bug the keyboard on the originating machine? Etc etc... I'm currently planning to start an email list dicussing this issue, but I need some proper political clearance first. (They should at least have a say, I guess.) Another thing that is currently happening in Sweden is that a National Identity Card is being proposed by a mjor part of the swedish industry and other players. This ID-card will be a smart card, and is meant to be used in most places. | The only thing that has come up on a public | (television) level is demands from the police of access to | decoded GSM traffic, which I believe is under implementation | now (the obstacle has mainly been who is going to pay for the | software updates of the GSM nodes). Sweden has rather strict | rules for wiretapping (at least officially) and their is no | public pressure for any change in this. What strikes me as so strange is that we have an official phonetapping approval rate of 300/yr, in a population of 8 million people. How can the phone tapping be so important then? | I think the basic difference USA vs Sweden in this regard is a | time delay of some years. We have lots of Internet nodes per | capita (more than in the US, they say) but the net is still | largly run by engineers (if only that could last!) and net | awareness is rare above the age of 30 (i.e. among those who | have a say). I think things are moving faster in this area than we might think. There is certainly things happening at the EU level, according to the Ny Teknik reporter I spoke with. There is a resolution at the Council of Ministers, already taken during 1994, apparantely. He was vague about the contents of that resolution, however. | PS | Perry, what was your impression of the Swedes you met at the | IETF meeting in Stockholm last July? I guess they were so | happy about the new 34 Mbit/s connection to the New World | that they forgot about the rest? I'm listening, I'm listening... :-) From schampeo at nando.net Wed Oct 4 05:57:19 1995 From: schampeo at nando.net (Steve Champeon) Date: Wed, 4 Oct 95 05:57:19 PDT Subject: TidBITS article on Netscape Message-ID: Geoff Duncan has written an article about the Netscape security breach in TidBITS, an e-zine for Mac owners. Copies are available at: ftp://ftp.tidbits.com/pub/tidbits/issues/1995/TidBITS#297_02-Oct-95.etx The above version is formatted using Setext. HTML and text/plain versions are also available. Mr. Young? Perhaps this could go into the library? Seems fair, if critical, and c2.org gets a mention. Steve From jya at pipeline.com Wed Oct 4 06:03:22 1995 From: jya at pipeline.com (John Young) Date: Wed, 4 Oct 95 06:03:22 PDT Subject: Telecommana Message-ID: <199510041303.JAA00417@pipe4.nyc.pipeline.com> 10-4-95. Jared Sandberg writes in The WSJ on a new Internet payment system by MasterCard, IBM, Netscape, CyberCash and GTE. Says the specs were published yesterday. Another WSJ report is on Lockheed Martin's proposal for a new communications satellite system. John Markoff writes in The NYT on AT&T's proposed new 12- satellites system. $ for Qualcomm. Another NYT piece is about "naysayers" of satellite services. And, Financial Times has a bountiful insert on Information Technology, with a lead story on Internet security, black- hearted hacking and, to the rescue, princely encryption and authentication. Or is the blanco prince a negro hacker? All these bleating for mana at Telecom 95 manana in gelt- berotten Geneva. From mdiehl at dttus.com Wed Oct 4 06:56:34 1995 From: mdiehl at dttus.com (Martin Diehl) Date: Wed, 4 Oct 95 06:56:34 PDT Subject: New Windoze PGP Shell (freeware) worth checking out Message-ID: <9509048128.AA812821174@cc2.dttus.com> On October 4, 1995, Adam Philipp at Internet-USA wrote: AEgis Research (who I know nothing about) has come out with a very pleasant windows fron end for PGP. It is bone-head compliant... LYCOS had 1 entry for AEgis Research, but that page could not be found on the cited server. Martin G. Diehl From devans at hclb.demon.co.uk Wed Oct 4 06:58:32 1995 From: devans at hclb.demon.co.uk (Dave Evans) Date: Wed, 4 Oct 95 06:58:32 PDT Subject: [Fwd] Security Threat to Internet shopping (DT) Message-ID: <812839578snx@hclb.demon.co.uk> Security threat to Internet shopping Daily Telegraph (paper edition), 3 October 1995, p. 12 by Robert Uhlig Home shopping on the Internet is under threat after hackers cracked the encryption coding used to protect credit card transactions on Netscape, the most popular software used for access. A second security flaw, discovered in Microsoft Windows 95's E-Mail electronic messaging system, has caused alarm. Ian goldberg and David Wagner, the hackers, belong to a group called Cypherpunks and said they had exposed Netscape's weaknesses to show the ease with which digital money or electronic messages could be intercepted by criminals, governments or business competitors. The two computer science students took only a few days to find that the software used a predictable date and time-based formula to generate a random encryption code made up of 30 numbers each time a message was sent. They then posted their findings on the Internet. Netscape responded by saying it would share parts of the security code with security experts including the Massachusetts Institute of Technology in the hope that this would improve its security. The company has also released a free updated version of its software for browsing the World Wide Web part of the Internet. The company said it also planned to extend the encryption key from 30 digits to 300 digits and use more random information to generate the key. However, American law on encryption technology forbids the export of software containing encryption keys longer than 40 digits, so Internet users outside America will not be able to download copies of the software from Netscape. Visa and Microsoft have been working jointly on what they call Secure Transaction Technology, which they claim will allow users to buy goods over the Internet. However, users of Microsoft's Windows 95 have found that it ignores the security passwords on private electronic mail sent or received using software other than Windows 95. (end) From steven at echonyc.com Wed Oct 4 07:24:48 1995 From: steven at echonyc.com (Steven Levy) Date: Wed, 4 Oct 95 07:24:48 PDT Subject: Web "places" and the media monsters In-Reply-To: <199509292319.QAA21372@netcom10.netcom.com> Message-ID: A tiny correction to Vladimir's interesting posting. It wasn't J.Gilmore I quoted on the "Titanic deck chair" in the NY Times, it was J.Barlow, who indeed has a propensity for soundbyte. From rthomas at pamd.cig.mot.com Wed Oct 4 07:50:54 1995 From: rthomas at pamd.cig.mot.com (Robert Owen Thomas) Date: Wed, 4 Oct 95 07:50:54 PDT Subject: Netscape hole without .Xauthority (fwd) In-Reply-To: <199510041102.MAA17689@piraya.electrum.kth.se> Message-ID: <9510040947.ZM16462@pamd.cig.mot.com> good points, Christian! more and more, networks are becoming flooded with X traffic. although X has always been known to be a potential security hole, i think X-attacks are going to increase dramatically in the coming months. i commonly hear of sights with Xauthority enabled, only to have the user community type "xhost +" at the prompt. bad karma. the days of pumping rude & crass noises to someone else's workstation will soon graduate to more nefarious and insidious attacks. is anyone looking into a means of securing X (above and beyond the current weak solutions)? regards, --robert -- o robert owen thomas: unix consultant. cymro ydw i. user scratching post. o o e-mail: Robert.Thomas at pamd.cig.mot.com --or-- robt at cymru.com o o vox: 708.435.7076 fax: 708.435.7360 o o "When I die, I want to go sleeping like my grandfather... o o Not screaming like the passengers in his car." o From jya at pipeline.com Wed Oct 4 08:17:16 1995 From: jya at pipeline.com (John Young) Date: Wed, 4 Oct 95 08:17:16 PDT Subject: FIZ_zle Message-ID: <199510041517.LAA15917@pipe4.nyc.pipeline.com> 10-4-95. W$Japer: "MasterCard, Backed by IBM and Others, Enters Fight for Internet-Payment Rules." MasterCard said it entered into a collaborative effort with IBM, Netscape, CyberCash and GTE to release a draft of technical requirements for any software companies and financial institutions that want to develop programs for electronic commerce. "Lockheed Plans Satellite System For $4 Billion." Lockheed Martin proposed to build a $4 billion satellite system for two-way global computer networking, videoconferencing and other on-demand services in a challenge to plans by the Hughes unit of GM and the separate Teledesic venture. Lockheed disclosed that it has filed for FCC authority to place nine large satellites in high-altitude orbits by about the year 2000 to form a new system called Astrolink for high-data-rate transmissions. "Morgan Stanley Puts $200 Million In Telecom Venture." In an effort to ride the global telecommunications boom, Morgan Stanley Capital Partners is investing $200 million in Sita Group in a move to allow the world-wide airline cooperative to create a for-profit telecommunications unit. Trinity: FIZ_zle (11 kb) From jya at pipeline.com Wed Oct 4 08:18:44 1995 From: jya at pipeline.com (John Young) Date: Wed, 4 Oct 95 08:18:44 PDT Subject: PIZ_zaz Message-ID: <199510041518.LAA16077@pipe4.nyc.pipeline.com> 10-4-95. NYPaper: "AT&T Puts New Emphasis On Satellites. 12-Spacecraft Network Proposed to Regulators." The AT&T Corporation, in an early sign of how it plans to pursue its Internet and global communications strategy after the company's planned divestiture, has quietly filed a Federal application to build and launch a multibillion-dollar global satellite network. The system would let computer users bypass local telephone networks and connect directly to the Internet via satellite dish antennas slightly larger than two feet in diameter. "Satellite Services Hear the Naysayers." The concept has great promise: a string of satellites offering global wireless telephone service, where the caller is never out of range. Making the concept reality, however, is proving stubbornly difficult. The four major services in the nascent global wireless business are on the defensive for the first time in their brief history. A pair of troubled debt offerings have raised questions about the viability of so-called global personal communications. "A New Computer Dazzles a Jaded Industry Crowd." The BeBox is incompatible with everything now on the market. But the sheer dazzle of the new personal computer by Jean-Louis Gassee, the former engineering head of Apple Computer Inc., drew a standing ovation from a normally skeptical crowd of 500 of some of the most discerning executives in technology. Trio: PIZ_zaz (16 kb) From tomw at orac.engr.sgi.com Wed Oct 4 08:18:52 1995 From: tomw at orac.engr.sgi.com (Tom Weinstein) Date: Wed, 4 Oct 95 08:18:52 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510031438.HAA06918@orac.engr.sgi.com> Message-ID: <199510041513.IAA01471@orac.engr.sgi.com> In article <199510040204.WAA22162 at clark.net>, Ray Cromwell writes: >> This is a bug in your X server, not in netscape. The X server should >> never crash no matter what you send to it. > That's true, but it is also true that Netscape should also be > performing some sanity checking on input rather than relying on > the supporting libraries to be secure. Remember, a hole is a hole. > The last sendmail bug was a buffer overflow in syslog, however, > sendmail still got patched to do bounds checking on the strings > it was passing to syslog. > It looks like this is only bug on BSDI2.0/XAccel, and NT3.5/NS1.1. But > is it wise for netscape to be sending 10,000 character strings to GUI > functions anyway? It's absolutely okay for netscape to send long character strings to the X server. In fact, all it's probably doing is putting long character strings into a Motif widget, which then sends them to the X server. This is also totally okay. -- Sure we spend a lot of money, but that doesn't mean | Tom Weinstein we *do* anything. -- Washington DC motto | tomw at engr.sgi.com From weld at l0pht.com Wed Oct 4 08:36:16 1995 From: weld at l0pht.com (Weld Pond) Date: Wed, 4 Oct 95 08:36:16 PDT Subject: New Windoze PGP Shell (freeware) worth checking out Message-ID: The program can be found at http://iquest.com/~aegisrc/utils.shtml Weld Pond - weld at l0pht.com - http://www.l0pht.com/~weld L 0 p h t H e a v y I n d u s t r i e s Technical archives for the people - Bio/Electro/Crypto/Radio From beeson at aclu.org Wed Oct 4 09:10:25 1995 From: beeson at aclu.org (Ann Beeson) Date: Wed, 4 Oct 95 09:10:25 PDT Subject: ACLU Cyber-Liberties Update 10/4 Message-ID: <199510041605.MAA08420@pipe2.nyc.pipeline.com> October 4, 1995 ACLU CYBER-LIBERTIES UPDATE **Premiere Issue** A bi-weekly online �zine on cyber-liberties cases and controversies at the state and federal level. ---------------------------------------------------------------------------------------------------------------------- FEDERAL PAGE (Congress/Agency/Court Cases) ---------------------------------------------------------------------------------------------------------------------- * "Virtual" Child Pornography Bill is Overbroad and Fails to Protect Real Children Despite the FBI's apparent success in raiding alleged child pornographers on America Online, Senator Orrin Hatch decided we needed a new child pornography law. Hatch's bill would expand the existing child porn law to include materials that are: -visual depictions of what "appears to be . . . a minor engaging in sexually explicit conduct;" and -visual depictions "advertised, promoted, presented, described, or distributed in such a manner that conveys the impression that the material is or contains a visual depiction of a minor engaging in sexually explicit conduct." In its effort to outlaw "virtual" child pornography, the bill would criminalize a wide range of constitutionally protected expression. Hatch attempts to justify the new bill by reference to a widely-publicized Canadian case in which a pornographer copied pictures of clothed children from catalogs and morphed them into child pornography. Senator Hatch claims that the case would not be covered under the existing federal child porn statute, but that issue has never been decided by a United States court. While the application of the existing statute to these facts is far from clear, the Hatch bill covers *much more* than just this case scenario. The statute would cover *any* image of a child engaged in sexual behavior, including non-computer-generated drawings, cartoons, and visual images created without the use of photos of real children or even real adults. In upholding child pornography laws, the Supreme Court has stated that "the nature of the harm to be combated requires that the state offense be limited to works that visually depict sexual conduct by children below a specified age. . . . [T]he distribution of descriptions or depictions of sexual conduct, not otherwise obscene, which do not involve live performance or photographic or other visual reproduction of live performances, retains First Amendment protection." _New York v. Ferber_, 458 U.S. 747, 764-65 (1982). Hatch's "virtual child porn" law is clearly unconstitutional because it would outlaw images produced without any involvement by an actual child. Bruce Taylor of the National Law Center for Families and Children argued at a recent conference at Brooklyn Law School that a "virtual child porn" law was needed because pedophiles use virtual porn to lure children. Under that rationale, if a pedophile used a piece of candy to lure a child into sex we would have to outlaw candy. In a free society, we cannot use censorship laws to try to control "bad thoughts." Outlawing all images that might be stimulating to pedophiles would require a massive amount of censorship and would *not* cure pedophilia. The ACLU reiterates its position on child pornography laws: "The ACLU believes that the First Amendment protects the dissemination of all forms of communication. The ACLU opposes on First Amendment grounds laws that restrict the production and distribution of any printed and visual materials even when some of the producers of those materials are punishable under criminal law." "The ACLU views the use of children in the production of visual depictions of sexually explicit conduct as a violation of childrens' rights when such use is highly likely to cause: a) substantial physical harm or, b) substantial and continuing emotional or psychological harm. Government quite properly has the means to protect the interest of children in these situations by the use of criminal prosecution of those persons who are likely to cause such harm to children." The Hatch proposal only demonstrates the dangers of trying to protect children indirectly through censorship laws. ---------------------------------------------------------------------------------------------------------------------- * Clipper II? Your electronic privacy rights are at stake . . . again. In 1993, the ACLU and an overwhelming majority of industry condemned the Clipper Chip -- the Administration's key escrow encryption scheme to equip every telecommunications device with a "chip" that would allow anyone to secure his private communications as long as the U.S. government held the descrambling key. The government insisted that Clipper would be merely a voluntary standard, but government documents requested under the Freedom of Information Act now confirm the suspicions of civil liberties advocates that the government really believes key escrowed encryption will only meet law enforcement standards if it is mandatory. (See URL:http://www.epic.org/crypto/) Now the Administration has returned with another scheme -- commercial key escrow ("Clipper II"). At close range, Clipper II is a lot like Clipper I: * Although supposedly "independent" of the government, key escrow agents will have to meet standards set by the U.S. government, and will have to reside in the U.S. or in a country with which the U.S. has entered a bilateral agreement. * The proposal provides no privacy safeguards to prevent the compromise of the key escrow agent or the key. * Offered as a "voluntary" standard, the proposal nevertheless forbids interoperability with non-escrowed encryption in exported products. * While the government says it recognizes industry's need for strong encryption, the proposal limits exportable encryption to 64 bits -- a length widely recognized to provide inadequate security. On September 6, 7, and 15, 1995, the ACLU attended meetings held by the National Institute for Standards and Technology (NIST) in Gaithersberg, Maryland. The meetings were called to solicit input from industry on the Clipper II proposal. Draft export criteria were considered on September 6-7, and the general industry response was very lukewarm -- except for a few industries that have been meeting with the Administration and are preparing to announce products that would fit the suggested criteria. The ACLU led one working group to vote 7-7 in favor of condemning the entire proposal. On September 15th, NIST discussed the implementation of a federal key escrow encryption standard. By requiring federal agencies to use commercial key escrow as a FIPS (Federal Information Processing Standard), the Administration clearly hopes to drive industry to accept commercial key escrow as the export standard as well. The ACLU issued the following statement on the current key escrow proposal: The American Civil Liberties Union's Position on the Administration's Current Key Escrow Proposal: * Encryption is speech protected by the First Amendment. The Administration's current key escrow proposal, like the Clipper proposal, continues to tread on the First Amendment rights of American individuals and businesses to use encryption technologies to secure their private communications. The current proposal, like Clipper, should be rejected on First Amendment grounds alone. * The current proposal will not accomplish its stated objectives because a wide array of encryption is available around the globe and will continue to be employed in place of American government-approved key escrow software. * The only key escrow proposal that could begin to satisfy the government's objectives would be an outright ban on the sale of encryption technologies other than those approved by the government and key escrowed. The ACLU fears that the current proposal, and similar proposals, are merely the first step towards mandatory key escrow of encryption. Mandatory key escrow is completely unacceptable to both industry and privacy advocates. * The Administration should abandon its fruitless and unconstitutional efforts to control the export of encryption technology. No legislation is needed -- the Administration has the power to lift the regulatory restrictions that it created. ---------------------------------------------------------------------------------------------------------------------- * Call for Plaintiffs in Suit to Challenge Online Indecency Legislation Most of you know that the House and Senate have now passed two different versions of the telecommunications bill that would outlaw "indecent" speech over the Internet and other online services. This fall, a conference committee of House and Senate members will work out the differences between the two telco bills and will probably approve some form of online censorship legislation. [For a copy of the legislation, send a message to infoaclu at aclu.org, with "Online Indecency Amendments" in the subject line.] While the ACLU and other advocacy groups continue to lobby Congress to remove the censorship provisions from the telco bill, it is highly likely that some restriction on online indecency will appear in the final bill that emerges from the conference committee. A coalition of civil liberties organizations are preparing a constitutional challenge to this legislation now. The coalition includes the ACLU, Electronic Frontier Foundation, Electronic Privacy Information Center, Media Access Project, and People for the American Way. We plan to be ready to file a lawsuit as soon as the statute is signed into law -- which could be as early as October. An important first step in planning the lawsuit is the selection of plaintiffs. We need to put together a set of plaintiffs that disprove the stereotype created by proponents of the legislation that people opposed to the bill are "pedophiles and pornographers." We believe that the best plaintiffs for this challenge will be persons or entities that provide material that some may deem "indecent" but that has serious artistic, literary, and educational value to our society. We need plaintiffs who use online networks to discuss or distribute works or art, literary classics, sex education, gay and lesbian literature, human rights reporting, abortion information, rape counseling, and controversial political speech. Please contact Ann Beeson at the ACLU if your organization is interested in being a plaintiff in this ground-breaking litigation that will define First Amendment rights in cyberspace. 212-944-9800 x788, beeson at aclu.org. ---------------------------------------------------------------------------------------------------------------------- STATE PAGE (Legislation/Agency/Court Cases) ---------------------------------------------------------------------------------------------------------------------- * Overbroad Searches and Seizures Threaten Electronic Privacy The latest threat to your civil liberties results from law enforcement's overzealous attempts to find evidence of crime or wrongdoing in cyberspace. As we move into the information age, traditional search and seizure rules will need to be refined to ensure fairness and respect for electronic privacy rights. Several recent cases illustrate how privacy rights can be violated when law enforcement conducts investigations in cyberspace. * The ACLU recently wrote to America Online to inquire about their cooperation in the FBI's recent raid of alleged child pornographers who used the online service. The ACLU asked, among other things, whether AOL revealed any information about individual users that was not sought by subpoena or court order; whether AOL turned over all private e-mail messages of suspects or whether they turned over only messages related to the alleged crime; whether AOL also turned over the names, addresses, and e-mail messages of persons who had communicated with the suspects; whether AOL set up accounts for the purpose of allowing government investigators to have access to public chat rooms; and what information AOL regularly keeps about its users' online activity and how long the information is kept. * In Cincinnati, Ohio, a computer bulletin board operator filed a civil rights suit against the Hamilton County Sheriff's Department after the department raided the BBS and seized computer equipment, files, and personal communications. The case argues that the indiscriminate search and seizures violated the BBS operator's free speech and privacy rights. See _Emerson v. Leis_, S.D. Ohio, No. C-1-95-608. The subscribers to the BBS have filed a separate class action suit against the sheriff's department. See _Guest v. Leis_, S.D. Ohio. Law enforcement seized the entire BBS -- all the hardware, software, files, and private communications -- in an effort to obtain 45 files on the BBS that were allegedly obscene. The case asserts that the 45 files represented only 3% of the total resources on the board. * In California, Colorado, and Virginia, the Church of Scientology has brought three copyright infringement actions against anti-scientologists who use online communications to criticize the church. The cases raise important questions about the breadth of computer communications seizures in civil cases. The ACLU of Southern California and the ACLU of Colorado continue to monitor the cases in their states. ---------------------------------------------------------------------------------------------------------------------- * Nine States This Year Passed Online Censorship Legislation While online activists have been busy fighting the pending federal attempts to censor online communications, state legislatures have been carelessly crafting online censorship bills at home. And if you think Congress is full of Luddites, just wait until to hear what your state legislators have come up with. At least nine states (CT, GA, IL, KS, MD, MT, NJ, OK, VA) have passed legislation this year to regulate online content, and several others considered such bills, with some still pending. These bills seek to criminalize a wide range of online speech and content, including: * speech that "harasses, annoys, or alarms" * materials deemed "indecent," "obscene" or "harmful to minors" * information related to "terrorist acts" or "explosive materials" The state bills, like the federal bills, raise serious free speech and privacy concerns. None of the bills indicates an understanding of the unique nature of the online medium. Some bills purposefully, and other bills inadvertently, fail to clarify that only the initiators of the illegal images may be held liable -- so service providers can be held liable for the pedophiles and pornographers that use their networks. The laws would, at best, require service providers to snoop in private e-mail in order to avoid criminal liability. At worst, these laws would force providers to shut down their networks altogether. The draconian effect of these state bills doesn't stop at state borders. A message you post to the Internet today in New York City could travel the fifty states and the globe by tomorrow. You'd better be careful that the message isn't "obscene" according to an Oklahoman, "annoying" to a Connecticutter, "solicitous" of a minor in Illinois, or related to "terrorism" as defined by a Georgian. The wave of online censorship at the state level is far from over. The ACLU is considering constitutional challenges to the online censorship laws that passed this year. But given the continuing media hype over "cyber-porn," we are certain to see more censorship bills from the states next year. With the help of affiliate offices in fifty states, the ACLU continues to monitor these state attempts to infringe on your online free speech rights. [For a synopsis of all the online censorship bills passed or considered by the states this year, send a message to infoaclu at aclu.org with "Update of State Bills" in the subject line of the message.] ---------------------------------------------------------------------------------------------------------------------- * Saving the Best for Last: Good News on Cyber-Liberties ARIZONA: Another troubling application of existing obscenity laws to cyberspace was averted when charges were dropped against Arizona Department of Public Safety Officer Lorne Shantz. Shantz, who ran a community bulletin board, lost his job and endured several months of hassle and humiliation when he was arrested for allegedly "obscene" files on the board. Shantz maintains that he was unaware of the existence of the files, which represented only a minuscule fraction of all the information on the board. COLORADO: Federal Judge John Kane ordered the Church of Scientology to return computers and hundreds of files seized by Federal marshals and Scientology officials in a copyright infringement action. The judge ruled that the seizures were overbroad, and said that "The public interest is best served by the free exchange of ideas." ---------------------------------------------------------------------------------------------------------------------- ONLINE RESOURCES FROM THE ACLU ---------------------------------------------------------------------------------------------------------------------- Stay tuned for news on the ACLU's world wide web site, under construction at http://www.aclu.org. In the meantime, you can retrieve ACLU documents via gopher at gopher://aclu.org:6601 (forgive the less-than-updated state of our gopher -- we've devoted all our resources to WWW construction!). If you're on America Online, check out the live chats, auditorium events, *very* active message boards, and complete news on civil liberties, at keyword ACLU. ---------------------------------------------------------------------------------------------------------------------- ACLU Cyber-Liberties Update Editor: Ann Beeson (beeson at aclu.org) American Civil Liberties Union National Office 132 West 43rd Street New York, New York 10036 To subscribe to the ACLU Cyber-Liberties Update, send a message to infoaclu at aclu.org with "subscribe ACLU" in the subject line of your message. To terminate your subscription, send a message to infoaclu at aclu.org with "unsubscribe ACLU" in the subject line. For general information about the ACLU, write to infoaclu at aclu.org. ---------------------------------------------------------------------------------------------------------------------- From gebis at ecn.purdue.edu Wed Oct 4 09:11:38 1995 From: gebis at ecn.purdue.edu (Michael J Gebis) Date: Wed, 4 Oct 95 09:11:38 PDT Subject: Netscape hole without .Xauthority (fwd) Message-ID: <199510041611.LAA20818@purcell.ecn.purdue.edu> Robert Owen Thomas wrote: > more and more, networks are becoming flooded with X traffic. although X > has always been known to be a potential security hole, i think X-attacks > are going to increase dramatically in the coming months. > > i commonly hear of sights with Xauthority enabled, only to have the user > community type "xhost +" at the prompt. bad karma. the days of pumping > rude & crass noises to someone else's workstation will soon graduate to > more nefarious and insidious attacks. > > is anyone looking into a means of securing X (above and beyond the current > weak solutions)? I have not used it for this purpose, but ssh claims to do "Secure X11 sessions." Actually, I'm interested in what the cypherpunks think of ssh in general; I'm not able to do a strong analysis of the code myself. If it does everything it claims to do, it's a very powerful tool; however, I don't know of any in-depth studies of ssh security. -- Mike Gebis gebis at ecn.purdue.edu From sinclai at ecf.toronto.edu Wed Oct 4 09:35:25 1995 From: sinclai at ecf.toronto.edu (SINCLAIR DOUGLAS N) Date: Wed, 4 Oct 95 09:35:25 PDT Subject: About that simple hardware RNG In-Reply-To: <951003.173054.7O1.rnr.w165w@cybrspc.mn.org> Message-ID: <95Oct4.075144edt.1878@cannon.ecf.toronto.edu> > The idea: noise from an avalanching diode is applied to the input of an > 8 bit shift register. The SR is clocked at some fairly high sampling > rate. The 8 bits are made available on the printer port. The shift register and timer probably involves 2 microchips. Why not just use 8 avalanching diodes, one for each bit. Infact, you can use 13 if you use the other printer-port input lines. From Holger.Reif at PrakInf.TU-Ilmenau.DE Wed Oct 4 09:39:25 1995 From: Holger.Reif at PrakInf.TU-Ilmenau.DE (Holger Reif ) Date: Wed, 4 Oct 95 09:39:25 PDT Subject: [Fwd] Security Threat to Internet shopping (DT) Message-ID: <9510041637.AA27588@PrakInf.TU-Ilmenau.DE> >Security threat to Internet shopping > >Daily Telegraph (paper edition), 3 October 1995, p. 12 > >[...] >However, users of Microsoft's Windows 95 have found that it ignores the >security passwords on private electronic mail sent or received using >software other than Windows 95. Never heard of this before, but it seems that MS assumes there's no mail like windows'95 mail? If all use it, you have no holes any longer. You or your partners don't use Windows'95? That's your problem not ours! read you later - Holger Reif http://remus.prakinf.tu-ilmenau.de/Reif/ From sameer at c2.org Wed Oct 4 11:05:49 1995 From: sameer at c2.org (sameer) Date: Wed, 4 Oct 95 11:05:49 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <44td0c$3um@tera.mcom.com> Message-ID: <199510041800.LAA07074@infinity.c2.org> > How do I decide what is too long? For example, when tracking down buffer > overflow problems for the security patch, we found an undocumented > static buffer limit of 64 bytes for the hostname passed to gethostbyname() > on IRIX. Before we stumbled across this problem, we had a discussion > about what length we should truncate host names to. People thought > that 128 characters was a reasonable limit, but it turned out that it > was too long. Isn't there a resolver #define or something in limits.h called MAXHOSTNAMELEN ? Something like that? (Perhaps not, but that's what I recall..) > latent bugs. We are also beefing up our QA to try to find more > of these types of bugs. > great! -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 An Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From anonymous-remailer at shell.portal.com Wed Oct 4 11:23:15 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Wed, 4 Oct 95 11:23:15 PDT Subject: Random number generators Message-ID: <199510041822.LAA22783@jobe.shell.portal.com> http://www.uni-karlsruhe.de/~RNG/ > Random number generators > > -------------------------------------------------------------------- > Diese Seite gibt es noch nicht in Deutsch. > -------------------------------------------------------------------- > > Classification of random numbers > > Random numbers for use in computer programs can be classified into 3 > different categories: > > * Truely random numbers: > Truely random numbers obviosly cannot be produced by computer > programs, they must be supplied by an external source like > radioactive decay. Such sequences are available (e.g. on > magnetic tape), but clumsy to use and often not sufficient in > terms of speed and number. > * Pseudorandom numbers: > A sequence of numbers is generated by an algorithm in a way > that the resulting numbers look statistically independent and > uniformly distributed. This is the prevailing method used in > random number generators. > * Quasirandom numbers: > These are generated by algorithms tuned to optimize the > sequences uniform distribution, which can improve the accuracy > of Monte-Carlo integration. These numbers are not independent > and thus cannot be used generally. > > Other than uniform distributions can be generated by suitable > transformations of the basic uniformly distributed sequence. > Numerical libraries often offer a rich set of distributions. > > Desirable properties of (pseudo) random numbers > > A good random number generator (RNG) should have the following > properties: > > * Good statistical properties: > There are theoretical and empirical tests to judge a RNGs > quality. Every generator should always be tested with one's > actual application: the standard tests can only disqualify a > RNG and may not check for the properties the application > requires. > * Long period: > RNG algorithms are iteration formulae. The state is often > stored in a single integer, in this case there cannot be more > states than representable integers (recall 2^30 \approx 10^9). > * Reproducibility: > All generators can initialize the sequence by a starting seed. > Storing and reloading a generator's internal state is also > useful. > * Portability: > This concerns both programming language (e.g. Fortran 90 or > ANSI C) as well as machine-dependent (e.g. floating point > representation) aspects. The ideal RNG produces (bit-) > identical results in every environment. > * Efficient implementation: > This may be irrelevant for "general purpose" generators. But > time-critical applications may require inline coding and/or the > generation of whole vectors of random numbers at once. Vector > and parallel computers need special RNG methods. > > Which of these aspects is most important depends on the actual > application, of course. > > Miscellaneous RNG material > > What follows is a collection of material on pseudorandom number > generators. I hope to improve this soon... > > * The RNG Chapter of Designing and Building Parallel Programs by > Ian Foster > * The pLab pages at Salzburg University > * The RNG Document of ORNL's Computational Science Education > Project > * My publications on RNGs are available online, also some slides > * My BiBTeX-bibliographies of articles and books on random number > generation > * The RAND/VP package contains a RNG tuned for our vector > computer SNI S600/20 > * The NAG and IMSL Fortran libraries contain random number > generators for various distributions > * Popular public-domain sources include the StatLib and NetLib > libraries > * My publications on RNGs and the RANEXP library are available by > anonymous ftp also. > URL: ftp://ftp.rz.uni-karlsruhe.de/pub/misc/random/ > * A good source of RNG codes and articles is the journal Computer > Physics Communications, ISSN 0010-4655, published by > North-Holland. > > -------------------------------------------------------------------- > Michael Hennecke / 21.07.1995 From MIGUELDIAZ at megaweb.com Wed Oct 4 11:38:52 1995 From: MIGUELDIAZ at megaweb.com (MIGUELDIAZ at megaweb.com) Date: Wed, 4 Oct 95 11:38:52 PDT Subject: `Hack Microsoft' challenge is NYT Computer News Daily's top story Message-ID: <199510041836.OAA08014@mail-e1a.megaweb.com> >MIGUEL DIAZ writes: >> I don't know about everyone else, but a T-shirt seems a > very >> small reward for uncovering a "hole" in the encryption >> algorithm of Microsoft products. > >I don't know about anyone else, but helping to protect the > confidential data >of millions of users around the world seems a very large > reward for >uncovering a hole in the encryption algorithms of M$ > products. > >Clearly, YMMV. > >-Futplex If it means protection only when using a proprietary product owned by Microsoft then no, I still don't see it as much of a reward. If we are talking a system which can be used by everyone at no cost, then yes that would be motivating. From mg5n+alias!rngaugp at andrew.cmu.edu Wed Oct 4 12:06:51 1995 From: mg5n+alias!rngaugp at andrew.cmu.edu (mg5n+alias!rngaugp at andrew.cmu.edu) Date: Wed, 4 Oct 95 12:06:51 PDT Subject: No Subject Message-ID: <199510041902.MAA00279@miron.vip.best.com> -----BEGIN PGP SIGNED MESSAGE----- There is now support for using a hardware random number generator with the most recent versions of PGP. Versions pgp 2.62 unofficial international versions, pgp 2.62 international version and pgp 2.62 (from mit) are supported. The files for this modification of pgp are at the export controled ftp site in the directory: ftp://ftp.csn.net/mpj/I_will_not_export/crypto_????????/pgp/rng the files are: rg262mit.zip rg262i.zip (Can be used in Canada) rg262ui.zip (Can be used in Canada) Sources for the modifications are included. Executables are included for OS/2 and MSDOS. In the above ????????? varies because of the export control scheme. To get the files if you are in the U.S. and Canada first get the file ftp://ftp.csn.net/mpj/README.MPJ and follow the instructions. Many thanks to mpj at netcom.com for providing storage at the export controled ftp site. Here is the README file that comes with the modifications. - ---------------------------------------- Hardware Random Number Support for PGP. Version Ever get tired of typing in keyboard timing strokes while generating a PGP key? Ever want to use PGP unattended, but be foiled because there is no one there to type the keyboard timing strokes? Ever wonder if PGP's method of generating random number might have some subtle flaw which would expose it to cryptanalysis? This is a modified version of PGP which allows it to be used with a hardware random number generator. Two kinds of RNG are supported: First, any RNG with a IO driver that makes the RNG look like a file that can be opened (fopen) such that each byte read is a random byte. Second, a bus RNG under the x86 architecture such that random bytes my be obtained with a simple "IN" instruction. The CALNET/NEWBRIDGE RNG is an example of this kind of RNG. A crude sanity check is done to check that the bytes appear to be random. To use the hardware random number generator feature of this software, you must define _ONE_ of the new configuration file parameters RNGDRIVER or RNGPORT in config.txt or from the command line. If you have a RNG of the first type, define RNGDRIVER to be the complete path to the RNG driver. If you have a RNG of the second type, define RNGPORT to be the port number from which to get random numbers. You can use hexadecimal i.e. 0x300. Examples: RNGDRIVER=/dev/random or RNGPORT=0x300 If neither of these are defined the modified PGP will get its RANDOM numbers in exactly the same way that regular PGP does, through keyboard timing. If one of these parameters is set correctly, the modified PGP will get its random numbers from the RNG and you will never be asked to type keyboard timing stokes. I have compiled a version of PGP that supports a hardware RNG for MSDOS and OS/2. I have included the source files for each file that has been modified. To compile get the original source files, put in the modified files and compile as usual. The new source files and this software are covered by the same license as the original, LICENCE. There are similar available modifications for the other two major versions of PGP, OTHERS. If someone out there has an PSI-LINE random number generator that attaches to a RS-232 port as if it were a modem, please test it with this software. If the software line characteristics (baud rate, flow control, stopbits, ect) are set correctly (You will have to do this yourself, as this modified PGP does not do this) then all you should have to do is set RNGDRIVER to the RS232 device name. I have not tested this because I do not have this kind of RNG. Someone may wish to add code to set the software line characteristics, but this may be difficult, as the code would vary by operating system and even among the various flavors of UNIX. If you do such a test please report the results to alt.security.pgp and cypherpunks. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHK/Sc29s2mG+tTVAQE0hwQAoDsgqF6AoIGCNOSOdWZemrGRl4/MVvjR xiwhgROtjFM1FEL4Ak/j8YlR/LSCbOdeF3hZzesaZq8xC25qwlXFEtDX8kqim3zh bOglEMW/x3M9uBQLm0Nyc8FTickaAD3L1Gsa/YMY2slmN3PrZiY0/KSVpPXEMHjK GjeM2U7XJSk= =E5gC -----END PGP SIGNATURE----- From Jerry_Ellig at jec.senate.gov Wed Oct 4 12:27:30 1995 From: Jerry_Ellig at jec.senate.gov (Jerry_Ellig at jec.senate.gov) Date: Wed, 4 Oct 95 12:27:30 PDT Subject: David Chaum testimony Message-ID: <9509048128.AA812845568@smtpgwys.senate.gov> I'm a professor from George Mason University on leave to do some work with the Joint Economic Committee on the economy of the 21st century. I found your e-mail address attached to some congressional testimony by David Chaum. Does anyone know when he testified, and before what committee? Being new on Capitol Hill, I haven't yet found the easy way to find this out from inside the government! From rah at shipwright.com Wed Oct 4 12:45:29 1995 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 4 Oct 95 12:45:29 PDT Subject: CSPAN2: Copyright on the Internet Message-ID: It's 3:43 pm EST, and CSPAN-2 has Cerf, the CO$ counsel, and others on a panel about copyright on the internet... Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From dlv at bwalk.dm.com Wed Oct 4 12:47:47 1995 From: dlv at bwalk.dm.com (Dr. Dimitri Vulis) Date: Wed, 4 Oct 95 12:47:47 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m In-Reply-To: Message-ID: [alt.religion.scientology restored, since that's where most of the discussion of forged cancels has been taking place so far ] In article <44pmiq$h7t at segfault.monkeys.com>, rfg at monkeys.com (Ronald F. Guilmette) writes: >In my opinion, the simple, obvious, and correct solution (which should have >been implemented from day one, IMHO) is to modify the currently prevalent >news processing packages (i.e. INN and Cnews) so that rather than physically >removing canceled news article files from the directories where they exist, >they are instead edited (by INN and/or Cnews) in place, and retained for >future reference. Because of the prevalence of forged cancels, my site just ignores all cancels. Unfortunately, most other sites, including our feeds, honor forged cancels. [Good suggestions skipped] >Bottom line: Article cancelations are known to be based upon highly in- >secure mechanisms. Forged cancels are becoming more common. Many of >these are desirable deletions of spam. Others are problematic instances >of untrustworthy individuals attempting to act as unelected news admini- >strators for the entire Internet. Until such time as more secure article >cancelation mechanisms are put in place (and perhaps even afterwards) >mechanisms which provide for the retention of adequate audit trails >relating to canceled articles should be created and widely adopted. >The current approach/convention/solution/mechanism of physically *deleting* >an article file whenever _anybody_ on the world-wide Internet tells your >news system to do so is simply not acceptable. The cancellation mechanism described in RFC 1036 does not use digital signatures, but is based on the honor system. RFC 1036 says in section 3.1: "Only the author of the message or the local news administrator is allowed to send this message." However no mechanism is provided to authenticate the origin of a cancel. Of late, a small group of control freaks has abused this security hole, claiming (with no basis in reality) that some sort of consensus permits them to act as the self-appointed judges of the contents of other people's Usenet articles, to impersonate other posters, and to distribute forged cancels to other sites to censor the offending articles. E.g., one graduate student at Lehigh University falsely claims to be a sysadmin and regularly forges cancels for articles in n.a.n-a.m critical of his forgeries and other net-abuse; and a crtiminal cult has been forging cancels for articles discussing its dogmas. I'd like to remind everyone of the well-thought-out scheme for authenticating cancels proposed some time ago by Taneli Hujskonen and Benjamin Franz, that can also be integrated into a Lazarus-like system for tracing forged cancels. Let H denote a one-way hash function (also known as message digest), such as Ron Rivest's MD5 or Ralph Merkle's Snerfu. Efficient source code to compute them is readily available and not subject to export restrictions, unlike PGP. Such functions have the property that's it's easy (for a computer) to compute M = H(N), but, for a given M, it's intractable to find N such that M = H(N). Let the poster specify a secret passphrase whenever s/he posts an article. This passphrase will be required to cancel the article. However it will not be revealed by a cancel and can be reused. With user-friendly software, the poster might store the passphrase in a profile and use the same passphrase for all articles, or change it for every message. When an article is posted, two quantities are computed by the posting program: M1 = H(article body + newsgroups + message-id + date + passphrase) and M2 = H(M1). The posted article contains the header "Cancel-lock: M2". When an attempt is made to cancel/supersede an article X with a "Cancel-lock:" header, the user is asked to supply the passphrase. The posting software computes M1 = H(X's body + newsgroups + X's message-id + date + passphrase) once again and adds the "Cancel-key: M1" header to the article containing "Control: cancel " or "Supersedes: " that's being posted. (Note that without knowing the passphrase it's intractable to match the M1.) Whenever news server software (such as inn) detects either "Control: cancel " or "Supersedes: ", INN should retrieve the original article and looks for the "Cancel-lock: M2" header. If one is found, then the old article may be cancelled only if the new article contains the header "Cancel-key: M1" such that H(M1) = M2. If the cancel cannot be authenticated (e.g., because the original article lacks the "Cancel-lock: M2" header, or the cancel lacks the "Cancel-key: M1" header such that H(M1)=M2), then INN should forward the unauthenticated cancel to one or more "collection centers" so the author of the original article may be notified. A site may choose to honor the unauthenticated cancel anyway if the article being cancelled lacks the "Cancel-lock: M2" header, but should ignore it if "Cancel-lock:" is found, but no matching "Cancel-key:" is given. Each "collection center" deamon should wake up periodically (say, every hour), group the collected unauthenticated cancels by message-ids of the cancelled articles, and e-mail the (distinct) addresses (other than "usenet@*" or "news@*") mentioned in the "From:", "Sender:", "Authorized:", and "X-Cancelled-By:" headers, quoting the unauthenticated cancel and the Path's as seen at many different sites that forwarded the cancels. This way, if the unauthenticated cancel is indeed forged, its author will see within hours that it has been fraudulently cancelled _and_ will automatically receive enough "Path:" samples from all over the world to see where it was posted, by comparing the "Path:" headers in several forwarded copies. A user or an entire site can easily "opt out" of havings "bona fide" cancels reported by always using the proposed "Cancel-lock:/Cancel-Key:" headers. This scheme would be upwardly compatible with all existing Usenet software. It would also be compatible with the "NoCeM" proposal, where trusted censors could issue digitally signed "advisory cancels" without impersonating the original posters. Such advisory cancels would not be subject to hash checks. --- Dr. Dimitri Vulis Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From abc at gateway.com Wed Oct 4 13:12:10 1995 From: abc at gateway.com (Alan B. Clegg) Date: Wed, 4 Oct 95 13:12:10 PDT Subject: Digest [full] version available Message-ID: I have setup an un-moderated digest of the Cypherpunks mailing list and it is now available for everyone.. My main goal on Cypherpunks is to lurk and the digest version lets me do that without being forced to read each one as it comes in.. [or filter the posts into a mailbox that I have a bad tendancy to leave for long periods of time...] Digests will be created every 40K bytes. subscribe by sending e-mail to majordomo at gateway.com with a BODY line: subscribe cypherpunks-d Enjoy.. -abc It's time to stand and cry | Alan B Clegg That Freedom will not live | President Beyond our willingness to die | Gateway Communications -Lester Bork | http://www.gateway.com From altitude at cic.net Wed Oct 4 13:20:55 1995 From: altitude at cic.net (Alex Tang) Date: Wed, 4 Oct 95 13:20:55 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <199510041800.LAA07074@infinity.c2.org> Message-ID: <199510042020.QAA01358@petrified.cic.net> -----BEGIN PGP SIGNED MESSAGE----- On Wed Oct 4 14:00:26 1995: you scribbled... > > > How do I decide what is too long? For example, when tracking down buffer > > overflow problems for the security patch, we found an undocumented > > static buffer limit of 64 bytes for the hostname passed to gethostbyname() > > on IRIX. Before we stumbled across this problem, we had a discussion > > about what length we should truncate host names to. People thought > > that 128 characters was a reasonable limit, but it turned out that it > > was too long. > > > Isn't there a resolver #define or something in limits.h called > MAXHOSTNAMELEN ? Something like that? (Perhaps not, but that's what I > recall..) The DNS RFC specifies that the max hostname should be 255 characters, with a 63 character limit for each segment of the name (RFC1035, section 2.3.4.) - --> 2.3.4. Size limits - --> - --> Various objects and parameters in the DNS have size limits. They are - --> listed below. Some could be easily changed, others are more - --> fundamental. - --> - --> labels 63 octets or less - --> - --> names 255 octets or less But, some older systems (SunOS4, and IRIX, amongst others) have the MAXHSTNAMELEN defined as 64 characters, so this limits the max name to 64. Solaris2 has MAXHOSTNAMELEN defined to 255 characters. (the define is in sys/param.h for sunos and solaris). just a point of interest... ...alex... -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Alex Tang or Alex Tang iQCVAwUBMHLsMaNd+TOtm9v5AQGbGQQAiFMaOyaLQlJgO+47dkw4H4O4FP8dJooR lkFmooBTFr/BWaZ7Zl9KFwCSwm/COH5ZfQpf6zo0pWlvGYDVAYPomaV90Z1zg+dk 0jNhidLwCrxlNOKa+MyqBJiUpfyq76OW46A9V1VDa5OH8g8bbv8zn//GJCGlF+6K 3s+zjFkR4tM= =0I/O -----END PGP SIGNATURE----- From dl at hplyot.obspm.fr Wed Oct 4 13:24:31 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Wed, 4 Oct 95 13:24:31 PDT Subject: New version of my privacy enhanced www proxy is out Message-ID: <9510042024.AA16962@hplyot.obspm.fr> I've thrown into the tclbin-0.6b1.tgz (ftp hplyot.obspm.fr/tcl) MD5 checksums/digest support, improved server home page at http://hplyot.obspm.fr:6661/ that shows your headers, ongoing support for POST method, online admin config, passwd... The proxy now issue "Content-Checksums: md5=xxxxxx" headers for its stuff, I 'invented' that syntax, any www guru to tell me if it already exists under another form ? (i checked the http docs at w3.org, found nothing) I'm still waiting for comments and people to use it and start a network dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept NORAD colonel Mossad cryptographic Chirac Pasqua mururoa From barrett at iafrica.com Wed Oct 4 14:00:39 1995 From: barrett at iafrica.com (Alan Barrett) Date: Wed, 4 Oct 95 14:00:39 PDT Subject: New version of my privacy enhanced www proxy is out In-Reply-To: <9510042024.AA16962@hplyot.obspm.fr> Message-ID: > The proxy now issue "Content-Checksums: md5=xxxxxx" > headers for its stuff, I 'invented' that syntax, any www guru to tell > me if it already exists under another form ? (i checked the > http docs at w3.org, found nothing) RFC 1544 specifies the Content-MD5 header field for use with MIME-conformant messages. It looks like this: Content-MD5: Q2hlY2sgSW50ZWdyaXR5IQ== --apb (Alan Barrett) From shamrock at netcom.com Wed Oct 4 14:12:47 1995 From: shamrock at netcom.com (Lucky Green) Date: Wed, 4 Oct 95 14:12:47 PDT Subject: David Chaum testimony Message-ID: <199510042110.RAA28372@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <9509048128.AA812845568 at smtpgwys.senate.gov>, Jerry_Ellig at jec.senate.gov wrote: > I'm a professor from George Mason University on leave to do some work > with the Joint Economic Committee on the economy of the 21st century. > I found your e-mail address attached to some congressional testimony > by David Chaum. Does anyone know when he testified, and before what > committee? Being new on Capitol Hill, I haven't yet found the easy > way to find this out from inside the government! The full text of the testimony is available at http://www.digicash.com/publish/testimony.html - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHL4SSoZzwIn1bdtAQEjdAGAhUoSwRu803hFI8ARmqsmbASy1CNNK7Cj rl5Tw5mMVGoZcPwhsyO5Af02z6lhIfyw =L1hB -----END PGP SIGNATURE----- From karlsiil at attmail.com Wed Oct 4 14:21:52 1995 From: karlsiil at attmail.com (Karl A Siil) Date: Wed, 4 Oct 95 14:21:52 PDT Subject: New Windoze PGP Shell (freeware) worth checking out In-Reply-To: Message-ID: OK, I'll bite. Where do I get it? Where did you get your info? Do you have a copy? Karl A.Siil AT&T BCS Holmdel, NJ ------------- Begin Original Message ------------- Date: Wed Oct 4 03:26:58 -0700 1995 From: internet!powergrid.electriciti.com!adam (Adam Philipp) Subject: New Windoze PGP Shell (freeware) worth checking out To: internet!toad.com!cypherpunks Content-Type: Text Content-Length: 1313 -----BEGIN PGP SIGNED MESSAGE----- AEgis Research (who I know nothing about) has come out with a very pleasant windows fron end for PGP. It is bone-head compliant, and even works well in Win95. I'm only plugging because I was so impressed. Until Eudora has PGP hooks, this is my shell of choice. Adam Philipp -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBMHJgjm/ZTaRmpgTFAQGp+wf7BO36FpbAdLdDieORKldIe3MvPa8wUDpR Rax38rxSP+aeR0toqtuldmWpfV5I+p40d+6pgWVfOKegS38Qt3k6rEt3r7C++Efi PQZLOE3b4RHT5ZeS4klEZtwu1A8nTWMVZFkwcxTb6s+C3KYv9JxdXFHnrOPlnkcL 5AJhUDvznMnA1WhKmknNjXhGJH9FKtvNuTO/k1fmD6YwclqAbKBiuGwQduWqZfwI 0zGZlpSfbuZ6sCsbHFnw1wJIOONyAEr1dB5qhyV3rX00hm6KfSNsuGqwvlDhaOM9 lODlFwBVt+PJIRHVocCcCdp7/5ffE/hTIXoRNYYF0kcZTotJP05SXg== =fvcQ -----END PGP SIGNATURE----- From futplex at pseudonym.com Wed Oct 4 15:09:14 1995 From: futplex at pseudonym.com (Futplex) Date: Wed, 4 Oct 95 15:09:14 PDT Subject: David Chaum testimony In-Reply-To: <9509048128.AA812845568@smtpgwys.senate.gov> Message-ID: <199510042211.SAA22395@ducie.cs.umass.edu> Jerry Ellig writes: > I found your e-mail address attached to some congressional testimony > by David Chaum. Does anyone know when he testified, and before what > committee? Being new on Capitol Hill, I haven't yet found the easy > way to find this out from inside the government! According to http://www.digicash.com/publish/testimony.html, he testified on July 25, 1995 before the Subcommittee on Domestic and International Monetary Policy of the House Committee on Banking and Financial Services. -Futplex From snevel at schwab.com Wed Oct 4 15:19:25 1995 From: snevel at schwab.com (Simeon ben Nevel) Date: Wed, 4 Oct 95 15:19:25 PDT Subject: New Windoze PGP Shell (freeware) worth checking out In-Reply-To: Message-ID: On Wed, 4 Oct 1995, Karl A Siil wrote: > OK, I'll bite. Where do I get it? Where did you get your info? Do you have a > copy? > From: internet!powergrid.electriciti.com!adam (Adam Philipp) > Subject: New Windoze PGP Shell (freeware) worth checking out > -----BEGIN PGP SIGNED MESSAGE----- > > AEgis Research (who I know nothing about) has come out with a very pleasant > windows fron end for PGP. It is bone-head compliant, and even works well in > Win95. I'm only plugging because I was so impressed. Until Eudora has PGP > hooks, this is my shell of choice. I saw it on alt.security.pgp it's at It is pretty nice The url to download isn't on the home-page though, but it's only one level down... just snoop about a bit. simeon =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= snevel at schwab.com #include std.disclaimer I speak for myself and no one else From dl at hplyot.obspm.fr Wed Oct 4 15:39:36 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Wed, 4 Oct 95 15:39:36 PDT Subject: New version of my privacy enhanced www proxy is out In-Reply-To: <9510042024.AA16962@hplyot.obspm.fr> Message-ID: <9510042239.AA17348@hplyot.obspm.fr> (BCCed to aproxy list, to avoid followup troubles) Alan Barrett writes: > > The proxy now issue "Content-Checksums: md5=xxxxxx" Btw i typoed, I use "Content-Checksum: md5=" like in "Content-Checksum: md5=0246be185424cc79b61f4a55b73362c1" like does the "md5" and md5sum (pgp's contrib dir) programs > > headers for its stuff, I 'invented' that syntax, any www guru to tell > > me if it already exists under another form ? (i checked the > > http docs at w3.org, found nothing) > > RFC 1544 specifies the Content-MD5 header field for use with > MIME-conformant messages. It looks like this: > > Content-MD5: Q2hlY2sgSW50ZWdyaXR5IQ== Thanks very much for pointing out, I don't like the fact they somehow hard wired the checksum/digest algorithm in the keyword name, it is imo a bad idea, when you will want to use another algorithm, also the rfc state that the checksum applies to "canonical" form, the one I want applies to the "Content-Length" bytes you read, whatever they are (no interpretation), and I don't like the use of base64 which is not nice if you want to check with existing md5,md5sum programs what you get. I stepped meanwhile on a draft on authorization scheme using digest, which might be interesting... when implemented client side... more on this later (ref: http://www.ics.uci.edu/pub/ietf/http/draft-ietf-http-digest-aa-01.txt see also http://www.ics.uci.edu/pub/ietf/http/draft-ietf-http-mda-00.txt for a "mediated digest" authentification/security scheme) dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept genetic security Legion of Doom spy CIA munitions Serbian From jgrubs at left.webcasters.com Wed Oct 4 15:48:58 1995 From: jgrubs at left.webcasters.com (Jim Grubs W8GRT) Date: Wed, 4 Oct 95 15:48:58 PDT Subject: Keyserver keyrings Message-ID: syrinx at c2.org (Syrinx Anonymous Remailer) writes: > According to 'Derek Atkins': > > > The name pgp.mit.edu is now > > pointing at another machine (which I do not maintain). For access to > > the keyring, send email to pgp-public-keys at pgp.mit.edu -- that is the > > supported method of access. > > does anybody out there maintain a current keyring that can be grabbed > via anon ftp instead? It seems like a waste of time for hundreds of > users to continually add updates to their own keyrings when the whole > keyserver ring can be picked up at one time, updates and all? ftp is > much more convenient than stringing together multiple sections received > by e-mail. That's what I did with WS_FTP until they stopped updating it on August 24th. [Pgpkeys] HOST=ftp.informatik.uni-hamburg.de UID=anonymous LOCDIR=c:\pgp DIR=/pub/virus/crypt/pgp -- WebCasters(tm) James C. Grubs jgrubs at webcasters.com 6817 Maplewood Avenue Tel.: 419-882-2697 Sylvania, Oh 43560 Fax: 419-885-2814 Internet consulting, HTML programming, Information brokering From jsw at netscape.com Wed Oct 4 16:18:20 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Wed, 4 Oct 95 16:18:20 PDT Subject: New Netscape bug (in version 1.12) Message-ID: <199510042316.QAA22055@ammodump.mcom.com> On Oct 4, 11:00am, sameer wrote: > Subject: Re: New Netscape bug (in version 1.12) > Isn't there a resolver #define or something in limits.h called > MAXHOSTNAMELEN ? Something like that? (Perhaps not, but that's what I > recall..) We are using MAXHOSTNAMELEN if it exists, both in 2.0, and in the security patch that we shipped. If it doesn't exist we just assume 64. As a quick sample, on sunos and irix it is 64, and on solaris it is 256. On sunos and irix it is defined in sys/param.h, and on solaris it is defined in netdb.h. I wasn't able to find any mention of it or any other limits on the host names passed in to gethostbyname() in the man pages on any of these systems. --Jeff Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From rsalz at osf.org Wed Oct 4 16:18:36 1995 From: rsalz at osf.org (Rich Salz) Date: Wed, 4 Oct 95 16:18:36 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m Message-ID: <9510042317.AA14344@sulphur.osf.org> >If the cancel cannot be authenticated (e.g., because the original article lacks >the "Cancel-lock: M2" header, or the cancel lacks the "Cancel-key: M1" header >such that H(M1)=M2), then INN should forward the unauthenticated cancel to one >or more "collection centers" so the author of the original article may be >notified. So if 70% of Usenet follows this scheme a handful of forged cancels can easily cause melt down. >Each "collection center" deamon should wake up periodically (say, every hour), >group the collected unauthenticated cancels by message-ids of the cancelled >articles, and e-mail the (distinct) addresses (other than "usenet@*" or >"news@*") mentioned in the "From:", "Sender:", "Authorized:", and >"X-Cancelled-By:" headers, quoting the unauthenticated cancel and the Path's as >seen at many different sites that forwarded the cancels. This way, if the >unauthenticated cancel is indeed forged, its author will see within hours that >it has been fraudulently cancelled _and_ will automatically receive enough >"Path:" samples from all over the world to see where it was posted, by >comparing the "Path:" headers in several forwarded copies. I can post a handful of articles and forge the From line, and create my own Cancel-lock headers by "rolling the dice." I can then get their mailbox bombed by forging cancels. A little more complicated then "sendsys-bombing" but not much more so. /r$ From Richard_Reich at reich.com Wed Oct 4 16:46:49 1995 From: Richard_Reich at reich.com (Richard Reich) Date: Wed, 4 Oct 95 16:46:49 PDT Subject: CSPAN2: Copyright on the Internet In-Reply-To: Message-ID: <199510042345.QAA00540@lux.reich.com> >From tonight's C-SPAN (not 2) overnight schedule: 2:45 am ET/11:45 pm PT Cyber Law Institute, Georgetown University Law Center: "The Internet and Property Rights: What's Mine is Yours" Speaking: Wayne Rush, Communication Week; Vint Cerf, MCI; Bill Burrington, AOL; Peter Pitsch-Progress and Freedom Foundation; Others These are sometimes wildly inaccurate, so don't blame me. -r -- Richard Reich / Internet Consulting / +1 415 668 3311 ... and that things are not so ill with you and me as they might have been, is half owing to the number who lived faithfully a hidden life, and rest in unvisited tombs. From Richard_Reich at reich.com Wed Oct 4 16:48:37 1995 From: Richard_Reich at reich.com (Richard Reich) Date: Wed, 4 Oct 95 16:48:37 PDT Subject: CSPAN2: Copyright on the Internet In-Reply-To: Message-ID: <199510042348.QAA00554@lux.reich.com> Ooops. This is from the C-SPAN2 schedule (which I don't bother with because it turns into, no kidding, The Playboy Channel at 5pm every day ): 8:35 pm ET/5:35 pm PT Cyber Law Institute, Georgetown University Law Center: "The Internet and Property Rights: What's Mine is Yours" Speaking: Wayne Rush, Communication Week; Vint Cerf, MCI; Bill Burrington, AOL; Peter Pitsch-Progress and Freedom Foundation; Others -- Richard Reich / Internet Consulting / +1 415 668 3311 ... and that things are not so ill with you and me as they might have been, is half owing to the number who lived faithfully a hidden life, and rest in unvisited tombs. From llurch at Networking.Stanford.EDU Wed Oct 4 16:57:57 1995 From: llurch at Networking.Stanford.EDU (Rich Graves) Date: Wed, 4 Oct 1995 16:57:57 -0700 (PDT) Subject: Serious Windows TCP/IP Security Hole In-Reply-To: Message-ID: I'm forwarding you a couple messages. I haven't run SAMBA myself, but people who have have been able to read files on my machine that aren't supposed to be shared. -rich On Wed, 4 Oct 1995, Henry Sanders (Exchange) wrote: > Hi, I've jumped in late on this thread. What is the bug referred to in the note below? I might be able to give you current status on it. > > Thanks, > Henry Sanders > henrysa at microsoft.com > > >In article <44amc4$ft6 at nntp.Stanford.EDU>, llurch at networking.stanford.edu > says... > >> > >>FYI for those of you still running WFW. Could anybody confirm or deny > >>that Microsoft has patched this hole in the shipping version of 95? > >>As with most such serious "oopsies," Microsoft has not made any > >>information on this issue available in their Knowledge Base. > > > >Nope, it is still there. > > Can you demonstrate that this is true? I'll give you an account on my box. > I've received several notes and flames that the problem either never > existed (which I know is untrue) or was fixed at a specified (often > specified different) patch level. > > I should really try this myself, but I don't have time, and the only UNIX > box I can really mess with is my Linux box, which is also my Win95 box. > -rich From llurch at Networking.Stanford.EDU Wed Oct 4 16:58:40 1995 From: llurch at Networking.Stanford.EDU (Rich Graves) Date: Wed, 4 Oct 1995 16:58:40 -0700 (PDT) Subject: Serious Windows TCP/IP Security Hole (fwd) Message-ID: ---------- Forwarded message ---------- Date: Sat, 30 Sep 1995 02:01:56 -0700 (PDT) From: Rich Graves To: Ken Simler Subject: Re: Serious Windows TCP/IP Security Hole (fwd) I don't really know, I'm just passing on news... maybe talk to these folks. -rich ---------- Forwarded message ---------- Date: Thu, 28 Sep 95 19:56:38 PDT From: Tom Czarnik To: Rich Graves Subject: Re: Serious Windows TCP/IP Security Hole On Thu, 28 Sep 1995 18:31:07 -0800 Rich Graves >Can you demonstrate that this is true? I'll give you an account on >my box. I've received several notes and flames that the problem >either never existed (which I know is untrue) or was fixed at a >specified (often specified different) patch level. We can do it your way or if you are physically located at Stanford, you can schedule an appointment to come by NetManage. We are located in Cupertino, right off 280 at DeAnza Blvd. The choice is yours. From llurch at Networking.Stanford.EDU Wed Oct 4 16:59:03 1995 From: llurch at Networking.Stanford.EDU (Rich Graves) Date: Wed, 4 Oct 1995 16:59:03 -0700 (PDT) Subject: Serious Windows TCP/IP Security Hole (fwd) Message-ID: ---------- Forwarded message ---------- Date: Sat, 30 Sep 1995 02:03:58 -0700 (PDT) From: Rich Graves To: Ken Simler Subject: Re: Serious Windows TCP/IP Security Hole (fwd) This doesn't work for you? Please get back to me if you figure it out. I'd like to document the problem accurately. -rich ---------- Forwarded message ---------- Date: Thu, 28 Sep 95 23:45:49 -0400 From: Mark Thornton To: llurch at networking.stanford.edu Newgroups: comp.os.ms-windows.win95.misc, comp.os.ms-windows.networking.windows, comp.os.ms-windows.networking.tcp-ip Subject: Re: Serious Windows TCP/IP Security Hole I can confirm that the complete(floppy) version of Windows 95 STILL has the ../ bug ;-( The ... bug has been fixed correctly returning the following message chkpath: ERRDOS - ERRbadpath (Directory invalid.) But cd ../ WILL put you in the root directory of the share with the rights you had in the intial directory. Very bad... I've had to share all my drives read-only until the problem gets fixed. From jya at pipeline.com Wed Oct 4 17:03:27 1995 From: jya at pipeline.com (John Young) Date: Wed, 4 Oct 95 17:03:27 PDT Subject: McNeil Lehrer on Net Insecurity Message-ID: <199510050002.UAA04740@pipe1.nyc.pipeline.com> McNeil Lehrer has a segment on net boogers this evening, reported by Time's anxious Elmer-Dewitt. Diffie, Farmer and Shimomura, all beautifully coiffed, offer sagacious views. It includes a clip of Kevin, unbeautifully cuffed and mutely eloquent. Says most of the charges against him have been plea-bargained away. From rjc at clark.net Wed Oct 4 17:40:11 1995 From: rjc at clark.net (Ray Cromwell) Date: Wed, 4 Oct 95 17:40:11 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <44td0c$3um@tera.mcom.com> Message-ID: <199510042139.RAA26832@clark.net> Jeff Weinstein wrote: > > That's true, but it is also true that Netscape should also be > > performing some sanity checking on input rather than relying on > > the supporting libraries to be secure. Remember, a hole is a hole. > > The last sendmail bug was a buffer overflow in syslog, however, > > sendmail still got patched to do bounds checking on the strings > > it was passing to syslog. > > > > It looks like this is only bug on BSDI2.0/XAccel, and NT3.5/NS1.1. But > > is it wise for netscape to be sending 10,000 character strings to GUI > > functions anyway? > > While I agree that we should probably truncate this string to something > smaller than 10000 characters(I've already filed a bug on it here), it > is perfectly legal X protocol to send 10,000 characters to the X server. > How do I decide what is too long? For example, when tracking down buffer > overflow problems for the security patch, we found an undocumented > static buffer limit of 64 bytes for the hostname passed to gethostbyname() [lots deleted] I agree with a lot of what you say Jeff. What I would do is set the string limits to be whatever the specs allow. For instance, in the case of domain names, the limit is supposed to be 256. In a mailto: just what is the limit of an RFC822 valid e-mail address? I will say that Netscape is a very robust program. I have created documents with 10,000 nested
    lists, and the program didn't dump. I have created forms with 10,000 selection widgets with overlong labels and variable names and it handled them (didn't diusplay them very well) However, I am a little weary of netscape allowing lists and forms having 10,000 levels. For one thing, although the 10,000 nested lists didn't crash netscape, they did use up all the swap space on my computer except for 300k. A 10K byte document was able to exhaust 32megs of ram. When I combined supernested lists, with overlong FORM variable names, and an extra long title, I did get a few sporadic coredumps. Some people may have a religious position on browsers limiting SGML/HTML nested structures (because they feel the browser should be able to handle any "legal" document), but I for one am more pragmatic. I hope you don't take my criticisms as an attack on your programmers. Netscape is my all around favorite application. I just want to see it improved and safer. -Ray From merriman at arn.net Wed Oct 4 18:11:16 1995 From: merriman at arn.net (David K. Merriman) Date: Wed, 4 Oct 95 18:11:16 PDT Subject: GSS sample/demo? Message-ID: <199510050115.UAA16284@arnet.arn.net> Sorry for the 'broadcast', but I'm looking for some source code that shows how GSS 'works' in real-world applications, as well as opinions on how good it is. Dave Merriman This is a test (3 UUE lines) of the unconstitutional ITAR - 1/713th of the PGP executable. See below for getting YOUR chunk! ------------------ PGP.ZIP Part [015/713] ------------------- M=$<(&L`#*IPP",(G6(,,S,`P](<2RWU96XCW86/JBYV8A\D8 at X'HB_9H#&\X MX'PCUB.,13B"X8`R?^J-:UB.M_`U\>[#)BS&5$0C,Y#^1CS>1`\T1QTXX6!3 M8H,),S$8G>&.WP(8IRA`-M['+`Q%&_C"">5-F%LX@<_Q$;*P'',Q$Z/AA[8M ------------------------------------------------------------- for next chunk to export --> http://dcs.ex.ac.uk/~aba/export/ <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> My web page: http://www.geopages.com/CapitolHill/1148 From anonymous at robo.remailer Wed Oct 4 18:16:31 1995 From: anonymous at robo.remailer (anonymous at robo.remailer) Date: Wed, 4 Oct 95 18:16:31 PDT Subject: SAIC Bags Tier 1 Job Message-ID: <199510050111.SAA09834@infinity.c2.org> SAIC Awarded Multimillion Dollar Communications Security Contract San Diego, Oct. 3 /PRNewswire/ -- Science Applications International Corp. (SAIC) said it has been awarded a three year, $28 million contract to support the Space and Naval Warfare Systems Command (SPAWAR). The Common Tier 1 System will integrate computers and software to implement and field the Tier 1 element of the Department of Defense's Electronic Key Management System. This program will provide automated communications security and key management system support for the Navy, Army, Air Force, Marines, Coast Guard and other government agencies. Common Tier 1 will help implement the Electronic Key Management System and support its integration with COMSEC material management in the Navy, Army, Air Force and joint key management systems. The work performed on this contract will be split between San Diego (66%) and Camden, New Jersey (34%), and is expected to be completed in October 1998. "We expect to hire an additional 65 employees in San Diego during this contract to primarily work on software development," said SAIC Program Manager Tom Trebelhorn. "This is a very significant win that allows SAIC to continue its involvement in this key information security program and extend the company's commitment to the communication security field," Trebelhorn added. SAIC provides high-technology services and products for government and private industry in the areas of space, transportation, national security, environment, health care, energy and systems integration. With nearly $2 billion in annual revenues, the employee-owned, San Diego based company has 20,000 employees in more than 350 locations worldwide. Contact: Tom Trebelhorn, Operations Manager of SAIC, 619-552-5319, or fax, 619-452-3540, or e-mail, tom_trebelhorn at cpqm.saic.com/ From warlord at MIT.EDU Wed Oct 4 18:22:03 1995 From: warlord at MIT.EDU (Derek Atkins) Date: Wed, 4 Oct 95 18:22:03 PDT Subject: GSS sample/demo? In-Reply-To: <199510050115.UAA16284@arnet.arn.net> Message-ID: <199510050121.VAA28274@toxicwaste.media.mit.edu> Take a look at the kerberos 5 sources. You can grab krb5 beta 5 from MIT: ftp://athena-dist.mit.edu/pub/ATHENA/kerberos Read the appropriate README file for source download instructions -derek From perry at piermont.com Wed Oct 4 18:25:17 1995 From: perry at piermont.com (Perry E. Metzger) Date: Wed, 4 Oct 95 18:25:17 PDT Subject: economic espionage (@#$%^&*) (fwd) In-Reply-To: <199510031453.PAA12535@utopia.hacktic.nl> Message-ID: <199510050125.VAA03636@frankenstein.piermont.com> Mr. Nobody -- And everyone else -- Keep this sort of crap out of cypherpunks. Anonymous writes: > > NY Times, Oct 3, 1995, Business Employment Ad. > > 1984 Sarajevo, Olympics; 1995 Sarajevo, Battleground > > Every day in our world, new threats, new challenges, new > missions emerge. The people of the Central Intelligence > Agency are dedicated to meeting the missions of the day, From perry at piermont.com Wed Oct 4 18:39:02 1995 From: perry at piermont.com (Perry E. Metzger) Date: Wed, 4 Oct 95 18:39:02 PDT Subject: Simple Hardware RNG Idea In-Reply-To: <9510031505.AA11622@zorch.w3.org> Message-ID: <199510050138.VAA03661@frankenstein.piermont.com> hallam at w3.org writes: > > There are plenty of other quantum phenomena which can be > tapped. Essentially all one needs to do is to build a very high gain > amplifier "baddly". The main difficulty is removing bias. The main difficulty is that it is extremely hard to prove to yourself that you are amplifying a quantum phenomenon and not deterministic noise from the rest of the circuits in the machine or outside it. As I've said repeatedly, its nearly impossible to get this wrong with a radiation detecting mechanism, but its very very hard to get it right with most common mechanisms. Perry From jsw at netscape.com Wed Oct 4 20:20:41 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Wed, 4 Oct 95 20:20:41 PDT Subject: New Netscape bug (in version 1.12) In-Reply-To: <44td0c$3um@tera.mcom.com> Message-ID: <30734E26.194D@netscape.com> Ray Cromwell wrote: > I agree with a lot of what you say Jeff. What I would do is set the string > limits to be whatever the specs allow. For instance, in the case of > domain names, the limit is supposed to be 256. In a mailto: just what > is the limit of an RFC822 valid e-mail address? Yes, we couldn't get to this type of stuff in the 1.12 patch. We will be doing this sort of stuff in 2.0. > I will say that Netscape is a very robust program. I have created documents > with 10,000 nested
      lists, and the program didn't dump. I have > created forms with 10,000 selection widgets with overlong labels and variable > names and it handled them (didn't diusplay them very well) However, I am > a little weary of netscape allowing lists and forms having 10,000 > levels. For one thing, although the 10,000 nested lists didn't crash > netscape, they did use up all the swap space on my computer except for > 300k. A 10K byte document was able to exhaust 32megs of ram. On unix you can use the csh(1) limit builtin to limit the size of your netscape process. As I understand it, the Mac also has such a thing. I'm not sure about windows. Maybe we should put a preference in Netscape for how much heap memory to use... --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From accw5 at glen-net.ca Wed Oct 4 21:01:32 1995 From: accw5 at glen-net.ca (Ryan Douglas) Date: Wed, 4 Oct 95 21:01:32 PDT Subject: Mailing list Message-ID: <199510050402.AAA22650@sparc1.glen-net.ca> I wish to join the mailing list accw5 at glen-net.ca From jamesd at echeque.com Wed Oct 4 22:33:04 1995 From: jamesd at echeque.com (James A. Donald) Date: Wed, 4 Oct 95 22:33:04 PDT Subject: Crypto APIs Message-ID: <199510050532.WAA16394@blob.best.net> At 04:29 PM 10/2/95 -0400, Matt Blaze wrote: > It seems best to encourage the realistic > side of NSA as much as possible... Why? Surely the realists are more dangerous than the nuts. > [...] > > In other > words, the parts of the military that are concerned with actually > securing communications want exactly what we want, and are just > starting to realize it. This does not necessarily protect our right to cryptography, any more than it protects our right to full auto guns. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From futplex at pseudonym.com Thu Oct 5 00:55:26 1995 From: futplex at pseudonym.com (Futplex) Date: Thu, 5 Oct 95 00:55:26 PDT Subject: NSA Realists v. Nuts (Was: Re: Crypto APIs) In-Reply-To: <199510050532.WAA16394@blob.best.net> Message-ID: <199510050757.DAA22982@ducie.cs.umass.edu> Matt Blaze writes: # It seems best to encourage the realistic side of NSA as much as possible... James Donald writes: > Why? Surely the realists are more dangerous than the nuts. One way to look at it is this: Could a Nutty NSA carry out its Nutty Agenda ? If they could, then we'd better hope someone at Fort Meade does a better job of promoting a more Realistic (read: free-strong-crypto-friendlier) Agenda. If they couldn't, then we should focus our energies against the Realistic Agenda, on the theory that the best NSA agenda is no agenda at all. (I'm assuming that a Realistic Agenda has at least as good a chance of success as a Nutty Agenda. If neither has a chance of success, then the distribution of power among factions in the NSA is obviously irrelevant.) Personally, I'm plenty cynical enough to fret about a possibility that the Nuts might achieve their aims to some significant degree. So I'm inclined to agree with Matt that cheering on the Realists is a wise strategy. I'm not sure how much luck we'll have convincing each other about the likely outcome of the imposition of a Nutty Agenda on the U.S. Looks to me as though they've imposed some pretty Nutty stuff on us already. Sure, some folks flaunt the ITARs, but many (like me) fear them. Chalk up a win for the NSA Nuts in my book. -Futplex From liberty at gate.net Thu Oct 5 01:13:41 1995 From: liberty at gate.net (Jim Ray) Date: Thu, 5 Oct 95 01:13:41 PDT Subject: Macneil-Lehrer tonight. Message-ID: <199510050811.EAA00416@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- Whitfield Diffie, Dan Farmer, and another Sun Microsystem guy whose name I can not spell but who tracked down Kevin Mitnik are on the Newshour right now. JMR No PGP .sig Regards, Jim Ray "Every act of visibility is an act of resistance." Suzanne Pharr - ----------------------------------------------------------------------- PGP key Fingerprint 51 5D A2 C3 92 2C 56 BE 53 2D 9C A1 B3 50 C9 C8 Key id. # E9BD6D35 James Milton Ray - ----------------------------------------------------------------------- Help Phil! email zldf at clark.net or see http://www.netresponse.com/zldf _______________________________________________________________________ - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHOTMCoZzwIn1bdtAQHsDQF/ZUbX7FTGpQRuuS/vyPIBqlPO9ovW26un Q5CalRK8OSwX1IuNG0H9Nqj14QhsAfnd =qUCL -----END PGP SIGNATURE----- From gerdw at cougar.vut.edu.au Thu Oct 5 02:25:38 1995 From: gerdw at cougar.vut.edu.au (David Gerard) Date: Thu, 5 Oct 95 02:25:38 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m In-Reply-To: <6FBccD15w165w@bwalk.dm.com> Message-ID: <45040d$8cd@cougar.vut.edu.au> On Wed, 04 Oct 95 10:47:30 EDT, Dr. Dimitri Vulis (dlv at bwalk.dm.com) wrote: :[alt.religion.scientology restored, since that's where most of the discussion :of forged cancels has been taking place so far ] [snip snip snip] :When an article is posted, two quantities are computed by the posting program: :M1 = H(article body + newsgroups + message-id + date + passphrase) and :M2 = H(M1). The posted article contains the header "Cancel-lock: M2". :When an attempt is made to cancel/supersede an article X with a "Cancel-lock:" :header, the user is asked to supply the passphrase. The posting software :computes M1 = H(X's body + newsgroups + X's message-id + date + passphrase) :once again and adds the "Cancel-key: M1" header to the article containing :"Control: cancel " or "Supersedes: " that's being posted. :(Note that without knowing the passphrase it's intractable to match the M1.) :Whenever news server software (such as inn) detects either "Control: cancel :" or "Supersedes: ", INN should retrieve the original article and :looks for the "Cancel-lock: M2" header. If one is found, then the old article :may be cancelled only if the new article contains the header "Cancel-key: M1" :such that H(M1) = M2. One thing that occurs to me: suppose I go to control, collect cancel messages, and build myself a collection of M1's that will work with a given M2? That is, I can't actually invert the hashing function. But if a given hash function is standard, then I can eventually build up a collection of M1s for M2s that will let me cancel quite a few things I may want to. How many cancel messages come through in a day? -- Reverend Doctor David Gerard, KoX, SP 4.03 (awaiting verification of SP 5) Prestige Elite(tm) Research Church of the SubGenius "Servicing the Prestige Elite(tm) since 1985!" OK, clams. You want war? You've got war. -- Please email ALL followups (crappy and thoroughly dysfunctional newsfeed). Personal visits from Scientologists will be greeted with extreme hostility and the vigilant attention of VUT Security, but personal physical violence *only* when appropriate, legal and called-for. gerdw at cougar.vut.edu.au (preferred); fun at suburbia.apana.org.au July 5, 1998, 7 AM. Saucers. End of the world. Your US$30 is your trip ticket. From jathomas at netcom.com Thu Oct 5 05:41:42 1995 From: jathomas at netcom.com (John A. Thomas) Date: Thu, 5 Oct 95 05:41:42 PDT Subject: Simple hardware RNGs Message-ID: Having built devices for generating random data, I can tell you the problem is more difficult than it appears. The problem is removing biases and correlations from the process. A good place to start is Murry, Herschell, "A General Approach for Generating natural Random Variables", IEEE Transactions on Computers, December 1970, p. 1210-1213. --------------------------------------------------------------------- John A. Thomas | (214) 263-4351 | jathomas at netcom.com Bowles & Thomas, L.L.P. | Voice | CompuServe 75236,3536 410 N.W Eleventh St. | (214) 262-6520 | Grand Prairie, Tx 75050 | Fax | PGP public key available --------------------------------------------------------------------- From jya at pipeline.com Thu Oct 5 05:54:41 1995 From: jya at pipeline.com (John Young) Date: Thu, 5 Oct 95 05:54:41 PDT Subject: $BN_air Message-ID: <199510051254.IAA24947@pipe4.nyc.pipeline.com> 10-5-95. FTPeach: "A David and Goliath fight, the battle between Netscape and Microsoft over software for the Internet." For all of his success in outwitting the likes of IBM to become the leader of the world's biggest software company, Bill Gates has long said that the competition he most feared would come from a software start-up with breakthrough, innovative technology. Netscape Communications may be such a company. But a war over technology standards, which could delay the progress of electronic commerce and potentially impede Netscape's growth, now seems inevitable. Netscape's hand has been weakened by recent incidents in which flaws in the security features of its browser software were discovered by two "cyberpunks" [sic]. $BN_air (8 kb) From jya at pipeline.com Thu Oct 5 05:55:53 1995 From: jya at pipeline.com (John Young) Date: Thu, 5 Oct 95 05:55:53 PDT Subject: xus_ORN Message-ID: <199510051255.IAA25049@pipe4.nyc.pipeline.com> 10-5-95. Wash Rag: "Congress Debates Adding Smaller Spy Satellites to NRO's Menu." Top members of the House and Senate intelligence committees are carrying on a behind-the scenes debate over the nation's spy satellite system, with one group arguing that the governmeat could save hundreds of millions of dollars by building a new generation of small satellites to be launched in place of some of the big ones already planned. The Combest group wants to start production now of 2,000-pound space vehicles, each costing about $100 million and nicknamed "small-sats." "$1.6 Billion in NRO Kitty Helped Appropriators Fund Pet Projects." On the morning of Sept. 21, security men bustled around Room H-140 on the first floor of the Capitol, sweeping it to ensure that the space was free of electronic eavesdropping devices. This year's session turned out to be different from any in recent memory. The conferees took more than $1 billion from the once-sacrosanct spy satellite program of the National Reconnaissance Office (NRO) to help make room in the budget to speed up purchases of hundreds of millions of dollars worth of big-ticket defense items, including the B-2 "stealth" bomber. xus_ORN (17 kb) From trollins at hns.com Thu Oct 5 07:19:18 1995 From: trollins at hns.com (Tom Rollins) Date: Thu, 5 Oct 95 07:19:18 PDT Subject: Oct 14 meeting Agenda? (DC Cypherpunks) Message-ID: <199510051418.KAA00604@dcn92.hns.com> >>I figure that as long as we are going to receive... >> ? a commercial message from Digex ? >> >>We might be able to tap their knowledge base in assesing >>the various risks and rewards available by using a Commercial >>ISP. >> >>After all, with the FBI and Scientologists waging war on >>the Internet ( capturing keystroaks, siezing computers, >>and rummaging through everyones E-mail ), There may be a >>way to make life a little more interesting for them. >I will be glad to send in my two cents worth - I am not sure that >I understand the question though. While, I believe in strong crypto for everyone (what cypherpunks doesn't), I also believe that much can be done to prevent the wholesale snooping of Commercial ISP customers data. I believe that this data is snooped because the ISP's and large number of customers (ignorant of security) make this data too easy a target (cost effective). While the NSA may follow it's motto (In GOD we trust, the rest we monitor). Others may take hostile actions agenst someone whose password or personal information has been obtained. (ex. drain bank account, or just send spam) Some questions that I would like to ask... 1 - Assuming that someone from an agengy or someone pretending to be from an agency wanted to capture one or all the ISP customers key presses. What method would they use ? Would they capture the data at the phone company? Would they tap the raw data stream at the initial ISP router ? Would they route IP packets from the initial ISP router through their own equipment before arriving at the ISP maching running the shell account ? Would they use a Trojin Shell (or telnetd) on a shell account ? Would they inform the ISP and get his help or root access ? 2 - What methods could be put into place by the ISP or it's customers to help prevent this snooping activity ? Perhaps an alternative login method (like deslogin or idealogin) trying to protect data through the phone company and IP route to the target machine. Perhaps having a crypto checksum on the shell (telnetd) to detect trojin software. Perhaps sendmail could public key encrypt mail on it's way to the customers directory. Perhaps just raising the customer awareness of security issues and methods at the ISP. This could affect the mainstream user (joe sixpack) as well as the PGP user. Perhaps ISPs could offer a data archive service/site (foreign site) where data in the form of PGP encrypted E-mail can be saved and retrieved via a robot (something like majordomo). That way, if your home computer breaks, burns, is stolen, or siezed. You can still retrieve your data at a later time. Granted these methods do not prevent a determined attacker from squashing an ISP cutomer. However, it does raise the cost of the effort to single out a user and attack him rather that grab cleartext from everyone. -tom From trollins at hns.com Thu Oct 5 07:25:21 1995 From: trollins at hns.com (Tom Rollins) Date: Thu, 5 Oct 95 07:25:21 PDT Subject: Oct 14 meeting Agenda ? (DC Cypherpunks) Message-ID: <199510051425.KAA00813@dcn92.hns.com> > >>I figure that as long as we are going to receive... > >> ? a commercial message from Digex ? > >> > >>We might be able to tap their knowledge base in assesing > >>the various risks and rewards available by using a Commercial > >>ISP. > >> > >>After all, with the FBI and Scientologists waging war on > >>the Internet ( capturing keystroaks, siezing computers, > >>and rummaging through everyones E-mail ), There may be a > >>way to make life a little more interesting for them. > > >I will be glad to send in my two cents worth - I am not sure that > >I understand the question though. > > While, I believe in strong crypto for everyone (what cypherpunks doesn't), > I also believe that much can be done to prevent the wholesale snooping > of Commercial ISP customers data. I believe that this data is snooped > because the ISP's and large number of customers (ignorant of security) > make this data too easy a target (cost effective). > > While the NSA may follow it's motto (In GOD we trust, the rest we monitor). > Others may take hostile actions agenst someone whose password or > personal information has been obtained. (ex. drain bank account, or just > send spam) > > Some questions that I would like to ask... > > 1 - Assuming that someone from an agengy or someone pretending to > be from an agency wanted to capture one or all the ISP customers > key presses. What method would they use ? > > Would they capture the data at the phone company? > Would they tap the raw data stream at the initial ISP router ? > Would they route IP packets from the initial ISP router through their > own equipment before arriving at the ISP maching running the shell > account ? > Would they use a Trojin Shell (or telnetd) on a shell account ? > Would they inform the ISP and get his help or root access ? > > 2 - What methods could be put into place by the ISP or it's customers > to help prevent this snooping activity ? > > Perhaps an alternative login method (like deslogin or idealogin) > trying to protect data through the phone company and IP route > to the target machine. > Perhaps having a crypto checksum on the shell (telnetd) to detect > trojin software. > Perhaps sendmail could public key encrypt mail on it's way to the > customers directory. > Perhaps just raising the customer awareness of security issues > and methods at the ISP. This could affect the mainstream > user (joe sixpack) as well as the PGP user. > Perhaps ISPs could offer a data archive service/site (foreign site) > where data in the form of PGP encrypted E-mail can be saved and > retrieved via a robot (something like majordomo). That way, > if your home computer breaks, burns, is stolen, or siezed. You > can still retrieve your data at a later time. > > Granted these methods do not prevent a determined attacker from squashing > an ISP cutomer. However, it does raise the cost of the effort to single > out a user and attack him rather that grab cleartext from everyone. > > -tom > From jamesd at echeque.com Thu Oct 5 07:34:08 1995 From: jamesd at echeque.com (James A. Donald) Date: Thu, 5 Oct 95 07:34:08 PDT Subject: NSA Realists v. Nuts (Was: Re: Crypto APIs) Message-ID: <199510051433.HAA11813@blob.best.net> Matt Blaze writes: > > > It seems best to encourage the realistic side of NSA as much as > > > possible... James Donald writes: > > Why? Surely the realists are more dangerous than the nuts. At 03:57 AM 10/5/95 -0400, Futplex wrote: > (I'm assuming that a Realistic Agenda has at least as good a chance > of success as a Nutty Agenda. [...] ) Language problem: If that is the case, then the "Nutty Agenda" is perfectly sane. They want to rule over us. There is nothing crazy about that. Evil yes. Crazy no. Their objective is to create a surveillance state, where all actions are known and recorded by the state, in order to facilitate detailed state control over every aspect of our lives. Our agenda is the opposite. There is no commonality of purpose, hence no possibility of cooperation. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From jamesd at echeque.com Thu Oct 5 07:34:16 1995 From: jamesd at echeque.com (James A. Donald) Date: Thu, 5 Oct 95 07:34:16 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m Message-ID: <199510051434.HAA11824@blob.best.net> At 06:11 PM 10/5/95 +1000, David Gerard wrote: > One thing that occurs to me: suppose I go to control, collect cancel messages, > and build myself a collection of M1's that will work with a given M2? > > That is, I can't actually invert the hashing function. But if a given > hash function is standard, then I can eventually build up a collection of > M1s for M2s that will let me cancel quite a few things I may want to. > How many cancel messages come through in a day? Considerably less than 340,000,000,000,000,000,000,000,000,000,000,000,000 --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From dlv at bwalk.dm.com Thu Oct 5 07:36:05 1995 From: dlv at bwalk.dm.com (Dr. Dimitri Vulis) Date: Thu, 5 Oct 95 07:36:05 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m In-Reply-To: <44pmiq$h7t@segfault.monkeys.com> Message-ID: In article <45040d$8cd at cougar.vut.edu.au>, gerdw at cougar.vut.edu.au (David Gerard) writes: >One thing that occurs to me: suppose I go to control, collect cancel messages, >and build myself a collection of M1's that will work with a given M2? > >That is, I can't actually invert the hashing function. But if a given >hash function is standard, then I can eventually build up a collection of >M1s for M2s that will let me cancel quite a few things I may want to. Good point -- if M1 is known to be small in size (say, a 128-bit MD5 of the article body + newsgroups + message-id + date + secret passphrase), then an organization with a lot of $$$$$$$ and computing resources (like Co$ or NSA) might even try to pre-compute M2 = H(M1) for many possible M1's, sort the result by M2, and build a (partial) lookup table of inverted H. This would be a humongous table. Would someone bother to do it just to cancel a few Usenet messages? Possibly. But I see an easy fix: change Hujskonen and Franz's original proposal so that an article posted with message-id X contains the header "Cancel-lock: M2", where M2 is now H(X + M1), not just H(M1). This way, even if two different articles happen to share the lock M2, they'll need different keys M1's to be cancelled because their unique message-id's are different. A pre-computed table of inverse values of H would be useless. To cancel a given X, a brute force attacker would have to compute M2 = (X + M1) for all possible M1's. Hopefully, the article X will expire naturally long before this can be done. :) And in article <9510042317.AA14344 at sulphur.osf.org>, Rich Salz writes: >>If the cancel cannot be authenticated (e.g., because the original article lacks >>the "Cancel-lock: M2" header, or the cancel lacks the "Cancel-key: M1" header >>such that H(M1)=M2), then INN should forward the unauthenticated cancel to one >>or more "collection centers" so the author of the original article may be >>notified. > >So if 70% of Usenet follows this scheme a handful of forged cancels can easily >cause melt down. (Thank you for looking at this!) If 70% of Usenet followed this convention and refused to honor unauthenticated cancels and supersedes's, then forged cancels would be much less harmful than they are now, and there would be less need to notify the victims and to track down the perpetrators. Perhaps, not _every site should send out notifications. The purpose of getting notifications from multiple sites is to compare the Path: header and see where it was forged. I suppose notifications from just 5--10 well-positions sites would often suffice. But if these sites are well-known, then an attacker might put their names in the Path: of the forged cancel, to bypass the notification and still propagate the cancel to a lot of other sites. We can start implementing this scheme gradually, first by patching our posting software to insert the "Cancel-lock:/Cancel-Key:" headers, and by running a few "watchers" based on Homer Wilson Smith's Lazarus that'll notify the poster when an article with a Cancel-lock: header is being cancelled without a matching Cancel-Key: -- in all newsgroups, not just in a.r.s. Notifications about articles without a "Cancel-Key:" header can be added much later, if ever. >>Each "collection center" deamon should wake up periodically (say, every hour), >>group the collected unauthenticated cancels by message-ids of the cancelled >>articles, and e-mail the (distinct) addresses (other than "usenet@*" or >>"news@*") mentioned in the "From:", "Sender:", "Authorized:", and >>"X-Cancelled-By:" headers, quoting the unauthenticated cancel and the Path's as >>seen at many different sites that forwarded the cancels. This way, if the >>unauthenticated cancel is indeed forged, its author will see within hours that >>it has been fraudulently cancelled _and_ will automatically receive enough >>"Path:" samples from all over the world to see where it was posted, by >>comparing the "Path:" headers in several forwarded copies. > >I can post a handful of articles and forge the From line, and create my >own Cancel-lock headers by "rolling the dice." I can then get their mailbox >bombed by forging cancels. A little more complicated then "sendsys-bombing" >but not much more so. Yes -- someone can post an article with random noise in the Cancel-lock: header, and it would be impossible to cancel except by NoCeM. As for mailbombing, one can do it much easier by forging a sendsys in the victim's name, or by e-mailing the victim megabytes of junk from a phoney "From:" address. This is done, but not too often because the perp is likely to be tracked down and beaten up. :) Why would someone use this attack and not straight forged sendsys? One could address this by limiting the number of notifications e-mailed to one address or even to one site in a period of time. --- Dr. Dimitri Vulis Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From stewarts at ix.netcom.com Thu Oct 5 08:40:24 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Thu, 5 Oct 95 08:40:24 PDT Subject: Certificates, Attributes, Web of Trust Message-ID: <199510051540.IAA23596@ix.ix.netcom.com> Carl and I and others have been discussing whether the Web of Trust ought to use certificates to tie keys to people or attributes. It's taken a while to sink in, but I now think he's basically right :-) ; on the other hand, it can also still be done using the ugly X.509 format. This means that we can begin to go out and corrupt users who might otherwise want Driver's Licenses for the Infotainment Superhighway into realizing that the Net can give them _more_ privacy instead of less. >Alternatively, I can have First Security Bank open account 01732 for me and >create a certificate binding my public key to that account number. Now, I >can use that key to sign anonymous checks. (The bank knows me, perhaps, >but the payee doesn't need to.) Yeah. Consider a slightly-abused Distinguished Name for a checking or credit card. /Account=01732/Type=Checking/Org=FooBank/Country=com/ with key aaa signed /Title=Accountsigner/Org=FooBank/Country=com/ with key bbb signed /Title=MasterKey/Org=FooBank/Country=Com/ with key mmm signed /OU=Corporate/O=Verisign/Country=com/ with key vvv When you sign a check/credit card today, your name and signature are there as vague verification for the payee and bank that it's authentic; with digital signatures, the fact that you can sign a note saying "Pay $X to $Y Signed aaa" is all the verification they need, though the name business makes it easier for them to find what attributes the signer had and how to get the actual money... Even the account number could be the public key instead, but that's pretty long. (Credit cards may be a slight wrinkle, since there are lots of laws about them.) What the name also gives you is a handle to hang marketing data on. Sometimes, you may have that data from the transaction (card cccccc wanted 5 plutonium widgets sent to Resident, 1600 Penn.Ave, WashDC 20017), sometimes you've got less (card cccccc wants to receive results of a stock search at IP address 199.35.212.164, which is way less since that's just a Netcom port server :-) So a credit card or checking account with just an account number and key gives you _far_ more privacy than a current conventional one - even if it's not the full mathematically subpoena-proof privacy that Chaumian digicash could give. And if your bank wants to offer extra privacy, it can let you create sub-accounts - send a request for "Create Sub-account Key SSS Account AAA Parameters p1,p2,p3" signed aaa, and it sends you a new certificate /Account=NewUnique#/etc. with key SSS signed by bbb. So you can give everybody a different-looking check, at least if the cost is low. [> Key signing "I use this name" vs. names not being able to sign "I use this key"] I still think you often want both directions, especially for privacy. (For authentication, anybody who's got the attribute you want or claim will often do; for privacy, you really want to identify the _person_ you're talking to, so the attribute "where the _real_ Carl Ellison gets his mail" is important. Pseudonyms have an easier time of this, as long as they start using their keys at the same time as their names.) #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From stewarts at ix.netcom.com Thu Oct 5 08:40:36 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Thu, 5 Oct 95 08:40:36 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m Message-ID: <199510051540.IAA23612@ix.ix.netcom.com> At 10:47 AM 10/4/95 EDT, dlv at bwalk.dm.com (Dr. Dimitri Vulis) wrote: >When an article is posted, two quantities are computed by the posting program: >M1 = H(article body + newsgroups + message-id + date + passphrase) and >M2 = H(M1). The posted article contains the header "Cancel-lock: M2". >[.. Cancel-key: M1 to cancel or supersede.] >[..Daemons forward suspected forged cancels to originator] Aside from the forged-From:-bogus-cancel spam /r$ proposed, this has the problem that it still only allows the originator to cancel a message, and not either the moderator of a moderated group or a Good Spam-canceller like CancelMoose, as well as stopping censors and cancel-spammers. Cancellation is a sufficiently local-policy-dependent issue, and reasonably low volume compared to the rest of news, that it probably makes sense for the various news programs to hand cancellation requests off to an external program, which can be locally modified as desired. One approach is to add digital signature and verification capability to News, at least to support cancels; doing this in an outboard cancel-daemon is obviously easier. RIPEM-SIG is a signature-only version of RIPEM which is exportable, probably just in binaries. The local cancel-daemon could accept cancellation requests that were signed by anybody on the list of locally-approved cancellers; one site could accept cancels from Cancelmoose, newsgroup moderators, and Helena Kobrin; another could do authors only. This would, of course, encourage people to get their digital signatures out there to allow themselves to cancel their own messages. ---------------- BTW, on the general topic of spam, I got a nice note back from the Johnson-Grace folks saying they were sorry they posted their ad/announcement to the list and it won't happen again. And you can download their compression stuff from www.jgc.com but they're not actually making the algorithms public... ----- #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From andrew_loewenstern at il.us.swissbank.com Thu Oct 5 09:07:21 1995 From: andrew_loewenstern at il.us.swissbank.com (Andrew Loewenstern) Date: Thu, 5 Oct 95 09:07:21 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m Message-ID: <9510051606.AA02119@ch1d157nwk> > One thing that occurs to me: suppose I go to control, collect cancel > messages, and build myself a collection of M1's that will work with > a given M2? > > That is, I can't actually invert the hashing function. But if a > given hash function is standard, then I can eventually build up a > collection of M1s for M2s that will let me cancel quite a few things > I may want to. How many cancel messages come through in a day? You would have to collect quite a few cancels just to get one pair of valid hashes for a message you want to cancel... You don't even need to collect cancels from control; you could just start hashing 128-bit strings until you got one that hashed to M2. The catch is you would have to hash on the order of 2^64 strings for MD5, for instance. That's a lot of hashing to cancel one article... It's likely going to be much less work to try to guess the passphrase used to generate M1. There is also a better than average chance that the target used the same passphrase to lock multiple posts... andrew From stewarts at ix.netcom.com Thu Oct 5 09:18:36 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Thu, 5 Oct 95 09:18:36 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m Message-ID: <199510051618.JAA26781@ix.ix.netcom.com> At 06:11 PM 10/5/95 +1000, you wrote: >One thing that occurs to me: suppose I go to control, collect cancel messages, >and build myself a collection of M1's that will work with a given M2? MD5 produces a very random 128-bit output; you're not going to collect any appreciable fraction of the 2**128 possible M2s. As long as M1 is even as simple as MD5(messageid,passphrase), it's pretty open territory. Targeted attacks, however, are still possible, as long as M1 retains the form MD5(known-stuff, passphrase) - assuming the user uses one of the few hundred million wimpiest passphrases, you can search that moderately fast; if you're willing to burn some resources, you might be able to take out most of alt.religion.spam, at least until people use better passphrases. The amount of work depends somewhat on whether you use MD5(known-stuff, passphrase) or MD5(passphrase,known-stuff). For the first case, the cracker would calculate the MD5 context after doing known-stuff (once) and then grind away on passphrases. For the second, the cracker could pre-compute a table of MD5 context for the wimpy password list, and then add known-stuff to each. Since known-stuff is probably longer than passphrases here, the latter is probably more secure for this application. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From pcl at sable.ox.ac.uk Thu Oct 5 09:23:42 1995 From: pcl at sable.ox.ac.uk (Paul Leyland) Date: Thu, 5 Oct 95 09:23:42 PDT Subject: Announcement: keys.pgp.net Message-ID: <199510051621.RAA18321@sable.ox.ac.uk> First the summary for those people who don't like reading more than one paragraph. The address pgp-public-keys at keys.pgp.net reaches one of several email keyservers. pgp-public-keys at keys..pgp.net goes only to key servers for . A start has been made on other services such as ftp.pgp.net. In particular, see http://www.pgp.net/pgp for more information. The domain "pgp.net" was registered last year in preparation for providing a simple and unified name space for PGP infrastructure such as key servers, software distribution sites and so on. The first steps to populate the pgp.net domain have now been taken. They are small steps, but we believe, important ones. Many more will be taken over the next few months. The first additions are for the email public key server network. The key servers are presently known by a number of different names, none of which are particularly obvious to the uninitiated. Worse, many of them are run by students or employees without the official backing of their host organizations. It's not surprising that some are unreliable and/or short-lived. A recent development, however, is that more and more servers are being run by CERT teams. Examples include those run by DFN-CERT (Germany), CERT-NL (Netherlands) and OxCERT (Oxford University). It is in the best interests of the teams that the keyservers be reliable and available. The validity of the keys themselves, of course, must be checked by their users with the usual signature checking built into PGP. We have, therefore, set up "keys.pgp.net" as a set of equal-priority MX records in the DNS. What this means, in practice, is that email sent to pgp-public-keys at keys.pgp.net will be sent to a randomly chosen keyserver. It probably doesn't matter which one, as the servers are synchronized. If the first server your mail system tries is not available, it should automatically try the other servers until one works. This should give a rather more rapid and sucessful response than the current mechanism. It is also rather easier for documentation writers, FAQ maintainers and such like to give advice which has a long shelf-life. We recognize that, for efficiency reasons, users of key servers might want to be able to specify a local machine rather than be handed a randomly selected one. The old names will continue to work: the address pgp.ox.ac.uk (for example) will continue to reach the OxCERT keyserver and no others. However, we have also registered sub-domains of pgp.net. In particular, the records for "whatever.uk.pgp.net" will only map to machines for the United Kingdom. At the moment we have the following records in place, with the expectation that more will follow: keys.de.pgp.net Germany DFN-CERT keys.no.pgp.net Norway Univ. of Tromso keys.uk.pgp.net United Kingdom OxCERT, Oxford keys.us.pgp.net United States MIT Large regions, such as the US, will eventually have several servers, each of which will be the target of equal priority MX records. We expect the Netherlands to join in with keys.nl.pgp.net very shortly. Allocation of key servers to the pgp.net domain is only the first step. Plans are advanced to set up a number of other sub-domains, all with the format [.].pgp.net. This structure allows for local customization and yet preserves the uniformity and simplicity of the naming scheme. For instance, the Web-site www.de.pgp.net would, presumably, have the text of the pages in German and would be the site recommended in German documentation, while ftp.no.pgp.net would be the principal archive of PGP-related material in Norway. So far, only ftp.pgp.net and www.pgp.net have been allocated. The URL http://www.pgp.net/pgp has more information on the pgp.net domain as it currently exists and will be kept up to date as the domain becomes more populated. Expect to see more developments along these lines later this year; all will be reported on http://www.pgp.net/pgp The following folk all had a hand in the initial stages of setting up pgp.net: Piete Brooks University of Cambridge, United Kingdom Borge Brunes University of Tromso, Norway Klaus-Peter Kossakowski DFN-CERT, Germany Brian LaMacchia MIT, United States of America Paul Leyland OxCERT, United Kingdom Teun Nijssen CERT-NL, Netherlands From fair at clock.org Thu Oct 5 09:26:42 1995 From: fair at clock.org (Erik E. Fair (Time Keeper)) Date: Thu, 5 Oct 95 09:26:42 PDT Subject: Rethinking the utility of netnews "cancel" control messages Message-ID: The day of unauthenticated netnews control messages of any kind is basically over. We gotta: 1. turn off all automated system-wide control of netnews, or 2. properly authenticate all such messages (newgroup, rmgroup, cancel, etc.). I think we also ought to think carefully about continuing to have a "cancel" control message (and the Supercedes: header) any more, authenticated or not - as useful as this mechanism occasionally is to remove unsightly spams (and other Officially Troublesome Material), isn't this kind of casual revisionism something that is, historically, to be avoided? If you had a netnews system which simply marked a message as cancelled in some way, would you set your netnews reader to seek out cancelled messages? Or ignore them? If you were a librarian or historian operating The Official USENET Archive of Everything, would you accept and process cancel control messages? "Backbone cabal? What's that?" Erik Fair From rsalz at osf.org Thu Oct 5 09:51:45 1995 From: rsalz at osf.org (Rich Salz) Date: Thu, 5 Oct 95 09:51:45 PDT Subject: Rethinking the utility of netnews "cancel" control messages Message-ID: <9510051650.AA16253@sulphur.osf.org> Cancel/Supercede is a useful model -- architecting them out of Usenet is a very bad idea. Ask Clarinet. From cme at TIS.COM Thu Oct 5 10:06:33 1995 From: cme at TIS.COM (Carl Ellison) Date: Thu, 5 Oct 95 10:06:33 PDT Subject: re. GAK - (was Re: Europe) In-Reply-To: <199510050740.AAA04867@comsec.com> Message-ID: <9510051703.AA25582@tis.com> -----BEGIN PGP SIGNED MESSAGE----- >Date: Wed, 04 Oct 1995 12:58:24 +0100 >From: Christian Wettergren >| Sweden: The authorities have not yet said anything at all about >| where they stand in the GAK controversy. Probably very few have >| heard about it. [...] >So lets go off and think hard about good (culture-related) arguments >why this is a bad idea. We'll gonna have to look really nice, and >say some sensible things. :-) Crypto is used for making sure that insiders get in while outsiders are kept out of encrypted files/messages. Strong crypto does a better job of keeping outsiders out. Things like TIS CKE are mechanisms for making sure that insiders continue to get in, in spite of mishaps with their keys. Any such system can be evaluated on its technical merits (does it really separate the insiders from the outsiders as well as it claims to?) (does it survive various disasters (because if it doesn't survive, it can't keep insiders in)?) This is a separate topic from GAK -- which boils down to the Government's claim that it should be listed as an insider for everybody. That's what needs to be brought to everyone's attention. - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHQP11QXJENzYr45AQGLTwQAnZheg0W7qMbX4SuWExsFuVj9K4bVeBQ0 KV0B+xVY259TMRBU/U6seneQ9hY/xxsqBb+fKLBI99GRcT0+4bun21TprfBiPR2v bsH/ZK6g3v5pexY8NlOv1bl9FIa1EoytMOVAsJhBtW4hddFa+tcsQSRNAWN2yoXk u5cGLzUSIx4= =BY+c -----END PGP SIGNATURE----- From Ulf.Moeller at hamburg.netsurf.de Thu Oct 5 10:09:32 1995 From: Ulf.Moeller at hamburg.netsurf.de (Ulf Moeller) Date: Thu, 5 Oct 95 10:09:32 PDT Subject: Elementrix Press Release In-Reply-To: <306C7A37@hamachi> Message-ID: > "Elementrix has found a logical way to generate non-algorithmic, >dynamically changing keys at two separate sites without transmitting >them on the line and without using parallel lines," said Dr. David Kahn, Obviously they have invented a telepathic key exchange scheme. From fair at clock.org Thu Oct 5 10:19:05 1995 From: fair at clock.org (Erik E. Fair (Time Keeper)) Date: Thu, 5 Oct 95 10:19:05 PDT Subject: Rethinking the utility of netnews "cancel" control messages Message-ID: At 9:50 10/5/95, Rich Salz wrote: >Cancel/Supercede is a useful model -- architecting them out of Usenet >is a very bad idea. Ask Clarinet. Is it? The principal effects of not having the mechanism is a slightly higher disk storage requirement for netnews - something completely unheard of in the annals of USENET. The downsides of having the mechanism (especially unauthenticated) we see now: official and unofficial squelching of articles that someone doesn't like for whatever arbitrary or situational reason. In the long run, which is the more detrimental effect? It isn't desireable for systems to be perfectly efficient, if they generate imperfect results; as I understand it, the ponderousness of our federal legislative system was designed in for precisely this reason: they were optimizing for long term correctness, instead of efficiency. Frankly, I think that if the question were posed correctly, I'm sure that Brad Templeton (President of Clarinet) would think carefully about answering it, since it has quite a few aspects. I'm just trying to stimulate a little more careful thought about this as a philosopical issue, before you go whack on INN again... Erik Fair From tcmay at got.net Thu Oct 5 10:29:47 1995 From: tcmay at got.net (Timothy C. May) Date: Thu, 5 Oct 95 10:29:47 PDT Subject: Certificates, Attributes, Web of Trust Message-ID: I have often said "You are your key." That is, keys have priority over names, even True Names. The biometric True Name identity of a person holding a key is only _another attribute_ of the key. Maybe important, maybe not. It depends on the nature of the transaction. But I go further: a huge number of interesting applications of strong crypto have no connections at all with physical persons, let alone with True Names. Agents in computer transactions, applets fired across networks, agoric entities in computational ecologies, BlackNet sorts of markets, and on and on. The notion that a cryptographic key needs to be tied to a physical person is deeply flawed. The talk of certification authorities is OK, so long as the practice is _completely_ and "strongly" voluntary (*). (* I think maybe we need a term like "strongly voluntary," to parallel "strong crypto." A key escrow system which can have arbitrary escrow holders--company lawyers, grandmothers, computers in other buildings, etc.--is "strongly voluntary." A government-sanctioned program which authorizes, approves, regulates, and controls escrow holders is *not*. GAK is not strongly voluntary, even though it will be sold as a "voluntary" system.) --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From rsalz at osf.org Thu Oct 5 10:35:30 1995 From: rsalz at osf.org (Rich Salz) Date: Thu, 5 Oct 95 10:35:30 PDT Subject: Rethinking the utility of netnews "cancel" control messages Message-ID: <9510051734.AA16383@sulphur.osf.org> I would like to put my corporate legal infrastructe on an internal secure conferencing system. News (with crypto-signed articles) is ideal. Without a "destroy all copies" concept I cannot do this. /r$ From shamrock at netcom.com Thu Oct 5 10:53:31 1995 From: shamrock at netcom.com (Lucky Green) Date: Thu, 5 Oct 95 10:53:31 PDT Subject: SSL telnet vs. SSH. Comparison? Message-ID: <199510051751.NAA03127@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- Would somebody please compare for me SSL telnet vs. SSH in terms of security, advantages, and disadvantages? Thanks, - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHQbESoZzwIn1bdtAQFgxgF/bx0sbAWQ2mFbwaSqcKSolepKNCC/kiNm 22gizTztznICXRPxh17VxkpiWwzcRZPv =QD3j -----END PGP SIGNATURE----- From gnu at toad.com Thu Oct 5 11:35:17 1995 From: gnu at toad.com (John Gilmore) Date: Thu, 5 Oct 95 11:35:17 PDT Subject: Restrictions on Munitions _Imports_ In-Reply-To: <199510050659.XAA04557@comsec.com> Message-ID: <9510051835.AA19648@toad.com> Peter D. Junger--Case Western Reserve University Law School--said: > There is a United States Munitions List for imports that is > administered by the Treasury Department, but cryptographic devices and > software are not included on that list. I agree with Peter. I looked this up at one point. The government has considered trying to impose import controls on crypto, like they've considered every other option they could think of. The question is what it would buy them except more trouble from the public. NSA can't sustain a claim that it would help them, since they aren't supposed to be spying on Americans anyway. But in Clipper-II, NSA risks effective export controls to advance FBI wiretapping interests. Now that NSA is in fully naked in bed with the FBI, they could jointly claim some governmental interest in killing off domestic privacy. But that's what would land them in trouble with the public. I really think they would have done better to have just shut up about crypto and not pushed the issue. The more they tighten the screws, the more agitated and educated the public gets. For every Clipper chip that has sold to a non-governmental party, ten Cypherpunks or 'punk sympathyzers have risen up and started writing code, investigating, talking to their friends, publishing articles in the press, and filing lawsuits. Ten years ago it was pretty lonely to be a cryptographer. Most of us wouldn't be on this mailing list -- the list itself would probably not exist -- if the government had just quietly let the export criteria advance, year after year, and had let the quaint academics play with their toys. But they tried alternating between stonewalling us and forcing crap down our throats. The result has been that the public now *cares* about crypto policy. And the public will get what it wants, in the long run, no matter what the impact on the privileges of the current crop of bureaucrats. John From perry at piermont.com Thu Oct 5 11:56:37 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 5 Oct 95 11:56:37 PDT Subject: Comments on STT Spec Implementation Details In-Reply-To: <9510040519.AA05397@netmail2.microsoft.com> Message-ID: <199510051855.OAA05477@frankenstein.piermont.com> Rick Johnson writes: > We're very interested in feedback and specifics on this. We worked to > keep _only_ the detail we felt required to implement STT -- the > language is intentionally terse. However, it is in everyone's best > interest that the STT spec is completely understood and implementable. My suggestion, which I made when Microsoft made a presentation at the IETF meeting in Stockholm and then had the gall to say "oh, no, we don't intend to publish an internet draft" is that you publish this as an internet draft and try to shepard it through the IETF's standardization process. You will, of course, be savaged, but that is in the interests of everyone, including you. The belief that companies can make more money by following proprietary solutions and imposing them on the world as standards is falling away. It is in Microsoft's interest that the standard that is adopted for commerce be open, publically discussed at length, and brutally critiqued. Losing a bit of control in exchange for actually getting something that works out for you and your customers is in your interest. Perry From weidai at eskimo.com Thu Oct 5 12:01:48 1995 From: weidai at eskimo.com (Wei Dai) Date: Thu, 5 Oct 95 12:01:48 PDT Subject: subjective names and MITM Message-ID: Neither certification hiearchies nor the PGP web-of-trust are very useful because they try to bind True Names to keys and True Names have many problems. People can have duplicate names and can change their names (what happens if I legally change my name to Bill Clinton and try to get Verisign to certify my key under that name?), and often we don't care about someone's True Name. Perhaps it is better to think of names as subjective identifiers, and public keys as global ids. That is, a person who has a collection of public keys gives each of them a name, but different people can name their keys differently. Of course the holder of the corresponding private key can help in the naming process (e.g., "Please call me Wei"). If two people need to talk about a third party, they can refer to him by an arbitrary name after establishing a common binding between his key and that name. In this scheme, the man-in-the-middle problem goes away because you are no longer trying to communicate with a True Name, whose binding with a key can be spoofed, but rather with the key itself. If the holder of that key chooses to act as a middle-man by relaying messages around, that is his business, and there is really nothing you can do about it. Wei Dai From fair at clock.org Thu Oct 5 12:14:32 1995 From: fair at clock.org (Erik E. Fair (Time Keeper)) Date: Thu, 5 Oct 95 12:14:32 PDT Subject: Rethinking the utility of netnews "cancel" control messages Message-ID: At 10:34 10/5/95, Rich Salz wrote: >I would like to put my corporate legal infrastructe on an internal secure >conferencing system. News (with crypto-signed articles) is ideal. >Without a "destroy all copies" concept I cannot do this. > /r$ This, presumably, is a lawyer, discovery, lawsuit thing, right? Erik From jsw at netscape.com Thu Oct 5 12:15:15 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Thu, 5 Oct 95 12:15:15 PDT Subject: Certificates, Attributes, Web of Trust In-Reply-To: Message-ID: <30742DE1.588@netscape.com> Timothy C. May wrote: > > I have often said "You are your key." That is, keys have priority over > names, even True Names. The biometric True Name identity of a person > holding a key is only _another attribute_ of the key. Maybe important, > maybe not. It depends on the nature of the transaction. > > But I go further: a huge number of interesting applications of strong > crypto have no connections at all with physical persons, let alone with > True Names. Agents in computer transactions, applets fired across networks, > agoric entities in computational ecologies, BlackNet sorts of markets, and > on and on. > > The notion that a cryptographic key needs to be tied to a physical person > is deeply flawed. > > The talk of certification authorities is OK, so long as the practice is > _completely_ and "strongly" voluntary (*). How about if the systems allows you to get a certificate that has any name in it that you want, where the issuer makes no claims about the identity of the owner of the certificate? How about if the software lets the user decide which CAs they will accept certificates from? Given these two features, would you still consider requiring a certificate to be bad? --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From hfinney at shell.portal.com Thu Oct 5 12:25:49 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 5 Oct 95 12:25:49 PDT Subject: Certificate proposal In-Reply-To: <9510021553.AA13756@tis.com> Message-ID: <199510051924.MAA25839@jobe.shell.portal.com> -----BEGIN PGP SIGNED MESSAGE----- (...WAY behind in cypherpunks mail...) Carl Ellison writes: >Let me propose an alternative unique name: the public key (or a good hash >of it). The public key has an advantage over both X.509 and PGP names. >The binding between it and its human being is testable. You can challenge >the human in question to sign something. I don't understand this whole discussion. A certificate is a signed binding of a key and a unique name, right? If the proposal here is that the unique name be a hash of the key, you are suggesting a signed binding of a key with its hash! What is the point of a certificate which binds a key to its hash? What is such a certificate asserting? It seems to be saying nothing at all. Anybody can already tell if a hash is right, for all the good that does you. It's like a notarized statement that 2+2=4. I don't see the point. As Carl goes on to say: >Assuming you use a public key as the unique name, you end up with a much >simplified certificate. In fact, the notion of "certificate" may go away, >in the sense that the certificate binds a key to a person through a unique >name. The person binds himself to his key, on challenge (or on any message >signature). If in fact this is just a suggestion that we not have certificates, that may have some value. But as a literal suggestion that certificates bind a key hash to a key, that just doesn't make sense to me. The thing to keep in mind is, why do we want certificates? Why not just use unsigned keys? If I encrypt a message for Carl based on some key I found lying around somewhere which someone told me is his, and I send it to his mailbox, and I get a reply back, how secure is that? We all know that you don't get the full security of the encryption if you do this. Man in the middle attacks might not be easy to do in such a situation but they are certainly possible. It is such attacks that certificates (including PGP key signatures) are designed to prevent. I'd like to see some grounding of this discussion in terms of the role of certificates, and ways to prevent man in the middle attacks. I certainly have no love for facist worldwide ID cards and hierarchical, organization based naming schemes, but just using any old key because it seems to work OK most of the time isn't going to fly IMO. Hal -----BEGIN PGP SIGNATURE----- Version: 2.6 iQBVAwUBMHQw5BnMLJtOy9MBAQEDFQIAxvq8EC5zBMvUYGjwMUb2LDy/kt0gP19Z S8BY+fxswuQCIqyet6WqddtVNyBE6QlO7XTTOX5RtZvMLHLN0YVp3A== =Bq7+ -----END PGP SIGNATURE----- From wilcoxb at nagina.cs.colorado.edu Thu Oct 5 12:42:50 1995 From: wilcoxb at nagina.cs.colorado.edu (Bryce) Date: Thu, 5 Oct 95 12:42:50 PDT Subject: Rethinking the utility of netnews "cancel" control messages In-Reply-To: Message-ID: <199510051942.NAA03482@nagina.cs.colorado.edu> -----BEGIN PGP SIGNED MESSAGE----- "Erik E. Fair" (Time Keeper) wrote: > At 9:50 10/5/95, Rich Salz wrote: > >Cancel/Supercede is a useful model -- architecting them out of Usenet > >is a very bad idea. Ask Clarinet. > > Is it? The principal effects of not having the mechanism is a slightly > higher disk storage requirement for netnews - something completely unheard > of in the annals of USENET. > > The downsides of having the mechanism (especially unauthenticated) we see > now: official and unofficial squelching of articles that someone doesn't > like for whatever arbitrary or situational reason. Look just replace "cancel" with "mark as worthless and sign". Then each reader may choose to "honor" the "cancel" or not. If you are reading clari.news.world then you completely "honor" cancels signed by ClariNet. If you are reading alt.religion.scientology, then you have your user agent specifically bring "cancelled" articles to your attention for reading. :-) (As an aside this serves for moderation as well. Just tell your user agent to honor messages marked as "cancelled, signed Bob The Moderator" and you have entered a moderated newsgroup. And the protocol that's gonna bring it to you? NoCeM and its relatives. Real Soon Now, I think.) Bryce signatures follow "To strive, to seek, to find and not to yield." bryce at colorado.edu -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Automatic PGP clearsigning under Unix with Bryce's Auto-PGP v1.0 iQCVAwUBMHQ0jfWZSllhfG25AQE5MgP8Chmh7dZkdGmNCGxuL3nrKZsxrv7P8RnK tJKPUQMEpNyH7Xd4Iu4p5P3HXg3HIxo/73ALewE75cN3Zg8tV2pw0pPovPuE416M uaTs6FhTgSjh6+v3H/rt/dNqVgMfPAqPqSST3OESH2P2i6C+IkLEr4eglJWkgYJ9 L3bXB6l6IPQ= =mw+K -----END PGP SIGNATURE----- From wilcoxb at nagina.cs.colorado.edu Thu Oct 5 12:46:48 1995 From: wilcoxb at nagina.cs.colorado.edu (Bryce) Date: Thu, 5 Oct 95 12:46:48 PDT Subject: Rethinking the utility of netnews "cancel" control messages In-Reply-To: <9510051734.AA16383@sulphur.osf.org> Message-ID: <199510051946.NAA03604@nagina.cs.colorado.edu> -----BEGIN PGP SIGNED MESSAGE----- > I would like to put my corporate legal infrastructe on an internal secure > conferencing system. News (with crypto-signed articles) is ideal. > Without a "destroy all copies" concept I cannot do this. Um.. You can't give people copies of something and then destroy all copies of that thing unless you can trust those people to destroy *their* copies of it on your request. If you *can* trust them to do this, then the ratings-system solution I mentioned a minute ago will work. Just ask everyone to set their useragents to "delete" when they encounter a "deleted, signed The Boss" mark on an article. Regards, Bryce signatures follow "To strive, to seek, to find and not to yield." bryce at colorado.edu -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Automatic PGP clearsigning under Unix with Bryce's Auto-PGP v1.0 iQCVAwUBMHQ2BfWZSllhfG25AQGD7QP9HtmYVNL0OHvlaPEXzRdFI/XXwzNVjjhK QnDsK1Gxr9JXnTOORHjOuLNCp4L039UD3S43YU8Jhoo+/Gs1OHhUEK4fOlB9uV6G QS4kvBSb00ygFSZSuEgyeGVEdlDhHBw9hA06lcc2UC11yU6TM7yZFn6ko3XRrIOR 0I3nIWalaWQ= =FLQ9 -----END PGP SIGNATURE----- From adam at rosa.com Thu Oct 5 12:51:49 1995 From: adam at rosa.com (Adam Philipp) Date: Thu, 5 Oct 95 12:51:49 PDT Subject: AEgis Windoze PGP Shell (with location...sorry) Message-ID: <9510051951.AA22108@toad.com> -----BEGIN PGP SIGNED MESSAGE----- Aegis can be reached at: http://iquest.com/~aegisrc/ sorry for leaving that out las time.... -Adam -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBMHOOA2/ZTaRmpgTFAQFioQf/WYR7o5SACijZpdZ1XZHtP4X/BXprVkVV /GX/eB8jbkDaCffuIWoz34dxN5PpSXQPAbE53ZGcJEiIuYdl9CLloJj12yZFS3Bx wa0988Fz374xmgL2VA6HllQwTBjab7v6vk565RG+Rtf7t7DWGIORP5WFDbDKJ4FR yhxnPhFi/LA20aBrBjY9bfPMuFdUm+teBVjzNsgGmsTQov72iosuMh0IYhqcaBpR ndaRdpp1ntcD6A2xPn+wfEYLcLUR34YbJVHmYwN3WJuhbNbhS4x4Aa0KFE9Sbi5W bYt9wnqE0+uywTJb2Z8WUaH+0UfgeE/GNZvDe8jEp6oSUhaBs0R0LA== =9ZIj -----END PGP SIGNATURE----- --=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-+-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\ |PGP key available on my home page|Unauthorized interception violates | | http://www.rosa.com/~adam |federal law (18 USC Section 2700 et| |-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-|seq.). In any case, PGP encrypted | |SUB ROSA: Confidential, |communications are preferred for | |secret, not for publication. |sensitive materials. | \-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-+-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-/ From perry at piermont.com Thu Oct 5 13:37:46 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 5 Oct 95 13:37:46 PDT Subject: NSA Realists v. Nuts (Was: Re: Crypto APIs) In-Reply-To: <199510050757.DAA22982@ducie.cs.umass.edu> Message-ID: <199510052037.QAA05653@frankenstein.piermont.com> Futplex writes: > Matt Blaze writes: > # It seems best to encourage the realistic side of NSA as much as possible... > > James Donald writes: > > Why? Surely the realists are more dangerous than the nuts. > > One way to look at it is this: > > Could a Nutty NSA carry out its Nutty Agenda ? I'd like to say the following: I don't think the NSA is inherently the enemy at all. Signals intelligence and protecting the U.S. and its citizens from signals intelligence is probably necessary. As a radical libertarian, I'd like to see these activities carried out in the private sector, but thats another story. The real problem with the NSA is the same as the problem with the FBI re: digital telephony. They've gotten used to a certain model of how the world works and rather than adapt to new times where most people have access to strong crypto, they have decided to use the laws to try to retard the inevitable. I'm sure some NSA types are listening, so let me say this: there is no way on earth to stop the progress of a technology who's time has come. I've heard an idiot from the FBI actually say in public, in response to statements that the vast amount of open literature makes it impossible to stop bright 14 year olds from writing good crypto code, that "we aren't going to just accept this". Well, go off and accept reality, folks. You can't stop strong cryptography from being in the hands of the public. What you can do, however, is cost the nation and the world billions if not trillions in damage. If crypto had been in cellphone signaling equipment earlier billions in stolen cellphone calls would have been saved -- ditto for credit card systems. All you can succeed in doing is leeching the economy white while trying to save a model that is doomed. You can't stop strong crypto any more than the horseshoe makers could stop the automobile. Learn to live with a new model for how you work now, and you will save years of bitter and futile agony for everyone. Perry From perry at piermont.com Thu Oct 5 14:02:45 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 5 Oct 95 14:02:45 PDT Subject: NSA Realists v. Nuts (Was: Re: Crypto APIs) In-Reply-To: <199510051433.HAA11813@blob.best.net> Message-ID: <199510052102.RAA05690@frankenstein.piermont.com> "James A. Donald" writes: > If that is the case, then the "Nutty Agenda" is perfectly sane. They > want to rule over us. There is nothing crazy about that. Evil yes. > Crazy no. Their objective is to create a surveillance state, where > all actions are known and recorded by the state, in order to > facilitate detailed state control over every aspect of our lives. Our > agenda is the opposite. There is no commonality of purpose, hence no > possibility of cooperation. I disagree. Most NSA types are probably stock government employees who want to get their job done with the least muss and fuss. Some of them actually have pride in their work. Very few of them are likely actively evil. Just as I tend to see all computer systems installations in terms of securing them from attack (a couple of clients have noted I have security on the brain!), I suspect they see all things in the world in terms of signals intelligence. Whenever anything comes up that threatens their day to day way of doing things, they react badly -- its very natural. They don't want their work made hard or, even worse, their jobs destroyed. Certainly some of their masters at some times have been evil, and will continue to be in the future, just as in any governmental organization. Certainly some individuals working in the organization are evil. However, in general, what you are looking at is just the result of an entity trying to preserve itself having access to governmental force. I doubt that there are many "national domination" types in the agency, and there don't need to be for their agenda to be opposed to ours. I'll point out, though, that if anything this makes our job harder, because strong crypto in the hands of the bulk of the world's population will cost some jobs at NSA, and the only think harder to dissuade than an evil madman is someone worrying about how he is going to feed his kids once he's forced out of the government sector. Such people will say almost anything to preserve their agency. Perry From jcheng at pipeline.com Thu Oct 5 14:22:50 1995 From: jcheng at pipeline.com (John Cheng) Date: Thu, 5 Oct 95 14:22:50 PDT Subject: is this a bug of Netscape Message-ID: If you go to http://c.gp.cs.cmu.edu:5103/prog/webster, you will get a input textbox and two buttons, leave textbox blank and push Look Up Definition button, you will get a GPF? I am using Netscape V1.2N for windows. Sorry if you have knew it. J From mrm at netcom.com Thu Oct 5 15:19:33 1995 From: mrm at netcom.com (Marianne Mueller) Date: Thu, 5 Oct 95 15:19:33 PDT Subject: Oct 14 mtg - focus on java Message-ID: <199510052213.PAA26024@netcom22.netcom.com> Hi - The Oct 14 cypherpunks meeting will be focussing on Java topics. I'm putting together an agenda, and finalizing the meeting location. It looks like we'll have someone from the Java group at Sun to talk about what the current Java security policy is, and about Java and HotJava security mechanisms. Doug Barnes and Amanda Chou will talk about JCrypt, which is a set of Java wrappers for existing C encryption routines. If you'd like to talk at the Oct 14 meeting, please send me email with a description of your project, and I'll schedule you in. I'll send out mail early next week with the agenda, and letting you know where the meeting will be held. I'm trying to get a large conference room at one of the Sun facilities. Marianne mrm at netcom.com mrm at eng.sun.com From nobody at REPLAY.COM Thu Oct 5 15:59:52 1995 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 5 Oct 95 15:59:52 PDT Subject: NetManage & Cylink Crypto Message-ID: <199510052259.XAA01586@utopia.hacktic.nl> NetManage & Cylink In Internet Encryption Deal Guildford, Surrey, England, Oct 5 -- NetManage, a TCP/IP specialist company, has signed a licensing deal with Cylink Corporation. NetManage says the Cylink public key cryptography technology will be incorporated in future editions of NetManage's Internet applications software. The move is significant since it marks the beginnings of a competitor to the Netscape "secure" Web browsing software, which has had two security flaws identified in recent weeks. Initially, NetManage's Chameleon Enterprise TCP/IP applications suite will incorporate the Cylink public key encryption technology, and later will include encryption facilities in Internet Chameleon, a UKP139 PC-Windows access suite designed for dial-up access to the Internet. Both NetManage and Cylink plan to support an open interface for Internet security which addresses the flaws found in Netscape. The idea is to establish an open set of standards to which Internet access packages of all types will adhere to, and so ensure that companies developing Internet software do not "re-invent the wheel" when writing their software, and possibly open their applications up to flaws. According to NetManage, establishing a secure Internet connection requires an Internet application to perform two functions: authenticating the user, and encrypting the data flow. The link with Cylink will allow NetManage to license and include the Cylink public key encryption technology in its applications with a variety of ciphering systems to be used in the NetManage suite, including: DES, Triple DES, Safer, IDEA, Skipjack, RC-2, and RC-4. NetManage claims the current implementations of security proposed as standards by Netscape and RSA Data Security are flawed, and fail to fully accommodate "open and interoperable secure communications" between computers which use different bulk encryption ciphers. These problems, the company claims, have limited the adoption of Internet security as a widespread interoperable feature of all Internet software and hardware products, including end-user applications, servers, firewalls, and secure routers. Later this month, NetManage and Cylink plan to announce a next-generation "plug and play" Internet encryption system. The implementation will be open and will not lock software or hardware developers into the use of encryption technology from any one vendor, as is the case with Netscape, say the companies. The related APIs, key exchange technology, and encryption, will be made publicly available to other software and hardware vendors. Licensing will include source code and no per-copy royalty fees. Further information can be downloaded from NetManage's World Wide Web site at . Contact: NetManage Europe, +44-1483-302333; NetManage US, 408-973-7171. From smart at mel.dit.csiro.au Thu Oct 5 16:02:51 1995 From: smart at mel.dit.csiro.au (Bob Smart) Date: Thu, 5 Oct 95 16:02:51 PDT Subject: Certificate proposal In-Reply-To: <199510051924.MAA25839@jobe.shell.portal.com> Message-ID: <199510052302.AA11892@shark.mel.dit.csiro.au> I strongly support what Carl Ellison is saying. I've been meaning to write up something on it for so long that I must accept I'll never do it. So here instead is a quick example. > I don't understand this whole discussion. The idea is to make the public key the centre of the architecture instead of being an attribute of some other centre (e.g. distinguished name). Consider the IPSEC case. The current situation is: 1. We go through some process, let's call it Process A, where we determine that we want to talk to IP address 192.9.8.7. 2. We go through another process where we obtain the public key of 192.9.8.7. 3. We then try to decide, based on one or more certificates, whether we trust the public key to be the correct public key for 192.9.8.7. Now consider the key-centric version. 1. Process A returns a public key which denotes the destination we want to talk to. 2. We then go through a process to obtain the IP address that belongs to that public key. We probably won't use the public key as an index to get that information. We probably use the information that was input to Process A. In fact this information may fall out as a byproduct of Process A. [However if we needed to make a scalable distributed database of RSA public keys then I have a design to do this - available on application.] 3. We don't need to trust any certificates or anything else at this stage. The fact that the IP address belongs to the Public Key is signed by the Public Key itself. The same thing happens with e-mail. If "Process A" gives us an e-mail address to send to then we worry about whether we have the right public key to go with it. If Process A gives us a Public Key then we can have certainty about the associated e-mail address because the association is signed by the Public Key. And a big win that just falls out of this is that I can have a continuous exchange of information with one IP destination even if it keeps changing its actual IP address (mobile computing) or I can have an e-mail conversation with a person who keeps changing their e-mail address. The things you want just fall out instead of requiring clever software solutions. > A certificate is a signed > binding of a key and a unique name, right? In the key-centric world a certificate binds some attribute as a property of a publc key. So an X.509 certificate would say "The owner of this public key [i.e. person who knows the corresponding private key] owns the following point in the X.500 namespace", rather than that "the person identified by this DN owns the following publc key". Experience has shown that the latter interpretation is a mine-field. It really doesn't work. The idea of a key-centric architecture is the proverbial "idea whose time has come". There are echoes of it in MOSS and in STT. But it really calls out for a group to work out a complete architecture. If someone wants to start such a discussion I'll make sure I make time to be part of the process. Bob Smart From mib at io.com Thu Oct 5 16:05:50 1995 From: mib at io.com (Man In Black) Date: Thu, 5 Oct 95 16:05:50 PDT Subject: Digestable Message-ID: Would whoever posted information on a free cypherpunks digest please repost? Thanks. =]= From jsw at netscape.com Thu Oct 5 16:07:56 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Thu, 5 Oct 95 16:07:56 PDT Subject: Certificate proposal In-Reply-To: <9510021553.AA13756@tis.com> Message-ID: <3074646C.2418@netscape.com> Hal wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > (...WAY behind in cypherpunks mail...) > > Carl Ellison writes: > >Let me propose an alternative unique name: the public key (or a good hash > >of it). The public key has an advantage over both X.509 and PGP names. > >The binding between it and its human being is testable. You can challenge > >the human in question to sign something. > > I don't understand this whole discussion. A certificate is a signed > binding of a key and a unique name, right? If the proposal here is > that the unique name be a hash of the key, you are suggesting a signed > binding of a key with its hash! What is the point of a certificate > which binds a key to its hash? What is such a certificate asserting? > It seems to be saying nothing at all. Anybody can already tell if a > hash is right, for all the good that does you. It's like a notarized > statement that 2+2=4. I don't see the point. As Carl goes on to say: > > >Assuming you use a public key as the unique name, you end up with a much > >simplified certificate. In fact, the notion of "certificate" may go away, > >in the sense that the certificate binds a key to a person through a unique > >name. The person binds himself to his key, on challenge (or on any message > >signature). > > If in fact this is just a suggestion that we not have certificates, that > may have some value. But as a literal suggestion that certificates bind > a key hash to a key, that just doesn't make sense to me. > > The thing to keep in mind is, why do we want certificates? Why not just > use unsigned keys? If I encrypt a message for Carl based on some key I > found lying around somewhere which someone told me is his, and I send it > to his mailbox, and I get a reply back, how secure is that? We all know > that you don't get the full security of the encryption if you do this. > Man in the middle attacks might not be easy to do in such a situation but > they are certainly possible. It is such attacks that certificates (including > PGP key signatures) are designed to prevent. > > I'd like to see some grounding of this discussion in terms of the role of > certificates, and ways to prevent man in the middle attacks. I certainly > have no love for facist worldwide ID cards and hierarchical, organization > based naming schemes, but just using any old key because it seems to work > OK most of the time isn't going to fly IMO. I think the old idea of a certificate just binding a name and a key is turning out to not be very useful. That is why Netscape Navigator 2.0 will support x509 version 3 certificates. They allow arbitrary attributes to be signed into a certificate. In this new world, you can think of a certificate as a way of binding a key with various arbitrary attributes, one of which may be(but is not required to be) a name. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From anonymous at robo.remailer Thu Oct 5 16:18:09 1995 From: anonymous at robo.remailer (anonymous at robo.remailer) Date: Thu, 5 Oct 95 16:18:09 PDT Subject: Comments on STT Spec Implementation Details Message-ID: <199510052312.QAA08154@infinity.c2.org> Responding to msg by perry at piermont.com: [snip] >The belief that companies can make more money by >following proprietary solutions and imposing them on >the world as standards is falling away. It is in >Microsoft's interest that the standard that is adopted >for commerce be open, publically discussed at length, >and brutally critiqued. Losing a bit of control in >exchange for actually getting something that works out >for you and your customers is in your interest. The spew through the proprietary dike on this is swelling: MasterCard's consortium yesterday and the NetManage/Cylink today both emphasize public availability of specs in counter-response to the flaws helpfully discovered in Netscape by the ever public spirited cypherpunks. Whether any of these vaunted "superior" systems respond to attacks as constructively as Netscape will be the challenge. BTW, has anyone reviewed the promised MasterCard specs supposedly released on Tuesday? From gebis at ecn.purdue.edu Thu Oct 5 16:38:42 1995 From: gebis at ecn.purdue.edu (Michael J Gebis) Date: Thu, 5 Oct 95 16:38:42 PDT Subject: SSL telnet vs. SSH. Comparison? In-Reply-To: <199510051751.NAA03127@book.hks.net> Message-ID: <199510052338.SAA02892@purcell.ecn.purdue.edu> > Would somebody please compare for me SSL telnet vs. SSH in terms of > security, advantages, and disadvantages? > I'm not answering your question, but if people are looking for secure telnet implementations, here's a list that I saved from a while back. It's a bit obsolete (for example, I think ssh is on version 1.2.0 now) but it will get people started. I've been using ssh for a while, and it's the ultimate in convenience. If you haven't tried it, give it a look. (I make no claims about the security; hopefully, someone on the list will take a look and do an in-depth analysis. :) ###BEGIN INCLUDED FILE### Thanks to everyone who responded to my posting regarding a `secure telnet' implementation: Is there a (possibly free) implementation of something like a "secure telnet"? I'm looking for a way to login into a remote system providing secure interactive communication between the two hosts over (possibly insecure) Internet connections. Here's a summary of the implementations I am now aware of: * SSL There is a free implementation of Netscape's SSL Protocol (Secure Socket Layer) by Eric Young named "SSLeay" . Eric Young is also the author of a popular DES Library. SSL provides a secure authentication and encryption basis on top of which application protocols like telnet, ftp, and http may be transparently added . However, the RC4 encryption using a 40 bit key, which is employed by SSL, has recently been cracked with a brute force attack, see RISKS-17.27 . A modified version of telnet that uses SSL-based authentication and encryption is also available . * Deslogin Deslogin by Dave Barrett provides a network login service much like rlogin/rlogind. Deslogin uses a `challenge-response' protocol to authenticate users. Also, all data transmitted to and from the remote host in encrypted using the DES. Deslogin also includes a command-line program `cipher' for fast DES encryption. * SRA Telnet This is a version of the SRA Telnet modified by the Technical University of Chemnitz. A session key is negotiated using an uncertified Diffie-Hellman-Method and used for the encryption of UID and password. The complete session text in encrypted with DES in CFB mode. * Ssh Ssh (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. Among other features, Ssh is a complete replacement for rlogin, rsh, and rcp. * Skey Bell Canada's `skey' free-ware implements a one-time password system, so that sniffers can get your ID and PW, but can't use the PW next time. ---------------------------------------------------------------------- I provide this information in the hope that it will be useful, but with no claim of either completeness or correctness. Thanks again to all who contributed to compile the above information. -- Jochen Schwarze ###END INCLUDED FILE### -- Mike Gebis gebis at ecn.purdue.edu From sunder at dorsai.dorsai.org Thu Oct 5 16:43:08 1995 From: sunder at dorsai.dorsai.org (Ray Arachelian) Date: Thu, 5 Oct 95 16:43:08 PDT Subject: Secure Drive questions... Message-ID: Hi, I recently got me a much larger hard drive and would like to encrypt more than one partition using SecureDrive. I'm using an old 1.1 version which, when I log into one partition, the others vanish. I'm using the same passphrase on both paritions. I've never upgraded because the previous version did what I wanted it to do very well and I have never had a problem with it. I've noticed that on some machines SecureDevice failed where SecureDrive 1.1 worked perfectly... So I've stuck with that... but now, I'd rather not join the two partitions together if I can help it... too much work to copy everything off, repartition, restore, etc... (This is a 1.2Gb WD Caviar drive using the Disk Manager crud that makes the drive visible to DOS by loading some DMDRVR.BIN driver only - my BIOS only sees 550Mb or so without it...) Is this a question of upgrading, if so, what's the latest version? And are there any catches, snags, or problems to watch out for before I potentially kill my drives? :-) A few more questions, I've left a bit of space for me to experiment with something like OS/2Warp or Win95 or even Netware 4.1 (got a cool 2 user license for $50 from Novell I'd like to install.) Now while OS/2 and Win95 can see FAT partitions, what will stop them from trying to run something like chkdsk on it? Can I load the secure drive tsr to keep the encrypted drive safe with those operating systems? (I know Netware will keep its mits off non-Netware partitions, so that's a safe bet - but then I don't have another PC to use as a host so this will be a clientless server. Just want to experiment with it I guess... :-) I'd also consider messing with NT, I have enough RAM and space, but anyone know a place I can get a good price for it? $400 is a bit steep for an OS I probably won't do much with. And YES, I will install Linux - soon as I can get it to recognize my I/O-less FutureDomain clone SCSI controller. (It's based on the 950 chip, no I/O address, uses int 15 and DMA for transfers..) Works okay under Coherent - then again, I'm using the IDE controller under Coherent... :-) The SCSI FD controller is for the CDROM drive... ========================================================================== + ^ + | Ray Arachelian | Amerika: The land of the Freeh. | _ |> \|/ |sunder at dorsai.org| Where day by day, yet another | \ | <--+-->| | Constitutional right vanishes. | \| /|\ | Just Say | | <|\ + v + | "No" to the NSA!| Jail the censor, not the author!| <| n ========================================================================== From dvw at hamachi.epr.com Thu Oct 5 17:12:06 1995 From: dvw at hamachi.epr.com (David Van Wie) Date: Thu, 5 Oct 95 17:12:06 PDT Subject: NSA Realists v. Nuts (Was: Re: Crypto APIs) Message-ID: <30747427@hamachi> Perry E. Metzger wrote: >The real problem with the NSA is the same as the problem with the FBI >re: digital telephony. They've gotten used to a certain model of how >the world works and rather than adapt to new times where most people >have access to strong crypto, they have decided to use the laws to try >to retard the inevitable. Perry is absolutely right about this. We have been living in a "golden era" for the FBI and NSA. By analogy, we have also been living in a golden era for physicians: during the last several decades (in the developed world anyway) we have relied on antibiotics to the point where they are taken for granted. This time has passed, and there is no going back. The Golden Age of Antibiotics is over. Similarly, the Golden Age of Wiretaps is over. No amount of wishful thinking and convoluted logic can put the genie back into the bottle. An attempt to (in effect) make certain types of mathematics illegal will only serve to knock us out of our technological leadership position, not make our country safe from terrorism and drugs. Given a world in which strong crypto is actually used, and that use is illegal, how can a government make the punishment fit the crime? Would all use of illegal cryptography be treated as though there was an actual threat of terrorism? The death penalty? This is, of course, an absurd point of view. The government could no more accomplish this than they could make muttering over the phone (thereby defeating a plaintext wiretap), or the use of obscure language (such as Native American dialects) illegal. It just doesn't hang together as a rational approach. Like physicians, the FBI and the national security operations must devise alternative schemes to combat the real "enemy," terrorists and drug dealers -- not mathematicians and ordinary citizens trying to have a private conversation. The suppression of basic rights that would be required in any attempt to overcome the "force of nature" that is human knowledge would make a mockery of our "inalienable rights" as free people to conduct our lives without fear of the overbearing scrutiny of unrestrained government. dvw From andrew_loewenstern at il.us.swissbank.com Thu Oct 5 17:12:40 1995 From: andrew_loewenstern at il.us.swissbank.com (Andrew Loewenstern) Date: Thu, 5 Oct 95 17:12:40 PDT Subject: NetManage & Cylink Crypto Message-ID: <9510060012.AA02236@ch1d157nwk> Anonymous wrote: > The link with Cylink will allow NetManage to license and include > the Cylink public key encryption technology in its applications > with a variety of ciphering systems to be used in the NetManage > suite, including: DES, Triple DES, Safer, IDEA, Skipjack, RC-2, ^^^^^^^^ > and RC-4. Hey, this is interesting... will Skipjack be included in future NetManage products or is this press-release only mentioning Skipjack as an example of a possible encryption algorithm for use with NetManage? andrew "Gentlemen, start your disassemblers." From adam at homeport.org Thu Oct 5 17:18:56 1995 From: adam at homeport.org (Adam Shostack) Date: Thu, 5 Oct 95 17:18:56 PDT Subject: subjective names and MITM In-Reply-To: Message-ID: <199510060021.UAA02958@homeport.org> Wei Dai wrote: | Perhaps it is better to think of names as subjective identifiers, and | public keys as global ids. That is, a person who has a collection of | public keys gives each of them a name, but different people can name their | keys differently. Of course the holder of the corresponding private key | can help in the naming process (e.g., "Please call me Wei"). If two | people need to talk about a third party, they can refer to him by an | arbitrary name after establishing a common binding between his key and | that name. Just a minor nit regarding a well thought out post, public keys are not 'global' ids, but 'system-wide' IDs. For keys to be really global, there needs to be a mechanism in place for insuring that key ids are very probably unique. One way to ensure that keys are globally unique would be to integrate a KCA identifier with the keyid, and KCAs base part of their reputation on not signing multiple keys with the same id. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From adam at homeport.org Thu Oct 5 17:32:26 1995 From: adam at homeport.org (Adam Shostack) Date: Thu, 5 Oct 95 17:32:26 PDT Subject: Certificate proposal In-Reply-To: <3074646C.2418@netscape.com> Message-ID: <199510060035.UAA02995@homeport.org> Jeff Weinstein wrote: | I think the old idea of a certificate just binding a name and | a key is turning out to not be very useful. That is why Netscape | Navigator 2.0 will support x509 version 3 certificates. They allow | arbitrary attributes to be signed into a certificate. In this new | world, you can think of a certificate as a way of binding a key with | various arbitrary attributes, one of which may be(but is not | required to be) a name. I'm a bit behind on the X.509 discussion, but does version 3 resist the attack Ross Anderson mentions in his 'Robustness Principles' paper in Crypto '95? (The paper can be found in ftp.cl.cam.ac.uk:/users/rja14/robustness.ps.Z The wcf.ps.Z is his 'Why Cryptosystems Fail' paper, and both are well worth reading.) Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From hfinney at shell.portal.com Thu Oct 5 17:41:02 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 5 Oct 95 17:41:02 PDT Subject: Certificate proposal In-Reply-To: <9510021553.AA13756@tis.com> Message-ID: <199510060039.RAA18405@jobe.shell.portal.com> Jeff Weinstein writes: > I think the old idea of a certificate just binding a name and >a key is turning out to not be very useful. That is why Netscape >Navigator 2.0 will support x509 version 3 certificates. They allow >arbitrary attributes to be signed into a certificate. In this new >world, you can think of a certificate as a way of binding a key with >various arbitrary attributes, one of which may be(but is not >required to be) a name. OK, so suppose I want to send my credit card number to Egghead Software. I get one of these new-fangled certificates from somebody, in which VeriSign has certified that key 0x12345678 has hash 0x54321. I think we can agree that by itself this is not useful. So, it will also bind in some attribute. What will that attribute be? Hal From rsalz at osf.org Thu Oct 5 17:45:57 1995 From: rsalz at osf.org (Rich Salz) Date: Thu, 5 Oct 95 17:45:57 PDT Subject: Rethinking the utility of netnews "cancel" control messages Message-ID: <9510060045.AA17061@sulphur.osf.org> >Look just replace "cancel" with "mark as worthless and sign". Then No. Replace cancel with 1. Legal wants you to destroy this document 2. The site security officer wants you to destroy the document 3. The license has expired and you must destroy the document and so on. I don't think my life has been all that interesting, but I've had all of those things happen. Of course there is no guarnatee that indiviuals don't have private copies, etc., but you have this situation currently and it works. Replacing cancel with setaside makes Usenet architecture useful for many business semantics/requirements. That's not something I'm willing to trade away and I am surprised that others would... /r$ From sjb at universe.digex.net Thu Oct 5 17:52:22 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Thu, 5 Oct 95 17:52:22 PDT Subject: subjective names and MITM In-Reply-To: <199510060021.UAA02958@homeport.org> Message-ID: <199510060051.UAA04613@universe.digex.net> Adam Shostack writes: > Just a minor nit regarding a well thought out post, public >keys are not 'global' ids, but 'system-wide' IDs. For keys to be >really global, there needs to be a mechanism in place for insuring >that key ids are very probably unique. One way to ensure that keys >are globally unique would be to integrate a KCA identifier with the >keyid, and KCAs base part of their reputation on not signing multiple >keys with the same id. A public key *is* "very probably unique". A "randomly selected" 1024 bit prime number has a specific amount of entropy in it. The likelihood of two users world wide "randomly" choosing the same such prime may be precisely determined (assuming you can figure the entropy). Who needs a KCA to certify it? The real benefit of the KCA is as a means of linking the key with a unique person. As I've commented before, anonyms have no meaningful "credit rating". From weidai at eskimo.com Thu Oct 5 17:56:42 1995 From: weidai at eskimo.com (Wei Dai) Date: Thu, 5 Oct 95 17:56:42 PDT Subject: Certificate proposal In-Reply-To: <199510051924.MAA25839@jobe.shell.portal.com> Message-ID: Hal wrote: > The thing to keep in mind is, why do we want certificates? Why not just > use unsigned keys? If I encrypt a message for Carl based on some key I > found lying around somewhere which someone told me is his, and I send it > to his mailbox, and I get a reply back, how secure is that? We all know > that you don't get the full security of the encryption if you do this. > Man in the middle attacks might not be easy to do in such a situation but > they are certainly possible. It is such attacks that certificates (including > PGP key signatures) are designed to prevent. I think Carl's point is that when you write an e-mail to Carl, you probably don't care that it reaches the "real" Carl Ellison, because you don't have a binding between the name "Carl Ellison" and the physical person. A binding between a name and a key is useless if there is no binding between the name and the person. Since this is the case, why not forget about the binding between the name and the key (or turn it into a local one as I suggested in the previous post) and go straight to the binding between the key and the person? On the other hand, if you do have a binding between the name and the person, then most likely you met Carl at some point in the past and he told you his name was Carl Elison. In that case it would have been just as easy for him to give you his public key instead. Wei Dai From rsalz at osf.org Thu Oct 5 18:08:42 1995 From: rsalz at osf.org (Rich Salz) Date: Thu, 5 Oct 95 18:08:42 PDT Subject: Rethinking the utility of netnews "cancel" control messages Message-ID: <9510060107.AA17155@sulphur.osf.org> Sigh. >Replacing cancel with setaside makes Usenet architecture useful for >many business semantics/requirements. That's not something I'm willing to Sigh. useLESS for many ... From hfinney at shell.portal.com Thu Oct 5 18:22:27 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 5 Oct 95 18:22:27 PDT Subject: subjective names and MITM In-Reply-To: Message-ID: <199510060121.SAA25213@jobe.shell.portal.com> Wei Dai writes: >In this scheme, the man-in-the-middle problem goes away because you are >no longer trying to communicate with a True Name, whose binding with a >key can be spoofed, but rather with the key itself. If the holder of >that key chooses to act as a middle-man by relaying messages around, that >is his business, and there is really nothing you can do about it. Carl Ellison has been arguing a similar point for some time, if I understand him, which I may not! The man in the middle problem is a difficult one, but I don't think you're going to get away with defining the problem out of existence. There is a difference between a MITM and the case you describe where you are actually communicating securely with the person you think you are, but he chooses to relay the messages around. The difference is that if you are actually communicating securely with an individual, you can form some estimate of his personality, judgement, etc. You may choose on this basis to trust him, provide sensitve information, take risks, and so on. But if he is actually behind a MITM then all bets are off. All of your judgement about him is irrelevant. At any time the MITM can take advantage of the information you provide. He can even "blow his cover" and take extreme action, to your detriment. This situation with the MITM is actually about the same as if you were communicating insecurely in the first place. You are exposed to all of the same risks. So if you are willing to accept communicating systems that allow this kind of attack, you almost might as well not use cryptography at all. (Not quite, because the MITM is a more expensive attack to mount than one on an unsecured wire.) In fact, I can facetiously prove that cryptography is unnecessary. We are not communicating with individuals, but with communicatees. All of your messages are by definition going to the communicatee with whom you are communicating. If the particular communicatee who is receiving your message chooses to relay it or spread the information around in other ways, that is the right and privilege of the communicatee. But messages are going to the communicatee they are going to, whether encryption is used or not. So encryption is not necessary. This argument seems to mirror the one for why we only communicate with keys, that if a key wants to do something nasty we can't stop it (him?), etc. I say, we don't communicate with keys. We communicate with people (or occasionally programs). Hal From rah at shipwright.com Thu Oct 5 18:27:32 1995 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 5 Oct 95 18:27:32 PDT Subject: GC Tech GlobeID pilot Message-ID: --- begin forwarded text X-Sender: pays at edelweb.fr Mime-Version: 1.0 Date: Fri, 6 Oct 1995 00:46:46 +0100 To: Amir Herzberg From: pays at gctech.edelweb.fr (Paul-Andre Pays) Subject: GC Tech GlobeID pilot Cc: e-payment at cc.bellcore.com, ietf-payments at cc.bellcore.com, www-buyinfo at allegra.att.com As it seems everyone is broadcasting URL about electronic payment systems, let me propose http://globeid.gctech.fr/cgi-gid/welcome?Language=English which does no lead to a specification but the Globe Online, Globe ID pilot setup By GC Tech. Sorry only a few pages are available in english by now. English and some other languages wil be available within a few weeks Sorry again, but because real content is and will be available we commited to deliver only a few hundreds Web Wallets for this pilot. You can still use the web form to apply for one... -- PAP _________________________________________________________________________ PAP: paul-andre.pays at gctech.edelWeb.fr tel: +33 1 34 52 00 88 fax: +33 1 34 52 25 26 GC Tech "The Globe Online and Globe ID Technology Company" http://www.globeonline.fr/ http://www.gctech.fr/ --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From rah at shipwright.com Thu Oct 5 18:31:50 1995 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 5 Oct 95 18:31:50 PDT Subject: (cpx) Mastercard, IBM, Netscape, CyberCash and GTE publish SEPP Message-ID: --- begin forwarded text To: e-payment at cc.bellcore.com, ietf-payments at cc.bellcore.com, www-buyinfo at allegra.att.com Subject: Mastercard, IBM, Netscape, CyberCash and GTE publish SEPP Mime-Version: 1.0 Date: Thu, 05 Oct 1995 16:12:23 -0400 From: Amir Herzberg MasterCard's Secure Electronic Payment Protocol is now available on the WWW at http://www.mastercard.com/Sepp/sepptoc.htm (without the `l'). This protocol is based on iKP but includes much more details. You can download it from the page above until we `re-hash' it into Internet Draft form. Comments are very welcome, and I suggest we use the e-payment mailing list for them (until an IETF working group is formed). I believe that the publication of this spec and the STT spec suggests that we should in fact proceed now with establishing a working group. So, I plan to submit an updated charter soon... Comments on it are also welcome. Best, Amir Text version of the page: Secure Electronic Payment Protocol Specification The development of electronic commerce is at a critical juncture. Consumer demand for secure access to electronic shopping and other services is very high; merchants want simple, cost-effective methods for conducting electronic transactions; financial institutions want a level-playing field for software suppliers to ensure quality products at competitive prices. The next step to achieving secure, cost-effective on-line transactions at a rate fast enough to satisfy market demand, is the development of a single, open industry specification. The generally accepted process for developing a technical standard or specification within an industry is comprised of five steps: Collaboration of interested parties Preparation of the document Availability of the document for comment Modification of the document based on the comments Publication of the document for implementation. In a effort to develop a specification for securing bankcard transactions over the Internet and other open networks, IBM, Netscape, GTE, CyberCash and MasterCard have cooperatively developed the following draft document, which is now available for review and comment. Each company brought unique and valuable experience to the effort. The result of this collaboration is Secure Electronic Payment Protocol (SEPP) an open, vendor-neutral, non-proprietary, license-free specification for securing on-line transactions. Currently in draft form, this document is available for review and comment by all interested parties. It also will be sent to Internet standards-setting bodies, including the Internet Engineering Task Force. Once comments are received, modifications will be made and a final document will be published in the public domain. Access to SEPP Specification This specification is structured in five files in order to make downloading easier: Preface: This file provides an overview of the entire SEPP document. Postscript (.Z), Postscript (.zip), Postscript (.hqx), Mac OS (Word 5.1[.hqx]) If you'd like to browse just this part, Click Here. Part 1 - Business Requirements: This file defines the major business requirements for secure electronic payments. Postscript (.Z), Postscript (.zip), Postscript (.hqx), Mac OS (Word 5.1[.hqx]) Part 2 - Functional Specification: This file contains the functional specification for the payment process and the certificate management system. Postscript (.Z), Postscript (.zip), Postscript (.hqx), Mac OS (Word 5.1[.hqx]) Part 3 - Payment System Specification: This file defines the detailed design for the payment system. Postscript (.Z), Postscript (.zip), Postscript (.hqx), Mac OS (Word 5.1[.hqx]) Part 4 - Certificate Management Specification: This file defines the detailed design for the Certificate Management System. Postscript (.Z), Postscript (.zip), Postscript (.hqx), Mac OS (Word 5.1[.hqx]) --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From tcmay at got.net Thu Oct 5 19:01:59 1995 From: tcmay at got.net (Timothy C. May) Date: Thu, 5 Oct 95 19:01:59 PDT Subject: Certificates, Attributes, Web of Trust Message-ID: At 7:11 PM 10/5/95, Jeff Weinstein wrote: > How about if the systems allows you to get a certificate that >has any name in it that you want, where the issuer makes no >claims about the identity of the owner of the certificate? >How about if the software lets the user decide which CAs they >will accept certificates from? Given these two features, >would you still consider requiring a certificate to be bad? Let's make sure what we mean by these two points: 1. "...allows you to get a certificate that has any name in it that you want, where the issuer makes no claims about the identity of the owner of the certificate?" I would expect that a certificate for "%63rrW209neU6q!" would be issuable for a miniscule amount of money, and as many of these as are desired. (No, I'm not saying "Verisign" must offer certificates for very low cost, only that there be no built-in costs, or built-in time delays and processing delays, that would prevent "Tim's Really Cheap and No Questions Asked Certificate Service" from issuing such certificates, cheaply and rapidly (in seconds, or less, as some applications will need this, if other services "demand" certificates). 2. "...software lets the user decide which CAs they will accept certificates from?" Fine, provided the following CAs are acceptable: -- an "automatic" certificate granter, essentially meant only to satisfy protocols which require certificates -- a certifier for the Mob, which sells certificates for some fee -- the application itself should be able to generate certificates immediately...call this the "null certification." It is true that some of these example seem to "undermine" the whole purpose of certificates, but this is precisely my point: if I want a key to be certified, I will determine the conditions under which I want it to be certified. Other parties are free to meet my conditions if they wish to do business with me, or not, as the case may be. The "null certification" is thus very important. Naturally, I think this null certification makes the idea of _requiring_ certification moot. Will Netscape allow this? --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From gnu at toad.com Thu Oct 5 19:02:38 1995 From: gnu at toad.com (John Gilmore) Date: Thu, 5 Oct 95 19:02:38 PDT Subject: The Intelligence community -- some interesting web pages Message-ID: <9510060202.AA05514@toad.com> I particularly liked the NSA surrogate home page under the second URL. --John From: farber at central.cis.upenn.edu (David Farber) Try looking at http://www.awpi.com/IntelWeb/ -- IntelWeb - The WWW Site of Intelligence Watch Report (IWR) and http://www.fas.org/pub/gen/fas/irp/ -- Project on Intellience Reform federation of American Scientists From tcmay at got.net Thu Oct 5 19:17:04 1995 From: tcmay at got.net (Timothy C. May) Date: Thu, 5 Oct 95 19:17:04 PDT Subject: Insiders vs. Outsiders...a Nice Metaphor Message-ID: At 5:03 PM 10/5/95, Carl Ellison wrote: >Crypto is used for making sure that insiders get in while outsiders are >kept out of encrypted files/messages. > >Strong crypto does a better job of keeping outsiders out. > >Things like TIS CKE are mechanisms for making sure that insiders continue >to get in, in spite of mishaps with their keys. > > >Any such system can be evaluated on its technical merits (does it really >separate the insiders from the outsiders as well as it claims to?) (does it >survive various disasters (because if it doesn't survive, it can't keep >insiders in)?) > > >This is a separate topic from GAK -- which boils down to the Government's >claim that it should be listed as an insider for everybody. > > >That's what needs to be brought to everyone's attention. This is a very nice metaphor for what is going on. It also touches on some of the issues about key certification. The issue of who a person is has nothing to do directly with whether they are an "insider" or an "outsider." (In fact, who a person "really is" is almost beside the point.) --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From adam at homeport.org Thu Oct 5 19:21:02 1995 From: adam at homeport.org (Adam Shostack) Date: Thu, 5 Oct 95 19:21:02 PDT Subject: subjective names and MITM In-Reply-To: <199510060051.UAA04613@universe.digex.net> Message-ID: <199510060224.WAA03180@homeport.org> Scott Brickner wrote: | Adam Shostack writes: | > Just a minor nit regarding a well thought out post, public | >keys are not 'global' ids, but 'system-wide' IDs. For keys to be | >really global, there needs to be a mechanism in place for insuring | >that key ids are very probably unique. One way to ensure that keys | >are globally unique would be to integrate a KCA identifier with the | >keyid, and KCAs base part of their reputation on not signing multiple | >keys with the same id. | | A public key *is* "very probably unique". A "randomly selected" 1024 bit | prime number has a specific amount of entropy in it. The likelihood of | two users world wide "randomly" choosing the same such prime may be | precisely determined (assuming you can figure the entropy). The key does indeed have a high likelihood of being unique, but dealing with 1024 bit identifiers could strain database systems, especially when 100 well chosen bits would be than enough. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From norm at netcom.com Thu Oct 5 19:25:24 1995 From: norm at netcom.com (Norman Hardy) Date: Thu, 5 Oct 95 19:25:24 PDT Subject: Simple Hardware RNG Idea Message-ID: Simon Spero writes: .... > What about a beam of high intensity ionising radiation aimed at the > detector? .... You presumably use the oddness of the count for your random bit in some predetermined time interval. External radiation can change, but not bias the parity. If the counter saturates, the counter may be biased towards one parity but the software can easily detect saturation presuming it gets the count. You can use the source in a smoke detector. From edge at got.net Thu Oct 5 19:35:22 1995 From: edge at got.net (Jay Campbell) Date: Thu, 5 Oct 95 19:35:22 PDT Subject: GC Tech GlobeID pilot Message-ID: <199510060253.TAA28173@you.got.net> > http://globeid.gctech.fr/cgi-gid/welcome?Language=English >Sorry again, but because real content is and will be available >we commited to deliver only a few hundreds Web Wallets for this >pilot. You can still use the web form to apply for one... Except for this clause... | Caution: Following form is provided for demonstration purpose only. | If you really want to participate to the Globe ID electronic wallet pilot | program, please contact Mr. Pierre Edelman or GID95 at GCTech.fr. On the surface, this doesn't look much different than First Virtual or any of the myriad other "let me hold your credit card number for you" sites. -- Jay Campbell - Regional Operations Manager -=-=-=-=-=-=- Sense Networking (Santa Cruz Node) edge at you.got.net "Shoot the Fruit Loop" 408.469.9400 "On the Information Superhighway, I'm the guy behind you in this morning's traffic jam leaning on his horn." From tcmay at got.net Thu Oct 5 19:54:05 1995 From: tcmay at got.net (Timothy C. May) Date: Thu, 5 Oct 95 19:54:05 PDT Subject: subjective names and MITM Message-ID: At 12:51 AM 10/6/95, Scott Brickner wrote: >A public key *is* "very probably unique". A "randomly selected" 1024 bit >prime number has a specific amount of entropy in it. The likelihood of >two users world wide "randomly" choosing the same such prime may be >precisely determined (assuming you can figure the entropy). > >Who needs a KCA to certify it? > >The real benefit of the KCA is as a means of linking the key with a unique >person. As I've commented before, anonyms have no meaningful "credit rating". If I understand your usage of "anonym" correctly, I think you are clearly wrong. An anonymous agent who has no persistence (no past history, no continuing history, no expectation by others of future history) probably has no credit rating, no "reputation." However, an anonymous agent _with_ a persistent presence can have a credit rating or reputation. Many examples of this, e.g., Pr0duct Cypher, Black Unicorn, S. Boxx, and others. The "linking with a unique person" is not especially important, IMO. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From tomw at orac.engr.sgi.com Thu Oct 5 20:59:01 1995 From: tomw at orac.engr.sgi.com (Tom Weinstein) Date: Thu, 5 Oct 95 20:59:01 PDT Subject: Certificate proposal In-Reply-To: <9510021553.AA13756@tis.com> Message-ID: <199510060358.UAA03869@orac.engr.sgi.com> In article , Hal writes: > OK, so suppose I want to send my credit card number to Egghead Software. > I get one of these new-fangled certificates from somebody, in which > VeriSign has certified that key 0x12345678 has hash 0x54321. I think we > can agree that by itself this is not useful. So, it will also bind in > some attribute. What will that attribute be? Um, just a wild guess, but... your credit card number maybe? (Well, okay, its hash.) -- Sure we spend a lot of money, but that doesn't mean | Tom Weinstein we *do* anything. -- Washington DC motto | tomw at engr.sgi.com From shamrock at netcom.com Thu Oct 5 21:01:03 1995 From: shamrock at netcom.com (Lucky Green) Date: Thu, 5 Oct 95 21:01:03 PDT Subject: NetManage & Cylink Crypto Message-ID: <199510060358.XAA05252@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <9510060012.AA02236 at ch1d157nwk>, andrew_loewenstern at il.us.swissbank.com (Andrew Loewenstern) wrote: > Anonymous wrote: > > The link with Cylink will allow NetManage to license and include > > the Cylink public key encryption technology in its applications > > with a variety of ciphering systems to be used in the NetManage > > suite, including: DES, Triple DES, Safer, IDEA, Skipjack, RC-2, > ^^^^^^^^ > > and RC-4. > > Hey, this is interesting... will Skipjack be included in future NetManage > products or is this press-release only mentioning Skipjack as an example of a > possible encryption algorithm for use with NetManage? It probably requires a PCMCIA card. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHSpfCoZzwIn1bdtAQHhuAGAk64TLT89fxllmp1WhLxT/QJCrUuz3RmG MPI9irXcFyldaHEIlnDGpk7OQug5uTY1 =dyzf -----END PGP SIGNATURE----- From shamrock at netcom.com Thu Oct 5 21:11:26 1995 From: shamrock at netcom.com (Lucky Green) Date: Thu, 5 Oct 95 21:11:26 PDT Subject: Certificates, Attributes, Web of Trust Message-ID: <199510060409.AAA05305@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article , tcmay at got.net (Timothy C. May) wrote: [...] > But I go further: a huge number of interesting applications of strong > crypto have no connections at all with physical persons, let alone with > True Names. Agents in computer transactions, applets fired across networks, > agoric entities in computational ecologies, BlackNet sorts of markets, and > on and on. This is true. Some of the most interesting applications of crypto don't involve True Names at all. The only reason, IMHO, why crypto is often thought of in terms of communicating between two True Names is because it is an obvious application to the layman. But it are the Blacknet type of uses where crypto really shines. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHSr6CoZzwIn1bdtAQECCAF+Jok52IdshM4nLGjwqiImzw93dy/zSy9E QBmUR1yzX+17uuUoflSRE3R0bpx3uv+F =UM4a -----END PGP SIGNATURE----- From ses at tipper.oit.unc.edu Thu Oct 5 21:18:29 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Thu, 5 Oct 95 21:18:29 PDT Subject: Simple Hardware RNG Idea In-Reply-To: Message-ID: On Thu, 5 Oct 1995, Norman Hardy wrote: > Simon Spero writes: > .... > > What about a beam of high intensity ionising radiation aimed at the > > detector? > .... > You presumably use the oddness of the count for your random bit in some > predetermined time interval. External radiation can change, but not bias > the parity. If the counter saturates, the counter may be biased towards one Hmmm. But isn't this method slightly biased? If the probability of N events < the probability of N+1 events, wouldn't you need a large number of events per bit to make the bias insignificant? The measurement I was thinking of (which would have been susceptible to the external attack) was to measure the interval between events, and convert that to a uniform distribution. That's probably trying to get too many random bits per event, but does let you use much lower level sources. BTW, I was just having dinner with a bunch of guys from HP labs in Bristol, UK, and the subject of hardware RNGs came up. The idea of Strontium-90 as the next computer consumable has a certain appeal- the designating brandname is "Omnisource". "Are you having trouble scintillating? With Omnisource, you can scin till dawn!" Simon From hfinney at shell.portal.com Thu Oct 5 21:20:34 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 5 Oct 95 21:20:34 PDT Subject: Certificate proposal In-Reply-To: <9510021553.AA13756@tis.com> Message-ID: <199510060419.VAA20574@jobe.shell.portal.com> tomw at orac.engr.sgi.com (Tom Weinstein) writes: >In article , Hal writes: >> OK, so suppose I want to send my credit card number to Egghead Software. >> I get one of these new-fangled certificates from somebody, in which >> VeriSign has certified that key 0x12345678 has hash 0x54321. I think we >> can agree that by itself this is not useful. So, it will also bind in >> some attribute. What will that attribute be? >Um, just a wild guess, but... your credit card number maybe? (Well, >okay, its hash.) I may not have been clear: the certificate I was referring to was the one from Egghead, the one which I will use to make sure that I have a valid key for Egghead. Such a certificate would of course not have my credit card number; it would probably have some information related to Egghead. My rhetorical point was that information would most plausibly be a NAME by which I would refer to Egghead. I am still trying to understand how these proposals to take names out of the picture will apply to a commonplace situation like this one. Hal From hfinney at shell.portal.com Thu Oct 5 21:41:13 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 5 Oct 95 21:41:13 PDT Subject: Certificate proposal Message-ID: <199510060440.VAA23299@jobe.shell.portal.com> Bob Smart writes: >Consider the IPSEC case. The current situation is: >1. We go through some process, let's call it Process A, where we determine > that we want to talk to IP address 192.9.8.7. This would be, say, a DNS lookup on www.egghead.com. >2. We go through another process where we obtain the public key of 192.9.8.7. I get it by connecting to that IP address and asking for it, or perhaps I have it cached or I get it from some public cache. >3. We then try to decide, based on one or more certificates, whether we > trust the public key to be the correct public key for 192.9.8.7. I see the certificate is signed by someone I trust and it certifies that this key is good for connections to Egghead Software at www.egghead.com. >Now consider the key-centric version. >1. Process A returns a public key which denotes the destination we want to > talk to. OK, maybe this is some DNS variant that given www.egghead.com, returns a public key 0x12345678. >2. We then go through a process to obtain the IP address that belongs to > that public key. We probably won't use the public key as an index to > get that information. We probably use the information that was input > to Process A. In fact this information may fall out as a byproduct > of Process A. [However if we needed to make a scalable distributed > database of RSA public keys then I have a design to do this - > available on application.] OK, so now I do another DNS lookup on www.egghead.com to get the IP address. Or maybe I even use key 0x12345678 as an alternative index to get that address. >3. We don't need to trust any certificates or anything else at this stage. > The fact that the IP address belongs to the Public Key is signed by > the Public Key itself. Now you've lost me. Are you saying that the key is self-certifying, saying "I belong to 192.9.8.7"? That is, it is accompanied by a signature issued by that key itself on this IP address? I hate to be difficult, but this does not provide me with a warm feeling. Anyone could have issued that key, claiming to belong to that IP address. If the person who did so is able to interpose himself between me and that address then my messages are not secure. >The same thing happens with e-mail. If "Process A" gives us an e-mail >address to send to then we worry about whether we have the right public >key to go with it. If Process A gives us a Public Key then we can >have certainty about the associated e-mail address because the association >is signed by the Public Key. Again, I don't follow how we gain this certainty. >And a big win that just falls out of this is that I can have a >continuous exchange of information with one IP destination even if >it keeps changing its actual IP address (mobile computing) or I >can have an e-mail conversation with a person who keeps changing >their e-mail address. The things you want just fall out instead of >requiring clever software solutions. This can be dealt with in the certificate context by having a certificated key sign a statement that the IP address is now such-and-such. >In the key-centric world a certificate binds some attribute as a property >of a publc key. So an X.509 certificate would say "The owner of this >public key [i.e. person who knows the corresponding private key] owns >the following point in the X.500 namespace", rather than that "the >person identified by this DN owns the following publc key". Experience >has shown that the latter interpretation is a mine-field. It really >doesn't work. I don't really care whether the name is called an attribute, a distinguished name, or an ooblek. I just don't see how you're going to get along without it. The fact is, we live in a world populated by people and companies and we use names to identify them. I will grant that there are problems with uniqueness but I don't think the solution can be to just give up on the whole idea of names since they are so messy. Pretending that keys are communicating beings is not going to work. Hal From chen at intuit.com Thu Oct 5 22:15:05 1995 From: chen at intuit.com (Mark Chen) Date: Thu, 5 Oct 95 22:15:05 PDT Subject: Quantum Crypto: Anecdote In-Reply-To: <199510011929.NAA29289@bogart.Colorado.EDU> Message-ID: <9510060507.AA20374@doom> > Given the regularity with which fears of factoring by quantum > compters comes up around here, I thought I'd share a brief story: At > a party last night, I ran into a couple of acquantances, and was > delighted to learn that they are working on the current NIST quantum > computing project, making quantum gates out of atomic traps similar > to those used by Cornell and Weiman to get a Bose condensate with > Rubidium (crypto relevance comes from odd places, eh?) Anyway, I > talked them up a bit, and so far they've managed to construct a > working "or" gate. The long-term project is to construct a quantum > computer capable of factoring 15, which they expect to take at least > several years. Vazirani gave a talk at Parc a couple weeks ago, at which he described a similar project under way at Los Alamos. It's allegedly being headed by Richard Hughes. - Mark - -- Mark Chen chen at intuit.com 415/329-6913 finger for PGP public key D4 99 54 2A 98 B1 48 0C CF 95 A5 B0 6E E0 1E 1D From jms at tennis.opus1.com Thu Oct 5 23:29:27 1995 From: jms at tennis.opus1.com (It's like a network, only different) Date: Thu, 5 Oct 95 23:29:27 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m In-Reply-To: Message-ID: <1995Oct5.200410.306@tennis.opus1.com> In article , dlv at bwalk.dm.com (Dr. Dimitri Vulis) writes: > I'd like to remind everyone of the well-thought-out scheme for authenticating > cancels proposed some time ago by Taneli Hujskonen and Benjamin Franz, that can > also be integrated into a Lazarus-like system for tracing forged cancels. Maybe. On the other hand, there's nothing to keep certain well-connected news administrators from removing the appropriate header line, or, even more interestingly, substituting values such that the cancel equation is well known. Fundamentally, though, what I've discovered is that any significant change to the news system is impossible to do, because installed base restricts what people are willing to change. Look at the dozens of extensions to NNTP which all conflict, are non-standard or ill-described, yet are demanded by moronic software such as Netscape's news reader. When will we see NNTP v3? Never... jms Joel M Snyder, PhD, 1404 E Lind Rd, Tucson, AZ, 85719 Phone: +1 520 324 0494 (voice) +1 520 324 0495 (FAX) jms at Opus1.COM http://www.opus1.com/jms Opus One PLEASE NOTE: The useful parts of Arizona changed from area code 602 to area code 520 on March 20, 1995. From jsw at netscape.com Thu Oct 5 23:59:32 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Thu, 5 Oct 95 23:59:32 PDT Subject: Certificate proposal In-Reply-To: <9510021553.AA13756@tis.com> Message-ID: <3074D2F3.1E9@netscape.com> Hal wrote: > > Jeff Weinstein writes: > > I think the old idea of a certificate just binding a name and > >a key is turning out to not be very useful. That is why Netscape > >Navigator 2.0 will support x509 version 3 certificates. They allow > >arbitrary attributes to be signed into a certificate. In this new > >world, you can think of a certificate as a way of binding a key with > >various arbitrary attributes, one of which may be(but is not > >required to be) a name. > > OK, so suppose I want to send my credit card number to Egghead Software. > I get one of these new-fangled certificates from somebody, in which > VeriSign has certified that key 0x12345678 has hash 0x54321. I think we > can agree that by itself this is not useful. So, it will also bind in > some attribute. What will that attribute be? It would be some value that would allow the credit card authorization agency to match it up with the submitted credit card number. In the case of MasterCard's SEPP they are using a salted hash of the Account Number, where the salt value is unique per account, is secret, and is shared between the bank and the card holder. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at netscape.com Fri Oct 6 00:04:44 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Fri, 6 Oct 95 00:04:44 PDT Subject: Certificate proposal In-Reply-To: <199510060358.UAA03869@orac.engr.sgi.com> Message-ID: <3074D42E.58DE@netscape.com> Tom Weinstein wrote: > > In article , Hal writes: > > > OK, so suppose I want to send my credit card number to Egghead Software. > > I get one of these new-fangled certificates from somebody, in which > > VeriSign has certified that key 0x12345678 has hash 0x54321. I think we > > can agree that by itself this is not useful. So, it will also bind in > > some attribute. What will that attribute be? > > Um, just a wild guess, but... your credit card number maybe? (Well, > okay, its hash.) The hash of just the card number isn't good enough. If you collected a bunch of certificates (they are public) then you could start guessing valid card numbers and trying to match the hashes with your database. The Mastercard SEPP proposal uses a salted hash, where the salt is a shared secret between the bank and the user. --Jeff > -- > Sure we spend a lot of money, but that doesn't mean | Tom Weinstein > we *do* anything. -- Washington DC motto | tomw at engr.sgi.com There are too many Weinsteins hanging out here lately... :-) -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at netscape.com Fri Oct 6 00:08:18 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Fri, 6 Oct 95 00:08:18 PDT Subject: Certificate proposal In-Reply-To: <9510021553.AA13756@tis.com> Message-ID: <3074D507.1EE1@netscape.com> Hal wrote: > > tomw at orac.engr.sgi.com (Tom Weinstein) writes: > > >In article , Hal writes: > > >> OK, so suppose I want to send my credit card number to Egghead Software. > >> I get one of these new-fangled certificates from somebody, in which > >> VeriSign has certified that key 0x12345678 has hash 0x54321. I think we > >> can agree that by itself this is not useful. So, it will also bind in > >> some attribute. What will that attribute be? > > >Um, just a wild guess, but... your credit card number maybe? (Well, > >okay, its hash.) > > I may not have been clear: the certificate I was referring to was the one > from Egghead, the one which I will use to make sure that I have a valid > key for Egghead. Such a certificate would of course not have my credit > card number; it would probably have some information related to Egghead. > My rhetorical point was that information would most plausibly be a NAME > by which I would refer to Egghead. I am still trying to understand how > these proposals to take names out of the picture will apply to a > commonplace situation like this one. I don't think that we need to get rid of names entirely. It all depends on the intended use. In this case it would be reasonable for the certificate to have the name in it. It would also probably be signed by a bank or card association CA, which was set up specificly to sign merchant certificates. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at netscape.com Fri Oct 6 00:32:27 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Fri, 6 Oct 95 00:32:27 PDT Subject: Certificates, Attributes, Web of Trust In-Reply-To: Message-ID: <3074DAAB.3D62@netscape.com> Timothy C. May wrote: > > At 7:11 PM 10/5/95, Jeff Weinstein wrote: > > > How about if the systems allows you to get a certificate that > >has any name in it that you want, where the issuer makes no > >claims about the identity of the owner of the certificate? > >How about if the software lets the user decide which CAs they > >will accept certificates from? Given these two features, > >would you still consider requiring a certificate to be bad? > > Let's make sure what we mean by these two points: > > 1. "...allows you to get a certificate that has any name in it that you > want, where the issuer makes no claims about the identity of the owner of > the certificate?" > > I would expect that a certificate for "%63rrW209neU6q!" would be issuable > for a miniscule amount of money, and as many of these as are desired. > > (No, I'm not saying "Verisign" must offer certificates for very low cost, > only that there be no built-in costs, or built-in time delays and > processing delays, that would prevent "Tim's Really Cheap and No Questions > Asked Certificate Service" from issuing such certificates, cheaply and > rapidly (in seconds, or less, as some applications will need this, if other > services "demand" certificates). If you take a look at verisign's home page, they will be offering "low assurance" certificates for free for non-commercial uses. The only thing they will guarantee about these certs is that the subject name in the certificate is unique across all certificates signed by their class I CA. You should be able to get one of these certs in real time via an HTML form. > 2. "...software lets the user decide which CAs they will accept > certificates from?" > > Fine, provided the following CAs are acceptable: > > -- an "automatic" certificate granter, essentially meant only to satisfy > protocols which require certificates > > -- a certifier for the Mob, which sells certificates for some fee > > -- the application itself should be able to generate certificates > immediately...call this the "null certification." > > It is true that some of these example seem to "undermine" the whole purpose > of certificates, but this is precisely my point: if I want a key to be > certified, I will determine the conditions under which I want it to be > certified. Other parties are free to meet my conditions if they wish to do > business with me, or not, as the case may be. Anyone is free to set up a CA. In Netscape Navigator 2.0 the user can decide which CAs they want to accept certs from, or just mark individual certs as "trusted" no matter what CA they were signed by. If you the user choose to trust a CA run by the Mob, then thats your business. > The "null certification" is thus very important. > > Naturally, I think this null certification makes the idea of _requiring_ > certification moot. > > Will Netscape allow this? I assume that by "null certification" you mean self-signed certificate. As I said above, the user can choose to accept any certificate they want, independent of who signed it. If you tell netscape that you want to accept "joe's" certificate for the purposes of encrypted e-mail, then we don't care who signed it. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From stewarts at ix.netcom.com Fri Oct 6 00:35:14 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Fri, 6 Oct 95 00:35:14 PDT Subject: subjective names and MITM Message-ID: <199510060735.AAA22195@ix4.ix.netcom.com> At 10:24 PM 10/5/95 -0400, Adam Shostack wrote: > The key does indeed have a high likelihood of being unique, >but dealing with 1024 bit identifiers could strain database systems, >especially when 100 well chosen bits would be than enough. If everybody in the world has a 1024-bit key, that's 750 GB; that's not bad at all by the time everybody in the world would have one, and you could do MD5s in about 100 GB, which is a little more convenient. Today, for 750 GB, you'd probably have tape in your system, or optical jukebox. But not everybody has one; on the other hand, I suppose individuals in well-heeled countries might end up with dozens of their own. On the other hand, the number of 1024-bit primes is something like 2^1023/log(2^1024) (if I remember right), or roughly 2^1013. The probability of two independent uniformly distributed primes matching is about 2^1023/2^32, which is still an astoundingly mindbogglingly LARGE number. If you've got 1024 bits of entropy in your input process, there will not _be_ any matches. (If people insist on using sources of randomness like clocks or user names, the chances are a lot higher....) Now, for 128-bit hashes, whether it's MD5 or just the near-bottom 128 key bits, by the time you get 2^64 of them together, you've got a 50% chance of a match. Not a problem, since you'll not likely need that many, even for the 2^33 people in the world. Still not a problem. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From fair at clock.org Fri Oct 6 00:36:09 1995 From: fair at clock.org (Erik E. Fair (Time Keeper)) Date: Fri, 6 Oct 95 00:36:09 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m Message-ID: An NNTP v2 protocol specification effort is underway in the IETF now. Strictly to clean up existing extended practice - not to do new things. Erik Fair From weidai at eskimo.com Fri Oct 6 00:56:14 1995 From: weidai at eskimo.com (Wei Dai) Date: Fri, 6 Oct 95 00:56:14 PDT Subject: Certificates, Attributes, Web of Trust In-Reply-To: <3074DAAB.3D62@netscape.com> Message-ID: On Fri, 6 Oct 1995, Jeff Weinstein wrote: > If you take a look at verisign's home page, they will be offering > "low assurance" certificates for free for non-commercial uses. The > only thing they will guarantee about these certs is that the subject > name in the certificate is unique across all certificates signed > by their class I CA. You should be able to get one of these > certs in real time via an HTML form. What is the point of this? What is to prevent someone from getting certificates for a million of the most common and/or famous names as quickly as possible? Wei Dai From norm at netcom.com Fri Oct 6 03:28:38 1995 From: norm at netcom.com (Norman Hardy) Date: Fri, 6 Oct 95 03:28:38 PDT Subject: Simple Hardware RNG Idea Message-ID: At 8:20 PM 10/5/95, Simon Spero wrote: >On Thu, 5 Oct 1995, Norman Hardy wrote: .... >> You presumably use the oddness of the count for your random bit in some >> predetermined time interval. External radiation can change, but not bias >> the parity. If the counter saturates, the counter may be biased towards one > >Hmmm. But isn't this method slightly biased? If the probability of N >events < the probability of N+1 events, wouldn't you need a large number >of events per bit to make the bias insignificant? .... What you really need is entropy (information). I propose concatenating several counts and sending them thru MD5. The counts are distributed the same way but are independent so that the entropy of the concatenation is the sum of the entropies. Each count has a Poisson distribution. That tells you how many bits of entropy there are in the input to the MD5. Take that many bits, rounded down, as your random bits. If there are an average of x bits in a time interval then the probability that the count will be exactly K is (x^K/(K!))exp(-x). That is the Poisson distribution. The entropy is then: - sum[i=0 to infinity] (x^K/(K!))exp(-x)log( (x^K/(K!))exp(-x)) = - sum[i=0 to infinity] (x^K/(K!))exp(-x)(log(x^K/(K!)) - x) = - sum[i=0 to infinity] (x^K/(K!))exp(-x)(K*log(x) - log(K!) - x) Here is a klutzy Scheme program to evaluate these: (define (sum g)(letrec ((ss (lambda (n) (if (= n 0) (g 0) (+ (g n) (ss (- n 1))))))) (ss 30))) (define (log2 x)(/ (log x)(log 2))) (define (fact n)(if (= n 0) 1 (* n (fact (- n 1))))) (define (p x k) (* (/ (expt x k)(fact k))(exp (- x)))) (define (en n)(sum (lambda(x) (let ((c (p x n))) (if (= c 0) 0 (* c (log2 c))))))) (en 1) => 2.07 (en 3) => 2.92 (en 10) => 3.73 (en 15) => 4.0 I.e. if 1 count is expected on average there are two bits of entropy in the count (supprising!) and if the count averages 10 then there are 3.7 bits worth. It goes up as the log. Before you bet your enterprise on this scheme consider that the math was done at 03:30 AM. From nobody at REPLAY.COM Fri Oct 6 04:07:32 1995 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 6 Oct 95 04:07:32 PDT Subject: PCMCIA Crypto Message-ID: <199510061106.MAA16083@utopia.hacktic.nl> PCMCIA Establishes Security Card Working Group The dream of a standardized encryption interface may soon be realized! San Jose, Calif., Oct. 5 /PRNewswire/ -- PCMCIA has formed a new Working Group dedicated to standardizing and promoting the PC Card as an interface for data encryption and digital signature applications. The Working Group was formed to work within the PCMCIA Technical Committee to help the Association define and standardize the capabilities and requirements for PC Card Security Card devices. The Group's immediate goals are to define the necessary extensions to the PC Card Standard that will allow easy identification of Security Card devices, and to proactively identify other vendors in the market and solicit their support for standardizing PC Cards as a security device. The formation of this Group represents the formalization of an industry trend. A standardized form factor and interface for security devices is finally an attainable goal thanks to the widespread acceptance of PC Card technology," said Gary Visser, a senior software engineer with Spyrus Communications and Co-Chairperson of the Working Group. "It is this high level of host support that will promote PC Cards as a solution for electronic banking and commerce." PC Cards are seen by many experts as an ideal solution for digital signature and data encryption applications due to the established base of PC Card slots, and because most security applications are math intensive and require the processing power and storage of computers. The proposal to form the Group was presented to PCMCIA by Spyrus, Inc. of San Jose, California. The group will be co-chaired by Edward Tuggle of IBM Corporation and Visser of Spyrus, Inc. Visit PCMCIA's World Wide Web site at . Contact: Greg Barr, Public Relations Coordinator, of PCMCIA, 408-433-2273, ext. 114, or . From jya at pipeline.com Fri Oct 6 04:58:10 1995 From: jya at pipeline.com (John Young) Date: Fri, 6 Oct 95 04:58:10 PDT Subject: FON_tap Message-ID: <199510061158.HAA17199@pipe4.nyc.pipeline.com> 10-6-95. WSJaper has a report on the global rise of unions between banks and telcos for exploiting electronic marketecture. Quotes: "Being in partnership with these phone people is like shooting adrenalin into your veins," gushes one banker who recently invested in the national phone company. "Bricks and mortar won't do it," says another banker, "you have to drive down the transaction cost." FON_tap From m5 at dev.tivoli.com Fri Oct 6 05:37:29 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Fri, 6 Oct 95 05:37:29 PDT Subject: subjective names and MITM In-Reply-To: Message-ID: <9510061236.AA25892@alpha> hfinney at shell.portal.com writes: > There is a difference between a MITM and the case you describe where you > are actually communicating securely with the person you think you are, > but he chooses to relay the messages around. Seems to me that the idea of "communicating with the person you think you are" is intractably difficult if you're not sitting in the same room. If you accept instead the idea of "communicating with the entity possessing the private half of a keypair" then life gets a lot simpler. > The difference is that if > you are actually communicating securely with an individual, you can form > some estimate of his personality, judgement, etc. You may choose on this > basis to trust him, provide sensitve information, take risks, and so on. > But if he is actually behind a MITM then all bets are off. I don't see why. If, via some MITM (or "EITM", "Entity In The Middle") you are able to form a trust relationship with a public key, then I can see no practical difference. Consider a dating advice service that's behind a public key. You send it dozens of letters, and soon come to trust the advice being given. By whatever means at your disposal you look for leaks of information you divulge and find none, so your trust increases. If the private key is held by an AI program, by a team of learned specialists at a shadowy Swedish research institute, or by Rush Limbaugh, then what difference does it make to you? > All of your judgement about him is irrelevant. At any time the > MITM can take advantage of the information you provide. He can > even "blow his cover" and take extreme action, to your detriment. But then so can the "real person" you thought you were communicating with. > This situation with the MITM is actually about the same as if you were > communicating insecurely in the first place. You are exposed to all of > the same risks. The only way to achieve the level of security offered by physical face to face communication with a person is to have a physical face to face conversation at some point. If you only ever communicate via electronic means, you are always subject to the risk of dealing with a synthetic entity. (I think.) > So if you are willing to accept communicating systems that allow this > kind of attack, you almost might as well not use cryptography at all. > (Not quite, because the MITM is a more expensive attack to mount than one > on an unsecured wire.) That's not clear. I can have confidence when using a PK scheme that I am at least communicating securely with the entity that holds the private key. That that entity may be leaking information through alternate channels is something I don't know; I don't see how you can securely defend against that in any case, or perhaps I don't see how defending against it in the case that you think you know who you're dealing with is any different than defending against it if you accept that you don't know who you're dealing with. (I've read over that a couple times, and I think it's OK.) > In fact, I can facetiously prove that cryptography is unnecessary. We > are not communicating with individuals, but with communicatees. Works for me. (Indeed, Hal, I have no idea who or what your are :-) > All of your messages are by definition going to the communicatee > with whom you are communicating. If the particular communicatee > who is receiving your message chooses to relay it or spread the > information around in other ways, that is the right and privilege > of the communicatee. But messages are going to the communicatee > they are going to, whether encryption is used or not. So > encryption is not necessary. Ah, but that last point is clearly *not* true. When you encrypt, you at least have some assurance that between you and the communicatee there's security. If (unfortunately) the "comminicatee" is a conspiracy that begins at the CO where your home phone lines terminate, then indeed you've got a problem. > This argument seems to mirror the one for why we only communicate with > keys, that if a key wants to do something nasty we can't stop it (him?), > etc. I say, we don't communicate with keys. We communicate with people > (or occasionally programs). But how do you know? (How do you know there aren't a team of people standing beside me advising me on what to type?) And note that you can hardly keep me from doing something nasty: to prove it, I'm going to get up right now and fetch my favorite beverage, which is a 6oz can of cranberry juice mixed with a 12oz can of Diet Coke :-) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From rah at shipwright.com Fri Oct 6 05:40:46 1995 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 6 Oct 95 05:40:46 PDT Subject: Trust company banks on Internet Message-ID: --- begin forwarded text Date: Fri, 6 Oct 95 08:10:41 -0400 From: "GORD JENKINS" X-Minuet-Version: Minuet1.0_Beta_14.1 Reply-To: X-Popmail-Charset: English To: www-buyinfo at allegra.att.com Subject: Trust company banks on Internet First Internet Banker ?? !! Check out http://www.bayshore.com >From the Toronto Globe and Mail page B 1 Fri 6 Oct 95 "Bayshore set to become first Internet banker - Trust promises approval in as little as two minutes" >From the Ottawa Citizen Page B7 Fri 6 Oct 95 " Trust company banks on Internet -Financial shopping in cyberspace arrives in Canada next week with the first intractive banking sevice on the Internet. Analysts say there is a lot more coming soon. Bayshore Trust Co.plans to take applcations for loans up to $15,000 and orders for guaranteed investment certificates directly from customers on the World Wide Web" Gordon Jenkins jenkins at fox.nstn.ca http://www.infop.com/karoma -- GORD JENKINS e maik JENKINS at fox.nstn.ca tel 613 794 6735 fax 613 723 8938 --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From schampeo at imonics.com Fri Oct 6 06:00:52 1995 From: schampeo at imonics.com (Steve Champeon working from home) Date: Fri, 6 Oct 95 06:00:52 PDT Subject: Trust company banks on Internet Message-ID: Robert Hettinga forwards: >First Internet Banker ?? !! > >Check out >http://www.bayshore.com > >>From the Toronto Globe and Mail page B 1 > Fri 6 Oct 95 >"Bayshore set to become first Internet banker - >Trust promises approval in as little as two minutes" This is fairly common. A certain Internet Consultant in this area claimed to have solved "the problem of banking on the Internet". Of course, a large green bank paid him a lot of money to say it, but there you are. I closed my account with that large green bank because of this appalling turn of events. I should tell everyone here and now that I also intend to become the first Internet bank. I would also like to announce my upcoming trip to the moons of Mars, where I intend to pick collards in the name of Abbie Hoffman. What an extended crock of shit we can hope to expect... Steve -- Steven Champeon (919) 469-7833 Technical Lead, schampeo at imonics.com Imonics Web Services webmaster at imonics.com From Lyle_Seaman at transarc.com Fri Oct 6 07:16:38 1995 From: Lyle_Seaman at transarc.com (Lyle_Seaman at transarc.com) Date: Fri, 6 Oct 95 07:16:38 PDT Subject: Web "places" and the media monsters In-Reply-To: Message-ID: <8kRHcbOSMV1ZAbs3MW@transarc.com> Steven Levy writes: > A tiny correction to Vladimir's interesting posting. It wasn't J.Gilmore > I quoted on the "Titanic deck chair" in the NY Times, it was J.Barlow, > who indeed has a propensity for soundbyte. Which is not to say that the quote originated there. My father-in-law used to refer to Wang Labs that way, back in the mid-80's, and I'm fairly sure that he picked it up at Memorex. And the meme goes on... From sommerfeld at orchard.medford.ma.us Fri Oct 6 07:17:57 1995 From: sommerfeld at orchard.medford.ma.us (Bill Sommerfeld) Date: Fri, 6 Oct 95 07:17:57 PDT Subject: PCMCIA Crypto In-Reply-To: <199510061106.MAA16083@utopia.hacktic.nl> Message-ID: <199510061409.OAA00401@orchard.medford.ma.us> -----BEGIN PGP SIGNED MESSAGE----- > The proposal to form the Group was presented to PCMCIA by > Spyrus, Inc. of San Jose, California. The group will be > co-chaired by Edward Tuggle of IBM Corporation and Visser > of Spyrus, Inc. For those of you who don't recognize the company name, Spyrus makes one version of the Tessera^H^H^H^H^H^H^HFortezza card. Is Spyrus the Toys 'R Us for spies? :-) - Bill -----BEGIN PGP SIGNATURE----- Version: 2.6.1 iQCVAwUBMHU4l7T+rHlVUGpxAQEQOgP/bZnHvqGARiyjf2Ua81eycssryENfvJX+ h3H295OXJAxmmw/4ppCzbTyqCntt0TtXVaYZqq5x3Zated99bXdYnbsAAfwW5hT6 SHn6VyYrRfuwVhb+7QrHS0fcQG3ecrw3dyhfchzIK5w0XZTwz5KCcQJrmcyG3Ny6 HMy2uc8H0p8= =uwrb -----END PGP SIGNATURE----- From jamesd at echeque.com Fri Oct 6 07:20:44 1995 From: jamesd at echeque.com (James A. Donald) Date: Fri, 6 Oct 95 07:20:44 PDT Subject: NSA Realists v. Nuts (Was: Re: Crypto APIs) Message-ID: <199510061420.HAA13735@blob.best.net> At 05:02 PM 10/5/95 -0400, Perry E. Metzger wrote: > >"James A. Donald" writes: > > They want to rule over us. [...] There is no commonality of > > purpose, hence no possibility of cooperation. At 05:02 PM 10/5/95 -0400, Perry E. Metzger wrote: > I disagree. Most NSA types are probably stock government employees > who want to get their job done with the least muss and fuss. > > [...] > > I don't think the NSA is inherently the enemy at all. Signals > intelligence and protecting the U.S. and its citizens from signals > intelligence is probably necessary. Naturally members of an organization wish the organization to become great and powerful: A great and powerful Netscape would be a Microsoft. A great and powerful NSA would be a KGB or an SS. Naturally everyone likes their job to meaningful, everyone likes their job to have an impact. Everyone wants to be important. If the NSA are eyes without hands, they are impotent, they are useless. So they want hands. They want information about us to be used by the government, which means they want the government to exercise detailed control over us in response to their detailed information about us. Our function lust would, if fulfilled, give us only moderate satisfaction, their function lust, if fulfilled, would give them vast power, and hence vast satisfaction. Our function lust, if fullfilled, would give us more power over computers. Their function lust, if fullfilled, would give them more power over us. > However, in general, what you are looking at is just the > result of an entity trying to preserve itself having access to > governmental force. I doubt that there are many "national domination" > types in the agency, Despite grandstanding by the republicans, no government agency has ever been closed down, or suffered layoffs, merely because its function became completely obsolete. (Though some have suffered renamings and reshuffles, and some have been allowed to shrink through natural attrition) The guys who used to control prices in the trucking industry now work full time regulating each other. (I kid you not) We are still stockpiling helium to lift a fleet of dirigibles for world war one. (Like Dave Barry, I am not making this up, though the Republicans have planned to close down the helium agency.) Job preservation is irrelevant: They are government employees. Power is the issue. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From hfinney at shell.portal.com Fri Oct 6 07:34:50 1995 From: hfinney at shell.portal.com (Hal) Date: Fri, 6 Oct 95 07:34:50 PDT Subject: subjective names and MITM In-Reply-To: Message-ID: <199510061433.HAA04187@jobe.shell.portal.com> m5 at dev.tivoli.com (Mike McNally) writes: >hfinney at shell.portal.com writes: > > There is a difference between a MITM and the case you describe where you > > are actually communicating securely with the person you think you are, > > but he chooses to relay the messages around. >Seems to me that the idea of "communicating with the person you think >you are" is intractably difficult if you're not sitting in the same >room. If you accept instead the idea of "communicating with the >entity possessing the private half of a keypair" then life gets a lot >simpler. I can certainly agree with the attractive simplicity of this notion. My point is that it is practically useless. I believe this is a seductive but very wrong idea. As I said, it amounts to defining the problem away. Does that mean that the problem (of MITM attacks) never existed at all, that all of the effort that people have spent over the year to try to solve it was wasted? I am baffled by the fact that people are taking this whole notion of "communicating with keys" seriously. Keys do not communicate. One might as easily say that wiretaps are not an issue: I am not communicating with the person I called, but with the other end of the telephone wire. If that wire end is actually (unknown to me) in the hands of a government agent who has cut the wire and interposed his own listening device, that's OK, because I'm still communicating with the other end of the wire. After all, I have no way of knowing whether the person that I am talking to may actually be spreading my info to anyone, so it doesn't really make any difference if he does it or the wiretappers. Etc., etc. This is exactly like the argument about communicating with keys. Does this mean that we shouldn't worry about wiretaps? I hope not. I really don't understand why the argument is so much more persuasive in the case of keys. > > The difference is that if > > you are actually communicating securely with an individual, you can form > > some estimate of his personality, judgement, etc. You may choose on this > > basis to trust him, provide sensitve information, take risks, and so on. > > But if he is actually behind a MITM then all bets are off. >I don't see why. If, via some MITM (or "EITM", "Entity In The >Middle") you are able to form a trust relationship with a public key, >then I can see no practical difference. Consider a dating advice >service that's behind a public key. You send it dozens of letters, >and soon come to trust the advice being given. By whatever means at >your disposal you look for leaks of information you divulge and find >none, so your trust increases. If the private key is held by an AI >program, by a team of learned specialists at a shadowy Swedish >research institute, or by Rush Limbaugh, then what difference does it >make to you? The difference is that I form a judgement about the personality of the person I am communicating with, whereas I can't form any such judgement about the personality of the MITM. Consider how, in life, we decide who to trust. Isn't it largely on the basis of communications? We talk to the person, we talk to other people about him, we take what we know of him, and we decide to trust him. If we suppose that there is in fact a secure channel to another person, then I suggest that it is plausible to suppose that we could enter into a trusted relationship with him, even without a face-to-face meeting. After all, what exactly does the face to face meeting accomplish? Yes, we see a little more about the person, we can judge some non-verbal communications. But it is not wholly different. We can always be wrong - the person may not be as trustworthy as we think he is. There is some probability of that which we must always keep in mind. But, and here is my main point, if a MITM is a possibility (and we're taking the attitude that that's just fine, we're communicating with keys, no problem if there's a MITM involved, don't bother to take any steps to prevent it) then these assumptions about extending trust are a lot riskier. The probability of a betrayal will be much higher if a MITM is possibly involved than if he is not. Most people do not try to betray their communicants. But if (in the worst case) all lines were tapped by men in the middle, then in fact all conversations are subject to this betrayal. As I wrote before, I don't see the difference between this situation and one where there is no security at all (at least from wiretappers). > > All of your judgement about him is irrelevant. At any time the > > MITM can take advantage of the information you provide. He can > > even "blow his cover" and take extreme action, to your detriment. >But then so can the "real person" you thought you were communicating >with. Most of the time your judgement about the real person will be valid, at least with some experience. Most people are not AI's or teams of conspirators. But you have absolutely no basis to make judgements about the MITM. In fact the greater probability is that his interests are opposed to yours. > > This situation with the MITM is actually about the same as if you were > > communicating insecurely in the first place. You are exposed to all of > > the same risks. >The only way to achieve the level of security offered by physical face >to face communication with a person is to have a physical face to face >conversation at some point. If you only ever communicate via >electronic means, you are always subject to the risk of dealing with a >synthetic entity. (I think.) I don't think so, or at least the risk can be minimized much more than in the model where we just say that we're communicating with keys, therefore a MITM is perfectly legitimate because it's just a matter of who holds the keys. Suppose I want to talk to PC Magazine columnist John Dvorak. Suppose I find a VeriSign certificate for his key, with his name and employment information. I've never met him. We've never had a face to face conversation. Yet I claim I can communicate with considerable security with Dvorak using this certificate, certainly more than if I just use any old key which is lying around with his name on it, one which may be owned by a MITM. > > So if you are willing to accept communicating systems that allow this > > kind of attack, you almost might as well not use cryptography at all. > > (Not quite, because the MITM is a more expensive attack to mount than one > > on an unsecured wire.) >That's not clear. I can have confidence when using a PK scheme that I >am at least communicating securely with the entity that holds the >private key. That that entity may be leaking information through >alternate channels is something I don't know; I don't see how you can >securely defend against that in any case, or perhaps I don't see how >defending against it in the case that you think you know who you're >dealing with is any different than defending against it if you accept >that you don't know who you're dealing with. >(I've read over that a couple times, and I think it's OK.) If you are in fact communicating with the person you think you are, you can use all the information you have about him (including other conversations) to judge his personality and trustworthiness. Yes, this can be mistaken - but the same thing happens in the real world. That doesn't mean that we abandon the whole idea of trust. We still can be right most of the time. However if you know that a MITM may be involved, you will be much slower to extend trust. In fact you have to act as though you have an unsecured channel. > > All of your messages are by definition going to the communicatee > > with whom you are communicating. If the particular communicatee > > who is receiving your message chooses to relay it or spread the > > information around in other ways, that is the right and privilege > > of the communicatee. But messages are going to the communicatee > > they are going to, whether encryption is used or not. So > > encryption is not necessary. >Ah, but that last point is clearly *not* true. When you encrypt, you >at least have some assurance that between you and the communicatee >there's security. If (unfortunately) the "comminicatee" is a >conspiracy that begins at the CO where your home phone lines >terminate, then indeed you've got a problem. No, by definition the "communicatee" is the set of all the people who see your messages. So by definition between you and the communicatee there is security even without encryption (since no one other than the communicatee sees the message). Sophistry? The number of people who can receive your messages is no greater without encryption than if you use encryption but don't take steps against a MITM and in fact adopt a stance which states that MITM attacks don't exist. > > This argument seems to mirror the one for why we only communicate with > > keys, that if a key wants to do something nasty we can't stop it (him?), > > etc. I say, we don't communicate with keys. We communicate with people > > (or occasionally programs). >But how do you know? (How do you know there aren't a team of people >standing beside me advising me on what to type?) And note that you >can hardly keep me from doing something nasty: to prove it, I'm going >to get up right now and fetch my favorite beverage, which is a 6oz can >of cranberry juice mixed with a 12oz can of Diet Coke :-) I don't know for sure, but if you tell me or give me the impression over a period of time that you are keeping our conversations private, and I decide that you are honest based on our conversations and what I know about you from others, then I can make a judgement with a reasonable chance of safety. Yes, I can be mistaken. But that doesn't mean that I should abandon the whole idea of trust. Otherwise I will never trust anybody in any part of life. But preventing MITM attacks is very important to being able to extend trust in the online world. Defining them away is not a satisfactory solution. Hal From jamesd at echeque.com Fri Oct 6 07:35:55 1995 From: jamesd at echeque.com (James A. Donald) Date: Fri, 6 Oct 95 07:35:55 PDT Subject: Where is text of wiretap bill Message-ID: <199510061435.HAA16061@blob.best.net> Did the wiretap bill, as passed, contain those magic words: "or other legal authority"? Where can I get the text of the wiretap bill? --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From rsalz at osf.org Fri Oct 6 07:38:10 1995 From: rsalz at osf.org (Rich Salz) Date: Fri, 6 Oct 95 07:38:10 PDT Subject: Supercomputer export ease Message-ID: <9510061437.AA18425@sulphur.osf.org> According to a squib in the local tabloid: Clinton has approved a plan to ease export restrictions on the sale of supercomputers. The decision is expected to be announced today; it follows DoD recommendations. The wording is funky enough to be interpreted a couple of ways, so here's a quote: "Under the revised policy, U.S.firms will be able to sell billions of dollars worth of high-tech computers to civilian customers around the world. Currently manufacturers must seek licenses from the Commerce Dept. to sell a computer that can perform more than 1,500 million theoretical operations per second." Does that mean no more licenses, the mFLOP limit has been raised before license required, there is no limit but you still need a license? Answers today/tomorrow when the policy comes out, I guess. /r$ From jya at pipeline.com Fri Oct 6 08:07:14 1995 From: jya at pipeline.com (John Young) Date: Fri, 6 Oct 95 08:07:14 PDT Subject: Supercomputer export ease Message-ID: <199510061507.LAA20157@pipe1.nyc.pipeline.com> WSJ, Oct 6, 1995. U.S. Export Rules to Ease On Some Supercomputers Washington -- President Clinton is expected to announce today that he is easing export restrictions on certain U.S. supercomputers, a move sought by the computer industry. Administration officials say that given continuing technological advances and world-wide availability of many high-speed computers, the current restrictions are unrealistic and damaging to American companies. Critics contend, however, that easing the restrictions will exacerbate weapons proliferation. Mr. Clinton approved raising the speed of computers that may be exported to most countries to 2,000 million theoretical operations a second, or MTOPS, from 1,500 MTOPS, according to officials. For certain nations, including China, Egypt, Israel, India, Pakistan, Syria and Russia, civilian customers would be able to buy computers with speeds up to 7,000 MTOPS without prior government approval. Military customers in those countries could purchase computers with speeds of 2,000 to 7,000 MTOPS but only with an individual export license. Certain nations, such as Iran, Iraq, North Korea and Libya, would still be banned from buying high-speed computers. [End] From privsoft at ix.netcom.com Fri Oct 6 08:17:23 1995 From: privsoft at ix.netcom.com (Steve ) Date: Fri, 6 Oct 95 08:17:23 PDT Subject: Graphic encryption Message-ID: <199510061517.IAA10725@ix5.ix.netcom.com> I am currently working for a company that has a graphic encryption product called PrivaSoft. I was wondering if there were other products or engines that also provide graphic encryption. (graphic encryption is the use of a encryption algorythm to scramble an image taken of a document.) Also if any of ya'll are famillar with graphic encryption, I am looking for opinions as to its strengths / weaknesses. Steve O. Mgr. Tech. Services ************************************************* PrivaSoft TM * 1877 Springfield Ave PO BOX 600 * Maplewood NJ 07040-0600 * Tel. 201-378-8865 Fax. 201-762-3742 * Http://www.privasoft.com/privasoft * E-mail: privsoft at ix.netcom.com * ************************************************* From jim at acm.org Fri Oct 6 08:24:55 1995 From: jim at acm.org (Jim Gillogly) Date: Fri, 6 Oct 95 08:24:55 PDT Subject: Where is text of wiretap bill In-Reply-To: <199510061435.HAA16061@blob.best.net> Message-ID: <199510061524.IAA02409@mycroft.rand.org> > "James A. Donald" writes: > Did the wiretap bill, as passed, contain those magic words: > "or other legal authority"? Yes, it does, repeatedly. SEC. 103. ASSISTANCE CAPABILITY REQUIREMENTS. (a) Capability Requirements: Except as provided in subsections (b), (c), and (d) of this section and sections 108(a) and 109(b) and (d), a telecommunications carrier shall ensure that its equipment, facilities, or services that provide a customer or subscriber with the ability to originate, terminate, or direct communications are capable of-- (1) expeditiously isolating and enabling the government, pursuant to a court order or other lawful authorization, to intercept, to the exclusion of any other communications, all wire and electronic communications carried by the carrier ... (2) expeditiously isolating and enabling the government, pursuant to a court order or other lawful authorization, to access call-identifying information that is reasonably available to the carrier-- ... (3) delivering intercepted communications and call-identifying information to the government, pursuant to a court order or other lawful authorization, in a format such that they may be transmitted by means of equipment, facilities, ... SEC. 105. SYSTEMS SECURITY AND INTEGRITY. A telecommunications carrier shall ensure that any interception of communications or access to call-identifying information effected within its switching premises can be activated only in accordance with a court order or other lawful authorization and with the affirmative intervention of an individual officer or > Where can I get the text of the wiretap bill? >From the Library of Congress' "Thomas" server: http://thomas.loc.gov/ Look for either SB 2375 (Senate) or HR 4922 (House). An assistant director of the FBI, William Baugh, spoke recently at the ICI conference in DC. He said he hoped American industry would be cooperative in making the voluntary compliance with TESSERA or other GAK widespread, because if it doesn't happen then they would need to come back and get more Congressional action, and "we found the coercive solution we had to use for Digital Telephony very draining." If doesn't get them your sympathy, what will? Jim Gillogly Sterday, 15 Winterfilth S.R. 1995, 15:18 From m5 at dev.tivoli.com Fri Oct 6 08:43:58 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Fri, 6 Oct 95 08:43:58 PDT Subject: subjective names and MITM In-Reply-To: Message-ID: <9510061543.AA26079@alpha> hfinney at shell.portal.com writes: > m5 at dev.tivoli.com (Mike McNally) writes: > >hfinney at shell.portal.com writes: > > > There is a difference between a MITM and the case you describe ... > > >Seems to me that the idea of "communicating with the person you think > >you are" is intractably difficult if you're not sitting in the same > >room. ... > > I can certainly agree with the attractive simplicity of this notion. My > point is that it is practically useless. ... Oddly enough, it seems to me that Hal (if that really *is* his name) and I (and Carl & others) are saying basically the same things, but drawing completely different conclusions. Strange. I'm willing to wait to see what the peer review process concludes. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From danisch at ira.uka.de Fri Oct 6 08:50:25 1995 From: danisch at ira.uka.de (Hadmut Danisch) Date: Fri, 6 Oct 95 08:50:25 PDT Subject: Graphic encryption Message-ID: <9510061548.AA29777@elysion.iaks.ira.uka.de> > I am currently working for a company that has a graphic encryption > product called PrivaSoft. I was wondering if there were other products > or engines that also provide graphic encryption. (graphic encryption is > the use of a encryption algorythm to scramble an image taken of a > document.) Is there anything particular in graphic encryption? I usually encrypt graphics and document images as regular files with regular encryption... Hadmut From sjb at universe.digex.net Fri Oct 6 09:03:28 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Fri, 6 Oct 95 09:03:28 PDT Subject: subjective names and MITM In-Reply-To: <199510060224.WAA03180@homeport.org> Message-ID: <199510061603.MAA18239@universe.digex.net> Adam Shostack writes: > The key does indeed have a high likelihood of being unique, >but dealing with 1024 bit identifiers could strain database systems, >especially when 100 well chosen bits would be than enough. Hence the suggestion to use a hash of the key instead of the key itself. Someone pointed out that a uniformly distributed 1024 bit prime has something like 1014 bits of entropy. An md5 hash of the key should have about 128 bits of entropy, with the probability of a collision among 2^33 keys (one per person, worldwide) being about 1 in 2^95, or about 1 in 10^29. Sounds like we're safe, even without straining our databases. From jbaber at mi.leeds.ac.uk Fri Oct 6 09:05:53 1995 From: jbaber at mi.leeds.ac.uk (jbaber at mi.leeds.ac.uk) Date: Fri, 6 Oct 95 09:05:53 PDT Subject: subjective names and MITM Message-ID: <2264.9510061657@misun2.mi.leeds.ac.uk> This discussion can be divided into two separate situations. The first of which is exemplified perfectly by Hal: hfinney at shell.portal.com writes: >m5 at dev.tivoli.com (Mike McNally) writes: > >hfinney at shell.portal.com writes: > > > This situation with the MITM is actually about the same as if you were > > > communicating insecurely in the first place. You are exposed to all of > > > the same risks. > >The only way to achieve the level of security offered by physical face > >to face communication with a person is to have a physical face to face > >conversation at some point. If you only ever communicate via > >electronic means, you are always subject to the risk of dealing with a > >synthetic entity. (I think.) >I don't think so, or at least the risk can be minimized much more than in >the model where we just say that we're communicating with keys, therefore >a MITM is perfectly legitimate because it's just a matter of who holds >the keys. Suppose I want to talk to PC Magazine columnist John Dvorak. >Suppose I find a VeriSign certificate for his key, with his name and >employment information. I've never met him. We've never had a face to >face conversation. Yet I claim I can communicate with considerable >security with Dvorak using this certificate, certainly more than if I >just use any old key which is lying around with his name on it, one which >may be owned by a MITM. Here the wish is to communicate with a 'real' person. A person that actually exists and has an in-built reputation that is separate from his key. This is very much a real life situation and is very similar to the first time that you meet someone - it is very hard to know that someone is who they say that they are, few people ask for ID and even ID is possible to fake (an old key that is actually owned by a MITM). In this case the person is known (of) and not the key - therefore it makes sense to attempt to ensure that the link between the key and the person is a strong (trustworthy) as possible. However this is not the case in the second situation: I could say that know that I enjoy reading mail from some people on the list, that I agree with some people on the list or that some people on the list hold very strong opinions on certain subjects. However this would not be correct as I have not met anyone else on the list in person (we do not all live in the US). It would be more correct to say that I enjoy reading mail from some addresses on the list (etc.) - I have no real idea whether hfinney at shell.portal.com is Hal or actually Tim expressing different views. If I mail Hal therefore I am actually mailing the entity that sends mail to the list from that address and I would do so being pretty sure that I was communicating with the person who mails here - but I would have no idea whether he is actually male, female, blond, brunette etc apart from what I chose to believe from others. Now mail is far easier to fake/intercept than a digital signature/encryption - at least I hope so. Therefore if Hal where to sign all of his messages I could check the signatures with a public key obtained from anywhere at all and if they passed then I could be confident that the messages were all written by the entity with control of the secret part of the key - at least far more confident than I am at all of the mail from hfinney at shell.portal.com actually comes from there. So instead of me getting the idea that hfinney at shell.portal.com posts interesting messages I get the idea that the holder of the secret key posts interesting messages - I would probably still use the mail address as keys are less convenient with current mail readers but that is an implementation problem. Hals reputation is therefore transfered to they key - no matter where I got the key from. So if I send encrypted mail to the person with the private part of Hal's key I can be sure that it can only be read by the person who actually sent the messages pertaining to be from Hal. So the MITM problem is 'defined away' in the case where a reputation grows with a key but is still a major problem where you want to transfer a ready made reputation to a key (as in the first example). In effect the key becomes a pseudonym and you can be sure of communicating with the pseudonym safely but can not be sure of anything about the pseudonum that you have not experienced yourself without trusting someone else (VeriSign in the first example). Thus the problem is more reputation transfer than anything else. Jon C. Baber jbaber at mi.leeds.ac.uk http://www.chem.surrey.ac.uk:80/~ch02jb/ From shamrock at netcom.com Fri Oct 6 09:08:20 1995 From: shamrock at netcom.com (Lucky Green) Date: Fri, 6 Oct 95 09:08:20 PDT Subject: Graphic encryption Message-ID: <199510061606.MAA06883@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <199510061517.IAA10725 at ix5.ix.netcom.com>, privsoft at ix.netcom.com (Steve ) wrote: > I am currently working for a company that has a graphic encryption > product called PrivaSoft. I was wondering if there were other products > or engines that also provide graphic encryption. (graphic encryption is > the use of a encryption algorythm to scramble an image taken of a > document.) > > Also if any of ya'll are famillar with graphic encryption, I am looking > for opinions as to its strengths / weaknesses. The description you give us is meaningless. The strengh of an encryption alogirithm must depend only on the algorithim and key used, not on the data (in your case graphics) being encrypted. It is utterly irrelevant _what_ is being encrypted, all that matters is _how_ it is being encrypted. Send us the algorithm and source code and we'll take a look at it. And by the way, "proprietary" algorithms are generally junk and should not be relied upon by security concious individuals and businesses. Only algorithms that have undergone extensive peer review should be considered for use. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHVT7yoZzwIn1bdtAQEUOgGAnyOPIjo4D18AUDNDzXAcqRLXO7vcaRiw ode3TBA5gLm1FaGPSEk5y5g3VKiVS6ai =bV6Z -----END PGP SIGNATURE----- From hfinney at shell.portal.com Fri Oct 6 09:09:12 1995 From: hfinney at shell.portal.com (Hal) Date: Fri, 6 Oct 95 09:09:12 PDT Subject: subjective names and MITM In-Reply-To: Message-ID: <199510061608.JAA17323@jobe.shell.portal.com> m5 at dev.tivoli.com (Mike McNally) writes, quoting me: Mike>Seems to me that the idea of "communicating with the person you think Mike>you are" is intractably difficult if you're not sitting in the same Mike>room. ... Hal> I can certainly agree with the attractive simplicity of this notion. My Hal> point is that it is practically useless. ... Mike>Oddly enough, it seems to me that Hal (if that really *is* his name) Mike>and I (and Carl & others) are saying basically the same things, but Mike>drawing completely different conclusions. Strange. I'm willing to Mike>wait to see what the peer review process concludes. I am afraid you have quoted this out of context and thereby exactly reversed the sense of what I was saying. Hence we are not saying the same things, but rather we are saying opposite things. The full quote is: Mike>Seems to me that the idea of "communicating with the person you think Mike>you are" is intractably difficult if you're not sitting in the same Mike>room. If you accept instead the idea of "communicating with the Mike>entity possessing the private half of a keypair" then life gets a lot Mike>simpler. Hal>I can certainly agree with the attractive simplicity of this notion. My Hal>point is that it is practically useless. By "this notion" I was referring to the second sentence rather than the first, the idea that we are communicating with whomever holds the key. This was the one which you said would make life simpler, and so I hoped that by agreeing about its simplicity it would be clear which of the two competing ideas I was referring to. Apparently it was ambiguous, so I apologize for being unclear. It is disturbing that even after reading that very long message my position could be interpreted as being the opposite of what it is. Apparently my arguments are not being well understood. I will have to think about this issue more and try to express myself better. Hal From nobody at REPLAY.COM Fri Oct 6 09:10:18 1995 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 6 Oct 95 09:10:18 PDT Subject: National Secuirty Science and Technology Strategy Message-ID: <199510061610.RAA20340@utopia.hacktic.nl> This excerpt is from the summary of a long policy statement on the National Security Science and Technology Strategy published by the White House on September 19. The full report is well worth reading -- it addresses military, economic, intelligence, scientific and technological issues and lays out projected initiatives. Has anyone seen news reports on this? ----- >From URL: http://www.whitehouse.gov/White_House/EOP/OSTP/ nssts/html/execsum-plain.html Executive Summary _______________________________________________________ In March 1995, President Clinton ordered a sweeping reexamination of the United States Government's approach to putting science and technology to the service of national security and global stability in light of the changed security environment, increasing global economic competition, and growing budgetary pressures. This National Security Science and Technology Strategy, the product of that reexamination, is the country's first comprehensive Presidential statement of national security science and technology priorities. It augments the President's National Security Strategy of Engagement and Enlargement by articulating science and technology policies and initiatives that support the President's three primary national security objectives: enhancing our military readiness and capabilities, preventing conflict from occurring through engagement with other nations, and promoting prosperity at home. It advances that document's central approach of preventing conflict and maintaining the capability to respond should conflict occur. It is built on the recognition that our security depends on economic strength as well as military power. And it is grounded in the conviction that investment in science and technology is central to our ability to meet the challenges ahead. This National Security Science and Technology Strategy defines our new approaches to applying science and technology to the challenges that most directly affect our nation's security. [snip balance of summary] From mark at unicorn.com Fri Oct 6 09:35:14 1995 From: mark at unicorn.com (Rev. Mark Grant) Date: Fri, 6 Oct 95 09:35:14 PDT Subject: Graphic encryption Message-ID: On Fri, 6 Oct 1995, Lucky Green wrote: >And by the way, "proprietary" algorithms are generally junk and should not >be relied upon by security concious individuals and businesses. Only >algorithms that have undergone extensive peer review should be considered >for use. It's OK, when these guys were spamming Usenet a few weeks ago with their product announcement (admittedly, they did at least keep it to comp groups) they said it was export-approved. Therefore, it can be pretty much written off from a security standpoint - it's at best as good as 40-bit RC4, and I sure wouldn't use that for secure communications. I'd still like to know how it works so we can see just how insecure it is, though. Mark From dlv at bwalk.dm.com Fri Oct 6 09:44:09 1995 From: dlv at bwalk.dm.com (Dr. Dimitri Vulis) Date: Fri, 6 Oct 95 09:44:09 PDT Subject: FORGED CANCELS of posts on n.a.n-a.m In-Reply-To: <199510051540.IAA23612@ix.ix.netcom.com> Message-ID: [A quick last word before I leave for a wilderness area with no net.access.] In article <199510051540.IAA23612 at ix.ix.netcom.com>, Bill Stewart writes: [Hujskonen-Franz] >Aside from the forged-From:-bogus-cancel spam /r$ proposed, this has >the problem that it still only allows the originator to cancel a message, >and not either the moderator of a moderated group or a Good Spam-canceller >like CancelMoose, as well as stopping censors and cancel-spammers. The respected CancelMoose no longer posts cancels, but posts PGP-signed NoCeM notices. In fact, CancelMoose's web site has some nice things to say about the Hujskonen-Franz proposal. I quote URL: http://www.cm.org/about-cancels.html: ]About Cancels ]************* ] ]A number of people have asked about the relationship between this project ]and spam cancels. IMHO, the point is moot. ] ]I envision unauthenticated cancel messages will rapidly become obsolete, ]once people start posting menu driven cancelbots. If we want cancels back ]we'll have to authenticate them. ] ]Taneli Huuskonen first suggested this scheme to me, and I think it's an ]excellent idea. ] ]For every posted message there is a "Cancel-Key" which is the message-id of ]the message hashed with a secret password. The MD5 of the cancel-key is the ]"Cancel-Challenge" which is posted as a header in every post you make. To ]cancel that post, the cancel message must have a copy of the Cancel-Key in ]the headers. An admin can configure his news software to add another ]Cancel-Challenge to the post, if he/she wishes to retain the rights to ]cancel it. The only people this leaves out in the cold is the moderators-- ]this does not allow them to protect their newsgroup-- perhaps a public key ]based system to "prove" moderation will prove necessary, but that will ]require some MAJOR reworkings of news... ] ]Email: moose at cm.org I urge cypherpunks to read the NoCeM information on URL http://www.cm.org/ and to jump on the NoCeM bandwagon (such as, start posting PGP-signed "show" ratings for articles we find worth highlighting). I see nothing in RFC 1036 that says that a moderator of a newsgroup should be able to cancel other people's posts in his/her group. There's an old Usenet tradition (bad, IMO) that when Alice posts an article in Bob's moderated group and inserts her own "Approved:" header, then Bob is expected to impersonate Alice and to post a cancel in Alice's name for the unauthorized article. But, at present, nothing prevents some Charlie from impersonating Bob impersonating Alice and forging a cancel for an article that actually was approved by Bob. Basically, if Alice posts an article with her own "Approved:" header in Bob's newsgroup, then this problem is not going to be solved by just cancelling her article(s). If Alice keeps doing that, it becomes necessary to talk to her feeds about aliasing her site, and the cancels have little to do with it. IMVHO, only the author should be able to cancel her own postings in a moderated group. If the posting was not properly approved, she should cancel them to show good will. Once Bob has _approved Alice's posting in his moderated group, he shouldn't be able to impersonate Alice to cancel it, but should ask Alice. (And all this can be done with the Hujskonen-Franz scheme.) Bob can instead protect his newsgroup by posting a PGP-signed NoCeM notice: Action: hide Type: unauthorized posting or by asking someone widely trusted, like CM, to post such a notice. Likewise when Brad Templeton and/or Co$ (sorry Brad for lumping you together :) see an article which they think quotes their copyrighted material, they should not forge a cancel, but post a PGP-signed NoCeM notice: Action: hide Type: copyright violation I wonder how many sites would honor CancelPoodle's NoCeM notices? :) The Hujskonen-Franz scheme would still allow Clarinet to continue massively canceling/superseding their own articles. Continuing to quote Bill Stewart: >Cancellation is a sufficiently local-policy-dependent issue, and reasonably >low volume compared to the rest of news, that it probably makes sense for >the various news programs to hand cancellation requests off to an external >program, which can be locally modified as desired. It would be nice if inn and nn called the same external program to handle cancels. Now nn's database easily gets out of sync. With an external program, each site could choose to honor only authenticated cancels and ignore 3rd party NoCeM's (but let the users mark NoCeM'd articles as read, if they want to); or honor all cancels; or something in between. >One approach is to add digital signature and verification capability >to News, at least to support cancels; doing this in an outboard >cancel-daemon is obviously easier. RIPEM-SIG is a signature-only >version of RIPEM which is exportable, probably just in binaries. >The local cancel-daemon could accept cancellation requests that were signed >by anybody on the list of locally-approved cancellers; one site could accept >cancels from Cancelmoose, newsgroup moderators, and Helena Kobrin; >another could do authors only. This would, of course, encourage people >to get their digital signatures out there to allow themselves to cancel >their own messages. Any idea that encourages people to use digital signatures is good. However the Hujskonen-Franz proposal allows a total stranger to post an article to your news spool; then to cancel this article, with your being reasonable sure that the cancel came from the same total stranger, and without establishing any further trust for the stranger. There are tens of millions of people with Usenet access. It's an overkill to collect a key from each one to allow them to cancel their articles. NoCeM is a very promising protocol for allowing trusted third parties to eliminate articles by posting PGP-signed notices. (e.g., CancelMoose new way of killing spam -- no more forged cancels from CM!) ObMoosePoem: :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) Moose, Moose, wonderful Moose! Tramples spam with a hoof; Spammers go through the roof. Moose, Moose, wonderful Moose! Rids us of ugly spam. Fond of the Moose I am. Moose, Moose, wonderful Moose! :-) I have to go _right _now. --- Dr. Dimitri Vulis Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From habs at warwick.com Fri Oct 6 09:54:44 1995 From: habs at warwick.com (Harry S. Hawk) Date: Fri, 6 Oct 95 09:54:44 PDT Subject: Open Market, Inc. Announcing security products Message-ID: <199510061654.MAA12549@cmyk.warwick.com> Open Market, Inc. Is announcing "free software and services that will help hundreds of Internet-based businesses and millions of users protect themselves from potential security breaches." I don't know any more info.. I'll send more when available. -- Harry Hawk Manager of Computer Services Warwick Baker & Fiore 212 941 4438 habs at warwick.com From hfinney at shell.portal.com Fri Oct 6 10:10:07 1995 From: hfinney at shell.portal.com (Hal) Date: Fri, 6 Oct 95 10:10:07 PDT Subject: subjective names and MITM In-Reply-To: <2264.9510061657@misun2.mi.leeds.ac.uk> Message-ID: <199510061708.KAA27047@jobe.shell.portal.com> jbaber at mi.leeds.ac.uk writes (where I have taken the liberty of reformatting for 80 columns): > Now mail is far easier to fake/intercept than a digital > signature/encryption - at least I hope so. Therefore if Hal where to > sign all of his messages I could check the signatures with a public key > obtained from anywhere at all and if they passed then I could be > confident that the messages were all written by the entity with control > of the secret part of the key - at least far more confident than I am > at all of the mail from hfinney at shell.portal.com actually comes from > there. So instead of me getting the idea that hfinney at shell.portal.com > posts interesting messages I get the idea that the holder of the secret > key posts interesting messages - I would probably still use the mail > address as keys are less convenient with current mail readers but that > is an implementation problem. Hals reputation is therefore transfered > to they key - no matter where I got the key from. So if I send > encrypted mail to the person with the private part of Hal's key I can > be sure that it can only be read by the person who actually sent the > messages pertaining to be from Hal. Well, this is not necessarily the case. A MITM may be signing my messages for me, and then putting them back the way they were before I am allowed to see them. Granted, this would not be easy, and perhaps the difficulty of this would be great enough that you will feel comfortable using an unsigned key. But if it were accomplished, then your messages to me would actually be insecure. No matter how convinced you became of my sincerity and trustworthiness, actually our conversations would be overheard by a third party despite both of our efforts to the contrary. Our use of encryption would be rendered futile. Doesn't this bother you? Hal From habs at warwick.com Fri Oct 6 10:20:45 1995 From: habs at warwick.com (Harry S. Hawk) Date: Fri, 6 Oct 95 10:20:45 PDT Subject: Open Market (more info) Message-ID: <199510061720.NAA13378@cmyk.warwick.com> Basically they are going to set up a web site to act as a clearing house for security related breaches. On particular thing they will do is: 1) Hosting a web site where a user with any broswer can find out if their browser is secure. List security problems associated with that browser. "basically a self diagnostic center" That will be done by tues. -- Harry Hawk From patrick at Verity.COM Fri Oct 6 10:28:52 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Fri, 6 Oct 95 10:28:52 PDT Subject: subjective names and MITM Message-ID: <9510061724.AA01171@cantina.verity.com> > > A public key *is* "very probably unique". A "randomly selected" 1024 bit > prime number has a specific amount of entropy in it. The likelihood of > two users world wide "randomly" choosing the same such prime may be > precisely determined (assuming you can figure the entropy). > Given the difficulty of finding primes, how likely do you think it is that given one of the well known methods and finding the first 1024 bit prime that pops out would give you an effective attack? Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From andrew_loewenstern at il.us.swissbank.com Fri Oct 6 10:35:53 1995 From: andrew_loewenstern at il.us.swissbank.com (Andrew Loewenstern) Date: Fri, 6 Oct 95 10:35:53 PDT Subject: Graphic encryption Message-ID: <9510061622.AA02423@ch1d157nwk> > Is there anything particular in graphic encryption? I usually > encrypt graphics and document images as regular files with regular > encryption... I believe graphic encryption outputs a valid image file that is apparently white noise until you perform the decryption transformation on it. An obvious way to do this with a non-lossy file format is to encrypt pixel vales with a stream cipher. Another way to make the image unviewable would be to shuffle the pixels or rasters with a PRNG. andrew From habs at warwick.com Fri Oct 6 10:49:23 1995 From: habs at warwick.com (Harry S. Hawk) Date: Fri, 6 Oct 95 10:49:23 PDT Subject: Open Market, Inc. Announcing security products In-Reply-To: <199510061747.NAA13827@cmyk.warwick.com> Message-ID: <199510061749.NAA13856@cmyk.warwick.com> Here is what they are going to do.. by tues 1) Hosting a web site where a user with any browser can find out if their browser is secure. List security problems associated with that browser. "a self diagnostic center" Using their knowledge base about browsers to create this feature. shortly thereafter: 2) Creating ref. implementations for the Open Market server; methods of verifying what browser you are connecting with and lookup security bugs and or proceed with transaction. Make CGI scripts available for operators of other servers. Basically letting other sites do what they are doing it step 1. 3) Offer a free upgrade problem for people who have a server that has had a security breach. They can download a known secure server. This upgrade is for any commercial server browser that has a known breach. E.g., update a netsite server but not a CERN 3.0 server even if the CERN operator has hacked it to make it secure. WWW.openmarket.com From carolab at censored.org Fri Oct 6 10:57:22 1995 From: carolab at censored.org (Censored Girls Anonymous) Date: Fri, 6 Oct 95 10:57:22 PDT Subject: Transgenders begin lobbying against ITAR Message-ID: Transgender Lobby Days has come and gone. I taught transgender persons about PGP and ITAR. It got a good reception, and they are beginning to use it. We went to all 535 congressional offices in two days, and began to get the "transgender lobby block" noticed. We did get all of the legislative staffers email addresses, and will spill the results of this soon, so you can mount an anti-ITAR campaign of you own. I concentrated on the media galleries, and began to get the transgender positions related to the media. We did get lots of press, and a 20-20 piece coming soon. They were all virtually uninformed about ITAR or the Netscape situation. I did my best on ITAR while I was there. This report is being filed at alt.coffee, a cybercoffeehouse on Avenue A and 10th Street, in New York City. Gotta go this is costing 16.00 an hour to file. Love Always, Carol Anne Member Internet Society - Certified BETSI Programmer - WWW Page Creation ------------------------------------------------------------------------- Carol Anne Braddock <--now running linux 1.0.9 for your pleasure carolann at censored.org __ __ ____ ___ ___ ____ carolab at primenet.com /__)/__) / / / / /_ /\ / /_ / carolb at spring.com / / \ / / / / /__ / \/ /___ / ------------------------------------------------------------------------- A great place to start My Cyber Doc... From patrick at Verity.COM Fri Oct 6 11:09:21 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Fri, 6 Oct 95 11:09:21 PDT Subject: Certificate proposal Message-ID: <9510061805.AA01185@cantina.verity.com> > > I may not have been clear: the certificate I was referring to was the one > from Egghead, the one which I will use to make sure that I have a valid > key for Egghead. Such a certificate would of course not have my credit > card number; it would probably have some information related to Egghead. > My rhetorical point was that information would most plausibly be a NAME > by which I would refer to Egghead. I am still trying to understand how > these proposals to take names out of the picture will apply to a > commonplace situation like this one. The certificate would identify the entity you're having commerce with. It doesn't have to have a name, the certificate would replace the need for a name. If you wanted a name, you could use the certificate to access it. The certificate would give you a public key that would be the central identifier. Associated with it might be many attributes of the key-entity. You might use the key to find out a name, and bank account number, or an ip-address to use to communicate with. Don't think of it as being a name, "Egghead Software", and this is the key associated with it. Think of the key as the central thing. Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From ylo at cs.hut.fi Fri Oct 6 12:08:18 1995 From: ylo at cs.hut.fi (Tatu Ylonen) Date: Fri, 6 Oct 95 12:08:18 PDT Subject: Council of Europe on Crypto: Finland Message-ID: <199510061907.VAA17084@shadows.cs.hut.fi> People have been digging the background of the Council of Europe recommendations here in Finland. It has turned out that Finland was represented an assistant director of the Criminal Police who is known as a supporter of extremely broad powers for the police. At the meeting, he has apparently presented his personal opinion as the official opinion of Finland; later the Council unanimously decided to recommend banning strong crypto. I hear a representative from Norway had apparently tried to speak some sense at the meeting, but had quickly been quieted by the others. It has also turned out that there have been studies on legislating cryptography and related issues in Finland during the past two years, but without concrete plans. The officials in charge of these issues were not aware of what was happening in Strasburg, and what Finland apparently has presented there certainly does not represent a concensus within the government. Things appear to be developing in promising directions, but much more work is still needed until things are on the right track. I strongly urge people in other European countries to contact their government officials, the press, and use other possible channels to dig out what exactly was happening and why, and make the officials and politicians understand the other issues that are related (computer security, universal surveillance, ability of independent political groups to function, trade secrets, etc). Professors and other persons in expert positions are important sources of information to the government in the preparatory process, and you should provide the officials with experts to consult on the issues. At least here it has turned out that preparations were being carried out with very few independent experts, input coming almost exclusively from the law enforcement side. Tatu Ylonen From tomw at orac.engr.sgi.com Fri Oct 6 12:12:42 1995 From: tomw at orac.engr.sgi.com (Tom Weinstein) Date: Fri, 6 Oct 95 12:12:42 PDT Subject: Certificate proposal In-Reply-To: <9510021553.AA13756@tis.com> Message-ID: <199510061829.LAA04524@orac.engr.sgi.com> In article , Hal writes: > tomw at orac.engr.sgi.com (Tom Weinstein) writes: >> Um, just a wild guess, but... your credit card number maybe? (Well, >> okay, its hash.) > I may not have been clear: the certificate I was referring to was the one > from Egghead, the one which I will use to make sure that I have a valid > key for Egghead. Such a certificate would of course not have my credit > card number; it would probably have some information related to Egghead. > My rhetorical point was that information would most plausibly be a NAME > by which I would refer to Egghead. I am still trying to understand how > these proposals to take names out of the picture will apply to a > commonplace situation like this one. Yes, it seems I misunderstood you. There would have to be some binding between the key of the merchant and some identifying information that would allow the user to verify the merchant's identity. This could take the form of a True Name for the merchant and a trusted CA. Another approach would take the form of an FQDN, an IP address and a trusted CA. In this case the software would have to verify that the FQDN and IP address match the URL and DNS lookup, respectively. Unfortunately, this also requires that any time the IP address changes that the merchant get a new certificate. Also, the CA must be checked to verify that the certificate hasn't been revoked, or you run the risk of an attacker getting the old IP address. Does anyone see any other options? -- Sure we spend a lot of money, but that doesn't mean | Tom Weinstein we *do* anything. -- Washington DC motto | tomw at engr.sgi.com From futplex at pseudonym.com Fri Oct 6 12:38:54 1995 From: futplex at pseudonym.com (Futplex) Date: Fri, 6 Oct 95 12:38:54 PDT Subject: Graphic encryption In-Reply-To: <199510061517.IAA10725@ix5.ix.netcom.com> Message-ID: <199510061938.PAA16649@thor.cs.umass.edu> Steve O. writes: > I am currently working for a company that has a graphic encryption > product called PrivaSoft. [...] > Also if any of ya'll are famillar with graphic encryption, I am looking > for opinions as to its strengths / weaknesses. Funny you should ask. A week or so ago someone mentioned PrivaSoft's fax encryption software here. The promotional material we saw mentions two points about the product which I believe were seen as bad omens by many of us on the cypherpunks list. To wit: (1) PrivaSoft uses a proprietary encryption algorithm Cryptanalysis is a challenging task. Comparatively little is known about how to prove, in some formal sense, that any given cryptographic algorithm is strong. Most people in the field have reached the conclusion that the test of time is the best true measure of the cryptographic strength of an algorithm. Until plenty of people have pounded on the algorithm, you can't really have much confidence about it. Moe concretely: If you believe your algorithm is strong, then you have no reason to fear an expert review, and should in fact welcome it. On the other hand, if you won't reveal your algorithm, we have little basis for trusting our confidential data to it. (2) PrivaSoft has been approved for export by the U.S. Govt. As you probably know, the U.S. Government restricts the export of strong cryptography (using the ITARs), with some notable exceptions for bankers and authentication-only deployments. PrivaSoft isn't selling strictly to banks, and attempts to protect confidentiality. Ergo, the government doesn't think you're using strong cryptography. Case in point: the separate U.S. and international versions of Netscape Navigator. The exportable version uses the RC4 algorithm (as part of the SSL protocol) with an effective key length of 40 bits, while the domestic version uses 128 bits. Some people here made the news a short while ago with a concrete demonstration of the inadequacy of the shorter key length. That was proof-of-concept for an idea already fairly well-accepted in cryptographic circles. PrivaSoft looks worse than the int'l. version of Navigator. At least with the browser, Netscape had levelled with everyone up front and used a reasonably well-known published algorithm. Thus we had good reason to believe it provides a non-trivial level of security. The C'punks Key Cracking Ring showed just what it takes to cross that line. But we have absolutely _no_ evidence that PrivaSoft does anything hard to break at all. Bottom line: you have to release the specs. of your algorithm, to a panel of experts under NDAs or (preferably) to the public, to convince us that PrivaSoft offers us real security. [I highly recommend Schneier's _Applied Cryptography_, 2nd edition due RSN from Wiley & Sons, as a comprehensive reference guide if you're thinking seriously about these issues. ISBN 0-471-59756-2] -Futplex From MINITERS at citadel.edu Fri Oct 6 13:39:13 1995 From: MINITERS at citadel.edu (MINITERS at citadel.edu) Date: Fri, 6 Oct 95 13:39:13 PDT Subject: Who knows the story on Elementrix OTP?? Message-ID: <01HW4KOF4LB40000UE@CITCS.Citadel.edu> Aclaim is being made to having a technique for utilizing OTP with a spiffy key generation technique that requires no transmission over an unsecure link. Who knows the details of the approach and the particulars on the developers? From cme at TIS.COM Fri Oct 6 13:49:56 1995 From: cme at TIS.COM (Carl Ellison) Date: Fri, 6 Oct 95 13:49:56 PDT Subject: DOCKMASTER II is coming! Message-ID: <9510062045.AA09504@tis.com> Date: Fri, 6 Oct 95 16:14 EDT Subject: DOCKMASTER II is coming! Forum-Transaction: [2279] in the >site>forum_dir>bb meeting Transaction-Entered-By: Lanenga.PILOT at DOCKMASTER.NCSC.MIL Transaction-Entered-Date: 22 Sep 95 12:47 EDT COMPUTER SECURITY, IT'S FOR YOU! The DOCKMASTER II Program Management Office, Y407, is pleased to post the first official notice concerning DOCKMASTER II, an NSA-sponsored information system in support of the INFOSEC community. DOCKMASTER II will provide an information sharing capability to its users. This will include the supporting functions of a data repository and information dissemination. The system will protect itself and the information it contains, which will range from Unclassified to National Secret, including Proprietary information. WHAT IS DOCKMASTER II? DOCKMASTER II provides a UNIX Open Architecture with electronic mail, bulletin boards, file transfer, and data packaging and sharing tools. The system is built on the Data General Operating System (UNIX System V) and utilizes the Informix On-Line/Secure Database. Both the operating system and database are currently in the Trusted Product Evaluation Process (TPEP) at the B2 level of trust. The system is comprised of Commercial-Off-The-Shelf (COTS) software, with some developmental software to provide user-friendly interfaces. A fast, flexible, and expandable hardware platform is implemented. WHAT ARE SOME OF THE SPECIFICS OF DOCKMASTER II? -User-Friendly (Graphical, Menu Driven, or Command Line) Interfaces -E-Mail -Bulletin Boards (Forums) -File Transfer Protocols (FTP, Kermit, X-Modem, Y-Modem) -Connections via MILNET/INTERNET/TYMNET or Dial-in -Database (INFORMIX On-Line/Secure) -Reference Library -Document Publishing (Framemaker) -Project Management Tool (Autoplan II) -On-Line Tutorial -System-wide Help Facility -Provides infrastructure for multi-level secure access -Replaces the current unclassified DOCKMASTER system WHAT IS THE STATUS OF DOCKMASTER II? -System Requirements Review, and Preliminary and Critical Design Reviews have been completed successfully -System Evaluation is occurring -Software Integration & Test and System Integration & Test are occurring -Initial Operating Capabilty (IOC) - Unclassified and Proprietary data only is scheduled for Spring 1996 -Final Operating Capability (FOC) - Multilevel data up to Secret, is scheduled for late 1996. HOW TO LEARN MORE ABOUT DOCKMASTER II? The DOCKMASTER II Program Management Office offers a briefing to all interested organizations or individuals. DOCKMASTER II will have many capabilities to offer our fellow co-workers at NSA as well as their counterparts in Government and Industry. Please contact us to arrange a briefing; we are excited about sharing DOCKMASTER II's capabilities. Also please feel free to ask any questions about DOCKMASTER II. For briefings, please contact Daphne Willard (Willard at DOCKMASTER.NCSC.MIL) For questions: Devolyn Arnold (DArnold at DOCKMASTER.NCSC.MIL) or call the Dockmaster II Program Management Office at (410) 684-7276 From rickj at microsoft.com Fri Oct 6 13:56:51 1995 From: rickj at microsoft.com (Rick Johnson) Date: Fri, 6 Oct 95 13:56:51 PDT Subject: Comments on STT Spec Implementation Details Message-ID: <9510062200.AA01491@netmail2.microsoft.com> Perry writes.... >My suggestion, which I made when Microsoft made a presentation at the >IETF meeting in Stockholm and then had the gall to say "oh, no, we >don't intend to publish an internet draft" is that you publish this as >an internet draft and try to shepard it through the IETF's >standardization process. You will, of course, be savaged, but that is >in the interests of everyone, including you. I talked to the two STT folks who were there. I've also read the minutes of that meeting as published by Amir. Politely, that particular meeting and the attempt to form a splintered variety of WGs was viewed by the two STT folks attending as a pretty wild affair characterized by a lot of 5-10 minute speeches and the slimmest directional concensus. A lot of great discussion, but low odds of coalescing into an effort leading to tangible results in a timely manner. That doesn't mean there isn't value in putting proposals into the IETF standardization process, and it wasn't the content or intent of those people to impart that. If we had other objectives we wouldn't have even bothered to go to Stockholm. >The belief that companies can make more money by following proprietary >solutions and imposing them on the world as standards is falling >away. Agreed...and not the content or intent of any comments made by the STT attendees at that meeting. >It is in Microsoft's interest that the standard that is adopted >for commerce be open, publically discussed at length, and brutally >critiqued. Losing a bit of control in exchange for actually getting >something that works out for you and your customers is in your interest. Also agreed. Want to pursue discussion in the internet community. Keep in mind, though, we're also obligated to deliver solutions to our customers in the very near term, and therefore publish the STT spec for those who wish to implement and interoperate with the systems we will deploy. Certainly, it's reasonable and rational to want to evolve from that point within the guidelines of the IETF. Based on what people's reaction to what we have put out for everyone to see, I'd be looking for comments from you all as to the most timely and beneficial course to pursue. Looking forward to your input. From nobody at flame.alias.net Fri Oct 6 14:22:47 1995 From: nobody at flame.alias.net (Anonymous) Date: Fri, 6 Oct 95 14:22:47 PDT Subject: CancelMoose = William Nagengast? Message-ID: <199510062121.WAA28108@utopia.hacktic.nl> I did a little digging around, and came up with the following identity for the cancelmoose: > finger moose at panix.com [panix.com] Login Name: moose Full Name: William Nagengast Directory: /net/u/11/m/moose Shell: /usr/local/bin/psh Last login Wed Nov 9 17:21:18 on panix.com ttyq2 from ts3.nyc.access.n. No mail information available. Is this publicly known information? From jgrubs at left.webcasters.com Fri Oct 6 14:35:36 1995 From: jgrubs at left.webcasters.com (Jim Grubs W8GRT) Date: Fri, 6 Oct 95 14:35:36 PDT Subject: NSA Realists v. Nuts (Was: Re: Crypto APIs) Message-ID: -----BEGIN PGP SIGNED MESSAGE----- "Perry E. Metzger" writes: > Learn to live with a new model for how you work now, and you will save > years of bitter and futile agony for everyone. Keep in mind that all they are really trying to save are their "lines" in the annual budget bill. Transfer them to another agency with the same pay and bennies, and we'll all be happier. The International Whaling Commission comes readily to mind. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: LIBERTY!! Use it or lose it!! iQCVAwUBMHWgu974r4kaz3mVAQFfGgP/SU52c5wCUYmyXx/qmVDbuhcncEicbDEG gYqg3XFaiZuMU+eeQ9IxoTay3qlzZrnKvEr3VhLeALvwq/sXs+CHO8cL6FgGwzOI 6B27VAdOWieAGmgr0lmCDJnmj7Lt9lEOg/dpl0IoZPI6Y6J9TDdmmjvBmbnRozqu mwkpDiNu+3g= =Fig2 -----END PGP SIGNATURE----- -- WebCasters(tm) James C. Grubs jgrubs at webcasters.com 6817 Maplewood Avenue Tel.: 419-882-2697 Sylvania, Oh 43560 Fax: 419-885-2814 Internet consulting, HTML programming, Information brokering From bplib at wat.hookup.net Fri Oct 6 14:42:58 1995 From: bplib at wat.hookup.net (Tim Philp) Date: Fri, 6 Oct 95 14:42:58 PDT Subject: Microsoft encryption Message-ID: Does anyone have any information about the methods used to password protect Word documents and Access files? Is there a general way to decode these files? Thanks, Tim Philp =================================== For PGP Public Key, Send E-mail to: pgp-public-keys at swissnet.ai.mit.edu In Subject line type: GET PHILP =================================== From tcmay at got.net Fri Oct 6 14:57:34 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 6 Oct 95 14:57:34 PDT Subject: Picking Random Primes Message-ID: At 5:24 PM 10/6/95, Patrick Horgan wrote: >Given the difficulty of finding primes, how likely do you think it is that >given one of the well known methods and finding the first 1024 bit prime >that pops out would give you an effective attack? What is the "difficuly of finding primes"? They are actually very easy to find. A few comments: First, the "1024 bit prime" is misleading. The 320+ decimal digit modulus used in RSA has two prime factors of roughly 160 digits each. Second, the process of finding the primes p and q involve avoiding "weak" moduli, such as where p and q are very close together. To avoid this, a common situation is for p to be roughly 159 digits and q to be 161 digits. Third, these are _really, really_ big numbers! There are about 10^158 primes between 10^159 and 10^161. roughly. (The rule of thumb, given by Sterling's formula, is that about 1% of all 100-digit numbers are prime, about 0.1% of all 1000-digit numbers are prime, etc.) As there are only about 10^75 particles in the entire universe, this gives about 10^83 primes for every particle in the entire universe! Fourth, the standard way to find the primes p and q is to pick a random number of the approximate starting size and then iterate up, testing for primality. As the above approximation shows, one doesn't have to make too many tests before a number is confirmed to be very likely to be prime. (I say "very likely" because the most popular primality testing routines have a very small chance of saying a composite number is prime, when it isn't. Cf. math books for details on this, and why it is essentially irrelevant to us.) Fifth, there are clearly some really good ways to pick a 150 or 160 digit number to start testing from. For example, a 10-sided die, or a pair of traditional dice (ignoring 11 and 12) could be rolled 150 times, with the resulting number used to start the process. Not bloody likely that any collisions in such a choice process will occur before the heat death of the universe. (There are faster ways, using the random sources we so often talk about, including keyboard poundings, mouse swirlings, audio input, radioactive decay, diode noise, etc., but I wanted to make the point with the rolled die so nobody will ask "Yeah, but what if people picked the same starting point?" They won't.) By the way, all of the "entropy" or "randomness" in the p and q primes lies in the initial seed for the search for the first prime larger than the seeds, as the algorithm is completely deterministic once the seed has been picked. (And fast, too.) --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From sjb at universe.digex.net Fri Oct 6 15:29:03 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Fri, 6 Oct 95 15:29:03 PDT Subject: subjective names and MITM In-Reply-To: Message-ID: <199510062228.SAA27940@universe.digex.net> Timothy C. May writes: >If I understand your usage of "anonym" correctly, I think you are clearly wrong. I think you understand my usage (anonym = untraceable pseudonym). But I still disagree with you. I brought this subject up a couple of weeks ago (as the "inheritance problem"), but was unable to really participate in the discussion as things got a little busy. A quick note on terminology: I'll use "name" to mean a symbol which may be easily traced to a physical entity, "pseudonym" to mean a symbol which is traceable only under certain conditions, and "anonym" to mean a symbol which is not traceable. >The "linking with a unique person" is not especially important, IMO. The reputation of an anonym is fundamentally different from that of a name or pseudonym. When a named or pseudonymous entity fails to perform a contract, the pseudonym is exposed (becoming a name), and the reputations of all names associated with the entity suffer. Further, creating a new name doesn't help, as it gets the reputation of the other names. There are basically two kinds of pseudonyms that I can see: I'll call them escrowed identities and encrypted identities. With an escrowed identity, an escrow agent knows who I am and part of our contract says they're permitted to reveal the name under enumerated circumstances. An encrypted identity is one which is revealed by the act of violating the contract - like the double-spending protections in e-cash - and the KCA merely certifies that the tokens were created correctly. Escrowed identities are vulnerable to "rubber-hose cryptanalysis" and other forms of social engineering, but there are many sorts of transactions which don't permit encrypted identities for technical reasons. In both circumstances, an involved KCA may attest to more than the traceability of the identity. The KCA may also certify that, at the time of certification, the identity's reputation was "clean" with respect to some standard. Note that the KCA knows a *name* for the entity, and thus imbues the newly created pseudonym with the reputation of the name. The entity still hasn't escaped a poor reputation with a new pseudonym (if the KCA's reputation is trustworthy, that is). In effect, names are two-way links between reputations and entities, pseudonyms are one-way links from reputations to entities, and anonyms are broken links between them. Reputation credit will flow from a name to its entity, and then flow back out to all the entity's other names. Reputation debit will flow from a name *or pseudonym* to the entity and then back to all the other names (but not pseudonyms). Anonyms don't transmit their reputation to anything. The upper limit of credit worthiness in an anonym lies in the cost of replacing it. If I can create a new reputation for $1000, and you've loaned me $1500, then I can abandon the old one at a profit of $500. Clearly you can't extend me more credit than it will cost me to create a new anonym. Given the dearth of anonymity (or even pseudonymity) today, it seems that the average entity doesn't value anonymity particularly highly. How many people do you know that use credit cards for virtually *everything*, simply because they value the convenience of a single monthly statement and the security of not carrying cash more than they value anonymity? I know several. This implies that the cost of creating an anonym must be fairly low if they are to become commonplace, which further implies that the credit worthiness of anonyms must be correspondingly low. The next question is whether a low-cost anonym can ever expect to be considered an "expensive" (and therefore credit worthy) anonym. Let's consider anonyms like Pr0duct Cypher and Black Unicorn, since you always bring them up as examples of anonyms with reputation. Certainly the entities behind these anonyms have a certain amount of time and energy invested in them. They *do* have a reputation, but it's a reputation regarding the quality of their products. If you were to advance one of them $500 in consideration for writing some software, and they took the money and didn't produce the software, how would that hurt them? Certainly they wouldn't be likely to get another such contract --- it would be cash on the barrelhead from there on out, just like any cheap anonym. Their reputation for quality information and freeware wouldn't change a bit. There's clearly a large risk involved in loaning money to an anonym with no reputation for paying back loans. Only completed contracts with named entities improve the anonym's reputation. Contracts with other anonyms or pseudonyms are unreliable indicators --- otherwise I could create a hundred anonyms (or encrypted-identity pseudonyms) and have ninety-nine of them report successful transactions to create an artificial reputation. Multiple contracts with the same named entity are also unreliable --- I can falsely report successful transactions with my own anonyms, too. A small number of named entities may even act in collusion to create an artificial reputation. The credit reputation of the anonym is thus reliable only in proportion to the number of named entities with which it successfully transacts. Furthermore, a transaction with a traceable entity is implicitly secured by the other assets of the entity, so the amount risked in a loan is not the entire amount of the loan. There's no reason for an anonymous entity to hold any assets --- anything they need may simply be held by another entity, and thus protected from seizure. The amount risked in a loan to an anonymous entity is the full amount of the loan, so the credit limits for an anonym will grow *much* more slowly than for traceable entities. Assuming the existence of a reputable escrow agent for pseudonyms, the cost to establish a given credit rating for a pseudonym is *much* less than that for an anonym while the risk of undesirable disclosure is only slightly more. If the anonym is sought only for privacy, then a pseudonym is a much better buy. It's when the cost of disclosure is very high that the anonym becomes desirable. So what sort of entity has so much to lose by disclosure that it's unwilling to accept the risk involved with a pseudonym escrowed with a reputable agent? (Remembering that we're talking about a world that's sufficiently changed as to permit anonyms at all --- something I don't think can happen in America today, for instance.) Would you want to do business with them? From sjb at universe.digex.net Fri Oct 6 15:36:40 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Fri, 6 Oct 95 15:36:40 PDT Subject: subjective names and MITM In-Reply-To: <9510061724.AA01171@cantina.verity.com> Message-ID: <199510062236.SAA28120@universe.digex.net> Patrick Horgan writes: >Given the difficulty of finding primes, how likely do you think it is that >given one of the well known methods and finding the first 1024 bit prime >that pops out would give you an effective attack? I'm not an expert here, but I understand the "well-known methods" to essentially use some formula that "tends" to generate prime numbers from uniformly distributed numbers, feed it a "good" random number, and then check to see if it's really prime. If it's not, pick another "good" random number and try again. The entropy in the prime is the same as in the random number generator. From dawagner at phoenix.Princeton.EDU Fri Oct 6 16:27:01 1995 From: dawagner at phoenix.Princeton.EDU (David A. Wagner) Date: Fri, 6 Oct 95 16:27:01 PDT Subject: 'net freedom of speech Message-ID: <199510061914.PAA25802@flagstaff.Princeton.EDU> I thought this might interest some of you here... Note the email address for Senator Feingold where you can thank him, without leaving your terminal! Article: 64508 of comp.org.eff.talk Path: cnn.Princeton.EDU!udel!news.sprintlink.net!simtel!news.kei.com!news.mathworks.com!panix!not-for-mail From: shabbir at vtw.org (Shabbir J. Safdar) Newsgroups: alt.activism,alt.motherjones,alt.politics.datahighway,alt.politics.usa.misc,alt.privacy,alt.society.civil-liberties,alt.wired,comp.org.cpsr.talk,comp.org.eff.talk,talk.politics.libertarian,talk.politics.misc,alt.censorship,misc.legal,alt.fan.rush-limbaugh,alt.sex.senator-exon,alt.society.civil-disob,alt.sex.stories.d,alt.bbs.allsysop Subject: (ALERT) Sen. Feingold speaks up for free speech; thank him Date: 1 Oct 1995 01:46:07 -0400 Organization: Voters Telecommunications Watch (email vtw at vtw.org) Lines: 461 Sender: shabbir at panix.com Distribution: world Message-ID: <44l9uv$dmc at panix3.panix.com> NNTP-Posting-Host: panix3.panix.com Xref: cnn.Princeton.EDU alt.activism:120876 alt.politics.datahighway:10012 alt.politics.usa.misc:46797 alt.privacy:29041 alt.society.civil-liberty:49866 alt.wired:20952 comp.org.cpsr.talk:6658 comp.org.eff.talk:64508 talk.politics.libertarian:46422 talk.politics.misc:369284 alt.censorship:66917 misc.legal:149492 alt.fan.rush-limbaugh:41505 alt.society.civil-disob:580 alt.sex.stories.d:15167 alt.bbs.allsysop:14512 ======================================================================== CAMPAIGN TO STOP THE EXON/COATS COMMUNICATIONS DECENCY ACT (SEE THE LIST OF CAMPAIGN COALITION MEMBERS AT THE END) Update: -Latest News: Feingold releases letter to Committee members identifying First Amendment issues with CDA legislation. -What You Can Do Now: Send a letter to Feingold congratulating him for speaking up for free speech. Put your business or bulletin board on record as supporting free speech and opposing censorship for cyberspace! CAMPAIGN TO STOP THE UNCONSTITUTIONAL COMMUNICATIONS DECENCY ACT Oct 1, 1995 PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT REDISTRIBUTE ONLY UNTIL November 25, 1995 REPRODUCE THIS ALERT ONLY IN RELEVANT FORUMS Distributed by the Voters Telecommunications Watch (vtw at vtw.org) ________________________________________________________________________ CONTENTS The Latest News What You Can Do Now Letter from Senators Russ Feingold (D-WI) to Committee Chronology of the CDA For More Information List Of Participating Organizations ________________________________________________________________________ THE LATEST NEWS Many people who have been following the attempts to censor the Internet may have seen the Senate floor debate. If you did, you were treated to the sight of Senators Leahy (D-VT) and Feingold (D-WI) passionately attempting to explain to 84 members of the Senate exactly just what the Internet was, and why passing laws against indecency are inappropriate in this medium. Both Senators spoke passionately, and for those that understand this technology, something clicked. The 16 members that voted against the censorship legislation will be rewarded by reminders to their voters about their rational, non-hysterical, positions on free speech at the end of the year. In the meantime, we believe that you should congratulate Senators Feingold on his stand for free speech, and for sticking up for the net. Quite often Senator Leahy gets most of the credit for this position. Let's be honest, he deserves it because of his long standing rational approach to our issues. However it's a big tent, and free speech can always use another defender. (Directions for contacting Feingold's office below) Last week Senator Feingold sent a letter to several committee members outlining the First Amendment problems with the measures passed by the Senate (the Communications Decency Act) and the House (the Manager's Amendment) and asked that these be deleted. A copy of that letter is enclosed below, and we thank Senator Feingold's office for making available an electronic copy (so we didn't have to type it in!). Remember, send Senator Feingold a thank you. He's earned it. [What comes below is unchanged from the last alert] The House and Senate have passed a total of four different pieces of legislation aimed at dealing with children's access to information on the Internet. Each of the four was profiled in BillWatch #13 which you can retrieve >from URL:http://www.vtw.org/billwatch/issue.13.html. Here are the four pieces of legislation and a short summary of each of them. HR1978: "Internet Freedom and Family Empowerment Act" (Cox/Wyden) This bill takes the approach of encouraging industry to provide parents with tools to restrict their childrens' access to the net. It contains no new criminal provisions. This approach was affirmed by the House 421-4 on August 4, 1995. (Yes, that's a landslide) S314: "The Communications Decency Act" (Exon/Coats) This bill makes many types of constitutionally-protected speech (including lewd, lascivious, and indecent speech) criminal when used through a telecommunications device. This provision was affirmed by the Senate 84-16 on June 14, 1995. House amendment to HR1555: "Child Protection, User Empowerment, and Free Expression in Interactive Media Study Act" (Klink/Leahy) This bill directs the Department of Justice to study and see if there are places in current law where existing obscenity laws are unenforcible on computer networks. This approach was affirmed by a committee voice vote. House amendment to HR1555: This amendment was submitted at the last minute through the Manager's Mark, a collection of several amendments to HR1555 that were voted on as a block. This amendment takes constitutionally-protected speech and criminalizes it when it is expressed online. Most legislators had no idea that they voted on this last amendment; the summary of the Manager's Mark did not mention these new criminal provisions. There was no applicable House vote on *just this* provision. The House-Senate conference committee now has the task of deciding which of these are allowed into the final Telecommunications Deregulation bill for the last floor vote. ________________________________________________________________________ WHAT YOU CAN DO NOW 1. Send Senator Feingold a letter telling him you appreciate him standing up for free speech in cyberspace. Be polite and check your spelling. Most importantly, READ HIS LETTER FIRST before you send mail. He took the time to write it, shouldn't you take the time to read it? Email or paper mail are recommended, since they will have the least impact on the staff. Telephone calls are less desirable, but certainly appropriate if that is the only way that is convenient for you. The Senator can be reached at: P ST Name and Address Phone Fax = == ======================== ============== ============== D WI Feingold, Russell 1-202-224-5323 na 502 HSOB russell_feingold at feingold.senate.gov Washington, D.C. 20510 [This is from the last alert. We are still collecting signons to the letter though, and we don't have nearly enough Internet Service Providers. -Shabbir] 2. It's crucial that we tell Congress how their decision in the conference committee will affect businesses and bulletin boards in cyberspace. We're coordinating a letter from Internet businesses and bulletin boards to explain to Congress just what these poorly-drafted regulations will mean to them. Read the electronic business and bulletin board letter below. You can also find it at: Gopher: gopher -p1/vtw/exon gopher.panix.com WWW URL: http://www.vtw.org/cdaletter/ Email : Send mail to files at vtw.org with "send cdaletter" in the subject line. 3. If you work for a business that uses bulletin boards or public networks, convince the owners to sign onto the letter. Companies that should sign this include Internet service providers, Web designers (big and small), Internet consultants and trainers, Internet restaurants and bars, software companies that develop Internet-related software, companies that advertise or publish through the Internet or bulletin boards, writers who publish through the Internet, and many others! If you belong to a bulletin board, ask the sysop if he or she will sign onto the letter. 4. Ask the BBS sysop or the business owner to mail in the following information to vtw at vtw.org: Business name Owner or officer name Address Email address Phone number Description of business and anything else relevant Here's an example: $ Mail vtw at vtw.org My business would like to signon to the business and bbs letter. We are: Ed's Xcellent Online Node (EXON) J.J. Exon, Owner 2323 Decency Road, Nebraska 10000-0000 (402) 555-1212 jj at exon.net Ed's Xcellent Online Node is based in Nebraska and provides Internet service to many thoughtful and free-speech loving Nebraskans. We provide Internet access to over 1,500 residents and 400 businesses. We employ 35 full time employees. -James ^D Mail sent! $ 5. If you don't subscribe to a BBS or have an affiliation with a business that uses public networks, but belong to a professional organization or an advocacy group, consider sending Congress the ACLU letter included below with your local group's name on it. Simply replace the material in parentheses with your own information. 6. Relax! You just did a lot of good with only email as a tool. Isn't that great? ________________________________________________________________________ LETTER FROM SENATOR RUSS FEINGOLD (D-WI) [NOTE: This letter was sent to: Sen. Larry Pressler Sen. Fritz Hollings Rep. Thomas Bliley Rep. John Dingell House Committee on Commerce Senate Committee on Commerce, Science, & Technology All of these individuals have a hand in the shaping of the conference committee process that will define the outcome of the Telecommunications Deregulation bill, and therefore, the Internet censorship legislation. Each letter was identical, so we have only included one here. -Shabbir] Tuesday September 26, 1995 The Honorable Thomas Bliley Chairman, Committee on Commerce U.S. House of Representatives Washington, D.C. 20515 Dear Chairman Bliley, Soon your Committee will begin Conference deliberations on H.R. 1555 and S.652, telecommunications reform legislation, with members of the Senate Committee on Commerce, Science and Transportation. During those deliberations, I urge you to strike the potentially unconstitutional provisions regarding on-line indecency contained in both the Senate and House versions of this legislation. The Exon-Coats amendment, added to S. 652 on the Senate floor, included provisions which I believe would violate the First Amendment rights of Internet users and have a chilling effect on further economic and technological development of this exciting new form of telecommunications. Specifically I have objected to the indecency provisions of S. 652 for the following reasons: 1) Indecent speech, unlike obscenity, is protected under the First Amendment to the U.S. Constitution; 2) An outright ban on indecent speech on computer networks is not the "least restrictive means" of protecting children from exposure to such speech on the Internet. There are a number of existing tools available today to allow parents to protect their children from materials which they find inappropriate; 3) A ban on indecent speech to minors on the Internet will unnecessarily require adults to self censor their communications on the Internet; 4) Since "indecency" will be defined by community standards, protected speech by adults will be diminished to what might be considered decent in the most conservative community in the United States and to what might be appropriate for very young children; 5) The "on-line indecency" provisions will establish different standards for the same material that appears in print and on the computer screen. Works that are completely legal in the bookstore or on the library shelf would be criminal if transmitted over computer networks; 6) The Supreme Court has ruled that the degree to which content can be regulated depends on the characteristics of the media. The unique nature of interactive media must be considered when determining how best to protect children. S. 652 ignores the degree to which users have control over the materials to which they are exposed as well as the decentralized nature of interactive technology which liken it more to print media than broadcast media. Section 403 of H.R. 1555, known as the Hyde amendment, raises equally serious concerns with respect to the First Amendment and appears antithetical to other provisions contained in the House Bill. The prohibitions against on-line indecency contained in the Hyde language will have a similar chilling effect on the on-line communications of adults. The Hyde amendment is also inconsistent with the more market-oriented and less intrusive provisions of Sec. 104 of H.R. 1555, the On-Line Family Empowerment Act introduced by Congressmen Cox and Wyden, as adopted by the House. Section 104 recognizes that First Amendment protections must apply to on-line communications by prohibiting FCC content regulation of the Internet. The Cox/Wyden provisions also promote the use of existing technology to empower parents to protect their children from objectionable materials on the Internet, and encourages on-line service providers to self-police offensive communications over their private services. In addition, the Hyde amendment is incompatible with Section 110 of H.R. 1555, which demands a report by the Department of Justice (DOJ) on existing criminal obscenity and child pornography statutes and their applicability to cyber-crime. Sec. 110 also requires an evaluation of the technical means available to enable parents to exercise control over the information that their children receive on the Internet. Perhaps most significantly, Sec. 110 embraces the application of First Amendment speech protections to interactive media. H.R. 1555, while embracing the principles of restraint with respect to new criminal sanctions on protected speech and the promotion of a free-market parental empowerment approach, simultaneously ignores both of those axioms with the Hyde provision. By imposing new criminal sanctions on indecent speech and amending existing criminal statutes, the Hyde amendment rushes to judgement before the DOJ study has even begun. Recently, the Senate Judiciary Committee held the first-ever Congressional hearing on the issue of cyberporn. Based on the testimony of the witnesses, which included parents as well as victims of cyberporn, it became clear that the objectionable communications on the Internet are already covered by existing criminal statutes. The concerns raised at the hearing centered upon trafficking of child pornography, the proliferation of obscenity, and the solicitation and victimization of minors via the Internet. However, those offenses are already violations of criminal law. Indeed, recent press accounts indicate that law enforcement officers are already aggressively prosecuting on-line users for violations of criminal law relating to obscenity and child pornography. It is critical that we use law enforcement resources to prosecute criminal activity conducted via the Internet and not be distracted by the issue of indecency which has not been identified as a serious concern by users or parents. It was clear, during our recent Senate Hearing, that the witnesses' concerns about the Internet did not relate to indecent speech or the so-called "seven dirty words". It is incumbent upon Congress to wait for the results of the study required by H.R. 1555 before embracing overly restrictive, potentially unnecessary and possibly unconstitutional prohibitions on indecent speech contained in both versions of telecommunications reform legislation. I urge the Conference Committee to reject the Exon/Coats and Hyde provisions during your deliberations and to maintain the Cox/Wyden amendment adopted overwhelmingly by the House of Representatives. If the United States is to ever fully realize the benefits of interactive telecommunications technology, we cannot allow the heavy hand of Congress to unduly interfere with communications on this medium. Thank you for your consideration of this very important matter. Sincerely, Russell D. Feingold United States Senator cc: Members, Committee on Commerce ________________________________________________________________________ CHRONOLOGY OF THE COMMUNICATIONS DECENCY ACT Sep 26, '95 Sen. Russ Feingold urges committee members to drop Managers Amendment and the CDA from the Telecommunications Deregulation bill Aug 4, '95 House passes HR1555 which goes into conference with S652. Aug 4, '95 House votes to attach Managers Amendment (which contains new criminal penalties for speech online) to Telecommunications Reform bill (HR1555). Aug 4, '95 House votes 421-4 to attach HR1978 to Telecommunications Reform bill (HR1555). Jun 30, '95 Cox and Wyden introduce the "Internet Freedom and Family Empowerment Act" (HR 1978) as an alternative to the CDA. Jun 21, '95 Several prominent House members publicly announce their opposition to the CDA, including Rep. Newt Gingrich (R-GA), Rep. Chris Cox (R-CA), and Rep. Ron Wyden (D-OR). Jun 14, '95 The Senate passes the CDA as attached to the Telecomm reform bill (S 652) by a vote of 84-16. The Leahy bill (S 714) is not passed. May 24, '95 The House Telecomm Reform bill (HR 1555) leaves committee in the House with the Leahy alternative attached to it, thanks to Rep. Ron Klink of (D-PA). The Communications Decency Act is not attached to it. Apr 7, '95 Sen. Leahy (D-VT) introduces S.714, an alternative to the Exon/Gorton bill, which commissions the Dept. of Justice to study the problem to see if additional legislation (such as the CDA) is necessary. Mar 23, '95 S314 amended and attached to the telecommunications reform bill by Sen. Gorton (R-WA). Language provides some provider protection, but continues to infringe upon email privacy and free speech. Feb 21, '95 HR1004 referred to the House Commerce and Judiciary committees Feb 21, '95 HR1004 introduced by Rep. Johnson (D-SD) Feb 1, '95 S314 referred to the Senate Commerce committee Feb 1, '95 S314 introduced by Sen. Exon (D-NE) and Gorton (R-WA). ________________________________________________________________________ FOR MORE INFORMATION Web Sites URL:http://www.vtw.org/exon/ URL:http://epic.org/ URL:http://www.eff.org/pub/Alerts/ URL:http://www.cdt.org/cda.html URL:http://outpost.callnet.com/outpost.html FTP Archives URL:ftp://ftp.cdt.org/pub/cdt/policy/freespeech/00-INDEX.FREESPEECH URL:ftp://ftp.eff.org/pub/Alerts/ Gopher Archives: URL:gopher://gopher.panix.com/11/vtw/exon URL:gopher://gopher.eff.org/11/Alerts Email: vtw at vtw.org (put "send alert" in the subject line for the latest alert, or "send cdafaq" for the CDA FAQ) cda-info at cdt.org (General CDA information) cda-stat at cdt.org (Current status of the CDA) ________________________________________________________________________ LIST OF PARTICIPATING ORGANIZATIONS In order to use the net more effectively, several organizations have joined forces on a single Congressional net campaign to stop the Communications Decency Act. American Communication Association * American Council for the Arts * Arts & Technology Society * Association of Alternative Newsweeklies * biancaTroll productions * Boston Coalition for Freedom of Expression * Californians Against Censorship Together * Center For Democracy And Technology * Centre for Democratic Communications * Center for Public Representation * Citizen's Voice - New Zealand * Cloud 9 Internet *Computer Communicators Association * Computel Network Services * Computer Professionals for Social Responsibility * Cross Connection * Cyber-Rights Campaign * CyberQueer Lounge * Dutch Digital Citizens' Movement * ECHO Communications Group, Inc. * Electronic Frontier Canada * Electronic Frontier Foundation * Electronic Frontier Foundation - Austin * Electronic Frontiers Australia * Electronic Frontiers Houston * Electronic Frontiers New Hampshire * Electronic Privacy Information Center * Feminists For Free Expression * First Amendment Teach-In * Florida Coalition Against Censorship * FranceCom, Inc. Web Advertising Services * Friendly Anti-Censorship Taskforce for Students * Hands Off! The Net * Human Rights Watch * Inland Book Company * Inner Circle Technologies, Inc. * Inst. for Global Communications * Internet On-Ramp, Inc. * Internet Users Consortium * Joint Artists' and Music Promotions Political Action Committee * The Libertarian Party * Marijuana Policy Project * Metropolitan Data Networks Ltd. * MindVox * MN Grassroots Party * National Bicycle Greenway * National Campaign for Freedom of Expression * National Coalition Against Censorship * National Gay and Lesbian Task Force * National Public Telecomputing Network * National Writers Union * Oregon Coast RISC * Panix Public Access Internet * People for the American Way * Republican Liberty Caucus * Rock Out Censorship * Society for Electronic Access * The Thing International BBS Network * The WELL * Voters Telecommunications Watch (Note: All 'Electronic Frontier' organizations are independent entities, not EFF chapters or divisions.) ________________________________________________________________________ End Alert ======================================================================== From jsw at netscape.com Fri Oct 6 16:31:25 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Fri, 6 Oct 95 16:31:25 PDT Subject: Open Market, Inc. Announcing security products In-Reply-To: <199510061747.NAA13827@cmyk.warwick.com> Message-ID: <3075BB6D.3A91@netscape.com> Harry S. Hawk wrote: > 3) Offer a free upgrade problem for people who have a server that has > had a security breach. They can download a known secure server. And how do you define a "known secure server"? --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From sameer at c2.org Fri Oct 6 16:42:47 1995 From: sameer at c2.org (sameer) Date: Fri, 6 Oct 95 16:42:47 PDT Subject: Open Market, Inc. Announcing security products In-Reply-To: <3075BB6D.3A91@netscape.com> Message-ID: <199510062337.QAA17601@infinity.c2.org> I think they mean "our server" by "known secure server." I'm getting quite sick of people who think their system is secure just because it hasn't been broken. > > Harry S. Hawk wrote: > > 3) Offer a free upgrade problem for people who have a server that has > > had a security breach. They can download a known secure server. > > And how do you define a "known secure server"? > > --Jeff > > -- > Jeff Weinstein - Electronic Munitions Specialist > Netscape Communication Corporation > jsw at netscape.com - http://home.netscape.com/people/jsw > Any opinions expressed above are mine. > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 An Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From tcmay at got.net Fri Oct 6 16:43:55 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 6 Oct 95 16:43:55 PDT Subject: subjective names and MITM Message-ID: At 10:36 PM 10/6/95, Scott Brickner wrote: >I'm not an expert here, but I understand the "well-known methods" to >essentially use some formula that "tends" to generate prime numbers from >uniformly distributed numbers, feed it a "good" random number, and then >check to see if it's really prime. If it's not, pick another "good" >random number and try again. The entropy in the prime is the same >as in the random number generator. The commonly used method is to generate a random number, then interate up (or down, it doesn't matter), testing each number in turn for primality. One doesn't have to test too many numbers to find a prime, as I explained in my last post. It is indeed true that the entropy or randomness lies in the selection of the random number that one starts searching from. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From tcmay at got.net Fri Oct 6 16:47:04 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 6 Oct 95 16:47:04 PDT Subject: Who knows the story on Elementrix OTP?? Message-ID: At 9:37 PM 10/6/95, MINITERS at citadel.edu wrote: >Aclaim is being made to having a technique for utilizing OTP with a spiffy key >generation technique that requires no transmission over an unsecure link. >Who knows the details of the approach and the particulars on the developers? This has been discussed in great detail on the list. I hate to chide Syl publically, but people need to be reminded that they should not skip the messages and then ask questions that have already been covered in gory detail. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From tcmay at got.net Fri Oct 6 16:51:46 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 6 Oct 95 16:51:46 PDT Subject: CancelMoose = William Nagengast? Message-ID: At 9:21 PM 10/6/95, Anonymous wrote: >I did a little digging around, and came up with the following identity >for the cancelmoose: > >> finger moose at panix.com >[panix.com] >Login Name: moose Full Name: William Nagengast >Directory: /net/u/11/m/moose Shell: /usr/local/bin/psh >Last login Wed Nov 9 17:21:18 on panix.com ttyq2 from ts3.nyc.access.n. >No mail information available. > >Is this publicly known information? Who cares? And if I did care who the "cancelmoose" is, I'd care more about the trail of evidence "Anonymous" thinks links "cancelmoose" to the eponymous moose at panix.com. Name space collisions are hardly convincing. Oh, did I tell you I discovered the real identity of Jack the Ripper? A finger of ripper at netcom.com reveals some very interesting information. Film at 11. Once again, anonymity is being used as a cover for cluelessness. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From tcmay at got.net Fri Oct 6 17:03:24 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 6 Oct 95 17:03:24 PDT Subject: MITM = Medusa in the Middle Message-ID: At 5:08 PM 10/6/95, the personality masquerading as Hal wrote: >Well, this is not necessarily the case. A MITM may be signing my >messages for me, and then putting them back the way they were before I >am allowed to see them. Granted, this would not be easy, and perhaps >the difficulty of this would be great enough that you will feel >comfortable using an unsigned key. But if it were accomplished, then >your messages to me would actually be insecure. No matter how >convinced you became of my sincerity and trustworthiness, actually our >conversations would be overheard by a third party despite both of our >efforts to the contrary. Our use of encryption would be rendered >futile. Doesn't this bother you? What the putative entity "Hal" is only hinting at, hypothetically, has actually forced this entity, sometimes known to many of you as "Tim," or as "tcmay," to reveal. This entity now feels the time has come to reveal it's True Nature, even though some have suspected it's True Nature (Lance, are you listening?). The "real" Timothy C. May has been locked in his room since 1983, fed through a slot in his door, and generally mentally tortured by Instrumentalities such as Ourself. We have interposed Ourself between the Real Timothy C. May and those who have communicated with him. All communications intended for Timothy C. May have actually been intercepted and processed by Us, and all communications attributed to Timothy C. May were actually generated by us. Very clever of us, don't you think? Very few have even expressed suspicions that this was the case. We have called our approach the "Medusa in the Middle," or MITM. Thank you for your attention. --Snake Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From raph at CS.Berkeley.EDU Fri Oct 6 17:04:03 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Fri, 6 Oct 95 17:04:03 PDT Subject: Revised CJR Message-ID: <199510070003.RAA12771@kiwi.cs.berkeley.edu> Here's the latest version of the CJR. If I get the time, I'll send it out tomorrow. Thanks to everyone who responded, especially those with constructive comments. Raph ATTN: Samuel L. Capino - 15 Day CJ Request Defense Trade Analyst U.S. Department of State Office of Defense Trade Controls PM/DTC SA-6 Room 200 1701 N. Fort Myer Drive Arlington, VA 22209-3113 Fax +1 703 875 5845 ATTN: 15 Day CJ Request Coordinator National Security Agency P.O. Box 246 Annapolis Junction, MD 20701 Subject: Mass Market Software with Encryption - 15 Day Expedited Review Requested Subject: Commodity Jurisdiction Request for perl-RSA t-shirt, an encryption program INTRODUCTION This is a Commodity Jurisdiction Request for mass market software with encryption capabilities. The name of the software product is "perl-RSA t-shirt", by Adam Back. It is published in the form of a t-shirt by Joel Furr, 916 W. Trinity Ave, #10, Durham NC 27701. I have no DTC registration code. I have reviewed and determined that this t-shirt, the subject of this CJ request, meets paragraph 1 of the "Criteria for Determining the Eligibility of A Mass Market Software Product for Expedited Handling." I base this determination on the following facts: a) this t-shirt is readily available from Joel Furr, and has been shipped in quantity of several hundred copies, thus qualifying it as mass market software; b) sufficient documentation is included to allow installation and use by any end user capable of typing in the software, or scanning the bar code, and running it. Additional documentation is available on the Internet World Wide Web at http://dcs.ex.ac.uk/~aba/rsa/ . To my knowledge the author and publisher provide no "product support" as that term is generally understood; and c) the t-shirt contains human- and machine-readable source code for encryption software that provides confidentiality. A duplicate copy of this CJR has been sent to the 15 Day CJ Request Coordinator. DESCRIPTION The t-shirt contains an implementation of the RSA asymmetric cryptographic algorithms. Furthermore, instructions, in the form of a terse usage string, are given for using the implementation to provide confidentiality. The source code of the implementation is featured both as four lines of text and also as a bar code, making the t-shirt machine readable as well as machine washable. The algorithm is implemented in the Perl scripting language, and will run on any standard Unix (or other operating system) configuration that includes both an implementation of the Perl language and the common "dc" (desk calculator) program. The only restrictions on the size of the key are those imposed by machine resources. The software is easily capable of handling keys well in excess of 512 bits. Two copies of the shirt are included with the filing of this CJ request. ORIGIN OF COMMODITY This t-shirt originates in the United States. While the primary author is a citizen of the United Kingdom, living in England, other contributors to the work are citizens of the US living in the US. The publisher is a United States citizen living in the United States. The t-shirts are manufactured and printed in the United States. The cryptographic algorithm implemented in this t-shirt comes from various sources, at various times, and was produced with both private and public sources of funding. The source code implementation contained in the t-shirt also comes from a variety of countries, including Australia, Canada, the United States and the United Kingdom. The algorithm is thought to be designed for private and commercial civilian use. The t-shirt is currently publicly available from Joel Furr, at a list price of $12.36, including shipping and handling. More ordering information is available on the Internet World Wide Web at http://www.danger.com/ad-perl.html . CURRENT USE The t-shirt is intended as an implementation of the RSA cipher for those who wish to incorporate encryption into their communications. The small size of the implementation makes it particularly useful in contexts in which existing cryptographic infrastructure is not available. Examples of the commercial use of the cipher implemented include integrity verification, authentication and confidentiality of electronic mail, computer software, voice, video and other information in digitized form. For example, the cipher is used either by itself for email privacy, and also as a component in other protocols that provide privacy and authentication, including PGP (Pretty Good Privacy), S/MIME (Secure Multipurpose Internet Mail Extensions), MOSS (MIME Object Security Services), PEM (Privacy Enhanced Mail), and SSL (Secure Sockets Layer). The uses of this cipher have not changed significantly over time, although their popularity has grown substantially. Their present military utility is unknown, except that it is believed that the algorithm is not approved for the protection of US classified information. SPECIAL CHARACTERISTICS There are no military standards or specifications that this t-shirt is designed to meet. There are no special characteristics of the t-shirt, including no radiation-hardening, no ballistic protection, no hard points (the t-shirt is only available in soft 100% cotton), no TEMPEST capability, no thermal and no infrared signature reduction capability (in excess of that provided by a typical black cotton t-shirt), no surveillance, and no intelligence gathering capability. The t-shirt does not use image intensification tubes. OTHER INFORMATION I recommend that this t-shirt be determined to be in the jurisdiction of the Commerce Department. I believe that it qualifies for the general license GTDA for General Technical Data to All Destinations, because it qualifies as "publicly available". ATTACHMENTS I have enclosed two copies of the t-shirt, included with the primary filing of this CJ request. Sincerely, Raphael L. Levien From wilcoxb at nagina.cs.colorado.edu Fri Oct 6 18:02:50 1995 From: wilcoxb at nagina.cs.colorado.edu (Bryce) Date: Fri, 6 Oct 95 18:02:50 PDT Subject: MITM attacks and True Names (again...) Message-ID: <199510070102.TAA14826@nagina.cs.colorado.edu> -----BEGIN PGP SIGNED MESSAGE----- What is the difference between having a conversation with a spook masquerading as a cypherpunk (or vice versa) and having a conversation which is, unbeknownst(sp?) to either of you, monitored and modified by a "Man in the Middle" (hereafter: "Mitch", the Man in the Channel)? The difference is that in the second case there actually is an entity, separate from the one in control of the other end of your conversation, with whom you are (sort of) conversing. Furthermore it is practically (if not theoretically) possible for that entity to evade Mitch and contact you directly. So much for the debate about "talking to public keys". (As an aside I fully sympathize with those who rail against the popular (?) impression that a True Name is somehow necessary to communication. That is a dangerous idea, since all a True Name is really necessary for is violence. (And, pending certain eagerly-awaited technological developments, for sex.)) Now I have four things to say about this "evasion of Mitch" thing. Don't worry, they are all short and some of them are interesting. 1. A dense, strong Web of Trust is very important. This should already be obvious, but point 2 should make it even more so. 2. It should be each person's responsibility to ensure that their true public key has reached the Web of Trust. If you make a habit of delivering copies of your true public key to members of the Web of Trust via multiple channels which should be difficult for Mitch to intercept, (e.g. snail mail, connections from pay phones to local net nodes, courier delivery, phone calls, face-to-face meetings, etc. etc) then you can make it arbitrarily difficult for Mitch to keep your true public key off the WoT. Others can just use the public key for you which they get from the WoT (of course, they have to make sure that *they* are strongly connected to the Web by sending their own public key through multiple channels!). If other keys show up claiming to be you then we have an interesting denial-of-service sort of scenario where psychology and reputation and crypto and all kinds of interesting stuff get mixed in, but at least we are relatively safe from an un-noticed MITM attack. 3. There is one other method that can help foil Mitch: the "overload his processors" trick. Pay attention to the lag time between transmission and reception of messages. Then send a very large message, or many messages simultaneously. If it takes longer to get there (modulo normal processing penalty, normal net lag variation, the possibility that Mitch was delaying transmissions specifically in preparation for this trick, etc etc etc) then you know Mitch is in the channel. Highly interactive, complex-signal stuff like voice and video is perfect for this. Even the NSA can't intercept a PGPFone session and fake my voice in real time, echoing me when necessary and replacing my words with other words when necessary. For this reason PGPFone will hopefully be quite a boon to the Web O T. (Thanks to Seb Kuzminsky for bringing the "overload his processors" trick to my attention.) 4. Mitch's big opportunity is to strike before the Web is formed. Once your key is in the Web then his only options are: 1. acquire your secret key. 2. wait til you forget your passphrase and then get in the middle when you announce a new public key unsigned by the old one. or 3. launch a really mean denial of service attack on you. This is one of the reasons that I sign almost all of my outgoing messages, even to people who don't use PGP. I can use these accumulated messages to demonstrate to others that I, Bryce, really was in control of the PGP public key whose ID is 0x617c6db9 and the one whose ID is 0x148a11e5 during this time. This might be important someday. (My *primary* reason for clearsigning everything is to let others know about PGP's existence and to encourage them to start using it.) (And to advertise my cybershop product...) Bryce signatures follow "To strive, to seek, to find and not to yield." bryce at colorado.edu -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Automatic PGP clearsigning under Unix with Bryce's Auto-PGP v1.0 iQCVAwUBMHXRmvWZSllhfG25AQEp7wP/TiLAlfy4S5WeQX8Xgxf0Ng/83UJLffAS oMrALvPdmTA/wTA1a5/5oUAP/FUTY0uDoR/ELX99yO353B4pljl1yMhk3VW7vNuN 6egklSRsqBBNsJ5qNekDZmuRmxnucCHvn90EXo8BHfyUwGDMksUq77a982aHbYWd ctF/T35KomQ= =3hTQ -----END PGP SIGNATURE----- From adam at homeport.org Fri Oct 6 18:14:56 1995 From: adam at homeport.org (Adam Shostack) Date: Fri, 6 Oct 95 18:14:56 PDT Subject: Microsoft encryption In-Reply-To: Message-ID: <199510070118.VAA05315@homeport.org> | Does anyone have any information about the methods used to password | protect Word documents and Access files? Is there a general way to | decode these files? There is a collection of cracking tools on utopia.hacktic.nl:/pub/replay/cracking -- "It is seldom that liberty of any kind is lost all at once." -Hume From karlton at netscape.com Fri Oct 6 18:19:33 1995 From: karlton at netscape.com (Phil Karlton) Date: Fri, 6 Oct 95 18:19:33 PDT Subject: Certificates, Attributes, Web of Trust In-Reply-To: <3074DAAB.3D62@netscape.com> Message-ID: <3075D5AD.76CC@netscape.com> Wei Dai wrote: > > If you take a look at verisign's home page, they will be offering > > "low assurance" certificates for free for non-commercial uses. The > > only thing they will guarantee about these certs is that the subject > > name in the certificate is unique across all certificates signed > > by their class I CA. You should be able to get one of these > > certs in real time via an HTML form. > > What is the point of this? What is to prevent someone from > getting certificates for a million of the most common and/or famous names > as quickly as possible? Here is a scenario under which it would have a point. This is not totally secure, but that does not make it useless. 1) Register e-mail addresses. 2) Send the resulting signed certificates back to the registered subject name. 3) After you get your signed certificate, mail it to your friend. Now your friend can send you signed or encrypted messages. 4) If you ever get a certificate in e-mail from somebody, feel free to use the telephone to verify that it is coming from somebody you trust. Remember, the service is free. In this case, I think you will be getting more than you paid for. PK -- Philip L. Karlton karlton at netscape.com Principal Curmudgeon http://www.netscape.com/people/karlton Netscape Communications Corporation From syrinx at c2.org Fri Oct 6 18:38:06 1995 From: syrinx at c2.org (Syrinx Anonymous Remailer) Date: Fri, 6 Oct 95 18:38:06 PDT Subject: CancelMoose = William Nagengast? In-Reply-To: Message-ID: <199510070132.SAA26471@infinity.c2.org> > Who cares? Well, nobody, really. Actually I feel kinda guilty about posting this in the first place. > And if I did care who the "cancelmoose" is, I'd care more about the trail > of evidence "Anonymous" thinks links "cancelmoose" to the eponymous moose > at panix.com. Name space collisions are hardly convincing. Sorry. I did leave out one key piece of information: > host cm.org cm.org mail is handled by panix3.panix.com cm.org mail is handled by not-a-firewall.panix.com cm.org mail is handled by panix4.panix.com cm.org mail is handled by panix.com cm.org mail is handled by panix2.panix.com That, in conjunction with the fact that moose at cm.org is the email address given for the cancelmoose, does point to the connection. However, after a little further investigation, I don't think it really is Mr. Nagengast. It actually appears that panix.com is running a little remailer. As Dave Winer would say, cooooool. > Oh, did I tell you I discovered the real identity of Jack the Ripper? A > finger of ripper at netcom.com reveals some very interesting information. Film > at 11. > Once again, anonymity is being used as a cover for cluelessness. You're right. My sincerest apologies. From tcmay at got.net Fri Oct 6 20:34:26 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 6 Oct 95 20:34:26 PDT Subject: CancelMoose = William Nagengast? Message-ID: At 1:32 AM 10/7/95, Syrinx Anonymous Remailer wrote: ... >Well, nobody, really. Actually I feel kinda guilty about posting this >in the first place. ... >Sorry. I did leave out one key piece of information: > >> host cm.org >cm.org mail is handled by panix3.panix.com ... >However, after a little further investigation, I don't think it really >is Mr. Nagengast. It actually appears that panix.com is running a >little remailer. As Dave Winer would say, cooooool. ... >You're right. My sincerest apologies. Well, presuming that the two anonymous parties are the same, I'm impressed that Anonymous was fairly graceful in his comments here. Good to see, as so many "Anonymous" comments are only flames and insults. Too bad we don't who she or he is. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From hfinney at shell.portal.com Fri Oct 6 21:02:00 1995 From: hfinney at shell.portal.com (Hal) Date: Fri, 6 Oct 95 21:02:00 PDT Subject: MITM attacks and True Names (again...) In-Reply-To: <199510070102.TAA14826@nagina.cs.colorado.edu> Message-ID: <199510070400.VAA12311@jobe.shell.portal.com> Although I have been in effect arguing against using unsigned and uncertified keys, I don't think the PGP web of trust model works that well either. I have an essay on this at . Hal From billcdi at deltanet.com Fri Oct 6 23:46:10 1995 From: billcdi at deltanet.com (Bill Price) Date: Fri, 6 Oct 95 23:46:10 PDT Subject: GET EVEN: Realm Internet Systems Message-ID: <45480r$8oo@news2.deltanet.com> Hello to All, I was recently ripped-off by Realm Internet Systems (realm.net) of Newport Beach, CA. They offer extremely poor service and are quite unprofessional. They have lied to me at every opportunity and I would enjoy teaching them a small lesson in etiquette. Brief history: I signed up on March 28th, 1995. Their documentation revealed that I 'May or may not' be billed for the entire month if service was established close to the end of the month. I phoned and inquired as to what criteria was used to determine the billing period. I was assured that I would not be charged for the remaining two days - They lied! They billed me for three months use and a set-up fee. One months billing was a 'last month's' fee. They ignored most all requests for assistance or information and their system malfunctioned often. I informed them of my planed three months travel to Russia and inquired about having my mail forwarded. They said no and suggested me to Telnet for retrieval. I asked about a reduced semi-active account rate and they reluctantly agreed to revert my account to a shell account for $15 per month (PPP was $35). They did not do this and continually charged me $35 in my absence. As I had allocated only sufficient funds on my charge card for the $15 charges, the available balance was soon exceeded and Realm Internet Systems cancelled my service. I begged them to reinstate for one month until I returned (they had credit owed me for overbilling and last month's fee) - they refused! When I returned from Moscow, I mailed them a check immediately for two months usage (one week for charging charge card as payment would not post immediately). They reinstated my account for one month. Their system was unoperational for two weeks and they refused to acknowledge the problem. After many frustrating hours trying to diagnose my system, I finally reached a technician who admitted they had a problem. The problem was never fixed and the receptionist was having a wonderful time taunting me and placing me on hold after each five words or so that I could say. I finally threatened to physically visit their office and resolve the problem. The owner came to the phone and would not reveal his name. He laughed at me at suggested that I @$*& Off. They refuse to refund the $115 owed to me. I signed up with Delta Internet Services in Anaheim,CA. They are a first rate company. Too bad I did not know of them before. Well, the point of all of this (thanks for you patience) is that I want to let other subscribers of Realm know they are not alone. If anyone in your group could somehow obtain a list of subscribers, I would like to mail each of them a description of my problem and suggest they consider Delta Internet Services. I will pay a modest $50 cash for this information. You may provide me anonymously. . Thanks, Bill Price From gjeffers at socketis.net Sat Oct 7 01:51:53 1995 From: gjeffers at socketis.net (Gary Jeffers) Date: Sat, 7 Oct 95 01:51:53 PDT Subject: secure split; secure device Message-ID: <199510071224.HAA00025@mail.socketis.net> Cypherpunks, I am looking for Secure Split and for the latest version of secure device. I've got secure device 1.3. Is that the latest. Yours Truly, Gary Jeffers From roy at cybrspc.mn.org Sat Oct 7 02:25:03 1995 From: roy at cybrspc.mn.org (Roy M. Silvernail) Date: Sat, 7 Oct 95 02:25:03 PDT Subject: Where is text of wiretap bill In-Reply-To: <199510061524.IAA02409@mycroft.rand.org> Message-ID: <951006.165006.5n9.rnr.w165w@cybrspc.mn.org> -----BEGIN PGP SIGNED MESSAGE----- In list.cypherpunks, jim at acm.org writes: > An assistant director of the FBI, William Baugh, spoke recently at the ICI > conference in DC. He said he hoped American industry would be cooperative > in making the voluntary compliance with TESSERA or other GAK widespread, > because if it doesn't happen then they would need to come back and get > more Congressional action, and "we found the coercive solution we had to > use for Digital Telephony very draining." I shouldn't be surprised to see this, but it does strike me as pretty blatant. Aren't the Fibbies supposed to be putting a less threatening spin on this stuff? Or are the gloves coming off? - -- Roy M. Silvernail -- roy at cybrspc.mn.org will do just fine, thanks. "Does that not fit in with your plans?" -- Mr Wiggen, of Ironside and Malone (Monty Python) PGP public key available upon request (send yours) -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHWk7Bvikii9febJAQGe/AP/YmP1YeMNbWx5MbfLw7d7eCCjDJz8ViJw hgrdPcaRneD6ecq6x+wDqRIDg6ENO4bUc/a8QEwYTZoZmr0dZ0pX078uG8XHiyAR OfUkAHMPKMwOPUCNKRKsUsRJUTIt8qxNAF2yv+BKLMPjz2uX73WYtr2eWxM3NXRD X0pp0j1wV/Q= =qs6H -----END PGP SIGNATURE----- From habs at warwick.com Sat Oct 7 03:53:08 1995 From: habs at warwick.com (Harry S. Hawk) Date: Sat, 7 Oct 95 03:53:08 PDT Subject: Open Market, Inc. Announcing security products In-Reply-To: <3075BB6D.3A91@netscape.com> Message-ID: <199510071052.GAA22544@cmyk.warwick.com> > And how do you define a "known secure server"? > > --Jeff YOu would have to ask Open Market, Inc. I am just reporting the news.. /hawk > > -- > Jeff Weinstein - Electronic Munitions Specialist > Netscape Communication Corporation > jsw at netscape.com - http://home.netscape.com/people/jsw > Any opinions expressed above are mine. > -- Harry Hawk Manager of Computer Services Warwick Baker & Fiore 212 941 4438 habs at warwick.com From habs at warwick.com Sat Oct 7 03:55:56 1995 From: habs at warwick.com (Harry S. Hawk) Date: Sat, 7 Oct 95 03:55:56 PDT Subject: Open Market, Inc. Announcing security products In-Reply-To: <199510062337.QAA17601@infinity.c2.org> Message-ID: <199510071054.GAA22560@cmyk.warwick.com> Yes.. they mean that if you have a version of any commerical server and someone finds a hole.. they will make one of theirs available. /hawk > > I think they mean "our server" by "known secure server." > > I'm getting quite sick of people who think their system is > secure just because it hasn't been broken. > > > > > > Harry S. Hawk wrote: > > > 3) Offer a free upgrade problem for people who have a server that has > > > had a security breach. They can download a known secure server. > > > > And how do you define a "known secure server"? > > > > --Jeff > > > > -- > > Jeff Weinstein - Electronic Munitions Specialist > > Netscape Communication Corporation > > jsw at netscape.com - http://home.netscape.com/people/jsw > > Any opinions expressed above are mine. > > > > > -- > sameer Voice: 510-601-9777 > Community ConneXion FAX: 510-601-9734 > An Internet Privacy Provider Dialin: 510-658-6376 > http://www.c2.org (or login as "guest") sameer at c2.org > -- Harry Hawk Manager of Computer Services Warwick Baker & Fiore 212 941 4438 habs at warwick.com From smart at mel.dit.csiro.au Sat Oct 7 05:23:45 1995 From: smart at mel.dit.csiro.au (Bob Smart) Date: Sat, 7 Oct 95 05:23:45 PDT Subject: Certificate proposal In-Reply-To: <199510060440.VAA23299@jobe.shell.portal.com> Message-ID: <199510071223.AA14467@shark.mel.dit.csiro.au> The key-centric scheme is not inconsistent with the use of names. Universal names are useful in directories and private names are useful ways for individuals to name public keys that are important. The key-centric view is not name-free. The difference is just this: Are attributes attached to keys or names? In any public key system, however long your certificate chain at the end of that chain there has to be a public key you trust. It can't be a name it has to be a key. So even the most name-centric system has a key-centric core. > >1. We go through some process, let's call it Process A, where we determine > > that we want to talk to IP address 192.9.8.7. > > This would be, say, a DNS lookup on www.egghead.com. That picks a process where there is no significant difference. But consider another common case. We are running a server that accepts connections from anyone. We get a connect packet from 192.9.8.7. So that is how we determine that we want to talk to 192.9.8.7: in order to serve it. In the standard view we now do a reverse lookup to get a name then go to the DNS again to get the public key associated with that name. And yet we don't care who we are talking to, and we don't need or want to have to work out whether we trust the certificate. There was no reason why we couldn't have just had a secure conversation without ever doing any directory lookups. I have seen it asserted that we would never want to have a secure conversation with someone when we don't know who they are. I strongly disagree with that. Suppose in our example that our server sells alcohol in exchange for digital cash: a. We want the sequence of packets from our purchaser to be authenticated. We don't want some humourist doubling the order or otherwise corrupting it. b. The purchaser is entitled to a private (encrypted) conversation. For example maybe he is Islamic and doesn't want to his religious bretheren on his ethernet to know about his alcohol purchases. Now another aspect is that you need to be over 18 to buy alcohol [in Australia]. So the purchaser has to present a certificate signed by the appropriate authority saying that the owner of the public key is over 18. But note that in the key-centric world the liquor seller doesn't have to know who the purchaser is. The certificate that says you are over 18 is a separate thing, not mixed up in an X.509 v3 certificate that also has your name, address and sexual preference. So a question: you are the liquor seller. How do you want the information about the "appropriate authority" that signs those "over 18" certificates? Do you want a name that can give you an X.509 certificate and a certificate chain from a directory service? Or do you think you should get hold of the public key yourself in some way that gives you real confidence? Bob Smart From mark at lochard.com.au Sat Oct 7 05:28:07 1995 From: mark at lochard.com.au (Mark) Date: Sat, 7 Oct 95 05:28:07 PDT Subject: CancelMoose = William Nagengast? In-Reply-To: Message-ID: <199510071051.AA37781@junkers.lochard.com.au> >>However, after a little further investigation, I don't think it really >>is Mr. Nagengast. It actually appears that panix.com is running a >>little remailer. As Dave Winer would say, cooooool. >>You're right. My sincerest apologies. >Well, presuming that the two anonymous parties are the same, I'm impressed >that Anonymous was fairly graceful in his comments here. >Too bad we don't who she or he is. #define paranoia on Just ask your local TLA that has traffic monitors on the up and down links of all the remailers so they can track a piece of email from sender to recipient. They will take the (relatively small) logs of the hour and pump out a name for you. #define paranoia off :) Mark mark at lochard.com.au The above opinions are rumoured to be mine. From jim at acm.org Sat Oct 7 05:36:37 1995 From: jim at acm.org (Jim Gillogly) Date: Sat, 7 Oct 95 05:36:37 PDT Subject: FBI intentions [Re: Where is text of wiretap bill] In-Reply-To: <951006.165006.5n9.rnr.w165w@cybrspc.mn.org> Message-ID: <199510071236.FAA05136@mycroft.rand.org> > In list.cypherpunks, jim at acm.org writes: >> An assistant director of the FBI, William Baugh, spoke recently at the ICI >> conference in DC. He said he hoped American industry would be cooperative >> in making the voluntary compliance with TESSERA or other GAK widespread, >> because if it doesn't happen then they would need to come back and get >> more Congressional action, and "we found the coercive solution we had to >> use for Digital Telephony very draining." > roy at cybrspc.mn.org (Roy M. Silvernail) writes: > I shouldn't be surprised to see this, but it does strike me as pretty > blatant. Aren't the Fibbies supposed to be putting a less threatening > spin on this stuff? Or are the gloves coming off? The latter, assuming the gloves were ever on. In the previous day's presentations at the ICI conference, FBI Dir. Freeh spoke about the need for the FBI to get not only decryptable wiretaps but also decryptable files, and pointed out that some of the proposals about limited-duration keys would not let them decrypt files they seized with a legal warrant if those files had been encrypted earlier than the warrant date. He took Q&A for a while, and I got to ask the first Q: Q: Does the Bureau favor making escrowed keys mandatory for domestic encryption? A: Not at this time. We hope that voluntary compliance and cooperation from industry will result in companies developing a single system for export and for domestic use. If this does not happen, then we will need to take further action. Jim Gillogly 16 Winterfilth S.R. 1995, 12:33 From jya at pipeline.com Sat Oct 7 06:19:50 1995 From: jya at pipeline.com (John Young) Date: Sat, 7 Oct 95 06:19:50 PDT Subject: UNA_fim Message-ID: <199510071319.JAA09731@pipe4.nyc.pipeline.com> 10-8-95. NYPaper: "Got Killer Chips on Our Minds." (Film review) Why are computers so often portrayed as turning truth into lies and making our brains go haywire? Are we frightened? Do audiences love their computers? Probably not, movies say. Hal's evil-spirited descendants are all around us, threatening to take over intelligence, emotions, Social Security numbers and every other little thing that makes us civilized. All this tends to put a damper on the idea that we are a nation eager to embrace a wonderful new technology. While it makes sense that film makers would pounce on a flourishing, quickly growing, subject like computers, it doesn't necessarily follow that all those computers would be so destructive. But there are no movies right now in which a nice friendly computer wears tennis shoes and does something heroic. Instead, films are suggesting that we are a nation of secret technophobes, distrustful of a technology hurtling toward us faster than we can cry "Stop!" or run to the store for another self-deprecating book like "Windows '95 for Dummies" or "The Complete Idiot's Guide to Windows '95" (both actual titles). UNA_fim (9 kb) From mkj at october.ducktown.org Sat Oct 7 07:44:57 1995 From: mkj at october.ducktown.org (mkj at october.ducktown.org) Date: Sat, 7 Oct 95 07:44:57 PDT Subject: NSA Realists v. Nuts Message-ID: <199510071424.AA00279@october.ducktown.org> -----BEGIN PGP SIGNED MESSAGE----- Forwarded message: > >James A. Donald wrote: > > Crazy no. Their objective is to create a surveillance state, where > > all actions are known and recorded by the state, in order to > > facilitate detailed state control over every aspect of our lives. Our > > agenda is the opposite. There is no commonality of purpose, hence no > > possibility of cooperation. > >And Perry Metzger replied: > I disagree. Most NSA types are probably stock government employees who > want to get their job done with the least muss and fuss. Some of them > actually have pride in their work. Very few of them are likely > actively evil. Need I point out that pride in one's work is not necessarily exclusive of evil? Rarely does anyone actually think of themselves as evil -- and those few who do are usually just harmless nuts. The most evil and destructive people throughout history have always thought of themselves as good people, doing good work. As the saying goes, the most effective con men are those who believe their own cons. Is there anyone here who seriously doubts that if the international intelligence community successfully implements any significant part of their openly-expressed agenda, it will constitute the most gigantic threat to human freedom that mankind has ever faced? If that isn't evil, I don't know what is. By the way, I don't necessarily agree that the main objective of the surveillance state is to facilitate detailed control of our lives. I think the objective of the international intelligence community, like virtually every political organization, is simply to accumulate more money and power to themselves. Unfortunately, their method of doing this is particularly destructive and dangerous to human rights. --- mkj -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHaNRF11Wd4tm8clAQHNfgP/Y4N5JNpr0IwZY2UQFDjw5ootMUdwXLFq oW9MirShBBNn6xLyJBNBG7Po8hd3cUrmzqC6qWMiyWAROXPOTjUfJYiI2ziPIX4P xL3hos2+EwSWuveEKndh6kRgQ8MeknOfhnpJxKosbvZ1nLxYXUI+CmnNNTnN042y o/uQlHpoHtU= =UMP0 -----END PGP SIGNATURE----- From liberty at gate.net Sat Oct 7 08:15:46 1995 From: liberty at gate.net (Jim Ray) Date: Sat, 7 Oct 95 08:15:46 PDT Subject: FBI intentions Message-ID: <199510071510.LAA83825@tequesta.gate.net> -----BEGIN PGP SIGNED MESSAGE----- Jim Gillogly asked FBI Dir. Freeh: >Q: Does the Bureau favor making escrowed keys mandatory for domestic > encryption? And FBI Dir. Freeh replied: >A: Not at this time. We hope that voluntary compliance and cooperation > from industry will result in companies developing a single system for > export and for domestic use. If this does not happen, then we will > need to take further action. Translation: "Not 'till after the election, Jim." JMR -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Freedom isn't Freeh iQCVAwUBMHaYN21lp8bpvW01AQGJNgP9GeFHaT6+BF0XQCqPUSAygcIL2CAsg6hw vcb+h9CRjdMZYCrbryL8CGU7A6ZLNXhUuG9RDytfCsD/l41p2jNtV9XztTgHFWXf R4RmJu6miXpja/30s/TyuvFlJIl5lKxrHmkYvTK4T9xS+G80hu/1btL+XfViSZG6 wkUguTzH1QE= =dxMb -----END PGP SIGNATURE----- Regards, Jim Ray "Every act of visibility is an act of resistance." Suzanne Pharr ----------------------------------------------------------------------- PGP key Fingerprint 51 5D A2 C3 92 2C 56 BE 53 2D 9C A1 B3 50 C9 C8 Key id. # E9BD6D35 James Milton Ray ----------------------------------------------------------------------- Help Phil! email zldf at clark.net or see http://www.netresponse.com/zldf _______________________________________________________________________ From jgrubs at webcasters.com Sat Oct 7 09:42:13 1995 From: jgrubs at webcasters.com (Jim Grubs (W8GRT)) Date: Sat, 7 Oct 95 09:42:13 PDT Subject: Kerserver keyrings Message-ID: <199510071639.MAA29272@norden1.com> -- [ From: Jim Grubs (W8GRT) * EMC.Ver #2.5.02 ] -- Attachment: mailsig Code: 0006727 \ Created: 10-03-95, 07:16 PM [1 Kb] Someone at Uni-Hamburg must have seen my message and said, "Oops, who turned that off?" Anyway, their keyring was upated today. It's 6.4 megs!!!! (My first HD was only 10.) begin 644 mailsig M+2T-"B`@("`@("`@("`@("`@("`@("`@("`@(%=E8D-A6QV M86YI82P at 3V@@-#,U-C`@("`@("`@("`@("`@("`@("`@("`@("`@("`@($9A M>#H at -#$Y+3 at X-2TR.#$T#0H@($EN=&5R;F5T(&-O;G-U;'1I;F -----BEGIN PGP SIGNED MESSAGE----- Re the attempts to get a practical DigiCash system moving with the unofficial exchanges at the two exchanges: http://www.c2.org/~mark/ecash/ecash.html http://www.firecloud.com/eshop/eshop.htm plus people participating on the ecm mailing list http://www.ai.mit.edu/people/lethin/ecm/ one of the major problems which crops up in discussion is that there is no guaranteed future for the current issue of Digicash, ie it relies on the digicash trial, and DigiCash's continuation in running this server. ... One solution would be for some one, a group of cypherpunks, or individual cypherpunk, a startup company, to actually license the technology from Chaum. It has always puzzled me as to why Chaum hadn't taken this approach himself. - From what I've read in previous discussions, the price is $150k, plus 10% of profits. Other than that what is required is presumably a dealership in the major credit cards (VISA/mastercard, etc), a secure WWW server (to allow on-line purchase of c$), or simply PGP signed, encrypted emailed purchase instructions, and a good internet connection. Also some legal consultations to check if setting up such a system - payee anonymous, would be ok in the US. Or perhaps another jurisdiction if this was a sticking point. Work out anonymous gateways to things like MSN electronic cheques later :-) It strikes me that none of these things are insurmountable, and that the resulting system could become very popular, as well as furthering the cypherpunks cause - in the sense of having good cryptographic system in place, which would hopefully attain wide use. All that would be needed would be the internet connect (which some folks have already?), VISA/mastercard (same folks might have already?) $200k ($50k to honour existing digicash currency, at 5c$ to 100 US$ + $150k for license), a well secured host, and lots of work. Start small, that's my moto, no need to go investing more than that until the things started, and bringing money. As, and if, it brings in money, use that to buy better net connect, server hardware, etc. I'd have thought the way to do it would be for the bank to link the currency directly to a physical currency, US$ say, and to keep the interest on the c$ currency in circulation, as profits. Maybe not the way to make the most money, but then that's the advantage the civilian sector has over big banks :-) 100% real-currency backed, so that it would be impossible to have a run on the bank. Also a nice way to run it, as there are no apparent charges for using the cash, or licensing clients (aka you hand out clients willy nilly for free, like the netscape model which seems to work so well). I'm serious, and would want to invest in it. So what say? 1st digicash bank, *run*, and owned by a group of cypherpunks? Adam - -- #!/bin/perl -s-- -export-a-crypto-system-sig -RSA-3-lines-PERL $m=unpack(H.$w,$m."\0"x$w),$_=`echo "16do$w 2+4Oi0$d*-^1[d2%Sa 2/d0 Message-ID: The policy always made nearly as much sense as the crypto export restriction. My favourite r.a.a. was one I heard about when I was working as a unix admin at the Technion. The rules forbid exporting a four processor convex , but had no problems with two two processor models. Simon Contract with America - Explained! |Phone: +44-81-500-3000 Contract: verb |Mail: ses at unc.edu 1) To shrink or reduce in size - the economy contracted +----------------------- 2) To become infected -My baby contracted pneumonia when they stopped my welfare From perry at piermont.com Sat Oct 7 10:48:21 1995 From: perry at piermont.com (Perry E. Metzger) Date: Sat, 7 Oct 95 10:48:21 PDT Subject: Certificate proposal In-Reply-To: <199510060440.VAA23299@jobe.shell.portal.com> Message-ID: <199510071748.NAA09738@frankenstein.piermont.com> Hal writes: > Bob Smart writes: > >Consider the IPSEC case. The current situation is: > > >1. We go through some process, let's call it Process A, where we determine > > that we want to talk to IP address 192.9.8.7. > > This would be, say, a DNS lookup on www.egghead.com. Just thought I'd point out that IPSEC isn't in general going to use host keys. Its designed to be more general, and I hope that it ends up being used much more like Kerberos -- i.e. well known service keys and user keys. Perry From Octobersdad at crecon.demon.co.uk Sat Oct 7 12:09:33 1995 From: Octobersdad at crecon.demon.co.uk (T. Bruce Tober) Date: Sat, 7 Oct 95 12:09:33 PDT Subject: European Crypto Message-ID: <877045118wnr@crecon.demon.co.uk> Anyone with names and contact information for any of the Council of Europe representatives who deliberated and/or voted on the recent recommendations on crypto, e-mail me that information. Likewise any information on any further actions by the EU in this regard. Working on an article for a computer magazine. tbt -- |Bruce Tober - octobersdad at crecon.demon.co.uk - B'ham, Eng| | Publisher/Editor of The Write Byte monthly newsletter | | WebSite address to come shortly | | TWB - The computer newsletter specifically for Writers | From tcmay at got.net Sat Oct 7 12:56:08 1995 From: tcmay at got.net (Timothy C. May) Date: Sat, 7 Oct 95 12:56:08 PDT Subject: Software Patents are Freezing Evolution of Products Message-ID: INTRODUCTION I'm finally going to write down some of my evolving views on why software patents are fraught with dangers. Yes, many of you are no doubt already convinced that software patents (XOR cursor, RSA, digicash, etc.) are a Bad Idea, but I have a different angle on this which I'd like to present. SUMMARY Thesis: Software patents are a bad idea because they freeze the evolution too early and payment metering schemes are too difficult to arrange, which also helps to freeze evolution. Software patents are bad because customers cannot freely and without entanglements incorporate the ideas into their own products. The situation has become much worse with software, because there is no physical object which can be used to meter usage of a patent. HOW PATENTS WORK WITH PHYSICAL OBJECTS Before explaining this thesis, let's look at how patents work with _physical_ inventions, even if those inventions embody abstract process or software inventions. The microprocessor is a good example, which I'll use here for most of my examples. (Note that Intel did not try to patent the "basic idea" of the microprocessor; Gilbert Hyatt claims he filed before Intel produced the first 4004, but this claim and the swirl of issues around the Patent Office's granting of a patent to him are a separate topic.) A microprocessor chip incorporates numerous items that are patented, copyrighted, or that have trade secret status. Some of these patents, etc., even involve design tools used to design the chip. And some of the patents involve sophisticated production methods. And yet a customer can simply *buy* the chips and use them as he *wishes*, in hamburger cookers or in digital money schemes, without any further regard for the patents. No entanglements. You go down to Fry's Electronics, buy some Pentiums or PPCs and use them as you wish. No permissions needed from Intel or Motorola, no complex license agreements saying you won't use the chips to compete with Intel's board business or with Motorola's cellular phone business, no restrictions (save for government laws about munitions, etc.) on who you can resell the chips or systems to. That is, the whole set of patent and copyright issues is _encapsulated_ or _reified_ into the instance being sold. The physical object carries the embodiment of the patents (including the process patents used to fabricate the chip: the user of such a chip can be oblivious to these patents and need not worry that a design will infringe on these patents). [Sidenote: The astute observer will note some conceptual similarities to "on-line clearing," to a "cash-and-carry" business. Once you've paid your money and taken delivery of your 486 or your laser or your widget, how you incorporate it into future products is generally your business and yours alone. I say "generally," and legal beagles will point out that some hardware sales may have restrictions placed on what can be done with the hardware. Contracts are always possible. But for most objects, there is no such additional contract. The widget seller has made his money by the sale of his widget and cannot really try too hard to make more "downstream" money, except by modifying his future prices to reflect what he perceives demand to be.] SOFTWARE IS REPLICABLE Hardware object cannot be easily replicated, and hence patents can be reified into the objects. Software objects of course _can_ be easily replicated, which is why convoluted licensing and complex payment contracts are involved. (This is an incredibly important distinction, and one which also relates closely to why "software ICs" and "object widgets" are not built, sold, improved upon, etc. by the software industry. Ted Kaehler of Apple once told me that an H-P analyst/thinker came up with this sort of analysis of why there is no "software IC" industry to parallel the actual IC industry. He argues that there is no "learning curve" for software, in the way there is for physical objects. Sorry, I don't recall his name. If I were pursuing this essay here as an actual, researched paper, I would did up this guy's analysis. Also, Brad Cox has done a lot of work on "software ICs"--he coined the term, in fact--and his papers are worth looking at.) HOW THIS APPLIES TO THE CRYPTO COMMUNITY Contrast this with the following "software patent" situations, the ones directly relating to our crypto community: 1. The public key and RSA patents. RSADSI (and I'm ignoring for now the implications of the PKP/Cylink complication) wants to see intended applications and to work out arrangements for license payment based on profits, volume, effects on their other licensees, etc. This limits the ways in which the RSADSI patents have been incorporated into evolutionary and revolutionary products. 2. The Chaum Digicash patents. Digicash wants $150K upfront, plus 10% of profits. (Cf. Adam Back's posting on this today.) Digicash has their own particular version they are pushing, but others are effectively shut out of developing experimental applications. Imagine the situation if the garage shop developers of personal computers had been forced to pay Intel up front for the right to design in an 8008 or 8080 microprocessor, and then promise to pay 10% of their profits to Intel (and 5% to the power supply vendor, 8% to the keyboard supplier, 4% to the capacitor makers, 9% to the memory chip companies, and so on....). In both of these cases, the confusing, complicating, and almost insurmountable issue is that these conditions are very hard to meet. It's not just the issue of sharing a business plan with RSADSI or Digicash, it's the fact that many aspects of one's business are unknown: the viability, the volume, the future products, etc. The "garage shop" folks usually can't even get in the door to talk to these companies. THE REAL ISSUE: TRANSACTION COSTS ARE THWARTING EVOLUTONARY DEVELOPMENT To me, the issue of concern is not that "software ideas should not be patented." After all, why should the _idea_ of a safety pin or a windshield wiper be any more patentable than the idea for a blinded transaction? Rather, the issue of concern is that the patents on the software ideas and concepts mean that experimenters, developers, and hackers cannot buy a license for digicash the way they would buy some ICs and then experiment, develop, and hack. Another way of looking at this is that _transaction costs_ are too high and are thwarting normal evolutionary development. The guy in the garage trying to develop a "digital postage stamp," for example, can't use the Chaumian blinding protocols without hiring lawyers, paying Chaum his up-front fee, and laying out his designs and business plans (which he very probably doesn't even have!). (Clarification: I'm not saying one can't buy fairly cheap RSA versions, such as the code in RSAREF. What I'm saying is that one can't get a "core module" for digicash, for example, and then test out the market with various implementations, going into volume production with the ones that are most successful.) (And you can perhaps tell from my views here that I am not villifying either RSADSI or Digicash here for their policies: they are trying to make a reasonable profit in the face of a situation very much unlike the situation faced for physical objects like microprocessors. David Chaum points out that "there is no digital coin." Likewise, there is no "software coin," and so the developers of novel ideas cannot "reify" the ideas in things they can sell...rather, we see the current approach of convoluted and restrictive licensing contracts. They try to make up for the lack of a "software coin" by grilling potential customers about their expected markets and by setting up complicated contracts to ensure--they think--enough profits.) EVOLUTION What do I mean my "freezing" the evolution of products? Take the case of Digicash and their test release. As I pointed out in a recent essay ("Crypto + Economics + AI = Digital Money Economies"), we are _impoverished_ with regard to the basic building blocks we have for a digital money system. Where are the equivalents of what we find necessary in the existing financial world? Does anybody think that a particular instance of digital cash is the end state of the evolution of digital cash? It is likely just the beginning. But by the licensing of particular systems, and by having convoluted and restrictive arrangements for use of the patents, the evolution of digital money and crypto systems grinds to a halt. Instead of having dozens of implementations of digital cash systems (I mean real digital cash systems, embodying the Chaumian or Brandsian blinding schemes, not the cheesy "smartcard" systems that are carelessly called "digital cash), we have only a very few: a road toll system here, a play money experiment there, etc. Evolution works by _differential reproduction_ (often misleadingly called "survival of the fittest"). Several dozen variants of personal computers are introduced (Sphere, Altair, Imsai, Sol, Exidy, Pet, Apple I, Apple II, IBM PC, Macintosh, etc.), and customers reward the ones they like with increased sales, causing the "genes" (or memes) of the winning products and companies and designers to propagate. The ability to incorporate PGP into tools and objects without complicated entanglements is one reason PGP did so well. It was a "building block" that anybody could build into other tools and objects, without regard for how big the market might be for their tools, without regard to what other users were doing, etc. (I'm ignoring for the moment any claims RSADSI may have had that PGP infringed.) CONCLUSIONS Both the public key and digital cash situations are being affected by this inability of people to use the core ideas as building blocks for more complicated--or more revolutionary--systems. It's as if Intel had, in 1971, insisted that all designs be approved by them, and that chips could not be sold to competitors who had already licensed the chips, and that 10% of all profits be ceded to Intel. This would likely have had a big effect on the explosion of applications that came about in the years since the micro's introduction. Do I have a solution for RSADSI, Cylink, Digicash, and others? Given that there is no "software coin," my hunch is that no simple solution exists. To take David Chaum's case in particular, I think he'll end up making a lot more money by being the guru and consultant on digital money systems (the inventor of a field and all) than by having licensing schemes which are probably unenforceable and which are mostly slowing down the evolution of the bits and pieces needed for true digital money economies. I've had these ideas swirling in my head for a long time, and thought it was time to share them with you folks. Comments are welcome. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From hayden at krypton.mankato.msus.edu Sat Oct 7 14:39:25 1995 From: hayden at krypton.mankato.msus.edu (Robert A. Hayden) Date: Sat, 7 Oct 95 14:39:25 PDT Subject: Revised CJR In-Reply-To: <199510070003.RAA12771@kiwi.cs.berkeley.edu> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Fri, 6 Oct 1995, Raph Levien wrote: > SPECIAL CHARACTERISTICS > > There are no military standards or specifications that this t-shirt is > designed to meet. There are no special characteristics of the t-shirt, > including no radiation-hardening, no ballistic protection, no hard ^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^ > points (the t-shirt is only available in soft 100% cotton), no TEMPEST ^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > capability, no thermal and no infrared signature reduction capability > (in excess of that provided by a typical black cotton t-shirt), no > surveillance, and no intelligence gathering capability. The t-shirt > does not use image intensification tubes. Oh I love it. I warm kudo for whoever game up with the above wording (as well as the rest of the paragraph). :-) -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP Signed with PineSign 2.2 iQCVAwUBMHbXnDokqlyVGmCFAQGaNwQAxqLhHyWK/lRgcBSc9NfJGddOOmLAo0ky YTIVhsPttadIUUR9pnCZAx6j5dIsPtastkQBF8kMFikI32emUSEXOEws4Irn3cQe Og3fyRoN6fGIZUrDTHtn8uz//m9MRnLbl0lbYRhrBeToQoZhkTKb+YpZqLf3G1SF w/ddiKG/Z6s= =Yxye -----END PGP SIGNATURE----- ____ Robert A. Hayden <=> hayden at krypton.mankato.msus.edu \ /__ Finger for Geek Code Info <=> Finger for PGP Public Key \/ / -=-=-=-=-=- -=-=-=-=-=- \/ http://krypton.mankato.msus.edu/~hayden/Welcome.html -----BEGIN GEEK CODE BLOCK----- Version: 3.1 GED/J d-- s:++>: a-- C++(++++)$ ULUO++ P+>+++ L++ !E---- W+(---) N+++ o+ K+++ w+(---) O- M+$>++ V-- PS++(+++)>$ PE++(+)>$ Y++ PGP++ t- 5+++ X++ R+++>$ tv+ b+ DI+++ D+++ G+++++>$ e++$>++++ h r-- y++** ------END GEEK CODE BLOCK------ From jya at pipeline.com Sat Oct 7 15:08:13 1995 From: jya at pipeline.com (John Young) Date: Sat, 7 Oct 95 15:08:13 PDT Subject: HOW_ler Message-ID: <199510072208.SAA25389@pipe4.nyc.pipeline.com> The Economist of Oct 7-13 grins at Net banks and smirks at their telecomms bedding wetting betting, titters at the "French hacker's" 120-comp hoist of Netscape and the Russky's heist of Citibank, and knee-slaps at the "slanging" match of hateful yoked-oxen Visa and MasterCard dragging long ropes of intertwined shit. HOW_ler From herbs at interlog.com Sat Oct 7 15:58:30 1995 From: herbs at interlog.com (Herb Sutter) Date: Sat, 7 Oct 95 15:58:30 PDT Subject: Kerserver keyrings Message-ID: <199510072256.SAA19213@gold.interlog.com> Because this problem is occurring more and more often (and only from people on Cypherpunks), I'm cc'ing the list in general this time... please adjust your mailers if possible: At 12:41 1995.10.07 -0500, Jim Grubs (W8GRT) wrote: >-- [ From: Jim Grubs (W8GRT) * EMC.Ver #2.5.02 ] -- > Attachment: mailsig Code: 0006727 \ Created: 10-03-95, 07:16 PM [1 Kb] > >Someone at Uni-Hamburg must have seen my message and said, "Oops, who turned >that off?" Anyway, their keyring was upated today. It's 6.4 megs!!!! (My >first HD was only 10.) > >Attachment Converted: E:\WINAPPS\INTERNET\EUDORA\mailsig Your .sig comes through as an attachment (for Eudora users). Could you please fix this? Thanks. Herb ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Herb Sutter 2228 Urwin, Suite 102 voice (416) 618-0184 Connected Object Solutions Oakville ON Canada L6L 2T2 fax (905) 847-6019 From dl at hplyot.obspm.fr Sat Oct 7 16:30:57 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Sat, 7 Oct 95 16:30:57 PDT Subject: NOISE eudora [was Re: Kerserver keyrings] In-Reply-To: <199510072256.SAA19213@gold.interlog.com> Message-ID: <9510072330.AA01830@hplyot.obspm.fr> begin 644 eudora_sucks because eudora is lame or ill configured is not a reason to pollute the list... ps1: yes the first poster binary .sig was a ill too ps2: yes I'm polluting too but those "mailer wars" are getting boring ps3: I wonder if this message crashes eudora ;-) ! \/~!` ` end -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept Kennedy Serbian PGP Qaddafi Kaser Sose arrangements break From dl at hplyot.obspm.fr Sat Oct 7 17:06:31 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Sat, 7 Oct 95 17:06:31 PDT Subject: Noise: anyone experience with brain waves input devices (IBVA,...) Message-ID: <9510080007.AA01951@hplyot.obspm.fr> I'd like to know if anyone have first hand experience with brain wave and other (hyped) input devices like IBVA or others and/or pointers to informations ? sorry for the little relevance to crypto, but I expect the share of geeks and nerds on the list to increase my chance to get an answer :-) { the military folks are welcome to answer too... i will receive anonymously posted classified documents on the subject with pleasure :-) and reference to published work too [plane's brain interfaces,...] } dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept Clinton [Hello to all my fans in domestic surveillance] NSA Kaser Sose Treasury FBI Marxist From jya at pipeline.com Sat Oct 7 17:29:04 1995 From: jya at pipeline.com (John Young) Date: Sat, 7 Oct 95 17:29:04 PDT Subject: Noise: anyone experience with brain waves input devices (IBVA,...) Message-ID: <199510080030.UAA08506@pipe4.nyc.pipeline.com> We've sent the full version of the article below to Laurent. Anybody else want it, send a MIN_wav. ---------- [Excerpts] Financial Times, September 27, 1995 When it's all in the mind At the department of medical informatics at Graz University of Technology in Austria, Gert Pfurtscheller is working on a project that could result in thought-controlled devices. Stephen Roberts, a researcher at the electrical and electronics engineering department at Imperial College London, has worked with Pfurtscheller's team. He hopes to improve the signal classification accuracy by using artificial neural networks, computer-based systems designed to mimic the way the human brain works. Roberts's work is part of an EU research programme called Anndee (Artificial Neural Networks for Diagnosis and Enhancement of EEG) which involves around 30 researchers in a dozen European universities. The Consciousness Research laboratory at the University of Nevada is pursing a more controversial line of research into psychic phenomena or, as its director, Dean Radin, prefers to call it, Direct Man/Machine Interaction (DMMI). A number of Japanese companies including NEC and Matsushita, have also conducted research into DMMI. Radin believes that in 20 to 50 years' time, it will be possible to use DMMI to operate devices. The technology company The Other 90 Per Cent, based in Sausalito, California, has developed MindDrive, a computer games system whose programs are controlled by thought. MindDrive is designed to work with most IBM-compatible personal computers. A console, which analyses the user's brain waves, plugs into the back of the computer. Users wear a sensor sleeve over their index finger. At present, the system can only be used to move a cursor up and down. MindDrive will be on sale in the US early next year. The console will cost between $100 (65 pounds) to $200, and MindDrive games some of which will enable users to create music or draw on a computer screen by thought, will cost around $30 to $40 each. From ogre at brainlink.com Sat Oct 7 19:21:32 1995 From: ogre at brainlink.com (Ron Hansen) Date: Sat, 7 Oct 95 19:21:32 PDT Subject: VCRplus code Algorithm Message-ID: <199510080223.WAA13966@beast.brainlink.com> I've been trying (without success) to crack the encryption scheme that Gemstar uses in its' VCRplus codes. I have written a TV/cable show management system that generates plus codes for half-hour boundary shows (ie 4 to 6 digit codes). I can't seem to find anything on 7 and 8 digit codes which handle 5 minute increments for program start time and length. (And yes, I have the article "Decoding a VCR Controller Code" by Ken Shirriff, Curt Welch and Andrew Kinsman. It was published in Cryptologia. Unfortunately, they didn't get beyond 6 digits either.) BTW, this is strictly for my own use. I'm just tired of approximating shows and also a bug that I have that occasionally gives incorrect results (I think it may be a leading zero being trimmed by the math formulas). Can anyone help? From stewarts at ix.netcom.com Sat Oct 7 22:15:50 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Sat, 7 Oct 95 22:15:50 PDT Subject: MITM attacks and True Names (again...) Message-ID: <199510080515.WAA13191@ix5.ix.netcom.com> -----BEGIN PGP SIGNED MESSAGE----- At 07:02 PM 10/6/95 -0600, bryce at colorado.edu wrote: >(As an aside I fully sympathize with those who rail against the popular >(?) impression that a True Name is somehow necessary to communication. >That is a dangerous idea, since all a True Name is really necessary for >is violence. (And, pending certain eagerly-awaited technological >developments, for sex.)) That's incorrect - it can also be necessary for _avoiding_ violence. You don't need a full True Name for that, but you do need an accurate partition of the namespace into those entities who will, won't, or might come and beat you up based on what you say. Thus, if you're talking to Subcommandante Marcos about your plans for overthrowing the governor, you don't need to know his True Name, but you do need to know if he's a cop; anybody doing a successful MITM job on your data communications probably is. Similarly, if you're in the pharmaceutical retail business and talking to your wholesaler, you may even want to avoid knowing his True Name, but you not only want to know if he's a cop, but you may want to know whether, if you show up at the appointed physical location with your physical body, you'll be met by just him (with his merchandise), or by other people as well (eavesdroppers using MITM because it's easier than cracking crypto), or by one of his or your competitors trying to rip you off. (You'd also like to know if you'll be met by him without his merchandise, but with his big ugly friends, which is why you plan to meet him in a public place...) -----BEGIN PGP SIGNATURE----- Version: 2.7.1 Comment: PGP available outside U.S.A. at ftp.ox.ac.uk iQBVAwUBMHdVcPthU5e7emAFAQHRNwH9ErIcbgioSJOD5270SJ2hRfycNd6sMAj3 Q5jzguJVkbmsrI9I85eB/caV9UOOkSTX29v3gTAHWbeNuAL9t/Yyrw== =3qir -----END PGP SIGNATURE----- #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From cman at communities.com Sat Oct 7 22:24:46 1995 From: cman at communities.com (Douglas Barnes) Date: Sat, 7 Oct 95 22:24:46 PDT Subject: cypherpunks digicash bank? Message-ID: I strongly recommend that anyone considering licensing from Chaum first read my paper on some interesting aspects of his basic blinding patent. The paper is at: http://www.communities.com/paper/agnostic.html. I will be putting up another short paper on anonymous currency management within the next few days. Also, I strongly recommend that anyone serious about this not use the word "bank", and take the time to figure out how to structure the service as an NBFI (non-banking financial institution) and not a "bank". Note that NBFIs are still regulated, and you will, at minimum, need to consult with your state banking regulators as well as the IRS (who also regulate money transmitters, i.e. issuers of traveller's checks, moneygrams, etc.) Note that the BSA (Bank _non_ Secrecy Act) does in fact apply to NBFIs and money transmitters, and you should be sure to educate yourself as to the implications of this. I will be covering some aspects of these issues at length in my trip report on the anti-money-laundering conference I recently attended, which was a real eye-opener in a number of ways. From rjc at clark.net Sat Oct 7 22:53:45 1995 From: rjc at clark.net (Ray Cromwell) Date: Sat, 7 Oct 95 22:53:45 PDT Subject: Two bugs in CERN3.0 HTTPD Message-ID: <199510080553.BAA29494@clark.net> I have not verified whether or not both of these are security holes yet, but the first one is very probably a security hole. 1) overlong domain bug in Proxy mode Symptom: send a proxy request to the server, for instance GET http://overlongdomain HTTP/1.0 This is the same bug that's in Netscape 1.1. The domain buffer is a 256 byte buffer declared on the stack. (char host[256]) 2) too many headers from CGI script Symptom: HTScript.c allocates an array of pointers to char on the stack. This array has size 100. The loop where they parse the output of a CGI script is not bounds checked. To crash the server, create a CGI script that outputs a large number of headers before the document body. (I simply made a perl script that did for($i=0; $i<1000; $i++) { print "Header$i: $i\n") Although this bug can coredump the process servicing the request, I doubt it is exploitable. All that happens is an unchecked header_line[header_index++]=malloc(some space) gets executed. In the worst case, you overwrite the stack with excessive malloc pointers. You may be able to cause a foreign server to crash by having your own fake server return the exploit, and then getting the foreign server to read the headers by issuing a proxy request to your server. Suffice it to say, the CERN code is *littered* with temporary local stack arrays, and I'm guessing that many of them have faulty bounds checking (or none at all) -Ray From stewarts at ix.netcom.com Sun Oct 8 00:18:06 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Sun, 8 Oct 95 00:18:06 PDT Subject: Graphic encryption Message-ID: <199510080717.AAA02124@ix5.ix.netcom.com> At 08:17 AM 10/6/95 -0700, privsoft at ix.netcom.com (Steve ) wrote: >Also if any of ya'll are famillar with graphic encryption, I am looking >for opinions as to its strengths / weaknesses. While normally I'd agree with Lucky Green and say that a good encryption algorithm's strength is independent of its input data, there are exceptions. The description of Privasoft's method on their web page sounded like* it broke up a fax image into little squares and shuffled them around based on some proprietary (hence presumably weak) algorithm, somewhat like feeding them to a shredder or puzzle-box, then put them in a file you can ship with regular fax software or decrypt yourself. If that's the case, and if the squares are sufficiently big to have enough pixels for fax software to compress decently, then it's weak no matter _how_ strong the encryption algorithm that shuffles them is, because you can piece together matching edges like a jigsaw puzzle, or like a bunch of Iranian students with American Embassy shredded documents. Using computers is a lot easier, since you've got precise images of print - most edges will match pretty well with the edges of the adjacent squares, and you can jigsaw the parts that still need work if you get too many multiple matches. A much stronger way to encrypt faxes is to do the Group 3 (or G4) compression first, then encrypt using a real algorithm, ship the (now-useless-for-fax) encrypted bits, decrypt, and read with your favorite fax-image viewer. Or, of course, take the raw file you would have done this with, which is much smaller than the fax-compressed image, encrypt it, ship, decrypt, and view, but that means the person on the far end needs the same word-processor. ------- * The software was on the web page; if I'd had spare disk space that day and some slack time I could have downloaded the demo version and tried it, but this is what the description sounded like it meant. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From stewarts at ix.netcom.com Sun Oct 8 00:18:17 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Sun, 8 Oct 95 00:18:17 PDT Subject: Certification Authorities in history. Message-ID: <199510080718.AAA02155@ix5.ix.netcom.com> Timothy C. May (or somebody like him, or Tim the Enchanted) wrote: >> The talk of certification authorities is OK, so long as the practice is >> _completely_ and "strongly" voluntary (*). It occurred to me that the authors of the US Constitution had direct experience with the equivalent of mandatory certification hierarchies for legally acceptable digital signatures. They called it "The Stamp Act". If you wanted to make a legal document, such as a contract or will, it needed to be on paper with a tax stamp on it; I forget if this was a watermark or a stick-on stamp, but you could only get it from the authorities. They didn't like it. There was also a few-percent sales tax on tea around that time. They didn't like that either :-) -------- WHAT is your name? WHAT is your certificate number? #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From an402976 at anon.penet.fi Sun Oct 8 00:47:25 1995 From: an402976 at anon.penet.fi (RingZero) Date: Sun, 8 Oct 95 00:47:25 PDT Subject: NEW Netscape RNG hole Message-ID: <9510080732.AA14015@anon.penet.fi> Did anyone else notice a bug in the new, public Netscape RNG code? It appears that on Windows builds, during the RNG seeding, the function that hashes in file contents (EnumSystemFiles) doesn't close a file handle (lFileHandle). This doesn't hurt too badly on the client, but on a server, leaking these resources is deadly. I ran some experiments. It took a few thousand calls before these open file handles forced not only the file content function to fail, but also made OTHER calls quietly fail. With these calls quietly failing, the RNG is significantly weakened. In my tests on Windows NT, ALL of the following RNG functions failed: * GetComputerName * GetVolumeInformation volume Name, volume Serial Number, Maximum Filename Length Filesystem Flags Filesystem Name * GetDiskFreeSpace SectorsPerCluster BytesPerSector Free Clusters Total Clusters * subroutine for the inclusion of system files, both number of them & contents ReadSystemFiles() * subroutine used for other history file accesses SEC_FileForRNG(*filename) How did this get past Netscape testers? Does anyone know if this was fixed before Netscape shipped? Does it rate a shirt, or does this mean Jeff W. gets to shave his head? I seem to remember him promising to shave it if we could show a significant weakness in the new RNG code, and since this does (IMO)... On another note, has anyone noticed the 73 (!!!) or so handles that are leaked by simply opening and closing &Options -> &Preferences... ? Looks like somebody had a problem coding the tabbed dialog. RingZero --****ATTENTION****--****ATTENTION****--****ATTENTION****--***ATTENTION*** Your e-mail reply to this message WILL be *automatically* ANONYMIZED. Please, report inappropriate use to abuse at anon.penet.fi For information (incl. non-anon reply) write to help at anon.penet.fi If you have any problems, address them to admin at anon.penet.fi From karlton at netscape.com Sun Oct 8 01:39:18 1995 From: karlton at netscape.com (Phil Karlton) Date: Sun, 8 Oct 95 01:39:18 PDT Subject: NEW Netscape RNG hole In-Reply-To: <9510080732.AA14015@anon.penet.fi> Message-ID: <30778E3D.4CBD@netscape.com> RingZero wrote: > > Did anyone else notice a bug in the new, public Netscape > RNG code? It appears that on Windows builds, during the > RNG seeding, the function that hashes in file contents > (EnumSystemFiles) doesn't close a file handle (lFileHandle). I think you mean lFindHandle. I'm not a windows programmer, so I have no idea if the enumerator needs to be cleaned up, but I will forward your message to the appropriate folks here. > This doesn't hurt too badly on the client, but on a server, > leaking these resources is deadly. Not really. SEC_SystemInfoForRNG is called ONCE for each execution. This is true for servers and for clients. Did you rig up a test bed that called SEC_SystemInfoForRNG in a loop? In addition, if the server cannot open any more files, it will have difficulty delivering any information (compromised or not) to any clients. The clients use the SEC_GetNoise data each time they go idle to re-initialize the PRNG seed. The servers also re-initialize the PRNG seed periodically. That function does not use any file handles. > I ran some experiments. It took a few thousand calls before > these open file handles forced not only the file content function > to fail, but also made OTHER calls quietly fail. With these calls > quietly failing, the RNG is significantly weakened. In my tests > on Windows NT, ALL of the following RNG functions failed: > > * GetComputerName > * GetVolumeInformation > volume Name, > volume Serial Number, > Maximum Filename Length > Filesystem Flags > Filesystem Name > * GetDiskFreeSpace > SectorsPerCluster > BytesPerSector > Free Clusters > Total Clusters > * subroutine for the inclusion of system files, both number of them & contents > ReadSystemFiles() > * subroutine used for other history file accesses > SEC_FileForRNG(*filename) SEC_FileForRNG does close every file it opens. As I said before, I don't know what the rules are for closing the enumerators. > How did this get past Netscape testers? The tested servers worked? :-) > Does anyone > know if this was fixed before Netscape shipped? The code that was made available for download was the same that was in the shipped updates. > Does > it rate a shirt, or does this mean Jeff W. gets to shave his > head? I seem to remember him promising to shave it if we > could show a significant weakness in the new RNG code, > and since this does (IMO)... That was me (Phil Karlton) and not Jeff who put his locks (pun intended) at risk. You haven't demonstrated to me that there is significant weakness. I'll keep my hair for another day. I don't think you are going to get a shirt. It's hard to mail one to an anonymous person. On the other hand, they are not mine to give or withhold. PK -- Philip L. Karlton karlton at netscape.com Principal Curmudgeon http://www.netscape.com/people/karlton Netscape Communications Corporation From rjc at clark.net Sun Oct 8 01:51:13 1995 From: rjc at clark.net (Ray Cromwell) Date: Sun, 8 Oct 95 01:51:13 PDT Subject: Netscape 2.0 beta Message-ID: <199510080851.EAA13995@clark.net> Well, it's not mentioned on their home page yet, but I went to their ftp site and I found that Netscape 2.0 beta was up there. For those wishing to get their hands on Java, they don't support Java on the Mac or Linux/NetBSD/BSDI platforms yet. Only Win95/NT, IRIX, and Solaris/SunoS are supported for Java. I knew it was too good to be true for them to have ported Java to so many platforms so quickly. The good news is that someone finally, after years, has implemented Progressive JPEG (I've been yelling about it for a while myself), and it is simply *light years* better than interlaced GIFs. -Ray From andy at acgeas.com Sun Oct 8 02:36:19 1995 From: andy at acgeas.com (Andrew Purshottam) Date: Sun, 8 Oct 95 02:36:19 PDT Subject: netscape mail starts java attachments upon get new mail... Message-ID: <199510080937.CAA17576@bibimbap.acgeas.com> The new netscape mail reader is quite nice, but a little too automatic for my tastes. If one mails a java applet as an attachment, doing "Get New Mail" with the mailed document as the next message, automatically starts the applet in your mail display. Of course, the wonderful Java security mechanism is protecting you. Otherwise the java mail stuff is quite reasonable. I predict it gains wide acceptance. Andy (andy at acgeas.com) From andy at acgeas.com Sun Oct 8 02:39:27 1995 From: andy at acgeas.com (Andy) Date: Sun, 8 Oct 95 02:39:27 PDT Subject: Image Tape - view with Java enhanced Netscape mail reader Message-ID: <30779C9D.3BA3@acgeas.com> http://www.javasoft.com/JDK-prebeta1/applets/ScrollingImages/example1.html Title: Image Tape The source. From jya at pipeline.com Sun Oct 8 06:07:58 1995 From: jya at pipeline.com (John Young) Date: Sun, 8 Oct 95 06:07:58 PDT Subject: FOR_who Message-ID: <199510081307.JAA23047@pipe4.nyc.pipeline.com> 10-8-95. NYPaper: "Foreign Policy 3.1. Microsoft as World Power." [Foreign affairs column] Does Microsoft have a foreign policy? Mr. Ballmer says Microsoft doesn't have a foreign policy per se. But it does have a global business agenda. Since Microsoft today has twice the market value of General Motors, it's worth looking at that agenda because it is bound to influence U.S. foreign policy. Microsoft doesn't need Washington to open doors for it because foreign governments are begging Microsoft to come in and translate Windows 95 into their languages, so they can get on the information highway. Describing his contacts with foreign leaders, Mr. Ballmer put it this way: "People say, 'You have this technology. We hear it's changing the world. Tell us how it can help us.' " 10-7-95. The Econofog: "The myth of the powerless state." [lead for a superb 40- page survey of the world economy] The increasing "globalisation" of the world economy is a fact, and one that nobody can ignore. To many, however, one aspect of this change is especially important: its effect on "economic sovereignty". They claim that global integration is emasculating the modern state. If the number of believers is any guide, these views are appealing. Yet the new orthodoxy is wrong. The world has changed, the global economy has indeed arrived: nonetheless, the emasculated state is a myth. Micro and Macro: FOR_who (19 kb) From BRUEN at mitlns.mit.edu Sun Oct 8 07:49:13 1995 From: BRUEN at mitlns.mit.edu (Bob Bruen, MIT Lab for Nuclear Science) Date: Sun, 8 Oct 95 07:49:13 PDT Subject: Boston Globe article Message-ID: <951008104657.44605479@mitlns.mit.edu> The Boston Sunday Globe Business section has an article by Jon Auerbach entitled Cypherpunks with a picture of Carl Ellison and one of Ian Goldberg and David Wagner. It stresses privacy, anarchy and the fears of the FBI. From aba at dcs.exeter.ac.uk Sun Oct 8 07:53:22 1995 From: aba at dcs.exeter.ac.uk (aba at dcs.exeter.ac.uk) Date: Sun, 8 Oct 95 07:53:22 PDT Subject: cypherpunks digicash bank? In-Reply-To: Message-ID: <17968.9510081452@exe.dcs.exeter.ac.uk> Doug Barnes writes on cpunks: > I strongly recommend that anyone considering licensing from Chaum > first read my paper on some interesting aspects of his basic blinding > patent. The paper is at: http://www.communities.com/paper/agnostic.html Yeah, I read that when it was first posted, a very interesting approach. And possibly a way to get around both regulations and Chaum's patents. It is a more anarchistic, less offical approach, not that I disagree with anarchistic approaches, or blowing off patents :-) Just I got to thinking well what's $150k? Not much perhaps if looked at in the right way, a pittance compared to the kind of money the likes of netscape are playing with. And it buys some acceptability, people do not need to obtain their anonymity after the fact, and everyone uses the anonymous feature, rather than just cypherpunks types. I was thinking that the $150k might make all the difference to the success of such a project, due to the privacy built-in as standard. > I will be putting up another short paper on anonymous currency > management within the next few days. > > Also, I strongly recommend that anyone serious about this not use the > word "bank", you are right. > and take the time to figure out how to structure the service as an > NBFI (non-banking financial institution) and not a "bank". Note > that NBFIs are still regulated, and you will, at minimum, need to > consult with your state banking regulators as well as the IRS (who > also regulate money transmitters, i.e. issuers of traveller's > checks, moneygrams, etc.) Note that the BSA (Bank _non_ Secrecy Act) > does in fact apply to money transmitters, and you should be sure to > educate yourself as to the implications of this. Now this is the fatally weak point in my discussion, the political and legal impliciations. My only comment was to get legal opinion, and to move the bank outside the US if this proved a problem. I suspect the state banking regulators, and the IRS, would stomp on the idea because they won't like the anonymity aspect, they would have particular ease in doing this, particularly to a small group. Even an identity agnostic bank (whoops must loose that 'bank' term ... 'agnostic payment system' perhaps:-) would have similar problems, but at a later stage. Aka you get your system nicely set up, have some dastardly cypherpunks implement a way to hack your bank to get anonymous payments (a complete suprise to yourself of course!). Now the regulators notice, and presumably make you change your bank code to disable this possibility? > I will be covering some aspects of these issues at length in my trip > report on the anti-money-laundering conference I recently attended, > which was a real eye-opener in a number of ways. I will read with interest. Three basic approaches I see: 1. go by the book, license the blinding stuff from Chaum, perhaps agree to limits of $10k on individual transactions as in cash (that is the limit in the US where you have to report cash transactions I think?) 2. forget Chaum's patents with an agnostic server. Problem is here that it only provides anonymity for those happy to bend the rules, and get 'blackmarket' cypherpunks technology which plugs and plays with the bank. Long term, this would be open to pressure from the banking authorities, the IRS etc they would come and force you to do something to close the loop hole. 3. Completely underground, anon remailers, decentralised cashing. The problem as I see it is with options 2, and especially 3. you'd have a job to get widespread acceptance, and adoption of blinded cash as a payment system. My previous post was based on 1. The problems are still political and legal, but less than with 3, and with anonymity for everyone as stated aim, and hence not as readily removable by regularatory coercion of the bank afterwards, leaving you with yet another non-anonymous scheme. My thought is that if you offered to restrict it to $10k individual transactions (I know it sucks) then the similarity with current physical cash is close, and there is little to complain about. If it is payee anonymous only (you've got to start somewhere), there is little opportunity for abuse of the type Freeh and co scream of, paying hit men etc, as the hitman has to cash his money sometime, and if it's unusually large, etc, it is the exact same situation as ordinary cash. They won't like it of course. If it's too unpopular you could try say Switzerland? Some other banking haven? What are your estimates of the paletability of the above to banking regulator types? The stuff about two versions of 100$ bills one for outside and one inside the US a while back does not bode well for ecash payments with *any* anonymity, but I think the above would be demonstrably hard to use for nefarious purposes, and hard to go completely unaccountable. (Modulo the proto coin tricks, and hijacked cash clients to force others to do your cashing). I reckon the recipient anonymity stuff, can be added after the fact by people offering cashing services, cash is fluid, once you've got a system set up. Duncan Frissell had a nice sig to the effect of it being hard to keep track of millions of private IP connected people, all doing added services, such as providing anonymity. At any event the above system would be much preferable to the current offerings of electronic cheques, electronic CC payments, and the lame ones which claim privacy, but when examined turn out to be just private to the extent that you trust a commercial bank to respect your privacy! You've got to start somewhere, if this worked you could try for stage 2 later, fully anonymous, but at the moment there is *nothing*, and there is surely a crying need for a decent ecash payment system. Adam -- #!/bin/perl -s-- -export-a-crypto-system-sig -RSA-3-lines-PERL $m=unpack(H.$w,$m."\0"x$w),$_=`echo "16do$w 2+4Oi0$d*-^1[d2%Sa 2/d0 "Cypherpunks: In pursuit of privacy they break codes, fault government plans" by Jon Auerbach is on the front page of the business secion of today's Boston Globe. It leads with a paragraph on Carl Ellison, along with a picture captioned with his quote "We have privacy in the real world." Aside from a few minor inaccuracies and simplifications, it seems like a very balanced, cypher-favorable article. -nhy --------------------------------------------------------------------------- Nina H. Yuan yuan at wjh.harvard.edu nyuan at fas.harvard.edu nyuan at bbn.com "Education is a progressive discovery of our own ignorance." - Will Durant --------------------------------------------------------------------------- From cman at communities.com Sun Oct 8 08:44:04 1995 From: cman at communities.com (Douglas Barnes) Date: Sun, 8 Oct 95 08:44:04 PDT Subject: cypherpunks digicash bank? Message-ID: Adam -- I'm afraid you may have somewhat misunderstood the motivation behind the Identity Agnostic paper. In no way is it intended as a way of not facing the music wrt regulators in the country(s) where such an institution has offices. The IA approach is intended as an possible alternative for an institution that might otherwise license from Chaum. The regulators I've discussed this with are primarily concerned with how money moves into and out of a digital cash system. The fact that small payments cannot be traced from buyer to seller is not at the top of their list of concerns -- it's already a basic fact of life for them in existing payment systems. They are also not oblivious to the privacy concerns inherent in an institution logging masssive amounts of counterparty data about small transactions. I would strongly discourage anyone from trying to set up a garage- type operation. While regulators clearly don't appreciate the subtleties of this stuff, they can spot an illegal bank or an unlicensed money transmitter from a mile away. If your concern is creating account anonymity, then you're going to need to set up outside of the US. Do be aware that even the more relaxed countries of the world have regulations that cover this sort of thing, and they are especially interested in making sure you at least pay the appropriate licensing fees. From bogstad at news.cs.jhu.edu Sun Oct 8 09:00:25 1995 From: bogstad at news.cs.jhu.edu (Bill Bogstad) Date: Sun, 8 Oct 95 09:00:25 PDT Subject: Rethinking the utility of netnews "cancel" control messages In-Reply-To: Message-ID: <458sie$r41@blaze.cs.jhu.edu> In article , Erik E. Fair wrote: >At 9:50 10/5/95, Rich Salz wrote: >>Cancel/Supercede is a useful model -- architecting them out of Usenet >>is a very bad idea. Ask Clarinet. > >Is it? The principal effects of not having the mechanism is a slightly >higher disk storage requirement for netnews - something completely unheard >of in the annals of USENET. > >The downsides of having the mechanism (especially unauthenticated) we see >now: official and unofficial squelching of articles that someone doesn't >like for whatever arbitrary or situational reason. There is another benefit to the current system which is being ignored. That is, it allows for the removal of unauthorized postings. Posting of copyrighted materials without authorization does occur and I think the current cancel mechanism (with its lack of authentication) is an important safety valve for dealing with irate copyright holders. I can't say that the disadvantages of the current spoofable cancel system don't outweigh this benefit, but I think that any system designed to replace it should include this capability. Someone asked the question if one was a librarian/archivist would/should they honor cancels. Under the circumstances I describe, I think they have to do so. Rather then eliminate cancels, I think a general authentication system for all USENET posts makes more sense. The news system itself doesn't need to authenticate general posts. That can be left up to the decision of the individual reader. In most case, I don't care as a news reader if the real 'Erik Fair' posted this message. It can stand on its own merits. In the case of cancels, as a news administrator I probably want to restrict them to the original poster and a small set of authorized agents. With new group and remove group messages, I probably want to only have a small set of agents for the 'big seven' hierarchies and perhaps others. I see no downside to standardizing on a mechanism for including authentication in news posts as long as we allow the user and site administrator to make the decision about whether to pay attention to the authenticity of a message. Those who want the current system will set up the authentication system to always say 'yes'. Those who want to eliminate cancels can setup the authentication module so it always says 'no'. I would setup my system somewhere in between these extremes. Bill Bogstad bogstad at cs.jhu.edu From dl at hplyot.obspm.fr Sun Oct 8 09:17:42 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Sun, 8 Oct 95 09:17:42 PDT Subject: Netscape 2.0 beta In-Reply-To: <199510080851.EAA13995@clark.net> Message-ID: <9510081616.AA03926@hplyot.obspm.fr> The shipped beta1 does not work on hpux8.07 (don't bother the looooong download if you have that OS version) because of libc version. (yes i know 8.07 is old when latest hp is 10 but 8.07 is also stable and I didn't yet found the time to loose for major upgrade (and there is probably a lot of hpux8 sites around)) ps1: are the md5sums coming ? ps2: it would be nice that ftp site implements an "SITE md5 " command, so you'd just get the sums from ftp.netscape.com and fetch the files from mirror and check... (the pgp signed md5sums posted on newsgroup, mailing list, ftp and web is even better) dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept Clinton Saddam Hussein munitions SEAL Team 6 colonel cracking nuclear From merriman at arn.net Sun Oct 8 10:15:07 1995 From: merriman at arn.net (David K. Merriman) Date: Sun, 8 Oct 95 10:15:07 PDT Subject: Netscape 2.0 beta Message-ID: <199510081721.MAA06165@arnet.arn.net> Even nicer would be if the Windows beta included *all* the files needed. The setup routine wants to install some OLE2 .dll's, but they don't seem to be included with the compressed file, or even on the Netscape site. I was able to work around it, since I already had the OLE2 stuff on my machine, and edited the installation scripts and such - other folks aren't likely to be as 'lucky'. I suspect that Netscape is going to be hearing about that little oversight..... Dave Merriman This is a test (3 UUE lines) of the unconstitutional ITAR - 1/713th of the PGP executable. See below for getting YOUR chunk! ------------------ PGP.ZIP Part [015/713] ------------------- M=$<(&L`#*IPP",(G6(,,S,`P](<2RWU96XCW86/JBYV8A\D8 at X'HB_9H#&\X MX'PCUB.,13B"X8`R?^J-:UB.M_`U\>[#)BS&5$0C,Y#^1CS>1`\T1QTXX6!3 M8H,),S$8G>&.WP(8IRA`-M['+`Q%&_C"">5-F%LX@<_Q$;*P'',Q$Z/AA[8M ------------------------------------------------------------- for next chunk to export --> http://dcs.ex.ac.uk/~aba/export/ <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> My web page: http://www.geopages.com/CapitolHill/1148 From nobody at REPLAY.COM Sun Oct 8 10:20:16 1995 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 8 Oct 95 10:20:16 PDT Subject: Nat Sec Eco Espo Message-ID: <199510081720.SAA09282@utopia.hacktic.nl> The anonymous post of the White House's National Security Science and Technology Strategy recalls debate on this policy underlying reports on CIA economic espionage: Clinton instructs CIA to focus on trade espionage - report Los Angeles, Jul 23 (Reuter) - President Clinton has ordered the Central Intelligence Agency to make economic espionage a top priority, according to a report in the Los Angeles Times on Sunday. The report quotes American intelligence sources who say the CIA was instrumental in providing U.S. trade negotiators information during heated auto trade talks with Japan this spring, and has helped uncover bribes by rival nations competing with U.S. firms for government contracts. The sources say Clinton has issued a classified set of intelligence priorities for the post Cold-War era, and that the CIA is providing case officers with new training on economic matters to meet the new challenge. The recent trade talks with Japan were viewed as a success of the new policy, according to the Times report. It said U.S. Trade Representative Mickey Kantor was pleased with the CIA's ability to report on the bargaining positions of American rivals. But the agency has reportedly been less willing to spy on individual companies. In one recent success in that area the CIA discovered that the French were offering bribes to Brazilian officials to help telecommunications giant Thompson win a government contract. The report says intelligence information helped U.S.-based Raytheon Co. elbow out Thompson of France to win the work. But the problem in such work, say intelligence sources, is determining which multinational corporations based in the United States should be considered "American" firms deserving assistance. Because of this confusion, CIA officials argue they should be kept out of spy work targeting individual foreign business at the behest of U.S. corporations. Even so, the Times report says the intelligence community has told Congress it can claim credit for uncovering bribes affecting $30 billion in foregin contracts over the past few years. ----- From aba at dcs.exeter.ac.uk Sun Oct 8 10:22:42 1995 From: aba at dcs.exeter.ac.uk (aba at dcs.exeter.ac.uk) Date: Sun, 8 Oct 95 10:22:42 PDT Subject: cypherpunks digicash bank? Message-ID: <18185.9510081722@exe.dcs.exeter.ac.uk> Douglas Barnes writes on cypherpunks: > I'm afraid you may have somewhat misunderstood the motivation behind > the Identity Agnostic paper. In no way is it intended as a way of > not facing the music wrt regulators in the country(s) where such an > institution has offices. The IA approach is intended as an possible > alternative for an institution that might otherwise license from > Chaum. So it's intended for avoiding patent issues only? But the identity agnostic idea, and the idea of using software not officially supplied by the bank does not sound like something that would be easy to convince a bank, or other financial institution of? I mean the agnostic server idea is that the user must obtain patent infringing software in order to gain anonymity, or else the user individually obtain on a case by case basis a license from Chaum. A similar mess to the early problem with PGP, back in the days when RSA contended that PGP was a patent infringement, and the other side of the story was that it was the users responsibility to get a license from RSA. As early versions of PGP demonstrated individuals can get away with this kind of thing, but it doesn't help commercial uptake of the software. You need commercial uptake, as a lot of the shops will be commercial service providers, plus value added information or product providers. What I'm saying is that whilst technically the server need do nothing infringing, without the infringing client software it provides nothing new over existing systems, and that the stigma of illegality, might adversely affect the acceptability of the whole scheme to a bank. Ie if you really wanted to sell the system to a bank, you'd presumably stand a better chance if you removed the potential for blinded signatures altogether. Tim is right, patents most definitely retard advancement of technology. > The regulators I've discussed this with are primarily concerned with > how money moves into and out of a digital cash system. The fact that > small payments cannot be traced from buyer to seller is not at the > top of their list of concerns -- it's already a basic fact of life > for them in existing payment systems. So you think with the $10k limit, they might even be happy with a system such as I just described? (note: I did not imply anonymous accounts, only payer anonymity, basically exactly what Chaum has in his trial system right now). > They are also not oblivious to the privacy concerns inherent in an > institution logging massive amounts of counterparty data about > small transactions. I had not realised they were concerned over such things. How does this fit in with the separate 100$ bill for domestic and foreign use? It was previously my suspicion, that 100$ bills were first, and that soon they would be trying to outlaw cash altogether! Perhaps I am too cynical, and I am glad to hear it. (Anyone know if anything ever come of this creation of a foreign issue of 100$ bills which had to be exchanged at customs in entry and exit, each being legal tender only when used in the correct jurisdiction?) > I would strongly discourage anyone from trying to set up a garage- > type operation. While regulators clearly don't appreciate the > subtleties of this stuff, they can spot an illegal bank or an > unlicensed money transmitter from a mile away. I was talking of doing it by the book, patent licenses, appropriate banking licenses, banking regulatory approval. Your description of the banking regulatory bodies likely stance on transferring small amounts anonymously was more favourable than I envisaged. The garage-type operation: I was having problems convincing myself that any bank could be persuaded to do it. Hence I thought, well the civilian sector would have to do it. It doesn't have to be amateurish, just has to be run by people who have an interest in privacy, cypherpunks aren't excluded from doing things professionally, and in fact have a vested interest in seeing it succeed even. You can't expect big banks, governments or corporate types to deliver privacy on a plate, it is counter to their interests - they like nicely indexed, cataloged user profiles, as they are saleable items. Accurate user demographics is big business. The closest that I've seen to a bank offering any semblance of anonymity is Mondex, and it's a crock as far as privacy goes IMO, as as far as I understand the card knows everything, and there is *nothing* stopping the bank downloading *all* of that information next time you plug the card in. That's the kind of anonymity I was growing used to seeing banks offer. Also the fact that it relies purely on the tamper resistance of the card isn't very inspiring, no cryptographic protocols, just a counter buried in a tamper proof card. > If your concern is creating account anonymity, then you're going to > need to set up outside of the US. That was not the immediate concern, only payer anonymity. I thought this would be too much to expect to get away with. Your comments backup that belief. > Do be aware that even the more relaxed countries of the world have > regulations that cover this sort of thing, and they are especially > interested in making sure you at least pay the appropriate licensing > fees. Licensing fees for what? I lack details, and insight into the background of financial dealings (as you might have noticed:-), but my outburst was prompted by impatience with the take up of DigiCash, or any half decent alternative. Blind signature technology has been around for a long time now, and there is not one on-line instance of a practical real world use of this technology. So what problems remain to be solved with a system which has the following characteristics: 1) either agnostic (to save $150k + 10% profits) or coughing up the $150k for Chaums patents - I'm not fussy, only concern for me is implications on uptake as described above 2) no anonymous accounts 3) payer anonymous 4) on-line, normal banking style records kept of money paid in 5) 100% real currency backed 6) profits by keeping interest on backed currency, possibly small % on cashing to pass on VISA costs, etc if necessary Would US banking regulations in your opinion have a problem with this? If $150k is the real sticking point then I'm surprised, I mean ok, it's some money, perhaps the 10% cut of profits Chaum requires is more of a concern. But surely this would win as a privacy preserving internet payment system for convenience, on-line instant payment. With the kind of money investors seem to be willing to back netscape with and the unexpectedly high level of interest in their commerce servers, even Chaum's $150k seems like small change. There must be more to it, what a $1M lawyers bill to sort out the technicalities, and legal implications with regulators? Adam -- #!/bin/perl -s-- -export-a-crypto-system-sig -RSA-3-lines-PERL $m=unpack(H.$w,$m."\0"x$w),$_=`echo "16do$w 2+4Oi0$d*-^1[d2%Sa 2/d0 Message-ID: <199510081722.KAA10011@jobe.shell.portal.com> One of the reasons people don't like solutions based on True Names is because nyms don't have them. Pr0duct Cypher can't very well go to someone, show a drivers license, and get his key signed. There is still a way in which signed, true-name-based keys can be useful to nyms. Maybe they can't get their own keys signed in this mode, but they can check the keys of others. If Pr0duct Cypher, under his secret identity, goes out and gets valid keys that he can trust (maybe he sees Verisign's key fingerprint in the newspaper), then if I send him my key signed by someone he trusts, he can check the signature. He can then send data to me encrypted with my actual key, and the MITM can't do anything about it. So the presence of my True Name based key allows us to communicate securely. This doesn't help for the case of two nyms who want to communicate, though. For that we do need a mode in which nyms can get their keys signed. I do think that there are some situations in which that is plausible, based on the difficulty of mounting a MITM attack against someone who is determined to try to detect it. In the most extreme case the MITM has to simulate the whole outside world with respect to the person he is targetting, which is infeasible. Various tricks like sending hashes of future messages have been discussed; the MITM can't let these through since the future message may include the true key that he is hiding. If people are then supposed to reply to these hashes, all of the replies have to be simulated by the MITM. Eventually it seems that the MITM becomes enmeshed so deeply in his own lies that he would get caught. If steps like these are taken successfully it should be reasonable to sign a nym's key, with the semantics being that either this is the real key of the sender, or he has a nearly omnipotent MITM surrounding him. Hal From hfinney at shell.portal.com Sun Oct 8 10:27:46 1995 From: hfinney at shell.portal.com (Hal) Date: Sun, 8 Oct 95 10:27:46 PDT Subject: Certification Authorities in history. In-Reply-To: <199510080718.AAA02155@ix5.ix.netcom.com> Message-ID: <199510081726.KAA10621@jobe.shell.portal.com> One key to rule them all; One key to find them; One key to bring them all And in the darkness bind them. From jgrubs at left.webcasters.com Sun Oct 8 10:53:09 1995 From: jgrubs at left.webcasters.com (Jim Grubs W8GRT) Date: Sun, 8 Oct 95 10:53:09 PDT Subject: Kerserver keyrings Message-ID: -----BEGIN PGP SIGNED MESSAGE----- "Jim Grubs (W8GRT)" writes: > -- [ From: Jim Grubs (W8GRT) * EMC.Ver #2.5.02 ] -- > Attachment: mailsig Code: 0006727 \ Created: 10-03-95, 07:16 PM [1 Kb] > > Someone at Uni-Hamburg must have seen my message and said, "Oops, who turned > that off?" Anyway, their keyring was upated today. It's 6.4 megs!!!! (My > first HD was only 10.) > > > > begin 644 mailsig > M+2T-"B`@("`@("`@("`@("`@("`@("`@("`@(%=E8D-A M86UE M=6)S0'=E8F-A M("`@("`@("`@("`@("`@("`@("`@5&5L+CH at -#$Y+3 at X,BTR-CDW#0I3>6QV > M86YI82P at 3V@@-#,U-C`@("`@("`@("`@("`@("`@("`@("`@("`@("`@($9A > M>#H at -#$Y+3 at X-2TR.#$T#0H@($EN=&5R;F5T(&-O;G-U;'1I;F E<')O9W)A;6UI;F At 10:26 AM 10/8/95 -0700, Hal wrote: > One key to rule them all; > One key to find them; > One key to bring them all > And in the darkness bind them. A more famous statement on key certification authorities: And he causeth all, both small and great, rich and poor, free and bond, to receive a mark on their right hand, or in their foreheads: And that no man migh buy or sell, save he that had the mark, or the name of the beast, or the number of his name. Coming soon: True names neatly linked to your social insecurity number --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From aba at dcs.exeter.ac.uk Sun Oct 8 11:54:05 1995 From: aba at dcs.exeter.ac.uk (aba at dcs.exeter.ac.uk) Date: Sun, 8 Oct 95 11:54:05 PDT Subject: (ecm) Chaum patent prices (was Re: cypherpunks digicash bank?) Message-ID: <18305.9510081853@exe.dcs.exeter.ac.uk> [Marcel just posted this in the ecm list, I'm taking the liberty of doing a Rob Hettinga and acting as human gateway between lists, as the posts this was in response to were posted to both lists. -Adam] Forwarded from the ecm at ai.mit.edu (Electronic Cash Market) mailing list: >>>>>>>>>>>> From: Marcel van der Peijl To: ecm at edu.mit.ai Subject: Chaum patent prices Sender: bounce-ecm at edu.mit.ai Precedence: bulk Reply-To: Marcel van der Peijl Hi, I just want to make a quick comment on the prices that have been floating around on this list ($150K +10%). No doubt this is what David asked at some point to some individual but it is NOT the 'list price' -- there is no such thing as a list price. It all depends on the application, business potential etc. The up-front patent price should never be an obstacle for setting up business. If you wanna do serious business, I suggest to give David Chaum a call, or call Dan Eldridge. Phone numbers and email addresses can be found on our web pages. You might be surprised. And may I remind you that the patent price that is quoted is just a tiny drop in the bucket compared to the kind of money spent on marketing budgets for systems like Mondex!!! You are really talking about a non-issue here, IMHO. Marcel van der Peijl DigiCash bv From cjs at netcom.com Sun Oct 8 12:18:02 1995 From: cjs at netcom.com (Christopher J. Shaulis) Date: Sun, 8 Oct 95 12:18:02 PDT Subject: [NOISE] Caution! Netscape 2.0 and Linux Message-ID: <199510081807.OAA00500@hoopsnake.cjs.net> Hi all. Just a warning to steer clear of Netscape 2.0 on Linux. It can't resolve FQDNs, its distributed as a staticly linked a.out binary *AGAIN*, and I'm hearing lots of reports sitting here on IRC that it locks up R6 versions of XFree solid on a random basis. Not to mention that there is no java support yet for Linux, and the Java support in the Sun/Windows version of netscape is based on the new (and imcompatible with earlier versions) beta version of Java which sun pimped out to Netscape and won't release the source code too. The part about not resolving FQDNs might be an undocumented feature. The most secure transaction is one that doesn't take place at all. ;) Have fun, Christopher From aba at dcs.exeter.ac.uk Sun Oct 8 13:19:04 1995 From: aba at dcs.exeter.ac.uk (aba at dcs.exeter.ac.uk) Date: Sun, 8 Oct 95 13:19:04 PDT Subject: Chaum patent prices Message-ID: <18416.9510082018@exe.dcs.exeter.ac.uk> Tim wrote in his (to me) spot on article (cypherpunks list) about patents wrecking technolgical progress, and hindering all important experimentation, and exploration of technology: > [...] for example, can't use the Chaumian blinding protocols > without hiring lawyers, paying Chaum his up-front fee, and laying > out his designs and business plans (which he very probably doesn't > even have!). from Marcel's post: > I just want to make a quick comment on the prices that have been > floating around on this list ($150K +10%). No doubt this is what > David asked at some point to some individual but it is NOT the > 'list price' -- there is no such thing as a list price. It all ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > depends on the application, business potential etc. ^^^^^^^^^^^^^^^^^^^^^^ ie laying your plans out up front, plans which don't exist! Business potential is not predictable, even obtaining appropriate status, and banking licenses would presumably be doubtful unless a concerted, organised effort were put together. Requiring business plans rules out experimenting. The freeware mosaic browsers growth while being developed by academia, and the WWW in general seems to be a model which works rather well for the internet, if the netscape success story is anything to go by. Internet payment is rather harder to set up as a small experimental operation due to the legal and political implications, but a *real* example by Digicash would be nice. As in: if no licensing banks for digicash can be found, perhaps it would be a good approach for digicash to do it themselves, and support an offical exchange mechanism, if such a mechanism took off, banks might be interested to buy into an existing client base. On the $150k + 10% figures, my apologies, I picked them up from earlier posts on ecm I think, and had assumed incorrectly that this was a fixed price. > The up-front patent price should never be an obstacle for setting up > business. If you wanna do serious business, I suggest to give David > Chaum a call, or call Dan Eldridge. Phone numbers and email addresses > can be found on our web pages. You might be surprised. I am tempted to say: "how about free for a good cause :-)" And it might (theoretically) be nice as an analogue of the relationship between PGP and RSA with PGPs current free non-commercial use license from RSA, that seems to have helped RSA quite a lot. RSA are fond of quoting statistics about the world wide usage of their algorithms, one rather suspects that PGP is included and a major contributer to their figures :-) However, being realistic, I expect the answer to be no. I can understand this, but IMO it is still not a good situation from the point of view of advancing technology. My point however, is lets see a digicash payment system with a real exchange and soon! I don't care who does it so long as it gets done! > And may I remind you that the patent price that is quoted is just a > tiny drop in the bucket compared to the kind of money spent on > marketing budgets for systems like Mondex!!! You are really talking > about a non-issue here, IMHO. True enough. The 10% is likely more of a sticking point tho, but as you say this is all negotiable. But hey, I don't have a high powered business plan, I'm just a little cypherpunk be-moaning the fact that there are no digicash licensing banks which I can use to take advantage of Chaum's privacy technology, and instant on-line buying. Just think how much hassle could be saved when buying the perl rsa T-shirts even (no, I promise no more shirts arguments, I'm talking of payment!), all the foreign cheques, the hugely exhorbitant charges banks charge for writing small value foreign currency cheques, the risks (and dubious technical legality in some places) of posting paper cash in the mail, and the odd postal order which the bank would like to charge more than the face value to cash (I kid you not, I asked a few people to send different payment forms). "Click here to buy" would be infinitely better. The market is impatient, and inferiour, non-privacy preserving payment forms are in danger of soon becoming entrenched as standard internet payment methods. Digicash has or soon will have MSN money systems to compete with. Digicash now! Adam -- #!/bin/perl -s-- -export-a-crypto-system-sig -RSA-3-lines-PERL $m=unpack(H.$w,$m."\0"x$w),$_=`echo "16do$w 2+4Oi0$d*-^1[d2%Sa 2/d0 -----BEGIN PGP SIGNED MESSAGE----- In article <199510071424.AA00279 at october.ducktown.org>, mkj at october.ducktown.org wrote: > Need I point out that pride in one's work is not necessarily exclusive > of evil? Rarely does anyone actually think of themselves as evil -- > and those few who do are usually just harmless nuts. The most evil > and destructive people throughout history have always thought of > themselves as good people, doing good work. Let me illustrate this with an example. During my visit to Dachau Concentration Camp, I saw original lab notebooks of experiments designed to increase the survial rate of pilots downed above the cold waters of the North Sea. A noble cause. The notebooks contained pages upon pages of tables listing survial times vs. water temperature, the data gained by dropping subjects into a tub containing water of a defined temperature. I them saw more tables of the effects of various methods investigated to revive hypothermia victims who were near death. One of the treatments under investigation was dropping the patient into boiling water. Surely this type of research falls under the category of evil. But the scientists that conducted the study would not have thought so. They believed that they did a favor to humanity. The fact that to this day the treatment of hypothermia is based upon the results of this study, saving the lives of thousands of patients over the decades past, would surely - in the experimenters' minds - have vindicated their gruesome deeds. Ponder this, - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHgyXyoZzwIn1bdtAQFZCAGAvCKsAfc09eefeVsp3Oec73L6WsvxJcbH nlyp7+gX0rG1vBZcsTemp817MSa/WUbb =UuOA -----END PGP SIGNATURE----- From shamrock at netcom.com Sun Oct 8 13:48:14 1995 From: shamrock at netcom.com (Lucky Green) Date: Sun, 8 Oct 95 13:48:14 PDT Subject: Noise: anyone experience with brain waves input devices (IBVA,...) Message-ID: <199510082046.QAA15225@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <9510080007.AA01951 at hplyot.obspm.fr>, dl at hplyot.obspm.fr (Laurent Demailly) wrote: > I'd like to know if anyone have first hand experience with brain wave > and other (hyped) input devices like IBVA or others and/or pointers to > informations ? The pioneering work in this field was done by Andrew Junker, formerly Air Force labs. He now uses his system to sail his boat. At Rand Mac Millan Air Force Base, they have a simulator that is controlled by brain waves alone. Note that all the brain wave interfaces only allow a simple left/right type of control. Right turn is easy, but left turn is rather hard to learn. Anything bejond that, as well as direct input of data into the brain requires a direct link to neurons that can only be achieved by surgical means. See Brindley G S et al and the work done by Normann R A at U of Utah for the studies that defined the field. I have developed a design that solves the notorious problem of connecting the silicon matrix to individual neurons, but really can't elaborate on it until I get around to file a patent for it. Also take a look at the breakthroughs reported in PHYSICS NEWS UPDATE The American Institute of Physics Bulletin of Physics News Number 236: August 7, 1995 by Phillip F. Schewe and Ben Stein available at http://www.hep.net/documents/newsletters/pnu/1995/pnu-236.html Have fun, - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHg4gSoZzwIn1bdtAQFpWAF9HQg2f8myEyI4HrHY/5ZCnB/nLG+AzZXo rA8zMPMo0l5t24i74tlTBJnaZYS4zkSW =Hq/0 -----END PGP SIGNATURE----- From rjc at clark.net Sun Oct 8 13:55:44 1995 From: rjc at clark.net (Ray Cromwell) Date: Sun, 8 Oct 95 13:55:44 PDT Subject: [NOISE] Caution! Netscape 2.0 and Linux In-Reply-To: <199510081807.OAA00500@hoopsnake.cjs.net> Message-ID: <199510082054.QAA04516@clark.net> > > Hi all. > > Just a warning to steer clear of Netscape 2.0 on Linux. It can't > resolve FQDNs, its distributed as a staticly linked a.out binary > *AGAIN*, and I'm hearing lots of reports sitting here on IRC that it It was released as a dynamically linked binary first, however gazillions of Linux users who didn't purchase Motif (and hence could not run Netscape 2.0 since it uses Motif), complained, and Netscape put up a statically linked version immediately. > locks up R6 versions of XFree solid on a random basis. Not to mention > that there is no java support yet for Linux, and the Java support in > the Sun/Windows version of netscape is based on the new (and > imcompatible with earlier versions) beta version of Java which sun > pimped out to Netscape and won't release the source code too. No, the Java in Netscape 2.0 is Java BETA. The Java used in earlier versions was Java Alpha, and Sun explicitly said that the class hierarchy *would* change. The Java used in Netscape 2.0 is the same Java you get in SunSoft's Java development environment. -Ray From raph at CS.Berkeley.EDU Sun Oct 8 14:17:18 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Sun, 8 Oct 95 14:17:18 PDT Subject: Revised CJR In-Reply-To: Message-ID: <199510082116.OAA03717@kiwi.cs.berkeley.edu> > On Fri, 6 Oct 1995, Raph Levien wrote: > > > SPECIAL CHARACTERISTICS > > > > There are no military standards or specifications that this t-shirt is > > designed to meet. There are no special characteristics of the t-shirt, > > including no radiation-hardening, no ballistic protection, no hard > ^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^ > > points (the t-shirt is only available in soft 100% cotton), no TEMPEST > ^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > capability, no thermal and no infrared signature reduction capability > > (in excess of that provided by a typical black cotton t-shirt), no > > surveillance, and no intelligence gathering capability. The t-shirt > > does not use image intensification tubes. > > Oh I love it. I warm kudo for whoever game up with the above wording (as > well as the rest of the paragraph). :-) Thanks! Actually, I adapted the wording from Phil Karn's CJR for the Applied Cryptography book. I didn't find the time yesterday to send the CJR (instead, I was preparing for a rather cpunks-friendly presentation on Net (In)security to a graduate Business Administration class here at Berkeley for Tuesday. The revised target ship date is Wednesday. Raph From weidai at eskimo.com Sun Oct 8 14:20:40 1995 From: weidai at eskimo.com (Wei Dai) Date: Sun, 8 Oct 95 14:20:40 PDT Subject: anonymous cash without blinding Message-ID: With all this talk about Chuam patents, I would like to remind people that blind signatures are not absolutely essential to an anonymous digital cash system. You can combine a traceable cash system with an anonymous communication system in a fairly obvious way to get a fully (both payer and payee) anonymous cash system. Suppose a bank is running a digital cash system that works like this: it maintains a database of valid coins, and whenever someone presents it with a valid coin (string of bytes) it erases that coin from its database, and then either gives the person an equivelent amount of paper cash or a newly created coin(s) of the same value. Now if the bank allows this exchange of old coins for new coins to be done over an anonymous network (e.g., a remailer-net), then the system is anonymous as long as you don't move physical money in or out of the system. Maintaining anonymity when moving physical money in and out of the system is what blinding helps you to do, but this will be less useful in a fully digital economy where such movement will be infrequent. Wei Dai From cjs at netcom.com Sun Oct 8 14:34:18 1995 From: cjs at netcom.com (Christopher J. Shaulis) Date: Sun, 8 Oct 95 14:34:18 PDT Subject: [NOISE] Caution! Netscape 2.0 and Linux In-Reply-To: <199510082054.QAA04516@clark.net> Message-ID: <199510082024.QAA00698@hoopsnake.cjs.net> > > Just a warning to steer clear of Netscape 2.0 on Linux. It can't > > resolve FQDNs, its distributed as a staticly linked a.out binary > > *AGAIN*, and I'm hearing lots of reports sitting here on IRC that it > > It was released as a dynamically linked binary first, however > gazillions of Linux users who didn't purchase Motif (and hence could not > run Netscape 2.0 since it uses Motif), complained, and Netscape > put up a statically linked version immediately. Releaseing an a.out binary without motif staticly linked is a dumb idea. There were approximately a dozen vendors of Motif for Linux, however none of their libraries were compatible as they could not afree on where the library should reside in memory and how much space to allocate for future additions to the libraries. Thats why the linux developers switched to ELF format binaries. Under ELF all symbol names are resolved at run-time so one man's motif will work just fine for everyone elf. Normally I would suggest that someone should drop the good people at netscape a hint that you can link Motif staticly without linking all of the X11 libraries staticly as well, except they are still producing a.out bins and since nobody has a.out libraries any more, making one dynamicly linked wouldn't do anyone any good. > > that there is no java support yet for Linux, and the Java support in > > the Sun/Windows version of netscape is based on the new (and > > imcompatible with earlier versions) beta version of Java which sun > > pimped out to Netscape and won't release the source code too. > > No, the Java in Netscape 2.0 is Java BETA. The Java used in > earlier versions was Java Alpha, and Sun explicitly said that > the class hierarchy *would* change. The Java used in Netscape 2.0 > is the same Java you get in SunSoft's Java development environment. I said it first, but you said it better. Netscape uses the Beta Java stuff, which is totally incomptible with the Alpha Java stuff. Nobody has the Beta java stuff except for Netscape because sun is refusing to release it to anyone else for the moment -- that means you can't get it at sun's site. Christopher From an402976 at anon.penet.fi Sun Oct 8 14:45:48 1995 From: an402976 at anon.penet.fi (RingZero) Date: Sun, 8 Oct 95 14:45:48 PDT Subject: NEW Netscape RNG hole Message-ID: <9510082136.AA03945@anon.penet.fi> Phil argues this file handle being lost isn't a big mistake. He describes how the function is actually called, which does indeed show that it shouldn't be much of a problem. However, Netscape had not revealed enough information about their RNG to allow myself or other reviewers to determine how critical it was. If, for example, this seeding function were called once every time a secure connection were established, losing a handle would be a major problem. This seems like a good reason to ask for the code for SEC_RandomUpdate(). You show us from what sources you gather bits, but you don't show us how you mix them or, for that matter, stream out "random" bits. If you did have a description in your original published code that was better than "mixing is accomplished with MD5", I must've missed it. RingZero =========== From: Phil Karlton Subject: Re: NEW Netscape RNG hole Date: Sunday, October 08, 1995 1:39AM RingZero wrote: > > Did anyone else notice a bug in the new, public Netscape > RNG code? It appears that on Windows builds, during the > RNG seeding, the function that hashes in file contents > (EnumSystemFiles) doesn't close a file handle (lFileHandle). I think you mean lFindHandle. I'm not a windows programmer, so I have no idea if the enumerator needs to be cleaned up, but I will forward your message to the appropriate folks here. [...] --****ATTENTION****--****ATTENTION****--****ATTENTION****--***ATTENTION*** Your e-mail reply to this message WILL be *automatically* ANONYMIZED. Please, report inappropriate use to abuse at anon.penet.fi For information (incl. non-anon reply) write to help at anon.penet.fi If you have any problems, address them to admin at anon.penet.fi From jya at pipeline.com Sun Oct 8 15:23:10 1995 From: jya at pipeline.com (John Young) Date: Sun, 8 Oct 95 15:23:10 PDT Subject: Calming Message-ID: <199510082223.SAA25223@pipe2.nyc.pipeline.com> PC Mag of Oct 24 odes Damien's mode, yodels out-of-tunely Netscape's sec, cites the sites of the SSL hacking axes, and declares that, whew, nervous darlings, all is lovely waltzing at crypto-crystal ball. Also casts doe eyes at STT and pre-lubed sheaths. It says the "National Security Administration" Rx's 40-56 itty-bit fits for muleing precious US fairy dust. Oilpalming the jittery globalists of squat fearing cleartext. From jlasser at rwd.goucher.edu Sun Oct 8 16:04:13 1995 From: jlasser at rwd.goucher.edu (Jon Lasser) Date: Sun, 8 Oct 95 16:04:13 PDT Subject: subjective names and MITM In-Reply-To: <9510061543.AA26079@alpha> Message-ID: On Fri, 6 Oct 1995, Mike McNally wrote: > > hfinney at shell.portal.com writes: > > m5 at dev.tivoli.com (Mike McNally) writes: > > >hfinney at shell.portal.com writes: > > > > There is a difference between a MITM and the case you describe ... > > > > >Seems to me that the idea of "communicating with the person you think > > >you are" is intractably difficult if you're not sitting in the same > > >room. ... > > > > I can certainly agree with the attractive simplicity of this notion. My > > point is that it is practically useless. ... > > Oddly enough, it seems to me that Hal (if that really *is* his name) > and I (and Carl & others) are saying basically the same things, but > drawing completely different conclusions. Strange. I'm willing to > wait to see what the peer review process concludes. I think Hal and some other Cypherpunks (Me, You, Carl, etc.) are not proceeding from one of the same assumptions. Specifically, Hal seems to be proceeding from the assumption that the person "on the other end of the line" is in fact a known physical entity who has a meat reputation tied to the name. I'm proceeding from the assumption that the person on the other end of the line has no specific RL reputation that I'm basing the relationship on, just the online one. Here's an example: There's someone on the list, now, apparently, with the name of "Steven Levy." Hal assumes that, when communicating with that "Steven Levy," one intends to communicate with the fairly-well-known journalist of that name, and thus certification of RL identity is important. I assume that, unless there's a specific reason otherwise, I want to have an intellectual conversation (or financial transaction, etc) that isn't predicated on this being "the" Steven Levy. In that case, certification of RL identity is irrelevant. (Not to pick on you, Steve, but I needed an obvious example familiar to list members... The other candidate was Steve Wozniak, to whom I sent fan e-mail the other day... :) ) Jon ------------------------------------------------------------------------------ Jon Lasser (410)494-3072 Visit my home page at http://www.goucher.edu/~jlasser/ You have a friend at the NSA: Big Brother is watching. Finger for PGP key. From raph at cs.berkeley.edu Sun Oct 8 16:37:51 1995 From: raph at cs.berkeley.edu (Raph Levien) Date: Sun, 8 Oct 95 16:37:51 PDT Subject: Netscape 2.0 beta Message-ID: <307860AB.167E@cs.berkeley.edu> I just got Netscape 2.0 beta for DEC Alpha. Here are my initial impressions: * Still no Java support (for DEC Alpha) :-(. * I saw no hints of S/MIME support. Did I miss something? Do the binaries for other platforms support S/MIME? I have access to HP, and will probably demand a Sun account from the powers that be here, just so I can run Java. I _really_ want to test S/MIME. * The mail reader facility looks pretty good. The smooth integration of MIME and HTML objects is really quite nice. On the other hand, there are a few UI quirks that will no doubt get ironed out over the coming months. * The .mailcap parser _still_ doesn't recognize %{variable} style entries. Thus, I wasn't able to test Michael Elkins' PGP/MIME format for compatibility with Netscape. The %{} syntax is in the spec (RFC 1524), guys. * To send mail, Netscape apparently connects to the SMTP server running on localhost. I haven't confirmed this. Thus, I don't see any way to integrate Netscape and premail :-(. Guess I'll just have to wait for Netscape script (from what I've seen so far, it's not possible in pure Java). * No user-defined headers from mail :-(. Thus, I couldn't put an "In-Reply-To: " header in this followup. * News is also not bad, but I find I can't zip through tons of low S/N newsgroups the way I can with trn. I tend to rate newsreaders in number of messages deleted per second. I think with a bit more tweaking on the UI, it could really sing. * One slick feature of news is its ability to decode binary postings, apparently in both MIME and uuencode formats. However, I wasn't able to figure out how to decode multiparts. * The UI render code has a number of cosmetic defects (possibly related to the DECness of my machine). One new one is that drag-and-drops leave the Bookmarks window in an inconsistent state, leading one to want to press ctrl-L :-). Overall, nicely done. Mozilla will clearly remain the standard in Web browsers, for the next few months anyway. Raph From frissell at panix.com Sun Oct 8 16:49:11 1995 From: frissell at panix.com (Duncan Frissell) Date: Sun, 8 Oct 95 16:49:11 PDT Subject: Review: Assasins In-Reply-To: Message-ID: Assassins with Sly Stallone and Antonio Banderas with Julianne Moore as the cyberspatial interest. This may be the film derived in part from some writer-type's conversation with our own Tim May. Sly and Antonio get their contracts via computer from an anonymous source. They favor Powerbooks. The source types on the tops of the screens they type on the bottom. The Powerbooks must have built in wireless modems because they are pretty casual about firing them up wherever they happen to be. Julianne is cute. Apparently being a net security expert/hacker is seen as women's work in Hollywood with Sandra in the Net and what's her name in Hackers. Also this sort of life interferes with your social contacts because both Sandra and Julianne seem lonely. Julianne likes cats. The screens look fake (like most Hollywood computer screens). There is minor mention of encryption. Julianne is a "ghost" (self-described) with no SS# or DL. She does have a car and apartment, however. As always in these films, much of the action is motivated by a single high-density floppy. It's amazing the amount of stuff they can get on those disks. Most of these character's problems could be solved if they would simply transfer this info over the nets without having to meet in person. They could also encrypt disks much more than they choose to. Coincidentally, I saw both The Net and Hackers this weekend. It is hard to decide which is the "best." Assassins is slick and Antonio makes a great psycho. [Note to Sly --- Many of your problems as a professional assassin could be solved by a few finishing shots to the head. --- I thought they taught that on the first day in assassin's school.] I suppose I liked Assassins best although Puerto Rico makes a poor stand-in for an island tax haven. I like English accents on my tax haven bankers. DCF "Who is ready to act as an advisor for a small fee to anyone out there who wants to do a real net film." From schampeo at imonics.com Sun Oct 8 16:51:07 1995 From: schampeo at imonics.com (Steve Champeon working from home) Date: Sun, 8 Oct 95 16:51:07 PDT Subject: Netscape 2.0 beta Message-ID: Raph Levien wrote: >* To send mail, Netscape apparently connects to the SMTP server > running on localhost. I haven't confirmed this. Thus, I don't > see any way to integrate Netscape and premail :-(. Guess I'll > just have to wait for Netscape script (from what I've seen so > far, it's not possible in pure Java). You have to set this in the preferences dialog. The default is localhost, assuming that your UNIX box is set up correctly to send mail. I don't know about you guys, but my mailhost is called 'mailhost'. One thing that I found with the newsreader was that it doesn't do POP correctly. No matter what you do with your mail, it still doesn't check for read vs. unread articles. This is fine when you have a mailbox with one message. It can be annoying when you have 110 messages in your mailbox and don't want to 1) delete them or 2) download them twice. Not that I'm complaining. I'm still gigling from the introduction of frames and client-side imagemaps (which also don't work on the Solaris 2.4 version, running on Solaris 2.5beta/CDE)... Steve -- Steven Champeon (919) 469-7833 Technical Lead, schampeo at imonics.com Imonics Web Services webmaster at imonics.com From Nahum.Goldmann at ARRAYdev.com Sun Oct 8 16:54:50 1995 From: Nahum.Goldmann at ARRAYdev.com (Nahum Goldmann) Date: Sun, 8 Oct 95 16:54:50 PDT Subject: The Ultimate GUK[TM] (Globally Unique Key) Biotech Racket Message-ID: <199510090009.UAA19196@array1.arraydev.com> Adam Shostack writes: >... For keys to be >really global, there needs to be a mechanism in place for insuring >that key ids are very probably unique. ___________________________________________________________________ And Hal >... The fact is, we live in a world populated by >people and companies and we use names to identify them. I will grant >that there are problems with uniqueness but... ___________________________________________________________________ No problem. The ultimate way to ensure that keys are globally unique is to link them to the person's own genetic code. Fingers they might cut, but... Just imagine, in 1999+ every department store and a mall in the land will provide a service of a quick DNA scan and key mapping. Most likely they will put the small scanning machine in the shoe repair section, to substitute for the metal key cutting business. You put your hair in and -- voila! -- the thing will insert your unique key in your own smart card. For corporations they might require to keep in perpetuity a piece of a founding CEO in a cookie jar. The U.S. Government will have to unearth again poor Ulysses S. Grant, this time with a far more valid reason. Or perhaps Mr. Clinton would volunteer a donation in kind. With so much of happy progress, one might like to puke... Except, there is too much genetic material there to incriminate you far beyond the reasonable doubt. Unless, of course, you can afford Mr. Cochrane as your attorney. Being a Goldmann, the last thought really scares me. Very best to all and sundry. ___________________________________________________________________ P.S. Scott Brickner said: >... Remembering >that we're talking about a world that's sufficiently changed as to >permit anonyms at all... Right on! Nahum Goldmann, ARRAY Development Inc., Ottawa, Canada Phone 613-733-0399, FAX 613-733-5691, email: Nahum.Goldmann at ARRAYdev.com> Homepage: http://www.ARRAYdev.com/ N. Goldmann, Online Information Hunting - the first book for the end-user! From jwz at netscape.com Sun Oct 8 17:16:13 1995 From: jwz at netscape.com (Jamie Zawinski) Date: Sun, 8 Oct 95 17:16:13 PDT Subject: [NOISE] Caution! Netscape 2.0 and Linux In-Reply-To: <199510082054.QAA04516@clark.net> Message-ID: <3078691D.50683E45@netscape.com> (I have no idea what this has to do with Cypherpunks, but...) Christopher J. Shaulis wrote: > > Releaseing an a.out binary without motif staticly linked is a dumb > idea. It wasn't a dumb idea, it was a mistake :-) We didn't intend to do it. > Thats why the linux developers switched to ELF format binaries. Under > ELF all symbol names are resolved at run-time so one man's motif will > work just fine for everyone elf. Even when ELF has taken over the Linux world, we will still be linking Motif statically because we can't count on everyone having it, and even if we could, we can't count on everyone having the same version. And if Motif is static, then the other X libs have to be static, because all versions of Motif won't interoperate with all versions of Xlib and Xt. (In particular, Motif 1.2.4 and X11R6 don't get along.) > Normally I would suggest that someone should drop the good people at > netscape a hint that you can link Motif staticly without linking all > of the X11 libraries staticly as well, except they are still producing > a.out bins and since nobody has a.out libraries any more, making one > dynamicly linked wouldn't do anyone any good. If you can prove that "nobody has a.out libraries any more," we will stop distributing a.out binaries and start distributing ELF binaries. But we don't have the resources to build and test two Linux binaries, especially given that we don't sell the Linux version. So, given that we're only building one binary, my belief is that everyone will be able to run an a.out binary, and a much smaller number of people will be able to run an ELF binary. If you have numbers, I'd be happy to be proven wrong. -- Jamie Zawinski jwz at netscape.com http://www.netscape.com/people/jwz/ ``A signature isn't a return address, it is the ASCII equivalent of a black velvet clown painting; it's a rectangle of carets surrounding a quote from a literary giant of weeniedom like Heinlein or Dr. Who.'' -- Chris Maeda From perry at piermont.com Sun Oct 8 17:18:01 1995 From: perry at piermont.com (Perry E. Metzger) Date: Sun, 8 Oct 95 17:18:01 PDT Subject: Java Message-ID: <199510090017.UAA00652@jekyll.piermont.com> As long as people are mentioning Java, I just want to make the prediction, one more time, that at some point someone is going to find some devistating security holes in HotJava. In order for HotJava to be completely safe, the Java security model needs to be perfect (and it is way too complex to prove correct), you need a perfect implementation of this perfect security model, no code in the Java implementation outside the security code can adversely impact the function of the security code, and there has to be no way that a bug in the code outside the Java implementation can screw with the internals of the Java implementation in such a way as to get it to drop its security. I don't believe that humans can produce something that satisfies all four criteria given our current state of technology. Java is just too complex a language for me to believe that it can have been perfectly specified and implemented. Enormous risk -- I really mean ENORMOUS risk -- is being taken in order to add a little convenience in making web applications pretty. Someday, there is going to be big trouble from this. *BIG* trouble. You heard it from me first. You might ask "Perry, what could possibly satisfy your perfectionistic criteria?" Well, a language that didn't have any I/O or similar "dangerous" capabilities in it at all, rather than one in which such capabilities were selectively "restricted", would be one I would feel much more comfortable trusting. If written in a fairly safe language where it is hard to pull buffer overflow tricks, the interpreter for such a language would be very hard to pervert into doing untoward things. Java isn't like that, though. Its got the full power and glory of any other language, and the only thing sitting between a HotJava app and some really nasty viral effect is a paper thin shield -- the security model. A couple of bits twiddled in the right place and the shield is gone. The best things about Java could probably have been achieved without giving it so much power. Its too late now, though. The bandwagon is too far along. As a security consultant, I'm of course in a position to profit from the wreckage, but frankly I don't like that any more than an aircraft disaster expert wants to see more aircraft accidents. Perry From patrick at Verity.COM Sun Oct 8 17:32:45 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Sun, 8 Oct 95 17:32:45 PDT Subject: Graphic encryption Message-ID: <9510090028.AA02204@cantina.verity.com> > From: Andrew Loewenstern > > > Is there anything particular in graphic encryption? I usually > > encrypt graphics and document images as regular files with regular > > encryption... > > I believe graphic encryption outputs a valid image file that is apparently > white noise until you perform the decryption transformation on it. An > obvious way to do this with a non-lossy file format is to encrypt pixel vales > with a stream cipher. Another way to make the image unviewable would be to > shuffle the pixels or rasters with a PRNG. > I thought it was the ideas presented in Dr Dobbs last year of encoding other information in a graphic image so that the image still looked the same, but the other information could be extracted...i.e. using the image as a covert channel. Does anyone know what they're really talking about? Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From patrick at Verity.COM Sun Oct 8 17:34:48 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Sun, 8 Oct 95 17:34:48 PDT Subject: subjective names and MITM Message-ID: <9510090031.AA02210@cantina.verity.com> > From: Scott Brickner > > Patrick Horgan writes: > >Given the difficulty of finding primes, how likely do you think it is that > >given one of the well known methods and finding the first 1024 bit prime > >that pops out would give you an effective attack? > > I'm not an expert here, but I understand the "well-known methods" to > essentially use some formula that "tends" to generate prime numbers from > uniformly distributed numbers, feed it a "good" random number, and then > check to see if it's really prime. If it's not, pick another "good" > random number and try again. The entropy in the prime is the same > as in the random number generator. > Can someone give me pointers to literature on this? Books prefered. Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From cman at communities.com Sun Oct 8 17:52:22 1995 From: cman at communities.com (Douglas Barnes) Date: Sun, 8 Oct 95 17:52:22 PDT Subject: cypherpunks digicash bank? Message-ID: >Douglas Barnes writes on cypherpunks: >> I'm afraid you may have somewhat misunderstood the motivation behind >> the Identity Agnostic paper. In no way is it intended as a way of >> not facing the music wrt regulators in the country(s) where such an >> institution has offices. The IA approach is intended as an possible >> alternative for an institution that might otherwise license from >> Chaum. > >So it's intended for avoiding patent issues only? Yes, and not really so much because of price. I'm not the only person who has found David hard to work with -- he has apparently decided to only license "respectable" organizations that will not, in his eyes, make his technology look "bad". I can tell you from painful, expensive experience that a band of cypherpunks does not qualify as "respectable" in his eyes. Alas for David, his technology is fundamentally cypherpunk -- there is little motivation for a "respectable" institution to be the first penguin on this stuff. So, if you're a bank, licensing from David is cheap and relatively painless, but there are powerful disincentives to deployment. Also, assessing demand is problematic. For a small cypherpunk startup, the demand is obvious, there are powerful incentives, but the cost of licensing and David's reluctance to license a slightly wild-eyed startup act as a barrier. There is certainly a middle ground, but nobody seems to be stepping forward. My understanding was that we were exploring the idea of a much smaller, non-bank organization going into the digital cash business. Note that while this is theoretically interesting to me, the fact that I'm talking openly about this stuff is largely due to my decision _not_ to get personally involved in this kind of venture except as a sidelines cheerleader, or as an absolute last resort if nobody deploys. Given that we're talking about a small, cypherpunk-motivated NBFI, I think the IA stuff will work fine. It should be presented to the regulators as if it were a fully-blinded system, since there won't be any guarantee that blinding isn't occurring. You raise the issue of using software not supplied by the "bank" -- if we're talking about a c'punks project, I'd assume you'd make the full source code of the system available. The change of a client from non-blinding to blinding would be about two lines of code. You've also discussed the issue of commercial uptake -- as I see it, one of the primary goals of a project like this would be to provide incentive to deploy to the allegedly numerous Chaum licensees that have not implemented a damned thing so far. And, with a nice interface -- or at least the sort of generic GUI interface you can get with Java -- it might do surprisingly well on its own merits. Realistically, as soon as someone large comes along, you're likely to get squashed. But it would be an interesting ride, and you might just end up getting bought out instead of squashed. As for a limit on transaction size, my understanding is that Mondex is using $300 initially as a transaction limit. This certainly seems reasonable, and it skates in underneath a lot of magic numbers. From bcn at ISI.EDU Sun Oct 8 18:12:38 1995 From: bcn at ISI.EDU (Clifford Neuman) Date: Sun, 8 Oct 95 18:12:38 PDT Subject: anonymous cash without blinding Message-ID: <199510090112.AA17509@darkstar.isi.edu> Date: Sun, 8 Oct 1995 14:20:27 -0700 (PDT) From: Wei Dai Now if the bank allows this exchange of old coins for new coins to be done over an anonymous network (e.g., a remailer-net), then the system is anonymous as long as you don't move physical money in or out of the system. Maintaining anonymity when moving physical money in and out of the system is what blinding helps you to do, but this will be less useful in a fully digital economy where such movement will be infrequent. See: Gennady Medvinsky and B. Clifford Neuman. NetCash: A design for practical electronic currency on the Internet. In Proceedings of 1st the ACM Conference on Computer and Communication Security November 1993. For a discussion of the tradeoffs for this weaker form of anonymity. You can find postscript for this paper as: ftp://prospero.isi.edu/pub/papers/security/netcash-cccs93.ps From scs at lokkur.dexter.mi.us Sun Oct 8 18:13:41 1995 From: scs at lokkur.dexter.mi.us (Steve Simmons) Date: Sun, 8 Oct 95 18:13:41 PDT Subject: The Ultimate GUK[TM] (Globally Unique Key) Biotech Racket In-Reply-To: <199510090009.UAA19196@array1.arraydev.com> Message-ID: <1995Oct9.011154.26189@lokkur.dexter.mi.us> Nahum.Goldmann at ARRAYdev.com (Nahum Goldmann) writes: >No problem. The ultimate way to ensure that keys are globally unique is to >link them to the person's own genetic code. Fingers they might cut, but... Two words: identical twins. Two more workds: gene therapy. The first generates non-unique keys, the second makes the code modifiable. -- "For the last five years, the number of machines on the network has been rising between five and 10 times faster than the number of transistors on a chip." `THE COMING SOFTWARE SHIFT' by George Gilder, Forbes, 8/8/95 From bdavis at dg.thepoint.net Sun Oct 8 18:27:56 1995 From: bdavis at dg.thepoint.net (Brian Davis) Date: Sun, 8 Oct 95 18:27:56 PDT Subject: Certification Authorities in history. In-Reply-To: <199510080718.AAA02155@ix5.ix.netcom.com> Message-ID: On Sun, 8 Oct 1995, Bill Stewart wrote: > Timothy C. May (or somebody like him, or Tim the Enchanted) wrote: > >> The talk of certification authorities is OK, so long as the practice is > >> _completely_ and "strongly" voluntary (*). > > It occurred to me that the authors of the US Constitution had > direct experience with the equivalent of mandatory certification hierarchies > for legally acceptable digital signatures. > > They called it "The Stamp Act". > > If you wanted to make a legal document, such as a contract or will, > it needed to be on paper with a tax stamp on it; I forget if this was > a watermark or a stick-on stamp, but you could only get it from the authorities. > > They didn't like it. There was also a few-percent sales tax on tea around > that time. They didn't like that either :-) But their principal reason for disliking it was "Taxation without representation." Today, you get to vote on those who decide on taxes, unlike the colonists .... EBD From bdavis at dg.thepoint.net Sun Oct 8 19:12:10 1995 From: bdavis at dg.thepoint.net (Brian Davis) Date: Sun, 8 Oct 95 19:12:10 PDT Subject: Certification Authorities in history. In-Reply-To: <199510081726.KAA10621@jobe.shell.portal.com> Message-ID: On Sun, 8 Oct 1995, Hal wrote: > One key to rule them all; > One key to find them; > One key to bring them all > And in the darkness bind them. In the land of Langley, where the shadows lie. From tcmay at got.net Sun Oct 8 20:06:33 1995 From: tcmay at got.net (Timothy C. May) Date: Sun, 8 Oct 95 20:06:33 PDT Subject: Crypto's Role in Evil? Message-ID: Surely most of you know of my interest in enhancing liberty and freedom through strong crypto. (The many newcomers to the list in the wake of the Netscape news may not, but take my word for it...) And I have clearly indicated that many of the implications of strong crypto, anonymous remailers, untraceable digital money, data havens, and so on, will severely undermine many programs that some people think are useful and good. We avoid discussing these issues so as to avoid ideological flame wars, but the effects are still there. In the view of some of us, strong crypto and the swirl of ideas called "crypto anarchy" will mean that the transactions people enter into are the ones they wish to enter into. No more "affirmative action," no more transfer payments to the indigent and lazy (or to anyone else, except by personal choice), no more quotas, no more workplace rules (at least in cyberspace). Transnationalism, regulatory arbitrage, etc. (Granted, this Cyper-Millenium may not arrive by the time the real millenium arrives, and the precise form is unclear. But there is little doubt that the strong crypto most of us advocate will strongly advance the "libertarian" agenda, and will have very negative effects on "traditional liberalism" and law-based "social justice" policies. My personal view is that an ever-shrinking elite (20%, then 10%, then 2%, ...) will dominate high-value transactions, with the mass of humanity offering little or nothing worth buying. Just my view.) But Lucky Green has touched on some items I feel dutybound to comment on: At 8:19 PM 10/8/95, Lucky Green wrote: >Let me illustrate this with an example. During my visit to Dachau >Concentration Camp, I saw original lab notebooks of experiments designed >to increase the survial rate of pilots downed above the cold waters of the >North Sea. A noble cause. > >The notebooks contained pages upon pages of tables listing survial times >vs. water temperature, the data gained by dropping subjects into a tub >containing water of a defined temperature. There are places and countries which are attempting to outlaw the _use_ of these Nazi medical experiments. The implication: Nazi medical data will be one of the first sorts of information to go into Cypherpunk data havens. Maybe not put there by Lucky, maybe not even by me (though I see nothing wrong with using the data...the Jews are dead, and not using the data does not bring them back, so....). People need to at least think about what our anonymous remailers and data havens are likely to involve. Consider some entries: - results of Japanese medical research on Chinese captives in Manchuria (apparently the experiments were extensive, and American doctors gained access after the war...the experiments gave us our first lead on biological warfare, as the Japanese had exposed a lot of captives to various toxins and biological agents) - results of experiments on live subjects in Third World nations (right now it is "uneconomical" to do much of this, because of the lack of a market for the data) - data on RU-486 abortifacients and similar drugs, and at least _some_ people think abortion is murder. (I hold to the notion that a child can be killed up to the time he is christened, or given a name. This gives from several days to several weeks (or even longer, in some cultures) to decide if the newly-born organism is actually human or not. This has no crypto relevance, except to indicate that many of us hold views considered extreme to others....we're not all just "Pro Choice" in the liberal sense.) - better methods of killing people (not just the pseudo-science in the "How to Kill People" sorts of books that Loompanics and Paladin sell, but a real "information market") - "How to Make Anthrax Bacillus in Your Basement," "Nuclear Triggers," etc. In the next 10 years, expect a couple of "controversial" documents to appear on anonymous sites. In the next 10 years after that, expect an explosion of information. (I could be wrong...I'm trying not to sound optimistic about it happening too soon.) >I them saw more tables of the effects of various methods investigated to >revive hypothermia victims who were near death. One of the treatments >under investigation was dropping the patient into boiling water. Surely >this type of research falls under the category of evil. Does anyone have a URL for these results? >Ponder this, Indeed. And crypto anarchy will make this information liquid and widely available, perhaps even stimulating the production of even more such data by various means. ("Evil Hypothetical": The mostly-doomed orphaned street urchins of Calcutta, Rio de Janeiro, and Mexico City are grabbed off the street, subjected to various experiments, and the results sold on anonymous information markets....I could even make a kind of argument that since they're going to die anyone, why not get some useful data out of them. And why not subject prisoners facing execution to various experiments? Yes, both paths have problems. Doesn't mean someone won't meet market needs this way, though.) Oh, and did I mention the markets for organ transplants? Anonymous matching of recipient needs could be done, with the only real world contact being the arrangement for the patient to fly to a hospital in Burma or Singapore. The harvesting of organs from the ultra-poor? (The topic of organ-legging has been well-covered by dystopian SF, including works by Niven. Information markets add a new and intriguing dimension.) --Tim May, who will pay $35,000 for accurate mortality studies on at least 20 subjects of Iboviroxinase-D. Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From rjc at clark.net Sun Oct 8 20:07:35 1995 From: rjc at clark.net (Ray Cromwell) Date: Sun, 8 Oct 95 20:07:35 PDT Subject: Java In-Reply-To: <199510090017.UAA00652@jekyll.piermont.com> Message-ID: <199510090307.XAA10293@clark.net> Well those concerns are all fine and swell, but the same kind of reasoning applies to any network application. There are buffer overflow bugs in almost every web browser, there are overflow bugs in CERN HTTPD3.0, and who knows, there are probably bugs in ELM/PINE. Millions of people download software from the internet without seeing the source code everyday and risk getting hit by trojan horses and viruses. People make all kinds of transactions everyday where they rely on nothing more than trust. (and a future tit-for-tat legal suit if possible) I am of the opinion that risk is good. Java will not be perfect. There will be holes, I'm sure of it. And each generation of web languages will be more efficient and more secure, but none will ever be perfect. It's all part of evolution. It's a problem that will be researched and improved on, but you've got to break some eggs to make a cake somewhere. And the situation without Java is not much better. Most of Java functionality is faked with CGI scripts, usually written in perl, and there are plenty of ways to screw up a CGI implementation to allow holes. As I mentioned before, Java file i/o is not built into the language. It is provided through a Java class you can use that implements native C code methods. This is where the write restrictions are handled. All that is needed to remove the ability to do file i/o is to delete this class from your installation. It's like having C, but no standard library. Java is mostly a risk to consumers (the users with the browsers), and not corporate networks who are running servers, *unless* the employees are using Java on the firewalled network. Java is a lot better than the situation with microsoft network, whereby a user can send you a 386 executable, and it shows up with an icon saying "click me" on your desktop, and clicking on it will run it. -Ray From ravage at einstein.ssz.com Sun Oct 8 20:23:20 1995 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 8 Oct 95 20:23:20 PDT Subject: Nov. meeting: Austin, Tx Message-ID: <199510090319.WAA00817@einstein.ssz.com> Hi all, The next meeting of the Austin Cypherpunks will be on Nov. 7 from 6-8pm at Ted's Greek Restaraunt on Congress at 4th. near Oscar Snowden. We will be meeting in the rear. The get together yesterday was pretty well attended with 5 person as well as Strick from the California cpunks. Thanks to those who attended and hope to see more of those who didn't at the next meeting. Jim Choate CyberTects ravage at einstein.ssz.com From perry at piermont.com Sun Oct 8 20:25:57 1995 From: perry at piermont.com (Perry E. Metzger) Date: Sun, 8 Oct 95 20:25:57 PDT Subject: Java In-Reply-To: <199510090307.XAA10293@clark.net> Message-ID: <199510090325.XAA04766@jekyll.piermont.com> Ray Cromwell writes: > Well those concerns are all fine and swell, but the same kind > of reasoning applies to any network application. There are buffer overflow > bugs in almost every web browser, there are overflow bugs in CERN HTTPD3.0, > and who knows, there are probably bugs in ELM/PINE. I believe that the security related ones in those applications are well within human ability to fix -- simply implementing some hygenic coding practices stops them. I don't believe that is the case with Java implementations. I don't know how I'd manage to produce a "safe" Java. Its a neat programming language, by the way -- its only when you rig yourself to automatically run code produce by hostile people that the issue comes up. > And the situation without Java is not much better. Most of Java > functionality is faked with CGI scripts, usually written in perl, > and there are plenty of ways to screw up a CGI implementation to allow > holes. Thats true, but again, there is the alternative of gaining the functionality with truly safe languages. > Java is mostly a risk to consumers (the users with the browsers), and > not corporate networks who are running servers, *unless* the employees > are using Java on the firewalled network. Unfortunately, it will be very hard to stop people from doing just that. Perry From patrick at Verity.COM Sun Oct 8 20:34:23 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Sun, 8 Oct 95 20:34:23 PDT Subject: Two bugs in CERN3.0 HTTPD Message-ID: <9510090330.AA02282@cantina.verity.com> > From: Ray Cromwell > > Suffice it to say, the CERN code is *littered* with temporary local > stack arrays, and I'm guessing that many of them have faulty bounds > checking (or none at all) > > -Ray Three cheers for C++ which let's us make types without these problems:) Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From sandfort at crl.com Sun Oct 8 20:40:48 1995 From: sandfort at crl.com (Sandy Sandfort) Date: Sun, 8 Oct 95 20:40:48 PDT Subject: Announcing a New Offshore Financial Service (fwd) Message-ID: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SANDY SANDFORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C'punks, The ideas ARE getting out there. I don't think I'll be availing myself of the following services, but am forwarding this FYI. S a n d y ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Offshore Assets Reconciliation Limited 55 Frederick Street P.O. Box CB13039 Nassau, Bahamas email: 71522.2715 at compuserve.com phone: (809) 356-2093 fax: (809) 356-2095. � OAR is dedicated to providing financial privacy and the processing of global financial transactions. OAR will provide for your secured online financial transactions. Your financial transactions, instructions and data are safe from prying eyes. OAR precludes having your private email read by hackers and snoopers on the Internet. � OAR is a pioneer in using the quality encryption technique, Pretty Good Privacy (PGP)[tm], for the receipt of instructions and for providing confirmation of transactions and status reports to our clients. PGP is one of the most popular worldwide encryption techniques and has not been breached to our knowledge. Other systems (Netxxxx) have, on two occasions, once in France and again in California, by student hackers. � Using the Internet, OAR can accept PGP instructions from our clients and to act upon them worldwide. OAR is situated in Nassau, centrally located for operating in the Caribbean and Central American but is also equipped to function in over 20 international financial centres (Isle of Man, Bermuda, Cook Islands, Vanuatu, etc.). � We can execute you financial transactions, move cash from bank to bank, from brokerage accounts to bank, attorney, escrow account, etc. You instruct us by PGP as to what you need accomplished. We can also provide for pass phrases in addition to PGP which some find absolutely crucial when handling financial transactions on line. � OAR is bonded. � �If you need to send an international email message containing confidential and sensitive financial information, use OAR.� Schedule of fees: 1. Basic set-up charge of US$500.00, non-refundable. 2. Annual renewal fee of US$250.00, per year. 3. Transaction fee, US$50.00 per transaction, plus actual costs (wire transfer fee, FedEx, DHL, UPS, etc.). To be charged against your credit balance which must be advanced, minimum of $100. 4. Optional mail fowarding service. We will accept your international mail and re-mail it with a U.S. postmark from locations in the U.S. US$240/year. We will repackage you mail and pay for new postage. APPLICATION TO OPEN AN OeAR ACCOUNT Client�s Name: ______________________________________________ Mailing Address: ______________________________________________ ______________________________________________ Telephone: __________ ___________ ________________________ Fax: _______________________ ___________________ _________________ Email: ___________________________ or ______________________________ Optional Passphrase, to be included in any message to us and if not contained therein, we are authorised to ignore your instruction: __________ None Passphrase: ____________________________________________________________ ________________________________________________________________________ NOTE: If no passphrase is specified above, then we then will asssume that none is required by you. PGP Public Key. Provide it on a 3 1/2 inch floppy disk (IBM format, only) with your application or email the public key to the above email address. Further terms: 1. Client understands that OAR will use selected banks of their choosing to assist in your financial transactions. Any fees charged by said banks will be charged to the client�s advanced account balance. No interest will be earned by you during the transit of your funds nor on you credit balance for future costs. 2. OAR has the right to terminate your account where in their exclusive discretion they do not believe that they can serve the client. Upon our termination of an account, OAR will forward the account balance to the client per the client�s instructions. 3. Disclaimer: OAR accounts may not be utilised for money laundering, criminal activities, racketeering, as defined in any country in which the transactions are being effected, nor for any fraudulent purposes. Discovery of this conduct by OAR will be a basis for immediate termination of the account. Date: ___________________________ ______________________________ Client�s Signature From blancw at accessone.com Sun Oct 8 21:12:03 1995 From: blancw at accessone.com (blancw at accessone.com) Date: Sun, 8 Oct 95 21:12:03 PDT Subject: Crypto's Role in Evil? Message-ID: <9510090412.AA02181@pulm1.accessone.com> The cpunks like to avoid bringing up these issues because they become so complex, convoluted, involved, & protracted, but these comments from Timothy C. May are real discussion-bait. In the past, when I have read the non-libertarians on the list argue against the ideas of those libertarian/anarcho-capitalist cyphertypes on the list, but who nevertheless also involve themselves with the mechanics and successful implementation of unbreakable crypto ("strongly voluntary", of course), I have wondered if they had thought much on what this would be making possible in the real world of future events, since it would involve such activities as Tim outlined - possibilities which their philosophical sympathies would compellingly induce them to call for strong controls against its widespread, easy employment. TCM: "In the view of some of us, strong crypto and the swirl of ideas called "crypto anarchy" will mean that the transactions people enter into are the ones they wish to enter into. .... Indeed. And crypto anarchy will make this information liquid and widely available, perhaps even stimulating the production of even more such data by various means." One thing I can think of, since crypto is supposed to level out the playing field, is that those who are aware of how this information is being got (the methods and means by which it is being obtained) will also have the means to communicate this information to those who have an interest (nay, a stake) in knowing about it. [Conspiracy theories abounding. This makes me think of a movie I saw once set in the French pre-revolutionary period, where Marquises and other mukkety-muks were at an elaborate evening dance. Everyone was secretly passing around messages on little pieces of paper, each of which said "kill so& so". It was an exciting, eventful evening.] Another thought is that as people become more separated into individual self-reliance, they must develop other ideas, organizations, or means by which they may defend themselves from abuse. That is, if they cannot rely on governments (as they come to realize that governments don't make much difference in terms of salvation), then individuals must become more imaginative over how they can defend themselves against those who are not so conscientious in upholding a sense of personal honor & moral rectitude. Perhaps the new cyberage would assist in the spread of such ideas as well (perhaps even using the new mind-wave machines). As people keep repeating, "May you live in interesting times." .. Blanc From ses at tipper.oit.unc.edu Sun Oct 8 21:14:06 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Sun, 8 Oct 95 21:14:06 PDT Subject: Java In-Reply-To: <199510090017.UAA00652@jekyll.piermont.com> Message-ID: Perry - This has come up several times on the java list; some of them are covered in the papers on java security, but there's no reason to believe that the treatment in those papers is necessarily correct. Given the fact that it has proved possible to core-dump the jvm interpreter in the past, it's possible there may be security leaks in the implementations out there. If anybody is going to perform a more rigorous evaluation of the both the theoretical security model, and of the re-ified systems curently extant, looking at java the language is not the best place to start. A much better place to start is to look at the class loader and the java VM The major assumptions needed to allow for security are: 1. It's impossible to upwards modify the JVM call stack. 2. It's impossible to construct a pointer to an object except via controlled calls to the JVM 3. It's impossible to store a value of one type and access it as another. 4. It's impossible to access non-public fields of an object I'm not sure if these are sufficient; however they do present the most promising candidates for attacks. If 1 is false, then it becomes possible for a remote class to pretend to be a local class, and thus gain access to the file and networked classes. If 2 is false, then the method gains un-restricted access to memory. 3 is similar to 2 - if you can turn an int into a pointer, you've won. 4 is imporant for many reasons - one obvious use is to change the the class-loader in a remote class to disguise it's origin, with the same result as 1. Any attack on the Java VM should start with the verifier in the class-loader. This is supposed to prevent 2 & 3. One of the sun papers refers to the verifier as a theorem prover- to me this implies that the design has been formally verfied, but then we know how much that's worth, don't we Phil :-) BTW, source code for the Java VM is available for no cost; you just need to send in a request to the java team, and a notarised affidavit affirming that X sucks and NEWS was infinitely cooler. See the java pages for more info (http://java.sun.com/) Simon p.s. Strange fact: There's a reference to one of Allan Schiffman's papers in the first Java security paper's bibliography. The paper has nothing to do with S-HTTP or any other aspect of security. There also doesn't seem to be any actual cite in the paper itself. Go Fig... From cman at communities.com Sun Oct 8 22:24:48 1995 From: cman at communities.com (Douglas Barnes) Date: Sun, 8 Oct 95 22:24:48 PDT Subject: Conference Summary, Part the First Message-ID: INTRODUCTION As you may know, I attended the Fourth International conference on Money Laundering, Forfeiture, Asset Recovery, Offshore Investments, the Pacific Rim and International Financial Crimes last week. I will be dribbling my trip report out over the next week. The conference was attended primarily by lawyers, bank "compliance officers", law enforcement personnel and federal regulators. There were several main themes through the conference: o How existing and soon-to-exist regulations affect banks and NBFIs (Non-bank financial institutions) with respect to money laundering. o How the US is projecting its notions of fiscal propriety around the globe. o Scary stories about things bad people do. There were also a few bits that prevented it from being a complete pro-law-enforcement rally, including an interesting bit on foreign asset protection trusts and a single speaker who dared to suggest that if we stopped treating drugs as a law enforcement problem, perhaps we wouldn't have such a serious problem with money laundering. There was also the bizarre substitution of a marketroid from First Virtual for one of the speakers. Despite this somewhat bleak description, it was extremely educational, and, I think quite useful -- the utility coming not so much from the explicit content, but rather from the subtext of the talks, the interactions between the different parties, the hallway conversations, and the vast tracts of ignorance with respect to cyberspace that were displayed (and, to be honest, openly admitted) in some of the talks. Some quick morsels of interest: o Regulators are not amused by attempts to run unlicensed online banks. They are aware such things are starting to pop up, and they are very interested in shutting them down when they do. o The same goes for NBFIs (Non-bank financial institutions) -- these appear to be regulated primarily at the state level, with some IRS and FinCEN involvement. These include everyone from stock brokers to Casas de Cambio. (I shared a table with a lawyer from Chula Vista who represents some of these guys -- he had a wonderful sense of humor and we began to worry we'd get chucked out for laughing at the wrong parts of the presentations.) o The attendees displayed an understanding of the situation wrt electronic payment systems that ran from dim to non-existent. A surprisingly large number of them had heard of David Chaum, who apparently has been hob-nobbing with them a bit. I don't think much of what he's said has sunk in, beyond some acquisition of the notion that non-anonymous systems can pose privacy problems. THE _REALLY_ SCARY PART New Regulations Coming, Old Regulations Reinterpreted Recent legislation and regulation on money laundering is moving in the following direction: o Fewer formal, specific or deterministic rules for reporting suspicious transactions. o More vague, subjective, and privacy-invading rules for reporting suspicious transactions, coupled with more severe penalties for banks and NBFIs. More specifically ("bank" includes NBFIs): o Banks are now considered "deputies" of the federal government in the War On Money Laundering. o Banks have an affirmative duty to use their resources to seek out and report on suspicious activity. o Banks must implement strict "Know Your Customer" policies. o If money launderers are found to be using a bank, a bank can be closed down (Under Annunzio-Wylie "death penalty" provisions); penalties are mitigated if: o Senior officers are aware of and pushing for compliance with m.l. regulations. o Bank has strong controls that were thwarted in a new or unusual way. o Bank cooperated (and has a history of cooperating with) Law Enforcement Agencies, including appropriate filing of Currency Transaction Reports (CTRs), Suspicious Activity Reports (SARs) and Criminal Referral Forms (CRFs). o Bank instituted new controls after m.l. incident. o Removal of bank would harm community. The primary representative of the regulators, Dan Sato, made it very clear that it was not the government's job to define "suspicious" behavior, but that this was up to the banks. This has the effect of causing the banks to implement far more restrictive and invasive policies than the government could ever explicitly mandate. Those of you who have recently experienced new account paranoia at banks should take note -- it's going to get much, much worse. Current compliance measures being used or proposed for use by the industry itself include: o Increased ID requirements for new accounts, including bank references, follow-up investigation, flagging of mail-drop addresses, etc. One attendee described some software to detect new account fraud in glowing terms. o Use of transaction profiling to detect unusual patterns; use of AI at banks to turn them into mini-FinCENs. o Pre-loading transaction profiling with a detailed questionnaire given to customers when account is opened: "Do you plan to make any large cash transactions?", "Do you plan to send or receive any wire transfers?" -- answers trigger further investigation and documentation of the customer's reson for using these services. Note that equivalent measures and software are enthusiastically embraced by the people involved in NBFIs, including a representative of a large money transmitter I spoke with. Most of the discussions on the subject of bank regulation wrt money laundering featured some input from John Byrne, a lobbyist for the American Banker's Assocation, and, for reasons which are clear, "the first private sector recipient of FinCEN's Director's Medal for Exceptional Service." Mr. Byrne continued to provide exceptional service for the government throughout the conference, a model of government-industry cooperation. It is important for people not involved in the banking industry to realize that it is very tightly regulated, with a good deal of highly subjective lattitude given to bank examiners. There is very little due process available to banks wrt the judgements made by examiners, and banks wisely do whatever they can to avoid irritating the government. The alternative is higher fines and less benefit of the doubt when they inevitably screw up and violate one of the yards of regulations affecting them. [I am continuing to research how control is extended to NBFIs.] This enthusiastic compliance is not too surprising. In fact, one of the recurring complaints from the bankers was that over the years they had dutifully filed Suspicious Activity Reports and Criminal Activity Forms and nothing ever happened; as a reward for their concerns, they now have an affirmative duty to follow up on these forms if they don't hear back from an appropriate LEA. (Failure to follow up is now considered a form of willful blindness.) And finally, for your entertainment and edification, here are some examples of "suspicious behavior", generally: o Insufficient, false, or suspicious information provided by the customer. o Cash deposits, purchase and/or deposits of monetary instruments, or wire transfers which are not consistent with the business activities of the customer. (Ponder for a bit how closely a bank has to understand you and your business to make this determination.) o Structuring of transactions to avoid reporting requirements (a running joke in the conference was that a $9,500 cash transaction is far more suspicious than a $24,000 one.) o Funds transfer to foreign countries. More specifically: o Customer is reluctant to provide information requested for proper identification. o Customer opens a number of accounts under one or more names and subseqently makes deposits of less than $10K in one or more of them. o Customer is reluctant to proceed with transaction after being informed that a CTR will be filed. o Customer makes frequent deposits or withdrawals for no apparent business reason, or for a business which generally does not involve large amounts of cash. (Again, ponder the process of determining this.) o Customer exchanges large amounts of currency from small to large denomination bills. o Customer makes frequent purchases of monetary instruments for cash in amounts less than $10K. o Customers who enter the bank simultaneously and each conduct a large currency transaction under $10K with different tellers. o Customer who makes constant deposits of funds into an account and almost immediately requests wire transfers to another city or country, and that activity is inconsistent with the customer's stated business. o Customer who receives wire transfers and immediately purchases monetary instruments for payment to another party. o Traffic patterns of a customer change in the safe deposit box area possibly indicating the safekeeping of large amounts of cash. o Custmoer discusses CTR requirements with apparent intention of avoiding those requirements or makes threats to an employee to deter the filing of a CTR. o Customer's wire traffic increases, esp. if international o Customer receives many small incoming wire transfers or deposits of checks and money orders then requests wire transfers to another city or country. o Large wire transfers less than $10K to nonaccountholders, esp. in conjunction with purchase of monetary instruments. o Customer's stated purpose for a loan does not make economic sense, or customer proposes cash collateral for a loan while refusing to disclose the purpose of a loan. o Requests for loans to offshore companies, or loans secured by the obligations of offshore banks. o Borrower pays down a large problem loan suddenly, with no reasonable explanation of the source of funds. o Customer purchases CDs and uses them as collateral, or uses any cash collateral for a loan. o Loan proceeds are unexpectedly channeled off-shore. [More to come.] From patrick at Verity.COM Sun Oct 8 23:11:26 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Sun, 8 Oct 95 23:11:26 PDT Subject: Netscape 2.0 beta Message-ID: <9510090607.AA02381@cantina.verity.com> Steven Champeon said: > One thing that I found with the newsreader was that it doesn't > do POP correctly. No matter what you do with your mail, it still > doesn't check for read vs. unread articles. This is fine when you > have a mailbox with one message. It can be annoying when you have > 110 messages in your mailbox and don't want to 1) delete them or > 2) download them twice. Neither pop 2 nor pop 3 tell you whether you've read a message or not. pop 2 does bump up the current number with an ACKS, but if you move around with READ n, then that's useless. pop 3 doesn't do that. I just reread the rfcs to make sure that I wasn't missing anything, (RFC 1725: Post Office Protocol - Version 3, RFC 937: Post Office Protocol - Version 2). Am I missing something? Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From Greg_Rose at sibelius.sydney.sterling.com Sun Oct 8 23:41:08 1995 From: Greg_Rose at sibelius.sydney.sterling.com (Greg ROSE) Date: Sun, 8 Oct 95 23:41:08 PDT Subject: PGP Moose anti-spam authentication ready to go Message-ID: <9510090642.AA41873@paganini.sydney.sterling.com> Yesterday the PGP Moose Checking Daemon did its first automatic cancellation. The offending message lasted less than a second. For some months I've been working on some scripts collectively called "the PGP Moose", which are intended to cryptographically authenticate news postings, and send notifications or cancellations when postings fail the authentication. This message is to announce that the moderators' and users' end of the software seems to be ready to go, and I'm looking for testers who have a better and more complete newsfeed than I to cooperate with running the cancelling daemon part of it. Both parts are tested to the best of my ability. The aim of this software is to monitor the news postings of moderators of USENET newsgroups, and to automatically cancel forged messages purporting to be approved. This can be extended to the approvals of individual users to automatically cancel messages that appear without having been authorised by the user. This has (obviously) been prompted by the recent spammings and other events. This software and protocol is designed around cryptographic signatures. The protocol is designed to allow the use of different signature techniques. This implemention assumes the use of PGP signatures, but can be easily modified to use others, such as the Digital Signature Standard. PGP was chosen for its widespread availability around the world. Basically, there is a script you run which inserts a special header based on a PGP signature of the important parts of the article. When an article arrives at a site running the PGP Moose Checking Daemon, the existence and correctness of this special header are checked, and either someone is notified or the article is cancelled. PGP, the crux of the cryptographic software, was written by Phil Zimmermann , who otherwise has nothing to do with this. The cryptographic framework was written by me , as were the INN news system hooks. The README is available for browsing, so I won't post it here, but I will happily send it (or the scripts) to people who can't get it easily on the Web. -- Greg Rose INTERNET: greg_rose at sydney.sterling.com Sterling Software VOICE: +61-2-9975 4777 FAX: +61-2-9975 2921 28 Rodborough Rd. http://www.sydney.sterling.com:8080/~ggr French's Forest 35 0A 79 7D 5E 21 8D 47 E3 53 75 66 AC FB D9 45 NSW 2086 Australia. co-mod sci.crypt.research, USENIX Director. From rjc at clark.net Mon Oct 9 00:12:28 1995 From: rjc at clark.net (Ray Cromwell) Date: Mon, 9 Oct 95 00:12:28 PDT Subject: Netscape 2.0 beta In-Reply-To: <9510090607.AA02381@cantina.verity.com> Message-ID: <199510090712.DAA06375@clark.net> Netscape should be supporting IMAP instead of POP. POP has a tendency to hose your mailbox and lose mail every once in awhile. -Ray From P.Peterson at itd.uts.edu.au Mon Oct 9 00:41:52 1995 From: P.Peterson at itd.uts.edu.au (Paul Peterson) Date: Mon, 9 Oct 95 00:41:52 PDT Subject: Netscape 2.0 beta Message-ID: Patrick J. Horgan wrote: >Steven Champeon said: > >> One thing that I found with the newsreader was that it doesn't >> do POP correctly. No matter what you do with your mail, it still >> doesn't check for read vs. unread articles. This is fine when you >> have a mailbox with one message. It can be annoying when you have >> 110 messages in your mailbox and don't want to 1) delete them or >> 2) download them twice. > >Neither pop 2 nor pop 3 tell you whether you've read a message or not. Eudora can tell whether you've read a message or not by reading the 'status' line of a message. The status line contains an "R" if the message has been previously read. Eudora uses POP 3 I believe. Elm also uses the 'status' line. The upshot of this is that you can configure Eudora to leave your mail on the server and next time Eudora goes to read your mail, it ignores all previously read messages and only downloads the new ones. >pop 2 does bump up the current number with an ACKS, but if you move around >with READ n, then that's useless. pop 3 doesn't do that. > >I just reread the rfcs to make sure that I wasn't missing anything, >(RFC 1725: Post Office Protocol - Version 3, RFC 937: Post Office Protocol - >Version 2). Am I missing something? This may or may not be a part of the RFC's (I haven't read them) but this is the way I've always seen it work. So there's no reason that Netscape couldn't do the same if it can't already. I can't tell yet whether it's capable or not as I'm still down loading version 2.0b as I type. :-) Cheers, Paul P. -- _--_|\ Paul Peterson, P.Peterson at itd.uts.edu.au / \ Systems Programmer, Ph: +61 2 330 2131 \_.--._/ University of Technology, Sydney, (Internal: x2131) v PO Box 123, Broadway, NSW, 2007, Australia. Fax: +61 2 330 1994 From fc at all.net Mon Oct 9 03:44:46 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Mon, 9 Oct 95 03:44:46 PDT Subject: The problem with Java Message-ID: <9510091042.AA13473@all.net> The way I see it, the real problem with Java is that there is no clear statement of the "security" goals it is supposed to attain. It's one thing to declare a concept or an implementation "secure" but it's quite another to tell us what the security claims are and demonstrate that they are met. Specifically: Do the makers of Java claim it can authenticate the source of programs it runs? Do the makers of Java claim it can prevent someone from using your client to attack other servers? Do the makers of Java claim it can prevent denial of services or consumption of all available resources on the client machine? Do the makers of Java claim it can maintain integrity or confidentiality of something? I have read the white paper on Java and I still don't know the answer to these questions. Until I do, it's hard to assess the "security" of Java, but I can tell you this. I bet that at least two, probably three, and maybe even all four of these are not accomplished by Java. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From acceso2 at diatel.upm.es Mon Oct 9 04:13:28 1995 From: acceso2 at diatel.upm.es (Usuario Acceso2) Date: Mon, 9 Oct 95 04:13:28 PDT Subject: Question on Galois Fields Message-ID: <215*/S=acceso2/OU=diatel/O=upm/PRMD=iris/ADMD=mensatex/C=es/@MHS> Hi C'Punks. Here's a rather mathematical question. Can anyone explain or give an example of how to use arithmetic in GF(q^n)? Often in cryptography we work in GF(p). I knew the existence of other fields, like elliptic curves and so, but I found a short comment in Applied Cryptography page 210 that I couldn't understand. Thanks in advance for your help. Jaime acceso2 at diatel.upm.es From fc at all.net Mon Oct 9 04:18:49 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Mon, 9 Oct 95 04:18:49 PDT Subject: LACC: Account sharing leads to false imprisonment In-Reply-To: <199510090843.SAA29314@suburbia.net> Message-ID: <9510091116.AA15078@all.net> Thought you might like another perspective: ... > A GORRIE STORY > > Here's the background: in October of 1994, Hirsh's stepbrother, a U of > T grad student, said Hirsh could use his school-provided net account. Almost certainly unauthorized use. The us of another person's account is almost always against school policy, and hence is likely to be a voilation of the law. > Hirsh used it to read news. He thought the net fascinating so began > uploading copies of The Anarchives. Hirsh never tried to hide who he > was -- he even included his home phone number, which is how the Super- > Sleuth Sysadmins "found" him. Hirsh made similar use of an account > belonging to "Ms X" -- a female Ph.D. student and friend of Stepbro's. Ignorance of the law is no excuse, and being easy to catch doesn't make you innocent of a crime. > This would have been a happy and otherwise normal arrangement except > that in January, 1995, U of T engineering prof Jack Gorrie > (gorrie at ecf.utoronto.ca), bossman of U of T's engineering computing > facility computer, received a complaint from someone at the University > of British Columbia about The Anarchives being posted to net news. The > person wanted it stopped. Interstate transport of stolen (presumably copyrighted) property, possible violation of national laws of both nations. Unauthorized use of the computers at the University of British Columbia. > Gorrie came to notice Ms X wasn't signing these documents, a Jesse > Hirsch was. He also noticed Hirsh and another U of T student (the > stepbro) exchanged email about the accounts. As Hirsh and his stepbro > have different last names, Gorrie concluded a larger hacker conspiracy > was afoot. Reasonable assumption. The only way to find out different would be to violate the users' privacy by reading their mail, etc. > Gorrie launched into his Canadian rendition of Cliff Stoll, author of > compu-crime-thriller _The Cuckoo's Egg_ -- in Gorrie's case, _The > Loonie's Egg_. He "tracked" Hirsh for two months, recording every > keystroke -- even though he had all three students' phone numbers. Collected possible evidence. A good idea. Allerting potential criminals is a poor way to catch them and potentially dangerous. May not stand up in court as it is heresay - not exempt under the normal business record exception. > On March 8, 1995, he asked the cops to intervene. "I checked and found > that the account was indeed being used to broadcast information on > behalf of The Anarchist Organization," he wrote Detective Hugh > Ferguson. Sounds wise. > Thus it came to be that Jesse Hirsh was forced to model nude for > Toronto's finest, with the blessing of U of T. If he turned out to be a terrorist who was planning to blow up a building, you would have called this a tremendous piece of police work, they could have written a million-selling book, and you would hail the sysadmin as a computer age hero. > Stepbro got his own taste of U of T six-gun justice. Off in a > Washington, D.C., engineering lab, he came under FBI investigation. > Naturally, the FBI found nothing wrong because there was nothing wrong > -- except for an over-zealous sysadmin using a meat cleaver to scratch > an itch. Try again. I assume that they found this was not a "real" terrorist. But to call it over-zealous is not right. S/he was doing the job and should be commended for trying to do it as well as s/he could. > CHARGES DROPPED > > On Sept. 7, minutes before the case was to go to court, the > prosecution dropped all charges. Hirsh agreed to pay a token > settlement of $400 for four months of university computer use. U of T > first claimed it was owed $1,560. Hirsh places the real cost at $60. So Hirsh agreed that he had been illegally using the computer system and the case was settled with a monetary fine. > Hirsh devoted an issue of The Anarchives to the case. It spread around > cyberspace. In it, Hirsh includes Gorrie's email address and asks > people to send him their opinions. Quite a few did. They were rather > unpleasant. Gorrie, miffed, used the U of T pipeline to have the > stepbro make Hirsh shut up. So what's fair for Hirsh is not fair for the Sysadmin? Sounds to me like you think it's OK for Hirsh to have people write nasty letters to the admin but not OK for the admin to respond via the step-brother. > After subjecting Hirsh to complete and devastating public humiliation, > U of T was now pleading for discretion. After Hirsh broke the law, he is trying to get even for being caught by harassing the people who caught him. ... > Hirsh wrote Gorrie privately, saying he was sorry Gorrie was getting nasty > mail. Gorrie replied the whole affair was a "big misunderstanding." As > they were _both_ misled, they were _both_ victims: Victim Hirsh was > dragged down the street in handcuffs, fingerprinted, mugshotted, > strip-searched and jailed for hours; Victim Gorrie received email that was > mean to him. Hirsh realized he was wrong to harass Gorrie and appologized for creating the situation. Gorrie gracefully called it a "big misunderstanding" and accepted the abuse as part of doing a tough job. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From stu at nemesis Mon Oct 9 04:22:24 1995 From: stu at nemesis (Stuart Smith) Date: Mon, 9 Oct 95 04:22:24 PDT Subject: Rethinking the utility of netnews "cancel" control messages In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- In article you write: >The downsides of having the mechanism (especially unauthenticated) we see >now: official and unofficial squelching of articles that someone doesn't >like for whatever arbitrary or situational reason. You miss an important point in the mechinism - individual sites *choose* whether or not to pay any attention to cancels. Theoretically, they could be configured to only listen to cancels from certain places etc etc. By all means these should be authenticated, but it is vital to remember that this is still (for now..) an anarchy. I don't have to honour anyones cancels, and if I do, and you don't like it - you don't have to get a news feed from me. - -- Baba baby mama shaggy papa baba bro baba rock a shaggy baba sister shag saggy hey doc baba baby shaggy hey baba can you dig it baba baba E7 E3 90 7E 16 2E F3 45 * Stuart Smith * 28 24 2E C6 03 02 37 5C * http://www.wimsey.com/~ssmith/ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHj8pqi5iP4JtEWBAQHI+QP/dy3e6AfQ4OjRLjM723i8ZBCGSJdN7N8i Iw6E+UwhkZxt5aEq6KQHr72TkGbz6wgUMOCFsdK0cJjpt3ubgi1RYjDiQPeYswkp zK6/hnUnbpKAUE7h2BWLO+VYyoxxySCydigUthxWrG3p25eDJTYVhAw5gKsLrOJp k/HDHNQ2IG8= =ZBAz -----END PGP SIGNATURE----- From wolfgang at wi.WHU-Koblenz.de Mon Oct 9 04:37:11 1995 From: wolfgang at wi.WHU-Koblenz.de (Wolfgang Roeckelein) Date: Mon, 9 Oct 95 04:37:11 PDT Subject: (cpx) Netscape 2.0 beta In-Reply-To: Message-ID: <9510091129.AA01630@sirius.wi.WHU-Koblenz.de> Hi, > The good news is that someone finally, after years, has implemented >Progressive JPEG (I've been yelling about it for a while myself), and >it is simply *light years* better than interlaced GIFs. How do I create Progressive JPEG pictures? Note to Cypherpunks: Please answer via email, I receive only selected material from your list! Thank you very much in adance, Wolfgang --- Dipl.-Wirtsch.-Inf. Voice: +49 261 6509 173 Wolfgang Roeckelein Fax: +49 261 6509 179 WHU Koblenz E-Mail: roeckelein at wi.whu-koblenz.de Burgplatz 2 (MIME and NeXTmail ok) D-56179 Vallendar WWW: http://www.whu-koblenz.de/~wolfgang/ Germany GCM/B d-- s: a- C++ US+++$ UX+++ P+ L E? W++ N++ w-- O-(++) M+ !V PS++ PE Y+ PGP(++) t+ 5? X? R+ tv b++ DI D++ G e+++>++++ h+ r++>% y? (Geek Code V3.x) --rsa--------------------------------8<------------------------------------- #!/usr/local/bin/perl -s-- -export-a-crypto-system-sig -RSA-in-3-lines-PERL ($k,$n)=@ARGV;$m=unpack(H.$w,$m."\0"x$w),$_=`echo "16do$w 2+4Oi0$d*-^1[d2% Sa2/d0 10-9-95. NYPaper: "Is the top priority in computing shifting from speed to how easily you can interact? How fast will the Microsoft-Intel duopoly fade?" Denise Caruso's column When the Internet's original creators decided to publish their networking standards so that any computer could connect to the network, they certainly had no idea that almost 30 years later, their decision would provide the first real lever to pry the Microsoft-Intel duopoly from its leadership role. But this very prospect is why one well-known technology investor made a speech last week called, "Why Microsoft and Intel Don't Matter Anymore." "Haves and Have-Nots Revisited. Rich Nations Talk High-Tech, but the Poor Live No-Tech." Digital technology is revolutionizing telecommunications and erasing the boundaries that separate the telephone, computer and media industries. But the revolution's inequality takes the shine off a business that has celebrated itself as both a one-stop shop for the Information Age and a force for positive political change in the world. "The present reality is that the technology gap between developed and developing nations is actually widening," said Nelson Mandela, who spoke at Telecomm 95's opening. "A software gift service, by lawsuit and negotiation, tries to demonstrate that it takes its claim seriously." Sandra Chartrand's Patents column. One controversy is a patent issued in 1985 for selling software to individuals through the Internet and some CD-ROM's. Its owner, Interactive Gift Express Inc. says the patent covers the selling and downloading of digital information. There are those who disagree. "I've read the patent and can actually say that there is no invention there at all," said Richard Stallman at MIT. Trio: GOB_ble (16 kb) From alang at rrs.co.za Mon Oct 9 05:36:49 1995 From: alang at rrs.co.za (Alan Green) Date: Mon, 9 Oct 95 05:36:49 PDT Subject: PC Tools' PC Secure Message-ID: <01BA9654.6D1AC480@alang.rrs.co.za> Does anyone know of a utility which can decode files encoded with PC Tools' PC Secure package (version 5, if my memory serves me correctly). The package came out some 6 years ago. Thanks Alan alang at rrs.co.za From perry at piermont.com Mon Oct 9 06:18:29 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 06:18:29 PDT Subject: PC disk wipe software Message-ID: <199510091318.JAA24166@jekyll.piermont.com> I thought I'd ask here, since its related to a lot of the stuff people have written for the PC platform in these parts. I need to securely wipe a bunch of data from an MS-DOS hard drive, so that it can't be recovered. Are there any readily available utilities for this? Will any of them selectively erase only data that isn't allocated to existing files? Perry From txomsy at ebi.ac.uk Mon Oct 9 06:46:46 1995 From: txomsy at ebi.ac.uk (J. R. Valverde (EMBL Outstation: the EBI)) Date: Mon, 9 Oct 95 06:46:46 PDT Subject: LACC: Account sharing leads to false imprisonment Message-ID: <199510091346.OAA24239@neptune.ebi.ac.uk> Amazing! If I'm allowed to express my opinion! >Thought you might like another perspective: > >... >> A GORRIE STORY >> >> Here's the background: in October of 1994, Hirsh's stepbrother, a U of > What I find so amazing is the fascinating arguments exposed here. Let's see... First, let me say I start from a different point of view. I see the University as a place for forming people and distributing ideas, not juts the ideas of the "Establishment", but all kind of ideas. A place for the free interchange of all ideas and the formation of new persons. Now, all your message transpires a special horror against the dispersion of "anti-establishment" ideas. Of things that one could find "disturbing" from some point of view... Oh well, I wonder what it would have been if the arabs in Spain had only translated the Koram in the middle ages, instead of translating all the ancient wisdom and preserving it for all of us. Even if it conflicted with *their* beliefs. It would have been great not to have Aristotles or Plato at all. Just the Koram. >From your message, it looks like you want instead the Spanish Inquisition back: if someone distributes strange ideas -anarchist, communist, etc...- that person is a risk for the stablishment and should be punished. Isn't it? >Ignorance of the law is no excuse, and being easy to catch doesn't make >you innocent of a crime. > Yeah, but not showing volunteer to hide, expressing opinions openly, is not being easy to catch, it's being confident in one's freedom of speech and on the democratic system to protect it. Even in spite of overzealous system administrators. >> facility computer, received a complaint from someone at the University >> of British Columbia about The Anarchives being posted to net news. The >> person wanted it stopped. > >Interstate transport of stolen (presumably copyrighted) property, possible >violation of national laws of both nations. Unauthorized use of the >computers at the University of British Columbia. > Well, I don't know if that was copyrighted property. But, if it was, it was up to the (C) holder to decide what actions if any to take. BSD-Unix is copyrighted code, but I wouldn't say that all the copies around are illegal, or stolen. Unauthorized use? May I say that if that person asked someone (whomever) for permission, then it is whoever gave permission (if any) who should be pursued instead? I guess that if a poor guy is sold the Golden Gate, it is not that poor guy's fault as much as the "seller's". Ah, but that guy was distributing "anarchistic" information: he must have been pretty bad intentioned then. No one should have "unauthorized ideas" and even less dare to distribute or share them. I see. Great that if someone complains about the distribution of 'X' kind of ideas there's always a willing sysadmin to hunt the witch instead of defending freedom of speech. Great. >> have different last names, Gorrie concluded a larger hacker conspiracy >> was afoot. > >Reasonable assumption. The only way to find out different would be to >violate the users' privacy by reading their mail, etc. > What? May I suggest that, if the account has a owner, and a system manager, and all that, those people should be asked prior to jumping to conspiracy theories? The same kind of reasoning lead many innocents to die with the Spanish Inquisition: hey, they were plotting with the devil against god laws. Sorry, but I think a phone call to the implicated persons can easily clear all those doubts without "electronic surveillance" as you propose. >Collected possible evidence. A good idea. Allerting potential criminals > Yeah. I suppose that if they were expressing distrubing ideas, they were "potential criminals"... What else could they possibly be? >If he turned out to be a terrorist who was planning to blow up a >building, you would have called this a tremendous piece of police work, >they could have written a million-selling book, and you would hail the >sysadmin as a computer age hero. > Great! I guess that prettily summarizes all: "if" he had turned to be a "fill in your fears here". Just the same as it was with the Inquisition, if they were good guys they shouldn't fear torture or dying for God. And it was better to torture innocents than allowing any "potential bad guy" to get along. >So Hirsh agreed that he had been illegally using the computer system >and the case was settled with a monetary fine. > I bet so. Under torture many innocents also confessed. And faced with a multimillion dollar trial which, if you can't afford- will take you to jail (which can be a real torture), I guess that most innocents will prefer to go along with a smaller fine. It's often better to be alive and free than being the dildo of a homsexual homicidal maniac in jail. Or visiting the dungeons of the Inquisition. Of course, if instead of distributing 'X' files he had just killed his wife and her lover, and were multimillionaire, it would have been quite different. Wouldn't it? >> After subjecting Hirsh to complete and devastating public humiliation, >> U of T was now pleading for discretion. > >After Hirsh broke the law, he is trying to get even for being caught by >harassing the people who caught him. > So, after one person was faced with an humongous bill, dispropor- tionate, faced to an expensive trial he couldn't afford and forced into an agreement that's being sold as a confession, and being publicly given a walk around the city dressed as a damned heretic, he shouldn't have even the right to complain. Obvious. We don't want the faith in the Inquisition to diminish, do we? --- Look, I don't really know about the case. But I do really understand one thing: if this guy hadn't posted what some person considered were "pernicious ideas" he would have never been tracked down, villipendiated and taken to trial. I don't care about if he was using public resources for something they shouldn't be. That's something else to be discussed. Is it wrong to use a University to spread ideas, specially when the mainstream media avoid them? I won't comment on that. But that someone can start a witch hunt 'cos some other one is posting some special kind of information... Let's say, I can't consider that justification enough. So. I think you have made a great point for the defense of cryptography: if we want to have free thought and free speech, and avoid a new Inquisition, that's the only way. But I'm sure that if these guys had encrypted their messages that would have been taken more as a demonstrationof their *evil* purposes. After all, if they had nothing to fear, why hide? Why avoid torture? But they didn't hide, and we have seen... yes. Long life to thought control! jr -- These opinions are mine and only mine. Hey man, I saw them first! From raph at CS.Berkeley.EDU Mon Oct 9 06:50:39 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 9 Oct 95 06:50:39 PDT Subject: List of reliable remailers Message-ID: <199510091350.GAA12733@kiwi.cs.berkeley.edu> I operate a remailer pinging service which collects detailed information about remailer features and reliability. To use it, just finger remailer-list at kiwi.cs.berkeley.edu There is also a Web version of the same information, plus lots of interesting links to remailer-related resources, at: http://www.cs.berkeley.edu/~raph/remailer-list.html This information is used by premail, a remailer chaining and PGP encrypting client for outgoing mail, which is available at: ftp://ftp.csua.berkeley.edu/pub/cypherpunks/premail/premail-0.33.tar.gz For the PGP public keys of the remailers, finger pgpkeys at kiwi.cs.berkeley.edu This is the current info: REMAILER LIST This is an automatically generated listing of remailers. The first part of the listing shows the remailers along with configuration options and special features for each of the remailers. The second part shows the 12-day history, and average latency and uptime for each remailer. You can also get this list by fingering remailer-list at kiwi.cs.berkeley.edu. $remailer{"extropia"} = " cpunk pgp special"; $remailer{"portal"} = " cpunk pgp hash"; $remailer{"alumni"} = " cpunk pgp hash"; $remailer{"bsu-cs"} = " cpunk hash ksub"; $remailer{"c2"} = " eric pgp hash reord"; $remailer{"penet"} = " penet post"; $remailer{"ideath"} = " cpunk hash ksub reord"; $remailer{"hacktic"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"flame"} = " cpunk mix pgp. hash latent cut post ek reord"; $remailer{"rahul"} = " cpunk pgp hash filter"; $remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord"; $remailer{"syrinx"} = " cpunk pgp hash cut reord mix post"; $remailer{"ford"} = " cpunk pgp hash ksub"; $remailer{"hroller"} = " cpunk pgp hash mix cut ek"; $remailer{"vishnu"} = " cpunk mix pgp hash latent cut ek ksub reord"; $remailer{"crown"} = " cpunk pgp hash latent cut mix ek reord"; $remailer{"robo"} = " cpunk hash mix"; $remailer{"replay"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"spook"} = " cpunk mix pgp hash latent cut ek reord"; $remailer{"gondolin"} = " cpunk mix hash latent cut ek ksub reord"; $remailer{"rmadillo"} = " mix cpunk pgp hash latent cut"; $remailer{"ncognito"} = " cpunk"; $remailer{"precip"} = " cpunk mix pgp hash latent cut ek reord"; $remailer{"ecafe"} = " cpunk"; $remailer{"wmono"} = " cpunk mix pgp hash latent cut ek"; catalyst at netcom.com is _not_ a remailer. lmccarth at ducie.cs.umass.edu is _not_ a remailer. usura at replay.com is _not_ a remailer. Use "premail -getkeys pgpkeys at kiwi.cs.berkeley.edu" to get PGP keys for the remailers. Fingering this address works too. remailer email address history latency uptime ----------------------------------------------------------------------- ecafe remail at ecafe.org *******#--** 30:29 99.96% portal hfinney at shell.portal.com +#*##**#-### 4:12 99.95% ideath remailer at ideath.goldenbear.com .---.----.- 8:14:14 99.94% flame remailer at flame.alias.net **+**+++-**+ 28:29 99.93% extropia remail at extropia.wimsey.com -------..-- 8:34:49 99.79% alumni hal at alumni.caltech.edu +#*##** -**# 4:44 99.79% vishnu mixmaster at vishnu.alias.net + +***+*-+** 15:35 99.77% bsu-cs nowhere at bsu-cs.bsu.edu ***-##* -#+# 12:48 99.77% mix mixmaster at remail.obscura.com ---+ +-+--+ 1:03:29 99.65% replay remailer at replay.com +*++***+-** 13:22 99.43% hacktic remailer at utopia.hacktic.nl **+** *+-** 14:31 99.38% rmadillo remailer at armadillo.com + ++ ++-+- 59:29 99.16% penet anon at anon.penet.fi --++ ---- ++ 3:15:48 98.47% wmono wmono at spook.alias.net ****++*-+ * 14:26 98.12% spook remailer at spook.alias.net ---- +++- +* 1:19:36 94.96% rahul homer at rahul.net +### #+ # + 4:11 98.84% robo robo at c2.org +#*#### -# 24:26 80.99% c2 remail at c2.org + +++-++-+ 54:15 76.59% syrinx syrinx at c2.org ----+-++-+ 48:35 75.76% crown mixmaster at kether.alias.net +-+---++ 1:03:56 59.66% gondolin mixmaster at gondolin.org +*--+ + 1:19:10 44.00% ford remailer at bi-node.zerberus.de *+ 6:37 10.73% History key * # response in less than 5 minutes. * * response in less than 1 hour. * + response in less than 4 hours. * - response in less than 24 hours. * . response in more than 1 day. * _ response came back too late (more than 2 days). cpunk A major class of remailers. Supports Request-Remailing-To: field. eric A variant of the cpunk style. Uses Anon-Send-To: instead. penet The third class of remailers (at least for right now). Uses X-Anon-To: in the header. pgp Remailer supports encryption with PGP. A period after the keyword means that the short name, rather than the full email address, should be used as the encryption key ID. hash Supports ## pasting, so anything can be put into the headers of outgoing messages. ksub Remailer always kills subject header, even in non-pgp mode. nsub Remailer always preserves subject header, even in pgp mode. latent Supports Matt Ghio's Latent-Time: option. cut Supports Matt Ghio's Cutmarks: option. post Post to Usenet using Post-To: or Anon-Post-To: header. ek Encrypt responses in reply blocks using Encrypt-Key: header. special Accepts only pgp encrypted messages. mix Can accept messages in Mixmaster format. reord Attempts to foil traffic analysis by reordering messages. Note: I'm relying on the word of the remailer operator here, and haven't verified the reord info myself. mon Remailer has been known to monitor contents of private email. filter Remailer has been known to filter messages based on content. If not listed in conjunction with mon, then only messages destined for public forums are subject to filtering. Raph Levien From perry at piermont.com Mon Oct 9 06:55:36 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 06:55:36 PDT Subject: LACC: Account sharing leads to false imprisonment In-Reply-To: <199510091346.OAA24239@neptune.ebi.ac.uk> Message-ID: <199510091355.JAA24223@jekyll.piermont.com> Is this really cypherpunks material? .pm "J. R. Valverde (EMBL Outstation: the EBI)" writes: > > Amazing! If I'm allowed to express my opinion! > > >Thought you might like another perspective: > > > >... > >> A GORRIE STORY From cme at TIS.COM Mon Oct 9 07:07:00 1995 From: cme at TIS.COM (Carl Ellison) Date: Mon, 9 Oct 95 07:07:00 PDT Subject: Certificate proposal In-Reply-To: <199510061910.MAA06560@comsec.com> Message-ID: <9510091404.AA12463@tis.com> >Date: Thu, 5 Oct 1995 12:24:34 -0700 >From: Hal >I don't understand this whole discussion. A certificate is a signed >binding of a key and a unique name, right? It depends on how you define certificate. If you define it this way, then I'm proposing the elimination of certificates (because I'm eliminating the unique name as something different from a key). If you define certificate as I do -- as a bound statement of some attribute of a key, then it should become clearer. It's just that the attribute I'm binding is not some unique person-name -- rather something like permission to spend money from a bank account. >I'd like to see some grounding of this discussion in terms of the role of >certificates, and ways to prevent man in the middle attacks. I certainly >have no love for facist worldwide ID cards and hierarchical, organization >based naming schemes, but just using any old key because it seems to work >OK most of the time isn't going to fly IMO. The rest should be more clear if you read the rest of the backlog.... - Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ From jgrubs at left.webcasters.com Mon Oct 9 07:19:22 1995 From: jgrubs at left.webcasters.com (Jim Grubs W8GRT) Date: Mon, 9 Oct 95 07:19:22 PDT Subject: List Digest Message-ID: <4XJPcD1w165w@left.webcasters.com> -----BEGIN PGP SIGNED MESSAGE----- Someone asked about a digest form for this list. I got out, dusted off, and refurbished software I wrote last year to generate a RFC-1153 compatible digest of alt.security.pgp for PRZ. I am now generating said digest. If anyone wants it, send e-mail. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: LIBERTY!! Use it or lose it!! iQCVAwUBMHkut974r4kaz3mVAQHz7wQAqMlM8CwmGGZmycWyPHYO/VJHT2Gr0mn7 G+WKvG1vKhzjP/RhF8hhQzRy5egwIKuasRZaFvV3qMbBheg8JvPwHAPf64/qKkNN Xf2IRWHKT6BBuzDo5mxv/P4CW9W5lzmWLyDp+BPlNqbMNyMshkRyUTrdriWgtUIK erJbEMu+7Ec= =luqz -----END PGP SIGNATURE----- -- WebCasters(tm) James C. Grubs jgrubs at webcasters.com 6817 Maplewood Avenue Tel.: 419-882-2697 Sylvania, Oh 43560 Fax: 419-885-2814 Internet consulting, HTML programming, Information brokering From jps at monad.semcor.com Mon Oct 9 07:42:11 1995 From: jps at monad.semcor.com (Jack P. Starrantino) Date: Mon, 9 Oct 95 07:42:11 PDT Subject: netscape mail starts java attachments upon get new mail... Message-ID: <9510091445.AA01297@monad.semcor.com> Does anyone remember the problem IBM had back ~10 years on X'mas, when someone sent an embeded 'script' greeting card to multiple 'profs' addresses? When the mail was opened the 'script' procedure was executed, resulting in the card being forwarded to everyone in the recipient's address book. It didn't take too many interations of this to drag IBM's net to it's knees. Given JAVA's i/o capabilities, I'm a little concerned about mating it with my mail reader. jps -- Jack P. Starrantino (215) 674-0200 (voice) SEMCOR, Inc. (215) 443-0474 (fax) 65 West Street Road jps at semcor.com Suite C-100 Warminster, PA 18974 From m5 at dev.tivoli.com Mon Oct 9 07:58:31 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Mon, 9 Oct 95 07:58:31 PDT Subject: netscape mail starts java attachments upon get new mail... In-Reply-To: <9510091445.AA01297@monad.semcor.com> Message-ID: <9510091458.AA27858@alpha> Jack P. Starrantino writes: > Given JAVA's i/o capabilities Java, per se, doesn't have any "I/O capabilities", in the same way that neither C nor C++ do. That said, it is the case that if your mail reader allows incoming applets to send mail, you're in for trouble. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From johnl at radix.net Mon Oct 9 08:00:09 1995 From: johnl at radix.net (John A. Limpert) Date: Mon, 9 Oct 95 08:00:09 PDT Subject: Question on Galois Fields Message-ID: <199510091456.KAA05542@saltmine.radix.net> At 12:13 PM 10/9/95 UTC+0100, you wrote: >Can anyone explain or give an example of how to use arithmetic in GF(q^n)? > >Often in cryptography we work in GF(p). I knew the existence of other fields, >like elliptic curves and so, but I found a short comment in Applied >Cryptography page 210 that I couldn't understand. I wrote a Reed-Solomon encoder that had to do addition and multiplication over GF(2^8). Addition was simple, just a bitwise exclusive-or. Multiplication required two tables, a log-alpha table and an alog-alpha table. The product was computed by taking the anti-log of the sum of the logs of the arguments. Both tables were 256x8 lookup tables. The table contents were derived from the generator polynomial G(x) specified for the encoder. Another two 256x8 tables were used to translate between dual basis and conventional basis. Dual basis was specified for the encoder to make a hardware implementation simpler but I found that it was easier to use conventional basis for a software implementation. Not being a mathematician, I used several NASA technical reports on Reed-Solomon encoders and an excellent book on error correcting codes by Lin & Costello to understand enough of the math to write the encoder software. Galois fields are heavily used in the design of error correcting codes. -- John A. Limpert johnl at Radix.Net From mhw at wittsend.com Mon Oct 9 08:00:15 1995 From: mhw at wittsend.com (Michael H. Warfield) Date: Mon, 9 Oct 95 08:00:15 PDT Subject: Rethinking the utility of netnews "cancel" control messages In-Reply-To: Message-ID: Stuart Smith enscribed thusly: > > -----BEGIN PGP SIGNED MESSAGE----- > > In article you write: > >The downsides of having the mechanism (especially unauthenticated) we see > >now: official and unofficial squelching of articles that someone doesn't > >like for whatever arbitrary or situational reason. > > You miss an important point in the mechinism - individual sites *choose* > whether or not to pay any attention to cancels. Theoretically, they could > be configured to only listen to cancels from certain places etc etc. By all > means these should be authenticated, but it is vital to remember that this > is still (for now..) an anarchy. I don't have to honour anyones cancels, > and if I do, and you don't like it - you don't have to get a news feed from > me. (No doubt, you are going to get hammered heavily on this from multiple sides, but here is my shot anyways.) Actually you miss a very critical point. This choice is, in fact, a "Hobsens Choice", a choice that is no choice. If any site between you and the article source choses to honor that cancel, you never get the original article to begin with. All you get is the cancel message and your choice to honor it or not is totally meaningless. To be worth anything all of the intermediate nodes would have to chose to ignore cancel messages and then the leaf nodes would have the privledge of honoring or ignoring them. But it will be a VERY cold day in a VERY warm place before that ever happens, even if it did make sense (It doesn't). Yes yes, I know - article loss is contigent upon the cancel arriving there before you pick up the article from them, this effect would just serve to add a level of chaos and indetermanancy to the mechanism. Obviously (because of time elements involved in realization and forging of cancels) it is much more likely that you will receive originals for article where a forged cancel is received. That depends on the latency involving all of the news feeds between you and the article source and the latency involving the forger and his ability to recognize a message he wants to cancel and to get that cancel out. The human factor adds a lot here. Perhaps we should add a "time-limit" to cancel messages? This too would be highly indeterminant as propagation times stretched out. End result is that most sites currently do honor cancels, so many of the originals never reach a lot of the leaf nodes while all of us continue to be subjected to a FLOOD of cancel control messages. In terms of message count and article numbers (not total bytes of storage) my control group is the largest newsgroup group on my system! Regards, Mike -- Michael H. Warfield | (770) 985-6132 | mhw at WittsEnd.com (The Mad Wizard) | (770) 925-8248 | http://www.wittsend.com/mhw/ NIC whois: MHW9 | An optimist believes we live in the best of all PGP Key: 0xDF1DD471 | possible worlds. A pessimist is sure of it! From klp at gold.tc.umn.edu Mon Oct 9 08:05:06 1995 From: klp at gold.tc.umn.edu (Kevin L Prigge) Date: Mon, 9 Oct 95 08:05:06 PDT Subject: PC disk wipe software In-Reply-To: <199510091318.JAA24166@jekyll.piermont.com> Message-ID: <30793a1135c8002@noc.cis.umn.edu> According to rumor, Perry E. Metzger said: > > > I thought I'd ask here, since its related to a lot of the stuff people > have written for the PC platform in these parts. I need to securely > wipe a bunch of data from an MS-DOS hard drive, so that it can't be > recovered. Are there any readily available utilities for this? Will > any of them selectively erase only data that isn't allocated to > existing files? > PC Tools has a wipe program that will either wipe individual files, or wipe all unallocated diskspace. It also allows you to choose the level of wipe (single overwrite, multiple, etc). -- Kevin Prigge | Holes in whats left of my reason, CIS Consultant | holes in the knees of my blues, Computer & Information Services | odds against me been increasin' email: klp at cis.umn.edu | but I'll pull through... From jya at pipeline.com Mon Oct 9 08:16:12 1995 From: jya at pipeline.com (John Young) Date: Mon, 9 Oct 95 08:16:12 PDT Subject: Crypto's Role in Evil? HUG_kid Message-ID: <199510091516.LAA24285@pipe4.nyc.pipeline.com> 10-9-95. NYPaper: "The Greening of U.S. Diplomacy: Focus on Ecology." A new concern over the long-term causes of wars and disasters of the environment are the issues deemed urgent today by American foreign policy makers in much the same manner as military threats like new surface-to-air missile sites alarmed policy makers several decades ago. So in addition to their traditional intelligence gathering -- arms, nuclear weapons programs, expansion of foreign armies -- American policy makers are looking more than ever before at natural phenomena in their search for the deeper roots of war and threats to global security. "During the cold war, most security threats stemmed from state-to-state aggression, so most of the analysis was of factors that could produce state-to-state aggression," said James Steinberg, the State Department's director of policy planning. "Now we're focusing more on internal factors that can destabilize governments and lead to civil wars and ethnic strife. Now we're paying much more attention to early warning factors, like famine and the environment." Angelo Codevilla, an intelligence expert who teaches at Boston University, said this new approach is misguided. "All this soft stuff is a silly idea," he said. HUG_kid (9 kb) From ses at tipper.oit.unc.edu Mon Oct 9 08:17:51 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Mon, 9 Oct 95 08:17:51 PDT Subject: The problem with Java In-Reply-To: <9510091042.AA13473@all.net> Message-ID: I'm not sure how many people here have read the paper on java security that is included with the distribution - I'm including the html source at the end of the message. That gives some more information on what Sun does and does not claim. That makes it easier to verify whether or not those claims are correct, and whether they are sufficient for whatever level of security. The document can also be found at http://www.javasoft.com/1.0alpha3/doc/security/security.html Simon HotJava: The Security Story

      HotJava(tm): The Security Story


      HotJava(tm) is a world wide web (WWW) browser, built using a new language called Java. Perhaps the most significant new facility that HotJava implements is the ability to import code fragments across the net and execute them. One of the most important technical challenges in building a system like HotJava is to make it safe. Importing code fragments across the network, installing, and running them is an open invitation to security problems.

      The question of how to provide a secure environment for code to execute in doesn't have a single answer. HotJava has layers of interlocking facilities that provide defenses against a variety of attacks. These layers are:

      • The JavaTM language, which was designed to be a safe language and the Java compiler which ensures that source code doesn't violate the safety rules.

      • A verification of the byte codes imported into the runtime to ensure that they obey the language's safety rules. This layer guards against an altered compiler producing code that violates the safety rules.

      • A class loader which ensures that classes don't violate name space or access restrictions when they are loaded.

      • Interface-specific security that prevents applets from doing destructive things. It depends on the security guarantees of the previous layers. This layer depends on the integrity guarantees from the other three layers.


      Security layer one: the language and compiler

      The Java language and the compiler comprise the first line of security for HotJava. Java was designed to be a safe language.

      Initially, the development team thought that by adding safety features to an existing language such as C++, the safety goals could be achieved. However, as work progressed it became clear that this strategy would not succeed without putting some restrictions on C++.

      C++ has a series of facilities to control access to objects, but it also has ways to forge access to objects and to sub-parts of objects that defeat the access controls. The C++ facilities that allow forging have either been eliminated in Java or changed to make them safe. Most importantly, you can't do pointer arithmetic; in fact you can't modify pointers in any way. However, Java has true arrays instead of pointer arithmetic. And because the primary use of pointer arithmetic in C and C++ is to access arrays, programmers often don't notice the change. Another example is the "cast" operator: the Java compiler checks that a cast is legal, whereas C and C++ do not.


      Security layer two: verifying the bytecodes

      A trustworthy compiler ensures that Java source code doesn't violate the safety rules, but someone could alter the compiler to produce code that violates them. HotJava, which can import code fragments from anywhere, doesn't know whether a code fragment comes from a trustworthy compiler or not. So, before executing any code fragment, the runtime system subjects it to a series of tests.

      The tests range from verification that the format of the fragment is correct, to passing it through a simple theorem prover to establish that the code plays by the rules. The code is checked to ensure:

      • that it doesn't forge pointers

      • that it doesn't violate access restrictions

      • that it accesses objects as what they are. (For example, the tests ensure that "InputStream" objects are always used as "InputStreams" and never as anything else.)

      • that it calls methods with appropriate arguments of the appropriate type

      • that there are no stack overflows

      The representation of code fragments loaded into the runtime is a byte coded machine-independent instruction set that bears a resemblance to representations like the UCSD Pascal P-Codes[Bowles78], i.e., it is stack based.

      Consider the following Java code sample:

      class vector {
          int arr[];
          int sum() {
              int la[] = arr;
              int S = 0;
              for (int i=la.length; --i>=0;)
                  S += la[i];
              return S;
          }
      }
      
      The byte codes generated when the above code is compiled look like the following:


      Type information

      Java bytecodes contain more type information than is strictly necessary for the interpreter. For example, both the aload and iload opcodes have identical implementations, however, aload is used to load a pointer and iload is used to load an integer. Similarly, the getfield opcode has a symbol table reference; the symbol table has type information. This "extra" type information allows the runtime system to perform checks that guarantee that type information isn't being illegally manipulated.

      Most stack based instruction sets don't limit what you can do with the stack and local variables. Conceptually, at any point in the program each slot in the stack and each local variable has a type. This collection of type information, i.e., all the slots and local variables, is called the type state of the execution frame. An important property of the type state is that this type can be determined statically by induction, i.e., before any program code is executed. As the runtime systems reads through a block of instructions, each instruction pops and pushes values of particular types. Instruction definitions are required to have the following inductive property:

      Given only the type state before the execution of the instruction, the type state afterwards is determined.

      Given a straight-line block of code, i.e., no branches, and starting with a known stack state, the type state of each slot in the stack is known. For example:

      	iload_1	Load integer variable, stack type state=I
      	iconst 5	Load integer constant, stack type state=II
      	iadd	Add two integers producing an integer, stack type state=I
      
      A number of stack-based instruction sets, like Smalltalk [Adobe85] do not have this property. For example, the definition of the PostScript add operator explicitly states "If both operands are integers and the result is within integer range, the result is an integer, otherwise the result is a real." In many situations this dynamic type behavior is considered to be an advantage, but HotJava needs to provide a secure execution environment and it must know the types of objects in order to guarantee a certain level of security.

      In conjunction with the inductive property above we require that:

      When there are two execution paths into the same point, they must arrive there with exactly the same type state.

      This requirement has several implications. For example, compilers cannot write loops that iterate through arrays, loading each element of the array onto the stack, effectively copying the array onto the stack. This behavior is prevented because the flow path into the top of the loop will have a different type state than the branch back to the top. Because all paths to a point are required to arrive with the same type state, the type state from any incoming path can be used to do further manipulations.

      Code is checked for compliance with these rules by a part of the loader called the verifier. It traverses the byte codes, constructs the type state information, and verifies the types of the parameters to all the opcodes. The following illustration shows the flow of code from Java source code to execution by the runtime system.

      The verifier acts as a gatekeeper by preventing the execution of imported code until it has passed the verifier's tests. When code verification is complete a number of important properties of the code are known:

      • The code causes no operand stack overflows or underflows.

      • The types of the parameters to all opcodes are known to always be correct.

      • No illegal data conversions are done, like converting integers to pointers.

      • Object field accesses are known to be legal (i.e., the verifier checks that the rules for public, private, and protected accesses are obeyed).

      Knowing these properties makes the runtime system much faster because it doesn't have to check anything. There are no operand type checks and no stack overflow checks. The runtime can eliminate these checks without compromising safety.

      These properties also provide a foundation for the security of the system:

      • pointers can be treated essentially as capabilities

      • applications cannot forge pointers, e.g., casting an integer to a pointer

      • applications cannot get around pointers

      • all the access restrictions are enforced

      So, in HotJava, you can trust that a private variable really is private, that no piece of application code is doing some magic with casts to extract information from a private variable, for example, a credit card number from the billing software. This means that implementing security for HotJava against destructive applets is easier to do. HotJava security has to deal with restricting file access and the ability of applets to grab files and throw them over firewalls. The HotJava security implementation doesn't have to worry about threats like hacked bytecodes forging access to private methods or overflowing the stack.


      Security level three: the class loader

      After the initial runtime environment checks are passed, code encounters a class loader. The environment seen by a thread of execution running Java byte codes can be visualized as a set of classes partitioned into namespaces. The class loader guarantees that a unique namespace exists for classes that come from the local file system (called built-ins), and a unique namespace exists for each network source. When HotJava imports a class across the network the Class Loader places it into the private namespace associated with its origin. Thus, classes imported from different places are partitioned from each other.

      When a class references another class, the runtime system first looks for it in the namespace of the built-ins, then in the namespace of the referencing class. There is no way that an imported class can "spoof" a built-in class. Built-ins can never accidentally reference classes in imported namespaces, they can only do it explicitly. Spoofing is prevented because the system always checks built-in classes first.


      Security level four: protecting the file system and network access

      HotJava enforces security policies confident that its security interfaces are secure. The three lower levels of security guarantee that all local classes, e.g., the file access primitives, are themselves protected from being supplanted, replaced, or extended by imported code.

      The file access primitives implement an access control list that controls read and write access to files by imported code (or code invoked by imported code). The defaults for these access control lists are very restrictive. If an attempt is made by a piece of imported code to access a file to which access has not been granted, a dialog box pops up to allow the user to decide whether or not to allow that specific access. These security policies err on the conservative side in order to ensure maximum security. This conservative approach may make writing some applets more difficult or awkward.

      For network security, HotJava provides a variety of mechanisms that can provide information about the trustworthiness of imported code. These mechanisms cover a wide range of possibilities. At the simple end the system can check on the origin of a code fragment to determine if it came from inside or outside a firewall. At the sophisticated end of the range a mechanism exists whereby public keys and cryptographic message digests can be securely attached to code fragments that not only identify who originated the code, but guarantee its integrity as well. This latter mechanism will be implemented in future releases.

      The security policies implemented by the runtime system can be dynamically adjusted based on the information available concerning the origin of a code fragment. The Socket class provides such an example.

      The Socket class implements security policies that are adjusted to reflect the trustworthiness of the code that invoked it, and transitively, the code that invoked the invoker. The information about what code began the chain of execution is available to the class in the form of which namespace contains the invoking code and what parameters are associated with that class. The class loader puts the classes it has loaded in a specific namespace, allowing the Socket class to determine the network host from which a class is loaded.

      Knowing the network host allows the HotJava security mechanism to determine whether the class originated inside or outside a firewall. Knowledgable users of HotJava can decide which category of hosts to trust when loading executable code. For example, the Socket class can implement the policy of only allowing new connections to be created that terminate at the host from whence the code was loaded. This restriction means that code loaded from outside a firewall cannot connect to other machines on the net behind the firewall. Code that comes from more trusted sources can be allowed more freedom to make connections to other machines. As an additional defense against untrusted sources HotJava's security can be set to prevent any code from being loaded. The level of security is configurable by HotJava users.


      Summary

      The security in HotJava provides a safe environment for the execution of imported code. The security is based on interlocking layers of security that range from the design of the Java language at the base to the file and network access protections at the top. In the future HotJava will support network commerce through the inclusion of public key encryption technology.


      Bibliography

      [Adobe85]
      Adobe Systems Incorporated, "PostScript Language Reference Manual", Addison Wesley.
      [Aho86]
      Aho, Alfred V., Ravi Sethi, Jeffrey D. Ullman, "Compilers: Principles, Techniques and Tools", Addison Wesley.
      [Bowles78]
      Bowles, Kenneth L, "UCSD Pascal", Byte. 46 (May)
      [Chambers92]
      Chambers, Craig, David Ungar, and Elgin Lee. An Efficient Implementation of Self, a Dynamically-Typed Object-Oriented Language Based on Prototypes. In OOPSLA `89 Conference Proceedings, p. 49-70, New Orleans, LA, October 1989. Published as SIGPLAN Notices 24(10), October 1989. Also published in Lisp and Symbolic Computation 4(3), Kluwer Academic Publishers, June 1991.
      [Duetsch84]
      Deutsch, L. Peter and Alan Schiffman, "Efficient Implementation of the Smalltalk-80 System." Proceedings of the 11th Symposium on the Principles of Programming Languages, Salt Lake City, UT, 1984
      [Goldberg83]
      Goldberg, Adele and David Robson, "Smalltalk-80: The Language and its Implementation", Addison Wesley.
      From clewton at netcom.com Mon Oct 9 08:23:45 1995 From: clewton at netcom.com (Charles Lewton) Date: Mon, 9 Oct 95 08:23:45 PDT Subject: PC disk wipe software In-Reply-To: <199510091318.JAA24166@jekyll.piermont.com> Message-ID: On Mon, 9 Oct 1995, Perry E. Metzger wrote: > > wipe a bunch of data from an MS-DOS hard drive, so that it can't be > recovered. Are there any readily available utilities for this? Will > > Perry > PCTools has such a utility. Claims DoD specs. Chuck From mkj at october.ducktown.org Mon Oct 9 08:45:40 1995 From: mkj at october.ducktown.org (mkj at october.ducktown.org) Date: Mon, 9 Oct 95 08:45:40 PDT Subject: Crypto's Role in Evil? Message-ID: <199510091458.AA00712@october.ducktown.org> -----BEGIN PGP SIGNED MESSAGE----- I agree with Tim that the future is likely to hold much evil -- as it always has -- and that privacy is unfortunately likely to play an important role in some of that evil -- as it always has. But my analysis of the problem has a subtly different perspective. We mustn't forget that, until very recently, strong, widespread privacy has been humanity's "default" condition. The evils to which Tim alluded would in my opinion be more accurately described as arising out of general advances in communication and consequent new market efficiencies. Progress always has two faces. The ob-crypto question here is, must we now rely upon pervasive LEA surveillance as humanity's only effective defense against the new evils created by technological progress? In other words, are we entering an era in which it is simply becoming TOO DANGEROUS to allow ourselves the traditional luxury of strong, widespread privacy? Many people, especially in government, seem to be answering the above question strongly in the affirmative. The Cypherpunks, on the other hand, have rallied around the idea that the unprecedented loss of privacy is itself an evil against which others pale by comparison. I admit it is a question which troubles me. I can only fall back on the principle that, as I believe Thomas Jefferson put it (quoting approximately from memory), "There is no ultimate safe repository for power other than in the people." Our only hope is in ourselves. --- mkj -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHk4ZF11Wd4tm8clAQGFfwQAniCTN2dJ+3DrYHFXSq/dPfAzNggxkjlL r3ImCFcCA8JhXBUnGhon76eGtoAlAuuLMeFktACgI35TS+PU7oLtR/FRq68IxldD opnY+CA+4JstBkVHhnMfvW3UX4jZeo9MckaHdxwoZtwtM+D/pERw2Mb2M5r/uHA8 FQFfjsl1vBk= =kC7f -----END PGP SIGNATURE----- From hayden at krypton.mankato.msus.edu Mon Oct 9 08:47:51 1995 From: hayden at krypton.mankato.msus.edu (Robert A. Hayden) Date: Mon, 9 Oct 95 08:47:51 PDT Subject: Disk Encryption Software Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hi all, I figured this was a good crew to ask this question of. Does anybody know of some kind of disc encryption software that would work with W95 and a ZIP drive? What I'd like to be able to have is an encrypted disc that when I put it in, it would demand a passphrase, and then it would be unlocked for working. Incorrect passphrase and it's still gibberish. Does this kind of implement exist yet? :-) -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP Signed with PineSign 2.2 iQCVAwUBMHkoMjokqlyVGmCFAQHHeAP9HfALv1lJxFOhVn18/yjhbS90ekGGo60H qMF+KcCupdpY/wYYdvImZr2gjbfIGSutI0najla5XJbH5Jp95Gk9Fy5n3SnvJanc bIIipD+fMBitzjjz54DvEj0TxCYoVJaSeXhKcforfYeuetIA4YwGuksP1yOpivc0 hDOQwxgELDI= =XXhK -----END PGP SIGNATURE----- ____ Robert A. Hayden <=> hayden at krypton.mankato.msus.edu \ /__ Finger for Geek Code Info <=> Finger for PGP Public Key \/ / -=-=-=-=-=- -=-=-=-=-=- \/ http://krypton.mankato.msus.edu/~hayden/Welcome.html -----BEGIN GEEK CODE BLOCK----- Version: 3.1 GED/J d-- s:++>: a-- C++(++++)$ ULUO++ P+>+++ L++ !E---- W+(---) N+++ o+ K+++ w+(---) O- M+$>++ V-- PS++(+++)>$ PE++(+)>$ Y++ PGP++ t- 5+++ X++ R+++>$ tv+ b+ DI+++ D+++ G+++++>$ e++$>++++ h r-- y++** ------END GEEK CODE BLOCK------ From stripes at va.pubnix.com Mon Oct 9 08:53:23 1995 From: stripes at va.pubnix.com (Josh M. Osborne) Date: Mon, 9 Oct 95 08:53:23 PDT Subject: netscape mail starts java attachments upon get new mail... In-Reply-To: <9510091458.AA27858@alpha> Message-ID: In message <9510091458.AA27858 at alpha>, Mike McNally writes: >Jack P. Starrantino writes: > > Given JAVA's i/o capabilities > >Java, per se, doesn't have any "I/O capabilities", in the same way >that neither C nor C++ do. That said, it is the case that if your >mail reader allows incoming applets to send mail, you're in for >trouble. As far as I know Java apps can only make network connections to the IP address they were loaded from. There may be more restrictions then that as well. So if they were going to mail-bomb they would have to hurt the site that was giving out the Java app (by sending all the mail to it to be relayed back), and in fact it could be done more effectavly with a "simple" CGI script. This isn't to say it is infeesable - someone could write a gereral purpose Java applet (say something that makes cool looking animated bullets for lists) that when loaded from a specific IP address/domain (say www.clueless.org) would then do something bad. However exactly who you can harm isn't exactly as broad as I assume "pranksters" would like, and how badly you can harm them may not be as harmful as "terrorists" would like, but it seems to be simpler to do then *I* would like! OBcrypto: in one of the Java papers I saw a refrence to use of RSA signitures to allow browser users to say things like "I trust Sun (or Tim May) to write applets that use Foo not to harm me". It wasn't in the public release of HotJava because of licencing constrints. Any speculation on whether Netscape will (eventually) support that feature? From hfinney at shell.portal.com Mon Oct 9 08:55:40 1995 From: hfinney at shell.portal.com (Hal) Date: Mon, 9 Oct 95 08:55:40 PDT Subject: subjective names and MITM In-Reply-To: Message-ID: <199510091554.IAA20941@jobe.shell.portal.com> Jon Lasser writes: >I think Hal and some other Cypherpunks (Me, You, Carl, etc.) are not >proceeding from one of the same assumptions. Specifically, Hal seems to >be proceeding from the assumption that the person "on the other end of >the line" is in fact a known physical entity who has a meat reputation >tied to the name. I'm proceeding from the assumption that the person on >the other end of the line has no specific RL reputation that I'm basing >the relationship on, just the online one. >Here's an example: >There's someone on the list, now, apparently, with the name of "Steven >Levy." Hal assumes that, when communicating with that "Steven Levy," one >intends to communicate with the fairly-well-known journalist of that >name, and thus certification of RL identity is important. I assume >that, unless there's a specific reason otherwise, I want to have an >intellectual conversation (or financial transaction, etc) that isn't >predicated on this being "the" Steven Levy. In that case, certification >of RL identity is irrelevant. That is not exactly my point. My concern is avoiding the man in the middle attack. One way to do that is to find a certificate from Verisign saying that this key belongs to Steven Levy, ideally with other information that I can confirm relates to the on-line personage I wish to speak to. Presumably the MITM can't get a certificate for Steven Levy, unless by coincidence his name actually is Steven Levy, in which case the other information I mentioned will be helpful as well. Would you propose just to use an unsigned key that says it is for Steven Levy? Or perhaps a key without any name at all that someone told you was for him? That is the policy which I have been arguing against. The whole idea of communicating with keys, or not having key certificates or signatures, seems to me to leave open the possibility of man in the middle attacks. Isn't this a problem? Or are the difficulties of mounting a MITM attack considered so large that they can be neglected? I would just like to hear exactly what are the assumptions being made regarding this problem by those who oppose certificates. Hal From stewarts at ix.netcom.com Mon Oct 9 08:58:54 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Mon, 9 Oct 95 08:58:54 PDT Subject: Certificate proposal Message-ID: <199510091558.IAA05131@ix6.ix.netcom.com> At 10:04 AM 10/9/95 EDT, Carl Ellison wrote: >>I don't understand this whole discussion. A certificate is a signed >>binding of a key and a unique name, right? >It depends on how you define certificate. If you define it this way, then >I'm proposing the elimination of certificates (because I'm eliminating the >unique name as something different from a key). > >If you define certificate as I do -- as a bound statement of some attribute >of a key, then it should become clearer. It's just that the attribute I'm >binding is not some unique person-name -- rather something like permission >to spend money from a bank account. This doesn't necessarily eliminate certificates - while you have a signed statement from Alice's key that she uses Bank Account X, and a signed statement from Alice's key authorizing transfer of $D from Bank Account X to Bank Account Y, the Bank, or a customer, may refuse to accept the request unless there's a signed statement from the Bank's key that Alice's key uses Account X. None of these need Alice's name, or for that matter the Bank's, as long as there's also a signed attribute statement from the Bank's key that it's a bank, etc. The meaning of the certificates changes a bit, but there's still a certificate from the bank binding Alice's Key to Alice's Bank Account. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From rah at shipwright.com Mon Oct 9 09:24:11 1995 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 9 Oct 95 09:24:11 PDT Subject: PC disk wipe software Message-ID: >PC Tools has a wipe program that will either wipe individual files, or >wipe all unallocated diskspace. It also allows you to choose the level >of wipe (single overwrite, multiple, etc). There has been considerable discussion on the MCIP list about how most *Mac* programs that purport to do this, like Burn, for example, leave stuff over in disk blocks. My understanding is that this is not a trivial problem, and it occurs in MUSH-DOS as well.... Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From hfinney at shell.portal.com Mon Oct 9 09:47:24 1995 From: hfinney at shell.portal.com (Hal) Date: Mon, 9 Oct 95 09:47:24 PDT Subject: Certificate proposal In-Reply-To: <199510091558.IAA05131@ix6.ix.netcom.com> Message-ID: <199510091646.JAA29034@jobe.shell.portal.com> Bill Stewart writes: >This doesn't necessarily eliminate certificates - while you have a signed >statement from Alice's key that she uses Bank Account X, and a signed statement >from Alice's key authorizing transfer of $D from Bank Account X to Bank >Account Y, >the Bank, or a customer, may refuse to accept the request unless there's >a signed statement from the Bank's key that Alice's key uses Account X. >None of these need Alice's name, or for that matter the Bank's, as long as >there's >also a signed attribute statement from the Bank's key that it's a bank, etc. >The meaning of the certificates changes a bit, but there's still a certificate >from the bank binding Alice's Key to Alice's Bank Account. I can see using keys with attributes in this way, for credentials or as other forms of authorization. But what about for communications privacy? What is the attribute that tells you that using this key will prevent eavesdropping? Hal From cme at TIS.COM Mon Oct 9 09:53:48 1995 From: cme at TIS.COM (Carl Ellison) Date: Mon, 9 Oct 95 09:53:48 PDT Subject: Certificate proposal In-Reply-To: <199510061922.MAA06669@comsec.com> Message-ID: <9510091651.AA26787@tis.com> -----BEGIN PGP SIGNED MESSAGE----- >Date: Thu, 5 Oct 1995 21:40:04 -0700 >From: Hal >I don't really care whether the name is called an attribute, a >distinguished name, or an ooblek. I just don't see how you're going to >get along without it. The fact is, we live in a world populated by >people and companies and we use names to identify them. I will grant >that there are problems with uniqueness but I don't think the solution >can be to just give up on the whole idea of names since they are so >messy. We're not talking about giving up on names. You have lots of names for things -- some of them are even nicknames, known only to you. For any certification scheme, you also need a unique name. If you happen to use the public key as that unique name, you have the proposal we're talking about. It has an advantage -- that you don't have to certifiy the binding between the unique name and the key. That's built in. -Carl +--------------------------------------------------------------------------+ |Carl M. Ellison cme at tis.com http://www.clark.net/pub/cme | |Trusted Information Systems, Inc. http://www.tis.com/ | |3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2| |Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 | +--------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHlSzVQXJENzYr45AQFYvgP+O12CvK058nWvhvq48QIqIBo8N5jU6uqN 8kFagz2iKPLcv+cLJ7AiFiOAU3mY5CiWkU0pK6z9YlNgB7d5SNqyzpAL8jIe6zgI xD5hAesL6Pz85f8OLAn9teoydW9k3QzBekOeT0xCKkIj8+8KUDM7nrUMl2t08bTr OG53eFdFD6o= =d7lq -----END PGP SIGNATURE----- From klp at gold.tc.umn.edu Mon Oct 9 10:00:52 1995 From: klp at gold.tc.umn.edu (Kevin L Prigge) Date: Mon, 9 Oct 95 10:00:52 PDT Subject: HTTP anon proxy pointers Message-ID: <3079552b450e002@noc.cis.umn.edu> I seem to recall that someone was working on an anonymous http proxy a couple months ago. Pointers would be appreciated. Thanks. -- Kevin Prigge | Holes in whats left of my reason, CIS Consultant | holes in the knees of my blues, Computer & Information Services | odds against me been increasin' email: klp at cis.umn.edu | but I'll pull through... From shamrock at netcom.com Mon Oct 9 10:03:30 1995 From: shamrock at netcom.com (Lucky Green) Date: Mon, 9 Oct 95 10:03:30 PDT Subject: Crypto's Role in Evil? Message-ID: <199510091701.NAA18171@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <9510090412.AA02181 at pulm1.accessone.com>, blancw at accessone.com wrote: > Another thought is that as people become more separated into individual > self-reliance, they must develop other ideas, organizations, or means by which > they may defend themselves from abuse. That is, if they cannot rely on > governments (as they come to realize that governments don't make much > difference in terms of salvation), then individuals must become more > imaginative over how they can defend themselves against those who are not so > conscientious in upholding a sense of personal honor & moral rectitude. Correct, Blanc. That's why I am saving my pennies to buy an AR-15. I know the government of the near future will not be in a position to stand in the way of my involuntary participation in organ transplant experiments. It will be up to the individual and voluntary neighborhood associations, etc. to provide our personal security. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHlVXCoZzwIn1bdtAQFkawF8DBRY8Nxeqkld5Ltw1J6VTqm+5JtN2sNZ PPCOCt7Gl1NKQmkJPlWBC5TY4cgtMrc0 =0pt6 -----END PGP SIGNATURE----- From cmcmanis at scndprsn.Eng.Sun.COM Mon Oct 9 10:11:17 1995 From: cmcmanis at scndprsn.Eng.Sun.COM (Chuck McManis) Date: Mon, 9 Oct 95 10:11:17 PDT Subject: java security concerns Message-ID: <9510091642.AA28211@pepper.Eng.Sun.COM> Perry pointed out the standard set of concerns that anyone should have with Java. About the only thing I'd care to dispute at the moment is that Java is a "large complicated" application. It is in fact less than 20K lines of C code. And while it is true that applications of even this size are difficult to prove safe, there has been an effort to break that problem up into components such that each "layer" can be proven safe and where that layer is used that safety carries over. Let me give you an example: There are three "parts" of the Java system: o Java Bytecode o Java Runtime o Java Virtual Machine. At a "meta" level there is the Java Language and the compiler that converts it into byte codes however for the purposes of a security discussion those are irrelevant since the browser in this case receives byte codes and the compiler at the other end is presumed suspect. So one way to approach this analysis is to look first at the bytecodes. One of the things you will discover is that Java is *not* a general purpose language. It lacks crucial features such as introspection and anonymous memory access. So you might ask "How can anyone write anything useful in it then?" and that is a fair question. The answer is that it does have one loophole and that loophole is the 'native' keyword on a method description. Basically, if you need a general purpose feature (like object inspection) you can get it with a native method. "So I write a native method to delete your files, what does that buy me?" you might ask. Well Java is also a _late binding_ language. Thus the binding of external method references (which native methods are by definition one) can be identified at bind/link time (which always occurs on the client) and optionally rejected. The next level of inspection is all of the classes that, through one of their methods, actually call a native method. Those can be analyzed closely and there are relatively few of them (about 28). The final level of inspection is the virtual machine interpreter. Its operation as a giant switch statement can be inspected for valid code design. It isn't all that large and a team of three can inspect it in under a week. If the layers work, the system works. We encourage any questions on security or identifying any "holes" to be sent to java at java.sun.com for our immediate attention. --Chuck However, Java is also late From m5 at dev.tivoli.com Mon Oct 9 10:15:43 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Mon, 9 Oct 95 10:15:43 PDT Subject: Certificate proposal In-Reply-To: <199510091558.IAA05131@ix6.ix.netcom.com> Message-ID: <9510091715.AA27991@alpha> hfinney at shell.portal.com writes: > I can see using keys with attributes in this way, for credentials or as > other forms of authorization. But what about for communications privacy? > What is the attribute that tells you that using this key will prevent > eavesdropping? If we exchange keys on a face-to-face basis, then I really don't see much of a MITM threat, unless somehow the MITM has perverted my original key and I for some reason can't figure that out. Now, as long as you communicate with me via the public key I've handed you, we should be as safe as PKE can make us. If we are forced to exchange keys remotely, then perhaps some sort of "proof" techniques could be used to establish to some level of assurance that the remote entity I *think* is you is really you. Or you could provide me with a key, and then I could poll a list of references to inquire as to the "goodness" of the key. This seems to me to be subtly different than a certificate procedure, because I'm not asking about the goodness of a relationship to the key, but rather about the key itself. Maybe I'm missing something. What is there to trust in a more "traditional" certificate scheme? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From tcmay at got.net Mon Oct 9 10:28:50 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 9 Oct 95 10:28:50 PDT Subject: Certificate proposal Message-ID: At 4:46 PM 10/9/95, Hal wrote: >Bill Stewart writes: .... >>also a signed attribute statement from the Bank's key that it's a bank, etc. >>The meaning of the certificates changes a bit, but there's still a certificate >>from the bank binding Alice's Key to Alice's Bank Account. > >I can see using keys with attributes in this way, for credentials or as >other forms of authorization. But what about for communications privacy? >What is the attribute that tells you that using this key will prevent >eavesdropping? For communication, the only credential Alice needs to ensure that only Bob can read her message is that she uses Bob's public key. If "Bob the Key" reads it, presumably it was "Bob the Person" who read it. (Again, Bob the Key = Bob the Person to many of us. If Bob the Person has let his private key out, so that Chuck the Person is also able to read the Bob the Key stuff, etc., then of course cryptography cannot really handle this situtation.) --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From peter at verisign.com Mon Oct 9 10:30:13 1995 From: peter at verisign.com (Peter Williams) Date: Mon, 9 Oct 95 10:30:13 PDT Subject: Software Patents are Freezing Evolution of Products Message-ID: <199510091730.KAA07041@dustin.verisign.com> >>Thesis: Software patents are a bad idea because they freeze the evolution >>too early and payment metering schemes are too difficult to arrange, which >>also helps to freeze evolution. Software patents are bad because customers >>cannot freely and without entanglements incorporate the ideas into their >>own products. The situation has become much worse with software, because >>there is no physical object which can be used to meter usage of a patent. Its nice to see a carefully reasoned argument. Consider, also reading http://www.verisign.com/faqs/id_faq.html http://www.verisign.com/apple/cis.html Comment: The thesis is fundamentally flawed in the case of publickey applications which provide or exploit digital signatures, as its assumptions are false, patently. However, a gem of truth is revealed; however, possible outcomes may be unpalatable as "pay-per-view". Crypto metering for commercial-grade systems is easy. A number of companies, including those who are bantering about the latest batch of payment protocols, are beginning to really understand that to combat intruder-in-the middle attacks of the commercial end-systems' keying material, its necessary to authenticate the source of keying material used for all subsequent security services. Contrary to the thesis, there are an ever evolving number of practical ideas upon the nature of security services and secure applications. (In fact, its ever harder to track the explosion of innovation which is actually happening.) To combat the threat which intruder-in-the-middle represents to the key exchange/agreement crypto underlying most applications, a notion of public-key certificates was formulated. The certificate is a certified end-system key. The evaluation of the certificate requires users to consider trust models, as someone "trusted" digitally signs the key to assert that the key is certified for purpose X. The number of trust models being propounded is astounding; the innovation wonderful to behold; contrary to the thesis. Two models are prevalent - the Kent RFC 1422 model which uses third-parties to base non-repudiation services, and the Zimmermann PGP model which does not use third-parties, and accomplishes something other than non-repudiation. Other models are in heated discussion! There is a little truth in the thesis that asserting upfront to the licensor the nature of your idea does hamper innovation. However, a solution maybe at hand. Note, anyway, that (a) RSA is an excellent public-key scheme which is free of patent restrictions anywhere in the world except US territories (b) personal use of RSA in the US is effectively unlicensed (see PGP/PGPfone) (c) RSAREF is a free reference implementation available for developers to innovate with, before deciding how to make their ideas commercially available (d) there are lots of competitive providers of RSA stuff supporting many form-factors and packaging styles. So either all innovation occurs in the US, else free public availability is not the key to idea generation. Both these conclusions are patently wrong, in my view. Whats a solution? Well there is a solution which gets rid of the up-front, tell-all requirement. Its called controlled certificate issuance. Given the importance of the certificate role, if one meters certificate issuance such that a postage-stamp fee goes to the licensor for each key used in any idea, for any purpose, however often or valuable-a-transaction, then the developer is effectively freed up - in terms of innovation. The keying material can be Diffie-Helman, knapsack, anything the developer like. Whats the downside - well its like having a pay-per-view box on your company TV. Still, this is highly regarded by many industries and is the basis of much competition in the broadcasting & programming distribution industry. Some people, really object to pay-per-view. But then, some people object to inventors getting benefit from their discovery. One metering product is the BBN safekeyper. Metering certificates causes about as much hate mail, as MIT patent enforcement though. So beware about even thinking about reading the following pages for more information about the options and issues: http://www.verisign.com/faqs/id_faq.html - for digital ID material (lots of references) http://www.verisign.com/apple/cis.html - for metering and "simple" licensing How do we do away with the say-it-all-up-front restriction, which is currently the only means whereby the licensor can collect a negotiated fee? RSA DSI invested heavily in a hardware product for metering the issuance of those critical certificates. That is, any developer w From dmandl at panix.com Mon Oct 9 10:59:21 1995 From: dmandl at panix.com (dmandl at panix.com) Date: Mon, 9 Oct 95 10:59:21 PDT Subject: PC disk wipe software In-Reply-To: <199510091318.JAA24166@jekyll.piermont.com> Message-ID: On Mon, 9 Oct 1995, Perry E. Metzger wrote: > I thought I'd ask here, since its related to a lot of the stuff people > have written for the PC platform in these parts. I need to securely > wipe a bunch of data from an MS-DOS hard drive, so that it can't be > recovered. Are there any readily available utilities for this? Will > any of them selectively erase only data that isn't allocated to > existing files? > > Perry Norton Utilities has been able to do this for a long time. I think the program is called (wipe "unused" area of a disk), and I believe there's also a that will obliterate a file. These things are supposed to conform to some unspecified "government guidelines," so you decide how good they are. My guess is that they're plenty good enough. --D. -- Dave Mandl dmandl at panix.com http://wfmu.org/~davem From tcmay at got.net Mon Oct 9 11:07:50 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 9 Oct 95 11:07:50 PDT Subject: Crypto's Role in Evil? Message-ID: At 5:01 PM 10/9/95, Lucky Green wrote: >Correct, Blanc. That's why I am saving my pennies to buy an AR-15. I know >the government of the near future will not be in a position to stand in >the way of my involuntary participation in organ transplant experiments. >It will be up to the individual and voluntary neighborhood associations, >etc. to provide our personal security. While I don't want to comment on AR-15s and the possible need for them, this being a strong cryptography group, this is a good time to mention to newcomers to the list that the book "Snow Crash," by Neal Stephenson, offers a wickedly satirical look at a possible future for America. (Other books of interest include: Vernor Vinge's "True Names," David Friedman's "The Machinery of Freedom," Hakim Bey's "TAZ," Orson Scott Card's "Ender's Game," Ayn Rand's "Atlas Shrugged," and John Brunner's "The Shockwave Rider.") One of the reasons I advocate having a minimal set of laws and then strongly enforcing them is that having too many laws makes enforcement of the _important_ laws very difficult. Having too many laws, such as the laws about what one can do with one's own money (chillingly recounted this morning by Doug Barnes in his trip report), also blurs the lines between what is really criminal and what it is not. It's clear that cops cannot protect people, only try to catch the perpetrators. In certain demographic groups, 30% of all males between the ages of 15 and 30 are either in jail, are awaiting trial, are on probabation, or have been in jail. California is on a massive prison-building campaign. (Many of these prisons would not be needed if essentially all behaviors except murder, rape, theft, etc., were legal, and if transfer payments into inner cities were cut off...the "criminal" gangs would not have much to do and would wither away in time.) Given the current trends, certain courses of action become clear. (Personal note: I'm amazed at the number of "punks" of various flavors who continue to live in crowded cities, given the capabilities of communications technology, and the race wars now accelerating in these rat cages. But then I'm not one of those dressed-in-black-with-noserings kind of "punk." To each their own.) --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From talon57 at well.com Mon Oct 9 11:52:13 1995 From: talon57 at well.com (Brian D Williams) Date: Mon, 9 Oct 95 11:52:13 PDT Subject: PC wipe utilities Message-ID: <199510091852.LAA14988@well.com> "Perry E. Metzger" asks: >I thought I'd ask here, since its related to a lot of the stuff >people have written for the PC platform in these parts. I need to >securely wipe a bunch of data from an MS-DOS hard drive, so that >it can't be recovered. Are there any readily available utilities >for this? Will any of them selectively erase only data that isn't >allocated to existing files? >Perry Alan Penny's excellent freeware utility wipe.zip has been uuencoded and sent to you. I believe it fulfills your requirements. As recently as the last issue of WIRED an article by a data recovery company claimed they could recover data that had been overwritten nine times...... make it a bakers dozen to be safe. Brian D Williams From hfinney at shell.portal.com Mon Oct 9 12:04:29 1995 From: hfinney at shell.portal.com (Hal) Date: Mon, 9 Oct 95 12:04:29 PDT Subject: Certificate proposal In-Reply-To: Message-ID: <199510091903.MAA22499@jobe.shell.portal.com> tcmay at got.net (Timothy C. May) writes: >For communication, the only credential Alice needs to ensure that only Bob >can read her message is that she uses Bob's public key. If "Bob the Key" >reads it, presumably it was "Bob the Person" who read it. >(Again, Bob the Key = Bob the Person to many of us. If Bob the Person has >let his private key out, so that Chuck the Person is also able to read the >Bob the Key stuff, etc., then of course cryptography cannot really handle >this situtation.) OK, but again, what about the man in the middle attack? Suppose the key that you found that claims to be from Bob is actually not his, but another one created by a man in the middle, such as Bob's malicious ISP? Then that ISP is decrypting the messages Alice sends to him using that fake key, and re-encrypting them using Bob's real key. He is reading all of the messages, and Alice and Bob do not in fact have communications privacy. I don't want to overstate the risk of this attack. It would not be an easy one to mount and I believe there are countermeasures which could detect it unless the MITM had nearly supernatural powers. But the MITM attack is normally considered seriously in discussing crypto protocols. It is a well known weakness in Diffie-Hellman, for example. That is why authenticated Diffie Hellman is used in some of the newly proposed key exchange protocols for IP. The risks of MITM attacks on public key systems was recognized not long after those systems were proposed. The problems with fake keys have been discussed for over a decade. Why is this all suddenly irrelevant? Were these attacks never realistic? Is it just not a problem somehow? I am baffled by the fact that people are just turning their backs on all these years of research and experience. If this is some kind of paradigm shift in which the idea of communicating with keys is seen as the key to the puzzle, then I am afraid I don't share the enlightenment. To me the problem seems as real as ever. Hal From jpp at software.net Mon Oct 9 12:10:23 1995 From: jpp at software.net (John Pettitt) Date: Mon, 9 Oct 95 12:10:23 PDT Subject: Patents etc Message-ID: Hmmmm the argument about hardware companies paying 10% to intel 5% to the capacitor folks does not stand up. The reason is that hardware people do *exactly* that and in return they receive the physical token (chip, capacitor etc) that represents the intellectual property they just bought. Patents in the hardware world can slow evolution just as much as in software. A good example is the "cats eye" papent in the UK. Cats eyes are the reflective studs in the road, until the original UK patent ran out *nobody* did any work in the UK to improve on the orginal design because the royalty burden made it uneconomic. Whats make software different is the ability to freely copy it without special hardware. This lack of a physical token is what causes all the problems. IMHO What's needed is a) a good way of measuring usage and b) a realistic attitude on the part of patent holders as to the value of their patents. A good example of how not to do it is the current mess that governs the music indistry (which very similar problems with copying and incorporation of material [sampling] all be it in a context of copyright rather than patents). Ted Nelson did a lot of work on this for xanadu and his ideas on transcopyright are worth exploring further. John Pettitt jpp at software.net VP Engineering, CyberSource Corp. +1 415 473 3065 (V) (fax 3066) From tcmay at got.net Mon Oct 9 12:21:57 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 9 Oct 95 12:21:57 PDT Subject: PC wipe utilities Message-ID: At 6:52 PM 10/9/95, Brian D Williams wrote: >Alan Penny's excellent freeware utility wipe.zip has been >uuencoded and sent to you. I believe it fulfills your requirements. > > As recently as the last issue of WIRED an article by a data >recovery company claimed they could recover data that had been >overwritten nine times...... make it a bakers dozen to be safe. Better yet, wipe the disk/diskette on _more than one_ machine. It should be easy to just run the wipe on, say, 3 machines, 3 to 5 times each. A lot of the ability to recover putatively erased media lies in the fact that a given set of read-write heads has characteristics (especially with regard to positioning) that make repeated erase passes less than fully effective. The remnants of the recorded signal can be extracted with careful analysis of the analog signal (especially from special read heads). Using N erase machines increases the "jitter" to some extent. My hunch is that it would make the recovery process exponentially (in N) more difficult. But I have no lab experience in this, so this is just an idea. But crunching the media is a faster (and maybe cheaper) approach. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From sameer at c2.org Mon Oct 9 12:31:33 1995 From: sameer at c2.org (sameer) Date: Mon, 9 Oct 95 12:31:33 PDT Subject: Certificate proposal In-Reply-To: <199510091903.MAA22499@jobe.shell.portal.com> Message-ID: <199510091926.MAA08047@infinity.c2.org> In the situation you cite, Bob doesn't know Alice apart from their email correspondence? In this case the ISP is acting as extension-of-alice. Bob thinks he is talking to Alice but he is talking to ISP+Alice. What difference does it make, if Bob has no knowledge of Alice outside their email discussion, that Bob is talking to ISP+ Alice rather than just alice. From Bob's perspective, Alice is really an alias for ISP+Alice. (The same goes for Alice in the other direction.) In tim's words, from alice's point of view "Bob the key" == "BOB the person and Bob's ISP". From Bob's point of view "Alice the key" == "Alice the person & Bob's ISP". The MITM attack only matters if there is a context outside the email correpondence. (Say, perhaps, a drug deal which involves real physical goods.) More concretely, All I know of 'Hal' is through is emails. If his ISP is intercepting the email between him and me, then my definition of 'Hal' is 'Hal+ISP' -- it doesn't make a real difference unless there is another context involved. (The MITM is still -important- though, because in most situations there *is* some external context) > > tcmay at got.net (Timothy C. May) writes: > >For communication, the only credential Alice needs to ensure that only Bob > >can read her message is that she uses Bob's public key. If "Bob the Key" > >reads it, presumably it was "Bob the Person" who read it. > > >(Again, Bob the Key = Bob the Person to many of us. If Bob the Person has > >let his private key out, so that Chuck the Person is also able to read the > >Bob the Key stuff, etc., then of course cryptography cannot really handle > >this situtation.) > > OK, but again, what about the man in the middle attack? Suppose the > key that you found that claims to be from Bob is actually not his, but > another one created by a man in the middle, such as Bob's malicious > ISP? Then that ISP is decrypting the messages Alice sends to him using > that fake key, and re-encrypting them using Bob's real key. He is > reading all of the messages, and Alice and Bob do not in fact have > communications privacy. > > I don't want to overstate the risk of this attack. It would not be an > easy one to mount and I believe there are countermeasures which could > detect it unless the MITM had nearly supernatural powers. But the MITM > attack is normally considered seriously in discussing crypto protocols. > It is a well known weakness in Diffie-Hellman, for example. That is why > authenticated Diffie Hellman is used in some of the newly proposed key > exchange protocols for IP. The risks of MITM attacks on public key > systems was recognized not long after those systems were proposed. The > problems with fake keys have been discussed for over a decade. > > Why is this all suddenly irrelevant? Were these attacks never realistic? > Is it just not a problem somehow? I am baffled by the fact that people > are just turning their backs on all these years of research and > experience. If this is some kind of paradigm shift in which the idea of > communicating with keys is seen as the key to the puzzle, then I am > afraid I don't share the enlightenment. To me the problem seems as real > as ever. > > Hal > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From m5 at dev.tivoli.com Mon Oct 9 12:35:35 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Mon, 9 Oct 95 12:35:35 PDT Subject: Certificate proposal In-Reply-To: Message-ID: <9510091934.AA27962@alpha> hfinney at shell.portal.com writes: > OK, but again, what about the man in the middle attack? Suppose the > key that you found that claims to be from Bob is actually not his, but > another one created by a man in the middle, such as Bob's malicious > ISP? You have several alternative means of verifying the key: 1) You can meet Bob at a local Pizza Hut and verify the key in person. 2) You can go through a variety of channels to a variety of other trusted entities and verify with them that they're using the same key for Bob. 3) You can set up some sorts of communications tests to "probe" for a MITM situation, perhaps by passing through "seeded" information (data taggants?). > I don't want to overstate the risk of this attack. It would not be an > easy one to mount ... The risks of MITM attacks on public key > systems was recognized not long after those systems were proposed. The > problems with fake keys have been discussed for over a decade. > > Why is this all suddenly irrelevant? I don't think it is irrelevant, I just think it's orthogonal to the issue of whether a certificate for a key<-->entity relationship is considered to be the key or an adjunct to the key. I could be wrong, of course. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From jed at home.interaccess.com Mon Oct 9 12:52:30 1995 From: jed at home.interaccess.com (J.E. Davidow) Date: Mon, 9 Oct 95 12:52:30 PDT Subject: PC disk wipe software Message-ID: <199510091947.OAA23150@thymaster.interaccess.com> On 9 Oct 95 at 13:59, dmandl at panix.com wrote regarding Re: PC disk wipe software: > On Mon, 9 Oct 1995, Perry E. Metzger wrote: > > > I thought I'd ask here, since its related to a lot of the stuff > > people have written for the PC platform in these parts. I need to > > securely wipe a bunch of data from an MS-DOS hard drive, so that > > it can't be recovered. Are there any readily available utilities > > for this? Will any of them selectively erase only data that isn't > > allocated to existing files? > > > > Perry There are several file, directory and/or disk erasing utilities on the web and commercial area today. Shred is located on WEB in some of the Simtel Libraries. It will not only delete the file from the directory, but it writes zeros over the data itself, including all of the fragments left at the end of the file's cluster. It also will write over the free space left on the disk as well. It performs this operation only once per execution. Another "wipe" software is "Real Deal.zip". It's virtue is that is writes a series of patterns to the disk depending upon the level of security you request. It can remain memory resident, intercepting all DOS delete requests and write over at least 5 times with different patterns the data your deleting. Watch how much longer a delete takes if your at the" Real Dewd" level. There are a couple of utilities from Norton, etc. that will perform a higher level of wiping. Including the entire disk, directories, etc. The will write several more times that either RealDeal.zip (Real Delete) or Shred. The last time I saw, the government 'standard' for "wiping" its own sensitive data was at least fifteen times with different patterns. How secure your erased disk will stand up to a concerted effort by law enforcement, NSA or someone truly looking for what's on your disk remains questionable at best. But to the average person both Shred or RealDeal is good enough to keep your wife's attorney, your roommate, co-worker or your girl friend out of your personal communique's. Remember too, that word processors and other software write all over you disk and that its' probable that fragments of data that you wish to delete are attached to or in other files. J.E. Davidow jed at interaccess.com Signed JEDKEY.asc -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQCNAzAvWekAAAEEAOASA2sxixXBIzn40bN/ybwZ6lOBAmLo06DqG8eh2VpnE0kp i0cSiOQARzOpx3REbJWCp4+XE3Dudg534V47JWoiH0VFgJTCG6yZ7kXJjxXwXeYf KD0zRlkoU1wYcjfDC2vEoBWh36I/7HX+GiSEnFQ5rJgm9X7spOMRupiV7141AAUR tCJKLkUuIERhdmlkb3cgPGplZEBpbnRlcmFjY2Vzcy5jb20+iQCVAwUQMGO82F2s KelIgrYVAQFT7AP/TjfpK4Zljs2RFUYGZuKPEJgMp+PC1jmtuAalaoufhv5Bdosk lixdahjJ1y5a2Nv/mId4xhT6/WJDN62solxdYBCyzZWAxg4X88igP23xeGreUhg+ A7u1Gx1Ebr5QPqiTV7B8AgJT9Y2xVZw76zQnFxZAGiZqk9IuRgVuldj3gv2JAJUD BRAwYgxV4xG6mJXvXjUBAWuqA/9h6AORiSqkNwrSTmm5z1CoNrS1q6L3LMSmnmgZ Xh3AbuqbbJum06gVRXo4QITR71iBx7HjKg3kMeK6+8+vIabXzL0T7TtdiLkhcCo5 FULB+0W5aUBiXVC0amMP+tJE4I8Splr5MfuDlGddMPqrbB3TplweTJ1muE3k+KWK RNspGw== =1Iv2 -----END PGP PUBLIC KEY BLOCK----- From Octobersdad at crecon.demon.co.uk Mon Oct 9 12:58:25 1995 From: Octobersdad at crecon.demon.co.uk (T. Bruce Tober) Date: Mon, 9 Oct 95 12:58:25 PDT Subject: European Crypto Message-ID: <199510091831.LAA09772@comsec.com> Anyone with names and contact information for any of the Council of Europe representatives who deliberated and/or voted on the recent recommendations on crypto, e-mail me that information. Likewise any information on any further actions by the EU in this regard. Working on an article for a computer magazine. tbt -- |Bruce Tober - octobersdad at crecon.demon.co.uk - B'ham, Eng| | Publisher/Editor of The Write Byte monthly newsletter | | WebSite address to come shortly | | TWB - The computer newsletter specifically for Writers | From rsalz at osf.org Mon Oct 9 13:01:02 1995 From: rsalz at osf.org (Rich Salz) Date: Mon, 9 Oct 95 13:01:02 PDT Subject: netscape mail starts java attachments upon get new mail... Message-ID: <9510091958.AA23589@sulphur.osf.org> >As far as I know Java apps can only make network connections to the >IP address they were loaded from. What part of the state of my machine can they access and send out to the "home port"? Can they read /etc/passwd, make NIS requests, etc? /r$ From frissell at panix.com Mon Oct 9 13:01:48 1995 From: frissell at panix.com (Duncan Frissell) Date: Mon, 9 Oct 95 13:01:48 PDT Subject: NSA Realists v. Nuts In-Reply-To: <199510082019.QAA15164@book.hks.net> Message-ID: On Sun, 8 Oct 1995, Lucky Green wrote: > Let me illustrate this with an example. During my visit to Dachau > Concentration Camp, I saw original lab notebooks of experiments designed > to increase the survial rate of pilots downed above the cold waters of the > North Sea. A noble cause. Let me illustrate this with an example. During my visit to the Center for Disease Control in Atlanta, I saw original lab notebooks of experiments designed to cure Aids, Hanta virus, etc. A noble cause. But all of this noble research was obtained by holding the entire population of a nation in thrall. These people were threatened with death if they didn't support this research. Armed men herded resisters into camps guarded by high walls and barbed wire. All government research Nazi or whatever is soaked in the blood of millions. DCF From cklaus at iss.net Mon Oct 9 13:06:30 1995 From: cklaus at iss.net (Christopher Klaus) Date: Mon, 9 Oct 95 13:06:30 PDT Subject: Announcement: Alert Mailing List Message-ID: <199510092303.QAA16855@iss.net> Announcing a new security mailing list - The Alert. The Alert will be covering the following topics: - Security Product Announcements - Updates to Security Products - New Vulnerabilities found - New Security Frequently Asked Question files. - New Intruder Techniques and Awareness To join, send e-mail to request-alert at iss.net and, in the text of your message (not the subject line), write: subscribe alert To remove, send e-mail to request-alert at iss.net and, in the text of your message (not the subject line), write: unsubscribe alert This is a moderated list in the effort to keep the noise to a minimal and provide quality security information. If your site is interested in network security, we put out several FAQes (Frequently Asked Question) that cover the following main areas of topic: Vendor Contacts - Who is the security contacts at IBM, HP, Dec, Motorola, etc. - Web page at: http://iss.net/iss/vendor.html Patches - List of all security related patches catergorized by OS type. - Web page at: http://iss.net/iss/patch.html Compromise - Check list of things to do if your machines are compromised. - Web page at: http://iss.net/iss/compromise.html Anonymous FTP Security - How to correctly set up FTP and check for vulnerabilities. - Web page at: http://iss.net/iss/anonftp.html Sniffers - What they are. How they work. How to detect them. And solutions. - Web page: http://iss.net/iss/sniff.html Security Mailing Lists - A comprehensive list of security mailing lists. - Web page: http://iss.net/iss/maillist.html If possible, it might be a good idea for you to add links to the above web pages on your own Web server and point people who need to know some of the network security issues to the web page. It is possible to point to all of the FAQ pages at: http://iss.net/iss/faq.html -- Christopher William Klaus Voice: (770)441-2531. Fax: (770)441-2431 Internet Security Systems, Inc. "Internet Scanner lets you find 2000 Miller Court West, Norcross, GA 30071 your network security holes Web: http://iss.net/ Email: cklaus at iss.net before the hackers do." From stripes at va.pubnix.com Mon Oct 9 13:27:58 1995 From: stripes at va.pubnix.com (Josh M. Osborne) Date: Mon, 9 Oct 95 13:27:58 PDT Subject: netscape mail starts java attachments upon get new mail... In-Reply-To: <9510091958.AA23589@sulphur.osf.org> Message-ID: In message <9510091958.AA23589 at sulphur.osf.org>, Rich Salz writes: >>As far as I know Java apps can only make network connections to the >>IP address they were loaded from. > >What part of the state of my machine can they access and send out >to the "home port"? Can they read /etc/passwd, make NIS requests, >etc? As far as I know Java Applets either can't do file I/O, or can only do it in a small area of the file namespace that you set aside for it (like ~/java-data). I don't recall any classes that let you make local NIS requests. (however this does imply that if you set up a Java Applet writable area so that you can use the nifty Java rolodex, that other Java applets could damage that data or send copies to "home base" - I don't know if there is any finer-grained access, and I havn't yet been able to do more then _read_ all the Java docs from Sun. All thery, no experiance.) From cjl at welchlink.welch.jhu.edu Mon Oct 9 13:32:30 1995 From: cjl at welchlink.welch.jhu.edu (cjl) Date: Mon, 9 Oct 95 13:32:30 PDT Subject: NSA Realists v. Nuts In-Reply-To: Message-ID: On Mon, 9 Oct 1995, Duncan Frissell wrote: > > On Sun, 8 Oct 1995, Lucky Green wrote: > > > > Let me illustrate this with an example. During my visit to Dachau > > Concentration Camp, I saw original lab notebooks of experiments designed > > to increase the survial rate of pilots downed above the cold waters of the > > North Sea. A noble cause. > > Let me illustrate this with an example. During my visit to the Center > for Disease Control in Atlanta, I saw original lab notebooks of experiments > designed to cure Aids, Hanta virus, etc. A noble cause. > > But all of this noble research was obtained by holding the entire > population of a nation in thrall. These people were threatened with > death if they didn't support this research. Armed men herded resisters > into camps guarded by high walls and barbed wire. > > All government research Nazi or whatever is soaked in the blood of > millions. > > DCF > Deep thinking Duncan, government bad, me good. . . . . . I presume in your moral superiority you also refuse to use public roads and bridges, purchase your food supplies on the black market to ensure that they could not possibly have been USDA inspected, and in every other way endeavor to never eat the fruit of the poisoned tree that is the USGovt. What a heap of self-righteous horseshit. Just call me a modern Mengele, and excuse me while I go bathe in the blood of millions. . . . . Acknowledgements: CJL is supported in part by NIH grants ES05777 and CA61949. C. J. Leonard ( / "DNA is groovy" \ / - Watson & Crick / \ <-- major groove ( \ Finger for public key \ ) Strong-arm for secret key / <-- minor groove Thumb-screws for pass-phrase / ) From adam at homeport.org Mon Oct 9 13:33:21 1995 From: adam at homeport.org (Adam Shostack) Date: Mon, 9 Oct 95 13:33:21 PDT Subject: Crypto's Role in Evil? In-Reply-To: Message-ID: <199510092035.QAA01945@homeport.org> Timothy C. May wrote: | this being a strong cryptography group, this is a good time to mention to | newcomers to the list that the book "Snow Crash," by Neal Stephenson, | offers a wickedly satirical look at a possible future for America. Speaking of Stephenson, he views the Snow Crash future as not a particularly bad one. Sure, some of the companies are evil, but they are not so evil, or as powerful, as governments have been this century. Also, Klaus, I'll offer up the following data on Iboviroxinase-D. LD-50 of 490mg in 20 male subjects aged 16-28. Subjects were paid volunteers. Releases included in study. Onset time of les than one minute from administration of last dose. Doses were administrated intraveneously every 4 minutes as 50mg of Iboviroxinase-D in saline solution. Complete study will be encrypted to you on the payment of $35,000 to our account. While medical data based on various studies will probably become available, there will also be a value to forging such studies (after all, how is Tim to know? (Its worth a bit of time for $35,000 to see if Tim can tell the difference.) Also, expect police to be engaging in undercover work to try to find people who buy these things. Encryption is not a cure all for criminals. It makes some things easier to do, but if the number of crimes drops down to murder, kidnapping, theft and rape, the police will have the time to track down people who kidnap 20 people for a toxicity study. (And good studies will probably take more people than that; partly because its not a refined science, partly because people are so variable.) Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From frissell at panix.com Mon Oct 9 13:35:28 1995 From: frissell at panix.com (Duncan Frissell) Date: Mon, 9 Oct 95 13:35:28 PDT Subject: Crypto's Role in Evil? In-Reply-To: Message-ID: On Sun, 8 Oct 1995, Timothy C. May wrote: > liberalism" and law-based "social justice" policies. My personal view is > that an ever-shrinking elite (20%, then 10%, then 2%, ...) will dominate > high-value transactions, with the mass of humanity offering little or > nothing worth buying. Just my view.) I hear this from commies all the time but I don't have to take it from a fellow libertarian. I expect commies to be economically illiterate. The notion that the unskilled have nothing to sell is the same argument as saying that poor, third-world nations have nothing to sell (and should protect their markets via tariffs). Commies these days (The End of Work - by anti technologist Rifkin) make the same claim. This implies that wants are limited. Most economists operate on the assumption that wants are unlimited. Certainly I do. In addition to becoming skilled, the unskilled can supply personal services that we as primates will still like to have suppled by people. If "magically" supplied goods make goods cheap, labor becomes dearer by definition. Some people seem to think that the theory of comparative advantage means that the person/nation with the lesser comparative advantage can't do anything. What it really means is that the more efficient concentrate on those things they are more efficient at while the less efficient concentrate on less valued tasks which the more efficient could do better if it was worth it to do so but it's not. DCF "Who notes that waitrons of the present day have a much higher real income than physicians of the 19th century." From hfinney at shell.portal.com Mon Oct 9 13:40:11 1995 From: hfinney at shell.portal.com (Hal) Date: Mon, 9 Oct 95 13:40:11 PDT Subject: Certificate proposal In-Reply-To: <199510091926.MAA08047@infinity.c2.org> Message-ID: <199510092038.NAA09612@jobe.shell.portal.com> sameer writes: > In the situation you cite, Bob doesn't know Alice apart from >their email correspondence? Right. My goal is to have a system in which two individuals who have never met can communicate securely. This is not too radical a notion, I trust. In fact, I would go so far as to say that to a considerable extent it is the whole point of public key cryptography. > In this case the ISP is acting as extension-of-alice. Bob >thinks he is talking to Alice but he is talking to ISP+Alice. What >difference does it make, if Bob has no knowledge of Alice outside >their email discussion, that Bob is talking to ISP+ Alice rather than >just alice. From Bob's perspective, Alice is really an alias for >ISP+Alice. (The same goes for Alice in the other direction.) What difference does it make? I'll tell you. It means that their conversation is not private! It means that their cryptography is useless, that it has failed. It means they have an unsecure channel. I don't know how I can put it more plainly than this. I wrote a long article a few days ago arguing that they almost might as well not use cryptography if they're going to adopt this stance. Let anyone eavesdrop, and from Bob's point of view when he thinks he is talking to Alice he is actually talking to eavesdroppers+Alice. From his point of view, Alice is just an alias for eavesdroppers+Alice. Etc., etc. > In tim's words, from alice's point of view "Bob the key" == >"BOB the person and Bob's ISP". From Bob's point of view "Alice the >key" == "Alice the person & Bob's ISP". This is not a useful or appropriate way to think of the world, IMO. If you do this, then from your perspective people become bafflingly unreliable. I wrote all about this before. > The MITM attack only matters if there is a context outside the >email correpondence. (Say, perhaps, a drug deal which involves real >physical goods.) Try to think of it not in relativistic or epistemological terms, but rather look at it in terms of reality. The real world exists, and in it exist real people. We can agree on this much, right? Two of these people want to communicate securely. That is not such a stretch of the imagination, is it? By "communicate securely" I mean they exchange information in such a way that other people don't receive it. Now surely it is clear that with this definition of the problem, approaches which redefine people to mean people+eavesdroppers are not responsive. Perhaps the motivation to do so is simply the belief that the problem is not solvable as stated. If so, I'd like to hear someone say this. Hal From s1018954 at aix2.uottawa.ca Mon Oct 9 13:50:47 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Mon, 9 Oct 95 13:50:47 PDT Subject: Chaum's patents Message-ID: Sorry if this has been stated before, but exactly when do Chaum's first set up e-cash related patents expire? I looked it up in applied crypto the last time I had my hands on it and couldn't find the dates. How many (and what) patents are there in this field anyway? (don't bother with that if it's too long to answer) TIA my visit to Dachau > Concentration Camp, I saw original lab notebooks of experiments designed > to increase the survial rate of pilots downed above the cold waters of the > North Sea. A noble cause. Well I don't think so. The pilots missions were to bomb the cities of England. This was in turn to further the meglomaniac plans of the Fuhrer to create a european police state under his personal rule with all objectors murdered. Analysis of the aims of the research must not simply stop at the immediate result but through to the wider goals towards which the research was intended to contribute. In this context we see that the objective was not to save lives but to destroy them in the furtherance of a plan to enslave the entire population of Europe. spread, > easy employment. I'm not a libertarian, or an anarcho-capitalist. I do, however, support rapid deployment, without restrictions, of strong crypto. Here's why: (1) It is impossible to stop these technologies; someone on the list recently reminded us that a bright fourteen year old could reproduce the basic functionality of PGP in a brief period of time. The mathematics of, say, RSA, are fairly basic. I think it's unreasonable to outlaw multiplication of prime numbers, don't you? (2) While these technologies allow people to violate the law, I have enough faith in humanity to believe that civilization won't collapse as a result. There have always been criminals, and there have always been revolutionaries. Only recently has "The State" been able to supress these forces without maintaining a physical presence. Crypto merely returns us to that default. An example of this is, for example, "What if terrorists are going to blow up a big important building, but we don't know which one?" Before wiretapping, and even today with groups which insist on physical presence in a secure location for planning, you had to infiltrate the group. This will still work. LEAs don't like this sort of activity because of the inherent risk for the infiltrator. That's not a good reason to limit these technologies. (3) These technologies also allow honest, law-abiding citizens to protect themselves from criminals, both within and outside the government. Industrial espionage can be defeated through strong crypto, for example. J. Edgar Hoover would have been powerless to harass Martin Luther King, jr. had MLK had access to strong crypto. Obviously, these aren't the only reasons to use strong crypto, and everybody will almost definitely disagree with them as I've described. But it's one answer, anyway. Jon ------------------------------------------------------------------------------ Jon Lasser (410)494-3072 Visit my home page at http://www.goucher.edu/~jlasser/ You have a friend at the NSA: Big Brother is watching. Finger for PGP key. From hfinney at shell.portal.com Mon Oct 9 13:55:12 1995 From: hfinney at shell.portal.com (Hal) Date: Mon, 9 Oct 95 13:55:12 PDT Subject: Certificate proposal In-Reply-To: Message-ID: <199510092054.NAA12060@jobe.shell.portal.com> m5 at dev.tivoli.com (Mike McNally) writes: >You have several alternative means of verifying the key: >1) You can meet Bob at a local Pizza Hut and verify the key in person. >2) You can go through a variety of channels to a variety of other >trusted entities and verify with them that they're using the same key >for Bob. >3) You can set up some sorts of communications tests to "probe" for a >MITM situation, perhaps by passing through "seeded" information (data >taggants?). I will agree that there are alternatives to certificates. I alluded to this in the part of my message which you elided below, about defeating MITM attacks via various techniques. However, it may not be as easy to automate these tests as to automate a certificate check, and in particular the more automated the tests become the more plausible it would be that the MITM could recognize and defeat a standard test. > > I don't want to overstate the risk of this attack. It would not be an > > easy one to mount ... The risks of MITM attacks on public key > > systems was recognized not long after those systems were proposed. The > > problems with fake keys have been discussed for over a decade. > > > > Why is this all suddenly irrelevant? >I don't think it is irrelevant, I just think it's orthogonal to the >issue of whether a certificate for a key<-->entity relationship is >considered to be the key or an adjunct to the key. I could be wrong, >of course. The POV I am really arguing against is the one that defines identity to be a key, that states that in communicating with a key you are by definition communicating with the person you have in mind. The man in the middle attack does not exist because from your point of view the entity at the other end of the communication channel is just the MITM plus the person you think you are talking to. This idea has been expressed many times by other people in this discussion, and it is this which I think is fundamentally flawed and even dangerous because it encourages the use of untested keys. In fact it seems to define away the question of whether a key is real or fake. Hal From Ulf.Moeller at hamburg.netsurf.de Mon Oct 9 13:57:45 1995 From: Ulf.Moeller at hamburg.netsurf.de (Ulf Moeller) Date: Mon, 9 Oct 95 13:57:45 PDT Subject: GISA budget: millions for cryptanalytic machine Message-ID: According to `die tageszeitung' of 7 Oct 1995, last year the German Information Security Agency was granted several million marks for buying a computer to decrypt telecommunications traffic for the secret service BND. From ses at tipper.oit.unc.edu Mon Oct 9 14:13:21 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Mon, 9 Oct 95 14:13:21 PDT Subject: netscape mail starts java attachments upon get new mail... In-Reply-To: <9510091958.AA23589@sulphur.osf.org> Message-ID: On Mon, 9 Oct 1995, Rich Salz wrote: > >As far as I know Java apps can only make network connections to the > >IP address they were loaded from. > > What part of the state of my machine can they access and send out > to the "home port"? Can they read /etc/passwd, make NIS requests, > etc? Java applets can't read /etc/passwd, and can't issue NIS requests unless they were downloaded from an HTTP server running on the NIS server (actually, they can't do UDP at the moment, so that's out as well) Simon From m5 at dev.tivoli.com Mon Oct 9 14:15:11 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Mon, 9 Oct 95 14:15:11 PDT Subject: Certificate proposal In-Reply-To: <199510091926.MAA08047@infinity.c2.org> Message-ID: <9510092114.AA24726@alpha> hfinney at shell.portal.com writes: > >just alice. From Bob's perspective, Alice is really an alias for > >ISP+Alice. (The same goes for Alice in the other direction.) > > What difference does it make? I'll tell you. It means that their > conversation is not private! It means that their cryptography is > useless, that it has failed. But if by all means available Bob and Alice satisfy themselves that their conversation *is* secure, then (until they're proven wrong) it might as well be. They have satisfied themselves *at least* that their messages are in fact encrypted at some point, just as if they walked into a room, looked around, and satisfied themselves that there are no hidden microphones. I don't see how you can ever do any better than this if you're willing to imagine arbitrary powerful men-in-the-middle. > This is not a useful or appropriate way to think of the world, IMO. If > you do this, then from your perspective people become bafflingly > unreliable. I wrote all about this before. Gee, in my reality people already *are* bafflingly unreliable. (You must not be watching enough afternoon trash talk shows.) > Try to think of it not in relativistic or epistemological terms, but > rather look at it in terms of reality. The real world exists, and in it > exist real people. We can agree on this much, right? Two of these > people want to communicate securely. That is not such a stretch of the > imagination, is it? By "communicate securely" I mean they exchange > information in such a way that other people don't receive it. What, however, is the real difference between the MITM scenario in a purely electronic relationship, and a "phony personality in the middle" attack on a "flesh" relationship? You *think* you're working with a realtor to buy a house, but in fact it's a con artist that betrays your trust and rips you off. You *think* you've found the love of your life, but in reality it's just somebody who wants to use you for sex. There are no guarantees. Let me ask this: how do you *guarantee* that you're having a truly private in-the-flesh correspondence with a person? And, having done that, how do you *guarantee* that the other person will behave in an absolutely trustworthy fashion? > Now surely it is clear that with this definition of the problem, > approaches which redefine people to mean people+eavesdroppers are not > responsive. Perhaps the motivation to do so is simply the belief that > the problem is not solvable as stated. If so, I'd like to hear someone > say this. I certainly don't know how to solve it, but I wouldn't trust me if I were you :-) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From gauthier at espresso.CS.Berkeley.EDU Mon Oct 9 14:29:31 1995 From: gauthier at espresso.CS.Berkeley.EDU (Paul_A Gauthier) Date: Mon, 9 Oct 95 14:29:31 PDT Subject: Basic Flaws in Internet Security and Commerce Message-ID: <9510092126.AA22117@espresso.CS.Berkeley.EDU.mammoth> Basic Flaws in Internet Security and Commerce We believe that the current focus on secure session-layer protocols and sufficient randomness have obscured more fundamental flaws in end-to-end security. In particular, secure end-to-end transactions require two parts: a secure protocol to communicate over untrusted channels, and trusted code at both endpoints. The latter problem has received less attention, but destroys security regardless of the quality of the protocols or of the random numbers. We have implemented a series of related attacks utilizing IP spoofing: * We can spoof NFS to patch binaries on the fly if we are on any subnet between the NFS client and NFS server. We used this to turn legitimate Netscape browsers into versions that used a fixed key (known only to us), thus invisibly eliminating security. * The same trick allows us to defeat Kerberos security by attacking kinit. * We can also spoof NFS file-handle lookups, so that we can replace any file (such as .login) with another file that runs with root access privileges (even if the requesting user cannot). These work because the trusted path to executables is really not trustworthy in most environments. Although we use on-the-wire patching to compromise executables, the client binaries can also be compromised during download, by on-the-wire patching of FTP or HTTP transfers. Trojan horses and viruses could also patch the client software after it's on the local disk, especially on systems like Windows 95 that do not provide access control for files. Given that these are realistic threats, we believe that these issues must be resolved before internet security and commerce are realistic. ------------------------------------------------------------------------------- We began to consider in more detail some fundamental weaknesses of common network security practices that would lead to trivial further attacks on Netscape as well as many other security tools like Kerberos. It was our goal to demonstrate that it is trivially possible to patch executables on-the-wire to completely compromise their security. In doing so, we hope to reinforce the point that security is an end-to-end problem that is far harder than getting the protocols correct. Strong, correct protocols only make more subtle endpoint attacks more likely, especially in light of the potential for financial gain as the amount of commerce on the Internet increases. Most of the attacks we discuss are suitable for the systematic exploitation of large groups of users: an entire organization, or even a large fraction of the user base of a particular piece of software. In many computing environments a pool of common executables, like the Netscape binary, are provided to clients by a fileserver. In such systems, including NFS, AFS and Windows NT, there is no authentication of the file contents sent between clients and servers. In these systems there are provisions for sophisticated access checks to determine file permissions, at open or handle lookup time. But the file contents that are read from the server are not authenticated in any secure way. The client has no way to determine if the bytes are indeed being sent by the server. Our first attack model is one in which the attacker has (promiscuous) network access to any machine on any ethernet subnet between the fileserver and the clients under attack. In under a day we produced software that can exploit the lack of authentication in NFS to patch the object code of any executable on-the-wire as it travels between the NFS server and the client machine. The technical details of the attack are rather simple. To retrieve data from the NFS server a client sends a short request message detailing which block from the file it is interested in (where a block is a range of bytes). The attack software is located on an ethernet segment between the client and the NFS server, so is able to snoop this traffic. The attack software snoops, waiting for any request for a particular block of a particular executable; for example, the block containing the session-key generation code in the Netscape executable. It is then able to forge a reply from the NFS server and transmit it to the client. If the forged packet reaches the client before the legitimate reply, it is accepted and the legitimate reply is discarded as a duplicate. There is obviously a race condition between the injection of the forged response and the true response. Since the attacking software is focused solely on this task, while the fileserver is certainly servicing requests from many clients, it stands a very good chance of winning the race. We have observed that the attacking software wins the race a large fraction of the time. Given this ability it becomes possible to compromise the security features of any executable loaded from the network. We have examined the Netscape v1.1N executable and located the code that selects the session key. By patching only 4 bytes we were able to cause the selection of a predictable session key every time the browser engages in the SSL protocol. It is then trivial to snoop and decrypt all traffic from the browser to secure servers, obtaining credit card numbers or other private information. Since this is really an attack on the client, it is not limited to the Netscape browser. On the contrary, it is extremely widely applicable. An appropriate patch to the Kerberos kinit executable makes possible the compromise of any passwords entered by users, and therefore all of the authentication facilities provided by Kerberos. In many environments, including our own here at UC Berkeley, all the Kerberos application binaries are served from an NFS server. This represents a major flaw in security as our attack demonstrates. Having authenticated file services (kerberized NFS or AFS) is useless if the integrity of the kinit executable cannot be ensured (most easily by obtaining it from local disk). However, making local copies of crucial binaries is not sufficient in the face of a more serious set of variants on the NFS spoofing attack. The spoofing software can be placed as before, in a position to snoop requests to the NFS server. As clients issue a lookup filehandle request the spoofing software can return the handle to a different executable and also forge its attributes. By tricking users into executing code that is setuid root, unlimited access to the client's workstation can be obtained easily. It is possible to mount NFS partitions so that setuid root executables will not be honored by the client. Still, the spoofing software can make arbitrary NFS filehandle lookup requests succeed, and substitute a trojan of some sort. The attacker could cause misspellings of commonly executed commands to appear to succeed, or could spoof other files that are trusted by the operating system. For example, the user's .login file is a natural and easy target from which to leverage further damage. This implies that it is unsafe to execute any program obtained via an insecure channel to an NFS server, no matter what the privilege level of the client user. Neither is it limited to NFS or file-serving protocols in particular. Protocols based on TCP, rather than UDP, are just as vulnerable. It is possible to hijack non-authenticated TCP connections, although it is somewhat more complicated. Attacks based on spoofing traffic coming from the distribution site of popular software packages is also possible. Berkeley, for example, is a mirror site for the Netscape browser. Any student with promiscuous network access on a machine between the ftp server and the main link to the larger Internet could have installed similar patching software to patch the huge number of copies of the binary that were retrieved from server.berkeley.edu. More mundane attacks based on trojan horses or viruses remain viable today. These attacks must exploit some other weakness in a system's security to infiltrate, but once in place they can perform patches to local binaries to fully compromise a system. Previously such attacks were mostly motived only by ego or malice; it is now more valuable to compromise a client invisibly, so that the user believes the system is secure. Thus, unlike traditional viruses, the new strains will aim to have no visible effect on the system, thus making them difficult to detect and easy to spread unintentionally. Our patch of Netscape has this flavor. We realize that it is impossible to eliminate all security holes; one can always question whether it is safe to trust the hardware, or whether outside channels used for communication of public keys or checksums are truly secure, etc. Fortunately, in practice it should suffice to handle far less than all of these risks. We hope to have demonstrated one gaping hole in practical security today, and to have highlighted the problem of the trusted endpoint. There is one simple step that we can suggest that would go a long way towards improving the security of endpoints. Increasing the practice of software providers widely publishing cryptographically secure checksums of their executables would be extremely helpful. A small amount of paranoia and care must be applied to securing the executables used in the verification process. A read-only floppy disk would be appropriate to hold the verification software, for example. We are concerned that security on users' workstations and PCs is currently insufficient. When real money is at stake, endpoint security must withstand greater scrutiny. In summary, protecting the communications channel doesn't help if the endpoints can be subverted. We implemented and discussed several related attacks that replace legitimate programs by compromised versions. Until we can trust every program that executes between the time we boot and the time we finish the secure protocol, we cannot reliably authenticate anything. Today there is no basis for this trust. Eric Brewer, brewer at cs.berkeley.edu Paul Gauthier, gauthier at cs.berkeley.edu Ian Goldberg, iang at cs.berkeley.edu David Wagner, daw at cs.berkeley.edu A copy of this post is available as http://http.cs.berkeley.edu/~gauthier/endpoint-security.html From sameer at c2.org Mon Oct 9 14:40:16 1995 From: sameer at c2.org (sameer) Date: Mon, 9 Oct 95 14:40:16 PDT Subject: Certificate proposal In-Reply-To: <199510092054.NAA12060@jobe.shell.portal.com> Message-ID: <199510092134.OAA18662@infinity.c2.org> > > The POV I am really arguing against is the one that defines identity to > be a key, that states that in communicating with a key you are by > definition communicating with the person you have in mind. The man in > the middle attack does not exist because from your point of view the > entity at the other end of the communication channel is just the MITM > plus the person you think you are talking to. This idea has been > expressed many times by other people in this discussion, and it is this > which I think is fundamentally flawed and even dangerous because it > encourages the use of untested keys. In fact it seems to define away > the question of whether a key is real or fake. > > Hal > Suppose you have Alice, Bob, and Mallet. (Mallet is the convention for the MITM, right?) Suppose Alice and Bob are communicating privately. Suppose that Mallet is one of Bob's personalities, because he suffers from multiple personality disorder. How is this different from where Mallet is actually Bob's ISP? Even if Alice & Bob were talking in person, privately, Alice doesn't know that she is also talking to Mallet. My point is that given no other context, there is *no way* to know for certain that you are communication with the person you have in mind. Or suppose that Bob is a drug user doing a plea bargain. He agrees to have his communications monitored via MITM attack to get a lesser sentence. He buys drugs from Alice and Alice gets caught. The thing I am emphasizing here is the necessity to have some sort of -context- when addressing MITM. In a situation without context, MITM is not an issue. In a situation -with- context, MITM is an issue. -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From m5 at dev.tivoli.com Mon Oct 9 14:47:55 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Mon, 9 Oct 95 14:47:55 PDT Subject: Certificate proposal In-Reply-To: Message-ID: <9510092146.AA28192@alpha> hfinney at shell.portal.com writes: > >3) You can set up some sorts of communications tests to "probe" for a > >MITM situation, perhaps by passing through "seeded" information (data > >taggants?). > > I will agree that there are alternatives to certificates. I'm a little confused, I guess. What is it about certificates that you'll trust with such confidence? How do you know that the guarantor of a certificate wasn't spoofed by an MITM attack? How do you know that the certificate itself wasn't spoofed? > >I don't think it is irrelevant, I just think it's orthogonal to the > >issue of whether a certificate for a key<-->entity relationship is > >considered to be the key or an adjunct to the key. I could be wrong, > >of course. > > The POV I am really arguing against is the one that defines identity to > be a key, that states that in communicating with a key you are by > definition communicating with the person you have in mind. The man in > the middle attack does not exist because from your point of view the > entity at the other end of the communication channel is just the MITM > plus the person you think you are talking to. I think it's more correct to say that the MITM attack is acknowledged to be possible, but realistically no more of a threat than in a certificate model. And note the "I think", and this warning that I could be wrong. (Or I could be an MITM... bwahahahaha!) > This idea has been > expressed many times by other people in this discussion, and it is this > which I think is fundamentally flawed and even dangerous because it > encourages the use of untested keys. In fact it seems to define away > the question of whether a key is real or fake. Oh now wait a sec here; I don't think anybody's advocated using "untested" keys. It's still perfectly reasonable to establish networks of reliable information focused on a key. If I electronically "encounter" Alice and decide to begin a secure conversation, we initiate a key exchange. I can then go to as many already-trusted entities as I like in an attempt to verify that as many attributes that are claimed to be associated with the key are really there as I desire. If Alice wants to buy a widget from me, I can ask other businesses whether they've ever had problems collecting from that key. If I want to buy a widget from Alice, I can ask friends whether they've gotten good widget from that key. If I'm interested in a little e-hanky-panky, I can ask around the sleazier corners of the net to see whether Alice is the kiss-and-post type. Somebody's going to have to explain to my thick skull how it is that a certificate system makes this process any different, fundamentally. I mean, it may be that there's more superficial security, but I don't see where there's any additional risk truly introduced by using the key itself as a "True Name". Maybe the real question is, how does a certificate system give me the confidence that there really is an "Alice" according to some definition of "really" that satisfies me? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From vznuri at netcom.com Mon Oct 9 14:56:43 1995 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Mon, 9 Oct 95 14:56:43 PDT Subject: java security & the cypherpunk agenda Message-ID: <199510092126.OAA11086@netcom8.netcom.com> once again I will offer a contrary view, and once again to PM. PM predicts that serious (unfixable?) bugs will be found in Java on the level of what was recently identified in Netscape. I disagree. I am not intimately familiar with Java (nor, obviously, is PM), but I know Java was designed from the ground up to be secure on every platform it is running on. in contrast to most OSes, the whole theory of Java is based on creating a totally secure, unbreakable programming environment. most OSes start out with the idea, "what is an application? how does the OS handle it? how does the OS permit file I/O etc.?" Java starts out with the idea, "what operations can be allowed without compromising security but still allowing algorithms"? the software will succeed or fail in its aims on how well it accomplishes the criteria of unbreakable security.. I suspect it is eventually going to be considered more secure than many OS's out there that it runs on (even unix). (and Java may eventually evolve to become an integral part of future OS security apparatuses). one thing that people don't seem to realize: Java was clearly engineered to be a language that would allow "cycle sales" over cyberspace. in other words, how can companies lease out unused cycles to the world just like power companies sell off their extra watt-hours to adjacent cities? a secure language is the critical piece, and the Java designers were clearly aiming for this remarkable and commendable accomplishment. someday, even conservative companies such as IBM may agree that the security of Java is so great (and so widely well-proven as rock solid) that they will lease out their unused, nighttime CPU cycles to Java applications and interested buyers, because they can be sure that there is just no way to sabotage a system no matter how ingenious you are.. PM tends to suggest that any language or computing environment with a certain degree of complexity simply cannot be made secure. I generally agree with this. however I suspect that Java is beneath this complexity cutoff. I do agree with other cypherpunks however that focusing cpunk attentions on breaking Java is a highly worthwile activity. Java is an extremely promising development and I fully suspect it will become something of the first widespread "cyberspatial programming language". in another message I talked about how companies such as Netscape may not become so security conscious themselves but work with other companies who are security paranoid and try to successfully integrate their applications. Java is the prime candidate for this. and I am willing to bet the Java engineers have seen every security trick in the book (many I suspect perhaps even PM in his own paranoia and obsession is not aware of) and can demonstrate how Java, at least if implemented bug-free, defeats *all* of them and can virtually be proven secure. now, that little catchword "bug-free" I put in the last sentence is something that everyone here can jump on. "it might be possible to create a secure language *in*theory*" say the naysayers, "but in practice it will always have bugs that can break it." well, I think if anything will go beyond this weakness, Java has the best chance. and the above argument sounds suspiciously like, "no software can really accomplish exactly what it sets out to, because it will have bugs". sure, Word and Excel both have bugs, but they do not defeat the primary design. and this argument, "you cannot implement perfect software" is more of a complaint against human psychology than against a group who is trying to implement a theoretically secure programming environment. (perhaps they should use the qualification, "java is the first secure programming language, in theory; in practice YMMV "). I think we should be careful to make this distinction. there is a lot of software that is not even theoretically secure, and there is some software that tries to be secure but is not due to implementation difficulties. the latter should not really be our concern so much. we are not here to try to prevent programming errors (i.e., not correctly translating a correct design into code) so much as to try to get companies to write software, that if written properly, is secure. (it seems to me this is the logical first step, and then then next step is trying to break the code that seeks to be secure and flame the eyebrows off its designers, as has been done here recently , but unless one first has a good hammer, one does not care about faulty nails..) I was talking to a press reporter and he asked if the cpunks had gone into some sort of new phase in which they were becoming something like the policemen of cyberspace. I said that they had not really changed in their goals much at all, it's more that the software that cpunks have fantasized about for years is now starting to materialize, and there is now something concrete to focus energies on. Netscape is a good example, and Java is another example. I think if I had talked about Java a few years ago on this list, and about who invented it (Sun), what it was designed to do, etc., people here would be delirious with excitement. instead, there is a bit of cynicism here that is a bit surprising to me. if there ever was a "cpunk language" that seeks to achieve widespread, home-grown, secure algorithms in cyberspace, I would consider this this closest. I highly recommend cpunks pay close attention to Java and help in its development, because imho it really has been conceived largely with key cpunk agenda items as basic design criteria. I suspect it is going to become a very strong standard and eventually recognized as one of the most secure pieces of software ever designed, at least in regards to theoretical capabilities. --Vlad Nuri From gmiller at grendel.ius.indiana.edu Mon Oct 9 15:00:18 1995 From: gmiller at grendel.ius.indiana.edu (Greg Miller) Date: Mon, 9 Oct 95 15:00:18 PDT Subject: Java In-Reply-To: <199510090017.UAA00652@jekyll.piermont.com> Message-ID: On Sun, 8 Oct 1995, Perry E. Metzger wrote: > > As long as people are mentioning Java, I just want to make the > prediction, one more time, that at some point someone is going to find > some devistating security holes in HotJava. I'd like to make this prediction: someone at some point in time will find another serious security hole in SendMail. What you need to ask yourself is "Do the benefits of Java outweigh the security risks?" greg.miller at shivasys.com http://www.ius.indiana.edu/~gmiller/ From kinney at bogart.Colorado.EDU Mon Oct 9 15:07:10 1995 From: kinney at bogart.Colorado.EDU (W. Kinney) Date: Mon, 9 Oct 95 15:07:10 PDT Subject: NSA Realists v. Nuts In-Reply-To: Message-ID: <199510092206.QAA07357@bogart.Colorado.EDU> C.J. Leonard writes -- > On Mon, 9 Oct 1995, Duncan Frissell wrote: > > > > All government research Nazi or whatever is soaked in the blood of > > millions. > > Acknowledgements: > CJL is supported in part by NIH grants ES05777 and CA61949. I'm paid by the DOE. Constantly having to get the upholstery in my Bronco cleaned. (Don't do this at home, kids. Government research is a messy business.) -- Will From shamrock at netcom.com Mon Oct 9 15:22:56 1995 From: shamrock at netcom.com (Lucky Green) Date: Mon, 9 Oct 95 15:22:56 PDT Subject: PC disk wipe software Message-ID: <199510092220.SAA19341@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <199510091318.JAA24166 at jekyll.piermont.com>, perry at piermont.com ("Perry E. Metzger") wrote: > I thought I'd ask here, since its related to a lot of the stuff people > have written for the PC platform in these parts. I need to securely > wipe a bunch of data from an MS-DOS hard drive, so that it can't be > recovered. Are there any readily available utilities for this? Will > any of them selectively erase only data that isn't allocated to > existing files? Whatever you use, check its claims with a disk editor. None of the various wipe utilities for the Mac that I am aware of (Norton, Burn) work as advertized. They all invariably fail to wipe the slackspace at the end of allocated, but not fully used blocks. Consequently, several kB of data left behind in said slackspace by previously deleted files will be missed on your average drive. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHmgGioZzwIn1bdtAQFEsQF8CYfksEosFfBJoQckOM390b7CBeupCtrf T2Var/yEUwuT5lxH7xJ6y9p69wfaljtz =Hkkv -----END PGP SIGNATURE----- From aba at dcs.exeter.ac.uk Mon Oct 9 15:42:04 1995 From: aba at dcs.exeter.ac.uk (aba at dcs.exeter.ac.uk) Date: Mon, 9 Oct 95 15:42:04 PDT Subject: Certificate proposal In-Reply-To: <9510092114.AA24726@alpha> Message-ID: <21628.9510092240@exe.dcs.exeter.ac.uk> I have been following this MITM argument, and find the reasons for the presentation of some of the arguments confusing. I'm near certain everyone of those arguing understands public key, and the use of out of band channels (physical meeting, paper mail, alternate information provider, plastering public key hashes (eg PGP fingerprints) everywhere by all comms mediums available, etc) to build a web of trust, and hence reduce chances of a MITM. I think I have seen two roughly equivalent views of the relationships between keys and names presented, and these could be sumarised: a) a person has-a key ("has-a" in an entity relationship diagram sense -- it is somthing that a person posses), that person may or may not choose to go by their true name, whilst using that key) a) a key has attributes one of which could (optionally) be a true name both cases use the same techniques of using all available out of band comms channels, to make life as tough as possible for the MITM. So far so good. Now the puzzling stuff is people who appear to be arguing that MITM is unimportant, and the whole thing revolves around some relativistic world view, and it somehow doesn't matter if there is an eavesdropper so long as you have not yet discovered this. As it quite clearly does matter, and I can't see how that view provides anything useful, I assume that there is some theoretical point these people are trying to make which I fail to grasp. Anyone care to fill me in as to what this concept is? Perhaps the view is based on the fact that there are plenty of situations where you don't care what an entities name is, and hence the attribute which should be under discussion is credit worthiness, or reliability, but still you need to protect against MITM, using whatever channels and means available. I don't see how this alters the argument. Adam From sjb at universe.digex.net Mon Oct 9 16:03:45 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Mon, 9 Oct 95 16:03:45 PDT Subject: Certificate proposal In-Reply-To: <199510092038.NAA09612@jobe.shell.portal.com> Message-ID: <199510092303.TAA24560@universe.digex.net> Hal writes: >Try to think of it not in relativistic or epistemological terms, but >rather look at it in terms of reality. The real world exists, and in it >exist real people. We can agree on this much, right? Two of these >people want to communicate securely. That is not such a stretch of the >imagination, is it? By "communicate securely" I mean they exchange >information in such a way that other people don't receive it. >Now surely it is clear that with this definition of the problem, >approaches which redefine people to mean people+eavesdroppers are not >responsive. Perhaps the motivation to do so is simply the belief that >the problem is not solvable as stated. If so, I'd like to hear someone >say this. This whole issue is a philosophical one. The issue is the "ontology" of electronic relationships. The argument presented is analogous to the "Turing test" for artificial intelligence. The MITM is relevant only where two commuicating parties share no channels which the MITM doesn't control, otherwise they exchange one secret over such a channel and Mitch is hosed (with probability 1/2^h, where h is the entropy of the secret). Now, if Alice communicates with an entity she knows as "Bob", which in "reality" is Bob filtered by Mitch, I think we can readily agree that Alice probably cannot communicate securely with Bob. She *can*, however, communicate in perfect secrecy with "Bob" -- the amalgamation of Bob and Mitch. The ontological issue comes about when we ask who it is with whom Alice *wants* to communicate. I'd maintain that Bob has no ontological status with Alice. She knows nothing of Bob, only of "Bob". Therefore, she must be intending to communicate with "Bob", and her communication is secure. An entity cannot have a meaningful ontological status until some communication occurs. The status which results from the communication is "the entity, calling itself Bob, with whom I communicated over channel X". When a second communication occurs, we may have "the entity, calling itself Bob, with whom I communicated over channel Y". If the second communication contains an authenticating transaction, then we can note that the two entities are the same. This is what we really mean by authentication, anyway. As long as Mitch is successful in his MITM attack, then Bob is not an entity with respect to Alice. If Alice finds a key that purports to belong to Bob, about whom she previously knows nothing, what possible relevance can it have whether it really belongs to Bob or to "Bob" --- there is nothing in Alice's mind to distinguish the two. If Alice finds a key that purports to belong to Carol, about whom she knows something, then she must execute an authentication protocol with the new key to verify that the entity with whom it permits communication is actually Carol, and not "Carol". Identifying the key with the person is entirely reasonable, if the key is what introduced the person to you (and thus ontologically created the entity). If the introduction happens prior to receiving the key, then authentication becomes necessary to avoid MITM. From perry at piermont.com Mon Oct 9 16:06:02 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 16:06:02 PDT Subject: netscape mail starts java attachments upon get new mail... In-Reply-To: Message-ID: <199510092305.TAA24544@jekyll.piermont.com> "Josh M. Osborne" writes: > As far as I know Java apps can only make network connections to the > IP address they were loaded from. That might be the design, but we know that it is hard to faithfully implement very complicated designs. Perry From eli at UX3.SP.CS.CMU.EDU Mon Oct 9 16:07:03 1995 From: eli at UX3.SP.CS.CMU.EDU (Eli Brandt) Date: Mon, 9 Oct 95 16:07:03 PDT Subject: Certificate proposal In-Reply-To: <199510092038.NAA09612@jobe.shell.portal.com> Message-ID: <9510092306.AA04357@toad.com> Hal said: > Try to think of it not in relativistic or epistemological terms, but > rather look at it in terms of reality. The real world exists, and in it > exist real people. We can agree on this much, right? Two of these > people want to communicate securely. That is not such a stretch of the > imagination, is it? By "communicate securely" I mean they exchange > information in such a way that other people don't receive it. If the devil runs the entire network, Alice and Bob are out of luck. They can't absolutely guarantee that this is not the case. But as you point out, it is useless to say, "This key lets you talk securely to Alice and anyone else who may be listening." This hard-codes your paranoid fantasies into the semantics of the system. Overestimating the threat can result in bad decisions just as underestimating can. I've seen people on Usenet say, "The NSA can break anything, so why bother with PGP?" What we want is for two parties, presumed trustworthy, to be able to communicate with some confidence that they are not being eavesdropped upon by any opponent with realistic capabilities. This is feasible. This is a useful thing to be able to do. Defining the problem away is less useful. I could say more, but I'm not certain I really understand this whole conversation, so I'll hold off for now. -- Eli Brandt eli+ at cs.cmu.edu From m5 at dev.tivoli.com Mon Oct 9 16:11:29 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Mon, 9 Oct 95 16:11:29 PDT Subject: Certificate proposal In-Reply-To: <9510092114.AA24726@alpha> Message-ID: <9510092311.AA27677@alpha> aba at atlas.ex.ac.uk writes: > Now the puzzling stuff is people who appear to be arguing that MITM is > unimportant Hal said this same thing in a recent note. For myself, I've never meant to argue that the MITM threat is unimportant. I've simply contended that you're no more vulnerable to it in the key-as-True-Name scenario than with a certificate-bound key-to-name relationship system. If you assume an MITM could thwart the establishment of trust in the first case, then I guess I posit that the same energies could with equivalent hope for success be directed in an attack on a more "traditional" certificate scheme. > Perhaps the view is based on the fact that there are plenty of > situations where you don't care what an entities name is, and hence > the attribute which should be under discussion is credit worthiness, > or reliability, but still you need to protect against MITM, using > whatever channels and means available. I don't see how this alters > the argument. And this is where I start to think we're all in agreement even though there's an argument going on! Yes, I think you need to protect against MITM attacks by whatever means are available. I think that no matter what you do, if you're strictly relying on communications systems over which you ultimately have no control (if at some point somebody you simply have to trust on faith inevitably gets his hands on your bits), then you have to put up with a non-zero probability of being victimized by a MITM attack. If you're willing on blind faith to trust certificates granted by some authority, you're fooling yourself (I claim). If you only trust that authority because it fits into an established web, then I don't see why there's any need for a certificate binding a public key to some "True Name" constant; what's the point? (How do you know the alleged True Name has any meaning in the first place?) I also posit that this is not really any different than the problems of social interaction homo sapiens have been dealing with ever since they grunted their way into cooperative tribal life. [ I kinda wish somebody with more of a clue than I have would support me or tell me to shut up :-] ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From hfinney at shell.portal.com Mon Oct 9 16:17:41 1995 From: hfinney at shell.portal.com (Hal) Date: Mon, 9 Oct 95 16:17:41 PDT Subject: Certificate proposal In-Reply-To: <21628.9510092240@exe.dcs.exeter.ac.uk> Message-ID: <199510092316.QAA09588@jobe.shell.portal.com> It occurs to me that perhaps I have been missing a point here when people argue that having a "man in the middle" is not that different from various forms of secure communication, such as where Bob has multiple personalities or is a committee. I have been taking this to mean that we should therefore not worry about MITM attacks, which seems crazy to me. Instead perhaps this was meant as a "reductio ad absurdum" argument for why MITM attacks cannot be prevented in the scenario where people have no out-of-band contact. Anything which could detect and prevent MITM attacks could, by this analogy, detect whether Bob had multiple personalities. Since the latter is obviously impossible, the former must be as well. Hence the problem has no solution and we should not waste much time on it. I don't fully agree with this but at least it is not as bizarre as the first interpretation. Hal From perry at piermont.com Mon Oct 9 16:22:31 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 16:22:31 PDT Subject: java security concerns In-Reply-To: <9510091642.AA28211@pepper.Eng.Sun.COM> Message-ID: <199510092322.TAA24567@jekyll.piermont.com> Chuck McManis writes: > Perry pointed out the standard set of concerns that anyone should have with > Java. About the only thing I'd care to dispute at the moment is that Java > is a "large complicated" application. It is in fact less than 20K lines of > C code. Sendmail is about 29K lines of C code -- not significantly larger by my standards -- and has proven nearly impossible to secure. > And while it is true that applications of even this size are > difficult to prove safe, there has been an effort to break that problem > up into components such that each "layer" can be proven safe and where > that layer is used that safety carries over. Sendmail performs a much simpler task and has not proven secure. Look, I'm not arguing that you and the rest of the Java folks aren't smart people who have worked very hard. I've got a great deal of respect for Gosling and the rest of you guys. Unfortunately, you've taken on an impossible task. Marcus Ranum has noted that you can't trust a program thats bigger than a couple of pages long, and I believe he's right. Thats why when there is a program that I absolutely have to trust I make sure it isn't any longer than that. (This is frequently a very practical thing, by the way.) As an aside, have you tried breaking your own program? Spend a week on it some time. Its usually an educational experience and it breaks you out of the mindset you have fixed in for a while. As people have found out, it has proven possible to core dump the Java interpreter. That means that your implementation has contained flaws that potentially permitted people to do unplanned things to the state of the interpreter. By the way, I suggest that Sun should offer a large money prize for the first significant security hole found the Java implementation. Its a tiny price to pay for security. Perry From frissell at panix.com Mon Oct 9 16:24:19 1995 From: frissell at panix.com (Duncan Frissell) Date: Mon, 9 Oct 95 16:24:19 PDT Subject: NSA Realists v. Nuts In-Reply-To: <199510092206.QAA07357@bogart.Colorado.EDU> Message-ID: On Mon, 9 Oct 1995, W. Kinney wrote: > I'm paid by the DOE. Constantly having to get the upholstery in my Bronco > cleaned. (Don't do this at home, kids. Government research is a messy > business.) 2400 Americans are imprisoned every year for federal income tax violations. Approximately one person is killed every year in arrests involving federal income tax violations. Millions of man-years are spent annually in involuntary servitude to comply with tax laws. Public employees should be aware of the fact that their contribution to society is of such low value that it will not be paid for without a gun to the customer's head. Luckily cheap switches and strong crypto will make it harder for large monopoly institutions to maintain their controls. Look around for some honest work. DCF "Who thinks Michael Milkin should expatriate and renounce his citizenship so he can get back into the securities business without needing to fear the attacks of the diseased dwarfs (and one giantess) of the Klinton Kabinet." "Just trying to prove that the Republican Congresscritters aren't extremists." From m5 at dev.tivoli.com Mon Oct 9 16:25:16 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Mon, 9 Oct 95 16:25:16 PDT Subject: Certificate proposal In-Reply-To: <199510092038.NAA09612@jobe.shell.portal.com> Message-ID: <9510092324.AA28153@alpha> Scott Brickner writes: > [ ... a bunch of stuff I have no quarrel with ... ] > > Identifying the key with the person is entirely reasonable, if the key > is what introduced the person to you (and thus ontologically created > the entity). Right (sez me). > If the introduction happens prior to receiving the key, > then authentication becomes necessary to avoid MITM. Maybe I'm not sure what good a "true name" certificate is going to do me in establishing confidence in a key. How will I know that the MITM attack didn't begin with the "true name" registration? (Note that I continue to insist that I very well might be totally without clue here, so correct me brutally if applicable.) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From perry at piermont.com Mon Oct 9 16:33:06 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 16:33:06 PDT Subject: Software Patents are Freezing Evolution of Products In-Reply-To: <199510091730.KAA07041@dustin.verisign.com> Message-ID: <199510092332.TAA24591@jekyll.piermont.com> Peter Williams writes: > The thesis [that patents are bad] is fundamentally flawed in the > case of publickey applications which provide or exploit digital > signatures, as its assumptions are false, patently. And you wouldn't have any financial interest in this position, would you? Frankly, I don't believe that ANY patents are legitimate, but thats not a cypherpunk topic. However, the following is: I'll be throwing a very, very big party when the public key patents expire in about two years to celebrate the freeing of modern cryptography. I have yet to decide whether to wait until both the Diffie-Hellman patent and the patent on public key itself have expired or hold it after the first goes south, as there is still some time to wait until the blessed day. Perry From edge at got.net Mon Oct 9 16:43:16 1995 From: edge at got.net (Jay Campbell) Date: Mon, 9 Oct 95 16:43:16 PDT Subject: HTTP anon proxy pointers Message-ID: <199510092356.QAA23573@you.got.net> At 12:00 PM 10/9/95 -0500, Kevin L Prigge wrote: >I seem to recall that someone was working on an anonymous http >proxy a couple months ago. Pointers would be appreciated. Thanks. We had discussed this at the last Bay Area Cypherpunks meeting (BTW, when/where is the next??), and came to the conclusion that it would be technologically simple, but load inefficient, to implement in a large scale at this point. The main problem with anonymous http (or telnet, talk, etc) lies in the sheer amount of information being transferred, and the even larger amount of noise an anonymous site would have to generate to defeat traffic analysis. A mail message is usually under a few K, but with these larger systems you move into the multiple meg realms; to hide a single individual's (ie,) 3K/sec stream, a provider would have to generate many times that in cover traffic. We can force traffic to the user from network speeds to slow down to modem speeds, but that doesn't help the inbound crunch at all. Web sites don't generally generate much inbound traffic, but when coupled with dialups (such as in my case) this could lead to bad service to the local modem users. The good news is, with multiple anon redirectors bouncing traffic between them to further confuse an attacker, the number of users can grow an order of magnitude without any additional load, since the streams are hiding in the midst of other streams and far less random cover traffic needs to be generated. Software-wise, an anonymous http scheme could be implemented with a standard proxy server with remote host access restrictions and log analysis tools to charge the appropriate individuals for their usage (a la anon email postage stamp rolls). Down the road, cover traffic, ecash payment, encryption, and other nifty toys can be added. If anyone on this list is in need of anonymous http right now (even to tinker with it) I'd be willing to set up a free-use proxy, as long as you don't bring our server or our pipe to their knees. Mail me (privately if you wish) with the individual IPs/names of the hosts you'd be coming in from - no blanket domain names, please, unless they're your own personal network. If I see enough interest I'll have a proxy up by next week. Have I missed anything? -- Jay Campbell - Regional Operations Manager -=-=-=-=-=-=- Sense Networking (Santa Cruz Node) edge at got.net "Shoot the Fruit Loop" "On the Information Superhighway, I'm the guy behind you in this morning's traffic jam leaning on his horn." From sjb at universe.digex.net Mon Oct 9 16:52:11 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Mon, 9 Oct 95 16:52:11 PDT Subject: Certificate proposal In-Reply-To: <9510092311.AA27677@alpha> Message-ID: <199510092351.TAA25651@universe.digex.net> Mike McNally writes: > >aba at atlas.ex.ac.uk writes: > > Now the puzzling stuff is people who appear to be arguing that MITM is > > unimportant > >Hal said this same thing in a recent note. For myself, I've never >meant to argue that the MITM threat is unimportant. I've simply >contended that you're no more vulnerable to it in the key-as-True-Name >scenario than with a certificate-bound key-to-name relationship >system. If you assume an MITM could thwart the establishment of trust >in the first case, then I guess I posit that the same energies could >with equivalent hope for success be directed in an attack on a more >"traditional" certificate scheme. I disagree. The MITM is foiled by one successful communication. The reason for certificates is to isolate and limit the number of authentication transactions which are not automated. When you get your key certified you go through some sort of very-hard-to- subvert process. The exact process is irrelevant, as it merely affects the trustworthiness of the certifier. Let's assume for the sake of argument that the key is certified by the same organization (DMV/MVA/DPS/whatever) that issues drivers licences, and on the same identification criteria. When you have your key certified, you also get a copy of the KCA's key. You now have enough information to authenticate to roughly the same level as presentation of a state issued ID card. After the first transaction, you can accept any key *signed* by the KCA under the same circumstances you'd accept the id card. But you can get KCA signed keys from almost *anywhere*, without the overhead associated with that level of authentication. The expensive authentication happens once, followed by a nearly unlimited number of cheap ones. > > Perhaps the view is based on the fact that there are plenty of > > situations where you don't care what an entities name is, and hence > > the attribute which should be under discussion is credit worthiness, > > or reliability, but still you need to protect against MITM, using > > whatever channels and means available. I don't see how this alters > > the argument. > >And this is where I start to think we're all in agreement even though >there's an argument going on! Yes, I think you need to protect >against MITM attacks by whatever means are available. I think that no >matter what you do, if you're strictly relying on communications >systems over which you ultimately have no control (if at some point >somebody you simply have to trust on faith inevitably gets his hands >on your bits), then you have to put up with a non-zero probability of >being victimized by a MITM attack. If you're willing on blind faith >to trust certificates granted by some authority, you're fooling >yourself (I claim). If you only trust that authority because it fits >into an established web, then I don't see why there's any need for a >certificate binding a public key to some "True Name" constant; what's >the point? (How do you know the alleged True Name has any meaning in >the first place?) > >I also posit that this is not really any different than the problems >of social interaction homo sapiens have been dealing with ever since >they grunted their way into cooperative tribal life. I think we're still "arguing past each other." One side seems to argue "people have keys, and we need a way to authenticate them". The other seems to argue "there are situations where we don't care about the people behind the keys." Both are correct. As I said before, authentication is the correlation of entities with whom you've communicated over different channels. The notion that "people have keys" sort of implies that you know something about the "people". This really means you've communicated with them out-of-band --- even if you've just heard about them, it's a few bits of information. When you finally communicate in-band, you need an authentication protocol to correlate the entity on the other end of the current channel with the entity you have in mind. From hfinney at shell.portal.com Mon Oct 9 16:54:56 1995 From: hfinney at shell.portal.com (Hal) Date: Mon, 9 Oct 95 16:54:56 PDT Subject: Certificate proposal In-Reply-To: Message-ID: <199510092353.QAA16167@jobe.shell.portal.com> m5 at dev.tivoli.com (Mike McNally) writes: >I'm a little confused, I guess. What is it about certificates that >you'll trust with such confidence? How do you know that the guarantor >of a certificate wasn't spoofed by an MITM attack? How do you know >that the certificate itself wasn't spoofed? I believe that the certificate wasn't spoofed by an MITM attack because the certificate issuing process requires face to face contact with some proof of identity, in at least one way of doing this. The certificate wasn't spoofed because I got the key of the signer through an out of band mechanism, such as seeing it printed in the newspaper. The main requirement is to have some contact between Alice and the rest of the world which doesn't go through the MITM, and the same for Bob. By using certificates, this contact only has to be done once (for each of them). There is no need for Alice and Bob themselves to have a face to face meeting, nor for Alice and Charlie, Alice and Dave, Bob and Charlie, Bob and Dave, Dave and Charlie, etc. Just the one will suffice. >I think it's more correct to say that the MITM attack is acknowledged >to be possible, but realistically no more of a threat than in a >certificate model. And note the "I think", and this warning that I >could be wrong. (Or I could be an MITM... bwahahahaha!) I'm not sure whether this is because you think MITM is so difficult as to be almost impossible in any model, or whether you think that an MITM attack is possible in some cases against relatively naive users, but that certificates won't help at all in that case. Let me make clear how I would see a MITM attack working. There are two main flavors, the permanent and the transitory. Here is how the permanent MITM could work. Alice's ISP provides all of her email services. She has created and published a public key, but the ISP has detected this and replaced it with a fake key. Everyone who tries to send to her using that key gets their message decrypted and read by the ISP, then re-encrypted using Alice's real key and delivered to her mailbox. This much would be relatively easy. But it is not enough. If Alice gets hold of a good key for Bob, she will send messages to him using that key. The ISP can't read those messages. If she signs them, Bob will notice that the signature doesn't check against his copy of Alice's key (the one which the ISP has installed in place of Alice's real one), and the ISP will be caught. Therefore the ISP is going to have to make sure that every single key Alice gets is a fake one, one for which the ISP has the secret key. When Alice get's Bob's key, Charlie's, everybody's, the ISP has to replace those with fake versions. Then again it can do its translate-and-replace trick on messages going in both directions. This is obviously a much more difficult task, but if people acquire keys in limited, stereotyped and automated ways, it could conceivably be done. With this, what more could trip the MITM up? Well, if anybody ever included any keys within the body of a message, those would have to be detected and substituted. Even key fragments might have to be handled, although it is unlikely that this would be noticed. The biggest threat would be if Alice used a different method to get someone's keys, her own or anybody's that she communicates with. She could use a different ISP or use some "out of band" (off-net) method. If she went to a key signing party the jig would be up. Does this mean that the MITM attack is impossible? Not necessarily. I'll bet there are plenty of people who only use one ISP (AOL or MSN) and who have never been to a key signing party. Maybe they've never even met someone in real life whom they communicate with on the net. A lot of people could fall into this category. This is where the certificate comes in handy. A certificated key from a signer whose key Alice is able to verify out of band will not be forgeable by the MITM. Likewise if Alice's key distributed on the nets is signed by a trusted certificator then other people can have confidence that there is no MITM involved. Basically the certificate is a way of forcing people, at least once, to go around their ISP. And once is enough. Now let me describe the other form of MITM attack, the transitory one. In this one the attacker doesn't care if he's caught, he just wants to peek at a few (possibly crucial) messages. Here again his attack is to replace Alice's public key in the databases with a bogus one, and to intercept her communications. Or maybe he is attacking SSL or some other protocol where one side sends their public key to the other. Then it is even easier to send a fake one. People who trust and use that key will lose their privacy. This attack is obviously a lot easier to mount in some contexts. Again, the use of a certificate should prevent these, and in fact SSL does use certificated keys. The MITM will not be able to supply a certificated key with the name/address information for Alice. (Netscape currently doesn't check to see whether the name in the key is valid, so it is not getting much benefit from the use of certificates. I hope it is clear that abandoning certificates or using ones without any name or address information would make SSL very unsafe.) >Oh now wait a sec here; I don't think anybody's advocated using >"untested" keys. It's still perfectly reasonable to establish >networks of reliable information focused on a key. >If I electronically "encounter" Alice and decide to begin a secure >conversation, we initiate a key exchange. I can then go to as many >already-trusted entities as I like in an attempt to verify that as >many attributes that are claimed to be associated with the key are >really there as I desire. If Alice wants to buy a widget from me, I >can ask other businesses whether they've ever had problems collecting >from that key. If I want to buy a widget from Alice, I can ask >friends whether they've gotten good widget from that key. If I'm >interested in a little e-hanky-panky, I can ask around the sleazier >corners of the net to see whether Alice is the kiss-and-post type. What if you just want to talk to her securely? I asked before what "attributes" would handle that case, and the answer that at least Tim gave was that talking to the key is talking to Alice. I don't buy that, at least not yet. (Don't get me wrong - I don't have anything against attributes. I love Chaum's pseudonymous credentials. I'm just worried that unless we have a foundation of secure communication that the rest of the edifice isn't going to stand.) >Somebody's going to have to explain to my thick skull how it is that a >certificate system makes this process any different, fundamentally. I >mean, it may be that there's more superficial security, but I don't >see where there's any additional risk truly introduced by using the >key itself as a "True Name". Maybe the real question is, how does a >certificate system give me the confidence that there really is an >"Alice" according to some definition of "really" that satisfies me? OK, I wrote at length above on how certificates can help against two forms of MITM attacks. What do you think? Maybe it is hard to imagine a long-term successful MITM attack, but wouldn't you feel uncomfortable with an SSL which used uncertificated keys? Hal From sameer at c2.org Mon Oct 9 17:01:03 1995 From: sameer at c2.org (sameer) Date: Mon, 9 Oct 95 17:01:03 PDT Subject: Certificate proposal In-Reply-To: <199510092316.QAA09588@jobe.shell.portal.com> Message-ID: <199510092355.QAA29849@infinity.c2.org> I rather figured there was miscommunication here. > > It occurs to me that perhaps I have been missing a point here when people > argue that having a "man in the middle" is not that different from > various forms of secure communication, such as where Bob has multiple > personalities or is a committee. I have been taking this to mean that we > should therefore not worry about MITM attacks, which seems crazy to me. > > Instead perhaps this was meant as a "reductio ad absurdum" argument for > why MITM attacks cannot be prevented in the scenario where people have no > out-of-band contact. Anything which could detect and prevent MITM > attacks could, by this analogy, detect whether Bob had multiple > personalities. Since the latter is obviously impossible, the former must > be as well. Hence the problem has no solution and we should not > waste much time on it. My point is not that MITM has no solution and that time should not be wasted but that context (in many cases out-of-band contact, but not necesarily) is an important factor when dealing with MITM. A context-free situation is not a very useful thing to look at when trying to solve MITM -- MITM should be looked at in context-based situations. > > I don't fully agree with this but at least it is not as bizarre as the > first interpretation. > > Hal > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From smart at mel.dit.csiro.au Mon Oct 9 17:02:51 1995 From: smart at mel.dit.csiro.au (Bob Smart) Date: Mon, 9 Oct 95 17:02:51 PDT Subject: Certificate proposal In-Reply-To: <199510092316.QAA09588@jobe.shell.portal.com> Message-ID: <199510100002.AA01774@shark.mel.dit.csiro.au> > Hence the problem has no solution and we should not > waste much time on it. Exactly. If a public key ONLY has an existence in cyberspace (as per Pr0duct Cipher) then it is impossible to prove that they aren't surrounded by a MITM cloud which is also seeing everything they see without them knowing it. It is important to be aware of this. However the importance is perhaps mitigated by the following considerations: 1. Surrounding someone with such an MITM cloud is so hard as to be impossible for practical purposes. This will be more true if the person trying to establish a cyberspace identity can prove that they move around physically and use different service providers at different times [but then again perhaps if you do that you cease to be a purely cyberspace entity]. 2. If the other end of the communication is a purely cyberspace entity then you can't possibly establish the sort of relationship which would enduce you to send them anything really secret. The possibility that there might be a baddy playing MITM is infinitesimal compared to the probability that the other end is itself a baddy. The time you will want to deal with a cyberspace entity is where you are taking no risks and they are taking all the risks. This will hopefully be the case when we are a seller and they are the buyer. As long as we get the digital cash we don't care who they are. Apart from that we will always want some certificate that links the public key to something in the real world. The point of the key-centric approach is that that doesn't have to be a name or something that contains a name. If we want to make sure the key belongs to the person you were talking to last night then maybe you'd like some biometric data: "five foot two, eyes of blue,...". And of course the certificate is useless unless it is signed by a key that we trust for that purpose. Bob Smart P.S. I hope my earlier posting were not interpreted as being critical of the IPSEC effort. I strongly support it. It would be silly to go to them and say "hold everything I think we need a whole new security architecture". That is something for the future that we are only just starting to think about. However I think the IPSEC work confirms the difficulties of the current "name first then key" approach. Whenever it is incorporated in any protocol from network layer to application it makes the protocol at least twice as complex and at least twice as hard to manage. From ses at tipper.oit.unc.edu Mon Oct 9 17:07:54 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Mon, 9 Oct 95 17:07:54 PDT Subject: netscape mail starts java attachments upon get new mail... In-Reply-To: <199510092305.TAA24544@jekyll.piermont.com> Message-ID: On Mon, 9 Oct 1995, Perry E. Metzger wrote: > > "Josh M. Osborne" writes: > > As far as I know Java apps can only make network connections to the > > IP address they were loaded from. > > That might be the design, but we know that it is hard to faithfully > implement very complicated designs. > The design of java is supposed to make analysing for security easier than it might be in other similarly sized systems- whether it does this or not is something that needs to be checked for carefully. The three components that need to be analysed are the class loader, the implementation of the JVM, and the code to check network connections. Analysing the VM and the class loader should be a simple (hah) matter of structural induction (possibly a two step process of converting the vm description into a denotational semantics and analysing that, followed by a proof that the vm is a faithful implemenation of those semantics.) the networking code is simple to prove safe if the VM and classloader can be shown to be safe. Simon From perry at piermont.com Mon Oct 9 17:09:28 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 17:09:28 PDT Subject: Java In-Reply-To: Message-ID: <199510100009.UAA24675@jekyll.piermont.com> Greg Miller writes: > > On Sun, 8 Oct 1995, Perry E. Metzger wrote: > > > > > As long as people are mentioning Java, I just want to make the > > prediction, one more time, that at some point someone is going to find > > some devistating security holes in HotJava. > > I'd like to make this prediction: someone at some point in time > will find another serious security hole in SendMail. And yet again, my clients will be largely safe because I've dealt, in advance, with most of the possible threats from Sendmail. I can't do that for Java. I will never be able to do that for Java. I don't think you understand the problem here at all. > What you need to ask yourself is "Do the benefits of Java > outweigh the security risks?" And the answer, to me, is "no". Unfortunately, I can't stop it. Perry From edge at got.net Mon Oct 9 17:14:01 1995 From: edge at got.net (Jay Campbell) Date: Mon, 9 Oct 95 17:14:01 PDT Subject: Patents etc Message-ID: <199510100027.RAA24061@you.got.net> >IMHO What's needed is a) a good way of measuring usage and b) a realistic >attitude on the part of patent holders as to the value of their patents. > >A good example of how not to do it is the current mess that governs the >music indistry (which very similar problems with copying and incorporation >of material [sampling] all be it in a context of copyright rather than >patents). > >Ted Nelson did a lot of work on this for xanadu and his ideas on >transcopyright are worth exploring further. One interesting (but maybe off-topic) facet of client-side applets (a la Java) is the fact that publishers can define proprietary protocols and file formats, and change them as often as they want, giving a sort of minimal protection against casual duplication and re-publishing. With a bit more work, the formats could make true transclusions efficient and easy to apply, and help increase the amount of serious/commercial information available to the public. This is nothing new, I suppose... Java (from a user point of view) isn't that much different than IntelligentPad, which from what I understand was the client system the Xanadu people were working with recently. -- Jay Campbell - Regional Operations Manager -=-=-=-=-=-=- Sense Networking (Santa Cruz Node) edge at got.net "Shoot the Fruit Loop" "On the Information Superhighway, I'm the guy behind you in this morning's traffic jam leaning on his horn." From edge at got.net Mon Oct 9 17:15:16 1995 From: edge at got.net (Jay Campbell) Date: Mon, 9 Oct 95 17:15:16 PDT Subject: netscape mail starts java attachments upon get new mail... Message-ID: <199510100028.RAA24101@you.got.net> >OBcrypto: in one of the Java papers I saw a refrence to use of RSA >signitures to allow browser users to say things like "I trust Sun >(or Tim May) to write applets that use Foo not to harm me". It >wasn't in the public release of HotJava because of licencing >constrints. Any speculation on whether Netscape will (eventually) >support that feature? If this is the case, my big hope is that Netscape doesn't limit /this/ trust system to a pre-approved set of corporate entities I'll (as a private individual) have to pay $300 for if I want my apps to do anything more than bounce faces around a user's screen. A model allowing multiple entities to put a stamp of approval (possibly with some sort of hash/checksum to match an app in question against an approval certificate) /would/ make things easier for the user, though, allowing them to set up a set of blanket rules instead of pausing and pondering a particular programmer's trustworthiness every new site he visits... a la Tim's Dirt Cheap Java Security Approval Company. Please don't nail me on semantics; I use all above terms loosely. -- Jay Campbell - Regional Operations Manager -=-=-=-=-=-=- Sense Networking (Santa Cruz Node) edge at got.net "Shoot the Fruit Loop" "On the Information Superhighway, I'm the guy behind you in this morning's traffic jam leaning on his horn." From fc at all.net Mon Oct 9 17:17:54 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Mon, 9 Oct 95 17:17:54 PDT Subject: LACC: Account sharing leads to false imprisonment In-Reply-To: <199510091346.OAA24239@neptune.ebi.ac.uk> Message-ID: <9510100015.AA23297@all.net> ... > What I find so amazing is the fascinating arguments exposed here. Let's > see... First, let me say I start from a different point of view. > > I see the University as a place for forming people and distributing ideas, > not juts the ideas of the "Establishment", but all kind of ideas. A place for > the free interchange of all ideas and the formation of new persons. This may be the first problem you will encounter if you try to really put forth new ideas in the University community. You may find that they are more oriented toward getting grants and keeping their jobs that toward free expression of new ideas. If you like, I will give you at least two examples I have personally run into where "academic freedom" was given a back seat to whatever else they had in mind. > Now, all your message transpires a special horror against the dispersion > of "anti-establishment" ideas. Of things that one could find "disturbing" > from some point of view... I strongly disagree. I said nothing about the ideas being disturbing. The thing that was wrong was the illegal use of someone else's computers without their permission. I said nothing - I repeat NOTHING about the ideas being the problem. ... > >From your message, it looks like you want instead the Spanish Inquisition back: > if someone distributes strange ideas -anarchist, communist, etc...- that > person is a risk for the stablishment and should be punished. Isn't it? Again, you either didn't read what I wrote, or read it with a mindset that ignored what I actually wrote. I said nothing - I repeat NOTHING about the ideas being the problem. > >Ignorance of the law is no excuse, and being easy to catch doesn't make > >you innocent of a crime. > > > Yeah, but not showing volunteer to hide, expressing opinions openly, > is not being easy to catch, it's being confident in one's freedom of speech > and on the democratic system to protect it. Even in spite of overzealous > system administrators. Hardly. If I break into your computer by making unauthorized use of your password, and if your computer is connected to the Internet, I am breaking the law. It has nothing to do with what I use the account for. > >> facility computer, received a complaint from someone at the University > >> of British Columbia about The Anarchives being posted to net news. The > >> person wanted it stopped. > > > >Interstate transport of stolen (presumably copyrighted) property, possible > >violation of national laws of both nations. Unauthorized use of the > >computers at the University of British Columbia. > > > Well, I don't know if that was copyrighted property. But, if it was, > it was up to the (C) holder to decide what actions if any to take. BSD-Unix > is copyrighted code, but I wouldn't say that all the copies around are illegal, > or stolen. All material is copyrighted from its inception at this point in time (as I interpret US law - but then I am not a lawyer). > Unauthorized use? May I say that if that person asked someone (whomever) > for permission, then it is whoever gave permission (if any) who should be > pursued instead? I guess that if a poor guy is sold the Golden Gate, it is not > that poor guy's fault as much as the "seller's". That is an interesting proposition. In fact, as I understand it, if the person granting access was a University employee, they would have been acting for the University and the use would therefore have been authorized. But since the step-brother was not acting in the capacity of a University employee when granting use, the use was unauthorized. The US statutes state (as far as I can tell) that any unauthorized use of a federal interest computer (which includes any computer connected to an Interstate communications system) in excess of $500 is a felony. There is no requirement for mens re (criminal intent) at this point either. This is one of the things many people disagree with in the US vs. Morris case of 1988. > Ah, but that guy was distributing "anarchistic" information: he > must have been pretty bad intentioned then. No one should have "unauthorized > ideas" and even less dare to distribute or share them. I see. > > Great that if someone complains about the distribution of 'X' kind > of ideas there's always a willing sysadmin to hunt the witch instead of > defending freedom of speech. Great. Again you miss the target. Just because the anarchist information got the attention of the systems administrator doesn't mean that this had anything to do with the law that was (perhaps) broken. It could have been cooking instructions for BLT sandwiches - the law doesn't differentiate - but those who enforce the law are concerned about terrorism and insurrection, so they look at those cases sooner than the others. > >> have different last names, Gorrie concluded a larger hacker conspiracy > >> was afoot. > > > >Reasonable assumption. The only way to find out different would be to > >violate the users' privacy by reading their mail, etc. > > > What? May I suggest that, if the account has a owner, and a system > manager, and all that, those people should be asked prior to jumping to > conspiracy theories? The same kind of reasoning lead many innocents to die > with the Spanish Inquisition: hey, they were plotting with the devil against > god laws. Sorry, but I think a phone call to the implicated persons can > easily clear all those doubts without "electronic surveillance" as you propose. The comparison of this case to the Spanish inquisition is just not relevent or in any way valid. When you use someone else's account on a computer and that use is not authorized byt he owners or their designated assignees, you are risking prosecution. If a sysop catches you doing it, it is, presumably, their job to investigate, call in proper authorities, and so on. > >Collected possible evidence. A good idea. Allerting potential criminals > > > Yeah. I suppose that if they were expressing distrubing ideas, they > were "potential criminals"... What else could they possibly be? No, the actor was a criminal because of the unauthorized access, not because of the ideas being expressed. However, given that we have two criminals, one who is expressing ideas about better BLT sandwich recepies and one who is expressing ideas about anarchy, the priority in the investigation will almost certainly go to the one expressing ideas about anarchy - because of the perception by law enforcement (valid or not) that anarchists are more likely to blow up federal buildings than chefs. > >If he turned out to be a terrorist who was planning to blow up a > >building, you would have called this a tremendous piece of police work, > >they could have written a million-selling book, and you would hail the > >sysadmin as a computer age hero. > > > Great! I guess that prettily summarizes all: "if" he had turned to > be a "fill in your fears here". Just the same as it was with the Inquisition, > if they were good guys they shouldn't fear torture or dying for God. And it > was better to torture innocents than allowing any "potential bad guy" to get > along. Again, your analogy goes way too far for the reality here. Investigation is not "torture or dying" - and the investigation found that a crime may have been committed, so the person was arrested and, in the end, the result came to having to pay the approximate cost of the unauthorized services taken. It just doesn't sound like the Spanish inquisition to me. > >So Hirsh agreed that he had been illegally using the computer system > >and the case was settled with a monetary fine. > > > I bet so. Under torture many innocents also confessed. And faced with > a multimillion dollar trial which, if you can't afford- will take you to > jail (which can be a real torture), I guess that most innocents will prefer > to go along with a smaller fine. ... You make a lot of assumptions here - like that Hirsh was tortured by being arrested - that he was raped in jail - and that he was arrested for the ideas he was expressing. This is a lot of hogwash. Being tortured is nothing like being taken to a Canadian jail (with the possible exception of having to eat the food - but he got out before that became a necessity). When you use someone's computer - just as when you use their car - without permission, you risk being arrested. That is what he was arrested for, as far as I can tell. If you don't want to be arrested, don't use other peoples' accounts! It's wrong, it's illegal, and if I catch you doing it on my computer, I will try to have you arrested as well. ... > Look, I don't really know about the case. But I do really understand one thing: > if this guy hadn't posted what some person considered were "pernicious ideas" > he would have never been tracked down, villipendiated and taken to trial. Right - if you are going to break the law, don't call attention to yourself. If you do, they will try to catch you. Otherwise, they may not even notice you. > I don't care about if he was using public resources for something they shouldn't > be. That's something else to be discussed. Is it wrong to use a University > to spread ideas, specially when the mainstream media avoid them? I won't > comment on that. That is the only issue here as far as I can tell. The rest is just a smoke screen to try to excuse people from their social responsibility. It's like saying Robin Hood didn't break the law because he gave what he stole to the poor. In Robin's case their may have been a legaly valid excuse (something about a necessity defense), but in this case, there was no such thing. Why do you claim that it is acceptable to break the law if you post anarchist ideas when it is not acceptable when you post BLT recepies? -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From perry at piermont.com Mon Oct 9 17:23:42 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 17:23:42 PDT Subject: NSA Realists v. Nuts In-Reply-To: Message-ID: <199510100022.UAA24707@jekyll.piermont.com> As much as I agree with Duncan on this topic, it really isn't cypherpunks material. We are getting very far afield of cryptography. Could we please take this to private mail or talk.politics.libertarian or some such? Duncan Frissell writes: > 2400 Americans are imprisoned every year for federal income tax > violations. Approximately one person is killed every year in arrests > involving federal income tax violations. Millions of man-years are spent > annually in involuntary servitude to comply with tax laws. Public > employees should be aware of the fact that their contribution to society > is of such low value that it will not be paid for without a gun to the > customer's head. From cmcmanis at scndprsn.Eng.Sun.COM Mon Oct 9 17:29:54 1995 From: cmcmanis at scndprsn.Eng.Sun.COM (Chuck McManis) Date: Mon, 9 Oct 95 17:29:54 PDT Subject: java security concerns Message-ID: <9510100030.AA29195@pepper.Eng.Sun.COM> >Sendmail is about 29K lines of C code -- not significantly larger by >my standards -- and has proven nearly impossible to secure. Good point. >Sendmail performs a much simpler task and has not proven secure. I don't necessarily agree. The core java interpreter is simply: while (1) { get_next_opcode switch(x) { } } > ... Marcus Ranum has noted that you can't >trust a program thats bigger than a couple of pages long, and I >believe he's right. Its a useful metric. But the concept of trust isn't defined. If you write in pure Java code (that is no references to any native methods) we should be able to do much better than that. And since Java doesn't have "programs" it just has "classes" and many of those fit on two pages where does that leave us? Would it be reasonable to say that if I want to write a Java class I trust I should keep it under two pages? If I then write another class that uses that class, that is also under two pages have I met the requirement? Can this aggreagate four page Java class be trusted? >As an aside, have you tried breaking your own program? Spend a week on >it some time. Its usually an educational experience and it breaks you >out of the mindset you have fixed in for a while. Many times. >As people have found out, it has proven possible to core dump the Java >interpreter. That means that your implementation has contained flaws >that potentially permitted people to do unplanned things to the state >of the interpreter. I agree. >By the way, I suggest that Sun should offer a large money prize for >the first significant security hole found the Java implementation. Its >a tiny price to pay for security. I don't think the lawyers would let us. Would anyone be interested in a Java daemon that one could send arbitrary classes to in an attempt to subvert the runtime? I once thought this would be a good way to give safe exposure to the system in general. You know sort of "here's a program that can feed classes to a Java runtime on a system which is known to have a file X on it. Try to return the contents of X." It probably wouldn't be to useful beyond that, and it would only validate the classes you have access to, not necessarily the full set in a release. (hence my not doing it given its utility only in testing the core runtime) --Chuck From ses at tipper.oit.unc.edu Mon Oct 9 17:29:59 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Mon, 9 Oct 95 17:29:59 PDT Subject: java security concerns In-Reply-To: <199510092322.TAA24567@jekyll.piermont.com> Message-ID: On Mon, 9 Oct 1995, Perry E. Metzger wrote: [ I just got Man-On-The-Street'ed by a TV news crew asking my opinion of the OJ Verdict, I'm entitled to a little Side-Bar > Sendmail is about 29K lines of C code -- not significantly larger by > my standards -- and has proven nearly impossible to secure. Hey - but sendmail was designed to be Z-1 secure - formally proven to be unsecurable :-) > taken on an impossible task. Marcus Ranum has noted that you can't > trust a program thats bigger than a couple of pages long, and I For the general case this is true. To be able to trust larger systems, you need to not only be able to trust the individual 2 pagers, but to also be able to show that composing the sub units doesn't lose whatever property you're trying to do. The architecture of the system needs to be designed with this in mind; otherwise reasoning about the composite becomes intractable. There are all sorts of things you can do to make analysis easier - eliminating global state, etc. Retrofitting security or verifiability never works. Distributed co-operative theorem proving, anyone? END-DIGRESSION] Real point of the message: In my previous message, I left out some fundamental parts of the run-time that need to be looked at carefully. The garbage collection needs to be examined carefully. Normally GC algorithms are formally derived, so it's the implementation that needs to be checked for. holes in the GC may be too unpredictable to exploit for anything but core-dumping, especially since java uses a mark-sweep conservative collector. A more promising area of attack might be the Thread system. If the thread system can be confused, it might be possible to have an untrusted app start executing in the context of a trusted thread. This may or may not be exploitable, depending on how much of the untrusted threads context gets held over (call stack, etc), but could be fun if it works. Simon From lile at art.net Mon Oct 9 17:32:13 1995 From: lile at art.net (Lile Elam) Date: Mon, 9 Oct 95 17:32:13 PDT Subject: Coming Out Party! Message-ID: <199510100021.RAA26015@art.net> Coming Out Costume Party!! @ Bryant's Bend Our wonderful house at Bryant's Bend in Palo Alto, is celebrating (our new housemate) Joyce Fortune's tenth anniversary of coming out as a lesbian. She has since become bi and celebrates bi'ness with the rest of us here at our veggie co-op. Join us in the wonderful celebrations, gaming and frolic. Come in costume as butch or fem (lingerie is most desired). All uncostumed guests will be bounced by our tall african-american femmi bouncer (Go Frankie!). The particulars: When: Saturday Night (October 14, 1995) Time: 7:00 to late Where: 130 Bryant St. Palo Alto CA What to bring: Yourselves, a costume, gay music in cd or tape cassette medium, and any erotic foods and drinks you might desire... We will be providing the atmosphere and some non-alcoholic drinks and munchies.... Directions: From 101: Take the University Exit that heads West. Follow University Street until you reach Bryant St. Make a right onto Bryant St. and follow it to the end. We are the last house on the left hand side and are on the corner of Bryant St. and Palo Alto Way. It's a big tan house with brown trimmings. From perry at piermont.com Mon Oct 9 17:43:28 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 17:43:28 PDT Subject: Java bugs found? Message-ID: <199510100042.UAA24769@jekyll.piermont.com> Anyone from Netscape care to comment? ------- Forwarded Message Date: Mon, 09 Oct 95 14:12:41 -0400 From: Andrew Wason To: java-interest at java.sun.com Subject: Re: Netscape 2.0b1 for Win95 Terence Chr Haddock writes: > > Where is the 32-bit version of Netscape2.0? I can only find the > 16-bit. This may be because I have only been able to get on ftp4,ftp5, > and not ftp.netscape.com. Sorry if this is a stupid question. Netscape pulled all the 2.0 betas that supported Java yesterday, due to a recently discovered Java security hole. So the 32 bit Windows versions, SunOS, Solaris and SGI versions were removed. There was a README explaining this there last night, but I can't find it today. Andrew _______________________________________________________________________________ Andrew Wason Bell Communications Research aw at bae.bellcore.com Piscataway, NJ - - Note to Sun employees: this is an EXTERNAL mailing list! Info: send 'help' to java-interest-request at java.sun.com ------- End of Forwarded Message From sameer at c2.org Mon Oct 9 17:57:43 1995 From: sameer at c2.org (sameer) Date: Mon, 9 Oct 95 17:57:43 PDT Subject: java security concerns In-Reply-To: <9510100030.AA29195@pepper.Eng.Sun.COM> Message-ID: <199510100051.RAA03799@infinity.c2.org> Perry: >By the way, I suggest that Sun should offer a large money prize for >the first significant security hole found the Java implementation. Its >a tiny price to pay for security. Chuck: > I don't think the lawyers would let us. > This is a shame. What reason would they have for not letting you? It could well be a very good marketing move. Maybe your marketing dept can convince the legal dept. > Would anyone be interested in a Java daemon that one could send arbitrary > classes to in an attempt to subvert the runtime? I once thought this would > be a good way to give safe exposure to the system in general. You know sort > of "here's a program that can feed classes to a Java runtime on a system > which is known to have a file X on it. Try to return the contents of X." > > It probably wouldn't be to useful beyond that, and it would only validate > the classes you have access to, not necessarily the full set in a release. > (hence my not doing it given its utility only in testing the core runtime) > That, and a cash reward for getting the contents would be even better. -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From fc at all.net Mon Oct 9 18:13:28 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Mon, 9 Oct 95 18:13:28 PDT Subject: Distributed co-operative theorem proving, anyone? - was Java In-Reply-To: Message-ID: <9510100110.AA25989@all.net> > > taken on an impossible task. Marcus Ranum has noted that you can't > > trust a program thats bigger than a couple of pages long, and I Marcus agreed with a position founded on the work in the late 70s and early 80s by many researchers on proving the security of operating systems under the Bell-Lapadula model. The main result I recall is that a Cray-1 took 24 hours to prove the Simple Security Property about a 100-line limited-Pascal program used as the core of (I think it was) UCLA-secure Unix. Complexity goes up quickly with program size, and this property is only one of many you might like to prove. > For the general case this is true. To be able to trust larger systems, you > need to not only be able to trust the individual 2 pagers, but to also be > able to show that composing the sub units doesn't lose whatever property > you're trying to do. ... > Distributed co-operative theorem proving, anyone? Let's go - I will provide the distribution mechanisms, and I think I know someone who is interested in the theorem proof side. I know of several experts on theorum proving who may well pitch in. What program do you want to prove secure next (we're currently finishing up my secure Web server). ... > Real point of the message: > > In my previous message, I left out some fundamental parts of the run-time > that need to be looked at carefully. The garbage collection needs to be > examined carefully. Normally GC algorithms are formally derived, so it's > the implementation that needs to be checked for. holes in the GC may be > too unpredictable to exploit for anything but core-dumping, especially since > java uses a mark-sweep conservative collector. The core dumping shows that Java can ALSO write files into the file system, something it was claimed to NEVER be able to do! If you could get the right name for the core file, and set up the first few bytes right, ... > A more promising area of attack might be the Thread system. If the thread > system can be confused, it might be possible to have an untrusted app > start executing in the context of a trusted thread. This may or may not > be exploitable, depending on how much of the untrusted threads context > gets held over (call stack, etc), but could be fun if it works. Why not start much simpler. Write a Java program to disrupt services by flooding the local network with garbage packets - or with some sort of request it lets you write. How about a Java program that launches SATAN probes against all reachable hosts? -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From tcmay at got.net Mon Oct 9 18:14:27 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 9 Oct 95 18:14:27 PDT Subject: Man in the Middle Revisited (but not for the last time) Message-ID: At 7:03 PM 10/9/95, Hal wrote: >tcmay at got.net (Timothy C. May) writes: >>For communication, the only credential Alice needs to ensure that only Bob >>can read her message is that she uses Bob's public key. If "Bob the Key" >>reads it, presumably it was "Bob the Person" who read it. > >>(Again, Bob the Key = Bob the Person to many of us. If Bob the Person has >>let his private key out, so that Chuck the Person is also able to read the >>Bob the Key stuff, etc., then of course cryptography cannot really handle >>this situtation.) > >OK, but again, what about the man in the middle attack? Suppose the >key that you found that claims to be from Bob is actually not his, but >another one created by a man in the middle, such as Bob's malicious >ISP? Then that ISP is decrypting the messages Alice sends to him using >that fake key, and re-encrypting them using Bob's real key. He is >reading all of the messages, and Alice and Bob do not in fact have >communications privacy. There are many, many people on the list that I know only from their posts and their public keys (not that I'm a heavy user of PGP as some of you are, though some of you I have dealt with via PGP messages). I don't know if "Carl Ellison the Key" is "really" the same Carl Ellison that Carl Ellison the Key claims to be...you see the semantic difficulties. What I know is that the Carl Ellison who sends me PGP message and who appears to be working at TIS is not publically disputing messages sent by an MITM attacker. (True, the MITM could be only targetting _me_, and so the "real" Carl Ellison could be unaware that the "fake" MITM Carl Ellison is masquerading as him.) But if I really care I can post a public channel (the CP list, for example) query, encrypted to the known public key (used in many past posts, for example) of "Carl Ellison the Key," asking if he sent the message to me. To put it bluntly, all I really care about is _persistent_ key-holding, i.e., that the person who began posting with a given key is still using the same key. Or, rather, I don't even care if the keyholder "Pr0duct Cypher" is actually a person, or a Bourbaki-style committee--I only care that messages purporting to be from Pr0duct Cypher or Black Unicorn or Carl Ellison are still using the same key. Who any of these entities "really" are is irrelevant to me. (I don't even know if Hal Finney, who I met once a few years ago, is the "real" Hal Finney, nor do I really care.) >I don't want to overstate the risk of this attack. It would not be an >easy one to mount and I believe there are countermeasures which could >detect it unless the MITM had nearly supernatural powers. But the MITM >attack is normally considered seriously in discussing crypto protocols. >It is a well known weakness in Diffie-Hellman, for example. That is why >authenticated Diffie Hellman is used in some of the newly proposed key >exchange protocols for IP. The risks of MITM attacks on public key >systems was recognized not long after those systems were proposed. The >problems with fake keys have been discussed for over a decade. > >Why is this all suddenly irrelevant? Were these attacks never realistic? >Is it just not a problem somehow? I am baffled by the fact that people >are just turning their backs on all these years of research and >experience. If this is some kind of paradigm shift in which the idea of >communicating with keys is seen as the key to the puzzle, then I am >afraid I don't share the enlightenment. To me the problem seems as real >as ever. Well, I'm not saying the work is unimportant. What I'm saying--and I think others are too--is that there is no crisis that calls for "certificate authorities" to provide "proof" that a keyholder is who he says he is. I'm happy continuing to trust that people are who I once they thought they were, by their signatures and their apparent ability to read messages encrypted to their public key. If in fact I am dealing with body-snatchers who actually infiltrated the identity of "Carl Ellison" and are able to act as him, so what? I never met the "real" Carl Ellison, so who cares if Carl Ellison the Key is really Carl Ellison the Biological Entity who Grew up in Foobar, Pennsylvania and Graduated from Bobby Ray Inman H.S. in 1975? That's all. If people want to work on credentials and similar certificate processes, that's great. But I'm saying I see no compelling need _for myself_ and will strongly argue against some of the reasoning we are hearing about why certificates need to be issued. (Because I have also read the Postal Service proposals that they get into the business of certification of e-mail in various ways, and because of the various other schemes being discussed which seem less than voluntary.) --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From tcmay at got.net Mon Oct 9 18:35:16 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 9 Oct 95 18:35:16 PDT Subject: Crypto's Role in Evil? Message-ID: I agree with the points Jon Lasser makes, whether or not we have the same political point of view. At 8:37 PM 10/9/95, Jon Lasser wrote: >I'm not a libertarian, or an anarcho-capitalist. I do, however, support >rapid deployment, without restrictions, of strong crypto. Here's why: > >(1) It is impossible to stop these technologies; someone on the list >recently reminded us that a bright fourteen year old could reproduce the >basic functionality of PGP in a brief period of time. The mathematics >of, say, RSA, are fairly basic. I think it's unreasonable to outlaw >multiplication of prime numbers, don't you? I agree with this, but we have to be careful. Consider this parallel: "It is impossible to stop people from having high-power sniper rifles. Anyone can shoot people from afar with relative safety. I think it's unreasonable to outlaw use of high power rifles for assassinations, don't you." (I'm not making an argument for gun control, just citing a parallel--one of many I can think of--where just because something is easy to circumvent does not mean that it shouldn't be outlawed.) >(2) While these technologies allow people to violate the law, I have >enough faith in humanity to believe that civilization won't collapse as a >result. There have always been criminals, and there have always been >revolutionaries. Only recently has "The State" been able to supress >these forces without maintaining a physical presence. Crypto merely >returns us to that default. Agreed. Although it does allow certain new markets to be efficiently developed that could not develop otherwise. >(3) These technologies also allow honest, law-abiding citizens to protect >themselves from criminals, both within and outside the government. >Industrial espionage can be defeated through strong crypto, for example. >J. Edgar Hoover would have been powerless to harass Martin Luther King, >jr. had MLK had access to strong crypto. This is a good point to stress. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From frissell at panix.com Mon Oct 9 18:41:09 1995 From: frissell at panix.com (Duncan Frissell) Date: Mon, 9 Oct 95 18:41:09 PDT Subject: Crypto's Role in Evil? In-Reply-To: <199510091458.AA00712@october.ducktown.org> Message-ID: On Mon, 9 Oct 1995 mkj at october.ducktown.org wrote: > We mustn't forget that, until very recently, strong, widespread > privacy has been humanity's "default" condition. Not much privacy in village or tribal life. Even neighborhoods of earlier cities weren't very private. Neighbors always knew your business. DCF From Richard_Reich at reich.com Mon Oct 9 18:46:16 1995 From: Richard_Reich at reich.com (Richard Reich) Date: Mon, 9 Oct 95 18:46:16 PDT Subject: Java bugs found? In-Reply-To: <199510100042.UAA24769@jekyll.piermont.com> Message-ID: <199510100145.SAA00403@lux.reich.com> After I noticed the file had been pulled, I recovered its contents from my netscape cache (thanks, netscape!): Netscape was notified on Sunday 10/8/95 by Sun Microsystems that there is a serious security hole in their Java system that we are including in some Beta Test versions of Netscape Navigator 2.0. We are removing all Java enabled Navigator Beta distributions from our FTP site until we can address this problem. The effected versions are 32-Bit Windows, Sun Unix, and SGI Unix. Thank you for your patience. > > Anyone from Netscape care to comment? > > ------- Forwarded Message > > Date: Mon, 09 Oct 95 14:12:41 -0400 > From: Andrew Wason > To: java-interest at java.sun.com > Subject: Re: Netscape 2.0b1 for Win95 > > Terence Chr Haddock writes: > > > > Where is the 32-bit version of Netscape2.0? I can only find the > > 16-bit. This may be because I have only been able to get on ftp4,ftp5, > > and not ftp.netscape.com. Sorry if this is a stupid question. > > Netscape pulled all the 2.0 betas that supported Java yesterday, > due to a recently discovered Java security hole. So the 32 bit > Windows versions, SunOS, Solaris and SGI versions were removed. > There was a README explaining this there last night, but I can't > find it today. > > Andrew > > _______________________________________________________________________________ > > Andrew Wason Bell Communications Research > aw at bae.bellcore.com Piscataway, NJ > - - > Note to Sun employees: this is an EXTERNAL mailing list! > Info: send 'help' to java-interest-request at java.sun.com > > > ------- End of Forwarded Message > -- Richard Reich / Internet Consulting / +1 415 668 3311 ... and that things are not so ill with you and me as they might have been, is half owing to the number who lived faithfully a hidden life, and rest in unvisited tombs. From mark at lochard.com.au Mon Oct 9 19:00:06 1995 From: mark at lochard.com.au (Mark) Date: Mon, 9 Oct 95 19:00:06 PDT Subject: PC disk wipe software In-Reply-To: <199510091318.JAA24166@jekyll.piermont.com> Message-ID: <199510092317.AA44641@junkers.lochard.com.au> >I thought I'd ask here, since its related to a lot of the stuff people >have written for the PC platform in these parts. I need to securely >wipe a bunch of data from an MS-DOS hard drive, so that it can't be >recovered. Are there any readily available utilities for this? Will >any of them selectively erase only data that isn't allocated to >existing files? Archive data off to tape, low level format drive using the bios hd utils, reformat drive, restore data. I find the non graphical AMI bios very useful for this. Doing anything else fails to remove the old data on partially used but valid blocks. Cheers, Mark From tcmay at got.net Mon Oct 9 19:07:06 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 9 Oct 95 19:07:06 PDT Subject: Certificate proposal Message-ID: I've never thought Hal just wasn't "getting it," as the semantic issues involving True Names, spoofing, and the ultimate reality of whom one is dealing with are not simple issues. At 11:16 PM 10/9/95, Hal wrote: >It occurs to me that perhaps I have been missing a point here when people >argue that having a "man in the middle" is not that different from >various forms of secure communication, such as where Bob has multiple >personalities or is a committee. I have been taking this to mean that we >should therefore not worry about MITM attacks, which seems crazy to me. > >Instead perhaps this was meant as a "reductio ad absurdum" argument for >why MITM attacks cannot be prevented in the scenario where people have no >out-of-band contact. Anything which could detect and prevent MITM >attacks could, by this analogy, detect whether Bob had multiple >personalities. Since the latter is obviously impossible, the former must >be as well. Hence the problem has no solution and we should not >waste much time on it. I think I made the "multiple personalities" and "Man in the middle stole my brain" points pretty clearly in a satirical post I did last week. Nobody commented on it, for whatever reasons. In case anyone didn't see it, I'll include it again here: Date: Fri, 6 Oct 1995 17:22:06 -0700 X-Sender: tcmay at mail.got.net Mime-Version: 1.0 To: cypherpunks at toad.com From: tcmay at got.net (Timothy C. May) Subject: MITM = Medusa in the Middle Sender: owner-cypherpunks at toad.com Precedence: bulk At 5:08 PM 10/6/95, the personality masquerading as Hal wrote: >Well, this is not necessarily the case. A MITM may be signing my >messages for me, and then putting them back the way they were before I >am allowed to see them. Granted, this would not be easy, and perhaps >the difficulty of this would be great enough that you will feel >comfortable using an unsigned key. But if it were accomplished, then >your messages to me would actually be insecure. No matter how >convinced you became of my sincerity and trustworthiness, actually our >conversations would be overheard by a third party despite both of our >efforts to the contrary. Our use of encryption would be rendered >futile. Doesn't this bother you? What the putative entity "Hal" is only hinting at, hypothetically, has actually forced this entity, sometimes known to many of you as "Tim," or as "tcmay," to reveal. This entity now feels the time has come to reveal it's True Nature, even though some have suspected it's True Nature (Lance, are you listening?). The "real" Timothy C. May has been locked in his room since 1983, fed through a slot in his door, and generally mentally tortured by Instrumentalities such as Ourself. We have interposed Ourself between the Real Timothy C. May and those who have communicated with him. All communications intended for Timothy C. May have actually been intercepted and processed by Us, and all communications attributed to Timothy C. May were actually generated by us. Very clever of us, don't you think? Very few have even expressed suspicions that this was the case. We have called our approach the "Medusa in the Middle," or MITM. Thank you for your attention. --Snake Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From aleph1 at dfw.net Mon Oct 9 19:24:06 1995 From: aleph1 at dfw.net (Aleph One) Date: Mon, 9 Oct 95 19:24:06 PDT Subject: Distributed co-operative theorem proving, anyone? - was Java In-Reply-To: <9510100110.AA25989@all.net> Message-ID: Aleph One / aleph1 at dfw.net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01 On Mon, 9 Oct 1995, Dr. Frederick B. Cohen wrote: > The core dumping shows that Java can ALSO write files into the file > system, something it was claimed to NEVER be able to do! If you could > get the right name for the core file, and set up the first few bytes > right, ... > Please stop and go read the documentation and papers off sun's web site. Who ever said that Java cant write to file are not in their right mind. Those who belive it are more so. Java is a programming language. It can certanly write to files. Now whatever an interpreter (in this case called by HotJava or Netscape ) allows the application to do is another thing. You can as well distribute binary C programms but before running them try to examine it to see if access the filesystem. (You might even hack your kernel or libraries to stop any process with certain flag from doing so). Java just makes this easier. You can even set up the HotJava browser to do no security check at all. All depends in the security model you choose. Dito for net connections or anything else. Now if all of you would please go use the product or learn more about it before bashing it I would not have to waste my time reaplying to this. > Why not start much simpler. Write a Java program to disrupt services by > flooding the local network with garbage packets - or with some sort of > request it lets you write. How about a Java program that launches SATAN > probes against all reachable hosts? > See about. Read the hotjava man page. From robl at on-ramp.ior.com Mon Oct 9 19:24:27 1995 From: robl at on-ramp.ior.com (Rob L) Date: Mon, 9 Oct 95 19:24:27 PDT Subject: Crypto's Role in Evil? In-Reply-To: Message-ID: > > We mustn't forget that, until very recently, strong, widespread > > privacy has been humanity's "default" condition. > > Not much privacy in village or tribal life. Even neighborhoods of > earlier cities weren't very private. Neighbors always knew your business. > Big difference is that your neighbors were usually looking out for you.. not waiting to catch you doing something wrong.. Even in the small town I live in, there is considerable privacy even though everyone knows everyone else.. people tend to keep their noses out of others business.. of course, if you offer to talk, then its fair game for the side of the road interrogations Rob L. Rockford, Wa From don at cs.byu.edu Mon Oct 9 19:33:40 1995 From: don at cs.byu.edu (Don M. Kitchen) Date: Mon, 9 Oct 95 19:33:40 PDT Subject: Certificate proposal In-Reply-To: <9510091715.AA27991@alpha> Message-ID: > > hfinney at shell.portal.com writes: > > I can see using keys with attributes in this way, for credentials or as > > other forms of authorization. But what about for communications privacy? > > What is the attribute that tells you that using this key will prevent > > eavesdropping? > > If we exchange keys on a face-to-face basis, then I really don't see > much of a MITM threat, unless somehow the MITM has perverted my > original key and I for some reason can't figure that out. Now, as > long as you communicate with me via the public key I've handed you, we > should be as safe as PKE can make us. Ah, but you're being sucked in by the True Name game. Suppose the Medussa in the middle is the one who meets you. What is he/she going to do, whip out a passport that says "Pr0duct Cypher" across it? The only way to prevent that is if the nym has a public identity, and a way to prove a link to that identity. The only reason to meet in person is to verify a True Name[tm]. If I want people to know that I trust Pr0duct Cypher, I can encrypt my signature to the PC key with PC"s public key, that I already know is his because that's what he sends out with his source code. The information is only useful to the holder of the key, that being PC. I am, though, relying on the MITM to not be all-powerful. Mitch in the Middle could have intercepted all Pr0duct Cypher messages and put in his/her own key. As long as the real PC is unaware of the fake PC, or is unable to raise the alarm, there is NOOO way of detecting PC having been isolated by Mitch. As I said, what are you going to ask for, besides something relating to a key published along with reputation-building material. > If we are forced to exchange keys remotely, then perhaps some sort of > "proof" techniques could be used to establish to some level of > assurance that the remote entity I *think* is you is really you. Or So who is Pr0duct Cypher then? And why should I have to produce ID saying my name is Don, unless I'm proving my Real Name[tm] is Don. > you could provide me with a key, and then I could poll a list of > references to inquire as to the "goodness" of the key. This seems to But there's no way to prove that there's no MITM. But "middle" is a subjective term. If Mitch has become sophisticated enough to meet in person with a magic ID, and write cryptocode on the spot, I'm no longer dealing with Medussa In the Middle, I'm dealing with someone pretending to agreeing with me, when really they are opposed to my beliefs. > me to be subtly different than a certificate procedure, because I'm > not asking about the goodness of a relationship to the key, but rather > about the key itself. > > Maybe I'm missing something. What is there to trust in a more > "traditional" certificate scheme? > Don From greg at ideath.goldenbear.com Mon Oct 9 19:38:07 1995 From: greg at ideath.goldenbear.com (Greg Broiles) Date: Mon, 9 Oct 95 19:38:07 PDT Subject: spam detector algorithm? Message-ID: <199510100222.AA06590@ideath.goldenbear.com> -----BEGIN PGP SIGNED MESSAGE----- I've been mulling over algorithmic/computational ways to spot spams for some time now. I think I might've come up with a way to represent messages (and compare representations) that would be useful to remailer operators who don't want to let spams (where "spam" == many messages with identical or very similar content) through their remailers. Any such technique will really only be useful at the last remailer in a chain, at least until people start sending encrypted spams (and there doesn't seem to be so much incentive for sending those). My proposed method is this: break the body of a message down into a list of words (with their frequencies). Eliminate words in that list which aren't in the "standard dictionary" (which ideally will contain many of the words used in the messages but doesn't need to have all of them). Alphabetize the list of words which remain. Plot a point in 3d space for each word in that list where its X coordinate is its position in the alphabetized list, its Y coordinate is its position in the dictionary, and its Z coordinate is its frequency (of appearance in the original text). This should produce a curve which "describes" the original text; messages which use many of the same words as the original (and don't use any new words) and have similar usage counts should produce similar curves. My assumption (which needs some testing) is that even moderately intelligent auto-spams (e.g., which assemble canned sentences into paragraphs or canned paragraphs into messages) are going to be similar enough that they'll eventually generate similar curves as other messages - the order in which the words appear doesn't matter (and isn't preserved). I'm also assuming that adding enough words to change the curve's shape would make the resulting messages nonsensical or wierd enough that they're unlikely to be useful for people who want their spams to get read. Evildoers solely interested in generating volume without coherence can just quote libertarian/objectivist texts (ha, ha, just a joke for all of you people who keep slamming "commies") or pick words/characters at random. I'm assuming - and this may be an erroneous assumption - that it's feasible to algorithmically describe and compare curves/lines in 3d space. My math is weak and spotty, but I think that's college-level (high-school, even?) math. It seems like one might compare equations which describe the curves for similarity (e.g., one curve might be x=2y+1 (in 2d space) and another might be x=2y+1.2, where "y=10" initially for each), and also compare the areas demarcated by the lines for similarity. My reason for including word frequency as a third dimension is to dampen the effect of an intelligent spammer throwing in a few early "A" words (e.g., "aardvark abcess absolute") or "Z" words to skew the curve. Any thoughts about this? Interesting? Stupid? Like I said, my math is weak. My intention is to try to cobble up a 2d version of this to see how it runs but I thought I'd see if anyone can point out why it can't work, or if it's useful enough that someone with a better math background than I've got wants to take this idea somewhere better. One side effect to the deployment of spam detectors may be that the remailer pinging services will need to move to using encrypted packets. It'd be possible for the remailer operators to identify and specially handle reliability measuring packets but that seems broken. Ideally, they should be indistinguishable from ordinary remailer messages. At least until money is involved, nobody's likely to give them special treatment - but even relatively small charges for remailing would make it more attractive for a remailer operator to try to skew the results of the pinging services so as to direct more traffic to themselves (my remailer recently hit Raph's Top Three again and that always brings a big traffic hit - it'll probably drop out again pretty soon and things'll be slow again. If I was getting $.10 for every message, though, I might care more about keeping it in the top 3.) My initial plan would be to include code in a spam detector which simply MD5's messages which don't seem to have identifiable words, and watches for a repeat of those hashes in, say, the last 100 messages seen; this would force someone who wants to send an encrypted spam (or uses a spam-detecting remailer to reach a non-detecting remailer) from encrypting once and sending 1000 times; they'd have to encrypt 1000 times to send 1000 times, which may be enough of a performance drain on them to make spamming less attractive. My impression is (speak up if I'm wrong) that requiring encryption for the ping packets wouldn't be an enormous burden on the pinging services because the new generation of software sends fewer pinging packets such that the CPU time required isn't an issue. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHnYyn3YhjZY3fMNAQFnAgP/fBEaa7SObeu9wyqMCO6OW8rEraOtmxRG ynWeZVVvrtHgwuaS0NlhU4IMHVj/Laks4n6bbEbNRktfl/F5+HBvova52JQhoUkb 7EjEsRh57OwXHuVxJl/zODIH+qNd9lZP6+Tv7Vk2/SXVj3oRFD1jIZBUx6rBBZvf ZOaimDcSemw= =LjFV -----END PGP SIGNATURE----- From tcmay at got.net Mon Oct 9 20:10:40 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 9 Oct 95 20:10:40 PDT Subject: Crypto's Role in Evil? Message-ID: At 2:24 AM 10/10/95, Rob L wrote: >> > We mustn't forget that, until very recently, strong, widespread >> > privacy has been humanity's "default" condition. >> >> Not much privacy in village or tribal life. Even neighborhoods of >> earlier cities weren't very private. Neighbors always knew your business. >> > >Big difference is that your neighbors were usually looking out for you.. >not waiting to catch you doing something wrong.. >Even in the small town I live in, there is considerable privacy even >though everyone knows everyone else.. people tend to keep their noses out >of others business.. of course, if you offer to talk, then its fair game >for the side of the road interrogations Ah, a very astute comment! Indeed, my chief concern--speaking for myself--is not hiding my activities from my neighbors, who, by the way, share my distaste for high taxes, big government, etc., but in ensuring that the various enforcement agencies are not aware of my activities. (And even then, my concern is a bit abstract, as I'm not--take my word--a pot grower, a money launderer, an arms dealer, or a terrorist. I have violated some laws about obtaining necessary permits, such as the ones needed to run a computer consulting firm in one's home, but I don't fear a pre-dawn raid by the jack-booted thugs over this.) Priuacy is mostly needed to protect against the government, or those who inform to the government, because it is manifestly the government that throws people in jail for doing "illegal" things, not one's neighbors. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From shamrock at netcom.com Mon Oct 9 20:51:59 1995 From: shamrock at netcom.com (Lucky Green) Date: Mon, 9 Oct 95 20:51:59 PDT Subject: Java bugs found? Message-ID: <199510100349.XAA20771@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <199510100145.SAA00403 at lux.reich.com>, Richard_Reich at reich.com (Richard Reich) wrote: > After I noticed the file had been pulled, I recovered its contents from my > netscape cache (thanks, netscape!): > > Netscape was notified on Sunday 10/8/95 by Sun Microsystems that there > is a serious security hole in their Java system [...] So much for guaranteed security. There is one question on my mind. Why do today's programs have to try to do it all? Why the heck does a wordprocessor have to ship with a compiler built in? Not to mention that there seems to be a disturbing tendency to "feature" automatic execution of arbitrary code submitted by third parties. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHntWioZzwIn1bdtAQHqMgGAmc0lpXKiDZPCxZxFmQOKvgwm8Y/RRFca rTfkfyvbdofFklrivaMy+tuuLddZRHo8 =lnto -----END PGP SIGNATURE----- From rjc at clark.net Mon Oct 9 21:42:35 1995 From: rjc at clark.net (Ray Cromwell) Date: Mon, 9 Oct 95 21:42:35 PDT Subject: java security concerns In-Reply-To: <199510100051.RAA03799@infinity.c2.org> Message-ID: <199510100442.AAA10517@clark.net> I think to require formally proven implementation for something like Java is simply unreasonable. Even if it were possible. The whole computer market, and for that matter, most of the market as a whole, relies on "unproven" products. Most of what you buy and use is based on a notion of "quality" which is merely an inductive argument that the product had no problems in the past. Everytime you buy a piece of software and use it, you risk your security. Everytime you ftp something off the net and run it, you are taking that risk. How do you know MS Word doesn't have security holes or trojan horses built in, have you seen the source? Software always has bugs, holes, and security flaws. It always will. If we were to require each new generation of software to be "formally correct", software would never evolve. There is an important feedback process between customers, software companies, and even hackers, that drives software towards higher quality. Perfect software implementations proven correct by mathematics is a pipe dream. Maybe you can have higher confidence in small, simple software -- I've heard Negroponte expressing that nostalgia for the days of word processors that ran in 32k of ram, but frankly, I'm glad those days are gone. Will the IPv6 and IPSEC stack implementations be formally proven correct? Yes, it may be possible that exploiting holes in Java will be easier than those in sendmail, just as it is easier to exploit a hole in software on a networked machine rather than a non-networked one. But this can not be an argument against Java or its utility. The same arguments were raised when Postscript first came out, yet the huge benefits of postscript are obvious, while the amount of security damage done by it is minimal. Java will have lots of holes. It will go through the same evolutionary progress that all software does. Sendmail was given a chance to evolve, I think Java deserves the same chance, given its potential. -Ray From rjc at clark.net Mon Oct 9 21:50:34 1995 From: rjc at clark.net (Ray Cromwell) Date: Mon, 9 Oct 95 21:50:34 PDT Subject: Java bugs found? In-Reply-To: <199510100349.XAA20771@book.hks.net> Message-ID: <199510100450.AAA12123@clark.net> > > So much for guaranteed security. There is one question on my mind. Why do > today's programs have to try to do it all? Why the heck does a > wordprocessor have to ship with a compiler built in? Not to mention that Possibly because it makes applications a lot more usable if they are extensible. -Ray From perry at piermont.com Mon Oct 9 21:58:03 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 21:58:03 PDT Subject: java security concerns In-Reply-To: <199510100442.AAA10517@clark.net> Message-ID: <199510100457.AAA00235@jekyll.piermont.com> Ray Cromwell writes: > Yes, it may be possible that exploiting holes in Java will be easier > than those in sendmail, just as it is easier to exploit a hole in > software on a networked machine rather than a non-networked one. But this > can not be an argument against Java or its utility. The same arguments > were raised when Postscript first came out, yet the huge benefits > of postscript are obvious, while the amount of security damage > done by it is minimal. Postscript is completely safe if the interpreter is emasculated, and most of them are. (It is a huge risk when run on a non-emasculated interpreter, but fortunately it is easy to castrate one of the things.) Java isn't like that, unfortunately. I wish it was simply a display-postscript like thing that built pretty pictures inside a confined window -- I could trust that to be done right if it was done carefully. Perry From frissell at panix.com Mon Oct 9 21:58:08 1995 From: frissell at panix.com (Duncan Frissell) Date: Mon, 9 Oct 95 21:58:08 PDT Subject: Java bugs found? In-Reply-To: <199510100042.UAA24769@jekyll.piermont.com> Message-ID: > > Netscape pulled all the 2.0 betas that supported Java yesterday, > due to a recently discovered Java security hole. So the 32 bit > Windows versions, SunOS, Solaris and SGI versions were removed. > There was a README explaining this there last night, but I can't > find it today. What am I bid for this rare n32e20b1.exe downloaded Saturday night. An instant classic at 2.6 megs. DCF From aleph1 at dfw.net Mon Oct 9 22:36:21 1995 From: aleph1 at dfw.net (Aleph One) Date: Mon, 9 Oct 95 22:36:21 PDT Subject: java security concerns In-Reply-To: <199510100457.AAA00235@jekyll.piermont.com> Message-ID: Iam sorry I dont fallow your logic. You find Postscript files save because you can set up the interpreter to ignore Postscript commands to write to files and execute programms (check the CIAC alerts), yet you find Java applets insecure even when you can set up the same restrictions and more under HotJava (and hopefully Netscape)? That does not compute. Granted Java is certanly more complex than postscriptm it a genereric programming language, and will be used by more people. But that same concept aply. Aleph One / aleph1 at dfw.net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01 On Tue, 10 Oct 1995, Perry E. Metzger wrote: > Postscript is completely safe if the interpreter is emasculated, and > most of them are. (It is a huge risk when run on a non-emasculated > interpreter, but fortunately it is easy to castrate one of the things.) > > Java isn't like that, unfortunately. I wish it was simply a > display-postscript like thing that built pretty pictures inside a > confined window -- I could trust that to be done right if it was done > carefully. > > Perry > From blancw at accessone.com Mon Oct 9 22:39:08 1995 From: blancw at accessone.com (blancw at accessone.com) Date: Mon, 9 Oct 95 22:39:08 PDT Subject: Crypto's Role in Evil? Message-ID: <9510100538.AA05032@pulm1.accessone.com> From: Jon Lasser (1) It is impossible to stop these technologies; someone on the list recently reminded us that a bright fourteen year old could reproduce the basic functionality of PGP in a brief period of time. The mathematics of, say, RSA, are fairly basic. I think it's unreasonable to outlaw multiplication of prime numbers, don't you? .......................................... Uh-huh, yes, I think it's dumb to think of outlawing the right of mental creatures to engage their faculties to their full potential, especially in a country which defined encroachments upon it as a crime. "Unreasonable" people will always try to get something for nothing, with nothing, while in conflict with those who could & would develop the means to deliver it. .. Blanc From dlv at bwalk.dm.com Mon Oct 9 22:44:47 1995 From: dlv at bwalk.dm.com (Dr. Dimitri Vulis) Date: Mon, 9 Oct 95 22:44:47 PDT Subject: Making it more difficult to forge cancels (was: Re: FORGED CANCELS of posts on n.a.n-a.m) In-Reply-To: <199510051540.IAA23612@ix.ix.netcom.com> Message-ID: In article <4571p9$kf5 at kruuna.helsinki.fi>, wirzeniu at cc.Helsinki.FI (Lars Wirzenius) writes: >dlv at bwalk.dm.com (Dr. Dimitri Vulis) suggests that cancels be authenticated >so that only the actual poster could cancel them. He notes that this >would make it impossible for moderators to cancel forgeries, but says >they could use NoCeM notices instead. > >Speaking as the moderator of comp.os.linux.announce: No way! > >NoCeM doesn't work, since most people have never even heard of it. [Valid criticisms of NoCeM skipped] >(Approval forging can fairly easily be made very difficult: the moderator >digitally signs the articles, and all major news servers are fixed to >drop all other articles on the floor. The problems with this approach >are that on the one hand, upgrading a lot of news servers to the new >software is a bit of work, and on the other hand, even digital signatures >may be, or become illegal in parts of the world. But that just might >be a reason to implement it now. There's work being done on it, as a >matter of fact.) Sorry for the belated follow-up -- I was far away, and now have a backlog to sort out. I've discussed the Hujskonen-Franz proposal some time ago with the beautiful Simona Nass from Panix and the Society for Electronic Access, and she made the following suggestion: let each party that wants to be able to authorize cancels add their own separate Cancel-lock: headers. The cancel/supersede should be honored if its Cancel-key header matches any one of the Cancel-lock challenges. I think adding multiple Cancel-lock: headers, any single one of which needs to be matched, to the Hujskonen-Franz proposal will address _some of the concerns expressed by Bill Stewart last week, by Lars Wirzenius, and by CancelMoose him/herself in http://www.cm.org/about-cancels.html about the ability of moderators to cancel postings in their own newsgroups. Scenario 1. Alice posts an article from a computer owned by Bob, an Internet provider. Bob wants to reserve the right to cancel Alice's account and Alice's Usenet postings without Alice's permission if Alice misbehaves (e.g., spams). Alice posts: ]From: alice at bob's.box ]Newsgroups: alt.sex ]Subject: Call me at 1-800-xxx-xxxx for a good time ]Message-id: X (123 at bob's.box) ]Cancel-Lock: M2_a where M2_a is the one-way H(X + M1_a), and M1_a is H of the article and of Alice's secret passphrase. Bob, being the sysadmin and the owner of his box, configures his news-posting software to add automatically a second challege, in addition to Alice's: ]Cancel-Lock: M2_b where M2_b is the one-way H(X + M1_b), and M1_b is H of Alice's article and of _Bob's secret passphrase. Bob asks Alice nicely to cancel the article, since such ads are not appropriate on alt.sex. Alice may comply and issue a cancel with the header ]Cancel-Key: M1_a which will be honored. But if Alice refuses, Bob can issue a cancel/supersede with the header: ]Cancel-Key: M1_b which should likewise be honored because H(X + M1_b) matches one of the two challenges in the posted article. Note 1: If Alice doesn't add a Cancel-Lock, and Bob does, then Alice won't be able to cancel her own article. Note 2: It may be a good idea to put comments on the challenges: ]From: alice at bob's.box ]Newsgroups: alt.sex ]Subject: Call me at 1-800-xxx-xxxx for a good time ]Message-id: X ]Cancel-Lock: M2_a ; alice at bob's.box ]Cancel-Lock: M2_b ; root at bob's.box Scenario 2. Alice submits an article to Bob, a moderator of a moderated newsgroup: ]Newsgroups: rec.food.cannibalism ]Subject: How to cook elementary school children ]Message-id: X ]Cancel-Lock: M2_a where M2_a again is H(X + M1_a), and M1_a is H of the article and of Alice's secret passphrase. Bob, being either the sole moderator, or a team member, adds an approval and a second challege, in addition to Alice's: ]Approved: Bob ]Cancel-Lock: M2_b where M2_b is the one-way H(X + M1_b), and M1_b is H of Alice's article and of a secret passphrase used by Bob or by the entire moderating team. Later Bob can cancel this article by specifying ]Cancel-Key: M1_b Alice too can cancel this article by specifying ]Cancel-Key: M1_a (unless Bob has stripped Alice's challenge before posting her submission) and Alice's sysadmin can cancel it too if he added his own challenge (third). I personally don't think that Bob should be allowed to cancel Alice's article after he approved it, but that's between Alice and Bob; if she doesn't like it either, she can post her articles elsewhere. Now, if Alice injects an article with "Approved:" and entirely bypasses Bob, (Lars Wirzenius's main conern), then Bob should post a PGP-signed NoCeM notice and try to yank Alice's feed, or have the site that continues to permit Alice to do this to be widely aliased. IMVHO, when this happens, the problem is much deeper than just having the unauthorized article removed. If and when NoCeM becomes widely accepted, most sites can be expected to honor signed 'Action: hide' requests from newsgroup moderators in their groups. Scenario 3. Alice provides dial-up Usenet feed to/from several small sites run by Bob, Charles, and Dan. Their domains point to Alice via MX. Alice knows that if one of them spams Usenet, she'll be flamed and mailbombed. Alice adds her own "Cancel-Lock:" to each article she receives from these sites before feeding them to the rest of Usenet. Later she can cancel whatever articles have originated at B, C, D, and passed through her site. If Bob, Charles, and Dan don't want Alice to be able to cancel their articles, or if Alice adds other headers in the articles that pass through her site that they don't like, then they can look for another feed. Please note that I don't claim credit for these proposals: I'm just repeating others' ideas which I happen to like a lot. I hope some civic-minded person(s) will write patches for the common posting/server software, and compose an RFC for the Cancel-Lock:/Cancel-Key: headers. One nice feature about the Hujskonen- Franz proposal that it can be adopted gradually: some sites can continue to honor all cancels, while others can choose to start honoring only authenticated cancels, and to help track down forged cancels that fail authentication. P.S. I saw a NoCeM notice from Chris Lewis with Action:hide/Type: copyright, for someone's Usenet article that, I think, quoted his private e-mail (?). I wonder if CancelPoodle's NoCeM's for the Top $ekret $ientology $tuff will follow soon. :) (And the NoCeM documents should probably be updated to support new types: copyright, libel, flame, inappropriate, ... :) :) :-) ObMoosePoem: :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) Moose, Moose, wonderful Moose! Gets rid of nasty spam. So fond of the Moose I am. Hooray for the wonderful Moose! :-) --- Dr. Dimitri Vulis Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From perry at piermont.com Mon Oct 9 22:48:05 1995 From: perry at piermont.com (Perry E. Metzger) Date: Mon, 9 Oct 95 22:48:05 PDT Subject: java security concerns In-Reply-To: Message-ID: <199510100547.BAA00623@jekyll.piermont.com> Aleph One writes: > Iam sorry I dont fallow your logic. You find Postscript files > save because you can set up the interpreter to ignore Postscript commands > to write to files and execute programms (check the CIAC alerts), yet > you find Java applets insecure even when you can set up the same > restrictions and more under HotJava (and hopefully Netscape)? > That does not compute. Yes it does. To (perhaps over)simplify my point, the Java interpreter cannot be stripped of all i/o capabilities and still remain useful. I can physically remove all the "dangerous" calls from a Postscript interpreter and still have it be useful. Perry From Mike_Spreitzer.PARC at xerox.com Mon Oct 9 22:53:45 1995 From: Mike_Spreitzer.PARC at xerox.com (Mike_Spreitzer.PARC at xerox.com) Date: Mon, 9 Oct 95 22:53:45 PDT Subject: Fully Qualified Domain Name Message-ID: <95Oct9.225333pdt."16398(3)"@alpha.xerox.com> Was there a recent discussion here about how to write a piece of UNIX code that discovers a Fully Qualified Domain Name of the machine running the code? If so, I'd appreciate pointers to or copies of the good parts (I scanned http://www.hks.net/cpunks/cpunks-19/subject.html and didn't find what I'm seeking). If not, sorry for wasting your time. Thanks, Mike From jamesd at echeque.com Mon Oct 9 22:57:23 1995 From: jamesd at echeque.com (James A. Donald) Date: Mon, 9 Oct 95 22:57:23 PDT Subject: PC disk wipe software Message-ID: <199510100557.WAA10779@blob.best.net> >>PC Tools has a wipe program that will either wipe individual files, or >>wipe all unallocated diskspace. It also allows you to choose the level >>of wipe (single overwrite, multiple, etc). At 12:24 PM 10/9/95 -0400, Robert Hettinga wrote: >There has been considerable discussion on the MCIP list about how most >*Mac* programs that purport to do this, like Burn, for example, leave stuff >over in disk blocks. My understanding is that this is not a trivial >problem, and it occurs in MUSH-DOS as well.... I wrote the disk wipe program in PC Tools. It really no kidding wipes stuff. The only way they can recover the data is if they take a scanning tunneling microscope the disk platter, and even then they could only recover small random fragments. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From rjc at clark.net Mon Oct 9 23:16:10 1995 From: rjc at clark.net (Ray Cromwell) Date: Mon, 9 Oct 95 23:16:10 PDT Subject: java security concerns In-Reply-To: <199510100547.BAA00623@jekyll.piermont.com> Message-ID: <199510100615.CAA00389@clark.net> > > > Aleph One writes: > > Iam sorry I dont fallow your logic. You find Postscript files > > save because you can set up the interpreter to ignore Postscript commands > > to write to files and execute programms (check the CIAC alerts), yet > > you find Java applets insecure even when you can set up the same > > restrictions and more under HotJava (and hopefully Netscape)? > > That does not compute. > > Yes it does. > > To (perhaps over)simplify my point, the Java interpreter cannot be > stripped of all i/o capabilities and still remain useful. I can > physically remove all the "dangerous" calls from a Postscript > interpreter and still have it be useful. There is a large class of Java apps that need no file i/o capability. 99% of all Java apps on the web right now don't save any persistent state information. I couldn't find any Java apps on the Java page that used file i/o. If by "stripped of i/o capabilities", you mean that the Java interpreter is not permitted to ever call open/read/write, not even to read in files it needs like config/preferences files or dynamically linked libraries, I'd say that's absurd. There's not many things that can be stripped of such capabilities, including postscript interpreters, except for those which run the interpreter straight out of rom. But it's still unclear whether those lack "i/o capabilities", given that some postscript printers run operating systems and tcp/ip stacks, and it is feasible for the interpreter to crash and execute an i/o call. However, the Java interpreter can certainly be compiled to not allow Java applets to ever do disk or network i/o. It doesn't even take a recompile. Just delete the file i/o class. It is certainly possible, to within a high degree of confidence, to "box in" all i/o calls, especially if they are run in a separate process. -Ray From rjc at clark.net Mon Oct 9 23:18:01 1995 From: rjc at clark.net (Ray Cromwell) Date: Mon, 9 Oct 95 23:18:01 PDT Subject: Java bugs found? In-Reply-To: Message-ID: <199510100617.CAA00753@clark.net> > > > > > Netscape pulled all the 2.0 betas that supported Java yesterday, > > due to a recently discovered Java security hole. So the 32 bit > > Windows versions, SunOS, Solaris and SGI versions were removed. > > There was a README explaining this there last night, but I can't > > find it today. > > What am I bid for this rare n32e20b1.exe downloaded Saturday night. An > instant classic at 2.6 megs. Hehe, I dunno, but whatever you're asking, I'll undercut you as I have it also. Unless you'd like to start an oligarchy. Let's talk. ;-) -Ray From wilcoxb at nag.cs.colorado.edu Mon Oct 9 23:26:08 1995 From: wilcoxb at nag.cs.colorado.edu (Bryce) Date: Mon, 9 Oct 95 23:26:08 PDT Subject: MITM attacks and True Names (again...) In-Reply-To: <199510081722.KAA10011@jobe.shell.portal.com> Message-ID: <199510100626.AAA20036@nag.cs.colorado.edu> -----BEGIN PGP SIGNED MESSAGE----- Hal wrote: > Eventually it seems that > the MITM becomes enmeshed so deeply in his own lies that he would get > caught. If steps like these are taken successfully it should be > reasonable to sign a nym's key, with the semantics being that either this > is the real key of the sender, or he has a nearly omnipotent MITM > surrounding him. Let's think of ways to foil Mitch: 1. Physical body (a.k.a. "True Name") mapping. 2. The "overload his processors" trick. 3. Sending hashes of future messages. 4. Sending your public key to the Web O Trust via multiple, independent channels. 5. Working an identifier of your public key into conversation so that Mitch can't edit out your public key without changing the whole conversation. (E.g. "I talked to her a number of times equal to the least significant 4 bits of my public key." This is an example which Mitch could easily handle, by replacing "a number ... key" with "3 times", but it gives you the idea.) All of these can involve psychological manuevers, like "informal coding". That is, trying to sneak some information by Mitch that he *should* edit if he knew what he was good for him, but he doesn't realize it. This gets really interesting, trying to communicate something to your actual recipient without letting Mitch realize what you are communicating. The "tell me [something only you would know]" game is a good example of that. I think method 4 is the best method. Method 1 is more reliable, but much more expensive and I have a strong aversion to making it necessary for everyone to publicize their True Name. I don't know if method 5 is even feasible. :-) Of course, there is no reason not to use many different methods simultaneously. Bryce signatures follow "To strive, to seek, to find and not to yield." bryce at colorado.edu -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Auto-signed under Unix with 'BAP' Easy-PGP v1.01 iQCVAwUBMHoR6/WZSllhfG25AQFgbwP/fTXZTRGdPL1GIzep+0YS9lD/GigW9XHP 8SiF8y+AxmVXeYYE0Jwj7T2MPNE298H1V8ZQQXq6ClLSJjXbvOnCGN35mhu0xR+l MdaCiV2LOpLs8tXVDSkuLfJBcVdJRR7TuyXYTBSdAf2pTn6SOkmMhIKe7z/6fj7h qrRMjCPRL5s= =8QFl -----END PGP SIGNATURE----- From fstuart at vetmed.auburn.edu Mon Oct 9 23:39:54 1995 From: fstuart at vetmed.auburn.edu (Frank Stuart) Date: Mon, 9 Oct 95 23:39:54 PDT Subject: [NOISE] was Re: java security concerns Message-ID: <199510100639.BAA19818@snoopy.vetmed.auburn.edu> This is a bit off-topic, but hopefully interesting. Rather than trying to prove a program to be correct (which I agree is doomed to failure for the forseeable future for all but trivial programs), perhaps it would be useful to have an automated therom-prover to try to deduce "interesting things" about certain programs such as "this program always bounds-checks its input", "this program allows writes to arbitrary files on lines x, y, and z", "this program halts". (:>) Obviously (as the last example illustrates), this isn't perfect because something can be true without being provable. Further, it's likely that assumptions must be made about system calls, libraries, and the ways in which they interact. There's also the problem of "who proves the prover". However, I think such a tool would be useful because it may quickly point out things not obvious to (most) humans and getting some idea of what can't be deduced and why would be instructive. | (Douglas) Hofstadter's Law: Frank Stuart | It always takes longer than you expect, even fstuart at vetmed.auburn.edu | when you take into account Hofstadter's Law. From stewarts at ix.netcom.com Tue Oct 10 00:21:26 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Tue, 10 Oct 95 00:21:26 PDT Subject: PC disk wipe software Message-ID: <199510100721.AAA20944@ix.ix.netcom.com> >There has been considerable discussion on the MCIP list about how most >*Mac* programs that purport to do this, like Burn, for example, leave stuff >over in disk blocks. My understanding is that this is not a trivial >problem, and it occurs in MUSH-DOS as well.... Doing it _right_ is not a trivial job. Consider disk controllers that map out bad blocks so the OS never needs to see them - if you're trying to remove highly classified data, the fact that Diskwipe won't ever see them might be a serious problem, even if it is close enough for government work. For a more realistic scenario, consider Stacker and other disk-compression software; you don't know what physical blocks the file was written on, or whether overwriting the logical blocks of the file will actually write to the same physical blocks. In some cases you can assume that it probably won't. You also can't expect to write large blocks of 1s or 0s over the disk, because disk compression will turn them into small blocks with run-lengths or equivalent. (Writing PRNG random noise will do, or you can generate counter-based patterns that may work, or do something cryptographically strong if you want to take the time.) #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From stewarts at ix.netcom.com Tue Oct 10 00:22:09 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Tue, 10 Oct 95 00:22:09 PDT Subject: Certificate proposal Message-ID: <199510100721.AAA20956@ix.ix.netcom.com> At 09:46 AM 10/9/95 -0700, Hal wrote: >>This doesn't necessarily eliminate certificates - while you have a signed >>statement from Alice's key that she uses Bank Account X, and a signed statement >>from Alice's key authorizing transfer of $D from Bank Account X to Bank >>Account Y, >>the Bank, or a customer, may refuse to accept the request unless there's >>a signed statement from the Bank's key that Alice's key uses Account X. >>None of these need Alice's name, or for that matter the Bank's, as long as >>there's >>also a signed attribute statement from the Bank's key that it's a bank, etc. >>The meaning of the certificates changes a bit, but there's still a certificate >>from the bank binding Alice's Key to Alice's Bank Account. > >I can see using keys with attributes in this way, for credentials or as >other forms of authorization. But what about for communications privacy? >What is the attribute that tells you that using this key will prevent >eavesdropping? What I was trying to get at with this post was that the assertion that key- centered communications probably won't require certificates is incorrect. As far as privacy goes, this set of keys and certifications lets you create private communications (using signed DH, etc.) with the entity that owns the private key for Bank Account X. No, you don't know if that entity is really Alice or really MITM; in fact you don't know Alice's name, if it's done right. You just know that the Bank says it will honor requests for money from Bank Account X (assuming you know where to find the Bank, which is a separate but similar problem.) So assuming you're selling politically correct widgets and not pharmaceuticals or financial privacy consulting services, you probably don't care too much about who's on the other end - the person who's giving you the money is the person you want to be talking to. I'm not trying to define away the MITM problem - I think there _are_ times you want to know for sure who you're talking to - but I think there are also a lot of times that you really don't care, as long as you have continuity and access to reputations of long-persisting identities, where the key is often enough identification. In the case of the Bank, the reason you trust the Bank isn't that you know them physically (though it was interesting when I started dealing with a local bank where the tellers knew me by name after only two or three visits); knowing your local Savings and Loan by name doesn't guarantee you can get any money out of them if there's a bank run, nor does it really guarantee that they won't embezzle the funds and head for Argentina. The reason you trust them is that they (in this case the "they" identified by their key) are doing business dealings with a lot of people and it's more profitable not to abscond. And the reason you know it's really the Bank and not MITM is that they've always identified themselves by their key from the beginning. Just like the credit card who's owner we've been calling Alice has. And because you've successfully withdrawn money from the Bank before, and because you're clearing Alice's credit card transaction reasonably promptly. Checks and credit cards are especially good examples for this - the current systems need your name on them, because your name and signature are the closest they have to an authentication system. However, with digital signatures, the fact that you can sign a document verifiable by the public key is all the authentication that's needed; your name isn't. If the card has an account number for convenience, and Alice substitutes Carol's account number for hers on a statement, her signature won't match the public key the bank wants on the request, and it'll bounce. (In this case, the certificate from the bank would probably include the account number as well as the key, but it's not critical for on-line systems, just more efficient.) #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From mech at eff.org Tue Oct 10 00:30:41 1995 From: mech at eff.org (Stanton McCandlish) Date: Tue, 10 Oct 95 00:30:41 PDT Subject: UK key escrow effort? Message-ID: <199510100730.DAA03927@eff.org> Anyone heard anything about this? Please email me direct if you have info. TTYL. -- Stanton McCandlish
      mech at eff.org

      Electronic Frontier Foundation

      Online Activist From stewarts at ix.netcom.com Tue Oct 10 00:37:16 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Tue, 10 Oct 95 00:37:16 PDT Subject: java security concerns Message-ID: <199510100737.AAA21881@ix.ix.netcom.com> At 02:15 AM 10/10/95 -0400, Ray wrote: > There is a large class of Java apps that need no file i/o capability. >99% of all Java apps on the web right now don't save any persistent state While file I/O, especially file writes, are certainly a major concern, network capability is also critical - and I would guess that most of the interesting applets aren't just animated Christmas trees and image advertising - they'll be things to help you fill out a form correctly and send it in, or have buttons that say "order me". If they can issue outgoing messages of their own, they can spam, and they can send worms. > But it's still unclear whether those lack "i/o capabilities", >given that some postscript printers run operating systems and tcp/ip stacks Unlike network-equipped PS printers, which are a relatively small fraction of the market, and which usually don't get requests from the outside world sent to them through firewalls, we're talking about something that will be in Netscape, where anybody who clicks a button on anything on the web can download an executable page... It's a bit hard for network printers to find each other in most places; it's much easier for Netscape sessions to do so. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From gjeffers at socketis.net Tue Oct 10 02:48:16 1995 From: gjeffers at socketis.net (Gary Jeffers) Date: Tue, 10 Oct 95 02:48:16 PDT Subject: PC disk wipe software - SUPERWIPE 1.04R Message-ID: <199510101324.IAA14089@mail.socketis.net> PC disk wipe software - SUPERWIPE 1.04R Note: SUPERWIPE is also a SUPER ERASER with powerful erase features. As a matter of fact, I have written a shareware program that is a PC wipe program: SUPERWIPE 1.04R . I just sent a copy to Perry Metzger. If anyone else wants a copy, let me know. Its free to Cypherpunks. There are two big problems with writing a PC disk wipe program. 1. Compressed disks. With compressed disks you don't know how long to make the write. You try putting all 1's or all 0's and the disk compressor will compress it next to nothing. In fact, it may write the wipe data to different clusters than the original file. 2. Software disk caches and even worse - hardware disk caches. - Those 256k disk caches. With caches, if you do multi-wipes of a file, in actuallity, you only do one real wipe & several virtual (to RAM) wipes. It might be possible to get around the first problem by using direct sector writes (INT 13 SERVICE 3) instead of well behaved (INT 21 SERVICE 40) writes. But this is a rather dangerous practice as if you make a mistake you might wreck the hard disk partition. Concerning the second, I see no practical way around the problem of hardware disk caches keeping the user from making multiple wipes of a file. As for making multiple wipes of CURRENTLY unused disk space, my SUPER- WIPE will do that with the options: /oldx /n . Where oldx points at the diskette drive or hard disk partition to be wiped & /n tells how many wipes to do (1-9). As for the problem of getting rid of old buffer data writes to the end of last file cluster writes, my program doesn't handle that. However, if there is no disk compressor, I don't think it would be that hard to write a function to handle it. In reality, I don't think that this problem is much of a problem anyway. It would only occur at the end of small files. I suspect that the wipe problems that we have with the DOS operating system are shared with most other operating systems. I uploaded SUPERWIPE to an anon ftp site. I believe it was Alex De Joode (or spelled something like that) who gave approval for the upload. It seems like it was a Utopia site. I lost my file on it and have now for- gotten. If anyone needs SUPERWIPE, send me a request. Some documentation follows for SUPERWIPE 1.04R: -------------Start of readme.spr file--------------------------------- SUPERWIPE current version: 1.04r SUPERWIPE is a utility that will substantially increase the security of your computer. What does SUPERWIPE do? In order to explain what it does, I first need to explain some security holes in the DOS operating system as it works with disks. The delete & erase DOS instructions are convenient utilities that allow you to get rid of old files. They don't actually destroy the files. They merely mark these files so that they will be ignored by the DOS operating system. Most of the time this is good enough. But what if you have sensi- tive files that must not be recovered? A snoop could use the popular DOS undelete command or another utility program to entirely recover these files. To solve this problem, wipe programs were invented. A wipe program will write a character, usually a 0 or a 1, over your entire file & then delete it. In this way, your sensitive files are made non-recoverable. NOTE: SUPERWIPE currently only works with non-compressed disks. SUPERWIPE also does this but with some improvements! SUPERWIPE (unregistered) will enable you to : 1. allow multiple files to be wiped instead of just one! 2. use wildcards! 3. mix your regular files with wildcards in any order you choose! Multiple wildcards may be interspersed with multiple regular files! 4. reduce your file to zero bytes, so that a snoop cannot determine with certainty what the original size was! 5. rename your file to a single letter, so that a snoop cannot determine what the original name was! 6. access several disk partitions (c: d: e: etc..) & diskette drives in one run! 7. starting with version 1.03, SUPERWIPE now has SUPER ERASE capabilities as well. All of the above capabilities are contained in this program. ADVANTAGES OF REGISTRATION FOLLOW: When you register, you will receive a registered version, that in addition to the above capabilities, will allow you to: 1: Wipe out all previously erased or deleted files! (The /OLD option.) The registered version will also have a nicer execution message that will lack the plea for money. You are probably wondering why you would want the capability to wipe out all previously deleted files. There are two reasons: one fairly ob- vious; one not. Firstly, those old deleted files may be sensitive & you forgot to wipe them properly. Or maybe, you were busy at an earlier time & did not take the time to properly wipe all the sensitive files. Or, you may not remem- ber wheather you wiped or erased a sensitive file. With the /OLD option, you can be sure that they are all wiped! Secondly, many programs, including some word processors, make temporary files that are used to assist that program in its work. When the program is done, those programs are deleted. Ordinarily, this is fine, but it does leave a security hole. The /OLD option will wipe out all of them! Note: Since the /OLD option must go through the entire "unused" disk par- tition or diskette, it may take several minutes to complete. 2. Registered users, will also be notified of improved versions of SUPERWIPE. 3. Upgrades, at least for the next upgrade, will only be $10. 4. Registered users will also receive telephone support. 5. Also, the registered user will have a clear conscience & will use SUPERWIPE with a feeling of sublime legitimacy! Site licenses are also available. -------------End of readme.spr file--------------------------------- -------------Start of .com help file------------------------------------ Gary's super file wipe/erase program. ver. 1.04r Copyright 1995 Gary Jeffers This ver. does not work with compressed disks. Nothing to do. Invocation syntax w filename1 filename2 ... wildcard1 wildcard2 ... /(no. of wipes for disk) /n(one alpha letter name of alternate file) /old{partition or drive letter} - (wipe all old deletes.-reg. only) /e for regular ERASE mode only - NO wipes. no parenthesis or braces in actual command line. The order of the tokens does not matter. examples: w my.fil new.fil /olda *.exe next????.com /5 /na w this.fil /e wild????.exe /nc anot????.com second.fil w that????.* /nk last.fil /oldc -------------End of .com help file------------------------------------ THE UNITED STATES "FEDERAL" GOVERNMENT HAS NO LEGITIMACY. The United States "Federal" Government - We'll be even more American without it. PUSH EM BACK! PUSH EM BACK! WWWAAAYYYY BBBAAACCCCK! BBBEEEAAATTTT STATE! Gary Jeffers  From fc at all.net Tue Oct 10 03:22:23 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Tue, 10 Oct 95 03:22:23 PDT Subject: java security concerns In-Reply-To: <199510100457.AAA00235@jekyll.piermont.com> Message-ID: <9510101020.AA21924@all.net> Perry writes: > Ray Cromwell writes: > > Yes, it may be possible that exploiting holes in Java will be easier > > than those in sendmail, just as it is easier to exploit a hole in > > software on a networked machine rather than a non-networked one. But this > > can not be an argument against Java or its utility. The same arguments > > were raised when Postscript first came out, yet the huge benefits > > of postscript are obvious, while the amount of security damage > > done by it is minimal. > > Postscript is completely safe if the interpreter is emasculated, and > most of them are. (It is a huge risk when run on a non-emasculated > interpreter, but fortunately it is easy to castrate one of the things.) I'm not clear on what you mean by emasculated. It seems to me that postscript interpreters are full of holes that can be exploited by a cleaver enough attacker. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From fc at all.net Tue Oct 10 03:44:37 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Tue, 10 Oct 95 03:44:37 PDT Subject: java security concerns In-Reply-To: <199510100442.AAA10517@clark.net> Message-ID: <9510101042.AA22924@all.net> > I think to require formally proven implementation for something > like Java is simply unreasonable. Even if it were possible. The > whole computer market, and for that matter, most of the market as a > whole, relies on "unproven" products. Most of what you buy and use is > based on a notion of "quality" which is merely an inductive argument > that the product had no problems in the past. Everytime you buy a piece > of software and use it, you risk your security. Everytime you ftp > something off the net and run it, you are taking that risk. How do you know > MS Word doesn't have security holes or trojan horses built in, have you > seen the source? Software always has bugs, holes, and security flaws. It > always will. If we were to require each new generation of software to be > "formally correct", software would never evolve. There is an important > feedback process between customers, software companies, and even > hackers, that drives software towards higher quality. Perfect software > implementations proven correct by mathematics is a pipe dream. Maybe > you can have higher confidence in small, simple software -- I've heard > Negroponte expressing that nostalgia for the days of word processors > that ran in 32k of ram, but frankly, I'm glad those days are gone. What you miss is the distinction between different kinds of programs and their protection implications. Networking programs with unintended flaws may allow outsiders to gain access to your internal network and do harm. Non-networking programs with unintended flaws may fail to operate properly or act as a vector for the spread of corruption, but they don't give outsiders unlimited insider access without insiders somehow facilitating the process. That's why we are far more concerned about networking programs that about word processors. In terms of word processors with Trojan horses, we don't want them either, but there's a big difference between a Trojan horse and the ability to spread a virus. Viruses can spread whenever there is sharing and general purpose programming. Hence, most modern spreadsheets, word processors, Postscript interpreters, etc. allow viruses to spread. A big problem with remote auto-execution is that it allows someone not authorized to use your computer decide to run a program on it. This may make you the unwhitting vector for a virus, cause your system to crash, etc. With auto-execution, the web turns from a networked read-only database with limited searching capabilities into a giant distributed processor in which the users have little or no control over what their computers are used for. The battle is for control over your own computer and what it does. > Will the IPv6 and IPSEC stack implementations be formally proven > correct? > > Yes, it may be possible that exploiting holes in Java will be easier > than those in sendmail, just as it is easier to exploit a hole in > software on a networked machine rather than a non-networked one. But this > can not be an argument against Java or its utility. The same arguments > were raised when Postscript first came out, yet the huge benefits > of postscript are obvious, while the amount of security damage > done by it is minimal. Java will have lots of holes. It will go through > the same evolutionary progress that all software does. Sendmail was > given a chance to evolve, I think Java deserves the same > chance, given its potential. I don't see any huge benefits to postscript. In fact, postscript files are essentially impossible to search for items of interest, to display on a normal video screen, to quote from without reentering the data, etc. The point is, do we want to turn the Web into a distributed computing environment in which anyone can eecute any code on anyone else's computers? Don't assume I am against it - after all, I was the only vocal proponent of viral computing for almost 5 years and got villafied for it plenty of times. I am in favor of making the decision conciously, not by accident or ignorance, and providing proper protection mechanisms. If the question of Hot Java is asked in terms of permitting all computers using the Web to become part of a global viral computing environment, I am ready to hear the answer. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From jya at pipeline.com Tue Oct 10 04:03:15 1995 From: jya at pipeline.com (John Young) Date: Tue, 10 Oct 95 04:03:15 PDT Subject: LOG_rea Message-ID: <199510101103.HAA04498@pipe1.nyc.pipeline.com> 10-10-95. NYPaper: "Deleted, but Not Gone or Forgotten." Files produced by Microsoft Office Windows applications, including Word, Excel, Powerpoint and Access, often incorporate chunks of data previously deleted from the disk on which the files were saved. Microsoft said the problem was solved in earlier versions of Microsoft Word but that it has recurred in the new version for Windows 95. Third-party programmers report another security lapse. Word offers optional password protection by encryption. The encryption, however, does not extend to "objects" within the file. "Chip Maker Introduces a Chip for Super Use and for Modems." One of the most closely watched Silicon Valley start-up companies plans on Tuesday to disclose details of an ambitious computer chip that it hopes will one day be used in everything from cable modems to supercomputers. Microunity Systems Engineering Inc. said its chips would be able to process information 10 times faster than today's personal computer microprocessors. The chip will consist of 10.5 million transistors and will process data at a gigahertz, or a billion operations a second. It is designed so that it can process information in parallel and will be capable of issuing up to four 128-bit-wide instructions simultaneously. 2: LOG_rea (10 kb) From jya at pipeline.com Tue Oct 10 05:31:45 1995 From: jya at pipeline.com (John Young) Date: Tue, 10 Oct 95 05:31:45 PDT Subject: NOD_out Message-ID: <199510101231.IAA11016@pipe1.nyc.pipeline.com> 10-10-95. W$Japer: A long front page lead nodder on the burgeoning "space race" to build global satellite telecommuncations systems, for video, phone, data and other transactional bile. A related gagger on "media processors," a new generation of chips -- for video, graphics, on-line services, wireless data, telephone and audio -- being developed by MicroUnity, Chromatic Research, IBM and TriMedia. This is a more comprehensive pack-o-lies of the NYPaper spitter today on MicroUnity. NOD_out (28 kb in 2 parts) From m5 at dev.tivoli.com Tue Oct 10 05:44:46 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Tue, 10 Oct 95 05:44:46 PDT Subject: Certificate proposal In-Reply-To: <9510092311.AA27677@alpha> Message-ID: <9510101243.AA28296@alpha> Scott Brickner writes: > I disagree. The MITM is foiled by one successful communication. I'm going to need some clarification of this; what is meant by "successful"? If you mean "a communication without a MITM participating", and presuming also that that communication would involve a key validation, then I suppose it's true. However, I don't see how this success can be evaluated if the parties do not have nearly complete control over the communications substrate. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From m5 at dev.tivoli.com Tue Oct 10 05:58:25 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Tue, 10 Oct 95 05:58:25 PDT Subject: Certificate proposal In-Reply-To: <9510091715.AA27991@alpha> Message-ID: <9510101258.AA28275@alpha> Don M. Kitchen writes: > > If we are forced to exchange keys remotely, then perhaps some sort of > > "proof" techniques could be used to establish to some level of > > assurance that the remote entity I *think* is you is really you. Or > > So who is Pr0duct Cypher then? And why should I have to produce ID saying > my name is Don, unless I'm proving my Real Name[tm] is Don. Right. If we're forced to exchange keys remotely, I just have to deal with the possibility that I'm being spoofed. > > you could provide me with a key, and then I could poll a list of > > references to inquire as to the "goodness" of the key. This seems to > > But there's no way to prove that there's no MITM. But "middle" is a > subjective term. Yes, that's why I put "proof" in quotes. I guess I meant "demonstrate to a personally sufficient level of satisfaction". ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From herbs at interlog.com Tue Oct 10 06:02:00 1995 From: herbs at interlog.com (Herb Sutter) Date: Tue, 10 Oct 95 06:02:00 PDT Subject: PC disk wipe software - SUPERWIPE 1.04R Message-ID: <199510101300.JAA17982@gold.interlog.com> At 04:45 1995.10.10 -0500, Gary Jeffers wrote: > As for the problem of getting rid of old buffer data writes to the end >of last file cluster writes, my program doesn't handle that. However, if >there is no disk compressor, I don't think it would be that hard to write >a function to handle it. In reality, I don't think that this problem is >much of a problem anyway. It would only occur at the end of small files. Thanks for the post. Just a thought: there is dead space at the end of virtually all files, not just small ones. On average, half a cluster is wasted at the end of any given file. Only files that happen to be an exact multiple of the cluster size won't have wasted bytes (on my main drive, with a cluster size of 16K, on average about one file out of 16,000+ wouldn't have any wasted space). Herb ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Herb Sutter 2228 Urwin, Suite 102 voice (416) 618-0184 Connected Object Solutions Oakville ON Canada L6L 2T2 fax (905) 847-6019 From m5 at dev.tivoli.com Tue Oct 10 06:02:10 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Tue, 10 Oct 95 06:02:10 PDT Subject: java security concerns In-Reply-To: Message-ID: <9510101301.AA28597@alpha> Perry E. Metzger writes: > To (perhaps over)simplify my point, the Java interpreter cannot be > stripped of all i/o capabilities and still remain useful. ?!? What if all I give you is a couple of Java classes that write to a frame buffer, and that frame buffer is the screen (or your 24-pin dot matrix printer or whatever)? > I can > physically remove all the "dangerous" calls from a Postscript > interpreter and still have it be useful. I don't see the difference. An interpreter is an interpreter. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From jbaber at mi.leeds.ac.uk Tue Oct 10 06:13:39 1995 From: jbaber at mi.leeds.ac.uk (jbaber at mi.leeds.ac.uk) Date: Tue, 10 Oct 95 06:13:39 PDT Subject: Certificate proposal Message-ID: <3046.9510101409@misun2.mi.leeds.ac.uk> Hal writes: >The POV I am really arguing against is the one that defines identity to >be a key, that states that in communicating with a key you are by >definition communicating with the person you have in mind. The man in >the middle attack does not exist because from your point of view the >entity at the other end of the communication channel is just the MITM >plus the person you think you are talking to. This idea has been >expressed many times by other people in this discussion, and it is this >which I think is fundamentally flawed and even dangerous because it >encourages the use of untested keys. In fact it seems to define away >the question of whether a key is real or fake. It defines away the question of whether a key is real or fake because the key itself can not be fake. Assuming strong encryption anything that you send to the key can only be read by the key and anyone that he/she choses to pass it on to (something that can not be stopped). The only thing that can be fake about the key is the attributes associated with it - whether the attributes concerned are true names or the ability to use a bank account. Having a man in the middle when no attributes are concerned is simply the same as talking to someone who passes all of your messages on to a friend and then expresses the friends opinion rather than his/her own back to you... something that I can think of no possible way to stop. So although you are talking talking to A the opinions expressed are those of B, and there is no way of telling - in the same way as a man in the middle attack (B may not even know that his/her arguments are being used by A against you). This argument reduces the problem to 'how do you validate key attributes' as you can be sure that you are communicating securely with the key (key's owner) but nothing else. With PGP currently the only attribute that a key (X) may have is a name (true/pseudo) and this attribute can be signed as valid by another key (Z). If you accept the signature all you are doing is saying that you accept the signing key's certification - ie an attribute signed by this key (Z) is true. Eventually you have to just trust a key to have taken reasonable care to ensure that any attribute that it has signed is true - whether you are using a Web of Trust model or a more centralised model such as accepting VeriSign certificates (or your own - knowing exactly how much care you have taken to ensure that the attribute that you have certified (signed) is true). I believe that this is more removing a special case (treating the true name differently from any other attribute) than defining away the problem - even though the (MITM) problem does cease to exist. Jon jbaber at mi.leeds.ac.uk http://www.chem.surrey.ac.uk/~ch02jb/ From rsalz at osf.org Tue Oct 10 06:35:00 1995 From: rsalz at osf.org (Rich Salz) Date: Tue, 10 Oct 95 06:35:00 PDT Subject: netscape mail starts java attachments upon get new mail... Message-ID: <9510101332.AA24407@sulphur.osf.org> > Java applets can't read /etc/passwd, and can't issue NIS requests unless > they were downloaded from an HTTP server running on the NIS server Oh, you mean like a mirror or local cache? (Sure, Rocky, never happen...) > (actually, they can't do UDP at the moment, so that's out as well) Even with TIRPC NIS is still UDP-only? Has NIS+ fixed this? /r$ From rsalz at osf.org Tue Oct 10 06:46:03 1995 From: rsalz at osf.org (Rich Salz) Date: Tue, 10 Oct 95 06:46:03 PDT Subject: java security & the cypherpunk agenda Message-ID: <9510101342.AA24492@sulphur.osf.org> >From what I have seen of the CV's of the Java team (at least those who have/had home pages on the various Sun java servers), none of them were particularly security-aware. /r$ From fletch at ain.bls.com Tue Oct 10 06:59:31 1995 From: fletch at ain.bls.com (Mike Fletcher) Date: Tue, 10 Oct 95 06:59:31 PDT Subject: Java idea Message-ID: <9510101354.AA05988@outland> Well, security bugs aside (and I've got the sun4.1.3_u1 and Win32 ns2b distributions :) has anyone given any thought to using Java to do some sort of Chinese Lottery attack. I was re-reading App. Crypto. last night and it could be feasable. If you could get your key cruncher thread loaded into a good many browsers to run when idle . . . . How many estimated copies of NS are there? Anyone want to do the math? :) --- Fletch __`'/| fletch at ain.bls.com "Lisa, in this house we obey the \ o.O' ______ 404 713-0414(w) Laws of Thermodynamics!" H. Simpson =(___)= -| Ack. | 404 315-7264(h) PGP Print: 8D8736A8FC59B2E6 8E675B341E378E43 U ------ From frissell at panix.com Tue Oct 10 07:12:28 1995 From: frissell at panix.com (Duncan Frissell) Date: Tue, 10 Oct 95 07:12:28 PDT Subject: Conference Summary, Part the First Message-ID: <199510101411.KAA01820@panix.com> At 10:23 PM 10/8/95 -0800, Douglas Barnes wrote: > o Regulators are not amused by attempts to run unlicensed online > banks. They are aware such things are starting to pop up, and > they are very interested in shutting them down when they do. The jurisdictional problems are going to be very interesting. As with gambling. Nations are reluctant to extradite their nationals for acts that are not crimes at home. The US follows this practice just like everyone else. Witness the lack of success of the German government in extraditing neo-nazis from the US. They had to grab one in Europe. > o The same goes for NBFIs (Non-bank financial institutions) -- > these appear to be regulated primarily at the state level, with > some IRS and FinCEN involvement. These include everyone from > stock brokers to Casas de Cambio. This is the real problem for the Feds. When everyone is a non-bank financial institution... > o The attendees displayed an understanding of the situation wrt > electronic payment systems that ran from dim to non-existent. Hard to control what you don't know. > o Fewer formal, specific or deterministic rules for reporting > suspicious transactions. > > o More vague, subjective, and privacy-invading rules for > reporting suspicious transactions, coupled with more severe > penalties for banks and NBFIs. But unlicensed NBFIs don't have licenses to pull so regulation is tricky. An unlicensed NBFI includes any institution in another jurisdiction (no *US* license) and any person running Quicken version 9.0 that will no doubt support exotic electronic payment systems. > o Banks are now considered "deputies" of the federal government > in the War On Money Laundering. Generals are always fighting the last war. Banks are history particularly if they are unable to offer competitive services because of regulatory restrictions. > o Banks must implement strict "Know Your Customer" policies. Which are trivial to defeat particularly under an EPS system when the customer hands his keys over to his actual principal. Note: I've often wondered why the rulers place so much faith in their ability to identify people when those who have studied the Is A Person problem have thrown their hands up. "Homeless? Want to make a few bucks? You have a brilliant future in the identity sales business. Remember, you can sell your identity as many times as you like. It never wears out." DCF From adam at homeport.org Tue Oct 10 07:12:39 1995 From: adam at homeport.org (Adam Shostack) Date: Tue, 10 Oct 95 07:12:39 PDT Subject: Distributed co-operative theorem proving, anyone? - was Java In-Reply-To: <9510100110.AA25989@all.net> Message-ID: <199510101415.KAA03219@homeport.org> Dr. Frederick B. Cohen wrote: | > For the general case this is true. To be able to trust larger systems, you | > need to not only be able to trust the individual 2 pagers, but to also be | > able to show that composing the sub units doesn't lose whatever property | > you're trying to do. | ... | > Distributed co-operative theorem proving, anyone? | | Let's go - I will provide the distribution mechanisms, and I think I | know someone who is interested in the theorem proof side. I know of | several experts on theorum proving who may well pitch in. What program | do you want to prove secure next (we're currently finishing up my secure | Web server). I'd be real intereseted in seeing an MTA proven secure. Smail or Zmailer perhaps? Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From adam at homeport.org Tue Oct 10 07:20:09 1995 From: adam at homeport.org (Adam Shostack) Date: Tue, 10 Oct 95 07:20:09 PDT Subject: Certificate proposal In-Reply-To: <199510100002.AA01774@shark.mel.dit.csiro.au> Message-ID: <199510101422.KAA03235@homeport.org> "Never underestimate the effort your opponent will expend on cryptanalysis." -- Robert Morris, Sr., speaking at Crypto '95 If a MITM attack would be useful, then there will be times when one will be mounted. It might take 30 law enforcement officers to do it, but it has been demonstrated that the FBI will use that many people for a year or more on some cases. The CIA and NSA can be presumed to be willing to spend more time and effort to get certain results. Bob Smart wrote: | Exactly. If a public key ONLY has an existence in cyberspace (as per | Pr0duct Cipher) then it is impossible to prove that they aren't | surrounded by a MITM cloud which is also seeing everything they | see without them knowing it. | | It is important to be aware of this. However the importance is | perhaps mitigated by the following considerations: | | 1. Surrounding someone with such an MITM cloud is so hard as to | be impossible for practical purposes. This will be more true | if the person trying to establish a cyberspace identity can | prove that they move around physically and use different service | providers at different times [but then again perhaps if you -- "It is seldom that liberty of any kind is lost all at once." -Hume From adam at homeport.org Tue Oct 10 07:29:30 1995 From: adam at homeport.org (Adam Shostack) Date: Tue, 10 Oct 95 07:29:30 PDT Subject: Java In-Reply-To: Message-ID: <199510101432.KAA03416@homeport.org> | I'd like to make this prediction: someone at some point in time | will find another serious security hole in SendMail. | | What you need to ask yourself is "Do the benefits of Java | outweigh the security risks?" A substantial risk that Java carries is that its 'secure' label will get in through doors which should have remained closed to it. I would be worried about Java capable browsers in the Federal Reserve, because people will say 'its nifty, its labeled secure, lets use it.' I think there are some interesting liability models waiting to be explored here. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From bdavis at dg.thepoint.net Tue Oct 10 07:39:54 1995 From: bdavis at dg.thepoint.net (Brian Davis) Date: Tue, 10 Oct 95 07:39:54 PDT Subject: PC disk wipe software In-Reply-To: <199510100721.AAA20944@ix.ix.netcom.com> Message-ID: On Tue, 10 Oct 1995, Bill Stewart wrote: > >There has been considerable discussion on the MCIP list about how most > >*Mac* programs that purport to do this, like Burn, for example, leave stuff > >over in disk blocks. My understanding is that this is not a trivial > >problem, and it occurs in MUSH-DOS as well.... > > Doing it _right_ is not a trivial job. Consider disk controllers that > map out bad blocks so the OS never needs to see them - if you're trying > to remove highly classified data, the fact that Diskwipe won't ever see them > might be a serious problem, even if it is close enough for government work. FYI the Justice Department requires degaussing a hard drive before it can be declared surplus ... EBD From pjb at ny.ubs.com Tue Oct 10 07:43:40 1995 From: pjb at ny.ubs.com (Paul J. Bell) Date: Tue, 10 Oct 95 07:43:40 PDT Subject: Basic Flaws in Internet Security and Commerce Message-ID: <9510101442.AA11568@sherry.ny.ubs.com> A fine piece of work. The ideas expressed in this paper should scare the hell out of everyone who uses NFS for any serious applications, which for a fact includes most banks and all investment banks and brokage houses. In this particular area I KNOW what is at risk. Again, I congratulate the authors on a first-class effort. cheers, paul > From owner-cypherpunks at toad.com Tue Oct 10 03:15:15 1995 > From: gauthier at espresso.CS.Berkeley.EDU (Paul_A Gauthier) > To: cypherpunks at toad.com, bugtraq at crimelab.com > Cc: gauthier at cs.Berkeley.EDU, brewer at cs.Berkeley.EDU, iang at cs.Berkeley.EDU, > daw at cs.Berkeley.EDU, fur at netscape.com > Subject: Basic Flaws in Internet Security and Commerce > Date: Mon, 09 Oct 1995 14:26:06 -0700 > Sender: owner-cypherpunks at toad.com > Content-Length: 10235 > From mkj at october.ducktown.org Tue Oct 10 07:45:25 1995 From: mkj at october.ducktown.org (mkj at october.ducktown.org) Date: Tue, 10 Oct 95 07:45:25 PDT Subject: Crypto's Role in Evil? Message-ID: <199510101408.AA00668@october.ducktown.org> -----BEGIN PGP SIGNED MESSAGE----- > > We mustn't forget that, until very recently, strong, widespread > > privacy has been humanity's "default" condition. > > Not much privacy in village or tribal life. Even neighborhoods of > earlier cities weren't very private. Neighbors always knew your business. The point is, strong privacy is readily AVAILABLE even under those circumstances. If tribal elders tried to prohibit people from wandering out of earshot, then you'd have an analogy. --- mkj -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHp+DV11Wd4tm8clAQHaCQP+Mi9Fno90Jj4wwaQm9M1TBUsjQENT94s1 ghHSmSSseF/UI0ReD0NoP7vBIqsieZsIS/nCgAasU4BBzAhqdn0PPu3FJayr3IBx ZUsOkzh2VCcmy0Av/zvDpCxp5xPrcJnIdhSqUxVz68J/L8eESuSrKf3tE5xsrUNK VW9Z5WytXWU= =g5YE -----END PGP SIGNATURE----- From fc at all.net Tue Oct 10 07:47:09 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Tue, 10 Oct 95 07:47:09 PDT Subject: Distributed co-operative theorem proving, anyone? - was Java In-Reply-To: <199510101415.KAA03219@homeport.org> Message-ID: <9510101444.AA04563@all.net> ... > I'd be real intereseted in seeing an MTA proven secure. Smail > or Zmailer perhaps? The problem is that such programs were not designed to be secure (as far as I am aware) or to be proven secure, and thus, even with lots of computing power, there is essentially no hope of doing this. In fact, they are almost certainly not secure (as these proofs generally help detect). -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From m5 at dev.tivoli.com Tue Oct 10 07:52:27 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Tue, 10 Oct 95 07:52:27 PDT Subject: Certificate proposal In-Reply-To: <199510100002.AA01774@shark.mel.dit.csiro.au> Message-ID: <9510101450.AA28558@alpha> Adam Shostack writes: > If a MITM attack would be useful, then there will be times > when one will be mounted. It might take 30 law enforcement officers > to do it, but it has been demonstrated that the FBI will use that many > people for a year or more on some cases. The CIA and NSA can be > presumed to be willing to spend more time and effort to get certain > results. Right; if there's that much energy being expended, then I have no reason to trust that just because the Department of Keys tells me that a particular key belongs to one "Alice B. Crypto" it's really the same Alice I think I know. I'll make sure that we verify our keys in person. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From DMiskell at envirolink.org Tue Oct 10 07:57:36 1995 From: DMiskell at envirolink.org (Daniel Miskell) Date: Tue, 10 Oct 95 07:57:36 PDT Subject: Java=? Message-ID: <9510101456.AA24338@envirolink.org> Being a newcomer to this list, and having read a lot of java-related messages without understanding them fully, could comeone explain to me exactly what java *is*? Thanks for your time, ahead of time. DMiskell at envirolink.org --- _________________________________ *!Cheese Doctrine:!* Though cultured over time, and aged to perfection, one must not yield to produce mold. One must also not belittle themselves by conforming to the "whiz", but melt over the unprocessed ideas of Ghuda. _________________________________ "Oh $HI+, here comes a flock of pushers - 'Jungle Edition.'" -Mortifer Nex, playing peek-a-boo in the trees "If you've got the coordinance, we've got the ordinance to blow up the loved ones who blow you off!" -Uncle Dan's Thermonuclear Explosives, Unlimited From perry at piermont.com Tue Oct 10 08:01:17 1995 From: perry at piermont.com (Perry E. Metzger) Date: Tue, 10 Oct 95 08:01:17 PDT Subject: java security concerns In-Reply-To: <9510101301.AA28597@alpha> Message-ID: <199510101500.LAA02245@jekyll.piermont.com> Mike McNally writes: > > I can > > physically remove all the "dangerous" calls from a Postscript > > interpreter and still have it be useful. > > I don't see the difference. An interpreter is an interpreter. I suppose most of this is dead obvious to me because I work in security every day, but it seems that some otherwise smart people don't see the point I'm making, repeatedly. As an exercise to the reader compare the following two tasks in difficulty. 1) Find a bug that lets you execute arbitrary programs unintentionally from a program that contains instances of the 'fork()' system call. 2) Find a bug that lets you execute arbitrary programs unintentionally from a program that contains *no* instances of the 'fork()' system call. [hint: it is much harder to get a program to do something that it has no code at all to do than to get it to do a buggy form of a something it already does.] Perry From aba at dcs.exeter.ac.uk Tue Oct 10 08:01:36 1995 From: aba at dcs.exeter.ac.uk (aba at dcs.exeter.ac.uk) Date: Tue, 10 Oct 95 08:01:36 PDT Subject: Certificate proposal In-Reply-To: <9510101258.AA28275@alpha> Message-ID: <24567.9510101425@exe.dcs.exeter.ac.uk> Mike McNally writes: >Don M. Kitchen writes: > > > If we are forced to exchange keys remotely, then perhaps some sort of > > > "proof" techniques could be used to establish to some level of > > > assurance that the remote entity I *think* is you is really you. Or > > > > So who is Pr0duct Cypher then? And why should I have to produce ID saying > > my name is Don, unless I'm proving my Real Name[tm] is Don. > > Right. If we're forced to exchange keys remotely, I just have to deal > with the possibility that I'm being spoofed. You could take out a personal ad in a newspaper and print this: 9D AF 6D 4D 8E 64 43 FC D5 CB 9C 7A 36 C7 6D B9 (Pr0duct Cypher's key fingerprint). That would mean that you could at least help Pr0duct Cypher determine if there was a man in the middle. If there was a MITM, once Pr0duct was aware of this, P.C. could make efforts to change service provider, or find novel entry points into public internet forums, and different entry points in to the remailer net. For the other direction, as a nym, if newspapers accepted anonymous personal ads, an ad posted from a large city postal mail to the newspaper, would be a reasonable assurance that the identity of the person would be unkown. Or you could try paper mailing some one your instructions with cash to pay for the advert. It is likely that a randomly picked cypherpunk would do this for a nym. You could even take out two simultaneous ads in two independent newspapers which were secret split in two with XOR and a random number, if you were really paranoid. Now the MITM is reduced to denial of service attacks, by posting similar keys, and saying "no that nym is an imposter I'm the real nym". Denial of service is preferable to a MITM. Adam From fc at all.net Tue Oct 10 08:06:59 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Tue, 10 Oct 95 08:06:59 PDT Subject: William S. Powell in front of Congress Oct 11, 10:30 AM Message-ID: <9510101504.AA05512@all.net> William S. Powell is the person who firs patented an electronic money system (almost 15 years ago now), and he will be testafying before the congressional subcommittee tomorrow - Oct. 11, 1995 at 10:30 AM (scheduled). If you really want to know about electronic cash and how our society has treated it over the last 15 years, you might want to watch this. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From frissell at panix.com Tue Oct 10 08:11:25 1995 From: frissell at panix.com (Duncan Frissell) Date: Tue, 10 Oct 95 08:11:25 PDT Subject: Myth of the Powerless State Message-ID: <199510101509.LAA16131@panix.com> Gentlemen: Your leader entitled "The myth of the powerless state" (October 7th) made some valuable points about the continuing significance of state power in our lives but missed some very significant numbers. You state that public spending in the "big economies" has expanded from 36% to 40% of GDP since 1980. But, if you take the world's economy as a whole, can you doubt that the percentage of Gross World Product (GWP) controlled by the world's states has declined since 1980. Note the following significant changes. 1) In both developed and underdeveloped countries, the "informal sector" has continued to grow. You, yourself have reported that the poorest households in America spend twice their official income. 2) The Soviet Union has gone from an almost 100% government-controlled economy to one which has a much smaller state sector. Meanwhile informal and formal privatization in China, India, Britain, etc. have transferred vast assets to private control. 3) The continued accumulation of offshore funds are effectively outside of the game and under no flag. The amount of these funds is hard to estimate but has surely grown quite large. The convergence of all of these factors suggests that, at some point in the late '80s or early '90s, the percentage of the GWP controlled by governments peaked and began to decline. As technology makes it easier for the financial services industry to carve its niches in the corridors of cyberspace, stateless financial assets seem sure to grow. Since anyone can use powerful mathematics to create virtual spaces which even the largest government is powerless to enter, the percentage of GWP that the state even knows about much less controls will shrink. Duncan Frissell From unicorn at polaris.mindport.net Tue Oct 10 08:12:05 1995 From: unicorn at polaris.mindport.net (Black Unicorn) Date: Tue, 10 Oct 95 08:12:05 PDT Subject: rise and fall... Message-ID: Some time ago on the list someone mentioned a book "Rise and Fall of the Nation State." Can someone confirm author/title information for me? --- "In fact, had Bancroft not existed, potestas scientiae in usu est Franklin might have had to invent him." in nihilum nil posse reverti 00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information From frissell at panix.com Tue Oct 10 08:14:28 1995 From: frissell at panix.com (Duncan Frissell) Date: Tue, 10 Oct 95 08:14:28 PDT Subject: My Last Message Message-ID: <199510101513.LAA16827@panix.com> Oops! My last message was a letter to the editor of the Economist. I forgot to mention that. DCF From sjb at universe.digex.net Tue Oct 10 08:33:35 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Tue, 10 Oct 95 08:33:35 PDT Subject: Certificate proposal In-Reply-To: <9510101243.AA28296@alpha> Message-ID: <9510101532.AA17835@ozymandias.austin.ibm.com> Mike McNally writes > >Scott Brickner writes: > > I disagree. The MITM is foiled by one successful communication. > >I'm going to need some clarification of this; what is meant by >"successful"? If you mean "a communication without a MITM >participating", and presuming also that that communication would >involve a key validation, then I suppose it's true. However, I don't >see how this success can be evaluated if the parties do not have >nearly complete control over the communications substrate. By "successful" I mean communicating without the MITM *interfering*. Either the parties need to exchange a symmetric key without the MITM eavesdropping, or exchange asymmetric keys without the MITM modifying them. The chance of failure is minimized by diversity in the channels used to try to bypass the MITM. The issue becomes one of risk management. If you can't afford a failure, you *do* need a channel over which you have nearly complete control. The simplest such channel is a physical meeting, during which you exchange public keys. If the MITM threat is from your ISP, you are likely to bypass his control with the telephone network. Any single success is adequate. From tjic at OpenMarket.com Tue Oct 10 08:35:09 1995 From: tjic at OpenMarket.com (Travis Corcoran) Date: Tue, 10 Oct 95 08:35:09 PDT Subject: truth in advertising: Netscape 1.1 on security Message-ID: <199510101534.LAA22081@cranmore.openmarket.com> -----BEGIN PGP SIGNED MESSAGE----- Message-Signature-Date: Tue Oct 10 11:34:39 1995 This may be old news, but I don't recall seeing it on the list... In version netscape -version Netscape 1.1N/export, 20-Apr-95; (c) 1995 Netscape Communications Corp. I ran 'strings' on the binary, and only got one "about.*security" reference. entering it as an URL about:security yields the ironically humorous (when you consider all of the security bugs): Whatchew talkin' 'bout, Willis? - -- TJIC (Travis J.I. Corcoran) http://www.openmarket.com/personal/tjic/ Member EFF, GOAL, NRA. opinions (TJIC) != opinions (employer (TJIC)) "Buy a rifle, encrypt your data, and wait for the Revolution!" PGP encrypted mail preferred. Ask me about gnuslive.el for emacs. -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: Auto-signed by mail-secure.el 1.006 using mailcrypt Comment: Processed by Mailcrypt 3.3, an Emacs/PGP interface iQCVAwUBMHqSl4JYfGX+MQb5AQFLKwP/RDsLzLxZkB18uSlV9lxp9nJ6uRilYYAE m1gv4KKmtNnWLowlrr605iv1L7DUvQTRpGKANcLZDEsKZFYnjT/VBSN+/Jnoe6GX VFNiSALrvX/IZjxf8FQ2xfyBYWF7J/DxTWP3QHjW9hc06Sx2fzCHdn4HItAteDwr aWO8dM3XYzY= =8udJ -----END PGP SIGNATURE----- From nobody at REPLAY.COM Tue Oct 10 08:50:32 1995 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Oct 95 08:50:32 PDT Subject: PC disk wipe software Message-ID: <199510101550.QAA29289@utopia.hacktic.nl> Responding to msg by bdavis at dg.thepoint.net (Brian Davis) on Tue, 10 Oct 10:47 AM >FYI the Justice Department requires degaussing a hard >drive before it can be declared surplus ... ----- The Washington Post, Oct 9, 1995. E-Mail That Comes Back And Bites. Even Deleted Messages Can Be Recovered for Court [excerpts] Computer sleuth John Jessen dredges computer files for electronic embarrassments that their authors thought were long gone. "Deleted" e-mail messages can pile up like little time bombs until someone such as Jessen arrives, carrying a court order and a stack of blank memory cartridges. "Can you really delete e-mail? Sure," Jessen said. "Does it happen as a common practice? No." Jessen is the founder of Electronic Evidence Discovery Inc., a Seattle company that since 1987 has been going after computer evidence in civil lawsuits. The nation's 25 million to 40 million users of e-mail are growing more comfortable with the medium. And more attorneys are recognizing e-mail's potential as a source of unguarded information about the companies they're suing. "People are very candid talking around the coffee machine." attorney Michael Patrick of Palo Alto, Calif., said. "They seem to behave the same way on the computer system. "They think they're speaking confidentially, so they're off the cuff," he said. "They're very often insulting. What they don't realize is it's all being recorded, and often those recordings are stored for a very long time. When you send a message, you lose control over where it goes." Many workers think their e-mail is private. It's not. Federal law allows employers to monitor employees' e-mail, and even if they don't, e-mail is fair game in lawsuits. When someone sues a company, the rules of discovery demand that the company produce all relevant business records. "The fact that they live in a computer rather than a file cabinet doesn't make any difference to the court," said Joan Feldman at Computer Forensics, another Seattle firm that specializes in this work. Often files retrieved include e-mail thought to have been erased long ago. It survives because the diligent computer system manager makes backup tapes of everything on the system every night, then stores those tapes for years. And so the files persist and multiply, aided by technological advances that continually add more storage capacity, more automatic backups and more redundancies to safeguard data from accidental erasure. "The computer is like a file cabinet tbat can open its own drawer, put a file on the copy machine and then slip the copy into another cabinet," Jessen said. "Sometimes I think it's alive." Jessen and Feldman augment their high-tech detective work by advising companies how to become less vulnerable to computer snoops like themselves: They recommend regular purges of old data, and they offer tips for avoiding e-mail blunders in the first place. Rule No. 1: Don't put anything on e-mail that you wouldn't want a jury to see. ----- From hfinney at shell.portal.com Tue Oct 10 09:06:08 1995 From: hfinney at shell.portal.com (Hal) Date: Tue, 10 Oct 95 09:06:08 PDT Subject: Certificate proposal In-Reply-To: <199510100721.AAA20956@ix.ix.netcom.com> Message-ID: <199510101604.JAA17611@jobe.shell.portal.com> Bill Stewart writes: >As far as privacy goes, this set of keys and certifications lets you create >private communications (using signed DH, etc.) with the entity that owns >the private key for Bank Account X. No, you don't know if that entity >is really Alice or really MITM; in fact you don't know Alice's name, if it's >done right. You just know that the Bank says it will honor requests for money >from Bank Account X (assuming you know where to find the Bank, which is a >separate >but similar problem.) So assuming you're selling politically correct >widgets and not >pharmaceuticals or financial privacy consulting services, you probably don't >care too much about who's on the other end - the person who's giving you >the money is the person you want to be talking to. Still, there is a problem here: how did the bank know that it _should_ honor requests to withdraw money from bank account x if they are signed with a certain key? How did it determine that that is a valid key, if it never had a secure channel to the person opening the account? I think the answer is clearly that it cannot, that it must have had a secure channel. Would a certificated key presented by Alice have been sufficient to create such a channel, do you think, or would a face to face meeting have been necessary? (Or would an uncertificated key be adequate?) >In the case of the Bank, the reason you trust the Bank isn't that you know >them physically (though it was interesting when I started dealing with a >local bank where the tellers knew me by name after only two or three visits); >knowing your local Savings and Loan by name doesn't guarantee you can get any >money out of them if there's a bank run, nor does it really guarantee that they >won't embezzle the funds and head for Argentina. The reason you trust them >is that they (in this case the "they" identified by their key) are doing >business >dealings with a lot of people and it's more profitable not to abscond. >And the reason you know it's really the Bank and not MITM is that they've >always identified themselves by their key from the beginning. >Just like the credit card who's owner we've been calling Alice has. >And because you've successfully withdrawn money from the Bank before, >and because you're clearing Alice's credit card transaction reasonably promptly. What if you are accessing the bank via a MITM? Consider this example: Alice writes you a check, signed with a key (without her name) which has a credential from the bank saying that it will back up the check. But you need the bank's key to check the credential, so Alice gives it to you, or you get it from a public cache. Suppose the bank's key is fake, and Alice is defrauding you. How do you tell? Wouldn't a certificate on the bank's key be necessary, one which ties the bank's name and reputation to the key? Or what if the bank really is and has always been behind a MITM? You say that it is more profitable for the bank not to abscond with your money. What about the MITM? He doesn't make any profits until he cheats. He might well be collecting information which will allow him at some point to abscond very successfully. Would you really trust a bank which was known to you only by a key and by a record of never having defaulted, knowing this was a possibility? >Checks and credit cards are especially good examples for this - the current >systems need your name on them, because your name and signature are the >closest they have to an authentication system. However, with digital >signatures, >the fact that you can sign a document verifiable by the public key is >all the authentication that's needed; your name isn't. If the card has an >account number for convenience, and Alice substitutes Carol's account number >for hers on a statement, her signature won't match the public key the bank >wants on the request, and it'll bounce. (In this case, the certificate >from the bank would probably include the account number as well as the key, >but it's not critical for on-line systems, just more efficient.) Same problem as before: how does the credit card company know that the key it is putting on the card is really Alice's? What if Alice discovers unauthorized charges because Carol was a MITM and substituted her key? We can't just ignore this possibility. It seems to me that a lot of protocols assume the existence of secure channels. Yet the MITM attack shows that public key cryptography does not in and of itself provide a secure channel. This is a problem which IMO should not be ignored simply because it is inconvenient. Hal From hfinney at shell.portal.com Tue Oct 10 09:22:07 1995 From: hfinney at shell.portal.com (Hal) Date: Tue, 10 Oct 95 09:22:07 PDT Subject: Certificate proposal In-Reply-To: <199510100002.AA01774@shark.mel.dit.csiro.au> Message-ID: <199510101620.JAA20087@jobe.shell.portal.com> Bob Smart writes: > > Hence the problem has no solution and we should not > > waste much time on it. >Exactly. If a public key ONLY has an existence in cyberspace (as per >Pr0duct Cipher) then it is impossible to prove that they aren't >surrounded by a MITM cloud which is also seeing everything they >see without them knowing it. Well, I don't think this is true. First of all, the MITM has limited powers. He may be able to perform certain automated and occasionally manual replacements on messages, but he is not able to affect communications which take place off of the net. In particular, he is not able to stop Pr0duct Cipher from reading Verisign's key fingerprint in the newspaper and comparing it with his own copy of the key. And if PC has a valid Verisign key then he can know that he has a valid key for other people. If he then sends mail to those people using their keys, the MITM cannot control that mail. Hence PC can communicate securely with other people even if the MITM controls all of his network communication, contrary to the claims of impossibility. >It is important to be aware of this. However the importance is >perhaps mitigated by the following considerations: >1. Surrounding someone with such an MITM cloud is so hard as to > be impossible for practical purposes. This will be more true > if the person trying to establish a cyberspace identity can > prove that they move around physically and use different service > providers at different times [but then again perhaps if you > do that you cease to be a purely cyberspace entity]. If only one ISP is used (which is true for the vast majority of people) and if they only get and send keys in specific ways then I would not say it is impossible. Look at programs like Satan or the internet worm. They contain many different possible attacks. Writing such programs is almost an exercise in tedium as much as creativity. In the same way it would be possible for a filter program to anticipate a dozen or more different ways in which a user might get keys from the net, and make substitutions. Doing it for any given method is not that hard, so it is just a matter of motivation to do it for 99% of the ways people will use. >2. If the other end of the communication is a purely cyberspace > entity then you can't possibly establish the sort of relationship > which would enduce you to send them anything really secret. The > possibility that there might be a baddy playing MITM is > infinitesimal compared to the probability that the other end > is itself a baddy. Not necessarily. As I argued before, we do establish trust relationships in the real world. And we do that on the basis of communication. Yes, in real life there are wider communication channels, nonverbal ways of judging the sincerity of others. But over time I would guess that online relationships can take on the same character. In fact, I have read countless puff pieces about friendships, even romances, formed online. The notion that you can't possibly establish the sort of relationships online which would induce you to share secrets is demonstrably false, at least for many people. >The time you will want to deal with a cyberspace entity is where >you are taking no risks and they are taking all the risks. >This will hopefully be the case when we are a seller and they are >the buyer. As long as we get the digital cash we don't care who >they are. That's an awfully limited way of looking at things. We do a lot more online than buy and sell. >Apart from that we will always want some certificate that links the >public key to something in the real world. The point of the >key-centric approach is that that doesn't have to be a name or >something that contains a name. If we want to make sure the key >belongs to the person you were talking to last night then maybe you'd >like some biometric data: "five foot two, eyes of blue,...". And >of course the certificate is useless unless it is signed by a key >that we trust for that purpose. No, I don't think this is at all useful. The VAST majority of people I talk to on the net are people I have never met. What earthly use is a credential that key so-and-so belongs to a person with blond hair, in helping me to establish secure communications? Should we only talk online to the miserable few people we live near who share our interests? The net is global! Virtual communities allow niche interests (like ours) to attract people from all over the world. Any scheme which requires face to face meetings between every pair of participants is doomed. Hal From ses at tipper.oit.unc.edu Tue Oct 10 09:23:40 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Tue, 10 Oct 95 09:23:40 PDT Subject: netscape mail starts java attachments upon get new mail... In-Reply-To: <9510101332.AA24407@sulphur.osf.org> Message-ID: On Tue, 10 Oct 1995, Rich Salz wrote: > > Oh, you mean like a mirror or local cache? (Sure, Rocky, never happen...) Mirroring, where the url used to access the data is not that used for the original, could be a problem; caches that aren't mirrors and which keep the original URL are ok. Whether mirroring is a problem in general is a different subject. Simon From hfinney at shell.portal.com Tue Oct 10 09:39:02 1995 From: hfinney at shell.portal.com (Hal) Date: Tue, 10 Oct 95 09:39:02 PDT Subject: Chaum's patents In-Reply-To: Message-ID: <199510101637.JAA22634@jobe.shell.portal.com> s1018954 at aix2.uottawa.ca writes: >Sorry if this has been stated before, but exactly when do Chaum's first >set up e-cash related patents expire? I looked it up in applied crypto >the last time I had my hands on it and couldn't find the dates. >How many (and what) patents are there in this field anyway? (don't bother >with that if it's too long to answer) I did a patent search a few months ago, with results at . Chaum has several patents; my lists doesn't have all of them. The ones I have are dated 1988 and 1990. Hal From cman at communities.com Tue Oct 10 09:39:04 1995 From: cman at communities.com (Douglas Barnes) Date: Tue, 10 Oct 95 09:39:04 PDT Subject: java security concerns Message-ID: Simon Spero wrote: >In my previous message, I left out some fundamental parts of the run-time >that need to be looked at carefully. The garbage collection needs to be >examined carefully. Normally GC algorithms are formally derived, so it's >the implementation that needs to be checked for. holes in the GC may be >too unpredictable to exploit for anything but core-dumping, especially since >java uses a mark-sweep conservative collector. > FWIW, we had some ideas about how to attack the GC from untrusted code, involving resurrection of objects during finalization. This turned out not to work -- the Javoids apparently anticipated this problem in their design. From lull at acm.org Tue Oct 10 10:14:09 1995 From: lull at acm.org (John Lull) Date: Tue, 10 Oct 95 10:14:09 PDT Subject: java security concerns In-Reply-To: <9510100030.AA29195@pepper.Eng.Sun.COM> Message-ID: <199510101714.KAA07329@ix2.ix.netcom.com> On Mon, 09 Oct 1995 17:30:38 -0700, cmcmanis at scndprsn.Eng.Sun.COM (Chuck McManis) wrote: > >By the way, I suggest that Sun should offer a large money prize for > >the first significant security hole found the Java implementation. Its > >a tiny price to pay for security. > > I don't think the lawyers would let us. Pardon my French, but if your lawyers make it impossible to do technical work correctly, isn't it time to get new lawyers? I can't see how offering a reward for reporting bugs could possibly be objectionable to any rational lawyer. This can be a VERY useful (and very inexpensive) debugging technique. Didn't Knuth offer a cash reward to the first person to find each typo in his "Fundamental Algorithms" series -- and then doubled the amount each year? It can also be a very useful teaching tool, in that it encourages users to explore little-used corners of a system. I applaud any company that has the guts to do it. From mrose at stsci.edu Tue Oct 10 10:24:28 1995 From: mrose at stsci.edu (Mike Rose) Date: Tue, 10 Oct 95 10:24:28 PDT Subject: Baltimore security conference, opening session Message-ID: <9510101723.AA09997@MARIAN.SOGS.STSCI.EDU> I attended the opening session of the National Computer Security Conference this morning. Actually it's been renamed to "Info systems something-or-other", but I don't recall what. The opening session is NIST's opportunity to take center stage, which they did. The most interesting information to come out of the session was that the govt is still pushing very hard for key escrow. Most of the speakers mentioned key escrow, and talked about the need for business and govt to compromise to meet the needs of law enforcement blah blah blah. The "distinguished awardee" is Dennis Branstad, his speech was read by Steven Walker. In it, Branstad claimed that key escrow is a great gift being provided by the government to the private sector, and that companies want it a lot. Stuart Katzke from NIST said that "our" goal (where "our" is computer security professionals) is to deploy secure systems, but he believes that "we" often lose sight of that goal. Said that govt and industry need to find compromises so that both can meet their goals and get systems deployed. I belive he mentioned export laws and key escrow as areas for potential "compromises", but am not certain; if not stated it was implied. My interpretation is that he claims those who object to key escrow are getting in the way of deploying secure systems. Someone, I don't recall who, pointed to the european "interest" in key escrow, saying other govts might not allow systems to be deployed without key escrow, thus key escrow was a good thing. Mike From lull at acm.org Tue Oct 10 10:35:16 1995 From: lull at acm.org (John Lull) Date: Tue, 10 Oct 95 10:35:16 PDT Subject: Making it more difficult to forge cancels (was: Re: FORGED CANCELS of posts on n.a.n-a.m) In-Reply-To: <199510051540.IAA23612@ix.ix.netcom.com> Message-ID: <199510101734.KAA26687@ix5.ix.netcom.com> On Mon, 09 Oct 1995 23:12:35 -0400 (EDT), dlv at bwalk.dm.com (Dr. Dimitri Vulis) wrote: > Scenario 3. > > Alice provides dial-up Usenet feed to/from several small sites run by Bob, > Charles, and Dan. Their domains point to Alice via MX. Alice knows that if one > of them spams Usenet, she'll be flamed and mailbombed. Alice adds her own > "Cancel-Lock:" to each article she receives from these sites before feeding > them to the rest of Usenet. Later she can cancel whatever articles have > originated at B, C, D, and passed through her site. I like this a lot, except: If B doesn't add a Cancel-Lock to each article he sends, he loses the ability (because of Alice's Cancel-Lock) to cancel his own articles. Cancel-Locks should only be added (or honored?) if the message contains a Cancel-Lock from the originator. I'd also like to suggest that added Cancel-Locks be generated from something less than the full message -- perhaps from just the message ID. Intermediate sites are unlikely to maintain full copies of all messages, and ought to be able to generate cancels in response to a (possibly corrupted) copy returned to postmaster from another site. From rsalz at osf.org Tue Oct 10 11:10:39 1995 From: rsalz at osf.org (Rich Salz) Date: Tue, 10 Oct 95 11:10:39 PDT Subject: java security concerns Message-ID: <9510101808.AA25419@sulphur.osf.org> >> >By the way, I suggest that Sun should offer a large money prize for >> >the first significant security hole found the Java implementation. Its >> >a tiny price to pay for security. I notice that netscape just announced that they're doing this. From stewarts at ix.netcom.com Tue Oct 10 11:28:39 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Tue, 10 Oct 95 11:28:39 PDT Subject: Java idea Message-ID: <199510101828.LAA17877@ix2.ix.netcom.com> At 09:54 AM 10/10/95 -0400, Mike Fletcher wrote: > >Well, security bugs aside (and I've got the sun4.1.3_u1 and Win32 ns2b >distributions :) has anyone given any thought to using Java to do some >sort of Chinese Lottery attack. I was re-reading App. Crypto. last >night and it could be feasable. If you could get your key cruncher >thread loaded into a good many browsers to run when idle . . . . How >many estimated copies of NS are there? Anyone want to do the math? :) Yeah, this was discussed; mix it in with a cool screen saver "We're busy hacking Microsoft!" bouncing around the screen and you could probably get a lot of people to try it, assuming of course that it can run in offline mode conveniently, which I'm not sure Netscape can yet (downloading the software, copying mozock/nullsock as winsock, and restarting Netscape doesn't strike me as convenient, which means it's also not an off-line mail/news reader yet.) The negative part is that Java Bytecode interpretation is about 10x slower than native code; you'd have to get people to download native libraries for their platform to do the grunt work. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From stewarts at ix.netcom.com Tue Oct 10 11:28:55 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Tue, 10 Oct 95 11:28:55 PDT Subject: Certificate proposal Message-ID: <199510101828.LAA17871@ix2.ix.netcom.com> At 09:04 AM 10/10/95 -0700, Hal wrote: >Still, there is a problem here: how did the bank know that it _should_ >honor requests to withdraw money from bank account x if they are signed >with a certain key? How did it determine that that is a valid key, if it >never had a secure channel to the person opening the account? I think >the answer is clearly that it cannot, that it must have had a secure >channel. Would a certificated key presented by Alice have been >sufficient to create such a channel, do you think, or would a face to >face meeting have been necessary? (Or would an uncertificated key be >adequate?) I think you're probably right, though a one-way secure channel is enough. If Alice has a trusted copy of the Bank's key, she can open her account and get her key certified by them without them having to trust her key (modulo little details like government requirements that banks get positive identification for their accountholders.) >What if you are accessing the bank via a MITM? Consider this example: >Alice writes you a check, signed with a key (without her name) which >has a credential from the bank saying that it will back up the check. >But you need the bank's key to check the credential, so Alice gives it >to you, or you get it from a public cache. Suppose the bank's key is >fake, and Alice is defrauding you. How do you tell? With online clearing, you'd be able to tell because Alice's check cleared and your bank (which we're assuming you've got a secure channel to) says you've got the money. Or in the case of digicash, because the cash Alice's bank gave you was good. >Wouldn't a certificate on the bank's key be necessary, one which ties the bank's >name and reputation to the key? Maybe not, but it would sure help. >Or what if the bank really is and has always been behind a MITM? You say >that it is more profitable for the bank not to abscond with your money. >What about the MITM? He doesn't make any profits until he cheats. Hmmm. That one's interesting; he pays fakes everything for a while, including paying out money, and then pulls off the Big Con. >It seems to me that a lot of protocols assume the existence of secure >channels. Yet the MITM attack shows that public key cryptography does >not in and of itself provide a secure channel. This is a problem which >IMO should not be ignored simply because it is inconvenient. Agreed. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From frissell at panix.com Tue Oct 10 12:22:51 1995 From: frissell at panix.com (Duncan Frissell) Date: Tue, 10 Oct 95 12:22:51 PDT Subject: Hal's Third Challenge? Message-ID: <199510101920.PAA24628@panix.com> Any movement towards a third cracking session. I know poor Netscape seems like old hat but it might be good to do one more to establish a working server (if we have one). My interest arises out of the new Pentium 120 that has come my way and the 40,000 keys/second it gets running the 32-bit version of the Brue code. Since my ISP is a local call, I might even be able to get away with an 8 hour PPP session to try the WIN95 client. What's going on? DCF "Take your Writ of Ne Exeat Republica and shove it." --- words to keep around to really impress the opposition with. From Piete.Brooks at cl.cam.ac.uk Tue Oct 10 13:07:35 1995 From: Piete.Brooks at cl.cam.ac.uk (Piete Brooks) Date: Tue, 10 Oct 95 13:07:35 PDT Subject: Hal's Third Challenge? In-Reply-To: <199510101920.PAA24628@panix.com> Message-ID: <"swan.cl.cam.:012510:951010200606"@cl.cam.ac.uk> > Any movement towards a third cracking session. I know poor Netscape seems > like old hat but it might be good to do one more to establish a working > server (if we have one). Indeed -- with the time to crack down to a few seconds using cryptanalytic instead of brute, and netscape moving to 128 bit, there seemed little point in going for netscape again. It seems that microsoft was the one to go for, as they too use 40 bit for each session .... If someone can generate the CRACKing code and someone can donate an example, I'd be DELIGHTED to arrange another BRUTE ! PS: any non US people willing to test my PGP "Multi Protocol fast lookup" as per http://www.pgp.net/pgp/ ? I'd like to see how fast it is from distant parts (at 0.3 - 0.6 s real time locally, network delays will be significant ...) From jim at acm.org Tue Oct 10 13:43:34 1995 From: jim at acm.org (Jim Gillogly) Date: Tue, 10 Oct 95 13:43:34 PDT Subject: Hal's Third Challenge? In-Reply-To: <199510101920.PAA24628@panix.com> Message-ID: <199510102043.NAA06895@mycroft.rand.org> > Duncan Frissell writes: > Any movement towards a third cracking session. I know poor Netscape seems > like old hat but it might be good to do one more to establish a working > server (if we have one). I'd rather see a Microsoft challenge than a third Netscape 40-bitter. We've made our point about 40-bit keys on Netscape's skull enough times, and Microsoft is making smug product announcements referring to those Netscape breaks. Time to spread our joy around a bit, I'd say. Jim Gillogly Hevensday, 19 Winterfilth S.R. 1995, 20:42 From rjc at clark.net Tue Oct 10 13:58:46 1995 From: rjc at clark.net (Ray Cromwell) Date: Tue, 10 Oct 95 13:58:46 PDT Subject: Netscape starts their own "Hack Netscape" contest Message-ID: <199510102058.QAA17999@clark.net> Starting today, Netscape is awarding those who are first to find security bugs in Netscape 2.0 with cash prizes. (see their homepage for more info) -Ray From jpb at miamisci.org Tue Oct 10 15:00:39 1995 From: jpb at miamisci.org (Joe Block) Date: Tue, 10 Oct 95 15:00:39 PDT Subject: How to hold a key signing party? Message-ID: -----BEGIN PGP SIGNED MESSAGE----- I've never attended a key signing party so I'd like to get some input on the most effective way to run one. What I have in mind is to have everyone who is planning on attending send me their key and its fingerprint. I'll collate the lot and print enough copies of the list of names/fingerprints so that once everyone shows up, each person can get a handout. Everyone presents ID showing who they are and reads off their fingerprint so the attendees can check them on their handout. Afterwards, I'll email all attendees the keys so they can sign them and mail them back to me. Once I receive the signed keys, I'll redistribute them back to the owners & attendees. This seems like a lot of work, which I don't mind, but if there is a more efficient method, I'd like to know about it. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBMHrs/mGnwFiC3O2NAQGmMgf/SMeupR1BLe63riBNQklOGgGrLm+7yW3d cqR42cdHnfxGLjy9Jwp+kmN1mHMf+EA+VIEZGC98Q0ZzwGzAnlibXmBOCHuC+6u2 ofRGLXtOB8WKJlJ2uXNjAeeOQcCEaRXmgbPhtqgb2YH7zcsiFRWMjpTi3MwLylXv Vb7SIgayVKuGEx2h43xH0ChjJuyzsdJgRtW5G0e/oBjxcOpdtNrnj4zHmFqu9R/M o4NN/W1S2unF3nvJmZkpKQT7EdVbRFHjdS/RfSqTcqf+WF+yXCo2NnUkdUat5uJh QB1CpIn7Zpw/HZiAp5r87GFy0SiKvwS4QPpsvhIaCa0NGoNqqjhXUg== =Jvxf -----END PGP SIGNATURE----- signoff 2048bit-Fingerprint: 74 64 C7 6F 51 72 36 3D 87 75 F9 F5 2A F6 8F 74 ------------------------------------------------------------------------ Help Phil! email zldf at clark.net or see http://www.netresponse.com/zldf From reed at itd.nrl.navy.mil Tue Oct 10 15:28:25 1995 From: reed at itd.nrl.navy.mil ( Michael G. Reed ) Date: Tue, 10 Oct 95 15:28:25 PDT Subject: Netscape & Fortessa Message-ID: <9510102227.AA05494@usonian.itd.nrl.navy.mil.> All- I remember there was some talk about Netscape adding Fortessa support on here a couple of days ago, so I thought I'd share this. Marc Andreessen (president of technology for Netscape Communications) made a presentation today at the 18th National Information Systems Security Conference about Fortessa support within Netscape 2.0 to be shipping Beta Q2 '96 and final the second half of '96 (I haven't seen an official press release, but he more or less said they were announcing it today). From his description, it looks like they are going to place the Fortessa drivers right in the SSL layer bypassing the software subsystem that currently exists in favor of the hardware (the software subsystem would still be utilized for non-Fortessa sessions). He also commented that this was possibly a lead-in to other hardware subsystems in the future. General reaction (at least in my immediate vicinity in the lecture hall) was quite positive -- looks like Fortessa is gaining even more momentum (Oracle had a talk about Fortessa support immediately after Netscape). I wonder when Microsoft & company will jump on the bandwagon? :-) -Michael (The above statements are my opinions and do not necessarily represent the opinions of the Department of Defense, the US Navy, or the Naval Research Laboratory.) From perry at piermont.com Tue Oct 10 15:46:31 1995 From: perry at piermont.com (Perry E. Metzger) Date: Tue, 10 Oct 95 15:46:31 PDT Subject: How to hold a key signing party? In-Reply-To: Message-ID: <199510102246.SAA12947@jekyll.piermont.com> Joe Block writes: > What I have in mind is to have everyone who is planning on attending send > me their key and its fingerprint. I'll collate the lot and print enough > copies of the list of names/fingerprints so that once everyone shows up, > each person can get a handout. Everyone presents ID showing who they are > and reads off their fingerprint so the attendees can check them on their > handout. Afterwards, I'll email all attendees the keys so they can sign > them and mail them back to me. Once I receive the signed keys, I'll > redistribute them back to the owners & attendees. What you describe is the method we use at IETF meetings (we always have key signing parties) and it is about as efficient as you can hope for. The one proviso I'll add is that you really don't need people to show ID -- thats up to the people signing the keys... Perry From m5 at dev.tivoli.com Tue Oct 10 16:06:07 1995 From: m5 at dev.tivoli.com (Mike McNally) Date: Tue, 10 Oct 95 16:06:07 PDT Subject: How to hold a key signing party? In-Reply-To: Message-ID: <9510102259.AA28745@alpha> Joe Block writes: > What I have in mind is to have everyone who is planning on attending send > me their key and its fingerprint.... > > This seems like a lot of work, which I don't mind, but if there is a more > efficient method, I'd like to know about it. Doesn't make any difference to me, you nefarious agent of the Great Man In The Middle you. [ You got to get up *pretty early in the morning* to put one over on *me* like that. ] ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) | | stand there and flap your arms like a fish. | Tivoli Systems, Austin TX | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From benny at SIRIUS.COM Tue Oct 10 16:30:46 1995 From: benny at SIRIUS.COM (Thomas Gorman) Date: Tue, 10 Oct 95 16:30:46 PDT Subject: Netscape Crack Message-ID: Hey- I'm a bit new to the Crypto Field but I know enough. I heard that the Cypherpunks ran a brute force attack on Netscape's 40-Bit code but I still don't know how those two guys in Berkeley broke the 40-bit in just a few minutes. Can someone on this list explain it to me? Thanks. --tom gorman From sdw at lig.net Tue Oct 10 17:00:28 1995 From: sdw at lig.net (Stephen D. Williams) Date: Tue, 10 Oct 95 17:00:28 PDT Subject: CYPHERPUNK considered harmful. In-Reply-To: Message-ID: I like it... I'll point out that there's nothing wrong with having an alias, dba for those situations where it might be advantageous. Of course, calling it a sister org, etc. could have advantages. Or maybe just call the ideal/culture cypherpunks and create a slightly more structured org for span... > -----BEGIN PGP SIGNED MESSAGE----- > > Recently Peter Trei called for new names and slogans to > replace the negatively loaded name "Cypherpunks." Here is one effort > (partially based on his suggestion, but with refinements.) Note that I > intend the term "strong privacy" to include both cryptography-based tools, > and other tools such as remailers. I hereby place the following into the > public domain. > > * * * > > I lock my car. > I secure my house. > I send my letters in envelopes. > I store my valuables in safe places. > I don't let strangers hold my wallet. > I don't wear a name tag everywhere I go. > I carry my cash and credit cards out of sight. > I don't show off my key number when visiting the ATM. > > I protect my e-mail and files with strong privacy tools. > > Don't you? > > > A message from SPAN: the Strong Privacy Advocates Network > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.2 > > iQCVAwUBMGvwfwsQtf7CdTI1AQFSGwP9HWusresWaRsQig2fSNW/nXt+oKVv6Np7 > 5EuziM3v1ihP4Clr4dqUtEE+Yujf7o71I7nb1UrVvwpIOt5yWXtiZc2/5VPZFBUY > bTUHlQ/NkgKum9RMnntb8BprtpiTSrb+o2s9iYDJLfFnCeT8n2zEn97GgandKA2o > rbXWVIEKSpc= > =mBAk > -----END PGP SIGNATURE----- > > ------------------------------------------------------------------------- > NOTE: Currently travelling on sabbatical. Expect responses within 7 days. > ------------------------------------------------------------------------- > ROBERT McNALLY - MINOTAUR CONSULTING > Ironwolf at Minotaur.com * 714/648-2248 > Specializing in Computer Games and Digital Entertainment Software > Over 15 Years of Industry Experience: Creative * Technical * Managerial > ------------------------------------------------------------------------- > > > -- Stephen D. Williams 25Feb1965 VW,OH (FBI ID) sdw at lig.net http://www.lig.net/sdw Consultant, Vienna,VA Mar95- 703-918-1491W 43392 Wayside Cir.,Ashburn, VA 22011 OO/Unix/Comm/NN ICBM/GPS: 39 02 37N, 77 29 16W home, 38 54 04N, 77 15 56W Pres.:Concinnous Consulting,Inc.;SDW Systems;Local Internet Gateway Co.;28May95 From hfinney at shell.portal.com Tue Oct 10 17:26:34 1995 From: hfinney at shell.portal.com (Hal) Date: Tue, 10 Oct 95 17:26:34 PDT Subject: Netscape & Fortessa In-Reply-To: <9510102227.AA05494@usonian.itd.nrl.navy.mil.> Message-ID: <199510110025.RAA10439@jobe.shell.portal.com> Michael G. Reed writes: >All- > I remember there was some talk about Netscape adding Fortessa support >on here a couple of days ago, so I thought I'd share this. Marc Andreessen >(president of technology for Netscape Communications) made a presentation >today at the 18th National Information Systems Security Conference about >Fortessa support within Netscape 2.0 to be shipping Beta Q2 '96 and final >the second half of '96 (I haven't seen an official press release, but he more >or less said they were announcing it today). From his description, it looks >like they are going to place the Fortessa drivers right in the SSL layer >bypassing the software subsystem that currently exists in favor of the >hardware (the software subsystem would still be utilized for non-Fortessa >sessions). He also commented that this was possibly a lead-in to other >hardware subsystems in the future. General reaction (at least in my >immediate vicinity in the lecture hall) was quite positive -- looks like >Fortessa is gaining even more momentum (Oracle had a talk about Fortessa >support immediately after Netscape). I wonder when Microsoft & company will >jump on the bandwagon? :-) There seems to be a convergence on this approach to a hardware solution. HP has been pushing for a model in which software with hooks for hardware encryption will be allowed to get exported. Then you can plug in whatever level of encryption you are able to have in the form of a card token. Traditionally NSA has opposed export of software with hooks but there are some indications that this method could be accepted eventually. Conceivably we could get to a situation where most encryption is done in hardware, with the big, ubiquitous software packages like Netscape and Word and their descendants just having hooks. This would have some advantages but overall I think it would be detrimental to cypherpunk goals. One of the biggest problems faced by those who want to restrict access to encryption is how easy it is to do. PGP and other programs are virtually impossible to control. They are easy to write and people can spread them around trivially. But hardware is not so simple. If the only effective way to get convenient communications with your net access software became to use a hardware token, then it would be a lot easier to put on restrictions. An underground effort to manufacture and distribute tokens would be much less practical than one to do the same thing for secure software. I would like to see companies which add hooks for hardware also begin adding hooks for software packages as well, at least in their domestic versions. In the case of Windows, for example, a DLL interface to provide encryption functions should not be hard to add using a similar API as for the hardware crypto card. Similar interfaces should be possible on other OS's. Companies which do this will demonstrate their commitment to making good quality cryptography available to their customers. A system which is "open" only to the extent that a hardware card can be added is not sufficient. A truly open system will allow software add-ons as well. Let's keep an eye on how this develops and let the companies know how we feel. Hal From stewarts at ix.netcom.com Tue Oct 10 17:37:40 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Tue, 10 Oct 95 17:37:40 PDT Subject: Netscape Crack Message-ID: <199510110036.RAA10457@ix2.ix.netcom.com> At 04:30 PM 10/10/95 -0700, benny at SIRIUS.COM (Thomas Gorman) wrote: >I'm a bit new to the Crypto Field but I know enough. I heard that the >Cypherpunks ran a brute force attack on Netscape's 40-Bit code but I still >don't know how those two guys in Berkeley broke the 40-bit in just a few >minutes. Can someone on this list explain it to me? Thanks. Netscape uses a random session key, which feeds that 40-bit encryption. How does it get a random session key without bothering the user to type in random numbers? By using the sources of randomness available to it, like the system clock and process id. Well, since you know when a message was sent, you know what time it was (to the second), and there aren't very many possible values of microseconds available. There also aren't a lot of possible processids, especially when you can run a process on the machine or convince sendmail into telling you. So instead of having 2^40 numbers to brute-force, there were fewer than 2^30, often more like 2^20. That's pretty fast. The third crack was to notice that Netscape isn't very careful with array bounds (in true C fashion), allowing you to push stuff on the stack by handing it a URL with a very long name. If you're careful, you can put interesting stuff on the stack, so it does more than just crash in an ugly fashion. However, three's a charm, and it's now time to Hack Microsoft, especially since Microsoft has been saying bad things about Netscape, when almost every encryption product in a Microsoft tool is wimpy beyond repair, and when their newest and niftiest stuff also has 40-bit keys for export versions, with out even as much salt as Netscape used. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From asgaard at sos.sll.se Tue Oct 10 17:53:10 1995 From: asgaard at sos.sll.se (Mats Bergstrom) Date: Tue, 10 Oct 95 17:53:10 PDT Subject: Certificate proposal In-Reply-To: <9510092146.AA28192@alpha> Message-ID: Mike McNally wrote: > interested in a little e-hanky-panky, I can ask around the sleazier > corners of the net to see whether Alice is the kiss-and-post type. > > Somebody's going to have to explain to my thick skull how it is that a > certificate system makes this process any different, fundamentally. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ *This Key was signed by AidsFree Inc., a THL (Trusted HIV Laboratory)* The Time-Stamped Public Key of AidsFree Inc. can be found at: shttp://health.cdc.gov/hiv/trusted_labs/aidsfree/dec-99/ Date: 20/12/99 Aidsfree Inc. certifies that a person (*Alice*) in proven posession of This Key was tested HIV negative at this date. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ From rfb at lehman.com Tue Oct 10 17:57:49 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Tue, 10 Oct 95 17:57:49 PDT Subject: NSA Realists v. Nuts In-Reply-To: Message-ID: <9510110057.AA07735@cfdevx1.lehman.com> Date: Mon, 9 Oct 1995 19:24:06 -0400 (EDT) From: Duncan Frissell 2400 Americans are imprisoned every year for federal income tax violations. Approximately one person is killed every year in arrests involving federal income tax violations. *This* is the blood of millions you spoke of?!? Oh please . . . . Considering that you launched into this as a comparison to the Nazi `medical experiments' I can only conclude that you're hopelessly out of touch with anything similar to reality. Rick From garnett at wombat.catbelly.com Tue Oct 10 18:13:55 1995 From: garnett at wombat.catbelly.com (Santiago de la Paz) Date: Tue, 10 Oct 95 18:13:55 PDT Subject: PC disk wipe software In-Reply-To: <199510101550.QAA29289@utopia.hacktic.nl> Message-ID: <199510110113.TAA08320@wombat.catbelly.com> > Often files retrieved include e-mail thought to have been > erased long ago. It survives because the diligent > computer system manager makes backup tapes of everything > on the system every night, then stores those tapes for > years. Uh... they back up their *mail* spools? Yeah, right. ~james From zinc at zifi.genetics.utah.edu Tue Oct 10 18:17:12 1995 From: zinc at zifi.genetics.utah.edu (zinc) Date: Tue, 10 Oct 95 18:17:12 PDT Subject: truth in advertising: Netscape 1.1 on security In-Reply-To: <199510101534.LAA22081@cranmore.openmarket.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- > I ran 'strings' on the binary, and only got one "about.*security" reference. > > entering it as an URL > > about:security > > yields the ironically humorous (when you consider all of the security bugs): > > Whatchew talkin' 'bout, Willis? this happens when anything other than what is define by the program is entered. ie, about:time would give the same result. my 'home' page is this about:mozilla. ciao, - -pjf patrick finerty = zinc at zifi.genetics.utah.edu = pfinerty at nyx.cs.du.edu U of Utah biochem grad student in the Bass lab - zinc fingers + dsRNA! ** FINGER zinc-pgp at zifi.genetics.utah.edu for pgp public key - CRYPTO! zifi runs LINUX 1.2.11 -=-=-=WEB=-=-=-> http://zifi.genetics.utah.edu -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHsbnU3Qo/lG0AH5AQHpdwQAoCoiFqVFkYO1NWbkOAj0N0R0O6j/CmjA DbHi60cA3Sztvp4rrMVGj4L/TvGjnL5+Iru2pU5cJHwgYxngfQOCaQ59G8CmsH2k T4pMqjB9sTqzf/mowpJDmgIIyHiap3EfwYQc7a/eH9Yp4F/oiT4hCA3I1+5Z+n7l t3VKdnEAJ7E= =buPy -----END PGP SIGNATURE----- From userview at mindspring.com Tue Oct 10 18:21:01 1995 From: userview at mindspring.com (Anne Giles) Date: Tue, 10 Oct 95 18:21:01 PDT Subject: recent crime bill Message-ID: <199510110120.VAA06713@dylan.mindspring.com> I'm sorry about the noise but does anyone know where on the net I can find a copy of the recent crime bill and the anti-terrorism act. Thanks From jirib at sweeney.cs.monash.edu.au Tue Oct 10 18:38:29 1995 From: jirib at sweeney.cs.monash.edu.au (Jiri Baum) Date: Tue, 10 Oct 95 18:38:29 PDT Subject: PC disk wipe software In-Reply-To: <199510092220.SAA19341@book.hks.net> Message-ID: <199510110137.LAA11056@sweeney.cs.monash.edu.au> -----BEGIN PGP SIGNED MESSAGE----- Hello cypherpunks at toad.com and shamrock at netcom.com (Lucky Green) > In article <199510091318.JAA24166 at jekyll.piermont.com>, perry at piermont.com > ("Perry E. Metzger") wrote: [asking for utility to wipe data from MS-DOS hard drive] shamrock at netcom.com (Lucky Green) answered: ... > They all invariably fail to wipe the slackspace at the end of > allocated, but not fully used blocks. Consequently, several kB of data ... Since nobody seemed to mention it: I suspect that most of them also fail to wipe already reallocated space. Think about it: some of that space was only overwritten once... So to be safe I guess make a backup (with a backup utility that doesn't copy slackspace), wipe the disk, then restore. Also beware programs that do not properly zero their files when allocating them. The cliche answer to the original question, I believe, is: yes, go to the hardware store and ask for a 'sledgehammer'. Hope that makes sense... Jiri - -- If you want an answer, please mail to . On sweeney, I may delete without reading! PGP 463A14D5 (but it's at home so it'll take a day or two) PGP EF0607F9 (but it's at uni so don't rely on it too much) -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBMHsf0SxV6mvvBgf5AQGMmgP9GJvJgWmdW3YHRCfNRKQtlM557MIrzn+t ZDbiSp/E7hKXPDf7Ech/O7hzdFvCCA7APR4lE9bIimP8mFuE5KAKTLIC2cYnG6Hi Cj28OorVS/mDtwMOJJ6TJLV8tXArDtvAKY9OOghzepZs9hf9b5lXs6PXWEd7gb6F LinHs36C4dI= =0vcL -----END PGP SIGNATURE----- From mark at unicorn.com Tue Oct 10 18:43:39 1995 From: mark at unicorn.com (Rev. Mark Grant) Date: Tue, 10 Oct 95 18:43:39 PDT Subject: Netscape & Fortessa Message-ID: On Tue, 10 Oct 1995, Hal wrote: > But hardware is not so simple. If the only effective way to get > convenient communications with your net access software became to use a > hardware token, then it would be a lot easier to put on restrictions. An > underground effort to manufacture and distribute tokens would be much > less practical than one to do the same thing for secure software. However, as long as the hardware uses a published algorithm, there shouldn't be too much of a problem in writing a device driver that will emulate the hardware. Of course, they might attempt to use those tokens to authenticate the hardware in the application, but that shouldn't be any harder to patch out than the various software protection schemes that have fallen in the past. Frankly, I have no desire to have hardware crypto in my system (nor anywhere to put it, I'm not wasting a PCMCIA slot on something that I can do with software), and unless it's dirt cheap I doubt that many normal users will want to do so either, particularly if there *is* a software alternative. Servers might want hardware for performance reasons, but I don't see any reason to prefer it otherwise. So on those grounds, the only real danger would be for the government to start selling Clipper cards for $ 5 apiece. Of course, I wouldn't put it past them.... Mark From mrose at stsci.edu Tue Oct 10 19:20:26 1995 From: mrose at stsci.edu (Mike Rose) Date: Tue, 10 Oct 95 19:20:26 PDT Subject: Netscape & Fortessa In-Reply-To: Message-ID: <9510110220.AA02365@MARIAN.SOGS.STSCI.EDU> >>>>> On Wed, 11 Oct 1995 02:45:16 +0100 (BST), "Rev. Mark Grant" said: >So on those grounds, the only real danger would be for the government to >start selling Clipper cards for $ 5 apiece. Of course, I wouldn't put it >past them.... > Mark Fortezza cards are $70. Is that close enough? Mike From futplex at pseudonym.com Tue Oct 10 19:27:00 1995 From: futplex at pseudonym.com (Futplex) Date: Tue, 10 Oct 95 19:27:00 PDT Subject: Graphic encryption In-Reply-To: <199510110207.WAA07713@ask.cs.cornell.edu> Message-ID: <199510110226.WAA12742@thor.cs.umass.edu> Allow me to add some more partially informed speculation about unreleased source code to the pile: Bill Stewart writes: > The description of Privasoft's method on their web page sounded like* it > broke up a fax image into little squares and shuffled them around based on > some proprietary (hence presumably weak) algorithm, somewhat like feeding > them to a shredder or puzzle-box, then put them in a file you can ship > with regular fax software or decrypt yourself. If that's the case, > and if the squares are sufficiently big to have enough pixels for fax > software to compress decently, then it's weak no matter _how_ strong > the encryption algorithm that shuffles them is, because you can piece together > matching edges like a jigsaw puzzle, or like a bunch of Iranian students > with American Embassy shredded documents. :} [...] > * The software was on the web page; if I'd had spare disk space that day and > some slack time I could have downloaded the demo version and tried it, > but this is what the description sounded like it meant. The graphic encryption patents I found a couple of weeks ago (cited here then) describe a method that I don't believe would be susceptible to a "jigsaw" attack like this. The patented method specifies encrypting the image bitmap bit-by-bit (it suggests XORing with a (P)RNG stream). So the square granularity would fail your second criterion for the applicability of a jigsaw attack. However, I only have circumstantial evidence to suggest that the PrivaSoft software actually uses the patents I've seen. Perhaps PrivaSoft Inc. could comment on which patent(s) (if they have already issued) form the basis for the use of encryption in their product ? One last note: I would certainly have a hard time applying a jigsaw attack to the sample ciphertext image at http://www.privasoft.com/images.html (and enlarged at http://www.privasoft.com/scramima.html). Maybe it would be easier if the plaintext image consisted of a picture with more macroscopic structure. -Futplex From cman at communities.com Tue Oct 10 19:32:50 1995 From: cman at communities.com (Douglas Barnes) Date: Tue, 10 Oct 95 19:32:50 PDT Subject: Int'l Money Laundering, Part the Second Message-ID: INTERNATIONAL ASPECTS The increasingly long arm of US law Those of you who have read my earlier exploration on the subject of jurisdiction (http://www.communities.com/paper/swamp.html) should be aware of a wide variety of ways that the US can "reach out and touch someone" they're not pleased with. Well, last week, I learned a few more. There are several ways in which the US is attempting to exert hegemony throughout the world wrt banking regulation: o Identification of "fiscally tolerant" nations and banking havens, and close regulatory examination of all transactions with these countries. o Pressure on major US trading partners and allies to pass and implement anti-money-laundering legislation and regulatory regimes. o Regulations on foreign banks with offices in the US, making compliance demands on world-wide operations. o Criminal prosecution of banks suspected of institutional involvement in money laundering, even if said bank has no offices or branches in the US. o Worldwide pre-trial substitute asset forfeiture of banks suspected of institutional involvement in money laundering, even if said bank has no offices or branches in the US. Pariah Nations in Banking ========================= As I touched on briefly in the previous section, transactions with well-known banking havens can automatically qualify as "suspicious." And in addition to some of the better known havens, a number of countries were pointed out at the conference as being "fiscally tolerant", including Malta, Uruguay, Japan, Ireland and Belgium; in another presentation the countries of Eastern Europe and the former Soviet Union were identified as "rapidly growing" sources of suspicious baning activity. Transactions with counterparties in such countries will be flagged by regulators for closer examination -- banks with large percentages of transactions with these countries will be expected to meet a higher standard in their attempt to identify "suspicious" behavior and will be under increasing pressure to investigate their customers' business practicies and motivation for all bank transactions. Some countries are clearly going to continue to tell the US to "get stuffed." However, if the US is successful in pressuring more and more countries to "tow the line", it will leave a shrinking pool of transactions subject to closer and closer examination. New Money Laundering Legislation ================================ Two presentations, one from Taiwan, the other from Thailand, focused on new or proposed legislation wrt money laundering in those countries. Based on my direct experience of living in the former, and my reseach into the latter, it's going to be a very, very long time before such legislation has a significant impact on either country. Chinese people (who are in the majority in Taiwan, and form an economically active minority in Thailand) are very cash- oriented; I vividly remember payday in Taiwan, with the boss sitting at a table piled with money, bundling up salaries for everyone. I'd come home at the end of each month with a giant wad of cash from my several different jobs. One could hardly imagine a better environment for money laundering than a society in which large quantities of cash change hands on a regular basis. After his talk, the Taiwanese speaker acknowledged the problems, but seemed hopeful that progress could be made. The speaker from Thailand, Nualnoi Treerat, a professor of Economics, discussed the proposed legislation primarily as an attempt to reduce the impact of organized crime on political life and society in Thailand; however, by her own estimations, the underground economy in Thailand represents 17-19% of the country's GDP (mostly drugs and prostitution.) Given the extensive corruption which she also detailed, it seems that such legislation will be a very small step indeed. Other speakers addressed the issue of cultural differences with respect to the use of cash and attitudes towards privacy, and it came up at lunch both days -- in many cultures, financial privacy is held in much higher regard than in the US, and people have a much stronger suspicion towards the government. Furthermore, there are many people who feel this way in the US. There is going to be an inevitable clash between atttempts to closely regulate and monitor money movements and people's fundamental desire for privacy. It's not clear that people of any culture can be sufficiently frightend by the bad guys to give up as much of their privacy as would be required for ultimate success in the War on Money Laundering. Despite the dim chances of success, it's clear that the US has been at least partially successful in coercing and coaxing other countries to adopt measures against money laundering, and to some extent there is local support for these measures. But these direct efforts pale by comparison to some other techniques... Foreign Bank Regulation ======================= In various pro-privacy publications I've read, there have been oblique warnings about doing business with foreign banks that maintain offices in the US. At this conference, I learned some very concrete reasons for this. It turns out that if a foreign bank wants to open a US office, they must demonstrate compliance with US money laundering laws throughout their _worldwide operations_. Furthermore, they're expected to have solid leadership for these policies from their home offices. This puts such banks in a serious bind. For instance, while Annunzio-Wylie absolves (or attempts to absolve) banks from civil liability for filing Suspicious Activity Reports and Criminal Referral Forms on their cusomters, this absolution does not extend to the home countries of these banks, where substantially different laws may obtain -- possibly explicitly forbidding this kind of reporting. There is almost a certain kind of logic to this kind of activity, but not content to extend our laws over the worldwide operations of banks with US offices, there are two ways in which US authorities are now attempting to extend US laws to banks _with no US offices_. Extraterritorial Reach ====================== The best paper presented at the conference, hands down, was "Surviving the Solution: The Extraterritorial Reach of the United States," by Kirk Munroe, a criminal defense attorney practicing in Miami. [I intend to find out if an online version of this paper can be made available.] To quote Mr. Munroe: The US money laundering law specifically provides for extraterritorial jurisdiction when (a) the conduct is by a US citizen anywhere in the world, or, if by a non-US citizen, the conduct occurs, at least in part, in the United States, and (b) the transactions, or a series of related transactions, exceeds $10,000. [18 USC $ 1956(f)] Some add'l background: banks involved in international business typically have a number of _correspondent accounts_ scattered around the world that are used for clearing wire transfers and other transactions. Since the BCCI scandal, the US government has increasingly gone after these accounts when a bank is suspected of facilitating money laundering. Furthermore, banks can have these correspondent accounts seized, even if they no longer contain "dirty" money, because they _facilitated_ a money laundering activity. When you combine these elements, you get a strategy that permits the US government to confiscate worldwide correspondent accounts of banks, even if they don't have a US presence. The first case Mr. Munroe cites is that of Banco de Occidente (Panama), one of his clients, that was alleged to have facilitated the laundering of the proceeds of drug transactions. The indictment included criminal charges against the banks and a criminal forfeiture charge. The government also filed a civil action for the forfeiture of $412 million allegedly laundered (although it had already passed completely through the bank.) The government then proceded to freeze not only the bank's US correspondent accounts, but also accounts in Germany, Switzerland and Canada, leading to the insolvency of the bank and its subsequent takeover by the Panamanian Banking Commission. [The Germans quickly unfroze the account after a civil action brought by the bank.] Quoting Munroe: After months of difficult and complicated negotiations which involved the banks' various interests in eight nations, a resolution was reached with the governments of the US, Canada, and Switzerland... [the bank] entered a guilty plea and agreed to forfeit, over a period of four years, $5 million to the US. The US, in turn, paid the Swiss and the Canadians $1 million each from the initial $2 million forfeiture payment. [Those of you who are still under any delusions about the "safety" of Swiss bank accounts, take careful note of this.] Mr. Munroe concludes that the only reason that the bank got off this "lightly" was because of substantial evidence that it was, by and large, a highly respectable institution and that this instance of laundering was an aberration. The next case cited by Mr. Munroe is that of Bank Leu. I quote from his paper: In sum, a Luxembourg bank with no office in the US was charged and convicted of money laundering in the US on the basis of clearing US dollar negotiable instruments drawn on a US bank but deposited by non-US citizens in Luxembourg. In other words, acceptance of US-dollar negotiable instruments by a bank anywhere in the world outside of the US renders the bank susceptible to US criminal jurisdiction in the money laundering field. The case boils down to this: Bank Leu wanted to expand its private banking business, and hired an officer to market accounts in South America. Two related accounts were opened, and over a one- year period $2.3 million in cashier's checks, all below $10K, were deposited in the two accounts. Although no guilty knowledge could be shown, this case was pursued and won on a theory of "willful blindness", that is, the bank "should have known" that the transactions had no valid business purpose and were inherently suspicious (came via Columbia, were sometimes more than 6 months old, all in small amounts, etc.). According to a LEA representative at the conference, there was a lot of joking in the backoffice at Bank Leu about the money being dirty, and clerks were repeatedly told "don't worry, it's ok" by bank officers. Certainly if this is true, it amounts to _extremely_ willful blindness, but this case still represents an amazingly long reach for US laws. [more to come... "Things bad people do with money"] From mark at lochard.com.au Tue Oct 10 20:02:13 1995 From: mark at lochard.com.au (Mark) Date: Tue, 10 Oct 95 20:02:13 PDT Subject: Hal's Third Challenge? In-Reply-To: <199510102043.NAA06895@mycroft.rand.org> Message-ID: <199510102312.AA37668@junkers.lochard.com.au> >I'd rather see a Microsoft challenge than a third Netscape 40-bitter. >We've made our point about 40-bit keys on Netscape's skull enough times, >and Microsoft is making smug product announcements referring to those >Netscape breaks. > >Time to spread our joy around a bit, I'd say. Indeed. With the huge amount of people that dislike m$ I think we will at least double the amount of persons wanting to do their bit to rub their noses in it. Whats needed is someone to reverse engineer a m$ transfer, according to the published specs, isolate the encrypted section and then produce a brute engine which can be ported to the platforms we want to try. For the person that cracks a session using the brute force program in the next brutefest and provides the key, I will give a US$50 international money order to. I'm sure others will pile t-shirts on you as well. IMHO we owe Netscape some counter pr against m$, we've proved our point to Netscape and they performed admirally by being open and responsible to the net.community. Whilst it didnt seem to dent their share value, they did cop some bad press (and some media weenies still think their product is broken) because of the groups efforts. What goads me is m$ trying to use this in their press dealing and acting like this is entirely different from their situation. Seems to me they need it proved to them that because of their proprietary attitude they are in a worse position. In short bring them down to earth and serve their ego to them on a plate. Cheers, Mark mark at lochard.com.au The above opinions are rumoured to be mine. From futplex at pseudonym.com Tue Oct 10 20:03:59 1995 From: futplex at pseudonym.com (Futplex) Date: Tue, 10 Oct 95 20:03:59 PDT Subject: spam detector algorithm? In-Reply-To: <199510110244.WAA07789@ask.cs.cornell.edu> Message-ID: <199510110303.XAA12811@thor.cs.umass.edu> Greg Broiles writes: > I've been mulling over algorithmic/computational ways to spot spams > for some time now. I think I might've come up with a way to represent > messages (and compare representations) that would be useful to remailer > operators who don't want to let spams (where "spam" == many messages with > identical or very similar content) through their remailers. [many details elided...] > Any thoughts about this? Interesting? Stupid? Like I said, my math is weak. > My intention is to try to cobble up a 2d version of this to see how it runs > but I thought I'd see if anyone can point out why it can't work, or if it's > useful enough that someone with a better math background than I've got > wants to take this idea somewhere better. It sounds like you are liable to start reinventing parts of the field of information retrieval. The automatic construction and comparison of vectors of document parameters, as you suggested in the part I omitted, is one approach that has met with some success. (The common problem is, given a set of query attributes or a model document, to find relevant documents matching the query or similar to the model document. A variety of relevance measures has been considered.) I can't give you any specific pointers, but I advise you to check out existing implementations of these and other techniques for information retrieval before you spend too much time writing new code. FWIW, I _do_ think that such tactics would be very effective in combatting much of the spam served up these days. > One side effect to the deployment of spam detectors may be that the remailer > pinging services will need to move to using encrypted packets. [...] > My impression is (speak up if I'm wrong) that requiring encryption for the > ping packets wouldn't be an enormous burden on the pinging services because > the new generation of software sends fewer pinging packets such that the > CPU time required isn't an issue. Last time I looked, Raph's software already encrypts ping messages to remailers that have PGP keys. I assume you intend to perform the spam check after removing the optional outer layer of encryption on each incoming message. Perhaps the ping messages would survive unscathed if you only applied the spam scan to messages larger than some minimum size. I haven't seen too many 1 or 2 line spams. -Futplex From wilcoxb at nagina.cs.colorado.edu Tue Oct 10 20:37:30 1995 From: wilcoxb at nagina.cs.colorado.edu (Bryce) Date: Tue, 10 Oct 95 20:37:30 PDT Subject: Man in the Middle Revisited (but not for the last time) In-Reply-To: Message-ID: <199510110337.VAA20392@nagina.cs.colorado.edu> -----BEGIN PGP SIGNED MESSAGE----- The entity calling itself "Timothy C. May" is alleged to have written: > > I don't know if "Carl Ellison the Key" is "really" the same Carl Ellison > that Carl Ellison the Key claims to be...you see the semantic difficulties. Ah, but what we are concerned with is whether "Carl Ellison the Key" is *really* the same "Carl Ellison the Key" that you think he is. :-) Or to put it another way, that *he* thinks he is the same "C.E. the Key" that you think he is. > To put it bluntly, all I really care about is _persistent_ key-holding, > i.e., that the person who began posting with a given key is still using the > same key. Or, rather, I don't even care if the keyholder "Pr0duct Cypher" > is actually a person, or a Bourbaki-style committee--I only care that > messages purporting to be from Pr0duct Cypher or Black Unicorn or Carl > Ellison are still using the same key. > > Who any of these entities "really" are is irrelevant to me. (I don't even > know if Hal Finney, who I met once a few years ago, is the "real" Hal > Finney, nor do I really care.) Well and good, Tim, but you *do* care if the entity calling itself "Hal Finney" is being surrounded by the Man in the Channel ("Mitch") and all of your communications with that entity are under Mitch's control. For example, you may choose to enter a contract with the entity calling itself "Hal Finney", and provide some sort of consulting service to it in exchange for 10,000 cyberbucks. If Mitch is actually in control then he could easily steal both the output of your consultation *and* Hal's 10,000 cyberbucks and leave the two of you hating each other. Perhaps by "persistent key-holding" you mean to imply "without being spoofed by Mitch", in which case I'm sure that you agree on the importance of anti-Mitch measures. :-) Bryce signatures follow "To strive, to seek, to find and not to yield." bryce at colorado.edu -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Auto-signed under Unix with 'BAP' Easy-PGP v1.01 iQCVAwUBMHs70fWZSllhfG25AQECWwQAnk/HRTk/h0tCT80AriH28yLlCQiciGmV T1LShDolvEGEgHThm7tG4LGRVoVUyn7h4MbmJMCXsOV7i0RlvMTA4yVZW9KIiN4O lSzWIQSdIYLS2SQ93cmDART6kV0BBC50FeAAfEBy9PNPaX7ifjmpB0QFzjeLxTG5 TXglWqP9ijo= =K9/N -----END PGP SIGNATURE----- From mkj at october.ducktown.org Tue Oct 10 21:06:32 1995 From: mkj at october.ducktown.org (mkj at october.ducktown.org) Date: Tue, 10 Oct 95 21:06:32 PDT Subject: Crypto's Role in Evil? Message-ID: <199510110312.AA01324@october.ducktown.org> > > We mustn't forget that, until very recently, strong, widespread > > privacy has been humanity's "default" condition. > > Not much privacy in village or tribal life. Even neighborhoods of > earlier cities weren't very private. Neighbors always knew your business. I now realize that my first response to this point was stupid. I was focused exclusively on what one might call "transient" privacy -- the ability to wander out of general earshot for the occassional private conversation. I now see that there is another kind of privacy, which one might call "steady-state" privacy -- that is, the ability to live large portions of one's life out of the light of public scrutiny. In traditional small village or tribal life, transient privacy is rarely threatened, but steady-state privacy may be nonexistent. This is an important point which I didn't get the first time around, and I apologize for giving it short shrift. The various GAK strategies, on the other hand, represent a nearly opposite strategy, preserving (at least in theory) general steady-state privacy (thereby perhaps satisfying the letter, if not the spirit, of most human rights law) while making it impossible to reliably ensure the privacy of any specific thing (Bentham's concealed random observer model for cost-efficient control of a population). These two types of privacy, of course, are not truly distinct, but are ends of a continuous spectrum. Yet they raise different challenges. This is all very interesting; it seems to imply the possibility of some sort of analytic system. But it's late and I'm not particularly brilliant, so I'll end here. --- mkj From patrick at Verity.COM Tue Oct 10 21:17:46 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Tue, 10 Oct 95 21:17:46 PDT Subject: truth in advertising: Netscape 1.1 on security Message-ID: <9510110414.AA05438@cantina.verity.com> > From: Travis Corcoran > > I ran 'strings' on the binary, and only got one "about.*security" reference. > > entering it as an URL > > about:security > > yields the ironically humorous (when you consider all of the security bugs): > > Whatchew talkin' 'bout, Willis? > On my PC the even funnier, Yeah, whatever... results for the same URL. Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From shamrock at netcom.com Tue Oct 10 21:29:16 1995 From: shamrock at netcom.com (Lucky Green) Date: Tue, 10 Oct 95 21:29:16 PDT Subject: Netscape & Fortessa In-Reply-To: <199510110025.RAA10439@jobe.shell.portal.com> Message-ID: <199510110427.AAA05498@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <199510110025.RAA10439 at jobe.shell.portal.com>, hfinney at shell.portal.com (Hal) wrote: > There seems to be a convergence on this approach to a hardware > solution. HP has been pushing for a model in which software with hooks > for hardware encryption will be allowed to get exported. Then you can > plug in whatever level of encryption you are able to have in the > form of a card token. Traditionally NSA has opposed export of software > with hooks but there are some indications that this method could be > accepted eventually. Yes, it might, because of the strong support by vendors for voluntary GAK or no crypto at all. Let me explain. There are a number of indicators that show that strong crypto is losing in the global marketplace. Example: the charter of the new IETF Internet Payment Systems working group requires that the use of crypto be limited. In the discussion about the charter, the near unanimous consent (with myself as the sole dissenter) was that crypto may only be used for authentication, not confidentiality. It is true that the prospect of loosening the rules for crypto software/hardware implementations is a major motivator in the marketplace. The whole development of National Semi's iPower PCMCIA card was driven by a promise made by the NSA of high lot numbers due to (future?) relaxed export rules. I suppose that trapdoors in hardware are much harder to find than trapdoors in software. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHtHmCoZzwIn1bdtAQFm6AGAje0x07V6Ak/nnBLIQyAv9XDZToUw0vju 2GmRq/F1eSeiiOGfXwVGP+irPFd1W/tg =nix8 -----END PGP SIGNATURE----- From patrick at Verity.COM Tue Oct 10 21:37:59 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Tue, 10 Oct 95 21:37:59 PDT Subject: Basic Flaws in Internet Security and Commerce Message-ID: <9510110433.AA05447@cantina.verity.com> Paul said: > A fine piece of work. The ideas expressed in this paper should scare > the hell out of everyone who uses NFS for any serious applications, > which for a fact includes most banks and all investment banks and > brokage houses. In this particular area I KNOW what is at risk. > Again, I congratulate the authors on a first-class effort. I agree, it's a good job of publicizing these holes, but (not to take anything away from these guys, I'm sure they know this), these are not newly found holes. These attacks on NFS have been known and exploited for years and are well known within the security community. What if all NFS traffic was encrypted via a shared key distributed via Diffie-Hellman? Know that would REALLY be secure NFS;) (I know, I know, DH doesn't do secure authentication, so how does Alice know that she didn't just agree to a secret with our Mr Bucket Brigade Mallet!) Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From mark at lochard.com.au Tue Oct 10 22:10:45 1995 From: mark at lochard.com.au (Mark) Date: Tue, 10 Oct 95 22:10:45 PDT Subject: PC disk wipe software In-Reply-To: <199510110113.TAA08320@wombat.catbelly.com> Message-ID: <199510110319.AA32344@junkers.lochard.com.au> Crypto relevance: None. Privacy relevance: High. >> Often files retrieved include e-mail thought to have been >> erased long ago. It survives because the diligent >> computer system manager makes backup tapes of everything >> on the system every night, then stores those tapes for >> years. > >Uh... they back up their *mail* spools? Yeah, right. machine:/home/mark/.elm mark> grep mbox elmrc receivedmail = /home/mark/mail/mbox sentmail = /home/mark/mail/mbox.out People do record their incoming and outgoing email. Smart ones will store it offsite (auto farward to their home machine). Others will pgp them online. Mostly though the cleartext email files will be happily archived away each night to the nice friendly DAT tape down the corridor in the machine room. This is also a situation on PC and Mac POP clients. They can be configured to record your email as it goes in and out. Here we also backup the PC's each night to a DAT. Thats why it's important to self sanitize your files. Me, I just nuke any sensitive information that may arrive in my work mbox, or save/forward it to a safer place. I discourage people from using my work address as a regular personal contact point. Also ensure your admins aren't the nosy types. I started work at one place and noticed in the /.sh_history file that the previous admin was regularly grepping peoples mail spools for his name. This caused some concern to the management when they were informed. Obviously these forays were not part of his everyday job and were a personal endeavour. Cheers, Mark mark at lochard.com.au From sunder at dorsai.dorsai.org Tue Oct 10 22:35:20 1995 From: sunder at dorsai.dorsai.org (Ray Arachelian) Date: Tue, 10 Oct 95 22:35:20 PDT Subject: The Ultimate GUK[TM] (Globally Unique Key) Biotech Racket In-Reply-To: <199510090009.UAA19196@array1.arraydev.com> Message-ID: Bad idea. What's to stop someone from getting a hair off your hairbrush, or shaking hands with you while wearing gloves that can scrape off enough cells from you to get your DNA - then they have your private key. Not cool. Hell, clipper (barf!) would be safer. ========================================================================== + ^ + | Ray Arachelian | Amerika: The land of the Freeh. | _ |> \|/ |sunder at dorsai.org| Where day by day, yet another | \ | <--+-->| | Constitutional right vanishes. | \| /|\ | Just Say | | <|\ + v + | "No" to the NSA!| Jail the censor, not the author!| <| n ========================================================================== From rjc at clark.net Tue Oct 10 22:51:12 1995 From: rjc at clark.net (Ray Cromwell) Date: Tue, 10 Oct 95 22:51:12 PDT Subject: java security concerns In-Reply-To: <199510101500.LAA02245@jekyll.piermont.com> Message-ID: <199510110550.BAA02068@clark.net> > > > Mike McNally writes: > > > I can > > > physically remove all the "dangerous" calls from a Postscript > > > interpreter and still have it be useful. > > > > I don't see the difference. An interpreter is an interpreter. > > I suppose most of this is dead obvious to me because I work in > security every day, but it seems that some otherwise smart people don't > see the point I'm making, repeatedly. > > As an exercise to the reader compare the following two tasks in > difficulty. > > 1) Find a bug that lets you execute arbitrary programs unintentionally > from a program that contains instances of the 'fork()' system call. > > 2) Find a bug that lets you execute arbitrary programs unintentionally > from a program that contains *no* instances of the 'fork()' system call. I agree, however I would point out that not all postscript interpreters are emasculated (especially those on unix systems like IRIX, they contain all kinds of calls to fork(), read()/open(), etc). Nothing in the Java spec tells you that you must call fork() in a Java interpreter implementation. In fact, Java has nothing to do with the GUI calls, the network calls, etc. You can support as much or as little system I/O in a Java implementation as you want. If need be, a Java implementation could hard code all data needed from a hard disk into executable and run entirely in ram, and totally remove all file system access. (except the implicit one needed to load and run the executable in the first place) Even Java apps without network or filesystem capability are useful (as graphic widgets), but I think atleast the ability to load URLs is a good thing, and can be done in a reasonable secure manner. Atleast from my reading of the Java Language Spec, and Virtual Machine, there is no requirement that an implementation implement the File I/O classes. Having a standardized class hierarchy is probably a good idea though. -Ray From sdavidm at iconz.co.nz Tue Oct 10 22:59:59 1995 From: sdavidm at iconz.co.nz (David Murray) Date: Tue, 10 Oct 95 22:59:59 PDT Subject: Banque des Cypherpunks Message-ID: -----BEGIN PGP SIGNED MESSAGE----- C'punks, What would a cypherpunk bank (being a bank the style of which some cypherpunks would not hate too much :-) look like? How could it be made safe to run? One avenue of safety - shepherding the idea through SEC etc scrutiny so as to render the venture completely legal seems to lack something of a c'punk flavour. After all, one idea that some of us are quite taken with is that strong crypto and the changes it brings are not only important (they are), nor good (as Tim has pointed out - it depends where you stand) but *inevitable*. So, how safe would a cp style bank be today? There seem to be a number of possible pressure points: the machine, the operators, the managers/directors, the owners, the assets, getting money out of the system and getting money into the system. The Machine The easiest way to shut down an ebank is probably to unplug the machine the software is running on and take it away. A variation of this is to cut off net/telecomms access, or even electricity. (In the US/UK/NZ etc this would not seem to be too difficult - lie to a judge about a bit of child porn and you can pretty much take what you like.) Restricting ourselves to legitimate securities/banking enforcement, however, it would seem to be enough to move the box to some appropriate offshore site away from the major markets for the bank's services. Obviously, there is no need to actively advertise the physical location of the processor... The Operators Even if the authorities of the target jurisdictions (US, Europe, Asia) can't reach the operators of the machine while they are tending to it, they could, presumably, make it difficult for those people to leave their jurisdictions once they had entered them - by, for instance, issuing arrest warrants, or holding trials in absentia. Again, if the physical location of the machine is sufficiently obfuscated, this attack can be foiled. The Managers/Directors Assuming the bank is some kind of artificial legal entity, it will require some other legal entity to control its actions. That controlling entity could be themselves an artificial legal entity - for instance, a corporate director of an offshore company. The Owners Assuming the bank itself is not a natural person, it will be owned by someone (at least one list member has indicated an interest in investing in some form of ebank). These owners could be the subject of pressure. Using the same technology that made the ecash anonymous, the ownership of the bank could be made similarly unknowable. The Assets A bank isn't going to last long if the SEC can just take its 'deposits'. Fortunately there are still a number of jurisdictions left where the bank's bank account should be safe. Getting Money out of the System Eventually Tim is going to want to turn his Blacknet earnings into USD to reinforce his security perimeter. How do we stop the Feds effectively making it illegal to receive cheques from Banque des Cp? Presumably, BCp instructs its banks to issue bank cheques, or get bank cheques from other banks. Receiving wire transfers from Citbank may be notifiably suspicious, but that just makes you one of millions... Getting Money into the System This strikes me as the most serious problem. If we differentiate between big ticket (wholesale pharmaceutical type) and small ticket (remailer stamp type) transactions, it might just be possible that the former could be managed without bringing down the wrath of the authorities on the customers (having failed to effectivley attack the bank). Essentially the idea is to route payments through enough appropriate jurisdictions that tracing back from the ebank to the customer is impossible (or, rather, unlikely). Sticking a Libyan bank in the chain could help, for instance... But small ticket transactions can't use this route. The easiest thing to do would be to accept credit cards - but it wouldn't take much to convince Visa and Mastercard not to let their services be used, if not turn over details of everyone who tried to buy ecash. Cheques, TTs etc seem too cumbersome to be marketable, and, once again, too easy to trace - at least at first glance. The problem stems, I think, from trying to satisfy two seemingly opposed requirements - the customer must be sure who they are paying, but the authorities must not know the customer is paying the bank. Any ideas? [Another problem occurs to me. Alice's Awsome XXX CD-Rom Shoppe accepts BCp's BlackCash[TM]. Simon from the SEC buys a CD with BlackCash. "Asian Teenage Leather Maidens" duly arrives, and Simon arrests Alice for dealing in unauthorised securities (and unauthorised dealing in securities etc)...] I think I'll stop before I talk myself out of the whole thing :-) Cheers Dm -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHtVEVlo3j8JHzalAQHT9wP/TV0AN7o4/yfkKw3G4SPrZWUO+LUFdDnD a9v6OKUZZ8LrPQ/XORq3dvtOFtJ6GNiOPZkAWQQI9Rm792PcW4mdF+ppKynjgt0A olK/wFnbBVhYwoEOXvqaC+ZwCTbaewpydEi3OEPGRoXbpDaYxQkfAj7K0dPT21sz TjV5qM+rt+M= =dTqF -----END PGP SIGNATURE----- [Palmtop News Reader - Beta Version 3] From garnett at wombat.catbelly.com Tue Oct 10 23:07:06 1995 From: garnett at wombat.catbelly.com (Santiago de la Paz) Date: Tue, 10 Oct 95 23:07:06 PDT Subject: PC disk wipe software In-Reply-To: <199510110319.AA32344@junkers.lochard.com.au> Message-ID: <199510110606.AAA08734@wombat.catbelly.com> > People do record their incoming and outgoing email. Smart ones will store it > offsite (auto farward to their home machine). Others will pgp them online. > Mostly though the cleartext email files will be happily archived away each > night to the nice friendly DAT tape down the corridor in the machine room. I mistakenly interpreted the original posting as "outgoing only." Incoming mail must certainly be saved; however, backing up an outgoing mail spool on a busy machine is senseless. By "busy", I mean "that machine which serves as a mail server". Outboxes change the situation, but they are not universal. > Me, I just nuke any sensitive information that may arrive in my work mbox, > or save/forward it to a safer place. I discourage people from using my work > address as a regular personal contact point. This brings up an interesting point, namely: where is your email secure? If the FBI or security agency of your choice decides to clamp a legal hold upon the machines upon which you work, they surely wouldn't be so foolish as to forget about your home machine over that frame-relay or ppp/slip link. In such a situation, telling people to use any mailbox at all is useless unless they encrypt with a relatively secure encryption package, z.B. pgp. > Also ensure your admins aren't the nosy types. I started work at one place > and noticed in the /.sh_history file that the previous admin was regularly > grepping peoples mail spools for his name. This caused some concern to the > management when they were informed. Obviously these forays were not part of > his everyday job and were a personal endeavour. This is a problem, and almost certainly more of a problem than security agencies demanding your backup tapes. There's also no way around it; the only solution is encryption. ~james From jpb at miamisci.org Tue Oct 10 23:20:34 1995 From: jpb at miamisci.org (Joe Block) Date: Tue, 10 Oct 95 23:20:34 PDT Subject: How to hold a key signing party? Message-ID: -----BEGIN PGP SIGNED MESSAGE----- At 5:59 PM 10/10/95, you wrote: >Joe Block writes: > > What I have in mind is to have everyone who is planning on attending send > > me their key and its fingerprint.... > > > > This seems like a lot of work, which I don't mind, but if there is a more > > efficient method, I'd like to know about it. > >Doesn't make any difference to me, you nefarious agent of the Great >Man In The Middle you. > > > >[ You got to get up *pretty early in the morning* to put one over on >*me* like that. ] Each person at the party would confirm what their key signature was so the other attendees could check their handout. They then take the handout that they have personally checked the key signatures on home with them so that when they recieve the keys from yours truly they can compare the fingerprint they get with the fingerprint the owner claimed for the key, which they checked against the handout when they were at the party, yes? -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBMHtiEWGnwFiC3O2NAQFo5ggArfaPrtROH9QmB0luwrliH92fEguQAekd EsY46cEt1tGP3wXzvbVf6ArzZf/cs60Rsj71ufGVmPytF88VNfo/av0LhCGtNKAh imTTcWaFvMsSnpEm3qAUAWSJK5WVVlkW7wV0ZEt8YVrX7QZCaXqq2rKzCPwSh3Ga VToHUDBbRESgEOkS1FxKluZiXa1Ym5P4Nwepno72TXvn/V2flc7iItV0WpLbaL4p abNwCP/haFViMeg8QbmMXP5+hojFnptK/v7Wc/D7XlRFB6CezAY/duHBwPsNueWI t4zegApZulk/nJ9da319etZ8OPMWIy0Li7cHlfvwd4/7kbsDmJoLJg== =1qlc -----END PGP SIGNATURE----- From don at cs.byu.edu Tue Oct 10 23:59:21 1995 From: don at cs.byu.edu (don at cs.byu.edu) Date: Tue, 10 Oct 95 23:59:21 PDT Subject: MITM garbage Message-ID: <199510110408.WAA00256@wero.byu.edu> -----BEGIN PGP SIGNED MESSAGE----- Scott Brickner writes: >By "successful" I mean communicating without the MITM *interfering*. >Either the parties need to exchange a symmetric key without the MITM >eavesdropping, or exchange asymmetric keys without the MITM modifying >them. First of all, I think this "you can't prove there's no MITM, so might as well not use crypto at all" stuff that some people believe is garbage. Once you've successfully gotten your key out, Mitch can't expect to mount an effective MITM attack "against" you. [isolating someone else from you is a different story] In fact, Mitch can't really MITM anyone who has any kind of cryptocontact with the general public. Obtaining a single non-mitch public key cuts the attack down the middle. Being able to get your key out without it being intercepted also foils the attack, since one there is suspicion of a MITM attack, people are going to investigate. You can't erase crypographic evidence of MITM activity, either. So, once your keys are actually "out there", you can no longer be effectively attacked without leaving messy trails here or there. The other problem, of course, is how do you know you haven't already been MITM'd. You don't. You can't, unless you expose it by publishing your key to someone though a channel that can't be D.O.S.'d. Publishing a hash/sig of future posts is not terribly practical, because not only does the hash/sig have to be expected beforehand but what the hash is for has to be known as well. If I publish a detached signature of something (could be my key, or might not be) then Mitch will just have to make something up, make a sig for it, and publish THAT. Posting the source code to RC5, for example, after sending out a hash first means that Mitch will have to send out whatever it was he hashed in place of my hash, and then make HIS hash of RC5 code, then quickly follow up with the actual code that I was kind enough to mail to him. And since Medussa is by definition "in the middle" I don't ever realize that any of that happened. I suppose the "overloading the processors" works well if you can be sure you've overloaded it, which means not only that you know already what Mitch's power is, but you know of someone else (a group perhaps) that has even MORE power, such that Mitch will stick out in the timing. So, if you ask me, none of _those_ methods are very trustworthy considering the resources you have to have already assigned to Mitch - after all, keeping a 24 hour Medussawatch on you and your whole ISP is tough work. Going _through_ Mitch is not easy. >The chance of failure is minimized by diversity in the channels used to >try to bypass the MITM. I agree-On the other hand, it's not terribly difficult to go _around_ Mitch. I mean, just how many of the following things has Mitch done: Watch all the ISP's in town and all the phone lines you can use to call them. Filter your work/school ISPs. Filter all your net-using neighbors, co-workers, and friends' accounts. etc. All it takes is to get one non-Mitch public key. Of course, once the MITM gig is up, the option of locking you in a room since 1983 will make Mitch the "new you", meaning there is no longer a middle. (Fortunately, though, Bob was MITM'ing Mitch at the same time, and now you're both out of the loop and Bob has the goods now, cuz what's Mitch gonna do about it?) >you can't afford a failure, you *do* need a channel over which you have >nearly complete control. The simplest such channel is a physical >meeting, during which you exchange public keys. If the MITM threat is How do you know you're not giving your key to Mitch. And how do you know that Mitch isn't headed over to Alice's later on to pretend to be you and give Alice "your" key? Don "Medussa for short" -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQB1AwUBMHtC+sLa+QKZS485AQEEmwL+NbEoXoeJPEBKGFev8gLWBCIoniyXS4o5 YyyGnkfTjsc/DimbU15z++d/fcihUzwK/dLKBXub3fdxcna9m9YyLNEdo8QyhPNb /Wp6PKq9SdfMb6uCzgoVwg7PrtTZzZEe =jN+h -----END PGP SIGNATURE----- fRee cRyPTo! jOin the hUnt or BE tHe PrEY PGP key - http://bert.cs.byu.edu/~don or PubKey servers (0x994b8f39) June 7&14, 1995: 1st amendment repealed. Junk mail to root at 127.0.0.1 * This user insured by the Smith, Wesson, & Zimmermann insurance company * From sameer at c2.org Wed Oct 11 00:01:37 1995 From: sameer at c2.org (sameer) Date: Wed, 11 Oct 95 00:01:37 PDT Subject: PC disk wipe softwar In-Reply-To: <199510110113.TAA08320@wombat.catbelly.com> Message-ID: <199510110656.XAA28320@infinity.c2.org> Excuse me? Yes, most systems back up everything. I run an ISP. We back up -everything- (well not netnews), nightly. > > > > Often files retrieved include e-mail thought to have been > > erased long ago. It survives because the diligent > > computer system manager makes backup tapes of everything > > on the system every night, then stores those tapes for > > years. > > Uh... they back up their *mail* spools? Yeah, right. > > ~james > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From sameer at c2.org Wed Oct 11 00:04:46 1995 From: sameer at c2.org (sameer) Date: Wed, 11 Oct 95 00:04:46 PDT Subject: Hal's Third Challenge? In-Reply-To: <199510102312.AA37668@junkers.lochard.com.au> Message-ID: <199510110659.XAA28427@infinity.c2.org> > IMHO we owe Netscape some counter pr against m$, we've proved our point to > Netscape and they performed admirally by being open and responsible to the > net.community. Whilst it didnt seem to dent their share value, they did cop This is old news. http://www.c2.org/hackmsoft/ has been around for multiple weeks now. > some bad press (and some media weenies still think their product is broken) > because of the groups efforts. What goads me is m$ trying to use this in > their press dealing and acting like this is entirely different from their > situation. Seems to me they need it proved to them that because of their > proprietary attitude they are in a worse position. In short bring them down > to earth and serve their ego to them on a plate. > > Cheers, > Mark > mark at lochard.com.au > The above opinions are rumoured to be mine. > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From tcmay at got.net Wed Oct 11 00:24:59 1995 From: tcmay at got.net (Timothy C. May) Date: Wed, 11 Oct 95 00:24:59 PDT Subject: Man in the Middle Revisited (but not for the last time) Message-ID: I suspect I'm not the only one getting weary of going around and around on this issue, so I'll confine my response to just one point: At 3:37 AM 10/11/95, Bryce wrote: >> Who any of these entities "really" are is irrelevant to me. (I don't even >> know if Hal Finney, who I met once a few years ago, is the "real" Hal >> Finney, nor do I really care.) > > >Well and good, Tim, but you *do* care if the entity calling itself "Hal >Finney" is being surrounded by the Man in the Channel ("Mitch") and all >of your communications with that entity are under Mitch's control. For >example, you may choose to enter a contract with the entity calling >itself "Hal Finney", and provide some sort of consulting service to it >in exchange for 10,000 cyberbucks. If Mitch is actually in control >then he could easily steal both the output of your consultation *and* >Hal's 10,000 cyberbucks and leave the two of you hating each other. Nope. au contraire, negatory. I *do not* care if the entity calling itself "Hal Finney" is being surrounded by an MITM. Only "Hal Finney the Key" can read messages I encrypt to the public key I got from him long ago, so if the "Hal + MITM" can do so, they are effectively one and the same. (Not really, in some other senses, but far beyond anything simple crypto can handle.) --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From garnett at wombat.catbelly.com Wed Oct 11 00:50:12 1995 From: garnett at wombat.catbelly.com (Santiago de la Paz) Date: Wed, 11 Oct 95 00:50:12 PDT Subject: PC disk wipe softwar In-Reply-To: <199510110656.XAA28320@infinity.c2.org> Message-ID: <199510110750.BAA08909@wombat.catbelly.com> > Excuse me? Yes, most systems back up everything. I run an > ISP. We back up -everything- (well not netnews), nightly. Hmm. Any why *don't* you back up netnews? For more or less the same reasons it's not particularly useful to back up outgoing mail spools; to claim that "most systems do blah blah" is like saying that "most people like menudo." I, for one, don't. "{I/we} run an ISP" is a ubiquitous statement these days; everybody and his brother "runs an ISP." I know a drunken college dropout down the block with a limping sun 3/50 and two phone lines who prides himself on his ISP. What is not so common is common sense regarding privacy, ie there is not any real reason to back up an *outgoing* mail spool unless you want security_agency_of_ your_choice to come and root through your exabyte tapes next week. Now, as I mentioned in a followup, incoming mail is a different matter. At some point it loses its meaning, though: mail is mail, and it's all incoming somewhere. The only useful alternative is strong encryption of *all* messages, an alternative which solves both the nosy-sysadmin problem as well as styming the snooping legal beagles. ~james From weidai at eskimo.com Wed Oct 11 01:07:01 1995 From: weidai at eskimo.com (Wei Dai) Date: Wed, 11 Oct 95 01:07:01 PDT Subject: Internet, the cracking machine In-Reply-To: <9510101354.AA05988@outland> Message-ID: On Tue, 10 Oct 1995, Mike Fletcher wrote: > > Well, security bugs aside (and I've got the sun4.1.3_u1 and Win32 ns2b > distributions :) has anyone given any thought to using Java to do some > sort of Chinese Lottery attack. I was re-reading App. Crypto. last > night and it could be feasable. If you could get your key cruncher > thread loaded into a good many browsers to run when idle . . . . How > many estimated copies of NS are there? Anyone want to do the math? :) Ok, I'll bite. Let's figure out how many MIPS years it takes to brute force various keylengths (assuming 100 instructions per key): 56: 2e3 64: 6e5 80: 4e10 128: 1e25 Andrew M. Odlyzko in his paper "The Future of Integer Factorization" estimates the computing power of the Internet at 3e7, and the number of MIPS years to factor a 1024 RSA key to be 3e11. I think both numbers are probably off by a factor of 10 - Internet's computing power is probably closer to 3e8 and MIPS years to factor 1024-bit key may be closer to 3e10. So assuming that you can get the entire Internet to help you, the amount of time it takes for various attacks is: brute force keys of bit 56: 4 minutes 64: 1 day 80: 130 years 128: 3e16 years factor RSA keys of bit 512: 20 minutes 768: 50 days 1024: 100 years 2048: 1e11 years If you are reading this from an archive, divide the brute force numbers by 4**(your current year-1995), and the factoring numbers by 8**(your current year-1995), for a factor of 2 improvement per year in each of the following: average CPU power, number of computers on the Internet, and factoring algorithm. (Note that the above estimates are meant to err on the low side. I would be VERY surprised if anyone actually manages to accomplish any of the above attacks in the amount of time given.) Wei Dai From liberty at gate.net Wed Oct 11 01:37:03 1995 From: liberty at gate.net (Jim Ray) Date: Wed, 11 Oct 95 01:37:03 PDT Subject: Elementrix POTP Message-ID: <199510102120.RAA110954@tequesta.gate.net> -----BEGIN PGP SIGNED MESSAGE----- Hello again cypherpunks: Sorry to continue "beating a dead horse" here, but I forwarded a few C-punks' messages regarding the Elementrix "Power One-Time Pad" to this person, and I thought you might be interested in her (somewhat cryptic ) response. Forwarded message follows: ______________________________________________________________________ >Date: Tue, 10 Oct 1995 20:34:53 +0200 >From: Maia Aron >To: liberty at gate.net >Subject: Re: POTP > > >Hi, it took me a little while to respond; we've been getting a lot of >inquiries following the Interop show. > >The short answer is: everything that people are guessing we are, including >the guesses mentioned in the cypherpunks info you attached, is not what we >are. I.e., it's not an autokey cipher, it's not like DES, there is no way >to track relationships between yesterday's and today's ciphertexts. The >encryption is not done by using an encryption algorithm. > > Unfortunately, and we really mean unfortunately, we can only reveal what >"it is" to people who agree to a non-disclosure arrangement while we're >patent pending. Otherwise we would have no problem revealing the whole >method. So far, every international expert who has reviewed the method >agrees (after many, many hours and days of trying to find holes) that POTP >really does what we say it does. > >You can share this with whomever you'd like. Sorry I can't say much more. > > > >Regards, > >Maia Aron >Vice President, Marketing >Elementrix Technologies Inc. >850 Third Avenue >New York, NY 10022 > >phone: 212-888-8879 >fax: 212-935-3882 >email: maia at elementrix.co.il ______________________________________________________________________ End of forwarded message. So, I guess we know what they *aren't*, but not what they *are*...Is this the first example (in modern history) of encryption that's *not* done by using an encryption algorithm, or am I just missing something? JMR -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Freedom isn't Freeh iQCVAwUBMHrisW1lp8bpvW01AQEauQQAlFI8Xu3w1Zjo53rnejjp/UqVw9f9Gdfa I4/bHqnpsJHI+W+HPbCzjWHV30lNJzMW1wWDBNpqNmjOr5jYmYJN7x0SX8QrXmCT sZlrM0Pc+Pzc9OvsB/tw8T0bwXWPMi5b3qu5jQwHp5e+aujCdQRSr7digJscVhEN i+WwbMEPFa8= =Psa8 -----END PGP SIGNATURE----- Regards, Jim Ray Ray's Corolary to Murphy's Law: "You will be spared _NOTHING_." -- Peter C. Ray [my dad]. ----------------------------------------------------------------------- PGP key Fingerprint 51 5D A2 C3 92 2C 56 BE 53 2D 9C A1 B3 50 C9 C8 Key id. # E9BD6D35 James Milton Ray IANAL ----------------------------------------------------------------------- Help Phil! email zldf at clark.net or see http://www.netresponse.com/zldf _______________________________________________________________________ From anon-remailer at utopia.hacktic.nl Wed Oct 11 01:55:32 1995 From: anon-remailer at utopia.hacktic.nl (Anonymous) Date: Wed, 11 Oct 95 01:55:32 PDT Subject: MITM evasionMITM evasion Message-ID: <199510110855.JAA17966@utopia.hacktic.nl> Two years ago, I pointed out that getting a single message past the man in the middle isn't good enough; you have to convince your readers that the key they received on one channel is more accurate than the key they're receiving on all the other channels. But if they'll believe that, they may also believe the man in the middle's announcement that the key in your name on all the keyservers is wrong, and the correct key is the one he's putting out. Can't win either way, but it's still important to get the key out. My current key is 0x54696D4D; the fingerprint is 4D 65 44 75 53 61 21 2F 41 73 55 64 85 6D 21 7F. .......................................................................... Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at sensemedia.net | anonymous networks, digital pseudonyms, zero 408-728-0152 | knowledge, reputations, information markets, Corralitos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: PGP and MailSafe available. "National borders are just speed bumps on the information superhighway." From buster at klaine.pp.fi Wed Oct 11 01:56:16 1995 From: buster at klaine.pp.fi (Kari Laine) Date: Wed, 11 Oct 95 01:56:16 PDT Subject: Elementrix POTP In-Reply-To: <199510102120.RAA110954@tequesta.gate.net> Message-ID: > Unfortunately, and we really mean unfortunately, we can only reveal what >"it is" to people who agree to a non-disclosure arrangement while we're >patent pending. Otherwise we would have no problem revealing the whole >method. So far, every international expert who has reviewed the method >agrees (after many, many hours and days of trying to find holes) that POTP >really does what we say it does. Maybe you could name those experts who have inspected it - thanks. Kari From rschlafly at attmail.com Wed Oct 11 01:58:40 1995 From: rschlafly at attmail.com (Roger Schlafly) Date: Wed, 11 Oct 95 01:58:40 PDT Subject: PKP Lawsuit progress report Message-ID: I have a lawsuit against Public Key Partners and RSA Data Security. (Schlafly v. PKP & RSA, Case C-94-20512 SW PVT.) (1) PKP has been ordered dissolved by an arbiter. The MIT patent returns to RSA Data Security, and the Stanford patents go under the control of Cylink. I am happy to report that my lawsuit contributed to this outcome. (2) I will soon be deposing: Whit Diffie Ralph Merkle Martin Hellman Ron Rivest I will be asking all the obvious questions. My purpose is to break their patents. Does anyone have anything special for me to ask? If so, please send me your ideas. (3) There will be a hearing on the patent validity (and a couple of annoying technical legal issues) at 10:00 am, Dec. 6, 1995, in the court of Judge Spencer Williams, Federal Bldg, 280 S. First St, San Jose CA 95113. The US court clerk is at 408-291-7783. It is open to the public. Roger Schlafly rschlafly at attmail.com From asb at nexor.co.uk Wed Oct 11 02:08:46 1995 From: asb at nexor.co.uk (Andy Brown) Date: Wed, 11 Oct 95 02:08:46 PDT Subject: Hal's Third Challenge? In-Reply-To: <"swan.cl.cam.:012510:951010200606"@cl.cam.ac.uk> Message-ID: On Tue, 10 Oct 1995, Piete Brooks wrote: > It seems that microsoft was the one to go for, as they too use 40 bit for > each session .... If someone can generate the CRACKing code and someone can > donate an example, I'd be DELIGHTED to arrange another BRUTE ! If you mean STT, they're using a hotch-potch of methods in the exportable version. 40 bit RC4 protects the purchase order form and receipt, single DES-CBC protects the financial data and they claim that direct RSA protects the credit card numbers although this is far from clear from the specification (can someone clarify this?). So you're going to need brutedes and/or some network factoring code (the smallest modulus they use is 512 bits which, realistically we do not have a chance of attacking in a reasonable time). Regards, - Andy +-------------------------------------------------------------------------+ | Andrew Brown Internet Telephone +44 115 952 0585 | | PGP (2048/9611055D): 69 AA EF 72 80 7A 63 3A C0 1F 9F 66 64 02 4C 88 | +-------------------------------------------------------------------------+ From jsw at netscape.com Wed Oct 11 02:23:10 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Wed, 11 Oct 95 02:23:10 PDT Subject: Checksums for current release versions of Netscape Navigator Message-ID: <199510110921.CAA29846@ammodump.mcom.com> -----BEGIN PGP SIGNED MESSAGE----- This file contains checksums for the Netscape Navigator 1.12 and 1.22 distributions and patch files that are available on the Netscape ftp site under the directory ftp://ftp.netscape.com/netscape/. This file has been digitally signed using PGP to assure its authenticity. The version of PGP which was used to create the digital signature on this document was obtained from http://bs.mit.edu:8001/pgp-form.html/. This file was signed using my private key. It can be obtained from my web page using this URL: http://home.netscape.com/people/jsw/my-pgp-key.txt or by searching for 'jsw at netscape.com' from the PGP key server at mit: http://www-swiss.ai.mit.edu/~bal/pks-commands.html#extract There are three sets of checksums in this file. The first set of checksums uses MD5 to create 128-bit checksums that can not be forged. The second and third sets of checksums were generated using the two forms of the unix 'sum' command. The 'sum' command creates a 16-bit checksum, which can be used detect accidental corruption during download, but is too small to protect you from malicious tampering. There are two version of the checksums for the unix 'sum' command because unix vendors follow two different standards. I have labeled the checksums with the systems that they are good for. If you are performing the checksum operation on a unix system that is not listed, check both lists and make sure that one matches. --Jeff ============================================================ These MD5 checksums were generated with the 'md5sum' program from the PGP2.6.2 distribution, which was obtained from http://bs.mit.edu:8001/pgp-form.html/. 4355327d682ee02b34384cbb30e8042d ./mac/netscape-1.12.hqx 314326ea7f6e16a7ed51b4ddd32830dc ./mac/patch_1.1_to_1.12/nscp_1.1_68K_update.hqx af1e3a626a3ba3e903e9268bdacdd879 ./mac/patch_1.1_to_1.12/nscp_1.1_FAT_update.hqx dc70e43f7541cdcca334cf81a53fe5ab ./mac/patch_1.1_to_1.12/nscp_1.1_PPC_update.hqx 44ab217346102d4bd3c8b648ac915eb7 ./unix/netscape-v112-export.alpha-dec-osf2.0.tar.Z 2b359e275d4f18fc532cc33eeda05f06 ./unix/netscape-v112-export.hppa1.1-hp-hpux.tar.Z 5eaba5768b4bc35e869659a720221eec ./unix/netscape-v112-export.i386-unknown-bsd.tar.Z 0b94e22d6e103dc1425eb5587be5e639 ./unix/netscape-v112-export.i486-unknown-linux.tar.Z 858389abea7cd4aa2211d28e4637cbf8 ./unix/netscape-v112-export.mips-sgi-irix5.2.tar.Z 0a8dedc135abe48405cd663d77a53496 ./unix/netscape-v112-export.rs6000-ibm-aix3.2.tar.Z 40a1c0418d4273b198bf82f4520bc483 ./unix/netscape-v112-export.sparc-sun-solaris2.3.tar.Z 5f0e785bdf1e7e6fadeb79a3cc77daf5 ./unix/netscape-v112-export.sparc-sun-sunos4.1.3_U1.tar.Z d9e4b2c7d5b18992d900c3299fbbcf33 ./windows/n16e122.exe fd59a0505d0e29a20703409e47eef9ee ./windows/n32e122.exe 9cef44bb905ce05af46012482f1b1e28 ./windows/patch122/n16d122p.exe 77e5634c83b79615e8d085c9187721d7 ./windows/patch122/n32d122p.exe ============================================================ These checksums were generated using the Unix 'sum' command. These checksums are for the form of the sum command that is on SGI IRIX and HPUX systems. 33513 2993 ./mac/netscape-1.12.hqx 56041 482 ./mac/patch_1.1_to_1.12/nscp_1.1_68K_update.hqx 36637 859 ./mac/patch_1.1_to_1.12/nscp_1.1_FAT_update.hqx 28284 460 ./mac/patch_1.1_to_1.12/nscp_1.1_PPC_update.hqx 39304 5287 ./unix/netscape-v112-export.alpha-dec-osf2.0.tar.Z 26165 4285 ./unix/netscape-v112-export.hppa1.1-hp-hpux.tar.Z 37396 3262 ./unix/netscape-v112-export.i386-unknown-bsd.tar.Z 26207 3164 ./unix/netscape-v112-export.i486-unknown-linux.tar.Z 39858 2068 ./unix/netscape-v112-export.mips-sgi-irix5.2.tar.Z 6109 2000 ./unix/netscape-v112-export.rs6000-ibm-aix3.2.tar.Z 2249 3420 ./unix/netscape-v112-export.sparc-sun-solaris2.3.tar.Z 62215 7254 ./unix/netscape-v112-export.sparc-sun-sunos4.1.3_U1.tar.Z 18716 3254 ./windows/n16e122.exe 20238 3494 ./windows/n32e122.exe 6931 210 ./windows/patch122/n16d122p.exe 34741 480 ./windows/patch122/n32d122p.exe ============================================================ These checksums were generated using the Unix 'sum' command. These checksums are for the form of the sum command that is on Sun, DEC OSF/1, AIX, BSDI, and Linux systems. 51500 1497 ./mac/netscape-1.12.hqx 43890 241 ./mac/patch_1.1_to_1.12/nscp_1.1_68K_update.hqx 62256 430 ./mac/patch_1.1_to_1.12/nscp_1.1_FAT_update.hqx 09953 230 ./mac/patch_1.1_to_1.12/nscp_1.1_PPC_update.hqx 32352 2644 ./unix/netscape-v112-export.alpha-dec-osf2.0.tar.Z 03948 2143 ./unix/netscape-v112-export.hppa1.1-hp-hpux.tar.Z 02857 1631 ./unix/netscape-v112-export.i386-unknown-bsd.tar.Z 17319 1582 ./unix/netscape-v112-export.i486-unknown-linux.tar.Z 53470 1034 ./unix/netscape-v112-export.mips-sgi-irix5.2.tar.Z 05441 1000 ./unix/netscape-v112-export.rs6000-ibm-aix3.2.tar.Z 02463 1710 ./unix/netscape-v112-export.sparc-sun-solaris2.3.tar.Z 17806 3627 ./unix/netscape-v112-export.sparc-sun-sunos4.1.3_U1.tar.Z 22208 1627 ./windows/n16e122.exe 04365 1747 ./windows/n32e122.exe 32585 105 ./windows/patch122/n16d122p.exe 37352 240 ./windows/patch122/n32d122p.exe -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHt6O6wWZfp0yzT1AQGrgwP/QF1AY9Wp44OjK0he3E+IRq9VbuxXrn1H NjNWuSxOLlWrDYiIDu9L+pbCmz2Fu8+3S9c8J4sz80Rzd73kT5xL8dfbQBb7GwqD Xot99yYrwNaSPRkixHk+n1M4sVHe2UO6u+tZJDYM2PFcy5Ycdw7qQGvEfy1rJTWN 8Y/tYU9eQx4= =lu96 -----END PGP SIGNATURE----- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at netscape.com Wed Oct 11 02:23:35 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Wed, 11 Oct 95 02:23:35 PDT Subject: Checksums for current beta versions of Netscape Navigator Message-ID: <199510110921.CAA29849@ammodump.mcom.com> -----BEGIN PGP SIGNED MESSAGE----- This file contains checksums for the Netscape Navigator 2.0 Beta 1 distribution files that are available on the Netscape ftp site under the directory ftp://ftp.netscape.com/2.0beta/. This file has been digitally signed using PGP to assure its authenticity. The version of PGP which was used to create the digital signature on this document was obtained from http://bs.mit.edu:8001/pgp-form.html/. This file was signed using my private key. It can be obtained from my web page using this URL: http://home.netscape.com/people/jsw/my-pgp-key.txt or by searching for 'jsw at netscape.com' from the PGP key server at mit: http://www-swiss.ai.mit.edu/~bal/pks-commands.html#extract There are three sets of checksums in this file. The first set of checksums uses MD5 to create 128-bit checksums that can not be forged. The second and third sets of checksums were generated using the two forms of the unix 'sum' command. The 'sum' command creates a 16-bit checksum, which can be used detect accidental corruption during download, but is too small to protect you from malicious tampering. There are two version of the checksums for the unix 'sum' command because unix vendors follow two different standards. I have labeled the checksums with the systems that they are good for. If you are performing the checksum operation on a unix system that is not listed, check both lists and make sure that one matches. --Jeff ============================================================ These MD5 checksums were generated with the 'md5sum' program from the PGP2.6.2 distribution, which was obtained from http://bs.mit.edu:8001/pgp-form.html/. e4d757027c1178aecc06c145f20ab204 mac/netscape-2.0b1.hqx 5d52a03be4a624290203bc039dd28349 unix/netscape-v20b1-export.alpha-dec-osf2.0.tar.Z f0f31cddacccbbfcdd8246ced2e7617a unix/netscape-v20b1-export.hppa1.1-hp-hpux.tar.Z d1e3aeda9f5f420f60a490f542e79afb unix/netscape-v20b1-export.i386-unknown-bsd.tar.Z 50b9ebbefd85d6aec7148bc1bbce98ba unix/netscape-v20b1-export.i486-unknown-linux.tar.Z 0c36e244198f9bff06773bdfee9af0f9 unix/netscape-v20b1J-export.mips-sgi-irix5.2.tar.Z c96cb263338b41b9ea760b51924ad6ec unix/netscape-v20b1J-export.sparc-sun-solaris2.3.tar.Z f07c96bb55082e5f55673db802eef3aa unix/netscape-v20b1J-export.sparc-sun-solaris2.4.tar.Z 4608ad65f84d9cf348c80c5daaf7d1a3 unix/netscape-v20b1J-export.sparc-sun-sunos4.1.3_U1.tar.Z 2da4eb8323ff129cf45916d79ebf6786 unix/netscape-v20b1N-export.mips-sgi-irix5.2.tar.Z cb24fe8fdf8cd80fcaf38cb04ba58c09 unix/netscape-v20b1N-export.sparc-sun-solaris2.3.tar.Z 3d774018b74a829eb8e9c0d4b275c70e unix/netscape-v20b1N-export.sparc-sun-solaris2.4.tar.Z 6855b8b433a6c399fe648980b366ca17 unix/netscape-v20b1N-export.sparc-sun-sunos4.1.3_U1.tar.Z 9eb68bb9a253590db4c2b33ef5622857 windows/n16e20b1.exe 6b2ad80bab5e088c7ca1490180639a54 windows/n32e20b1j.exe 6d28d97b070047952cbef8c41e8f9969 windows/n32e20b1n.exe ============================================================ These checksums were generated using the Unix 'sum' command. These checksums are for the form of the sum command that is on SGI IRIX and HPUX systems. 42079 4073 mac/netscape-2.0b1.hqx 34756 3895 unix/netscape-v20b1-export.alpha-dec-osf2.0.tar.Z 51925 5265 unix/netscape-v20b1-export.hppa1.1-hp-hpux.tar.Z 2999 4176 unix/netscape-v20b1-export.i386-unknown-bsd.tar.Z 27660 4140 unix/netscape-v20b1-export.i486-unknown-linux.tar.Z 31887 4380 unix/netscape-v20b1J-export.mips-sgi-irix5.2.tar.Z 42699 5045 unix/netscape-v20b1J-export.sparc-sun-solaris2.3.tar.Z 13440 3493 unix/netscape-v20b1J-export.sparc-sun-solaris2.4.tar.Z 42771 10436 unix/netscape-v20b1J-export.sparc-sun-sunos4.1.3_U1.tar.Z 65334 3395 unix/netscape-v20b1N-export.mips-sgi-irix5.2.tar.Z 4778 4163 unix/netscape-v20b1N-export.sparc-sun-solaris2.3.tar.Z 19694 2631 unix/netscape-v20b1N-export.sparc-sun-solaris2.4.tar.Z 18032 9123 unix/netscape-v20b1N-export.sparc-sun-sunos4.1.3_U1.tar.Z 43870 3795 windows/n16e20b1.exe 57104 5160 windows/n32e20b1j.exe 15350 4031 windows/n32e20b1n.exe ============================================================ These checksums were generated using the Unix 'sum' command. These checksums are for the form of the sum command that is on Sun, DEC OSF/1, AIX, BSDI, and Linux systems. 55511 2037 mac/netscape-2.0b1.hqx 33305 1948 unix/netscape-v20b1-export.alpha-dec-osf2.0.tar.Z 11463 2633 unix/netscape-v20b1-export.hppa1.1-hp-hpux.tar.Z 20324 2088 unix/netscape-v20b1-export.i386-unknown-bsd.tar.Z 00757 2070 unix/netscape-v20b1-export.i486-unknown-linux.tar.Z 40936 2190 unix/netscape-v20b1J-export.mips-sgi-irix5.2.tar.Z 02777 2523 unix/netscape-v20b1J-export.sparc-sun-solaris2.3.tar.Z 02868 1747 unix/netscape-v20b1J-export.sparc-sun-solaris2.4.tar.Z 20826 5218 unix/netscape-v20b1J-export.sparc-sun-sunos4.1.3_U1.tar.Z 57613 1698 unix/netscape-v20b1N-export.mips-sgi-irix5.2.tar.Z 20105 2082 unix/netscape-v20b1N-export.sparc-sun-solaris2.3.tar.Z 34742 1316 unix/netscape-v20b1N-export.sparc-sun-solaris2.4.tar.Z 49054 4562 unix/netscape-v20b1N-export.sparc-sun-sunos4.1.3_U1.tar.Z 35104 1898 windows/n16e20b1.exe 07688 2580 windows/n32e20b1j.exe 26580 2016 windows/n32e20b1n.exe -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHuLwawWZfp0yzT1AQHBIAQAveA07AVIwD2AbeLiwGhP36MArzbYE91j A+eB10U5asUND9Y0RlcnP0Mrlwt6as6qUhC0n3OLlUFgXdijyXAUBDmCMA3XUBzg V0vIkYP5FaJh/AAPj0CMT0NPipMJDdlv679PTIEttx7jW8Wa9ZF8pholmcsE5mFQ 0vNOdeeA/mU= =OHV8 -----END PGP SIGNATURE----- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jya at pipeline.com Wed Oct 11 02:48:02 1995 From: jya at pipeline.com (John Young) Date: Wed, 11 Oct 95 02:48:02 PDT Subject: NYT on Internet Flaws Message-ID: <199510110939.FAA26747@pipe4.nyc.pipeline.com> The New York Times, October 11, 1995, pp. A1, D3. [Page One] Discovery of lnternet Flaws Is Setback for On-Line Trade By John Markoff San Francisco, Oct. 10 -- Newly publicized weaknesses in the basic structure of the Internet indicate that the worldwide computer network may need a time-consuming redesign before it can be safely used as a commercial medium. The flaws could allow an eavesdropper or criminal to divert many types of documents or software programs traveling over the Internet, examine or copy or alter them, and then pass them on to the intended recipient -- who would have no easy way of knowing that the files had been waylaid. Not only could electronic mail be read in transit or credit card numbers be copied en route, but special security techniques meant to protect such transactions could be dismantled without the user's knowledge. That such security flaws exist is not surprising in a system designed originally as a scientific experiment. But the recent rush to the Internet by companies seeking to exploit its commercial possibilities has obscured the fact that giving the system a new purpose has unearthed fundamental problems that could well put off true commercial viability for years. "Companies would have you believe this is a trivial problem," said Eric Brewer, a professor of computer science at the University of California at Berkeley. "But now there is a financiat incentive to exploit these flaws and to do it secretly." The problems were described in a posting that researchers at the university made on Monday to several on-line discussion groups. While the discussion groups are intended for computer security experts, they are potentially accessible to millions of Internet users -- including break-in artists, who are known to monitor such discussion groups for tips on new ways to crack computer systems. The researchers who described the Internet weaknesses include two Berkeley computer science graduate students who noted a security weakness in a popular Netscape Communications Corporation software program last month. Then as now, the students' stated motivation in publicizing the problems was to underscore vulnerabilities facing all companies and customers wishing to use the Internet for commerce. When the Netscape problems were disclosed last month, the company said the security flaws would be corrected in the next version of its software, which users would be able to download at no charge from Netscape's Internet site. But the newly publicized flaws in the Internet itself indicate that even if a user downloaded a copy of the new, improved Netscape program, a criminal could tamper with the copy along the way and make it unsafe for use in credit card transactions. The problem is not Netscape's alone; it potentially affects any organization that operates a computer from which files or software could be downloaded over the Internet. The weakness can be traced to the technical underpinnings of the network, which was set up more than a quarter-century ago not as a medium for conducting business but as a way for academic and scientific researchers to exchange information. The disclosure of the flaws casts doubt on the aspirations of companies like Netscape, which last summer had one of the most successful stock offerings in Wall Street history based on the promise of the impending arrival of a full-fledged on-line marketplace. "Companies should take a step back and think about this a little more," said Ian Goldberg, one of the Berkeley students. "If it takes a bit longer but comes out more secure, we will all be better off in the long run." The way many Internet systems are set up -- especially the Internet's increasingly popular World Wide Web service in which software images and even video and audio clips can be easily downloaded -- information is stored on a computer called a file server and then transferred to a user's computer when it is needed. The newly publicized weakness occurs in a widely used Internet protocol -- or technical standard -- known as the Network File System, or NFS. Because NFS does not have any means for allowing the recipient of a program or document to verify that it has not been altered during transmission from the file server to the user, any interception or tampering would go undetected. "The Internet protocols have been insecure since day one," said Jeffrey I. Schiller, the manager of computer networks at the Massachusetts Institute of Technology and director of an industry task force that is trying to design a new secure version of the Internet. But the group's timetable is uncertain, and even when it does have recommendations ready, Mr. Schiller is not optimistic that the industry will be willing to devote the time and money to put them into effect. He said that many technologies already exist for improving commercial security on the Internet, but many of them require too much technical sophistication on the part of computer users. He criticized makers of hardware and software for not moving more quickly to make easy-to-use security features a built-in part of the technology used on the Internet. "The people who should be the leaders in offering security have been too busy counting their money to build these features in to their products," Mr. Schiller said. Some commercial Internet merchants have tended to play down the potential for harm from an illegal interception of credit card information over the Internet. They point out that consumers routinely make their credit card numbers available in transactions done by mail or telephone and that the law puts limits on a consumer's liability in cases of credit card fraud. But Mr. Brewer, the Berkeley professor, said that the crucial difference in the proposed Internet commerce systems was that for the first time it would be relatively simple for a criminal to collect hundreds or thousands of credit card numbers. Then a thief could use each credit card only one time, making detection much more difficult. Sensitive to heightened concerns about security, Wells Fargo, the large California bank, which earlier this year began permitting customers with personal computers to view their account information with the Netscape software, suspended the service in September after the Berkeley students reported the flaw in Netscape. After Netscape followed with an improved version of its software, Wells Fargo officials found it secure enough that they planned to resume the service later this week. The bank will, however, require customers to use the corrected version of the Netscape program. Even then. Wells Fargo customers will be able only to view account balances and other information, but not transfer money or conduct other transactions of the type that might leave them vulnerable to the Internet NFS weakness. "We still hope to be able to offer transactional capabilities next year, but this has slowed us down a little bit," said Lorna Doubet, a Wells Fargo spokeswoman. "Many of our customers feel that security is absolutely essential and we have to be cautious in this regard." Executives at Netscape said yesterday that they were aware of the security issues surrounding NFS and would make changes in the next release of their software expected before the end of the year to permit a recipient of a downloaded program to check it for signs of tampering. And hoping to take advantage of the fault-finding talents of the Berkeley researchers and other like-minded software experts, the company announced a contest today called Netscape Bugs Bounty, in which Netscape will award prizes to users who find bugs or security loopholes in its software. Some Internet experts said they expected that many security weaknesses like the one the Berkeley group had demonstrated would be found, because the Internet was simply not designed to insure secure commerce. "Imagine a walled town or a house," said Noel Chiappa, a member of the Internet Engineering Task Force, a standards-setting group. "It doesn't matter if 99 windows are tight as can be -- if the 100th is wide open, the bad guys will bypass your security. " [End] From edge at got.net Wed Oct 11 02:52:20 1995 From: edge at got.net (Jay Campbell) Date: Wed, 11 Oct 95 02:52:20 PDT Subject: MITM evasion Message-ID: <199510111005.DAA25739@you.got.net> The message below (posted earlier today) caught my attention - I believe it is a (fake?) MITM-generated message, because Tim's sig file has changed recently (new domain name (got.net) and a disclaimer was added). The sig attached to this anonymous message is at least a month out of date. Even if this isn't just a mistake, it's not a true MITM attack, since this is a third party /not/ between Tim and toad.com ... more of a spoof. Do I win anything? >Return-Path: owner-cypherpunks at toad.com >Date: Wed, 11 Oct 1995 09:55:07 +0100 >Subject: MITM evasion >To: cypherpunks at toad.com >Subject: MITM evasion >From: anon-remailer at utopia.hacktic.nl (Anonymous) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ >Organization: Hack-Tic International, Inc. >Comments: Hack-Tic may or may not approve of the content of this posting >Comments: Please report misuse of this automated remailing service to >Sender: owner-cypherpunks at toad.com > >Two years ago, I pointed out that getting a single message past >the man in the middle isn't good enough; you have to convince your Unconvinced, for one ^^^^^^^^ >readers that the key they received on one channel is more accurate >than the key they're receiving on all the other channels. >But if they'll believe that, they may also believe the man in the middle's >announcement that the key in your name on all the keyservers is >wrong, and the correct key is the one he's putting out. >Can't win either way, but it's still important to get the key out. > >My current key is 0x54696D4D; the fingerprint is >4D 65 44 75 53 61 21 2F 41 73 55 64 85 6D 21 7F. This key isn't registered with the MIT keyserver; not proof in any sense, but worth mentioning. > >.......................................................................... >Timothy C. May | Crypto Anarchy: encryption, digital money, >tcmay at sensemedia.net | anonymous networks, digital pseudonyms, zero >408-728-0152 | knowledge, reputations, information markets, >Corralitos, CA | black markets, collapse of governments. >Higher Power: 2^756839 | Public Key: PGP and MailSafe available. >"National borders are just speed bumps on the information superhighway." > > -- Jay Campbell Regional Operations Manager -=-=-=-=-=-=- Sense Networking (Santa Cruz Node) edge at got.net MIT PGP KeyID 0xACAE1A89 "On the Information Superhighway, I'm the guy behind you in this morning's traffic jam leaning on his horn." From jya at pipeline.com Wed Oct 11 03:25:40 1995 From: jya at pipeline.com (John Young) Date: Wed, 11 Oct 95 03:25:40 PDT Subject: Enigma Message-ID: <199510111025.GAA00819@pipe4.nyc.pipeline.com> The NYT reports today on a British best-selling novel about breaking the Enigma codes, published this month in the US: Enigma, by Robert Harris, Random House. Harris interviewed many of the people who worked at Bletchley Park, and, most challenging, had to wrestle with complex mathematics to explain how the codes were broken ... by an elite comprised of an eccentric band of British and refugee intellectuals, aided by young women carefully picked from upper-class British families. So, Mr. Harris was asked, is the book a celebration of British amateurism? "There's a bit of that," he conceded. "Just as the British benefited from that tradition, the Germans were undone by the ruthless military efficiency, which made it easier to read their messages. The idea of brains taking on brute strength does have a certain romantic appeal." More than one reviewer said Harris was a thriller writer in the British tradition of Eric Ambler, Len Deighton, John Le Carre and John Buchan. "Harris has fashioned a story that is as humane, intelligent and gripping as documentary fiction can get, the critic Anthony Quinn wrote in The Financial Times. This is a story of intelligence, romance, twisted logic and necessary compromise," Peter Millar wrote in The Times of London, adding that it was "altogether top-class stuff." From rfb at lehman.com Wed Oct 11 04:11:29 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Wed, 11 Oct 95 04:11:29 PDT Subject: Graphic encryption and XV In-Reply-To: <9510061622.AA02423@ch1d157nwk> Message-ID: <9510111109.AA19990@cfdevx1.lehman.com> Does anyone have patches to XV that allow it to display a PGP encrypted image without having to explicitly decrypt it first? -- Rick Busdiecker Please do not send electronic junk mail! net: rfb at lehman.com or rfb at cmu.edu PGP Public Key: 0xDBD9994D www: http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rfb/http/home.html send mail, subject "send index" for mailbot info, "send pgp key" gets my key A `hacker' is one who writes code. Breaking into systems is `cracking'. From perry at alpha.jpunix.com Wed Oct 11 04:38:24 1995 From: perry at alpha.jpunix.com (John A. Perry) Date: Wed, 11 Oct 95 04:38:24 PDT Subject: Type2.list/pubring.mix Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Here's the latest! type2.list vishnu mixmaster at vishnu.alias.net bb460f08811a98682def423d30852d11 2.0 spook remailer at spook.alias.net ca8c8679f7b1cbdcff46d780fba97673 2.0 flame remailer at flame.alias.net 64bbf500097b541a8ddcb2dd80373238 2.0b11 anon mixmaster at anon.alias.net e3ca4cc5beb9934ae6d52dd27da80332 2.0.2b secrets secret at secret.alias.net bc2e4251dbddfa74dfae8b274904c2be 2.0.2b wmono wmono at spook.alias.net f68e6add16880b60eb48a4a4330e2e36 2.0.1 mix mixmaster at obscura.com db91418edac3a4d7329feaee0b79c74f 2.0.1 knight mixmaster at aldebaran.armory.com 6bb0d89a29fd188c67b8e04516b5af33 2.0 robomix robo at c2.org 3d523f1fd30b5a1c57214960a00f1c4e 2.0b11 syrinx syrinx at c2.org 6c4e7372e84d7092e0d0e69c20d5be46 2.0b11 rebma mixer at rebma.mn.org e7d84921298b0aadaf8f050d145ccf03 2.0b11 replay remailer at replay.com e3e2b4d67314b6165ee03b0b0ae07a7f 2.0b11 hacktic remailer at utopia.hacktic.nl bf61835a7b3cfa59c409caeab4e8a222 2.0b11 crynwr remailer at crynwr.com 64c62de6b347b3050fbb6e94c649112d 2.0b11 gondolin mixmaster at gondolin.org 1d767b08fefa0a79d508be73e472d326 2.0.1 q q at c2.org c44e1cb0f0709465c21b07ac972bf973 2.0.1 Armadillo remailer at armadillo.com 7251877ae6fed509ebf7567715974d1b 2.0.1 pubring.mix mix mixmaster at obscura.com db91418edac3a4d7329feaee0b79c74f 2.0.1 - -----Begin Mix Key----- db91418edac3a4d7329feaee0b79c74f 258 AATL25WGQY5CMM0/xBjYtuN6IT75h+aBQwwKqZZc isOrqdsl8HWAzARrB0iAtcr34c2qqPBzSRNa5UE8 d3jOYu/wp9K9M5abUSRogcDl7gkPlqxc+e72SdKd 2Gdgib8VDGVLpJdaPk4uSY/pkmsYB30OaQH3W8dU PPciTvSJKAYcTQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- vishnu mixmaster at vishnu.alias.net bb460f08811a98682def423d30852d11 2.0b11 - -----Begin Mix Key----- bb460f08811a98682def423d30852d11 258 AAShg2h4xGHueryUFNsFBbtSGZBcj+oDImFMkOZA EQPcbeG6ReEnTnoQ8HBgwtx9isMT9hZ93lBaRY07 ygupHQRi6f+FnlQEZTKqOe+8E+WyDx+ox/1ywgt+ KGFOW+t8WRXA/loKuqD0KH4pwpe7FYE0arGbtm4J EscGM2DE3TeS3QAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- knight mixmaster at aldebaran.armory.com 6bb0d89a29fd188c67b8e04516b5af33 2.0 - -----Begin Mix Key----- 6bb0d89a29fd188c67b8e04516b5af33 258 AATOSyg7N2PVg9VgA8voDWglq6ESNBLqH0heB2iE NfvmR/VnyAHCb4ZBtHzvM7ZRBdXYmH/Jt490wg6O ZCbhcIceFKSsibLEH77+111isAhUbHvn0Nh9gOI7 5ngjOGDQaLQvGUbNHRXQaPAZ0rc4lv9gmChJONOJ 7sFC2J96QR4aewAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- robomix robo at c2.org 3d523f1fd30b5a1c57214960a00f1c4e 2.0b11 - -----Begin Mix Key----- 3d523f1fd30b5a1c57214960a00f1c4e 258 AATQ2zxiRZ5bQuNBKHEvg11R7L69Hc9ZrjTon3o3 s7fbXmuEaiym48sHoRLAttZ3ADuH1FgbuYt1DF+L Il9Yp5U9znm9MX0rS8xq1iGg7YDED/3x6OWIp7za 17+pWnYmEF+Rz6YZ2o/67ujcBfrJ/odz+SVlaGqF rWWjaG/oWdqWWwAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- syrinx syrinx at c2.org 6c4e7372e84d7092e0d0e69c20d5be46 2.0b11 - -----Begin Mix Key----- 6c4e7372e84d7092e0d0e69c20d5be46 258 AATKhnhAIHXRCKZAi2tehJfQ9s+IsVPjEQQk5xwQ 60VXzmgkC2YirmDFeLz1feNgCMd78GkKHYK5p9WM HBkPNTDPLraJhJLNDHeHqGtqAI4BTHq/lZ/RMyOH GV/X5TaUEG69IGb2Rl8OnzNWF9fhKwH6PTE+QiQX kIcxJnVW+yYOpwAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- rebma mixer at rebma.mn.org e7d84921298b0aadaf8f050d145ccf03 2.0b11 - -----Begin Mix Key----- e7d84921298b0aadaf8f050d145ccf03 258 AASjOGqzTLdjweTMiwirrpVNqXj/ODJVyh9pEo5i q5ERILOd1hMNKY9XLNFYM30mUR/Fkh0MnYI/ujWz OTb0rR2a31nvmaLMdaB75nTdGJwHitCmo8k2eTjL XQsXV6zKrzXGp8H8NO34DAFWJy1qVcev+6lLAWGy j/fsJJyJNtl94wAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- replay remailer at replay.com e3e2b4d67314b6165ee03b0b0ae07a7f 2.0b11 - -----Begin Mix Key----- e3e2b4d67314b6165ee03b0b0ae07a7f 258 AATZBfJhv+DGg4OEfQfgVnzZZpumEZHI9CES+Ux2 dBp9RBPpJnAtLpcAyCIkNjSaik0togcKhFgcR3nt XIrWclJ/uO/Z1fqW7ESLwzXozCpqnG5S/y6mUPuL yzA9bqtAGd+pvxuK/Cw2Zzx+1QGp0VtWb46KxqvC S4POHYFljkrQiQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- hacktic remailer at utopia.hacktic.nl bf61835a7b3cfa59c409caeab4e8a222 2.0b11 - -----Begin Mix Key----- bf61835a7b3cfa59c409caeab4e8a222 258 AATkwgy72zwwavCHn1OytNMsBYAIBnCFa2hcbZPi IN6eS4jDgFdld5DlcqqzdN6Lxv96i0Dg7ElFyAFR 5zmof3oaNqh5vbq/fTEbvFtX9EGyuqkfN6fKoAEv G7gtmkfosoIg/jnI8AL9KC/J5mGaxrWYB6XBe+v9 iI1pOSbPsDCsdQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- crynwr remailer at crynwr.com 64c62de6b347b3050fbb6e94c649112d 2.0b11 - -----Begin Mix Key----- 64c62de6b347b3050fbb6e94c649112d 258 AATLe0CWPSn844FCeL7FzUlf+vE2qfYBPs/8PYYm BfITjknJjD0dk7vXhX9Qc5PFgDWRHhVoIRlFT3sc Jp2UVFLOZ5zn/WiT9Wa1tZsqejDf3MRIDT/K6cHB uB/SUaxLzNfk/wG1uBTUHukdjwCyDxNLHuYA5mVz opYJhQR0Nc/ESQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- spook remailer at spook.alias.net ca8c8679f7b1cbdcff46d780fba97673 2.0 - -----Begin Mix Key----- ca8c8679f7b1cbdcff46d780fba97673 258 AATZXVb4yP3MGt/ZCR5FtrHPMgYNyXHBmnG8KWO0 UaT5jbMqBdRQEzOVrCN/5RXerpS8Hctbc5MrwhSr fh/byQLwLkY50zYAxWSRBpaAJgZtCnQtVTgmt9yu BDiCE2OasFnZlwsi+9t8+c5R2bS3C6UhjQsgybbF Aw7xWK3v3fPJqQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- flame remailer at flame.alias.net 64bbf500097b541a8ddcb2dd80373238 2.0b11 - -----Begin Mix Key----- 64bbf500097b541a8ddcb2dd80373238 258 AAS5NFs7yPSFv+WwpO26/2OS7CYJDtrhlrEasf8S jJ9P0jqWXuorDIMKT3YfvSkk2xKqAHiHrOFEqltY plIUCoXyAf/7CmNyPYdTN6xNxO74ZIsTQnNgAJT3 6a8+JL92DZJM6pYfhpSvPq7lj5X0h6Hj/oCAlqiS 31TZJkd2jenjDQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- gondolin mixmaster at gondolin.org 1d767b08fefa0a79d508be73e472d326 2.0.1 - -----Begin Mix Key----- 1d767b08fefa0a79d508be73e472d326 258 AATAwVkC3FI6NDi0GJvH+FBIK6MYVHvXofEoKMTc u7P1rI7yCW00JOF71k373wyepZDksw9wjZdrHZAB uyN7SICMaKPRvMA4rseZFjefzYaoFf5tO0OqFgcQ /pMOPDwYl0nHyuLJvqjpADMDtatQaN2+/T/HtcMX Q1KCcLk24jEWbQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- q q at c2.org c44e1cb0f0709465c21b07ac972bf973 2.0.1 - -----Begin Mix Key----- c44e1cb0f0709465c21b07ac972bf973 258 AATDBaiKBy4jPlRUIQmVvcjO/GhWLbsls+mKloml 5EScYl+3fGw04P4xVcWOSledFVxKVfNy+xTVI8pE XGXSr0cRUIa1NttzNPk/KObb5SvkeqGtWAyRiWBS G91MkWM6LbqzKPcu6gUON47wJCJCzdvgbUIeVJIT MnyBvMWJX5CKAwAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- Armadillo remailer at armadillo.com 7251877ae6fed509ebf7567715974d1b 2.0.1 - -----Begin Mix Key----- 7251877ae6fed509ebf7567715974d1b 258 AASWRIpH97WDVCNc/kiLqvmxqwN9cAAbZFi+FIwr gCixQRTtD/SXuXd62iIqRMp3xm4c+uSnTzLijIxi fCYLacNMVeh0PXAszfFIh6CBicPq1UWt82Wu5dqw K/goNULqNDUypGQtOfOpHSQKPwAphXplKhv75OZs SjtMoEcv0CCk3wAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- secrets secret at secret.alias.net bc2e4251dbddfa74dfae8b274904c2be 2.0.2b - -----Begin Mix Key----- bc2e4251dbddfa74dfae8b274904c2be 258 AATBBbpmFw7omad8hpvxQiylmoi5MBXs5SivpcY6 65jnhZIiL9HvTE+Rq+30STccDsQWze0/iZthg1RL tCXYtABwkfsHOf60/aq1aOBobkquzBItvzQMG0W/ TkVinZYUTqfdytl/pfLDIQiXv7Z0t98MrLsmVopE 1NQS7sH6g9srFwAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- anon mixmaster at anon.alias.net e3ca4cc5beb9934ae6d52dd27da80332 2.0.2b - -----Begin Mix Key----- e3ca4cc5beb9934ae6d52dd27da80332 258 AATZuNYrX4bw6A01PA00qMr7KeJsnHIq9wYoSc5P OrHUEvPUoCxmLfuhwF9eEfSkV4t9DLPIMhKXM4iL Afhv2IZKeWaA98q4NHb6E7Gg6/e6uCI1O3nmXXK8 la4ij9RneCHig5K6JlCh3MJTkuW/IEYQjMrz2/H5 RUDEwx+/HL5K0QAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- wmono wmono at spook.alias.net f68e6add16880b60eb48a4a4330e2e36 2.0.1 - -----Begin Mix Key----- f68e6add16880b60eb48a4a4330e2e36 258 AASe+l+eIE1GYugbIPDG87h9wIFD0KqLWrMiN0PN RBCmRwsHOu1mZDnJTPlg7RXI17+DJMkk+huGPTuA T+KilAv8WFKWmvHuOpIBwxVBMXFKHsrQYHES63t0 UMQvRCv9LXZZvmiBWKrZp5vQaSOZKYLf4v3pQw7U SsbB5geSP9fQ2wAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- John Perry - KG5RG - perry at alpha.jpunix.com - PGP-encrypted e-mail welcome! WWW - http://www.jpunix.com PGP 2.62 key for perry at jpunix.com is on the keyservers. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Processed by mkpgp, a Pine/PGP interface. iQEVAwUBMHusbaghiWHnUu4JAQEVhgf9EsZdugAsPzB9qjXf9S4w9ucjG8myCq5l J4/9rYYTOLusK+L07QXQsGZcAQsDvULXMKshKY+4dKTfYp9Z8fClk7nBUO0h0PZK 4eAfAOLwADZl4do0tAlh7AyIWI0QRAwWrh4ufhY6MuLaKJpgraHGaK0sbDvZZdEZ OBvn50HkksSBkHv441g8u5ZvXRfbFdeW0ii4qIPqoKhB22yWv2L1DnRdWP8/b/OL aLN9c0w054AFXo1f4hd+ZW3ufT8f7YXnda3rUCGe0GstPMvrpB22bdkt+t2QuYBn Mn4gzS6bMfBFms8hYQgaLd+ACHWVuc6WTZ4svNp8nDGSDK8EX7ou5g== =wrcD -----END PGP SIGNATURE----- From nobody at REPLAY.COM Wed Oct 11 05:04:05 1995 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 11 Oct 95 05:04:05 PDT Subject: Open Mkt Sudden Infant Death Message-ID: <199510111203.NAA20811@utopia.hacktic.nl> Open Market Web Site Launches Free "Internet Security" Cambridge, MA, Oct 10 -- In a teleconference, Open Market launched a three-pronged attack on Internet "security breaches" that includes an online "security checker" for multivendor Web browsers belonging to end users, free upgrades from the Netscape Secure Server to the Open Market's Secure WebServer, and the giveaway of sample code to operators of "any extensible secure Web server." The trio of security remedies will all be available free of charge starting this week from the Open Market Web site at , officials reported during the teleconference. "Our entire business is based on people having trust in open networks," noted Shikhar Ghosh, Open Market's chief executive officer (CEO). "We'll make a significant investment, with the view that all of will suffer if (the public) loses trust." Consumers are only "gradually gaining some confidence" in the Internet, according to Ghosh. But recently, reports have surfaced of security problems with the Netscape Secure Server, and some Web sites using the Netscape product have been "saying they are going to go off the air." As a result, he added, Open Market is introducing a policy that allows licensed users of the Netscape Secure Server to download Open Market's Secure WebServer "at no cost." The other two planks in Open Market's new pro-security Web "resource center" are "informational," the journalists and analysts were told. Open Market will work with the makers of Web browsers to track information on "known problems" with browsers, including browser tampering. "We will (also) inform the (Web) software companies of problems," the CEO maintained. The Open Market Web site will perform a database look-up on the type of browser in use, and will then report back to the user on any security issues known to be associated with that kind of browser, elaborated Open Market's Win Treese. "One strength we have is that we don't have a browser. We are agnostic," Ghosh told the telephone audience. Open Market also performs "extensive testing" on Web browsers. "We do as many as several hundred versions of browsers coming in at any time. We definitely expect (to) unite the industry, rather than dividing the industry," he added. The sample code to be offered from the Open Market Web site will provide "underlying code" for "reference implementations on what are the major ways of handling the known (Internet security) problems," according to Ghosh. "To reiterate, security is one of those pillars on which the entire industry rests," contended the Open Market chief, to conclude the teleconference. Contact: Open Market, 617-621-9500; Press Contacts: Wendy Ziner, Open Market, 617-374-6508; Dawn Geary or Merrill Freund, Schwartz Communications for Open Market, 617-431-0770) ----- From kelli at zeus.towson.edu Wed Oct 11 05:34:49 1995 From: kelli at zeus.towson.edu (K. M. Ellis) Date: Wed, 11 Oct 95 05:34:49 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510110939.FAA26747@pipe4.nyc.pipeline.com> Message-ID: This one is _really ripe_ for a response to the editor. Ideas? We could start something off-list if there are several interested in co-authoring. -=Kathleen M. Ellis=- kelli at zeus.towson.edu Geek Code v3.0 http://zeus.towson.edu/~kelli/ GAT dx s++:- a-- C++ uu+++ P+ L++ E- W++ N K W--- O- M- V-- PS+++ PE- Y++(-)> PGP+>++ t+ 5 x+ R tv b+++ DI- D--- G e h* r+ z** Diverse Sexual Orientation Coll.Towson State University DSOC at zeus.towson.edu "Privacy is stupid." -D. Denning From s1018954 at aix2.uottawa.ca Wed Oct 11 05:41:53 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Wed, 11 Oct 95 05:41:53 PDT Subject: Graphic encryption and XV In-Reply-To: <9510111109.AA19990@cfdevx1.lehman.com> Message-ID: On Wed, 11 Oct 1995, Rick Busdiecker wrote: > Does anyone have patches to XV that allow it to display a PGP > encrypted image without having to explicitly decrypt it first? XV? Which is? (Some viewer that runs on X windows?) From perry at piermont.com Wed Oct 11 06:12:40 1995 From: perry at piermont.com (Perry E. Metzger) Date: Wed, 11 Oct 95 06:12:40 PDT Subject: Netscape & Fortessa In-Reply-To: <199510110427.AAA05498@book.hks.net> Message-ID: <199510111312.JAA14704@jekyll.piermont.com> Lucky Green writes: > Yes, it might, because of the strong support by vendors for voluntary GAK > or no crypto at all. Let me explain. There are a number of indicators that > show that strong crypto is losing in the global marketplace. Example: the > charter of the new IETF Internet Payment Systems working group requires > that the use of crypto be limited. In the discussion about the charter, > the near unanimous consent (with myself as the sole dissenter) was that > crypto may only be used for authentication, not confidentiality. I wasn't aware of that -- I believe that this may have happened because those of us who cared didn't attend the zoo in Stockholm. The meeting was a complete joke, with the Microsoft people and others making it clear that they didn't intend to follow the process. Many of us who cared decided to do better things with our time instead of showing up in the aptly named Weapons room for the second session. .pm From perry at piermont.com Wed Oct 11 06:19:04 1995 From: perry at piermont.com (Perry E. Metzger) Date: Wed, 11 Oct 95 06:19:04 PDT Subject: java security concerns In-Reply-To: <199510110550.BAA02068@clark.net> Message-ID: <199510111318.JAA14723@jekyll.piermont.com> Ray Cromwell writes: > I agree, however I would point out that not all postscript interpreters > are emasculated (especially those on unix systems like IRIX, they contain > all kinds of calls to fork(), read()/open(), etc). Many postscript interpreters are a serious security threat. However, I found it fairly easy to chop enough of the code out for the one I run that I feel safe with it -- the exercise wasn't that hard. > Nothing in the Java spec tells you that you must call fork() in a > Java interpreter implementation. In fact, Java has nothing to do > with the GUI calls, the network calls, etc. You can support as much > or as little system I/O in a Java implementation as you want. Yes, but in practice, to support the given applets that Netscape will be browsing you have to open the kimono a bit too much overall. With sufficient emasculation, I believe Java could be made safe, but then it wouldn't be the Java that Sun and Netscape are pushing any more. Perry From madden at mpi-sb.mpg.de Wed Oct 11 06:36:13 1995 From: madden at mpi-sb.mpg.de (Peter Madden by way of Duncan Frissell ) Date: Wed, 11 Oct 95 06:36:13 PDT Subject: [NOISE] was Re: java security concerns Message-ID: <199510111335.JAA17959@panix.com> > Rather than trying to prove a program to be correct (which I agree is doomed > to failure for the forseeable future for all but trivial programs) I disagree: automatic program verification has come along in leaps and bounds, largely due to the current research impetus in safety critical systems. Various sorting programs, bin-packing programs, to mention but a few, have all been successfully auto. verified (and these are non-trivial programs, which form the building-blocks of even less trivial "industrial-sized" programs). Indeed, the technology has been extrapolated to the automatic verification of electronic circuits, compilers, schedule problems and computer configerations (all w.r.t. a user's specification). The real problems lie with specifying the program/problem correctly in the first place (so-called specifications capture), and with automatic program *synthesis* from specifications (which, in mathematical theorem proving terms, presents the problem of creating existential objects, as opposed to just verifying that they do the right job). I do, however, agree with the need/desire for a greater diversity of program properties which can be automatically checked. Regards, Peter ================================================================= Dr Peter Madden, Email: madden at mpi-sb.mpg.de Max-Planck-Institut fuer Informatik, Phone: (49) (681) 302-5434 Im Stadtwald, W-66123 Saarbruecken, Germany. Fax: (49) (681) 302-5401 ================================================================= From madden at mpi-sb.mpg.de Wed Oct 11 06:36:15 1995 From: madden at mpi-sb.mpg.de (Peter Madden by way of Duncan Frissell ) Date: Wed, 11 Oct 95 06:36:15 PDT Subject: [NOISE] was Re: java security concerns Message-ID: <199510111336.JAA17969@panix.com> > Did you also send this post to cypherpunks at toad.com? No I didn't -- wasn't sure if that's where F. Stuart's email originated from. Please feel free to circulate to the universe, along with some further clarification below. I hope I wasn't too positive in my support of auto. program verification. There are real problems. However, with the development of the field called formal methods, computation has been directly linked to mathematical logic, which is a much better understood, and well circumscribed, domain than programming languages per se. Applications of formal methods in software engineering depend critically on the use of automated theorem provers to provide improved support for the development of safety critical systems. Potentially catastrophic consequences can derive from the failure of computerized systems upon which human lives rely such as medical diagnostic systems, air traffic control systems and defence systems (the recent failure of the computerized system controlling the London Ambulance Service provides an example of how serious software failure can be). Formal methods are used to provide programs with, or prove that programs have, certain properties: a program may be proved to terminate; two programs may be proved equivalent; an inefficient program may be transformed into an equivalent efficient program; a program may be verified to satisfy some specification (i.e. a program is proved to compute the specified function/relation); and a program may be synthesized that satisfies some specification. Program Verification boils down to proving a mathematical conjecture specifying that a given program will, for all inputs of a certain type, generate outputs of a certain type. This is relatively straightforward -- we already have the program P described in the initial conjecture to be proved. Program synthesis, on the other hand, starts with a similar conjecture *except* that P remains an unidentified variable. The task of synthesis (auto. or otherwise) is to incrementally identify P as the conjecture proof is unraveled. This requires all kinds of "intelligent", and often intuitive, choices during the proof, and is consequently a difficult process to automate. Peter ================================================================= Dr Peter Madden, Email: madden at mpi-sb.mpg.de Max-Planck-Institut fuer Informatik, Phone: (49) (681) 302-5434 Im Stadtwald, W-66123 Saarbruecken, Germany. Fax: (49) (681) 302-5401 ================================================================= From mdiehl at dttus.com Wed Oct 11 06:39:46 1995 From: mdiehl at dttus.com (Martin Diehl) Date: Wed, 11 Oct 95 06:39:46 PDT Subject: Public Awarreness of Security Message-ID: <9509118134.AA813425023@cc2.dttus.com> On October 11, 1995, John Markoff of the NYTimes writes: "Newly publicized weaknesses in the basic structure of the Internet [snip] .. advantage of the fault-finding talents of the Berkeley researchers and other like-minded experts, the company announced a contest today called Netscape Bugs Bounty [snip]" On October 11, 1995, Joan E. Rigdon of the Wall Street Journal writes: "The software industry is starting to sweep the bugs out of the closet [snip] ... Netscape is trying to systematically tap the intelligence of the hackers instead of randomly waiting for them to find mistakes. [snip]" Both of these stories bring out not only the flaws in the Internet and software to use the Internet, but also the work going on both at the software developers as well as that by groups such as ours that are active in identifying the risks. Congratulations to the Cypherpunks Martin G. Diehl From mlm at skyrr.is Wed Oct 11 06:46:05 1995 From: mlm at skyrr.is (Magnus Logi Magnusson) Date: Wed, 11 Oct 95 06:46:05 PDT Subject: Hal's Third Challenge? In-Reply-To: <199510101920.PAA24628@panix.com> Message-ID: <199510111345.AA046029137@hp001c.skyrr.is> > My interest arises out of the new Pentium 120 that has come my way and the > 40,000 keys/second it gets running the 32-bit version of the Brue code. > Since my ISP is a local call, I might even be able to get away with an 8 > hour PPP session to try the WIN95 client. > Im interested too... if there is a 32 bit client for NT/Win95 (or a single thredded one for Win32s) capable of reporting automatic to the server/local server, I could probably throw in c.a. 40-50 pentiums and a lot more 486 (and a few HP/Sun/Alpha) :-) Anyone working on self-reporting win32 client? Logi. -- Magnus Logi Magnusson System programmer, State and Municipal Data processing center, Iceland E-mail: mlm at skyrr.is & mlm at rhi.hi.is From herbs at interlog.com Wed Oct 11 07:10:52 1995 From: herbs at interlog.com (Herb Sutter) Date: Wed, 11 Oct 95 07:10:52 PDT Subject: Basic Flaws in Internet Security and Commerce Message-ID: <199510111410.KAA06465@gold.interlog.com> At 21:33 1995.10.10 -0700, Patrick Horgan wrote: >Paul said: > >> A fine piece of work. The ideas expressed in this paper should scare >> the hell out of everyone who uses NFS for any serious applications, >> which for a fact includes most banks and all investment banks and >> brokage houses. In this particular area I KNOW what is at risk. >> Again, I congratulate the authors on a first-class effort. > >I agree, it's a good job of publicizing these holes, but (not to take >anything away from these guys, I'm sure they know this), these are not >newly found holes. These attacks on NFS have been known and exploited >for years and are well known within the security community. To repeat a comment I made in sci.crypt... the described hole applies equally well to a program (virus or other) that sits on a workstation and intercepts calls to OS file services. This is particularly pernicious on platforms like PCs, but are there any platforms that don't have this potential flaw? The main question, in my mind, is: How can a user know he is even running the app he thinks he's running? Once you have an attacker who can intercept OS file system calls, it seems to me you can know -nothing-... checksums are no use, signatures are no use, nothing is any use at that point -- including keeping your authent software on a floppy, write-protected or not, since it can simply be patched as it's read in, or the system may just execute a different program altogether. In fact, if it's properly done, there may not be any way to even detect that the system has in fact been subverted. So: If you can't trust your path to your own file system, what can you trust? (And this is without even talking about things like firmware upgrades and BIOS patches and all sorts of other potential approaches.) Can we do no better than simply assume the local workstation file system can be trusted? Herb ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Herb Sutter 2228 Urwin, Suite 102 voice (416) 618-0184 Connected Object Solutions Oakville ON Canada L6L 2T2 fax (905) 847-6019 From frissell at panix.com Wed Oct 11 07:15:01 1995 From: frissell at panix.com (Duncan Frissell) Date: Wed, 11 Oct 95 07:15:01 PDT Subject: Hal's Third Challenge? Message-ID: <199510111414.KAA27374@panix.com> At 01:45 PM 10/11/95 +0000, Magnus Logi Magnusson wrote: >Im interested too... if there is a 32 bit client for NT/Win95 (or a single >thredded one for Win32s) capable of reporting automatic to the >server/local server, I could probably throw in c.a. 40-50 pentiums and a >lot more 486 (and a few HP/Sun/Alpha) :-) Anyone working on self-reporting >win32 client? > Try: http://www.brute.cl.cam.ac.uk/ftp/pub/brute/w32clnt.zip DCF From hfinney at shell.portal.com Wed Oct 11 07:16:11 1995 From: hfinney at shell.portal.com (Hal) Date: Wed, 11 Oct 95 07:16:11 PDT Subject: Mean Men in the Middle Message-ID: <199510111415.HAA24732@jobe.shell.portal.com> If the MITM is really mean, he can overcome some of the suggestions I offered for how credentials can be used to defeat him. First, he could cause the user to download bad software. PGP, Netscape, and other secure programs could be patched to have holes. Even the checksum program could be altered so publishing checksums won't help. With this attack he would not even need to substitute keys; he can just make sure that the fake PGP picks guessable session and secret keys. Alternatively, he could defeat the use of key certificates which bind names to keys by the simple strategem of substituting the name of the user when he substitutes his keys. If Alice has all of her posts appearing under the name of "Bob" unbeknownst to her, then if Bob is the MITM he can get a certificate and publish it. All the messages which refer to "Bob" get changed to refer to "Alice" as they are passed from the net to her, similar to the key substitution which would also have to be done. If Bob's name were a bit unusual this could be done with a simple script. So even fully valid key certificates may not be effective against MITM attacks of this type. Hal From frissell at panix.com Wed Oct 11 07:18:23 1995 From: frissell at panix.com (Duncan Frissell) Date: Wed, 11 Oct 95 07:18:23 PDT Subject: Hal's Third Challenge? Message-ID: <199510111417.KAA27865@panix.com> At 09:05 PM 10/10/95 +0100, Piete Brooks wrote: >It seems that microsoft was the one to go for, as they too use 40 bit for >each session .... If someone can generate the CRACKing code and someone can >donate an example, I'd be DELIGHTED to arrange another BRUTE ! Could you at least run a server that's not doing anything so that those of us who want to install and test our clients can at least see if they work and go into "sleep" mode? DCF From littlitt at MIT.EDU Wed Oct 11 07:20:27 1995 From: littlitt at MIT.EDU (Jonathan Litt) Date: Wed, 11 Oct 95 07:20:27 PDT Subject: spam detector algorithm? In-Reply-To: <199510110303.XAA12811@thor.cs.umass.edu> Message-ID: <199510111420.KAA00919@hazelwood.mit.edu> futplex at pseudonym.com writes: > Subject: Re: spam detector algorithm? > Date: Tue, 10 Oct 1995 23:03:45 -0400 (EDT) > > Greg Broiles writes: > [many details elided...] >> Any thoughts about this? Interesting? Stupid? Like I said, my >> math is weak. My intention is to try to cobble up a 2d version >> of this to see how it runs but I thought I'd see if anyone can >> point out why it can't work, or if it's useful enough that >> someone with a better math background than I've got wants to >> take this idea somewhere better. > > It sounds like you are liable to start reinventing parts of the > field of information retrieval. The automatic construction and > comparison of vectors of document parameters, as you suggested in > the part I omitted, is one approach that has met with some > success. (The common problem is, given a set of query attributes > or a model document, to find relevant documents matching the > query or similar to the model document. A variety of relevance > measures has been considered.) > > I can't give you any specific pointers, but I advise you to check out > existing implementations of these and other techniques for information > retrieval before you spend too much time writing new code. Check out SMART, which was originally developed by Gerard Salton at Cornell. (He is one of the pioneers of IR.) The current release is maintained by Chris Buckley (chrisb at balder.chrisb.com). Check out: ftp://ftp.cs.cornell.edu/pub/smart If you don't feel like installing the whole thing but are interested in testing it out on some spam, then I could run some tests for you. Here are some literary references for SMART: @article{SB88-weight, author = {Gerard Salton and Chris Buckley}, journal = ipm, number = {5}, pages = {513-523}, title = {Term-Weighting Approaches in Automatic Text Retrieval}, volume = {24}, year = {1988} } @inproceedings{BSA-trec1, author = {Chris~Buckley and Gerard~Salton and James~Allan}, title = {Automatic Retrieval With Locality Information Using {SMART}}, booktitle = {Proceedings of the First Text REtrieval Conference (TREC-1)}, editor = {D. K. Harman}, publisher = {NIST Special Publication 500-207}, month = {March}, year = {1993}, pages = {59--72} } -jon From txomsy at ebi.ac.uk Wed Oct 11 07:26:49 1995 From: txomsy at ebi.ac.uk (J. R. Valverde (EMBL Outstation: the EBI)) Date: Wed, 11 Oct 95 07:26:49 PDT Subject: Hal's Third Challenge? In-Reply-To: <199510111345.AA046029137@hp001c.skyrr.is> Message-ID: <199510111424.PAA12627@neptune.ebi.ac.uk> If the next challenge is advertised with time enough, I have a spare MasPar I could use. I've been considering porting brutessl to it for a while, but never actually tried. Maybe I could have time to do it... That would be real fun! OTOH I'm about to leave my current job. Maybe I won't have the time... But I could try. <:-) jr From asb at nexor.co.uk Wed Oct 11 07:28:44 1995 From: asb at nexor.co.uk (Andy Brown) Date: Wed, 11 Oct 95 07:28:44 PDT Subject: Hal's Third Challenge? In-Reply-To: <199510111414.KAA27374@panix.com> Message-ID: On Wed, 11 Oct 1995, Duncan Frissell wrote: > At 01:45 PM 10/11/95 +0000, Magnus Logi Magnusson wrote: > > Anyone working on self-reporting win32 client? > > Try: > > http://www.brute.cl.cam.ac.uk/ftp/pub/brute/w32clnt.zip It's not (yet) self-reporting. - Andy From liberty at gate.net Wed Oct 11 07:40:23 1995 From: liberty at gate.net (Jim Ray) Date: Wed, 11 Oct 95 07:40:23 PDT Subject: Elementrix POTP Message-ID: <199510111433.KAA46776@tequesta.gate.net> -----BEGIN PGP SIGNED MESSAGE----- I forwarded: >> Unfortunately, and we really mean unfortunately, we can only reveal what >>"it is" to people who agree to a non-disclosure arrangement while we're >>patent pending. Otherwise we would have no problem revealing the whole >>method. So far, every international expert who has reviewed the method >>agrees (after many, many hours and days of trying to find holes) that POTP >>really does what we say it does. and Kari asked: >Maybe you could name those experts who have inspected it - thanks. Um, in an earlier post she mentioned the venerable Mr. Kahn and someone else whose name I forget. I think I suggested (for cypherpunk credibility) Carl, Wei, and maybe (for the "paranoid") Perry, but I think she just wants to take her chances with us. I suggested also PRZ, as this would maybe help his legal fund. :) Surprisingly, she seemed unaware of any particular NSA interest in the prod. I assured her that they were interested, and we agreed that since the main office of the company was in Israel there was nothing to do on this end. She did not respond to my nosy questions about Israel govt. ownership, or ownership period. I suppose my own combination of nosiness, crypto relative-cluelessness, and insistence on my own use of PGP until something's provably better was beginning to annoy her, so she said, "Go tell them this!" to get me out of her hair. I'm still curious about how her technology claims to do its thing, but that's why I hang with the C-punks (at least, one reason!). ;) "We" (not me) will (eventually) get a copy and either rake it over the coals (likely, IMO) or "endorse" it by failing to find a weakness (not so likely, IMO). Sorry I can't say more, but I don't know more. JMR -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Freedom isn't Freeh iQCVAwUBMHvVXG1lp8bpvW01AQGwnAQAjk1+LFBuWaq5xovZySk43wNRKSviS57V JTZCQVyFugsNTUQYaYP/h2UZ4hcCtJe0aePgENm5B2tBibp9MuP0skNG9m4v+O8A cG5vei2TDMy7vh5tNWSnDdJ5dEjttGOU/nCEGC6JpDLvfdLICRrp7KdeCIY1bhc3 Up616khae4A= =NTqn -----END PGP SIGNATURE----- Regards, Jim Ray Ray's Corolary to Murphy's Law: "You will be spared _NOTHING_." -- Peter C. Ray [my dad]. ----------------------------------------------------------------------- PGP key Fingerprint 51 5D A2 C3 92 2C 56 BE 53 2D 9C A1 B3 50 C9 C8 Key id. # E9BD6D35 James Milton Ray IANAL ----------------------------------------------------------------------- Help Phil! email zldf at clark.net or see http://www.netresponse.com/zldf _______________________________________________________________________ From frissell at panix.com Wed Oct 11 07:44:35 1995 From: frissell at panix.com (Duncan Frissell) Date: Wed, 11 Oct 95 07:44:35 PDT Subject: Man in the Middle Revisited (but not for the last time) Message-ID: <199510111443.KAA04261@panix.com> At 12:38 AM 10/11/95 -0700, Timothy C. May wrote: >Nope. au contraire, negatory. I *do not* care if the entity calling itself >"Hal Finney" is being surrounded by an MITM. Only "Hal Finney the Key" can >read messages I encrypt to the public key I got from him long ago, so if >the "Hal + MITM" can do so, they are effectively one and the same. Not a new problem BTW as in the old joke: "The Iliad wasn't written by Homer but by another guy of the same name." For the non-classically inclined, this is a joke because we don't really know anything about Homer anyway. Maybe he was a blind poet. Maybe he never existed. DCF "Who wonders why his local B&N StuporStore has 1/2 of one section of one shelf unit dedicated to classics and shelf unit upon shelf unit dedicated to the gender-disabled, to women, to native americans, to new age mysticism, and other garbage. Particularly since those interest areas represent the losers. Who's interested in losers? (We know they're losers BTW because we're *reading* about them in a capitalist store. If they'd won there'd be no reading and no store." From nobody at flame.alias.net Wed Oct 11 07:51:18 1995 From: nobody at flame.alias.net (Anonymous) Date: Wed, 11 Oct 95 07:51:18 PDT Subject: No Subject Message-ID: <199510111418.PAA22841@utopia.hacktic.nl> > Two years ago, I pointed out that getting a single message past > the man in the middle isn't good enough; you have to convince your > readers that the key they received on one channel is more accurate > than the key they're receiving on all the other channels. > But if they'll believe that, they may also believe the man in the middle's > announcement that the key in your name on all the keyservers is > wrong, and the correct key is the one he's putting out. > Can't win either way, but it's still important to get the key out. > > My current key is 0x54696D4D; the fingerprint is > 4D 65 44 75 53 61 21 2F 41 73 55 64 85 6D 21 7F. but this is not Tim May's key, his key is: pub 1024/54E7483F 1992/11/20 Timothy C. May 11-20-92 Key fingerprint = 8C 79 1C 1B 6F 32 A1 D1 65 FB 5F 57 50 6D D3 28 And this one is signed by these people: pub 1024/54E7483F 1992/11/20 Timothy C. May 11-20-92 sig 0022E52D Eric Hughes sig DDBE0DD5 John T. Draper sig 8F898631 Scott Collins (512) sig E972F011 E. Dean Tribble sig 4C131F57 Tim Oren sig F5257117 sig 85197FB5 John Gilmore at level two in the web of trust are these people: pub 512/F5257117 1992/09/28 sig B1331439 Randy Bush Tom Jennings sig DA0EDC81 Phil Karn sig F572C6A7 Jim Cannell sig 0BD91A2D Phil Karn sig F5257117 Tom Jennings sig ADF733A9 Jesse David Hollington <1:225/1.1 at fidonet.org> sig 4D077463 Steve Matzura sig E7F23D95 Mike Laster <1:170/300.23 at fidonet> sig DB910037 Barry Kapke <96:101/33 at dharma> sig 5B77854F Depository #1 [Public Keys] sig 08F811DD Marcos R. Della sig 212EC54B Guy Martin 1:143/269 (guy.martin at f269.n143.z1.fidonet.org) sig F572C6A7 Jim Cannell sig BDFB1F2D George Gleason sig DDBE0DD5 John T. Draper sig 8F898631 Scott Collins (512) sig 0022E52D Eric Hughes sig E972F011 E. Dean Tribble sig 4C131F57 Tim Oren sig 85197FB5 John Gilmore sig DA27EC35 Wes Perkhiser sig E7960501 Paul Schencke <1:135/340 at fidonet.org> sig 9DB252DF Mike Riddle sig 734B9A59 Christopher Baker <1:374/14 at fidonet.org> sig B1B6B823 GK Pace @ 1:374/26 sig 5ACB1C6D (Unknown signator, can't be checked) sig 15100C27 (Unknown signator, can't be checked) sig DA0EDC81 Phil Karn sig 0BD91A2D Phil Karn sig 9F9F38BB Mark Eichin sig 5B415621 Mark Eichin sig 66CE89B7 Mark Eichin sig 0022E52D Eric Hughes sig BDFB1F2D George Gleason sig DDBE0DD5 John T. Draper sig 8F898631 Scott Collins (512) sig 0245C435 Dave Krieger sig 4C131F57 Tim Oren sig E972F011 E. Dean Tribble sig F5257117 sig 71946BDF Phil Karn If you knew any of the level 1, or level 2 signatories personally and had exchanged keys face to face, you'd have some assurance. Also this level 3: pub 1024/DA0EDC81 1994/07/25 Phil Karn sig ED2354B9 Ulla Sandberg sig 9C57B951 Peter Lothberg sig C7A966DD Philip R. Zimmermann PRZ, as your PGP distrbution is probably signed by this key, unless you've inspected the source personally, you're relying on this key anyway. Level 4 would be a big web as lots of people fan out from PRZ. From patrick at Verity.COM Wed Oct 11 07:55:12 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Wed, 11 Oct 95 07:55:12 PDT Subject: PKP Lawsuit progress report Message-ID: <9510111448.AA05691@cantina.verity.com> Roger Schlafly sez -=*|| \/ > > (3) There will be a hearing on the patent validity (and a couple of > annoying technical legal issues) at 10:00 am, Dec. 6, 1995, in the > court of Judge Spencer Williams, Federal Bldg, 280 S. First St, > San Jose CA 95113. The US court clerk is at 408-291-7783. It is > open to the public. Thanks for letting us know. I'll be there unless they chain me to my desk at work;) Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From futplex at pseudonym.com Wed Oct 11 08:21:08 1995 From: futplex at pseudonym.com (Futplex) Date: Wed, 11 Oct 95 08:21:08 PDT Subject: Man in the Middle Revisited (but not for the last time) In-Reply-To: <199510111443.KAA04261@panix.com> Message-ID: <199510111520.LAA15537@thor.cs.umass.edu> Duncan Frissell writes: > DCF > > "Who wonders why his local B&N StuporStore has 1/2 of one section of one > shelf unit dedicated to classics and shelf unit upon shelf unit dedicated to > the gender-disabled, to women, to native americans, to new age mysticism, > and other garbage. Particularly since those interest areas represent the > losers. Who's interested in losers? (We know they're losers BTW because > we're *reading* about them in a capitalist store. If they'd won there'd be > no reading and no store." This signature was: * completely off-topic by any stretch of the imagination * longer than the rest of the message * flamebait Detweiler's rants are at least usually vaguely relevant to crypto & privacy. -Futplex From shamrock at netcom.com Wed Oct 11 08:25:19 1995 From: shamrock at netcom.com (Lucky Green) Date: Wed, 11 Oct 95 08:25:19 PDT Subject: Netscape & Fortessa Message-ID: At 9:12 10/11/95, Perry E. Metzger wrote: >I wasn't aware of that -- I believe that this may have happened >because those of us who cared didn't attend the zoo in Stockholm. The >meeting was a complete joke, with the Microsoft people and others >making it clear that they didn't intend to follow the process. Many of >us who cared decided to do better things with our time instead of >showing up in the aptly named Weapons room for the second session. Unfortunately, I wasn't in Stockholm. I just follow the discussion on the mailing list. -- Lucky Green PGP encrypted mail preferred. From shamrock at netcom.com Wed Oct 11 08:34:22 1995 From: shamrock at netcom.com (Lucky Green) Date: Wed, 11 Oct 95 08:34:22 PDT Subject: [Noise] FWD:Want to trade UNIX skills for Laissez Faire Books? Message-ID: Given the large number of non-statists on this list, here is a brief forward FYI: >-------------------------------------- >Date: 10/11/95 0:34 >From: libernet-d at Dartmouth.EDU > >I'm looking for someone to help me with the technical aspects of Laissez >Faire Books' Internet presence. I need someone who has knowledge of unix >systems and can modify perl scripts... and has the *time* to do a little >work on our new Web site. Hopefully this would be the start of an on-going >relationship. > >Most importantly, I'm looking for an enthusiastic libertarian who doesn't >mind being paid with book credit and a kind "thank you" instead of cash. :-) > >Know anyone who might be interested? > >Thanks, > >Chris > >----------------------------------------------------------------------- >Chris Whitten Chris at Free-Market.com Ask me about... -- Lucky Green PGP encrypted mail preferred. From froomkin at law.miami.edu Wed Oct 11 08:59:53 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Wed, 11 Oct 95 08:59:53 PDT Subject: java security concerns In-Reply-To: <199510101714.KAA07329@ix2.ix.netcom.com> Message-ID: On Tue, 10 Oct 1995, John Lull wrote: > Pardon my French, but if your lawyers make it impossible to do > technical work correctly, isn't it time to get new lawyers? I can't > see how offering a reward for reporting bugs could possibly be > objectionable to any rational lawyer. I agree; I sent private mail to the parties saying in effect "if your lawyer can't structure this, it's time to get a new lawyer." A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | New address, but it's still just as hot here. From patrick at Verity.COM Wed Oct 11 09:08:17 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Wed, 11 Oct 95 09:08:17 PDT Subject: NYT on Internet Flaws Message-ID: <9510111604.AA06660@cantina.verity.com> > From: "K. M. Ellis" > > This one is _really ripe_ for a response to the editor. Ideas? > > We could start something off-list if there are several interested in > co-authoring. > I'd love to see something in there about most commercial sites being behind firewalls without nfs access across the firewall. This greatly reduces the risk from the nfs problems. If you get your binary via nfs from a trusted host inaccessible from the internet, then if you have this problem management can handle it as an employee problem;) There are ways to make secure firewalls, it's fairly well understood. Sometimes people point to things like the hack Mitnick did last Christmas, but his attack took advantage of a couple of things a security expert shouldn't have allowed, first and foremost two machines were accesible from the internet, and one of them trusted root logins from the other without a password:( I could write something up about it if you'd like. Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From nobody at REPLAY.COM Wed Oct 11 09:20:28 1995 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 11 Oct 95 09:20:28 PDT Subject: Netscape & Fortessa Message-ID: <199510111620.RAA25682@utopia.hacktic.nl> Netscape to Offer Fortezza Cryptographic Capability for Its Software Products Underscores Company's Commitment to US Government Market Mountain View, Calif., Oct. 10 -- Netscape Communications Corporation announced today its intent to support the Fortezza security card, a security technology based on US government standard cryptography, as a low-cost upgrade capability for its Netscape Navigator(TM) client software and other Netscape products. The new capability will enhance Netscape's offerings for the US government market and enable the company to provide increased support for security services for World Wide Web-based tools and technology. Developed by the National Security Agency, Fortezza PC card technology provides strong authentication and encryption services using US government standard cryptography, implemented in an industry-standard PCMCIA security token. Fortezza PC cards are being used in the Defense Message System (DMS), a new Department of Defense electronic messaging system; Intelink, the new US Government Intelligence Community search system based on Web technology, and in a number of other government systems. "Fortezza is an important technology for major internal US government networks and for organizations needing Web-based technology with strong security," said Marc Andreessen, vice president of technology at Netscape. "Support of Fortezza technology will strengthen our position as a leading supplier of Web-based software products to the federal government. We can use the experience gained with Fortezza and the Secure Sockets Layer open protocol to implement support for additional cryptographic devices important to both the federal government and commercial markets." Netscape expects to work with information security specialist Litronic Industries and others regarding the development, integration and support of the Fortezza cryptographic interface. Litronic provides technical expertise for the implementation of Fortezza libraries and drivers on a wide variety of platforms. California-based Litronic Industries designs, manufactures and markets information security products used to secure applications and data transmissions through the use of encryption technology. Support for Fortezza has been added to Netscape's Secure Sockets Layer (SSL) open protocol. SSL provides a straightforward method for adding strong security to existing applications and network infrastructures. SSL is application protocol independent and provides encryption, which creates a secured channel to prevent others from tapping into the network; authentication, which uses certificates and digital signatures to verify the identity of parties in information exchanges and transactions; and message integrity, which ensures that messages cannot be altered en route. Netscape will upgrade Netscape Navigator and other Netscape products to support the use of Fortezza with SSL as an enhanced alternative to software-based cryptographic mechanisms. "The US government is rapidly moving to World Wide Web and related open systems technology as an alternative to proprietary networks and applications," said Paul A. Strassmann, former director of defense information and principal deputy assistant secretary of defense, and currently distinguished visiting professor of information warfare at the National Defense University. "Many federal agencies are adopting Fortezza technology as a means to secure network transactions over unclassified and classified networks. We are pleased to see Netscape provide support for Fortezza cryptographic cards in a commercial product based on open systems standards." Contact: Kristina Lessing of Netscape, 415-528-2661, or kristina at netscape.com From jim at acm.org Wed Oct 11 10:08:35 1995 From: jim at acm.org (Jim Gillogly) Date: Wed, 11 Oct 95 10:08:35 PDT Subject: Elementrix POTP In-Reply-To: <199510102120.RAA110954@tequesta.gate.net> Message-ID: <199510111708.KAA09582@mycroft.rand.org> > liberty at gate.net (Jim Ray) writes: > Sorry to continue "beating a dead horse" here, but I forwarded a few > C-punks' messages regarding the Elementrix "Power One-Time Pad" to > this person, and I thought you might be interested in her (somewhat > cryptic ) response. Actually, no, and I'll tell you why. My only interest in this product is that you're flogging it as a one time pad, and just calling something a one time pad doesn't make it so. From all that's been exposed so far, it looks like it doesn't match the standard definition of a one time pad in standard cryptologic works. Maybe it's something it, and maybe not -- but if they're saying it a one time pad they should be prepared to prove it. Reading their warmed-over press releases doesn't interest me at all. Except for one thing, i.e. this line from the last blather: >The encryption is not done by using an encryption algorithm. 'Nuff said for now, I think. Jim Gillogly Mersday, 20 Winterfilth S.R. 1995, 17:05 From goldberg at mars.superlink.net Wed Oct 11 10:19:33 1995 From: goldberg at mars.superlink.net (goldberg at mars.superlink.net) Date: Wed, 11 Oct 95 10:19:33 PDT Subject: Internet, the cracking machine Message-ID: <199510111722.NAA16839@mars.superlink.net> Wei Dai writes: >factor RSA keys of bit >512: 20 minutes >768: 50 days >1024: 100 years >2048: 1e11 years > >If you are reading this from an archive, divide the brute force numbers by >4**(your current year-1995), and the factoring numbers by 8**(your current >year-1995), for a factor of 2 improvement per year in each of the >following: average CPU power, number of computers on the Internet, and >factoring algorithm. BUT, one must remember that the power of 2 increase is going on during the 100 years effort to break the 1024 bit case, so, by these assumptions, the 1024 bit key will break sometime in the 6th year! Fred G. Jon Goldberg From fc at all.net Wed Oct 11 10:26:30 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Wed, 11 Oct 95 10:26:30 PDT Subject: NYT on Internet Flaws In-Reply-To: <9510111604.AA06660@cantina.verity.com> Message-ID: <9510111723.AA17966@all.net> > I'd love to see something in there about most commercial sites being behind > firewalls without nfs access across the firewall. This greatly reduces the > risk from the nfs problems. If you get your binary via nfs from a trusted > host inaccessible from the internet, then if you have this problem management > can handle it as an employee problem;) There are ways to make secure > firewalls, it's fairly well understood. Sometimes people point to things > like the hack Mitnick did last Christmas, but his attack took advantage of > a couple of things a security expert shouldn't have allowed, first and > foremost two machines were accesible from the internet, and one of them > trusted root logins from the other without a password:( > > I could write something up about it if you'd like. You might want to refer the NYT to the recent study published by Computer Security Institute (in info-sec super journal on our W3 site). There are alse several papers there on "Internet Holes" under Network Security in the same on-line journal. Every month, another 5-10 holes are added to those published in this forum. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From dvberger at eit.COM Wed Oct 11 10:35:22 1995 From: dvberger at eit.COM (David Berger) Date: Wed, 11 Oct 95 10:35:22 PDT Subject: NYT on Internet Flaws Message-ID: <199510111743.KAA20982@viper.eit.com> Just read through the stack of news this was based on (comp.security.e At 05:39 AM 10/11/95 -0400, John Young wrote: > The New York Times, October 11, 1995, pp. A1, D3. > > [Page One] > > Discovery of lnternet Flaws Is Setback for On-Line Trade > > By John Markoff > > > San Francisco, Oct. 10 -- Newly publicized weaknesses in > the basic structure of the Internet indicate that the > worldwide computer network may need a time-consuming > redesign before it can be safely used as a commercial > medium. > > The flaws could allow an eavesdropper or criminal to divert > many types of documents or software programs traveling over > the Internet, examine or copy or alter them, and then pass > them on to the intended recipient -- who would have no easy > way of knowing that the files had been waylaid. Not only > could electronic mail be read in transit or credit card > numbers be copied en route, but special security techniques > meant to protect such transactions could be dismantled > without the user's knowledge. > > That such security flaws exist is not surprising in a > system designed originally as a scientific experiment. But > the recent rush to the Internet by companies seeking to > exploit its commercial possibilities has obscured the fact > that giving the system a new purpose has unearthed > fundamental problems that could well put off true > commercial viability for years. > > "Companies would have you believe this is a trivial > problem," said Eric Brewer, a professor of computer science > at the University of California at Berkeley. "But now there > is a financiat incentive to exploit these flaws and to do > it secretly." > > The problems were described in a posting that researchers > at the university made on Monday to several on-line > discussion groups. While the discussion groups are intended > for computer security experts, they are potentially > accessible to millions of Internet users -- including > break-in artists, who are known to monitor such discussion > groups for tips on new ways to crack computer systems. > > The researchers who described the Internet weaknesses > include two Berkeley computer science graduate students who > noted a security weakness in a popular Netscape > Communications Corporation software program last month. > Then as now, the students' stated motivation in publicizing > the problems was to underscore vulnerabilities facing all > companies and customers wishing to use the Internet for > commerce. > > When the Netscape problems were disclosed last month, the > company said the security flaws would be corrected in the > next version of its software, which users would be able to > download at no charge from Netscape's Internet site. But > the newly publicized flaws in the Internet itself indicate > that even if a user downloaded a copy of the new, improved > Netscape program, a criminal could tamper with the copy > along the way and make it unsafe for use in credit card > transactions. > > The problem is not Netscape's alone; it potentially affects > any organization that operates a computer from which files > or software could be downloaded over the Internet. The > weakness can be traced to the technical underpinnings of > the network, which was set up more than a quarter-century > ago not as a medium for conducting business but as a way > for academic and scientific researchers to exchange > information. > > The disclosure of the flaws casts doubt on the aspirations > of companies like Netscape, which last summer had one of > the most successful stock offerings in Wall Street history > based on the promise of the impending arrival of a > full-fledged on-line marketplace. > > "Companies should take a step back and think about this a > little more," said Ian Goldberg, one of the Berkeley > students. "If it takes a bit longer but comes out more > secure, we will all be better off in the long run." > > The way many Internet systems are set up -- especially the > Internet's increasingly popular World Wide Web service in > which software images and even video and audio clips can be > easily downloaded -- information is stored on a computer > called a file server and then transferred to a user's > computer when it is needed. > > The newly publicized weakness occurs in a widely used > Internet protocol -- or technical standard -- known as the > Network File System, or NFS. Because NFS does not have any > means for allowing the recipient of a program or document > to verify that it has not been altered during transmission > from the file server to the user, any interception or > tampering would go undetected. > > "The Internet protocols have been insecure since day one," > said Jeffrey I. Schiller, the manager of computer networks > at the Massachusetts Institute of Technology and director > of an industry task force that is trying to design a new > secure version of the Internet. > > But the group's timetable is uncertain, and even when it > does have recommendations ready, Mr. Schiller is not > optimistic that the industry will be willing to devote the > time and money to put them into effect. > > He said that many technologies already exist for improving > commercial security on the Internet, but many of them > require too much technical sophistication on the part of > computer users. He criticized makers of hardware and > software for not moving more quickly to make easy-to-use > security features a built-in part of the technology used on > the Internet. > > "The people who should be the leaders in offering security > have been too busy counting their money to build these > features in to their products," Mr. Schiller said. > > Some commercial Internet merchants have tended to play down > the potential for harm from an illegal interception of > credit card information over the Internet. They point out > that consumers routinely make their credit card numbers > available in transactions done by mail or telephone and > that the law puts limits on a consumer's liability in cases > of credit card fraud. > > But Mr. Brewer, the Berkeley professor, said that the > crucial difference in the proposed Internet commerce > systems was that for the first time it would be relatively > simple for a criminal to collect hundreds or thousands of > credit card numbers. Then a thief could use each credit > card only one time, making detection much more difficult. > > Sensitive to heightened concerns about security, Wells > Fargo, the large California bank, which earlier this year > began permitting customers with personal computers to view > their account information with the Netscape software, > suspended the service in September after the Berkeley > students reported the flaw in Netscape. > > After Netscape followed with an improved version of its > software, Wells Fargo officials found it secure enough that > they planned to resume the service later this week. The > bank will, however, require customers to use the corrected > version of the Netscape program. > > Even then. Wells Fargo customers will be able only to view > account balances and other information, but not transfer > money or conduct other transactions of the type that might > leave them vulnerable to the Internet NFS weakness. > > "We still hope to be able to offer transactional > capabilities next year, but this has slowed us down a > little bit," said Lorna Doubet, a Wells Fargo spokeswoman. > "Many of our customers feel that security is absolutely > essential and we have to be cautious in this regard." > > Executives at Netscape said yesterday that they were aware > of the security issues surrounding NFS and would make > changes in the next release of their software expected > before the end of the year to permit a recipient of a > downloaded program to check it for signs of tampering. > > And hoping to take advantage of the fault-finding talents > of the Berkeley researchers and other like-minded software > experts, the company announced a contest today called > Netscape Bugs Bounty, in which Netscape will award prizes > to users who find bugs or security loopholes in its > software. > > Some Internet experts said they expected that many security > weaknesses like the one the Berkeley group had demonstrated > would be found, because the Internet was simply not > designed to insure secure commerce. > > "Imagine a walled town or a house," said Noel Chiappa, a > member of the Internet Engineering Task Force, a > standards-setting group. "It doesn't matter if 99 windows > are tight as can be -- if the 100th is wide open, the bad > guys will bypass your security. " > > [End] > > > > > > > > > > > From tcmay at got.net Wed Oct 11 10:37:27 1995 From: tcmay at got.net (Timothy C. May) Date: Wed, 11 Oct 95 10:37:27 PDT Subject: "Denial of Clueless Service" Attacks Message-ID: At 2:18 PM 10/11/95, Anonymous wrote: >> Two years ago, I pointed out that getting a single message past >> the man in the middle isn't good enough; you have to convince your >> readers that the key they received on one channel is more accurate >> than the key they're receiving on all the other channels. >> But if they'll believe that, they may also believe the man in the middle's >> announcement that the key in your name on all the keyservers is >> wrong, and the correct key is the one he's putting out. >> Can't win either way, but it's still important to get the key out. >> >> My current key is 0x54696D4D; the fingerprint is >> 4D 65 44 75 53 61 21 2F 41 73 55 64 85 6D 21 7F. > >but this is not Tim May's key, his key is: > >pub 1024/54E7483F 1992/11/20 Timothy C. May 11-20-92 > Key fingerprint = 8C 79 1C 1B 6F 32 A1 D1 65 FB 5F 57 50 6D D3 28 > > >And this one is signed by these people: > >pub 1024/54E7483F 1992/11/20 Timothy C. May 11-20-92 >sig 0022E52D Eric Hughes >sig DDBE0DD5 John T. Draper .... Indeed, this is not an effective MITM attack. The spoofer certainly cannot read messages encrypted to my public key (though he can read messages encrypted to the public key offered above in his message...not a new situation). And he cannot sign messages that others can match to the keys I gave them, or that got put into the web of trust. So, what is it? Is it a "denial of service" attack? Not really. It's a "denial of clueless service" attack, in that anyone who tries to use that key and then send me stuff gets to have their stuff _thrown away_, which is always helpful in the war against cluelessness. Good riddance. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From aba at atlas.ex.ac.uk Wed Oct 11 10:51:56 1995 From: aba at atlas.ex.ac.uk (aba at atlas.ex.ac.uk) Date: Wed, 11 Oct 95 10:51:56 PDT Subject: Banque des Cypherpunks In-Reply-To: Message-ID: <28715.9510111748@exe.dcs.exeter.ac.uk> -----BEGIN PGP SIGNED MESSAGE----- David Murray writes: > One avenue of safety - shepherding the idea through SEC etc scrutiny > so as to render the venture completely legal seems to lack something > of a c'punk flavour. After all, one idea that some of us are quite > taken with is that strong crypto and the changes it brings are not > only important (they are), nor good (as Tim has pointed out - it > depends where you stand) but *inevitable*. > > So, how safe would a cp style bank be today? > > [feasibility analysis of blacknet style payment system] If you haven't, you should read Doug Barnes recent postings on the current state of money laundering regulations. Chilling stuff. You can bet they are not going to like the payment system you described, it's it's methods of transfering funds to and from US bank accounts would be open to many of the anti-money laundering attacks. It would put a lot of strain on the remailer nets to have the likes of FinCen, FBI, CIA, NSA etc. after them. It is the legal impliciations which are the problem, if they don't like what you are doing, and can hold that it is illegal, they will come after you with excessive force. Even it you could get away with it, a purely anarchistic system has the disadvantage of lack of take up: if no one is accepting your e-cash, you can't buy things with it. It could be made illegal for people to accept your e-cash, at this point only people acting anonymously will be using it. I think a possible approach is to work in two stages: to first work towards wide use of ecash, as privacy preserving as feasible with government imposed restrictions, and then in the future work on improving the level of privacy. The two stage approach I think is more likely to succeed because while there is no payment infrastructure, the hard-line blacknet style operations run counter to the aim of speeding the uptake of ecash. It seems to me that payment systems that escape jurisdictions by being in cyberspace protected by strong crypto, whilst perhaps inevitable long term, are still some way off. I think it is useful to explore what could be achieved by getting something less abitious working first. I like the distributed anarchic approach too, but lets first find peoples opinions on what is possible within the system, and see if anything useful would be possible with these constraints. I would like to hear views on whether the best that can be achieved with such constraints would be a step in the direction of a more desirable system (with better privacy guarantees), or whether it would instead be detrimental to the cause, say perhaps by contributing to getting a non-privacy preserving scheme immovably fixed as a standard. There are several approaches to ecash systems that I am aware of: 1. no anonymity - most current systems 2. "trust me" the schemes which claim anonymity, but in reality rely on your trust in the bank. eg Mondex 3. clipper-cash (Jakobsson) here you get to trust a (supposedly independant) third party http://www-cse.ucsd.edu/users/markus/ http://www-cse.ucsd.edu/users/markus/revoke.ps 4. blind signatures (Chaum, Brands) http://www.digicash.com/ http://www.digicash.com/publish/pu_sc.html 5. or agnostic server (Doug's paper) (blinding as well, just avoiding Chaum's patents) http://www.communities.com/paper/agnostic.html 6. anarchy - remailer net, blacknet type operation I would discount 1 & 2 as outright undesirable, and already available anyway. 6 would cause the regulators to throw a fit. Of the remainder 3, 4 & 5, I think the most likely to be acceptable to regulators is 4: clipper-cash. Next come 4 & 5. Chaum's blinding, and Doug's agnostically blinding proposals. What do people think of clipper-cash? Basically it sets of a scheme where you have an ombudsman who is supposed to be acting on the consumers behalf. Revoking privacy requires the cooperation of both the bank and the ombudsman - the bank on it's own can't strip your privacy. Down side: to get such a scheme past regulators the ombudsman would probably end up being a government body, or one beholden to government, such as banks are with all the current banking regs, re Doug's last two posts on the subject. The problem with clipper-cash see is that it is just as the name implies: private until you are investigated, or until the regulators decide to go on a fishing spree. But better than no anonymity. Technologically it would be possible to have multiple ombudsmen, or even have the recovery key be secret share split amongst ecash users in such a way that some chosen percentage of agreement would be required before cash could be traced, or revoked (made worthless). I would presume that the more ombudsmen there are, and the less amenable they are to government pressures, the less likely the payment scheme would be to be acceptable to the banking regulators. Does clipper cash satisfy any cypherpunk goals? Or is it the ecash equivalent of the hated clipper, and clipper II initiatives? A blinding agnostic or openly blinding signature based server would obviously be preferable, but could you get such a system approved by the regulators? These are just questions, to see what people think are the optimal configurations from a cypherpunks perspective, and how close to these ideals a payment system could be and still get past the regulators. Adam -----BEGIN PGP SIGNATURE----- Version: 2.6.2i Comment: Processed by Mailcrypt 3.3, an Emacs/PGP interface iQCVAwUBMHwDaSnIuJ1VakpnAQHS9wQAmVqEtZI4gNLWtory4adCvkZ1hKDYleXJ i2SM/HzvqreyVGyPyYEVWqwNasOYoUvUH/lJBt0DNjnAk1xzU2xFcjKxjjA9sOH8 tUxPbAPBNK9UJIMqMHUPCz33KDd0KYeHDJXYvW1Or+JUxRKQD065hBZZLIJqf3+K DXcMlD4qifU= =01vA -----END PGP SIGNATURE----- From tedwards at Glue.umd.edu Wed Oct 11 11:01:18 1995 From: tedwards at Glue.umd.edu (Thomas Grant Edwards) Date: Wed, 11 Oct 95 11:01:18 PDT Subject: Banque des Cypherpunks In-Reply-To: Message-ID: On Wed, 11 Oct 1995, David Murray wrote: > A bank isn't going to last long if the SEC can just take its 'deposits'. > Fortunately there are still a number of jurisdictions left where the bank's > bank account should be safe. Use k-out-of-n secret sharing to split digital coins among hundreds of pseudo-banks spread throughout the world, so that governments would have to make a large number of raids to shut it down. -Thomas From dvberger at eit.COM Wed Oct 11 11:05:04 1995 From: dvberger at eit.COM (David Berger) Date: Wed, 11 Oct 95 11:05:04 PDT Subject: NYT on Internet Flaws Message-ID: <199510111812.LAA21331@viper.eit.com> Just read through the stack of news this was based on (comp.security.unix) The Berkeley folks rightly point out that if I trust an NFS to send me a binary, then an interaction with the server sans authentication/encryption can leave me with a compromised binary. This is valid when I get my binary from out on the net. This seems much less valid when I live behind a firewall and trust my fellow workers who have access to the server, the wires coming out of my cube, and my whole machine for that matter. As a result, the only thing I think this article should say is that we need secure ftp. Isn't this being worked on? As for the article - 9/10 scaring people, 1/10 semi-fact. Be serious? NFS is not the basic structure of the Internet. I'm embarrassed that an article so weak in its explanations and so high on fluff appeared on the front page of a well respected newspaper. Dave -----the article for reread------- > The New York Times, October 11, 1995, pp. A1, D3. > > [Page One] > > Discovery of lnternet Flaws Is Setback for On-Line Trade > > By John Markoff > > > San Francisco, Oct. 10 -- Newly publicized weaknesses in > the basic structure of the Internet indicate that the > worldwide computer network may need a time-consuming > redesign before it can be safely used as a commercial > medium. > > The flaws could allow an eavesdropper or criminal to divert > many types of documents or software programs traveling over > the Internet, examine or copy or alter them, and then pass > them on to the intended recipient -- who would have no easy > way of knowing that the files had been waylaid. Not only > could electronic mail be read in transit or credit card > numbers be copied en route, but special security techniques > meant to protect such transactions could be dismantled > without the user's knowledge. > > That such security flaws exist is not surprising in a > system designed originally as a scientific experiment. But > the recent rush to the Internet by companies seeking to > exploit its commercial possibilities has obscured the fact > that giving the system a new purpose has unearthed > fundamental problems that could well put off true > commercial viability for years. > > "Companies would have you believe this is a trivial > problem," said Eric Brewer, a professor of computer science > at the University of California at Berkeley. "But now there > is a financiat incentive to exploit these flaws and to do > it secretly." > > The problems were described in a posting that researchers > at the university made on Monday to several on-line > discussion groups. While the discussion groups are intended > for computer security experts, they are potentially > accessible to millions of Internet users -- including > break-in artists, who are known to monitor such discussion > groups for tips on new ways to crack computer systems. > > The researchers who described the Internet weaknesses > include two Berkeley computer science graduate students who > noted a security weakness in a popular Netscape > Communications Corporation software program last month. > Then as now, the students' stated motivation in publicizing > the problems was to underscore vulnerabilities facing all > companies and customers wishing to use the Internet for > commerce. > > When the Netscape problems were disclosed last month, the > company said the security flaws would be corrected in the > next version of its software, which users would be able to > download at no charge from Netscape's Internet site. But > the newly publicized flaws in the Internet itself indicate > that even if a user downloaded a copy of the new, improved > Netscape program, a criminal could tamper with the copy > along the way and make it unsafe for use in credit card > transactions. > > The problem is not Netscape's alone; it potentially affects > any organization that operates a computer from which files > or software could be downloaded over the Internet. The > weakness can be traced to the technical underpinnings of > the network, which was set up more than a quarter-century > ago not as a medium for conducting business but as a way > for academic and scientific researchers to exchange > information. > > The disclosure of the flaws casts doubt on the aspirations > of companies like Netscape, which last summer had one of > the most successful stock offerings in Wall Street history > based on the promise of the impending arrival of a > full-fledged on-line marketplace. > > "Companies should take a step back and think about this a > little more," said Ian Goldberg, one of the Berkeley > students. "If it takes a bit longer but comes out more > secure, we will all be better off in the long run." > > The way many Internet systems are set up -- especially the > Internet's increasingly popular World Wide Web service in > which software images and even video and audio clips can be > easily downloaded -- information is stored on a computer > called a file server and then transferred to a user's > computer when it is needed. > > The newly publicized weakness occurs in a widely used > Internet protocol -- or technical standard -- known as the > Network File System, or NFS. Because NFS does not have any > means for allowing the recipient of a program or document > to verify that it has not been altered during transmission > from the file server to the user, any interception or > tampering would go undetected. > > "The Internet protocols have been insecure since day one," > said Jeffrey I. Schiller, the manager of computer networks > at the Massachusetts Institute of Technology and director > of an industry task force that is trying to design a new > secure version of the Internet. > > But the group's timetable is uncertain, and even when it > does have recommendations ready, Mr. Schiller is not > optimistic that the industry will be willing to devote the > time and money to put them into effect. > > He said that many technologies already exist for improving > commercial security on the Internet, but many of them > require too much technical sophistication on the part of > computer users. He criticized makers of hardware and > software for not moving more quickly to make easy-to-use > security features a built-in part of the technology used on > the Internet. > > "The people who should be the leaders in offering security > have been too busy counting their money to build these > features in to their products," Mr. Schiller said. > > Some commercial Internet merchants have tended to play down > the potential for harm from an illegal interception of > credit card information over the Internet. They point out > that consumers routinely make their credit card numbers > available in transactions done by mail or telephone and > that the law puts limits on a consumer's liability in cases > of credit card fraud. > > But Mr. Brewer, the Berkeley professor, said that the > crucial difference in the proposed Internet commerce > systems was that for the first time it would be relatively > simple for a criminal to collect hundreds or thousands of > credit card numbers. Then a thief could use each credit > card only one time, making detection much more difficult. > > Sensitive to heightened concerns about security, Wells > Fargo, the large California bank, which earlier this year > began permitting customers with personal computers to view > their account information with the Netscape software, > suspended the service in September after the Berkeley > students reported the flaw in Netscape. > > After Netscape followed with an improved version of its > software, Wells Fargo officials found it secure enough that > they planned to resume the service later this week. The > bank will, however, require customers to use the corrected > version of the Netscape program. > > Even then. Wells Fargo customers will be able only to view > account balances and other information, but not transfer > money or conduct other transactions of the type that might > leave them vulnerable to the Internet NFS weakness. > > "We still hope to be able to offer transactional > capabilities next year, but this has slowed us down a > little bit," said Lorna Doubet, a Wells Fargo spokeswoman. > "Many of our customers feel that security is absolutely > essential and we have to be cautious in this regard." > > Executives at Netscape said yesterday that they were aware > of the security issues surrounding NFS and would make > changes in the next release of their software expected > before the end of the year to permit a recipient of a > downloaded program to check it for signs of tampering. > > And hoping to take advantage of the fault-finding talents > of the Berkeley researchers and other like-minded software > experts, the company announced a contest today called > Netscape Bugs Bounty, in which Netscape will award prizes > to users who find bugs or security loopholes in its > software. > > Some Internet experts said they expected that many security > weaknesses like the one the Berkeley group had demonstrated > would be found, because the Internet was simply not > designed to insure secure commerce. > > "Imagine a walled town or a house," said Noel Chiappa, a > member of the Internet Engineering Task Force, a > standards-setting group. "It doesn't matter if 99 windows > are tight as can be -- if the 100th is wide open, the bad > guys will bypass your security. " > > [End] > > > > > > > > > > > From fc at all.net Wed Oct 11 11:12:45 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Wed, 11 Oct 95 11:12:45 PDT Subject: Elementrix POTP In-Reply-To: <199510111708.KAA09582@mycroft.rand.org> Message-ID: <9510111810.AA21080@all.net> > > Sorry to continue "beating a dead horse" here, but I forwarded a few > > C-punks' messages regarding the Elementrix "Power One-Time Pad" to > > this person, and I thought you might be interested in her (somewhat > > cryptic ) response. ... > Except for one thing, i.e. this line from the last blather: > > >The encryption is not done by using an encryption algorithm. > > 'Nuff said for now, I think. Not quite enough for my taste. If this system can be uniquely initiated by a finite sequence of bits transferred between the two parties and can be used to encrypt more than that many bits, it is not a one-time-pad - period - full stop. By definition, the information content of a one-time-pad is one bit per bit of transmitted information. If a finite number of bits is enough to initialize this system, then by definition, it ceases to be a one-time-pad as soon as one more than that many bits have been transmitted using those bits as the initialization key. This is a direct result of information theory, and cannot be circumvented by any amount of wizardry or genius. Even if you found that information theory is palpably inconsistent, the definition of a one-time-pad (as defined by Shannon in his second most famous 1949 paper) is in terms of information theory, and therefore, the end of the theory is also the end of the definition of a one-time-pad. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From perry at valhalla.phoenix.net Wed Oct 11 11:47:06 1995 From: perry at valhalla.phoenix.net (John Perry) Date: Wed, 11 Oct 95 11:47:06 PDT Subject: IMPORTANT: Valhalla is leaving alias.net domain!! Message-ID: NOTICE: valhalla.phoenix.net is leaving the alias.net domain! Please change your entries from remailer at spook.alias.net and wmono at spook.alias.net to remailer at valhalla.phoenix.net and wmono at valhalla.phoenix.net accordingly. Apparently double-domaining valhalla in SunOS 4.1.3 causes severe DNS problems that I can't explain at this time. I apologize for the inconvenience. Raph, can you change the entry to your remailer list accordingly ASAP?? John Perry - KG5RG perry at valhalla.phoenix.net From sameer at c2.org Wed Oct 11 11:48:11 1995 From: sameer at c2.org (sameer) Date: Wed, 11 Oct 95 11:48:11 PDT Subject: On export restrictions and the NYT/Internet Commerece Message-ID: <199510111842.LAA14299@infinity.c2.org> The recent NYT article about the NFS work (nominally about the NFS work, I wouldn't call "spoofing NFS" to be tantamount to being able to spoof any file xfer over the internet) stresses that the internet wasn't built for security, yadd yadda yadda and therefore isn't very useful for internet commerce at this point. I urge everyone who talks to the media about this to stress export restrictions.. The infrastructure *would* be in place by now if we didn't have export restrictions. Deployed encryption at the IP level would be much easier if we didn't have export restrictions, etc. etc. Now that the potential for big bucks are obviously on the line maybe, (They always were on the line, it is just more obvious now) just maybe, enogh large corporations will invest in lobbying for the removal of export restrictions that it will get done. -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From Chris.Claborne at SanDiegoCA.ATTGIS.com Wed Oct 11 11:54:03 1995 From: Chris.Claborne at SanDiegoCA.ATTGIS.com (Chris Claborne) Date: Wed, 11 Oct 95 11:54:03 PDT Subject: SAIC bought InterNic, but who is SAIC? A spook contractor! Message-ID: <199510111853.OAA26654@ncrhub5.attgis.com> At 05:18 PM 9/28/95 -0700, John Gilmore wrote: >Forwarded-by: gordoni at base.com (Gordon Irlam) >SAIC's board members include Admiral Bobby Inman, former NSA head and deputy >director of the CIA; Melvin Laird, Nixon's defense secretary; and retired >General Max Thurman, commander of the Panama Invasion. Recently departed >board members include Robert Gates, former CIA director; William Perry, >current Secretary of Defense; and John Deutch, the current CIA director. >Current SAIC government contracts include re-engineering information systems >at the Pentagon, automation of the FBI's computerized fingerprint >identification system, and building a national criminal history information >system. I am not supporting the idea that SAIC is not annother govt mouthpiece or cover op but it is standard practice to hire retired workers from government that worked in the area that you want to sell services into. I know of a ex army colonel that used to work for a government contractor. I'm sure that he used his contacts to sell services to the government. You gotta love it! Don't trust S/MIME, it's supported by RSA (a govt mouth piece) and uses DES. ... __o .. -\<, Chris.Claborne at SanDiegoCA.ATTGIS.Com ...(*)/(*). CI$: 76340.2422 http://bordeaux.sandiegoca.attgis.com/ PGP Pub Key fingerprint = A8 FA 55 92 23 20 72 69 52 AB 64 CC C7 D9 4F CA Avail on Pub Key server. PGP-encrypted e-mail welcome! From remailer at valhalla.phoenix.net Wed Oct 11 11:58:09 1995 From: remailer at valhalla.phoenix.net (Valhalla Remailer) Date: Wed, 11 Oct 95 11:58:09 PDT Subject: Updated Key for Valhalla Message-ID: Here is the updated key for valhalla to reflect the new address. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQCNAy/NyuUAAAEEAMN2nGvBlrvgiJn+9H8rafUOIAySzwaDAHr0myS6/dGHscfe 1gZ2usnL9zUQyhLfziurvd4yDYmsLxofHtzZuzOlZmCwSnXDwdxaeJs4zw8JoQxU OjPcxB/Ki1aNkKMhPuRezIFnWyMxOaiJTZeQmtMLhzgfgpL0xoqfP2eApTv5AAUR tEBWYWxoYWxsYSBSZW1haWxlciBUeXBlLUkgUEdQIGtleSA8cmVtYWlsZXJAdmFs aGFsbGEucGhvZW5peC5uZXQ+tDxOU0EgU3Bvb2sgUmVtYWlsZXIgVHlwZS1JIFBH UCBrZXkgPHJlbWFpbGVyQHNwb29rLmFsaWFzLm5ldD4= =3YjJ -----END PGP PUBLIC KEY BLOCK----- From rfb at lehman.com Wed Oct 11 12:01:37 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Wed, 11 Oct 95 12:01:37 PDT Subject: Announcement: Alert Mailing List In-Reply-To: <199510092303.QAA16855@iss.net> Message-ID: <9510111901.AA07166@cfdevx1.lehman.com> From: Christopher Klaus Date: Mon, 9 Oct 1995 16:03:28 +1494730 (PDT) Announcing a new security mailing list - The Alert. The Alert will be covering the following topics: - Security Product Announcements - Updates to Security Products - New Vulnerabilities found - New Security Frequently Asked Question files. - New Intruder Techniques and Awareness This sounds a lot like bugtraq. -- Rick Busdiecker Please do not send electronic junk mail! net: rfb at lehman.com or rfb at cmu.edu PGP Public Key: 0xDBD9994D www: http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rfb/http/home.html send mail, subject "send index" for mailbot info, "send pgp key" gets my key A `hacker' is one who writes code. Breaking into systems is `cracking'. From sjb at universe.digex.net Wed Oct 11 12:01:42 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Wed, 11 Oct 95 12:01:42 PDT Subject: MITM garbage In-Reply-To: <199510110408.WAA00256@wero.byu.edu> Message-ID: <199510111901.PAA15377@universe.digex.net> don at cs.byu.edu writes: >So, if you ask me, none of _those_ methods are very trustworthy considering >the resources you have to have already assigned to Mitch - after all, >keeping a 24 hour Medussawatch on you and your whole ISP is tough work. >Going _through_ Mitch is not easy. I agree. The whole of the post to which you responded was directed to the point that MITM is virtually impossible in the real world. Since as little as one successful communication can reveal his presence, Mitch must cover *all* avenues his victims may use. >>The chance of failure is minimized by diversity in the channels used to >>try to bypass the MITM. > >I agree-On the other hand, it's not terribly difficult to go _around_ >Mitch. I mean, just how many of the following things has Mitch done: >Watch all the ISP's in town and all the phone lines you can use to call >them. Filter your work/school ISPs. Filter all your net-using neighbors, >co-workers, and friends' accounts. etc. All it takes is to get one >non-Mitch public key. Once again. That's what I said. "Going around Mitch" is another way of saying "using (yet) another channel", one which you haven't tried before, meaning more diversity in the channels. >>you can't afford a failure, you *do* need a channel over which you have >>nearly complete control. The simplest such channel is a physical >>meeting, during which you exchange public keys. If the MITM threat is > >How do you know you're not giving your key to Mitch. And how do you know >that Mitch isn't headed over to Alice's later on to pretend to be you and >give Alice "your" key? This goes back to the issue of why you care about the identity of the key owner. Presumably you have some knowledge of Alice which may be verified by physical presence, or Alice carries some credentials which are sufficiently difficult to forge. Barring something like this, though, you *can't* know whether there's a MITM --- but barring prior knowledge of Alice, you don't care who's behind the key. From todd at lgt.com Wed Oct 11 12:08:00 1995 From: todd at lgt.com (Todd Glassey) Date: Wed, 11 Oct 95 12:08:00 PDT Subject: Basic Flaws in Internet Security and Commerce Message-ID: >A fine piece of work. The ideas expressed in this paper should scare >the hell out of everyone who uses NFS for any serious applications, >which for a fact includes most banks and all investment banks and >brokage houses. In this particular area I KNOW what is at risk. >Again, I congratulate the authors on a first-class effort. > > The real issue is not NFS itself but RPC and the interface layer between the system and these layered services. In fact holes also exist in RLOGIN, REXEC, and RSH (ports 512,513, and 514). Cant tell you how many secure systems we have broken because of these little goodies. The real issue is that by itself TCP/IP has no security to speak of, and more importantly the concept of secure messaging goes much farther than just keeping prying eye's off the data contained within. For instance Commerce Models require synchonization of process events in order to manage OLTP properly. TCP/IP in and of itself is really unusable for these tasks without something like the ISIS messageing protocol and process control 1interface above the protocol stack. All in all it's a complex nut to crack. Todd cheers, > paul > >> From owner-cypherpunks at toad.com Tue Oct 10 03:15:15 1995 >> From: gauthier at espresso.CS.Berkeley.EDU (Paul_A Gauthier) >> To: cypherpunks at toad.com, bugtraq at crimelab.com >> Cc: gauthier at cs.Berkeley.EDU, brewer at cs.Berkeley.EDU, iang at cs.Berkeley.EDU, >> daw at cs.Berkeley.EDU, fur at netscape.com >> Subject: Basic Flaws in Internet Security and Commerce >> Date: Mon, 09 Oct 1995 14:26:06 -0700 >> Sender: owner-cypherpunks at toad.com >> Content-Length: 10235 >> Regards, T. S. Glassey Chief Technologist Looking Glass Technologies todd at lgt.com -----BEGIN PGP SIGNATURE----- Version: 2.6 iQB1AwUBMFu5E6gNRnWhagU5AQHI+gL+Mwpcd3lAWd8FF06qcG6rnLhIYveHW71a XC7xh1T0uu8qnYX31yMp17OG28jWpKUbWec1IM9/eXOi+gInA7rKICWczV8zo9Z0 0puxjRRN7yO4KfRb3cPpk+r0p6pDg01Y =bTYb -----END PGP SIGNATURE----- From rah at shipwright.com Wed Oct 11 12:19:42 1995 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 11 Oct 95 12:19:42 PDT Subject: FWD>sig du crypt Message-ID: >Date: 11 Oct 1995 11:04:04 -0800 >From: "Vinnie Moscaritolo" >Subject: FWD>sig du crypt >To: "Bob Hettinga" > >Mail*Link(r) SMTP FWD>sig du crypt >>(forwards factored out) >> >>Sig found in sci.crypt: >> >>-- >>Eric Norman >> >> "Congress shall make no law restricting the size of integers >> that may be multiplied together, or the number of times that >> an integer may be multiplied by itself, or the modulus by >> which an integer may be reduced". >> ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From nobody at REPLAY.COM Wed Oct 11 12:30:47 1995 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 11 Oct 95 12:30:47 PDT Subject: Pointer to 10/9/95 EE Times Article Message-ID: <199510111930.UAA29409@utopia.hacktic.nl> -----BEGIN PGP SIGNED MESSAGE----- To: cypherpunks at toad.com, llange at eet.cmp.com Front Page: `Cypherpunks' asked to breach Netscape, Microsoft security Desperately seeking hackers Quotes from Sidebar (How the `Cypherpunks' mailing list works): "When The New York Times announced a security flaw in Netscape Communications Corp's World Wide Web browser software a few weeks ago, the `Cypherpunks' hit the big time." This may be true. Companies are now asking for their products to be brutalized by the Cypherpunks' to help ensure security! This could not be said even a few mere weeks ago. "According to the group's moderator, who prefers to remain anonymous, `The most important means to the defense of privacy is encryption. Cypherpunks are therefore devoted to cryptography. They wish to learn about it, to teach it and to implement it.'" Ok, since when is the Cypherpunk's mailing list moderated? It is apparent that the author, Larry Lange, has never studied the list closely or he would know how amusing this sounds... (Geez, if he had ever read one of Tim May's posts on the subject... :-) Oh well, at least, I was amused. Regards, Loren -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHwRFv8de8m5izJJAQEzWgP+LCPtBBH+hz0yqOG2MfduNyGK0kM6gHfN H/ZRZ11z2CExCZiJxRma6MhR/nRmgSePxGWMq/DfbUziUsuNwuJwN/PEEJtAXWTa dJ3FEhUaZbVlhBJK5Um1M0SeZPqiLCQH9K0DJNE0FevrJed/3MAft+owYTk2NQ+H oXDwXtFrTbw= =UGHU -----END PGP SIGNATURE----- From danisch at ira.uka.de Wed Oct 11 12:49:24 1995 From: danisch at ira.uka.de (Hadmut Danisch) Date: Wed, 11 Oct 95 12:49:24 PDT Subject: Certificate proposal Message-ID: <9510111948.AA00815@elysion.eiss.ira.uka.de> I was busy in the last days and didn't keep track of the certificate discussion. I just read most of the discussion all at once. - There was some discussion about the bindings between the key and the real world attributes of the key owner. Under normal circumstances communication never happens without an originator. If the originator uses some kind of security feature, he normally doesn't do it just for fun. He uses it as a tool to give the communication certain properties. Authenticity and confidentiality don't make sense without knowing anything about the key owners. There is no use in having a signature as long as you don't know anything about the signator. And there is no use in encrypting messages as long as you don't know anything about the receiver. A digital signature is only the way to say who wrote the message. "Knowing the author" is the sense of the signature, not just having the signature. "Knowing" means know enough attributes about him. Same with encryption. Knowledge of the author may, of course, be quite bizarre, as well as the author itself. But security is always in context of some knowledge about the other side. It doesn't make much sense to communicate with a "smith at somewhere.edu", because this is not enough information to get sufficient knowledge of the key owner. There are a lot of people named smith being able to legally have this address. And it doesn't make sense to communicate with Bob, "Bob" or ISP+Bob, as long as the name Bob is not sufficient to provide enough information. I need to be able to get any knowledge about the key owner that could be a reason to be interested in communicating with him. I do not want to talk with bob because he is one of many Bobs. I want to talk with him because he is the Bob with phone number 123, red hair and living in XY street. Therefore, a certificate must be able to provide any information that could be required for the decision whether the key owner will be accepted as a communication partner. Obviously, the informations depend on the nature of the key owner (human, machine, committee etc.) - Under normal circumstances communication has an originator and in most cases an addressee. If you can talk to an addressee, you usually have some kind of address to locate him. But perhaps you don't have more than the address, not even a public key. Thus the address to communicate should also be good to locate the public key of the addressee (or the keys of all key owners listening on that address). Therefore, the communication address should be enough to locate a key server and to retrieve the key (or a small number of possible keys) for that address. After retrieving the keys, the originator of communication can decide whether there is a key sufficiently identifying his communication partner. Consequently, the key certificate should contain the communication address of the owner. It is helpfull if the address is unique. For a human this may be the email address. For a machine it may be the DNS host name or the internet adress. For a service (WWW-site) or an organization it may be the email address. The communication address must allow to locate the key server. The only existing infrastructure allowing this in internet is the DNS. If you have an email address, hostname or IP address, you can find the appropriate DNS server. The server should be able to help you. Best way to do this is to provide the address of a key retrieval system (similar to the MX record). Use the communication address of the key owner as a searchable index for the key. Inventing a MD5 hash sum as key index is useless and doesn't make sense in my eyes. It just creates the problem of knowing the index and typo errors. - A MITM between two communication partners can be avoided by apropriate protocols as long as there is a sufficient key management structure. - A MITM between a key owner and the certification authority is a problem, but a solvable one. I don't like the separation of creating the key and attaching attributes. The MITM can attack between. There is always the problem of managing all attached attributes. When the first attribute is attached to the key, the key doesn't have any other attributes. This make it vulnerable. It is better to combine the key and its attributes _before_ creation of the key. If the attributes are not attached, but an essential part of the key, there is no hole for the MITM. If key and certification are two things, there is the problem of bringing them together. Self-certified keys don't have this problem. (RFC 1824) - There is also question whether the key attributes can be trusted to describe the real key owner well enough. This implies that someone must check the attributes and participate in attaching the attribute or creating the self-certified key. PGP uses key signatures to do so, but there is not much information attached, just name/e-mail-address. As said before there might be interest in describing the key owner in other ways. The authority signing the key must be able to check the description of the key owner. An unorganized web of trust (trust in what? signator knows key owner?) isn't suitable. One reason is that there is much too much overhead in finding a path of trust in the web and storing or retrieving the keys while searching for the path. There must be a systematic, hierarchical organization of authorities which check the key attributes. (We call them SKIA : Secure Key Issuing Authority, see RFC 1824). So I would suggest the following: We create a hierarchy of SKIAs able to check certain attributes. E.g. hostnames and IP addresses might be checked by the same authorities which allow to use them. Key attributes are a composition of the communication addresses of the key owner and his natural attributes a communication partner might be interested in while identifying the peer. Key owner and SKIA create a combination of key and attributes. The key owner deposits his key on all key servers responsible for his comm. addresses. If you communicate with someone known at least by his communication address (otherwise you couldn't communicate), you can easily retrieve all possible public keys of all key owners able to use this address. Now you can decide and choose the key with appropriate attributes (bank account number or whatever). Any comments? Hadmut From iagoldbe at csclub.uwaterloo.ca Wed Oct 11 14:29:04 1995 From: iagoldbe at csclub.uwaterloo.ca (Ian Goldberg) Date: Wed, 11 Oct 95 14:29:04 PDT Subject: Checksums for current beta versions of Netscape Navigator In-Reply-To: <199510110921.CAA29849@ammodump.mcom.com> Message-ID: <45hcsq$9i4@calum.csclub.uwaterloo.ca> 'sabout time. In article <199510110921.CAA29849 at ammodump.mcom.com>, Jeff Weinstein wrote: > This file was signed using my private key. It can be obtained from >my web page using this URL: > > http://home.netscape.com/people/jsw/my-pgp-key.txt He put his private key on his web page? Um, maybe not... :-) - Ian "Oh, no. Not again." From cman at communities.com Wed Oct 11 15:09:10 1995 From: cman at communities.com (Douglas Barnes) Date: Wed, 11 Oct 95 15:09:10 PDT Subject: regulation of money transmitters Message-ID: I just had a very pleasant conversation with the California State Banking Department; they are sending me copies of the relevant laws, and applications for the necessary licenses to sell negotiable instruments and transmit money overseas. I spoke with an examiner and she didn't seem to think there was anything special about them being _digital_ negotiable instruments. Apparently it involves a $5,000 non-refundable application fee, background investigations, examination of the soundness of the corporation, and the posting of a bond proportional to the anticipated volume (updated if volume is larger.) All very reasonable. Those who might be intereted in actually doing something with this information should contact Alicia Adoc at (415) 263 8549, or the banking department in the applicable state. From sjb at universe.digex.net Wed Oct 11 15:22:40 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Wed, 11 Oct 95 15:22:40 PDT Subject: MITM evasion MITM evasion In-Reply-To: <199510110855.JAA17966@utopia.hacktic.nl> Message-ID: <199510112222.SAA21067@universe.digex.net> Anonymous, claiming to be Tim May, writes: >Two years ago, I pointed out that getting a single message past >the man in the middle isn't good enough; you have to convince your >readers that the key they received on one channel is more accurate >than the key they're receiving on all the other channels. >But if they'll believe that, they may also believe the man in the middle's >announcement that the key in your name on all the keyservers is >wrong, and the correct key is the one he's putting out. >Can't win either way, but it's still important to get the key out. I see two general categories of MITM attacks. In one case, Mitch wants to eavesdrop on Alice and Bob, but doesn't really care about other communication they do. In the other, Mitch wants to know about all of Alice's communications, regardless of with whom they are. Public key cryptography turns the first case into two instances of the second. If Mitch doesn't control all of both Alice and Bob's communications with everyone, the will eventually discover that the key they're using for the other isn't the same one everyone else uses. In the second MITM model, Mitch has an unbelievable task. Any public key that goes from Alice to anyone else, or vice versa, must be substituted with one Mitch holds. Any messages *about* public keys must be transformed into messages about the corresponding MITM keys. This includes telephone conversations where Alice and Bob exchange keyids, the business card Eve has printed with her keyid and gives to Alice at Interop, the Betsi key Alice can read in the newspaper, WWW pages, files FTP'd, and face-to-face meetings. Anything short of total control gives Alice an opportunity to learn about Mitch's presence. If Alice can exploit the hole enough to get one good key, Mitch must change his tactics to denial of service with respect to that key, or Alice can ask the key owner for other good keys. If Mitch can successfully surround Alice in such a cloud, I submit at least one of the following statements is true: 1. Alice is such a non-entity that no one really wants to communicate with her. 2. Bob can safely assume that the new key he just got isn't really from Alice, because an Alice-with-a-life surrounded by a nearly successful Mitch-cloud wouldn't be sending out keys --- she'd be sending out messages saying "HELP ME!! I'M LOCKED IN MITCH'S SECRET BOMB SHELTER!!!" From futplex at pseudonym.com Wed Oct 11 15:36:23 1995 From: futplex at pseudonym.com (Futplex) Date: Wed, 11 Oct 95 15:36:23 PDT Subject: CoCom and Crypto Export Message-ID: <199510112236.SAA18415@thor.cs.umass.edu> I just sent this to the firewalls list in reply to a message there, but I thought it might be of interest here too. -Futplex hmmm, haven't seen any mail from the list in a suspiciously long time.... Forwarded message: > Subject: Re: International Encryption Protocols > To: Firewalls at GreatCircle.COM > Date: Wed, 11 Oct 1995 > > Ted Doty writes: > > Certainly the signatory countries to the CoCom treaty all enforce similar > > export controls to those enforced by the USA. Therefore, do not go looking > > to purchase cryptography in the UK for use outside the UK. > > I think this is misleading. CoCom, the Coordinating Committee for > Multilateral Export Controls, amounted to a non-proliferation pact to > prevent the spread of supercomputers and other hot potatoes beyond the > club of countries to untrusted (non-CoCom) countries. As far as I can tell it > did not erect export barriers _between member countries_, except perhaps some > ordinary red tape. > > Before it officially dissolved in early 1994, CoCom included, among others, > all of the G7 plus a healthy chunk of Western Europe: Australia, Belgium, > Canada, Denmark, France, Germany, Greece, Italy, Japan, Luxembourg, > the Netherlands, Norway, Portugal, Spain, Turkey, the U.K., and the U.S. > According to http://www.chemie.fu-berlin.de/adressen/org-fact.html, Austria, > Finland, Ireland, South Korea, New Zealand, Singapore, Sweden, and Switzerland > were voluntarily cooperating with the export restrictions. > > As far as CoCom was concerned, you could generally sell crypto from Britain > to most of the net. This is a far cry from the position of the U.S. ITAR, > which prohibits the export of strong confidentiality-protecting crypto to the > U.K., for example. > > Most of the other CoCom signatories do _not_ enforce export controls similar > to the U.S. ones. > > [...] > > Note: the treaty has expired, but the signatory countries seem to still be > > willing to follow it. Nobody really wants to see strong crypto widely > > deployed. > > Make that "No government really wants...." and I'll agree with you. > > BTW, ftp://ftp.eff.org/pub/CAF/law/software-export-law contains an > interesting, detailed memo dated 95/03/06, from a California law firm, giving > an "Update on Current Status of U.S. Export Administration Regulations on > Software Exports". > > -Futplex > From sjb at universe.digex.net Wed Oct 11 15:43:53 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Wed, 11 Oct 95 15:43:53 PDT Subject: Banque des Cypherpunks In-Reply-To: <28715.9510111748@exe.dcs.exeter.ac.uk> Message-ID: <199510112243.SAA21752@universe.digex.net> aba at atlas.ex.ac.uk writes: >Technologically it would be possible to have multiple ombudsmen, or >even have the recovery key be secret share split amongst ecash users >in such a way that some chosen percentage of agreement would be >required before cash could be traced, or revoked (made worthless). I don't rember if any key-splitting schemes currently allow it, but how about this: the escrow agencies would be the courts, requiring one assent from each judge on the appeals chain. As each judge rules against the defendant or denies the appeal, he adds his piece of the key to the ruling. When you reach the top of the chain, then *and only then* can you be traced. I'm not really sure if this would apply in the ecash situation, since you don't have a defendant until you've done the trace, but it sounds like a legitimate safest solution in the case of GAK. One can hardly argue that the government has illegally revealed the keys when the whole legal system has approved it. NB: I'm *strongly* opposed to GAK in principle. I don't personally think there's any such thing as a "legitimate need for law enforcment" to listen in on private individuals. A free man shouldn't have to arrange for his life to be convenient for his servants --- private or civil, it should be the other way around. I'm just nothing that, working from the common notion of "legal", this system would make illegal key seizure unlikely. From scott at Disclosure.COM Wed Oct 11 15:49:31 1995 From: scott at Disclosure.COM (Scott Barman) Date: Wed, 11 Oct 95 15:49:31 PDT Subject: BoS: Re: Netscape & Fortessa In-Reply-To: <199510111620.RAA25682@utopia.hacktic.nl> Message-ID: On Wed, 11 Oct 1995, Anonymous wrote: > > Netscape to Offer Fortezza Cryptographic Capability for > Its Software Products > > Underscores Company's Commitment to US Government Market <... snip ...> > Support for Fortezza has been added to Netscape's Secure > Sockets Layer (SSL) open protocol. SSL provides a ^^^^ I wonder how open a protocol is when one company proposes it, changes it at will, and makes what looks like a token effort for acceptance for peer review through mechanisms currently in place? scott barman -- scott barman DISCLAIMER: I speak to anyone who will listen, scott at disclosure.com and I speak only for myself. barman at ix.netcom.com "I don't know if security explains why the Win95 support Web servers run BSDI 2.0--an Intel-based Unix--rather than Windows NT, which Microsoft insists is the ideal Web software solution. Does Redmond know something we don't know?" -Robert X. Cringely, INFORWORLD, 9/11/95 From futplex at pseudonym.com Wed Oct 11 15:51:43 1995 From: futplex at pseudonym.com (Futplex) Date: Wed, 11 Oct 95 15:51:43 PDT Subject: CancelMoose = William Nagengast? Message-ID: <199510112251.SAA32456@opine.cs.umass.edu> Mark writes: > #define paranoia on > > Just ask your local TLA that has traffic monitors on the up and down links of > all the remailers so they can track a piece of email from sender to recipient. > They will take the (relatively small) logs of the hour and pump out a name > for you. > > #define paranoia off > > :) That's one of the principal advantages of Mixmaster over the earlier generation anonymous remailers. Approaching a Chaumian digital mix more closely than previous implementations, it uses only encrypted standard-sized packets in transit. This protocol should make it hard or impossible to narrow the list down to anything like a single name, depending on ambient traffic conditions. -Futplex "Our encryption doesn't use an encryption algorithm" -Elementrix From an215712 at anon.penet.fi Wed Oct 11 15:55:53 1995 From: an215712 at anon.penet.fi (an215712 at anon.penet.fi) Date: Wed, 11 Oct 95 15:55:53 PDT Subject: international clampdown on money laundering Message-ID: <9510112227.AA25400@anon.penet.fi> ----- Forwarded Message Date: Tue, 10 Oct 1995 23:35:58 -0400 (EDT) From: Brad Dolan To: snet-l at world.std.com Subject: Int'l Money Laundering, Part the Second (fwd) - ---------- Forwarded message ---------- Date: Tue, 10 Oct 1995 19:31:40 -0800 Subject: Int'l Money Laundering, Part the Second INTERNATIONAL ASPECTS The increasingly long arm of US law Those of you who have read my earlier exploration on the subject of jurisdiction (http://www.communities.com/paper/swamp.html) should be aware of a wide variety of ways that the US can "reach out and touch someone" they're not pleased with. Well, last week, I learned a few more. There are several ways in which the US is attempting to exert hegemony throughout the world wrt banking regulation: o Identification of "fiscally tolerant" nations and banking havens, and close regulatory examination of all transactions with these countries. o Pressure on major US trading partners and allies to pass and implement anti-money-laundering legislation and regulatory regimes. o Regulations on foreign banks with offices in the US, making compliance demands on world-wide operations. o Criminal prosecution of banks suspected of institutional involvement in money laundering, even if said bank has no offices or branches in the US. o Worldwide pre-trial substitute asset forfeiture of banks suspected of institutional involvement in money laundering, even if said bank has no offices or branches in the US. Pariah Nations in Banking ========================= As I touched on briefly in the previous section, transactions with well-known banking havens can automatically qualify as "suspicious." And in addition to some of the better known havens, a number of countries were pointed out at the conference as being "fiscally tolerant", including Malta, Uruguay, Japan, Ireland and Belgium; in another presentation the countries of Eastern Europe and the former Soviet Union were identified as "rapidly growing" sources of suspicious baning activity. Transactions with counterparties in such countries will be flagged by regulators for closer examination -- banks with large percentages of transactions with these countries will be expected to meet a higher standard in their attempt to identify "suspicious" behavior and will be under increasing pressure to investigate their customers' business practicies and motivation for all bank transactions. Some countries are clearly going to continue to tell the US to "get stuffed." However, if the US is successful in pressuring more and more countries to "tow the line", it will leave a shrinking pool of transactions subject to closer and closer examination. New Money Laundering Legislation ================================ Two presentations, one from Taiwan, the other from Thailand, focused on new or proposed legislation wrt money laundering in those countries. Based on my direct experience of living in the former, and my reseach into the latter, it's going to be a very, very long time before such legislation has a significant impact on either country. Chinese people (who are in the majority in Taiwan, and form an economically active minority in Thailand) are very cash- oriented; I vividly remember payday in Taiwan, with the boss sitting at a table piled with money, bundling up salaries for everyone. I'd come home at the end of each month with a giant wad of cash from my several different jobs. One could hardly imagine a better environment for money laundering than a society in which large quantities of cash change hands on a regular basis. After his talk, the Taiwanese speaker acknowledged the problems, but seemed hopeful that progress could be made. The speaker from Thailand, Nualnoi Treerat, a professor of Economics, discussed the proposed legislation primarily as an attempt to reduce the impact of organized crime on political life and society in Thailand; however, by her own estimations, the underground economy in Thailand represents 17-19% of the country's GDP (mostly drugs and prostitution.) Given the extensive corruption which she also detailed, it seems that such legislation will be a very small step indeed. Other speakers addressed the issue of cultural differences with respect to the use of cash and attitudes towards privacy, and it came up at lunch both days -- in many cultures, financial privacy is held in much higher regard than in the US, and people have a much stronger suspicion towards the government. Furthermore, there are many people who feel this way in the US. There is going to be an inevitable clash between atttempts to closely regulate and monitor money movements and people's fundamental desire for privacy. It's not clear that people of any culture can be sufficiently frightend by the bad guys to give up as much of their privacy as would be required for ultimate success in the War on Money Laundering. Despite the dim chances of success, it's clear that the US has been at least partially successful in coercing and coaxing other countries to adopt measures against money laundering, and to some extent there is local support for these measures. But these direct efforts pale by comparison to some other techniques... Foreign Bank Regulation ======================= In various pro-privacy publications I've read, there have been oblique warnings about doing business with foreign banks that maintain offices in the US. At this conference, I learned some very concrete reasons for this. It turns out that if a foreign bank wants to open a US office, they must demonstrate compliance with US money laundering laws throughout their _worldwide operations_. Furthermore, they're expected to have solid leadership for these policies from their home offices. This puts such banks in a serious bind. For instance, while Annunzio-Wylie absolves (or attempts to absolve) banks from civil liability for filing Suspicious Activity Reports and Criminal Referral Forms on their cusomters, this absolution does not extend to the home countries of these banks, where substantially different laws may obtain -- possibly explicitly forbidding this kind of reporting. There is almost a certain kind of logic to this kind of activity, but not content to extend our laws over the worldwide operations of banks with US offices, there are two ways in which US authorities are now attempting to extend US laws to banks _with no US offices_. Extraterritorial Reach ====================== The best paper presented at the conference, hands down, was "Surviving the Solution: The Extraterritorial Reach of the United States," by Kirk Munroe, a criminal defense attorney practicing in Miami. [I intend to find out if an online version of this paper can be made available.] To quote Mr. Munroe: The US money laundering law specifically provides for extraterritorial jurisdiction when (a) the conduct is by a US citizen anywhere in the world, or, if by a non-US citizen, the conduct occurs, at least in part, in the United States, and (b) the transactions, or a series of related transactions, exceeds $10,000. [18 USC $ 1956(f)] Some add'l background: banks involved in international business typically have a number of _correspondent accounts_ scattered around the world that are used for clearing wire transfers and other transactions. Since the BCCI scandal, the US government has increasingly gone after these accounts when a bank is suspected of facilitating money laundering. Furthermore, banks can have these correspondent accounts seized, even if they no longer contain "dirty" money, because they _facilitated_ a money laundering activity. When you combine these elements, you get a strategy that permits the US government to confiscate worldwide correspondent accounts of banks, even if they don't have a US presence. The first case Mr. Munroe cites is that of Banco de Occidente (Panama), one of his clients, that was alleged to have facilitated the laundering of the proceeds of drug transactions. The indictment included criminal charges against the banks and a criminal forfeiture charge. The government also filed a civil action for the forfeiture of $412 million allegedly laundered (although it had already passed completely through the bank.) The government then proceded to freeze not only the bank's US correspondent accounts, but also accounts in Germany, Switzerland and Canada, leading to the insolvency of the bank and its subsequent takeover by the Panamanian Banking Commission. [The Germans quickly unfroze the account after a civil action brought by the bank.] Quoting Munroe: After months of difficult and complicated negotiations which involved the banks' various interests in eight nations, a resolution was reached with the governments of the US, Canada, and Switzerland... [the bank] entered a guilty plea and agreed to forfeit, over a period of four years, $5 million to the US. The US, in turn, paid the Swiss and the Canadians $1 million each from the initial $2 million forfeiture payment. [Those of you who are still under any delusions about the "safety" of Swiss bank accounts, take careful note of this.] Mr. Munroe concludes that the only reason that the bank got off this "lightly" was because of substantial evidence that it was, by and large, a highly respectable institution and that this instance of laundering was an aberration. The next case cited by Mr. Munroe is that of Bank Leu. I quote from his paper: In sum, a Luxembourg bank with no office in the US was charged and convicted of money laundering in the US on the basis of clearing US dollar negotiable instruments drawn on a US bank but deposited by non-US citizens in Luxembourg. In other words, acceptance of US-dollar negotiable instruments by a bank anywhere in the world outside of the US renders the bank susceptible to US criminal jurisdiction in the money laundering field. The case boils down to this: Bank Leu wanted to expand its private banking business, and hired an officer to market accounts in South America. Two related accounts were opened, and over a one- year period $2.3 million in cashier's checks, all below $10K, were deposited in the two accounts. Although no guilty knowledge could be shown, this case was pursued and won on a theory of "willful blindness", that is, the bank "should have known" that the transactions had no valid business purpose and were inherently suspicious (came via Columbia, were sometimes more than 6 months old, all in small amounts, etc.). According to a LEA representative at the conference, there was a lot of joking in the backoffice at Bank Leu about the money being dirty, and clerks were repeatedly told "don't worry, it's ok" by bank officers. Certainly if this is true, it amounts to _extremely_ willful blindness, but this case still represents an amazingly long reach for US laws. [more to come... "Things bad people do with money"] --****ATTENTION****--****ATTENTION****--****ATTENTION****--***ATTENTION*** Your e-mail reply to this message WILL be *automatically* ANONYMIZED. Please, report inappropriate use to abuse at anon.penet.fi For information (incl. non-anon reply) write to help at anon.penet.fi If you have any problems, address them to admin at anon.penet.fi From jsw at netscape.com Wed Oct 11 16:07:06 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Wed, 11 Oct 95 16:07:06 PDT Subject: NYT on Internet Flaws In-Reply-To: <9510111604.AA06660@cantina.verity.com> Message-ID: <307C4D2F.150B@netscape.com> Patrick Horgan wrote: > > > From: "K. M. Ellis" > > > > This one is _really ripe_ for a response to the editor. Ideas? > > > > We could start something off-list if there are several interested in > > co-authoring. > > > I'd love to see something in there about most commercial sites being behind > firewalls without nfs access across the firewall. This greatly reduces the > risk from the nfs problems. If you get your binary via nfs from a trusted > host inaccessible from the internet, then if you have this problem management > can handle it as an employee problem;) There are ways to make secure > firewalls, it's fairly well understood. Sometimes people point to things > like the hack Mitnick did last Christmas, but his attack took advantage of > a couple of things a security expert shouldn't have allowed, first and > foremost two machines were accesible from the internet, and one of them > trusted root logins from the other without a password:( It might also be worth noting that people accessing the net via an ISP from home do not typically use NFS either. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From alanh at infi.net Wed Oct 11 16:27:37 1995 From: alanh at infi.net (Alan Horowitz) Date: Wed, 11 Oct 95 16:27:37 PDT Subject: SAIC bought InterNic, but who is SAIC? A spook contractor! In-Reply-To: <199510111853.OAA26654@ncrhub5.attgis.com> Message-ID: I used to work for SAIC. It's a legitimate beltway-bandito contractor. To call it a cover op is sort of missing a point. The government hardly ever does _anything_ itself (as, say, percentage of budget). Contractors are the ones who do the dirty work in the trenches. SAIC is very widely dispersed. Each field office is responsible for getting it's own contracts. Hardly any revenue flows down from HQ to the field offices. My boss used to say, "this place is like a McDonalds". AS we speak, the US Navy is busy dis-establishing its Shore Establishment. Cost savings. The same people will do the same jobs - they will have merely been hired by contractors. Alan Horowitz alanh at infi.net From pjnesser at rocket.com Wed Oct 11 17:03:05 1995 From: pjnesser at rocket.com (Philip J. Nesser) Date: Wed, 11 Oct 95 17:03:05 PDT Subject: NYT on Internet Flaws In-Reply-To: <307C4D2F.150B@netscape.com> Message-ID: <199510120001.RAA17707@oac1.rocket.com> >From: Jeff Weinstein >Date: Wed, 11 Oct 1995 16:03:11 -0700 >Patrick Horgan wrote: >> >> > From: "K. M. Ellis" >> > >> > This one is _really ripe_ for a response to the editor. Ideas? >> > >> > We could start something off-list if there are several interested in >> > co-authoring. >> > >> I'd love to see something in there about most commercial sites being behind >> firewalls without nfs access across the firewall. This greatly reduces the >> risk from the nfs problems. If you get your binary via nfs from a trusted >> host inaccessible from the internet, then if you have this problem management >> can handle it as an employee problem;) There are ways to make secure >> firewalls, it's fairly well understood. Sometimes people point to things >> like the hack Mitnick did last Christmas, but his attack took advantage of >> a couple of things a security expert shouldn't have allowed, first and >> foremost two machines were accesible from the internet, and one of them >> trusted root logins from the other without a password:( > It might also be worth noting that people accessing the net >via an ISP from home do not typically use NFS either. > --Jeff It might be even better to note that the amount of NFS traffic that passes outside of a given local network/geographical area is small NFS does reasonably poorly from a performance perspective over WAN connections in general so most organizations don't use it for more local are use. WUarchive allowed it for a while but it was infinitely slow compared to ftp. I suspect that a protocol analysis of a major interchange point (MAE's, NAP's, etc) would show NFS traffic at far less than 1% of the total. The NFS threat should be delegated to that class of problems which are characterized as locally insecure, which can be easily exploited by a malicious user (internal or external who has broken in), locally useful, something which can be made better (kerberos version for example), but generally isn't for ease of use. ---> Phil (BTW my 'mount ftp.netscape.com:/pub /mnt' command failed for some reason, can you look into it :-) From gauthier at CS.Berkeley.EDU Wed Oct 11 17:05:45 1995 From: gauthier at CS.Berkeley.EDU (Paul A Gauthier) Date: Wed, 11 Oct 95 17:05:45 PDT Subject: NYT on Internet Flaws In-Reply-To: <307C4D2F.150B@netscape.com> Message-ID: <199510120005.RAA01681@moosehead.CS.Berkeley.EDU> > > Patrick Horgan wrote: > > > > > From: "K. M. Ellis" > > > > > I'd love to see something in there about most commercial sites being behind > > firewalls without nfs access across the firewall. This greatly reduces the > > It might also be worth noting that people accessing the net > via an ISP from home do not typically use NFS either. > They don't often have the skill/knowledge/concern to verify a PGP checksum to ensure someone didn't patch their browser, either. People seem to miss that the NFS hack was only an _example_ of a powerful way to silently destroy the integrity of an executable. Spoofing the insecure FTP session they used to retrieve it works. Sending them a random trojan horse works. The point was not that NFS is insecure. It was that unless you can authenticate your executables as being trustworthy NOTHING ELSE MATTERS. SSL, good RNGs for session key selection, etc, are all null and void if you run (any) untrusted software that patches your Netscape executable, for example, or if you got a bum copy to start with. Paul From cman at communities.com Wed Oct 11 17:11:06 1995 From: cman at communities.com (Douglas Barnes) Date: Wed, 11 Oct 95 17:11:06 PDT Subject: Banque des Cypherpunks Message-ID: >aba at atlas.ex.ac.uk writes: >>Technologically it would be possible to have multiple ombudsmen, or >>even have the recovery key be secret share split amongst ecash users >>in such a way that some chosen percentage of agreement would be >>required before cash could be traced, or revoked (made worthless). > I need to make the legal situation plainer: This is an all or nothing situation. Dirty money is dirty money. If the host government(s) decide that your institution was willfully blind to the transmission of dirty money, they can seize substitute assets. I'm not saying _should_, I'm not saying that there aren't fairer ways, but any and all assets in "cooperating" countries _will_ become fair game if the government decides you've let your institution be used for money laundering. This property may be transitive -- if another institution knows or should have known that your institution knows or should have known that the money was dirty, _they_ may find their assets in cooperating countries seized. Furthermore, as I mentioned in Part the Second, countries are blatantly paid off for cooperating. In fact, Munroe mentioned after his talk that the Swiss are among the very quickest to freeze assets, although they are very slow to unfreeze them.... I'm not saying there aren't clever ways around this -- it's an arms race, and one that bankers, regulators and LEAs perceive themselves to be losing. Nevertheless, I don't think that anyone, regardless of their intentions, should get involved in international money transmission unless they are fully aware of the tools and techniques that may be brought to bear against them. From jsw at netscape.com Wed Oct 11 17:12:37 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Wed, 11 Oct 95 17:12:37 PDT Subject: Checksums for current beta versions of Netscape Navigator In-Reply-To: <199510110921.CAA29849@ammodump.mcom.com> Message-ID: <307C5C84.78A@netscape.com> Ian Goldberg wrote: > > 'sabout time. > > In article <199510110921.CAA29849 at ammodump.mcom.com>, > Jeff Weinstein wrote: > > This file was signed using my private key. It can be obtained from > >my web page using this URL: > > > > http://home.netscape.com/people/jsw/my-pgp-key.txt > > He put his private key on his web page? Um, maybe not... :-) Sorry. It was late. It was signed with my private key. The public key that can be used to verify the signature can be obtained from... --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From nelson at santafe.edu Wed Oct 11 17:13:41 1995 From: nelson at santafe.edu (Nelson Minar) Date: Wed, 11 Oct 95 17:13:41 PDT Subject: anonymous web pages? Message-ID: <199510120018.SAA12399@nelson.santafe.edu> Does any facility current exist to allow people to create anonymous web pages? After anonymous email and anonymous news postings, this is an obvious next step. It seems that it would be a fairly simple matter to write a program that would accept email containing a web page and the destination URL, do some checking, and then create (or update) the requested page. Require signatures and allow receiving mail via a remailer chain, and you've got secure anonymous web pages. The hard part would be finding a site that would be willing to serve anonymous pages. I don't understand the politics at various sites that allow anonymous remailers: maybe this isn't much harder? -- __ nelson at santafe.edu \/ http://www.santafe.edu/~nelson/ PGP key 9D719FAD Fingerprint 3B 9B 8E 58 1C 90 57 3E B7 99 ED 13 65 2E 0B 24 From jya at pipeline.com Wed Oct 11 17:18:53 1995 From: jya at pipeline.com (John Young) Date: Wed, 11 Oct 95 17:18:53 PDT Subject: NYT on Internet Flaws Message-ID: <199510120018.UAA16359@pipe2.nyc.pipeline.com> There's a strange anxiety in Markoff's story, as though it was planted on page one to exaggerate a threat to cyber law and order. Reminds that his articles on Kevin were also melodramatic, himself a player, privileged to join the hunt. Maybe this is ambient hot material for his burbling potboiler on Shimomura and Mitnick, honing an author's creative edge, and artistic license, over that, ahem, of the tranquil and capaciously befriended journalist's, pissed that privileged news files were hacked, are hackable. From cman at communities.com Wed Oct 11 17:31:05 1995 From: cman at communities.com (Douglas Barnes) Date: Wed, 11 Oct 95 17:31:05 PDT Subject: NYT on Internet Flaws Message-ID: As I pointed out to Ian on Sunday, this is a very old, very well-known bug. As I also pointed out, it is a well- understood fact about Internet security as it stands today that if you can't trust the people on your subnet, you're screwed. I also mentioned the facts that have been mentioned by others on this list (firewalls, most home users don't use NFS, etc.) It is profoundly irritating to find this splashed on the front page of the NYT, contributing to the FUD that largely benefits luddites like First Virtual and those, like MS$, pushing for a return to proprietary networks. (One quote from FV marketing director Pierre Wolfe at the ML conference I recently attended, "The Internet may end up as a ghetto, where people are afraid to engage in commercial activity.") Furthermore, neither the original post or the NYT article place any blame on the role of government regulation or greedy patent-holders in disrupting the formation of protocols based on strong cryptography, which are two of the major culprits in this matter. From jirib at sweeney.cs.monash.edu.au Wed Oct 11 17:49:49 1995 From: jirib at sweeney.cs.monash.edu.au (Jiri Baum) Date: Wed, 11 Oct 95 17:49:49 PDT Subject: CJR for perl-RSA t-shirt In-Reply-To: <199510012231.PAA00669@kiwi.cs.berkeley.edu> Message-ID: <199510120047.KAA13489@sweeney.cs.monash.edu.au> -----BEGIN PGP SIGNED MESSAGE----- Hello Raph Levien You write: > Here is a draft of the CJR I intend to file, for the perl-RSA t-shirt. ... IANAL, and I know absolutely *nothing* about what a CJR should look like. ... > ORIGIN OF COMMODITY ... > The cryptographic algorithm implemented in this t-shirt comes from > various sources, at various times, and was produced with both private > and public sources of funding. I don't think this is accurate: I guess this applies to the book which contains several algorithms. As far as I know, the RSA alg. comes from one source at one time. ... > CURRENT USE > > The t-shirt is intended as an implementation of the RSA cipher for > those who wish to incorporate encryption into their communications. > The small size of the implementation makes it particularly useful in > contexts in which existing cryptographic infrastructure is not > available. ... Perhaps somebody should make IDEA shorts? Then it would be interoperable with PGP... (Would tooooo. You just have to remember what the header is.) Hope that makes sense... Jiri - -- If you want an answer, please mail to . On sweeney, I may delete without reading! PGP 463A14D5 (but it's at home so it'll take a day or two) PGP EF0607F9 (but it's at uni so don't rely on it too much) -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBMHxllCxV6mvvBgf5AQEN8wQApplb/R+FLZcUU4ro6c8d4DIcCYK0KIbT 5LGfhtq5tN9IJPZ/00Z/otHDBztD+PDEzC2KI2EI724FEOAtvHR6ZnopkWcST500 2Ly/OEJJ+oAO2IyOkbyJ3AQCax6RkCGLrFiSGSi4N5Z24ZZ3Ovp+LTzqxyEF/81y 6Vu1dRK1Zuk= =3J6S -----END PGP SIGNATURE----- From Greg_Rose at sibelius.sydney.sterling.com Wed Oct 11 18:17:34 1995 From: Greg_Rose at sibelius.sydney.sterling.com (Greg ROSE) Date: Wed, 11 Oct 95 18:17:34 PDT Subject: Elementrix POTP In-Reply-To: <199510111433.KAA46776@tequesta.gate.net> Message-ID: <9510120118.AA45953@paganini.sydney.sterling.com> -----BEGIN PGP SIGNED MESSAGE----- liberty at gate.net (Jim Ray) wrote: and Kari asked: >Maybe you could name those experts who have inspected it - thanks. Um, in an earlier post she mentioned the venerable Mr. Kahn and someone else whose name I forget. I noted at the time that I didn't know any of the names, except Kahn, and only later realised that this is the Kahn who wrote the book, not the Karn who is a cryptographer. I don't know whether David Kahn actually has any credentials at all as a cryptographer. Does anyone else? Note I'm not trying to discredit Elementrix POTP, and especially not David Kahn who wrote a very important book. Greg Rose INTERNET: greg_rose at sydney.sterling.com Sterling Software VOICE: +61-2-9975 4777 FAX: +61-2-9975 2921 28 Rodborough Rd. http://www.sydney.sterling.com:8080/~ggr French's Forest 35 0A 79 7D 5E 21 8D 47 E3 53 75 66 AC FB D9 45 NSW 2086 Australia. co-mod sci.crypt.research, USENIX Director. -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBMHxs96RQkCwJ0+ZNAQFaOQP+MCk6kEjdwXmWIb56SIo1frZSp3Ynvxul 6TpcEz1PgNHEzHu7DVlwbNiCFc7eCCJpI8kB+pU/bB5q6Q4G88DNfmULc0NSYApI QWfer0DuuUrE2mZcknZTRb+3zMrzzd/AjGXnujE2SEODmKtc+1yAYhdgZchRYfTY w/yiLWpnxgA= =z10F -----END PGP SIGNATURE----- From rkw at dataplex.net Wed Oct 11 18:38:38 1995 From: rkw at dataplex.net (Richard Wackerbarth) Date: Wed, 11 Oct 95 18:38:38 PDT Subject: anonymous web pages? Message-ID: At 7:18 PM 10/11/95, Nelson Minar wrote: >The hard part would be finding a site that would be willing to serve >anonymous pages. I don't understand the politics at various sites that >allow anonymous remailers: maybe this isn't much harder? Yes, it is "much harder". Unless the site had a cache of all the pages that it was willing to source (the usual case), traffic analysis could easily be applied to determine the sources for pages because, unlike mail which is "store and forward", web pages are provided on a realtime connection. ---- Richard Wackerbarth rkw at dataplex.net From s1018954 at aix2.uottawa.ca Wed Oct 11 18:40:45 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Wed, 11 Oct 95 18:40:45 PDT Subject: Noise: Re: CJR for perl-RSA t-shirt In-Reply-To: <199510120047.KAA13489@sweeney.cs.monash.edu.au> Message-ID: On Thu, 12 Oct 1995, Jiri Baum wrote: > > Perhaps somebody should make IDEA shorts? > > Then it would be interoperable with PGP... > (Would tooooo. You just have to remember what the header is.) You'd still need an MD5 necktie. (and your matching stealth sunglasses? When does this go too far? This ridiculous looking figure is begging for its own worlds chat avatar. Violate ITAR and good fashion in vr. Which begs the question, would anyone notice if First Cypherpunks Bank were operating in such a networked video game? Now *that* would be a non-bank financial institution. I can just see it in court: "your honor, the disclaimer clearly says it is all a game, the state's agents have simply suspended all disbelief". Talk about stego.) From jirib at sweeney.cs.monash.edu.au Wed Oct 11 18:47:53 1995 From: jirib at sweeney.cs.monash.edu.au (Jiri Baum) Date: Wed, 11 Oct 95 18:47:53 PDT Subject: Certificate proposal In-Reply-To: <199510060419.VAA20574@jobe.shell.portal.com> Message-ID: <199510120147.LAA13833@sweeney.cs.monash.edu.au> -----BEGIN PGP SIGNED MESSAGE----- Hello Hal and cypherpunks at toad.com Hal writes: > >In article , Hal writes: > > >> OK, so suppose I want to send my credit card number to Egghead Software. ... [previous reply elided] What you are missing is that you should not say "I want to send my credit card number to Egghead Software" you should say "I want to send my credit card number to 12 34 56 78 9A BC DE F0" > I may not have been clear: the certificate I was referring to was the one > from Egghead, the one which I will use to make sure that I have a valid > key for Egghead. Such a certificate would of course not have my credit > card number; it would probably have some information related to Egghead. The certificates you'd want are: * informal correspondence from your friends that 12 34 56 78 9A BC DE F0 makes good widgets/gadgets/whatzits. * a Consumers Association report saying that 12 34 56 78 9A BC DE F0's widgets don't have sharp edges like 13 25 36 47 58 69 7A 8B's do and that 43 65 87 09 41 61 BA ED's are less efficient (eg "Choice" magazine). * possibly a certificate from the bank that 12 34 56 78 9A BC DE F0 is a merchant (if using traditional CCs). * or a certificate from a guarantor company saying that if 12 34 56 78 9A BC DE F0 doesn't deliver they'll return your money. > My rhetorical point was that information would most plausibly be a NAME > by which I would refer to Egghead. I am still trying to understand how > these proposals to take names out of the picture will apply to a > commonplace situation like this one. Yeah, I just can't imagine myself at a party introducing myself "Hi, I'm 08 04 26 6D 01 CD AB 8A 25 A9 E2 86 AD 13 C1 BA". Then again I never was good at parties... To start a new sub-thread: what if the man in the middle is actually a behaviour-modifying parasite? At that stage even a physical meeting won't do you much good (the parasite may be otherwise asymptomatic). It's probably more likely than having 30 FBI agents assigned to your case... Hope I'm making sense... (well, they say that hope dies last, no?) Jiri - -- If you want an answer, please mail to . On sweeney, I may delete without reading! PGP 463A14D5 (but it's at home so it'll take a day or two) PGP EF0607F9 (but it's at uni so don't rely on it too much) -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBMHxzWSxV6mvvBgf5AQHXawP/Xls4gWUwhTFoX9w4TYaKvqbK8MF+dxgS JPmIWdfiEijbRb/qOLzU+7NJqZ3OqcR+Ylc8uBcQPhYJgOwDSta1BYm0OrYhb+PY 6ILXeulp/2T5Y061KrbkFgJ3Z5AcsFTCBad2pHQeIzdlIixv2JPT+qbb5iEkDkgA ebEioYxWgP0= =pFkN -----END PGP SIGNATURE----- From dvberger at eit.COM Wed Oct 11 18:51:36 1995 From: dvberger at eit.COM (David Berger) Date: Wed, 11 Oct 95 18:51:36 PDT Subject: NYT on Internet Flaws Message-ID: <199510120159.SAA27558@viper.eit.com> [stuff deleted] >People seem to miss that the NFS hack was only an _example_ of a powerful >way to silently destroy the integrity of an executable. Spoofing the >insecure FTP session they used to retrieve it works. Sending them a random >trojan horse works. The point was not that NFS is insecure. It was that >unless you can authenticate your executables as being trustworthy NOTHING >ELSE MATTERS. No I don't think the community missed the point. While both NFS and FTP are equally weak in the way you point out, I think you should have used FTP as your main example because if we presume that the file server where the binary lives is reasonably trustworthy (like the guys at Netscape haven't inserted a trojan horse into their own binary and placed it up for FTP) then the way the file will propogate throughout the net is FTP and not NFS. Nonwithstanding, the NY Times writer took an otherwise reasonable point and blew it up into a "War of the Worlds" style article. I'd make sure he writes a decent article before quoting me in it. David (wondering whose stock fell because of this page one-er) =========================================================================== David A. Berger Software Engineer/Internet Product Development Enterprise Integration Technologies|800 El Camino Real|Menlo Park, CA 94025 dvberger at eit.com http://www.eit.com/~dvberger/ (415) 617-8792 =========================================================================== From cman at communities.com Wed Oct 11 18:55:19 1995 From: cman at communities.com (Douglas Barnes) Date: Wed, 11 Oct 95 18:55:19 PDT Subject: Check by phone (revisited) Message-ID: There are a variety of these new "check by phone" operations advertising on the Internet; I decided to check some of them out this afternoon. Most of them seem to use the same breathless prose immortalized in "Make Money Fast", along with generous use of the Netscape "blink" attribute, which immediately sent alarm bells ringing, especially when coupled with referral programs that border on a pyramid scheme. Furthermore, it's clear that these operations are highly vulnerable to fraud and abuse, as was mentioned in a thread on the list a few weeks back. Quoting from http://www.pixi.com/morgan_group/checks/by_phone.html: --------- TELEPHONE CHECKS (PAPER DRAFTS) ARE COMPLETELY LEGAL! Paper drafts are established as a legal method of payment as provided in the Uniform Commercial Code, Title 1, Section 1-201 [39] and Title 3, Sections 3-104, 3-401, and 3-403; Code of Federal Regulations, Title 12 Chapter II, Part 210; and Regulation J, Federal Reserve Bank, Part 2, Sections 4A-201 to 4A-212. Only verbal agreement is required for authorization. Also see Romani v Harris, 255 Md 389. --------- Any lawyers feel like checking this stuff out? (I've got the UCC at home, but not the rest of the materials.) When I called the phone number given at: http://www.Village.com/business/enterprise, I got a guy who was obviously at home, "watching the ball game"; he was quite pushy and focused on the system of "referrals" for people who sign up. Among other things, he had never heard of an ACH debit and was therefore unable to compare the conflict resolution processes for the two methods. (ACH debits are what your health club uses to deduct fees from your checking account each month -- the transactions are reversible solely on the customer's say-so.) The folks at http://www.redichek.com/redichek/redifaq.htm seem a bit more professional. They admit in e-mail that there is a security problem here (no kidding), especially wrt sending routing and account information over the Internet. I enclose our correspondence at the end of this posting, for your reading enjoyment. It seems plain from the nature of the folks who are offering these check printing services that they are not regulated or licensed. Also, it seems that these services are really just preparing the drafts, any liability for submitting bogus drafts rests on the merchant into whose account the drafts are deposited. Question: has anyone seen more legitimate folks offering this type of service? Also, it seems that for the fees that these folks are charging, it would be worth it for a merchant to do this in-house. When this topic came up before, I recall people mentioning sources of magnetic ink and check paper; is this stuff really widely available? Another puzzling factor is that all the services seem to base the fees on the amount of the transaction, when, as near as I can tell, the check printer has no exposure, and costs are in no way proportional to transaction size (basically they're collecting data and running a laser printer.) Proably due to their positioning themselves wrt credit card companies. Joe-Bob sez: Check it out. ========================================================================= Date: Wed, 11 Oct 95 18:13:57 -0600 X-Sender: msumsion at mail.redi-check.com Mime-Version: 1.0 To: cman at communities.com (Douglas Barnes) From: msumsion at optical.fiber.net (Michael Sumsion) Subject: Re: Legal basis Douglas, Thanks for the inquiry. Before I answer your questions, I would like to make you aware that we are in the process of building a completely new, completely secure system using this same check-draft service. It will be arriving within the next couple of weeks. This new system will allow online customers to make purchases, using their checking account, without the need to transmit their account information over the Internet. On to your questions: > >Hi, our company may be a potential customer of your service, >but I have questions about the legalities involved in printing >drafts on people's accounts. In particular, this system seems >especially vulnerable to fraud. I just spoke with our banker, >who had not heard of these services, and was quite concerned. Many bankers have not heard of the system, although it has been in use now for over 3 years. We get calls from bankers on a regular basis who are curious about the service. After explaining it to them, they are generally very supportive. As far as the legalities, it is perfectly legal to print a draft, drawn on a customer's account, with the authorization of the customer. In fact, the legal basis for this is printed on the bottom of each of our drafts. >For instance, wouldn't it be possible for any recipient of a >check from someone to copy down the routing information and >account number, and then use that to defraud the account holder >and the merchant? Yes, this is possible. We have never run into this situation, however. We are not stating that this system is any more secure (with the current system) than credit cards. What we WILL say is that this system is as safe as walking into any store and handing the clerk one of your checks. (The new system will eliminate the need to transmit this information.) >Also, I'm curious where the liability rests in the event that >a charge is disputed -- that is, the customer claims that they >didn't authorize the transaction. How readily are the charges >reversed? I'm familiar with ACH debits, which are extremely >easy for customers to reverse; how does this system compare with >ACH debits? Since there is no standard or regulation regarding this in the banking industry, this differs from bank to bank. Some banks will allow you to go back as far as two years to dispute a check. Others will only go back 30-60 days from the date of receipt. I hope that I've been able to answer completely. If you would like to speak with someone about specific processes, please give Allen a call at 801.298.1212. Thanks, Michael Sumsion _/_/_/ _/_/_/ _/_/ _/ _/_/_/ _/ _/ _/_/_/ _/_/_/ _/ _/ TM _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/_/ _/_/ _/ _/ _/ _/_/ _/ _/_/_/ _/_/ _/ _/_/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/_/_/ _/_/ _/ _/_/_/ _/ _/ _/_/_/ _/_/_/ _/ _/ Internet Commerce Solutions - (800) 607-2001 Fax (801) 298-9789 email: msumsion at redi-check.com http://www.redi-check.com/redi-check Referral Program: http://www.redi-check.com/redi-check/referral.htm ====================================================================== From sandfort at crl.com Wed Oct 11 18:56:23 1995 From: sandfort at crl.com (Sandy Sandfort) Date: Wed, 11 Oct 95 18:56:23 PDT Subject: Final Roster/Reminder -- Bionomics Conference (fwd) Message-ID: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SANDY SANDFORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C'punks, Here's a sign of the times> S a n d y ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ---------- Forwarded message ---------- Date: 11 Oct 95 14:38:02 . . . Subject: Final Roster/Reminder -- Bionomics Conference Dear Friends, With a record number of 35 speakers and panelists (whew!), the program for the 3rd Annual Bionomics Conference has been finalized. Since our brochures were printed, we've added a number of interesting and thought-provoking individuals, including o Lew Perelman, author of "Hyperlearning" o Andrew Basile, author of "The SPA's Guide to Online Law" o Morley Winograd, author of "Taking Control: Politics in the Information Age" o Frank Gregorsky, former chief of staff to Cong. Newt Gingrich o Jim Griffin, Director of Technology at Geffen Records o Don Lavoie, Director, Program on Social & Organizational Learning, George Mason University o Irwin Glenn, Senior Systems Engineer, Netscape Communications o Pat McKim, Managing Partner, Practical Strategies o Cindy Cooke, Director, Democratic Leadership Council of CA o Dennis Miller, Associate Professor, Baldwin-Wallace College . . . What's more, for the truly tech-savvy, you can now pay for your conference attendance with Cybercash. Just check our web site (www.bionomics.org). . . . ^^^^^^^^^ From jirib at sweeney.cs.monash.edu.au Wed Oct 11 19:23:06 1995 From: jirib at sweeney.cs.monash.edu.au (Jiri Baum) Date: Wed, 11 Oct 95 19:23:06 PDT Subject: Elementrix Press Release In-Reply-To: Message-ID: <199510120222.MAA13959@sweeney.cs.monash.edu.au> -----BEGIN PGP SIGNED MESSAGE----- Hello cypherpunks at toad.com and Ulf.Moeller at hamburg.netsurf.de (Ulf Moeller) - From the press release: > > "Elementrix has found a logical way to generate non-algorithmic, > >dynamically changing keys at two separate sites without transmitting > >them on the line and without using parallel lines," said Dr. David Kahn, Ulf Moeller responds: > Obviously they have invented a telepathic key exchange scheme. Actually, when I read the above I thought of Quantum Mechanics, but I would expect you'd need special hardware for that. (In fact I'd expect you'd need special comms lines for that, but certainly at least the equipment at the two ends.) Still, who knows what surprises QM can provide? In which case calling it a "telepathic key exchange scheme" might be quite appropriate :-) However, Occam's razor points to cluelessness. Jiri - -- If you want an answer, please mail to . On sweeney, I may delete without reading! PGP 463A14D5 (but it's at home so it'll take a day or two) PGP EF0607F9 (but it's at uni so don't rely on it too much) -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBMHx7uCxV6mvvBgf5AQEkVAP+NBgn59bOX+ydhcmz2HNSC1k6qdr6Y5xE bre/zepTJ2h1v+8cSQfJMLNfiA36bBtGxxpPvV09Ojn9KJTZhmvyCtN99VG71DZc SxL/ji0KnWCFkAT4v2IKSK4vUwAs71GjXeNb9RicrcfIOPc7FAFyJZ9DsGbQUUZ2 eoVsPkde4K8= =OJs9 -----END PGP SIGNATURE----- From an407769 at anon.penet.fi Wed Oct 11 19:57:11 1995 From: an407769 at anon.penet.fi (an407769 at anon.penet.fi) Date: Wed, 11 Oct 95 19:57:11 PDT Subject: netscape rewards bug finders Message-ID: <9510120245.AA01029@anon.penet.fi> Netscape Offers Rewards To "Bug Catchers" MOUNTAIN VIEW, CALIFORNIA, U.S.A., 1995 OCT 11 (NB) -- Netscape Communications Corporation (NASDAQ: NSCP) has announced the "Netscape Bugs Bounty" program that rewards users who help the company find and report "bugs" in the beta versions of its recently released Netscape Navigator 2.0 World Wide Web browser software. Users who are the first to report a particular bug will be rewarded with various prizes depending on its importance. The contest begins with the beta versions of Netscape Navigator 2.0 that are already on the Internet. Full rules for the contest will be available on Netscape's home page at http://home.netscape.com . Speaking to Newsbytes, Roseanne Siino a spokesperson for Netscape, said, "As far as we can determine, this is the first contest of its kind. Netscape's whole approach to broad-based beta testing on the Internet was new, and we hope the contest will enliven the beta testing process." Users who are the first to report a particular bug will be rewarded with prizes depending on the "bug class." Users reporting "significant security bugs," as determined by Netscape, will collect cash prizes, while users finding any security bugs will win Netscape "merchandise." Users finding other "serious" bugs will be eligible to win "a choice of items" from the Netscape General Store. Siino pointed out that there are no caps on winners. Top prize will be $1,000 for any and all bugs in the top category: Severe Security Bugs. To win, the finder has to be the first, and, according to the company, it is important to be constantly using the current versions. The beta versions are available now for downloading on the Internet for free evaluation. Netscape's beta testing of 2.0 is already underway. Users who downloaded previous beta versions of the 2.0 software should download today's versions, which fix major and minor bugs identified since its initial release, including security bugs in the pre-release version of the Java language support integrated in 2.0. Netscape has released special beta versions of 2.0 that include Java for users wanting to test it. Because bugs will be reported and fixed on an ongoing basis, Netscape asks users to stay current on the beta version they are using, so that the latest software is constantly being refined. "We are continuing to encourage users to provide feedback on new versions of our software, and the Netscape Bugs Bounty is a natural extension of that process," said Mike Homer, vice president of marketing at Netscape. "By rewarding users for quickly identifying and reporting bugs back to us, this program will encourage an extensive, open review of Netscape Navigator 2.0 and will help us to continue to create products of the highest quality." Netscape has created two versions of its Netscape Navigator 2.0 beta, available for downloading from Netscape's home page at http://home.netscape.com . Version b1J for Windows 95, Solaris, and Irix platforms includes Java and is for users who want to participate in the bounty program. For general users or those on other Unix environments, Windows 3.1, and Macintosh, Netscape has posted beta versions without Java. After initial testing is complete, future beta versions for all supported platforms will contain Java. (Richard Bowers/19951000/Press Contact: Roseanne Siino, Netscape, 415-254- 1900) --****ATTENTION****--****ATTENTION****--****ATTENTION****--***ATTENTION*** Your e-mail reply to this message WILL be *automatically* ANONYMIZED. Please, report inappropriate use to abuse at anon.penet.fi For information (incl. non-anon reply) write to help at anon.penet.fi If you have any problems, address them to admin at anon.penet.fi From s1018954 at aix2.uottawa.ca Wed Oct 11 20:08:17 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Wed, 11 Oct 95 20:08:17 PDT Subject: Elementrix Press Release In-Reply-To: <199510120222.MAA13959@sweeney.cs.monash.edu.au> Message-ID: On Thu, 12 Oct 1995, Jiri Baum wrote: > Still, who knows what surprises QM can provide? > > In which case calling it a "telepathic key exchange scheme" might > be quite appropriate :-) I don't think that's what was meant. After all, using telepathy as a secure channel, you'd still need a comm protocol. The last time I checked protocols and algorithms are one and the same. Since elementrix doesn't use algorithms, we shouldn't defame them by claiming they've invented secure telepathy. Now wouldn't that be interesting to patent? (One wonders if elementrix employees occasionally indulge in guilty glances at Knuth and Sedgewick without their bosses' knowledge.) From anonymous-remailer at shell.portal.com Wed Oct 11 20:28:36 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Wed, 11 Oct 95 20:28:36 PDT Subject: variations on an attack Message-ID: <199510120326.XAA10502@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- - -----BEGIN PGP SIGNED MESSAGE----- Jiri Baum wrote: > To start a new sub-thread: what if the man in the middle is actually > a behaviour-modifying parasite? At that stage even a physical meeting > won't do you much good (the parasite may be otherwise asymptomatic). That wouldn't quite work since the host would notice the parasite in the middle and could then work out countermeasures. An important part of a MITM attack is escaping notice. What if one night the man in the middle drugged you, kidnapped you, placed you inside a virtual reality machine, replaced your body with a clone, and established a link between the VR machine and the clone so that you experience everything the clone experiences and the clone does everything you intend to do? Can you prove this has not already happened? - the Mad Scientist in the Middle - -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMHyIA9IjPOsOWLIJAQE3AgP/bNcA0BmDMvto9SocpIcYImoXJ72k9k+Z gYH6dnCo5UCY0KbKwgCbBfQI0bxpaP7EWmZPS/i1HdzWvKOw9JExY2i0gvKMr/BS KGtlG0+RAVSU9DiVRuAr6d7x6IQKYOeRgcNz0Dm2JpaA1eo/DbJ3tsRBYCeaQQ26 gS5XzNzL00M= =lc/J - -----END PGP SIGNATURE----- - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQCNAzB8hz8AAAEEAKuHA58RXNk5o0nlDTOsoAs3YTKubscQYoW3kLSjmn7gmskD NtPKxYvXveGN3D/eBgsMzdGVtrl46j1r6VjYsTMcDGUL9wGQnflgHGrbReFYGzkI yW7GhyeUoRqCdmACDpmzUxEqp2J5hK2obL8bcvoiVSBMFogabdIjPOsOWLIJAAUT tEJJIHdvdWxkIGxpa2UgdG8gYmUgcmVmZXJlZCB0byBhcyAidGhlIE1hZCBTY2ll bnRpc3QgaW4gdGhlIE1pZGRsZSI= =Lzd5 - -----END PGP PUBLIC KEY BLOCK----- - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMHyK9SoZzwIn1bdtAQHNsgF/WqMLd/EuNEG3QEXZobZKDQDl0hjMmhBn 56pUQxkNYi0ckMx+YIij9X7XoExm3MsK =D+xl -----END PGP SIGNATURE----- From jsw at netscape.com Wed Oct 11 20:36:43 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Wed, 11 Oct 95 20:36:43 PDT Subject: NYT on Internet Flaws In-Reply-To: Message-ID: <307C8C5C.4F34@netscape.com> Douglas Barnes wrote: > It is profoundly irritating to find this splashed on the > front page of the NYT, contributing to the FUD that > largely benefits luddites like First Virtual and > those, like MS$, pushing for a return to proprietary networks. > (One quote from FV marketing director Pierre Wolfe at the ML > conference I recently attended, "The Internet may end up > as a ghetto, where people are afraid to engage in commercial > activity.") It is a fact of life now that there are many journalists lurking on cypherpunks, and other places on the net. I have been directly contacted by three reporters just in the past week. Our PR department tells me that cypherpunks, and my name, are routinely mentioned by reporters these days. I've seen my postings to this list quoted without my prior knowlege in at least one news article. I wish that folks sending to this list would realize this new world exists, as much as it sucks, and spend a bit more time double checking before posting anything alarmist. In particular, there have been several recent false alarms regarding netscape security sent to this list and others. While I don't want to sweep real security holes under the rug, I think it hurts both cypherpunk and netscape interests for false claims to be coming out of this list. Just to make things clear, I'm not an official spokesperson for Netscape and anything sent to this list is my personal opinion. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From nesta at cynico.com Wed Oct 11 20:43:29 1995 From: nesta at cynico.com (Nesta Stubbs) Date: Wed, 11 Oct 95 20:43:29 PDT Subject: NYT on Internet Flaws In-Reply-To: <307C4D2F.150B@netscape.com> Message-ID: On Wed, 11 Oct 1995, Jeff Weinstein wrote: > > I'd love to see something in there about most commercial sites being behind > > firewalls without nfs access across the firewall. This greatly reduces the > > risk from the nfs problems. If you get your binary via nfs from a trusted > > host inaccessible from the internet, then if you have this problem management > > can handle it as an employee problem;) There are ways to make secure > > firewalls, it's fairly well understood. Sometimes people point to things > > like the hack Mitnick did last Christmas, but his attack took advantage of > > a couple of things a security expert shouldn't have allowed, first and > > foremost two machines were accesible from the internet, and one of them > > trusted root logins from the other without a password:( > > It might also be worth noting that people accessing the net > via an ISP from home do not typically use NFS either. And that this is the segment of the user population that is most important to commerce online. But I still hate to see these types of solutions being used to try and cover something that should, and could be fixed in the underlying protocol itself. Wouldnt AH and ESP take care of a large portion of the existing security holes? Certainly not all of them, but it would solve alot of problems and make development of secure applications much easier. note: is anyone working on implementeing some of the things outlines in R(1825?) ? I think Perry posted regarding it awhile back, but havent heard much about it since. Nesta Stubbs "Betsy, can you find the Pentagon for me? Cynico Network Consulting It has five sides and a big parking lot" nesta at cynico.com -Fred McMurray- From sameer at c2.org Wed Oct 11 20:52:56 1995 From: sameer at c2.org (sameer) Date: Wed, 11 Oct 95 20:52:56 PDT Subject: NYT on Internet Flaws In-Reply-To: <307C8C5C.4F34@netscape.com> Message-ID: <199510120347.UAA27336@infinity.c2.org> > I wish that folks sending to this list would realize this > new world exists, as much as it sucks, and spend a bit more time > double checking before posting anything alarmist. In particular, > there have been several recent false alarms regarding netscape > security sent to this list and others. While I don't want to sweep > real security holes under the rug, I think it hurts both cypherpunk > and netscape interests for false claims to be coming out of this > list. I completely agree that the reporters on this list make things very difficult and people do need to be very careful about posting things which will get misinterpreated by reporters.. but-- This list is -not- an "announcement" list. If I see a potential bug, I want other cypherpunks to tell me whether I am onto something or not, so I would post. If some idiot reporter takes that and writes an article saying "XXX has a hole" that is -EXTREMELY BAD REPORTING-. I understand though, that we can't control what the reporters say and how they interpret what we say. It is very important to word your posts carefully such that when you post a bug a reporter won't think that they should write an article on it until it is verified. It's very sad, though, that we have to be very careful about what we post now because of the media attention. I would prefer if the list could just be a forum where we can discuss things, but that is not the case. > > Just to make things clear, I'm not an official spokesperson > for Netscape and anything sent to this list is my personal opinion. > As if that is going to help when a reporter sees your post. "Jeff Weinstein, Electronic Munitions Specialist at Netscape, said, 'XXXX'" -- doesn't put you down as "spokesperson for netscape", and doesn't contain any factual errors, but is damn misleading and makes it sound like you are speaking for Netscape... I guess I'm rather lucky being in charge of a sole proprietorship-- there isn't very much difference between me speaking for myself and speaking for my business. (There are some differences, yes, but very small.) -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From jirib at sweeney.cs.monash.edu.au Wed Oct 11 21:01:12 1995 From: jirib at sweeney.cs.monash.edu.au (Jiri Baum) Date: Wed, 11 Oct 95 21:01:12 PDT Subject: MITM attacks and True Names (again...) In-Reply-To: <199510070102.TAA14826@nagina.cs.colorado.edu> Message-ID: <199510120358.NAA14220@sweeney.cs.monash.edu.au> -----BEGIN PGP SIGNED MESSAGE----- Hello cypherpunks at toad.com and hallc at cs.colorado.edu and Bryce Bryce wrote: ... [about MITM] ... > all a True Name is really necessary for > is violence. (And, pending certain eagerly-awaited technological > developments, for sex.)) ... Why is a true name necessary for sex? It should be feasible to arrange a romantic rendezvous without True Names, no? How often have you checked IDs before going on a date? (I think most normal people would notice a MITM during, er, never mind.) You simply arrange time, place, sign/counter-sign. Anything I've missed? > Now I have four things to say about this "evasion of Mitch" thing. > Don't worry, they are all short and some of them are interesting. ... For thing number five from your next post: I find it amusing that octets seven and eight of my fingerprint resemble the name of a certain Swedish group of singers. Mama mia! Here I go again, my my, how can I resist... stop humming to yourself! Jiri - -- If you want an answer, please mail to . On sweeney, I may delete without reading! PGP 463A14D5 (but it's at home so it'll take a day or two) PGP EF0607F9 (but it's at uni so don't rely on it too much) -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBMHySUSxV6mvvBgf5AQHQRwP+OHsQ0YFtbgDipZPcEm9W6JdLOIl7rlSK Y9bjDlJ0Z4B/Cy9T1+gEtCDp3EOFVmq+B7CLmbEKb+PqgiMHIf5oJ/8Xt7+4p9gr FBprEoK8wk6SCUY3EKDakwpXpsf9HJGI4jwpJonRnlQGxUE0f4n3zVBoLQwNiLYk XBKvMZ1Ln1Y= =2fMz -----END PGP SIGNATURE----- From patrick at Verity.COM Wed Oct 11 21:04:51 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Wed, 11 Oct 95 21:04:51 PDT Subject: Basic Flaws in Internet Security and Commerce Message-ID: <9510120401.AA15785@cantina.verity.com> > > So: If you can't trust your path to your own file system, what can you > trust? (And this is without even talking about things like firmware > upgrades and BIOS patches and all sorts of other potential approaches.) Can > we do no better than simply assume the local workstation file system can be > trusted? > Nah, it's not as bad as all that. There's fixes to all of this, they're well known, and actually in place at some places. Because it's such a pain having good security on all of the machines most sites choose to have really good security on a firewall to keep the bad guys out, and through policy, isolation, and less stringent security measures protect the machines inside the firewall. That's not to say that everyone with a firewall has good security, far from it. It's also not to say that everyone without a firewall is vulnerable, they're not...I know folks with all of their machines buttoned up tight. It's possible to close most categories of holes, and to detect intrusions in progress. You say you're worried about the system being corrupted so that you can't trust calls to the OS. Some attacks do work this way, but you can prevent the attack via a combination of good security and good practices. And yes, secure authentication and transmission of data makes everything much simpler;) Without it you have to essentially pull up the drawbridge and trust no one outside the moat, since there's no way of knowing if anyone, or any host is who or what they say they are. If anyone wants more specific information about how to protect from various attacks I can help or give you references to the literature, but I won't go into it here since I expect that most anyone you'd find on cypher- punks knows all this at least in outline already. Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From rsalz at osf.org Wed Oct 11 21:13:30 1995 From: rsalz at osf.org (Rich Salz) Date: Wed, 11 Oct 95 21:13:30 PDT Subject: NYT on Internet Flaws Message-ID: <9510120410.AA28665@sulphur.osf.org> > I understand though, that we can't control what the reporters >say and how they interpret what we say. It is very important to word >your posts carefully such that when you post a bug a reporter won't >think that they should write an article on it until it is verified. NO! Something like Perry's "Do not redistribute without permission" should be the only modification needed. /r$ From sameer at c2.org Wed Oct 11 21:22:47 1995 From: sameer at c2.org (sameer) Date: Wed, 11 Oct 95 21:22:47 PDT Subject: anonymous web pages? In-Reply-To: <199510120018.SAA12399@nelson.santafe.edu> Message-ID: <199510120417.VAA29572@infinity.c2.org> c2.org allows people to setup anonymous web pages. http://www.c2.org/services/ -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From sameer at c2.org Wed Oct 11 21:25:37 1995 From: sameer at c2.org (sameer) Date: Wed, 11 Oct 95 21:25:37 PDT Subject: anonymous web pages? In-Reply-To: Message-ID: <199510120420.VAA29755@infinity.c2.org> What's so hard about finding a site to host anon web pages? c2.org's been doing it for over a year. had the CoS threaten to sue us over it, even. > > At 7:18 PM 10/11/95, Nelson Minar wrote: > >The hard part would be finding a site that would be willing to serve > >anonymous pages. I don't understand the politics at various sites that > >allow anonymous remailers: maybe this isn't much harder? > > Yes, it is "much harder". Unless the site had a cache of all the pages that > it was willing to source (the usual case), traffic analysis could easily be > applied to determine the sources for pages because, unlike mail which is > "store and forward", web pages are provided on a realtime connection. > > ---- > Richard Wackerbarth > rkw at dataplex.net > > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From sameer at c2.org Wed Oct 11 21:26:50 1995 From: sameer at c2.org (sameer) Date: Wed, 11 Oct 95 21:26:50 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510120159.SAA27558@viper.eit.com> Message-ID: <199510120421.VAA29813@infinity.c2.org> > Nonwithstanding, the NY Times writer took an otherwise reasonable point and > blew it up into a "War of the Worlds" style article. I'd make sure he > writes a decent article before quoting me in it. > Not possible. Reporters don't call you for a quote and then send you a draft of the article for your approval before they publish. They call for a quote, write their article, and publish, not asking for approval. -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From sameer at c2.org Wed Oct 11 21:31:40 1995 From: sameer at c2.org (sameer) Date: Wed, 11 Oct 95 21:31:40 PDT Subject: NYT on Internet Flaws In-Reply-To: <9510120410.AA28665@sulphur.osf.org> Message-ID: <199510120426.VAA00261@infinity.c2.org> > > NO! > > Something like Perry's "Do not redistribute without permission" should > be the only modification needed. "should" is very different from what is. Hell, -no- change "should" be necessary. Reporters "should" be aware of the issues and write good articles. But they don't. Some "Do not redistribute w/o permission" isn't going to stop a reporter from printing an article about your post, if they think it will get them the front page and a raise. -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From tbyfield at panix.com Wed Oct 11 21:46:56 1995 From: tbyfield at panix.com (t byfield) Date: Wed, 11 Oct 95 21:46:56 PDT Subject: SAIC bought ... [NOISE] Message-ID: At 7:27 PM 10/11/95, Alan Horowitz wrote: >I used to work for SAIC. It's a legitimate beltway-bandito contractor. To >call it a cover op is sort of missing a point. The government hardly ever >does _anything_ itself (as, say, percentage of budget). Contractors are >the ones who do the dirty work in the trenches. It's not missing the point at all; what I find particularly alarming is this half-measure situation we increasingly find ourselves in, wherein the state farms out the drudgery of being a state but reserves to itself the prerogative to govern by obscure fiat. Institutions like SAIC aren't accountable in a way that gov't agencies at least theoretically are, yet the continuing existence of those agencies amidst this move toward privatization perpetuates this increasingly mythical idea of "accountability." If everything's going to go private, fine, whatever, let's make a go of it, and no one can tell me what software I can/can't use and how much I can/can't deposit, etc.; OTOH, if the USG wants to reserve the right to tell me what I can and can't do in these regards, then it had bloody well better submit to the "responsibility" that goes with that "right": accountability to the electorate. Why do you think the spooks make such prodigious use of cutouts? In part because it's an effective way of evading detection; and, unfortunately, oversight is a subset of detection. I'm sure SAIC does tons of perfectly legitimate contract work--but I'm equally sure that it does tons of covert work. And far too much covert work is covert for no other reason than it's stupid (read my lips: "exploding giant clams") or--in the case at hand--something that a rapidly growing sector of the electorate rightly regards with suspicion. Ted From jirib at sweeney.cs.monash.edu.au Wed Oct 11 22:10:23 1995 From: jirib at sweeney.cs.monash.edu.au (Jiri Baum) Date: Wed, 11 Oct 95 22:10:23 PDT Subject: Noise: Re: CJR for perl-RSA t-shirt In-Reply-To: Message-ID: <199510120509.PAA14542@sweeney.cs.monash.edu.au> -----BEGIN PGP SIGNED MESSAGE----- Hello s1018954 at aix2.uottawa.ca > On Thu, 12 Oct 1995, Jiri Baum wrote: > > > > > Perhaps somebody should make IDEA shorts? > > > > Then it would be interoperable with PGP... > > (Would tooooo. You just have to remember what the header is.) > > You'd still need an MD5 necktie. Actually, you don't - you just don't get signatures without it. However, authentication AFAIK was never a problem to export, so there's no need to bother. If you are reading a signed message, you simply strip off the signature without checking it (or you leave it on and pass it through a hypothetical exportable auth-only PGP). For creating messages, you have to make do without signatures. What you *would* need would be a coin, but I guess this is generally available (you know, flip it a hundred times to generate the session key). > (and your matching stealth sunglasses? When does this go too far? > This ridiculous looking figure is begging for its own worlds chat avatar. > Violate ITAR and good fashion in vr. Which begs the question, would anyone > notice if First Cypherpunks Bank were operating in such a networked video > game? Now *that* would be a non-bank financial institution. I can just > see it in court: "your honor, the disclaimer clearly says it is all a game, > the state's agents have simply suspended all disbelief". Talk about stego.) Hmm, just like Monopoly money, I guess. Nobody's been busted yet for printing that, have they. Jiri - -- If you want an answer, please mail to . On sweeney, I may delete without reading! PGP 463A14D5 (but it's at home so it'll take a day or two) PGP EF0607F9 (but it's at uni so don't rely on it too much) -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBMHyi5ixV6mvvBgf5AQGttgQA2LpV4T7QTZvZ6C0NajnFmsDvAEOZuqVR N9rL9fiBh52KWTRYxqr/284onyJFkgyMUljDggSZvfNlhx3kV/J03Yne+sJAMoL1 NOVOoQtKAbbQ1ixD8fXMD1ybehmU1BaB2VVfwrY7vdn4gky6ZUlpU/4dQ3hArms3 Ni63Gaf7iwE= =33pa -----END PGP SIGNATURE----- From klp at gold.tc.umn.edu Wed Oct 11 22:36:24 1995 From: klp at gold.tc.umn.edu (Kevin L Prigge) Date: Wed, 11 Oct 95 22:36:24 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510120347.UAA27336@infinity.c2.org> Message-ID: <307ca9244fa4002@noc.cis.umn.edu> According to rumor, sameer said: > > I completely agree that the reporters on this list make things > very difficult and people do need to be very careful about posting > things which will get misinterpreated by reporters.. but-- > > This list is -not- an "announcement" list. If I see a > potential bug, I want other cypherpunks to tell me whether I am onto > something or not, so I would post. If some idiot reporter takes that > and writes an article saying "XXX has a hole" that is -EXTREMELY BAD > REPORTING-. It's the "information wants to be free" mindset meeting the "I've got an hour till deadline and my house payment is due, and if I get scooped again I'm out of a job" mentality. (Apologies to the reporters on the list who work hard to develop stories, and do a good job for the most part). What is happening is two different systems are interfacing, and the "bad reporting" we see are just translation errors. In the many to many system on the net, there is information flowing both ways, and knowledge is additive. In traditional media, it's a one way flow, and a "story" is often a one shot information transaction, with little opportunity built into the paradigm to expand or correct the information once it is sent. Will the interface get better? My hope is that it will, because as more and more people get involved in the net, the audience for traditional media will become more aware of inaccuracies, and poor information will be less saleable than it is currently. -- Kevin Prigge | Holes in whats left of my reason, CIS Consultant | holes in the knees of my blues, Computer & Information Services | odds against me been increasin' email: klp at cis.umn.edu | but I'll pull through... From ses at tipper.oit.unc.edu Wed Oct 11 22:41:47 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Wed, 11 Oct 95 22:41:47 PDT Subject: Noise: Re: CJR for perl-RSA t-shirt In-Reply-To: <199510120509.PAA14542@sweeney.cs.monash.edu.au> Message-ID: On Thu, 12 Oct 1995, Jiri Baum wrote: > > If you are reading a signed message, you simply strip off the Not a good choice of words - remember, you should never expose your private, er, key... Simon --- (defun modexpt (x y n) "computes (x^y) mod n" (cond ((= y 0) 1) ((= y 1) (mod x n)) ((evenp y) (mod (expt (modexpt x (/ y 2) n) 2) n)) (t (mod (* x (modexpt x (1- y) n)) n)))) From don at cs.byu.edu Wed Oct 11 23:49:58 1995 From: don at cs.byu.edu (Donald M. Kitchen) Date: Wed, 11 Oct 95 23:49:58 PDT Subject: Cypherpunks Moderated: Avoid This Thread Message-ID: <199510120649.AAA04389@bert.cs.byu.edu> Anon wrote: >"According to the group's moderator, who prefers to remain anonymous, > `The most important means to the defense of privacy is encryption. > Cypherpunks are therefore devoted to cryptography. They wish to learn > about it, to teach it and to implement it.'" > >Ok, since when is the Cypherpunk's mailing list moderated? Ummm, anyone seen L.D. lately? Just wondering. Don From futplex at pseudonym.com Thu Oct 12 00:08:31 1995 From: futplex at pseudonym.com (Futplex) Date: Thu, 12 Oct 95 00:08:31 PDT Subject: Certificate proposal In-Reply-To: <199510120147.LAA13833@sweeney.cs.monash.edu.au> Message-ID: <199510120708.DAA01334@thor.cs.umass.edu> Jiri "Super Trouper" Baum writes: > To start a new sub-thread: what if the man in the middle is actually > a behaviour-modifying parasite? At that stage even a physical meeting > won't do you much good (the parasite may be otherwise asymptomatic). Descartes figured there was a benevolent God to bail him out. I believe otherwise. But I manage to go about my business even while wallowing in a state of Futplexian doubt. -Futplex From Piete.Brooks at cl.cam.ac.uk Thu Oct 12 00:12:29 1995 From: Piete.Brooks at cl.cam.ac.uk (Piete Brooks) Date: Thu, 12 Oct 95 00:12:29 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510120421.VAA29813@infinity.c2.org> Message-ID: <"swan.cl.cam.:277260:951012071149"@cl.cam.ac.uk> > Not possible. Reporters don't call you for a quote and then send you a draft > of the article for your approval before they publish. They call for a quote, > write their article, and publish, not asking for approval. Depends how well you train them ! If you can get through to them that it is in their interest to get the facts right, you may find that they get back to you ... I try to get them to send the draft as email or fax, but instead I get it read over the phone to me :-( From futplex at pseudonym.com Thu Oct 12 00:30:13 1995 From: futplex at pseudonym.com (Futplex) Date: Thu, 12 Oct 95 00:30:13 PDT Subject: Judicial Access to Keys (Was: Re: Banque des Cypherpunks) In-Reply-To: <199510112243.SAA21752@universe.digex.net> Message-ID: <199510120730.DAA01478@thor.cs.umass.edu> Scott Brickner writes: > I don't rember if any key-splitting schemes currently allow it, but how > about this: the escrow agencies would be the courts, requiring one > assent from each judge on the appeals chain. As each judge rules > against the defendant or denies the appeal, he adds his piece of the > key to the ruling. When you reach the top of the chain, then *and only > then* can you be traced. JAK (Judicial Access to Keys) sounds as though it wouldn't give the LEAs a chance to pre-emptively snoop on message traffic before prosecution, unlike POTS wiretaps and Clipper. I don't see the govt. ever favoring such a scheme that doesn't help the LEAs to "gather" evidence to justify an indictment. They will probably skip JAK instead .... -Futplex From gjeffers at socketis.net Thu Oct 12 01:16:41 1995 From: gjeffers at socketis.net (Gary Jeffers) Date: Thu, 12 Oct 95 01:16:41 PDT Subject: SUPERWIPE pgp a / uuencode Message-ID: <199510121156.GAA12642@mail.socketis.net> Dear Cypherpunks, I used "PGP - A" to armor SUPERWIPE 1.04R for the first 10 C'punks to request it. I assumed that all the users would be PGP 'enabled. In case anyone of you weren't, please make another request for SUPERWIPE & specify that it be sent with UUENCODE armor & I will resend it with the UUENCODE armor. Yours Truly, Gary Jeffers  From s1018954 at aix2.uottawa.ca Thu Oct 12 01:45:30 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Thu, 12 Oct 95 01:45:30 PDT Subject: Noise: Re: CJR for perl-RSA t-shirt In-Reply-To: <199510120509.PAA14542@sweeney.cs.monash.edu.au> Message-ID: On Thu, 12 Oct 1995, Jiri Baum wrote: > > You'd still need an MD5 necktie. > > Actually, you don't - you just don't get signatures without it. > However, authentication AFAIK was never a problem to export, > so there's no need to bother. True, but there's still a licencing requirment in the states (might be different up here). So an authentication necktie (as opposed to cryptographic shorts and shirts) would be on the principle that one should not need a licence to write software. > Hmm, just like Monopoly money, I guess. > > Nobody's been busted yet for printing that, have they. They don't care, too easy to counterfeit. Inflation through photocopying would make monopoly currency as worthless as the funny money it is now. OTOH, if you threw in strong two-way anon digicash onto a networked version, you'd basically have a gambling setup masquarading as a MUD. See how long that would last unscathed? It would be a nice way to introduce the masses to the concepts though. Make the code available and you might see servers springing up faster than the present digicash casinos. And since any of the parties involved might be tempted to cheat ("upgrading" the server in the sysadmin's favor, ganging up ...) some authentication might be needed. Which means even more education for Joe Gambler. Since doing this for real money, even real digicash, is already illegal in many places, it would finally drive home the need for anon security and crypto to the eager gambler (of which there are many more than eager pgp users). If you make it look loony enough, the authorities might find it beneath them to do anything. Given any success you could launch some additional for-pay services based on the same platform. It's only a game, right? From jsw at netscape.com Thu Oct 12 02:23:33 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Thu, 12 Oct 95 02:23:33 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510120005.RAA01681@moosehead.CS.Berkeley.EDU> Message-ID: <307CD9F9.36CE@netscape.com> Paul A Gauthier wrote: > > > > > Patrick Horgan wrote: > > > > > > > From: "K. M. Ellis" > > > > > > > I'd love to see something in there about most commercial sites being behind > > > firewalls without nfs access across the firewall. This greatly reduces the > > > > It might also be worth noting that people accessing the net > > via an ISP from home do not typically use NFS either. > > > > They don't often have the skill/knowledge/concern to verify a PGP checksum > to ensure someone didn't patch their browser, either. I don't believe that my posting of PGP signed checksums last night is a final solution that will make the world safe for all end users. I'm rather insulted that you imply that I do. If you read Markoff's article, you will see that we have stated that we are working on a more global solution. > People seem to miss that the NFS hack was only an _example_ of a powerful > way to silently destroy the integrity of an executable. Spoofing the > insecure FTP session they used to retrieve it works. Sending them a random > trojan horse works. The point was not that NFS is insecure. It was that > unless you can authenticate your executables as being trustworthy NOTHING > ELSE MATTERS. > > SSL, good RNGs for session key selection, etc, are all null > and void if you run (any) untrusted software that patches > your Netscape executable, for example, or if you got a bum copy to > start with. I think everyone agrees that if you don't check the bits you get from an insecure FTP session, or if you let a bad guy write to your disk, then you may be in trouble. The point is that you and a few reporters are running around yelling at the top of your lungs that internet commerce is totally doomed because it is possible for users to infect their systems with viruses. In the case of Netscape, users who are worried about their binary being infected during downloading could actually buy the product, either in their local computer store or from us directly. Perhaps you have a solution to offer to this whole problem? --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From mark at lochard.com.au Thu Oct 12 03:33:21 1995 From: mark at lochard.com.au (Mark) Date: Thu, 12 Oct 95 03:33:21 PDT Subject: MITM attacks and True Names (again...) In-Reply-To: <199510120358.NAA14220@sweeney.cs.monash.edu.au> Message-ID: <199510120905.AA47595@junkers.lochard.com.au> >> all a True Name is really necessary for >> is violence. (And, pending certain eagerly-awaited technological >> developments, for sex.)) >Why is a true name necessary for sex? It should be feasible to arrange >a romantic rendezvous without True Names, no? >How often have you checked IDs before going on a date? >(I think most normal people would notice a MITM during, er, never mind.) >Anything I've missed? Does the swapping of DNA keys on a patrol cars hood constitute sufficient LEA monitoring? You can even deliver them your key if you think you can run fast enough. This might be a situation where they would prefer you use encryption wrappers rather than a cleartext transfer. Safe swapping. Cheers, Mark mark at lochard.com.au The above opinions are rumoured to be mine. From mark at lochard.com.au Thu Oct 12 03:41:31 1995 From: mark at lochard.com.au (Mark) Date: Thu, 12 Oct 95 03:41:31 PDT Subject: NYT on Internet Flaws In-Reply-To: <"swan.cl.cam.:277260:951012071149"@cl.cam.ac.uk> Message-ID: <199510120923.AA47909@junkers.lochard.com.au> >> Not possible. Reporters don't call you for a quote and then send you a draft >> of the article for your approval before they publish. They call for a quote, >> write their article, and publish, not asking for approval. > >Depends how well you train them ! Lets train them. Someone post their email addresses so we can send them all the RFCs for their education. :) They need to know what the hell they are talking about. I wonder if the biology lists get this, some wannabe hero posting how billions of people are infected with deadly toxins just because some researcher mentioned a well known fact that an amount of various bacteria and toxins exist in all living mammals. Werd. Mark From adam at homeport.org Thu Oct 12 04:54:17 1995 From: adam at homeport.org (Adam Shostack) Date: Thu, 12 Oct 95 04:54:17 PDT Subject: NYT on Internet Flaws In-Reply-To: <9510111723.AA17966@all.net> Message-ID: <199510121157.HAA07110@homeport.org> Dr. Frederick B. Cohen wrote: | There are alse several papers there on "Internet Holes" under Network | Security in the same on-line journal. Every month, another 5-10 holes | are added to those published in this forum. And how many of those holes are published by bugtraq/CERT/8lgm first? Just curious to see if this is another list I should be on... Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From rubin at faline.bellcore.com Thu Oct 12 06:06:02 1995 From: rubin at faline.bellcore.com (Aviel D Rubin) Date: Thu, 12 Oct 95 06:06:02 PDT Subject: Follow-up to sci.crypt posting that prompted NYT article Message-ID: <199510121305.JAA27503@faline.bellcore.com> Yesterday, a New York Times article cited a posting by several graduate students at Berkeley about the insecurity of the Internet. We found the sci.crypt posting very interesting and relevant because we spent a good portion of the summer working to address the same problem. Namely, detection of the malicious (or other) modification of an executable in transit over an untrusted network. In particular, we believe that our system could be used to solve the NFS problem mentioned in the posting from Berkeley. Our paper can be accessed at ftp://thumper.bellcore.com/pub/rubin/stretch.ps Avi Rubin Trent Jaeger From fc at all.net Thu Oct 12 06:24:18 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Thu, 12 Oct 95 06:24:18 PDT Subject: Internet holes In-Reply-To: <199510121157.HAA07110@homeport.org> Message-ID: <9510121321.AA18371@all.net> > | There are alse several papers there on "Internet Holes" under Network > | Security in the same on-line journal. Every month, another 5-10 holes > | are added to those published in this forum. > > And how many of those holes are published by bugtraq/CERT/8lgm > first? Just curious to see if this is another list I should be on... I am writing a series of atricles - one per month - for Network Security Magazine, and am putting lat month's article up as they publish the next one. Probably 20% have appeared on bugtraq, etc. All I am doing is going through the TCP/IP protocols (and other such stuf) one at a time, writing a short piece on each, describing the most obvious holes, giving some ideas of how they have been/can be exploited, and describing in general terms what we might do to fix them. Next issue covers NNTP - then comes a 2-month (I think) issue on TCP as a protocol (lots of holes there) - then whatever strikes my fancy next. I figure it will take a few years at this rate to get through the most important protocols and services. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From perry at piermont.com Thu Oct 12 06:48:17 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 06:48:17 PDT Subject: [NOISE] was Re: java security concerns In-Reply-To: <199510111335.JAA17959@panix.com> Message-ID: <199510121346.JAA17394@jekyll.piermont.com> Peter Madden) (by way of Duncan Frissell writes: > The real problems lie with specifying the > program/problem correctly in the first place (so-called specifications > capture), and with automatic program *synthesis* from specifications > (which, in mathematical theorem proving terms, presents the problem of > creating existential objects, as opposed to just verifying that they > do the right job). Bugs in specifications are just as easy for humans to produce as bugs in implementations, and unfortunately there is no way for our machines to psychically intuit what it was we wanted to specify that they do any more than we can make them intuit what it was we wanted them to do. Remember, by the way, that in some sense a high level programming language *is* a specification language. Authomatic synthesis from "specifications" is just a higher level of programming language, with all that entails. Perry From perry at piermont.com Thu Oct 12 06:54:22 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 06:54:22 PDT Subject: [NOISE] was Re: java security concerns In-Reply-To: <199510111336.JAA17969@panix.com> Message-ID: <199510121354.JAA17405@jekyll.piermont.com> Peter Madden) (by way of Duncan Frissell writes: > Applications of formal methods in software engineering depend > critically on the use of automated theorem provers to provide improved > support for the development of safety critical systems. Potentially > catastrophic consequences can derive from the failure of computerized > systems upon which human lives rely such as medical diagnostic > systems, air traffic control systems and defence systems (the recent > failure of the computerized system controlling the London Ambulance > Service provides an example of how serious software failure can be). I far prefer trusting robust and failsafe engineering in such situations. Theorem provers can't account for what happens when the one in a billion DRAM corruption occurs, or someone kicks the cable connecting the machine to its disks, or when a nut shoots the sensors, or whatever. Well built systems fail in a safe manner because of good engineering design -- as an example, in we hope that the motor controller might die but the motor won't eat itself anyway no matter what garbage it puts out. Such design is needed whether the systems are "formally proven" or not -- and frankly, I can't see formal proofs having much of an impact given that you are in the end simply shifting the problem to bug-free specifications and yet still have to worry about failures in the system. Perry From hfinney at shell.portal.com Thu Oct 12 07:05:56 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 12 Oct 95 07:05:56 PDT Subject: MITM evasion MITM evasion In-Reply-To: <199510112222.SAA21067@universe.digex.net> Message-ID: <199510121404.HAA07082@jobe.shell.portal.com> Scott Brickner writes: >I see two general categories of MITM attacks. In one case, Mitch wants >to eavesdrop on Alice and Bob, but doesn't really care about other >communication they do. In the other, Mitch wants to know about all of >Alice's communications, regardless of with whom they are. >Public key cryptography turns the first case into two instances of the >second. If Mitch doesn't control all of both Alice and Bob's >communications with everyone, the will eventually discover that the key >they're using for the other isn't the same one everyone else uses. This is true, but it doesn't mean that the threat can be neglected. A successful MITM attack may be a matter of reading even one message and acting on it, if the participants don't find out until later that they were robbed. In fact, they might not ever notice that they key they used Tuesday was different from the key they used Thursday, if they didn't cache the keys. (Yes, PGP does store the keys in a local key ring cache but not all systems will necessarily work that way.) >In the second MITM model, Mitch has an unbelievable task. Any public >key that goes from Alice to anyone else, or vice versa, must be >substituted with one Mitch holds. Any messages *about* public keys >must be transformed into messages about the corresponding MITM keys. >This includes telephone conversations where Alice and Bob exchange >keyids, the business card Eve has printed with her keyid and gives >to Alice at Interop, the Betsi key Alice can read in the newspaper, >WWW pages, files FTP'd, and face-to-face meetings. Obviously the MITM cannot handle (most) communications taking place offline. But there may be a lot of people who don't use any of these offline methods to validate their keys. These people don't go to academic conferences, don't read their key id's over the phone, and don't print them on business cards (or if they do, they don't get business cards from those they communicate with securely). Maybe this will change, maybe it is a matter of user education, but it is still an extra effort which will be important to have secure communications. I don't think this is widely recognized (other than in the context of the need for certificates and signed keys). >Anything short of total control gives Alice an opportunity to learn >about Mitch's presence. If Alice can exploit the hole enough to get >one good key, Mitch must change his tactics to denial of service >with respect to that key, or Alice can ask the key owner for other >good keys. Note too that Mitch is not necessarily taking any risks here even if he is caught. "Mitch" could be a remotely operating program, a virus embedded in Alice's computer or in some link between her system and the outside world, which is performing these transformations and sending the decrypted messages out anonymously. So even if Alice discovers the trickery there may be no effective way to track down the miscreant. >If Mitch can successfully surround Alice in such a cloud, I submit >at least one of the following statements is true: >1. Alice is such a non-entity that no one really wants to communicate >with her. >2. Bob can safely assume that the new key he just got isn't really from >Alice, because an Alice-with-a-life surrounded by a nearly successful >Mitch-cloud wouldn't be sending out keys --- she'd be sending out >messages saying "HELP ME!! I'M LOCKED IN MITCH'S SECRET BOMB >SHELTER!!!" or 3. Mitch's MITM attack is transitory and he doesn't care if he is caught afterwards, he got his goodies. or 4. Alice doesn't go to a lot of trouble to check her keys via offline means. After all, MITM is so rare it can't happen to her. Practice safe cryptography! Hal From fc at all.net Thu Oct 12 07:18:09 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Thu, 12 Oct 95 07:18:09 PDT Subject: [NOISE] was Re: java security concerns In-Reply-To: <199510121354.JAA17405@jekyll.piermont.com> Message-ID: <9510121415.AA20611@all.net> > Peter Madden) (by way of Duncan Frissell writes: > > Applications of formal methods in software engineering depend > > critically on the use of automated theorem provers to provide improved > > support for the development of safety critical systems. Potentially > > catastrophic consequences can derive from the failure of computerized > > systems upon which human lives rely such as medical diagnostic > > systems, air traffic control systems and defence systems (the recent > > failure of the computerized system controlling the London Ambulance > > Service provides an example of how serious software failure can be). and Perry responds: > I far prefer trusting robust and failsafe engineering in such > situations. Theorem provers can't account for what happens when the > one in a billion DRAM corruption occurs, or someone kicks the cable > connecting the machine to its disks, or when a nut shoots the sensors, > or whatever. Well built systems fail in a safe manner because of good > engineering design -- as an example, in we hope that the motor > controller might die but the motor won't eat itself anyway no matter > what garbage it puts out. Such design is needed whether the systems > are "formally proven" or not -- and frankly, I can't see formal proofs > having much of an impact given that you are in the end simply shifting > the problem to bug-free specifications and yet still have to worry > about failures in the system. Hence comes my response: I think that both formal methods and defense-in-depth are important in building an effective protection program. - Formal methods are very important for detecting flaws and producing what is commonly called "Fault Intollerance", but - Defense-in-depth is important because there are no perfect technical defenses. This is commonly called "Fault Tollerance" The most secure (and often highest quality) systems combine fault intollerance with fault tollerance to produce high quality parts and a system that continues operating safely even when those high quality parts fail. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From nsb at nsb.fv.com Thu Oct 12 07:38:01 1995 From: nsb at nsb.fv.com (Nathaniel Borenstein) Date: Thu, 12 Oct 95 07:38:01 PDT Subject: NYT on Internet Flaws In-Reply-To: Message-ID: Excerpts from mail: 11-Oct-95 Re: NYT on Internet Flaws Douglas Barnes at communiti (1042*) > It is profoundly irritating to find this splashed on the > front page of the NYT, contributing to the FUD that > largely benefits luddites like First Virtual and > those, like MS$, pushing for a return to proprietary networks. ???Luddites??? Excuse me, have I missed something? Let's look at FV's founders: -- Einar Stefferud is one of the grand old men of the Internet, a major contributor to Internet standards efforts for over 20 years, and a behind the scenes player in almost every major email-related development in the last 20 years. -- Marshall Rose is the author of SNMP, lots of widely used software, and six books on Internet-related technology. He's been a major factor for progress in IETF and Interop for many years. -- I'm one of the authors of MIME and lots of widely used software. I am most commonly criticized for being technology-crazy, as in the multimedia excesses of the CMU Andrew system, rather than for being a Luddite. Collectively, I'd venture to say that FV's people have pushed the Internet envelope more than any other similarly-sized group of people you could find anywhere on the planet. And in our current incarnation, we deployed the first Internet-wide open payment system, and have run it through a year (this coming Sunday) of exponential growth with only a few days of downtime. As I understand it, a "Luddite" is someone who is unreasonably opposed to technological innovation. The only thing I can assume is that, in your lexicon, "Luddite" is synonymous with "sees problems with the deployment of public key encryption technology to the masses". If believing that cryptography isn't magic and isn't a perfect solution to all problems makes us Luddites, then we're Luddites. In point of fact, we're very heavy users of cryptography internally, we have just chosen not to make all our users master its subtleties. Watch for the first visible use of cryptography in our system, coming soon -- we're going to push the envelope in the safe deployment of cryptography, too. -- Nathaniel -------- Nathaniel S. Borenstein | When privacy is outlawed, Chief Scientist, First Virtual Holdings | only outlaws will have privacy! FAQ & PGP key: nsb+faq at nsb.fv.com | SUPPORT THE ZIMMERMANN DEFENSE FUND! ---VIRTUAL YELLOW RIBBON-->> zldf at clark.net From perry at piermont.com Thu Oct 12 07:55:15 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 07:55:15 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510111812.LAA21331@viper.eit.com> Message-ID: <199510121454.KAA20694@jekyll.piermont.com> David Berger writes: > As a result, the only thing I think this article should say is that we need > secure ftp. Isn't this being worked on? Well, in addition, universal deployment of Photuris and IPSP would probably prevent the sort of active attack being discussed because you could no longer replace the packets. > As for the article - 9/10 scaring people, 1/10 semi-fact. Be serious? NFS > is not the basic structure of the Internet. I'm embarrassed that an article > so weak in its explanations and so high on fluff appeared on the front page > of a well respected newspaper. It was suprisingly weak for a John Markoff story (he usually gets the details exactly right) but it is an issue that had to be brought up and I see no reason to call it a bad article overall. The alarmism is needed -- people have to get off their asses (including me). Perry From baldwin at RSA.COM Thu Oct 12 08:06:57 1995 From: baldwin at RSA.COM (baldwin (Robert W. Baldwin)) Date: Thu, 12 Oct 95 08:06:57 PDT Subject: RSA Data Security, Inc. To Exclusively License Rights to RSA Message-ID: <9509128135.AA813510342@snail.rsa.com> Here's the latest press release from my employer. As was pointed out earlier, for those who did not already know, Business Wire articles are written by companies and distributed to news agencies by BW for a fee. --Bob Baldwin ______________________________ RSA Data Security, Inc. To Exclusively License Rights to RSA Public Key Encryption and Digital Signature Standard (DSS) Technologies; Company Becomes One-Stop Worldwide Source for Encryption Technology REDWOOD CITY, Calif.--(BUSINESS WIRE)--Oct. 12, 1995--RSA Data Security, Inc. today announced that it is now licensing patents for the Digital Signature Standard (DSS), the U.S. government standard for digital signatures. RSA also announced that it has renewed its exclusive licensing agreement for the industry-standard Rivest-Shamir-Adleman (RSA) public key cryptosystem developed at the Massachusetts Institute of Technology (MIT). With the addition of DSS technology to its portfolio of encryption offerings, RSA Data Security has become the exclusive source for the industry's most widely accepted security technologies. RSA also announced that under its uniform, non-discriminatory licensing plan, manufacturers will pay a one-time royalty when they sell products containing RSA and/or DSS technology. No additional per-certificate or use charges are required. `For the first time, the patents covering the most popular encryption and digital signature methods in the world, RSA and DSS, are easily available on a non-discriminatory basis from a single vendor,` said Jim Bidzos, president of RSA. `By offering one-stop shopping for both systems, our customers can seamlessly integrate both RSA encryption and DSS digital signature methods into their products.` Widespread Implementation Many of RSA's software licensees -- such as Adobe, Aquila, Atalla, National Semiconductor, Spyrus, Premenos, Spyglass, Terisa Systems, Frontier Technologies, BroadVision, Checkpoint Software, Raptor Systems, SafeCo Insurance, Wollongong, Square D, Interval Systems, and Comm-Press -- have already requested patent licenses to both the RSA and DSS techniques for use in software and hardware systems. IBM and Siemens currently offer DSS-based products, licensed under RSA's DSS patent, to the U.S. government. `Now that vendors can obtain DSS and RSA patents from one source, we expect to see companies throughout the U.S., Europe and Japan incorporate RSA and DSS technology into dozens of products, including access control systems, network management systems, smart cards, link encryptors, and wireless encryption devices,` said Bidzos. `The demand for these technologies is very strong and will continue to grow as vendors increasingly incorporate security features into their products. In the next several months we expect to be inundated with requests from licensees. This is great news for the security industry, which has waited patiently for easy availability of the RSA and DSS patents.` Digital Signatures A digital signature on an electronic document is an encrypted form of data equivalent to a signature on a printed document, such as a contract or other commercial agreement. It verifies that the document is valid and unaltered, and that the person signing the document has agreed to its terms. Furthermore, secure digital signatures cannot be repudiated. The signer of a document cannot disown it by claiming it was forged. Both DSS and RSA support digital signatures and certificates. Several states, including California and Utah have recently enacted legislation recognizing digital signatures as legally binding. License Availability Uniform licenses to both the RSA and DSS/Schnorr patents are available immediately. The license text, as well as other information regarding these patents, is available on RSA Data Security's home page at http://www.rsa.com. For existing customers of RSA's BSAFE and TIPEM software toolkits, no separate patent licenses are required. All rights under the patents to use, integrate and copy RSA's software are embedded. RSA Data Security, Inc. RSA Data Security, Inc. is the world's brand name for cryptography, with more than 15 million copies of RSA encryption and authentication technologies installed and in use worldwide. RSA technologies are part of existing and proposed standards for the Internet and World Wide Web, CCITT, ISO, ANSI, IEEE, and business, financial and electronic commerce networks around the globe. The company develops and markets platform-independent developers kits and end-user products and provides comprehensive cryptographic consulting services. Founded in 1982 by the inventors of the RSA Public Key Cryptosystem, the company is headquartered in Redwood City, Calif. -0- Note to Editors: RSA Public Key Cryptosystem, BSAFE and TIPEM are trademarks of RSA Data Security, Inc. All other product or company names are trademarks of their respective corporations. For information regarding licensing RSA or DSS patents, contact Paul Livesay at RSA Data Security, Inc. (415) 595-8782, or polrsa.com. For information regarding licensing RSA or DSS toolkits, contact Paul Gordon at RSA Data Security, Inc. (415) 595-8782, or paulrsa.com. --30--kr/sf.. CONTACT: Corman/Croel Marketing & Communications Patrick Corman, 415/326-9648 cormancerf.net Lisa Croel, 415/326-0487 lcroelmediacity.com KEYWORD: CALIFORNIA INDUSTRY KEYWORD: COMPUTERS/ELECTRONICS COMED TELECOMMUNICATIONS PRODUCT REPEATS: New York 212-575-8822 or 800-221-2462; Boston 617-236-4266 or 800-225-2030; SF 415-986-4422 or 800-227-0845; LA 310-820-9473 BW URL: http://www.hnt.com/bizwire AP-NY-10-12-95 0701EDT This material is copyrighted and may not be republished without permission of the originating newspaper or wire service. NewsHound is a service of the San Jose Mercury News. For more information call 1-800-818-NEWS. From patrick at Verity.COM Thu Oct 12 08:21:40 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Thu, 12 Oct 95 08:21:40 PDT Subject: NYT on Internet Flaws Message-ID: <9510121517.AA16019@cantina.verity.com> Adam Shostack sez: > > Dr. Frederick B. Cohen wrote: > > | There are alse several papers there on "Internet Holes" under Network > | Security in the same on-line journal. Every month, another 5-10 holes > | are added to those published in this forum. > > And how many of those holes are published by bugtraq/CERT/8lgm > first? Just curious to see if this is another list I should be on... > Well since I see far less than 5-10 announcements from bugtraq, CERT and 8lgm put together most months, they must have others. Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From gauthier at CS.Berkeley.EDU Thu Oct 12 08:47:21 1995 From: gauthier at CS.Berkeley.EDU (Paul A Gauthier) Date: Thu, 12 Oct 95 08:47:21 PDT Subject: NYT on Internet Flaws In-Reply-To: <307CD9F9.36CE@netscape.com> Message-ID: <199510121547.IAA02854@moosehead.CS.Berkeley.EDU> > Jeff Weinstein wrote: > > Paul A Gauthier wrote: > > > Patrick Horgan wrote: > > > > > From: "K. M. Ellis" > > > > > > > > > I'd love to see something in there about most commercial sites being behind > > > > firewalls without nfs access across the firewall. This greatly reduces the > > > > > > It might also be worth noting that people accessing the net > > > via an ISP from home do not typically use NFS either. > > > > > > > They don't often have the skill/knowledge/concern to verify a PGP checksum > > to ensure someone didn't patch their browser, either. > > I don't believe that my posting of PGP signed checksums last night > is a final solution that will make the world safe for all end users. > I'm rather insulted that you imply that I do. That's not what I was saying. The implication of the comments I was responding to was that "firewalls and ISP users w/o NFS make this whole issue a non-problem". And I think we all know that's not true. Presumably if you have a firewall, sure, you have a sysadmin who will check the integrity of the executable when it is installed behind it. But ISP users w/o NFS are exactly the unparanoid unwashed masses who would be perfectly targetted for this type of attack, and even worse would be the least likely to do checksumming to protect themsevles. That is the only point I was trying to make. > your disk, then you may be in trouble. The point is that you and a > few reporters are running around yelling at the top of your lungs > that internet commerce is totally doomed because it is possible for > users to infect their systems with viruses. In our post I don't believe there was any yelling, or any serious doom and gloom. Mainly we just were trying to prod people to internalize that these old protocols we're all still using are soon going to come under heavy attack now that there is financial incentive to do it. > Perhaps you have a solution to offer to this whole problem? So I am actually quite fond the idea of a company becoming a well-known distributor of checksums. Users could either subscribe to a quarterly bootable CD-ROM which checks out their system. Or a bootable read-only floppy which causes their modem to call "1-900-CHEKSUM" and download the needed checksums on demand. This would be low-cost thing for the user, doing it once every few months it would be pretty low hassle. Spoofing the phone line is a risk that I can live with, as can I live with the risk of someone spoofing these CD-ROMs that are mailed out 4 times a year. And please, cypherpunks, don't start talking about "oh, but your CMOS could have a trojan in it", and "do you really trust your boot code in your SCSI". Because, yes, I sure do trust those things. And I think it's entirely reasonable to trust them for the purposes we're discussing. There are of course ways to minimize these attacks through crypto. If you do have the correct CD-ROM/bood disk it can easily authenticate the party on the other side of the phone. No phone spoofing. To minimize the chances of getting a spoofed copy of the disk in the mail, inclose a magic cookie inside the box. The magic cookie must appear on the mailing label of the next box otherwise the user is suspicious. Some other random sugar and now the user can tell if they are getting legit disks as long as their first disk was legit, and someone isn't opening their mail in a specific attempt to attack them. Paul From GreggMan at aol.com Thu Oct 12 08:50:35 1995 From: GreggMan at aol.com (GreggMan at aol.com) Date: Thu, 12 Oct 95 08:50:35 PDT Subject: PC disk wipe software Message-ID: <951012115021_122212260@mail06.mail.aol.com> In a message dated 95-10-09 12:34:33 EDT, you write: >>PC Tools has a wipe program that will either wipe individual files, or >>wipe all unallocated diskspace. It also allows you to choose the level >>of wipe (single overwrite, multiple, etc). > >There has been considerable discussion on the MCIP list about how most >*Mac* programs that purport to do this, like Burn, for example, leave stuff >over in disk blocks. My understanding is that this is not a trivial >problem, and it occurs in MUSH-DOS as well.... > >Cheers, >Bob Hettinga > > Actually not a problem for mess-DOS: just overwrite to the next multiple of the allocation unit size. Trivial indeed. What you must *not* do is just write to the end of current file ... you have to extend. Good idea too is to flush file buffers/reset disk subsystem before the next file writes so that buffer garbage doesn't get stuck in at end of last sector(s) of new files. From GreggMan at aol.com Thu Oct 12 08:50:39 1995 From: GreggMan at aol.com (GreggMan at aol.com) Date: Thu, 12 Oct 95 08:50:39 PDT Subject: PC disk wipe software Message-ID: <951012115032_122212345@mail06.mail.aol.com> In a message dated 95-10-09 22:07:18 EDT, you write: > >Archive data off to tape, low level format drive using the bios hd utils, >reformat drive, restore data. I find the non graphical AMI bios very useful >for this. > >Doing anything else fails to remove the old data on partially used but valid >blocks. > > Why do people insist this is the case? ABsolutely not true under MS-DOS. I haven't personally verified under a VxD file system (like 32bit disk access) but ask yourself: if I expand (by appending new garbage data) the current file to the next allocation-unit boundary, will that overwrite the tail blocks of the current file???? Folks: it's sooooo easy. From GreggMan at aol.com Thu Oct 12 08:51:07 1995 From: GreggMan at aol.com (GreggMan at aol.com) Date: Thu, 12 Oct 95 08:51:07 PDT Subject: PC disk wipe software Message-ID: <951012115020_122212234@emout06.mail.aol.com> MS-DOS? Selectively overwrite data not alloc'ed to files? Try this: I do it all the time: open a file for output write garbage to file until the disk fills delete file do it again ... what could be simpler? This will fill all unused allocation units with garbage. Do it until you feel comfortable. From sameer at c2.org Thu Oct 12 08:56:59 1995 From: sameer at c2.org (sameer) Date: Thu, 12 Oct 95 08:56:59 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510121454.KAA20694@jekyll.piermont.com> Message-ID: <199510121551.IAA14535@infinity.c2.org> > > Well, in addition, universal deployment of Photuris and IPSP would > probably prevent the sort of active attack being discussed because you > could no longer replace the packets. Do you think the major OS/router vendors are going to implement IPSP int heir stacks with standing export restrictions? I don't think so. Seems like that's the thing the article should have stressed. > > > As for the article - 9/10 scaring people, 1/10 semi-fact. Be serious? NFS > > is not the basic structure of the Internet. I'm embarrassed that an article > > so weak in its explanations and so high on fluff appeared on the front page > > of a well respected newspaper. > > It was suprisingly weak for a John Markoff story (he usually gets the > details exactly right) but it is an issue that had to be brought up > and I see no reason to call it a bad article overall. The alarmism is > needed -- people have to get off their asses (including me). > > Perry > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From tcmay at got.net Thu Oct 12 09:18:41 1995 From: tcmay at got.net (Timothy C. May) Date: Thu, 12 Oct 95 09:18:41 PDT Subject: Pointer to 10/9/95 EE Times Article Message-ID: At 7:30 PM 10/11/95, Anonymous wrote: >"According to the group's moderator, who prefers to remain anonymous, > `The most important means to the defense of privacy is encryption. > Cypherpunks are therefore devoted to cryptography. They wish to learn > about it, to teach it and to implement it.'" > >Ok, since when is the Cypherpunk's mailing list moderated? > >It is apparent that the author, Larry Lange, has never studied the >list closely or he would know how amusing this sounds... > >(Geez, if he had ever read one of Tim May's posts on the subject... :-) I have a theory about this. First, I recognize the style of the quote, as no doubt many of you do. Second, my guess is that the reporter contacted the person being quoted, asked "What is your role?," couldn't interpret the answer given, and so used the only term he understood. Namely, leader or moderator. Anarchies are tough for hierarchical minds to grasp. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From perry at piermont.com Thu Oct 12 09:36:33 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 09:36:33 PDT Subject: NYT on Internet Flaws In-Reply-To: Message-ID: <199510121636.MAA20825@jekyll.piermont.com> Nesta Stubbs writes: > note: is anyone working on implementeing some of the things outlines in > R(1825?) ? I think Perry posted regarding it awhile back, but havent > heard much about it since. Yes, work is going on on the IPSEC stuff, though my own is stalled at the moment because of excessive personal scheduling load... Perry From perry at piermont.com Thu Oct 12 09:41:24 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 09:41:24 PDT Subject: NYT on Internet Flaws In-Reply-To: <9510120410.AA28665@sulphur.osf.org> Message-ID: <199510121638.MAA20833@jekyll.piermont.com> Rich Salz writes: > > I understand though, that we can't control what the reporters > >say and how they interpret what we say. It is very important to word > >your posts carefully such that when you post a bug a reporter won't > >think that they should write an article on it until it is verified. > > NO! > > Something like Perry's "Do not redistribute without permission" should > be the only modification needed. I am frequently informed before people redistribute, but not always, I'm afraid. Perry From aleph1 at dfw.net Thu Oct 12 09:41:53 1995 From: aleph1 at dfw.net (Aleph One) Date: Thu, 12 Oct 95 09:41:53 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510111812.LAA21331@viper.eit.com> Message-ID: I use SSLftp all the time 8) Aleph One / aleph1 at dfw.net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01 On Wed, 11 Oct 1995, David Berger wrote: > As a result, the only thing I think this article should say is that we need > secure ftp. Isn't this being worked on? From tcmay at got.net Thu Oct 12 09:46:07 1995 From: tcmay at got.net (Timothy C. May) Date: Thu, 12 Oct 95 09:46:07 PDT Subject: Markoff (was: NYT on Internet Flaws) Message-ID: (I counted 7 entities copied on the original of this, and have trimmed the distribution list down to just the Cypherpunks list.) At 10:23 AM 10/12/95, Mark wrote: >>> Not possible. Reporters don't call you for a quote and then send you a draft >>> of the article for your approval before they publish. They call for a quote, >>> write their article, and publish, not asking for approval. >> >>Depends how well you train them ! > >Lets train them. Someone post their email addresses so we can send them all >the RFCs for their education. :) They need to know what the hell they are >talking about. > >I wonder if the biology lists get this, some wannabe hero posting how billions >of people are infected with deadly toxins just because some researcher >mentioned a well known fact that an amount of various bacteria and toxins >exist in all living mammals. John Markoff knows more about crypto and security and knows more of the folks working in crypto and security than most of us on this list. In addition to breaking the Clipper story (*), he also has broken several of the most important crypto/security stories the Net has seen. (* Though several of us, including myself, saw the precursors to Clipper many months prior to its announcement.) I urge folks to check out his many stories on crypto and security in the NYT before dismissing him as some ignoramus that needs educating. (Not that we all don't need more educating, often enough.) Disagreeing with the tone of a story is fine, even disagreeing with the basic message or facts is normal. After all, we disagree on this list about many things (witness the MITM debates). We also now have commerical interests represented on this list in fairly important ways, so this often raises the stakes--and the temperature--in disputes. But disputes are best handled by arguments as to the points in dispute, not by insults about the ignorance or cluelessness of the folks involved. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From danisch at ira.uka.de Thu Oct 12 10:09:37 1995 From: danisch at ira.uka.de (Hadmut Danisch) Date: Thu, 12 Oct 95 10:09:37 PDT Subject: Aquaria wars ? Message-ID: <9510121708.AA00880@elysion.eiss.ira.uka.de> I need some historical information for a discussion about which security features are to be used in usenet. Perhaps someone can help: Some (many) years ago there was a very large and long flamewar at the usenet. As far as I know it was called "The Aquaria Wars" because it began with a debate about the question whether the newsgroup should be named "alt.aquaria" or "alt.aquarium". I am looking for historical informations about this flamewar. Can anyone remember it or is there anything available about? Thanks a lot Hadmut From tcmay at got.net Thu Oct 12 10:14:42 1995 From: tcmay at got.net (Timothy C. May) Date: Thu, 12 Oct 95 10:14:42 PDT Subject: Commercialism on Cypherpunks Message-ID: We face interesting times. It's apparent that the Cypherpunks list is now becoming even more of a hangout for reporters, commercial vendors, and those seeking advance knowledge of security holes and whatnot...maybe even a few stock traders looking for tips :-}. It was this way to some extent a few years ago, with Steven Levy, John Markoff, Kevin Kelly, Julian Dibbell, and others looking to our list for stimulating ideas for stories. Now, the time between something being posted here and its headline appearance in one of the major papers is even shorter. The "electronic commerce" business is heating up, and basic flaws and limitations are obviously big news. And the list has grown in recent months, as publicity has increased. In addition to the usual corporate connections that people have because some corporation employs them, we have people _directly_ involved in several crypto-related or security-oriented businesses, including Netscape Communications, Digicash, First Virtual, Enterprise Integration Technologies, RSADSI, Verity, Intuit, and so on. And a bunch of folks of course from Sun, SGI, Apple, Microsoft, etc. (Sorry if I've left out your company.) Clearly some of these groups have conflicting goals and approaches. Some have different exposures to security holes. Some of these electronic commerce companies even stand to gain at the expense of others when security problems are found. Some of the commercial folks are concerned that the freewheeling, anarchic, "say anything" nature of the Cypherpunks list is sometimes reflecting badly on their companies. Some are concerned that reporters are reading the list to find leads for stories. Well, get used to it! (Lest you think I was going to pull a Rodney King and say "Can't we all just get along?," I'm taking the anarchist route.) People will say what they wish. Sometimes they'll speak inaccurately, sometimes without all of the facts. Such is life. There is no moderator, no leader, contrary to what at least one reporter seems to think. And it's a good thing, as I could otherwise see that moderator or leader someday being served with papers because of some insult or denigration about a company or its products posted here. With the "electronic commerce" market heating up so much, and with our list becoming one of the several de facto watering holes where gossip and G-2 gets exchanged, there are bound to be conflicts and alleged damages to reputations. Think of our list as a kind of Casablanca, a "free city" not controlled by any side. I'm "shocked, simply shocked," that anyone would think it could be anything else. --Tim, owner since 1992 of "Rick's Place" Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From bogus@does.not.exist.com Thu Oct 12 10:33:52 1995 From: bogus@does.not.exist.com (Steve ) Date: Thu, 12 Oct 95 10:33:52 PDT Subject: responce to graphic encryption replies Message-ID: <199510121733.KAA18977@ix7.ix.netcom.com> First, I would like to address the issue of David C.'s spam of the usenet. Mr. Clavedetcher does not work for nor does he represent us in any way. After receiving word from Cypherpunks that he had spamed the list I personally contacted him and informed him to cease and desist these actions or face legal action. We at PrivaSoft do not conduct nor condone such actions on the Net. During my conversation with him I discovered he was a zealous individual looking to make good on our rebate program, as per our Web page. If you should receive any further spams from him or any other over zealous netuser, Please contact me immediately. Also if you could inform me of other news groups/ lists he spammed so I may contact them as well regarding this. Thanx. Second I would like to begin addressing several of the issues raised by my inquiry of Graphic Encryption. Firstly Graphic Encryption is the scrambling of a graphic image using an encryption algorithm. In PrivaSoft's case the Image is that of your document, including all text and graphics contained therein. Syntel Sciences, the distributor of PrivaSoft, does not wish to publish its algorithm at this time, however if there is any question as to the strength of PrivaSoft and its Graphic Encryption engine, I would be happy to post a sample document for you to try and crack. Also, I have recently put together an info sheet on the Security provided by PrivaSoft which I can post if there is interest. One of the key strengths, as I see it, of graphic encryption is that during decryption via hacking, there is an added time element when a human interface is required to verify the product, ( since it is a graphic picture being produced, regular checksums for intelligible words can't be used sans implementing OCR), even if this is only 10 milliseconds per try this is increases the time to crack exponentially beyond that of a data encrypted document of similar key length and algorithm strength. Once again I would like to apologize on behalf of Syntel Sciences - PrivaSoft for the nuisance caused by the spam done by David C. and I wish to reiterate that such actions are not condoned by us and will not be tolerated. Steve Orrin Mgr. Tech. Services, PrivaSoft ************************************************* PrivaSoft TM * Distributed by Syntel Sciences, Inc. USA * 1877 Springfield Ave PO BOX 600 * Maplewood NJ 07040-0600 * Tel. 201-378-8865 Fax. 201-762-3742 * Http://www.privasoft.com/privasoft * E-mail: privsoft at ix.netcom.com * ************************************************* From lethin at ai.mit.edu Thu Oct 12 10:47:17 1995 From: lethin at ai.mit.edu (Rich Lethin) Date: Thu, 12 Oct 95 10:47:17 PDT Subject: Privsoft Message-ID: <199510121746.NAA01600@soggy-fibers.ai.mit.edu> I hope Mr. Orrin has his asbestos codpiece well positioned. From hfinney at shell.portal.com Thu Oct 12 10:47:43 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 12 Oct 95 10:47:43 PDT Subject: RSA Data Security, Inc. To Exclusively License Rights to RSA In-Reply-To: <9509128135.AA813510342@snail.rsa.com> Message-ID: <199510121746.KAA07243@jobe.shell.portal.com> "baldwin" writes: >REDWOOD CITY, Calif.--(BUSINESS WIRE)--Oct. 12, 1995--RSA Data Security, Inc. >today announced that it is now licensing patents for the Digital Signature >Standard (DSS), the U.S. government standard for digital signatures. I'm sure that everyone will join me in a rousing Bronx cheer for RSA as they continue their efforts to monopolise public key cryptography. If they truly have a patent on DSS this will be yet another important algorithm for which people have to get RSA's permission. RSA is fast entering the list of such well loved institutions as the Post Office and the Internal Revenue Service as one of those places you can't avoid dealing with no matter how you try. "Ever been sued for patent infringement? You will! And the company that will stick it to you? RSA." Hal, the intemperate. From JonathanZ at consensus.com Thu Oct 12 10:59:12 1995 From: JonathanZ at consensus.com (Jonathan Zamick) Date: Thu, 12 Oct 95 10:59:12 PDT Subject: IDEA algorithm Message-ID: This may be an odd question, but who is it that owns the IDEA algorithm? We've had a number of requests regarding licensing RSAREF tying into legitmizing PGP products. Part of that includes IDEA obviously. Anyway, take care. Jonathan From perry at piermont.com Thu Oct 12 11:00:42 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 11:00:42 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510121551.IAA14535@infinity.c2.org> Message-ID: <199510121759.NAA22465@jekyll.piermont.com> sameer writes: > > Well, in addition, universal deployment of Photuris and IPSP would > > probably prevent the sort of active attack being discussed because you > > could no longer replace the packets. > > Do you think the major OS/router vendors are going to > implement IPSP int heir stacks with standing export restrictions? I > don't think so. I do, because if they want to be IPv6 compliant they have to. They'll have to produce separate export versions of the software. Perry From eli at UX3.SP.CS.CMU.EDU Thu Oct 12 11:14:54 1995 From: eli at UX3.SP.CS.CMU.EDU (Eli Brandt) Date: Thu, 12 Oct 95 11:14:54 PDT Subject: RSA Data Security, Inc. To Exclusively License Rights to RSA In-Reply-To: <9509128135.AA813510342@snail.rsa.com> Message-ID: <9510121814.AA02009@toad.com> > RSA Data Security, Inc. > today announced that it is now licensing patents for the Digital Signature > Standard (DSS), the U.S. government standard for digital signatures. I believe someone was suing the U.S. government on the grounds that the public signature standard wasn't supposed to require proprietary technology. Has this gone anywhere yet? -- Eli Brandt eli+ at cs.cmu.edu From mrm at netcom.com Thu Oct 12 11:59:13 1995 From: mrm at netcom.com (Marianne Mueller) Date: Thu, 12 Oct 95 11:59:13 PDT Subject: Oct 14 meeting, focus on Java, Mountain View, California Message-ID: <199510121831.LAA02357@netcom20.netcom.com> Hello again - First, my sincere apologies for not making it clear in the first announcement that the Oct 14 meeting focussing on Java is being held in the bay area of California. Next, feel free to speak up for speaker slots if you're so inclined. I was surprised no one wrote in to ask for speaker slots although a lot of people wrote in to ask for more details on where the meeting was and others wrote in to chastise me (correctly) for being so bayAreaCentric. Saturday Oct 14 Time: 12 noon - 6 p.m. Place: Sparcy's cafeteria, building 21, Sun Microsystems Mountain View, California AgendaSoFar: 12 - 12:15 - Settle in, have a bagel 12:15 - 12:45 - Overview of Java/HotJava 12:45 - 2:00 - Java Security Model, Sami Shaio, Java group, Sun 2:00 - 3:00 - discussion, Q&A, open mike 3:00 - 3:30 - break 3:30 - 4:30 - Jcrypt, Doug Barnes, Amanda Chou 4:30 - 6:00 - TBD Directions: Take 101 to Amphitheater Parkway. Turn left onto Garcia, and drive about 1/2 mile and turn onto the first genuine side street which is named Marina Way. Drive about 1/4 mile and look for a right hand turn onto Coast. Building 21 will be on your left. It's on the corner of Coast and Marina Way. There's plenty of parking there. Internet: I'm trying to arrange to get a computer connected to the net in that room so that we can set up MBONE, but I don't know if that will be possible or not. Enough people wrote in to say that they'd like to hear a bit about Java and HotJava (and how Netscape is using Java) to convince me it would be a good idea to start off with setting some context. See you on Saturday! Should be fun. Marianne mrm at netcom.com mrm at eng.sun.com From cman at communities.com Thu Oct 12 12:00:07 1995 From: cman at communities.com (Douglas Barnes) Date: Thu, 12 Oct 95 12:00:07 PDT Subject: Cylink license fees Message-ID: I just received a very informative package of information from Bob Fougner at Cylink, which, in addition to a copy of the relevant patents and hardcopy of the materials available on their web page, contains a "limited time offer" to license their patents in one of three ways: 1) Practice of DH Key exchange & DSS: $50,000 2) Right to use & distribute RSA: $62,500 3) Ulimited field of use to practice public key: $75,000 Those interested in obtaining this information should probably fax him at 408-735-6642 with a request for the info. Much of the information is available online at: http://www.cylink.com. Obviously, anyone wishing to practice RSA would also need to get a license from RSADSI. Also, it is my impression that are claiming Hellman-Merkle as the precursor patent to RSA, which means that this situation will prevail at least through late 1997, not early 1997 (when Hellman-Diffie expires.) From lesan_robert at tandem.com Thu Oct 12 12:01:10 1995 From: lesan_robert at tandem.com (Rob Lesan) Date: Thu, 12 Oct 95 12:01:10 PDT Subject: (no subject) Message-ID: <307D818B.1D33@tandem.com> I am a contractor currently working for Tandem Computers, and I found this press release interesting. Thought this group might need a target of a different flavor to kick around: SUBJECT: PRESS RELEASE: ATALLA WEBSAFE ATALLA BEGINS SHIPPING HARDWARE-BASED SECURITY FOR THE INTERNET SAN JOSE, CALIFORNIA - October 2, 1995 - Atalla, a Tandem Company, announces that the WebSafe Internet Security Processor is ready for shipment. Now you can use the same technology that made the "bank ATM" network safe enough for bank transactions to secure the Internet for commerce. "The Internet is a 'party-line' where everyone can jump in. Our vision is to make it a 'private-line' for those situations where privacy is essential for doing business on the Net," says Bob Gargus, President of Atalla. "When we set out to build WebSafe, we wanted a system safe enough to do bank transactions on the Internet. We're taking our 23 years of experience in financial network security systems and applying it to the Internet. WebSafe is the first Internet processor that gives banks and our other customers the security that they have come to trust Atalla to deliver," Mr. Gargus also noted. WebSafe is a hardware-based security processor specifically designed to help transform today's emerging point-to-point Internet security into a full end-to-end security system. Typical WebSafe applications include payments (such as credit cards), web commerce, certification authorities (electronic notarization), PEM (Privacy Enhanced Mail) and EDI. WebSafe's security architecture is the perfect solution for banks, brokerage houses, telecommunications companies, legal and medical institutions or anyone who needs to send sensitive data across the Internet. This revolutionary product protects transaction data against unauthorized access, disclosure, alteration, duplications and substitution. WebSafe supports both public (e.g. RSA) and secret key (e.g. DES) technology and employs sophisticated key management similar to global EFT/POS payment networks. HOW THE WEBSAFE WORKS Attached as a peripheral device to your Web servers, the WebSafe processes your secret information in a "hardware-secured envelope." But unlike software security solutions which are vulnerable to attack from cyber-pirates, the WebSafe is both physically and logically secure. Physically secure means that if anyone tries to penetrate the WebSafe, it will "zeroize," erasing the secret data so it's impossible to retrieve. Logically secure means that, because all of the security processing is done within the WebSafe security processor, it's impossible for anyone to ever see your cryptographic material. WEBSAFE IS THE BRIDGE FROM THE INTERNET TO THE PAYMENT NETWORK The best example of a major deployment of an end-to-end security network is the bank ATM system. Today, 100% of all bank ATM transactions in North America have hardware-based security, 70% of which is provided by Atalla. The Internet is currently going through the same evolution that the bank ATM network went through 20-plus years ago. What's holding back electronic commerce on the Internet today is payments. The truth is, banks are the payment network. You simply can't have payments without them. However, the bank payment network and the Internet operate very differently. For example, the bank payment network primarily relies on secret keys (like DES) for security, while the Internet typically relies on both secret and public keys (like RSA). But because the two networks operate differently, a bridge needs to be built between them. "WebSafe is the bridge from the bank payment network to the Internet. It combines the best of both worlds (DES and RSA) into a single unit. And, it's the only secure DES to RSA translation device available today... The point is, we're not reinventing here. We're taking proven technology that has been time tested, under the most demanding conditions, and applying it to the Internet," states Gary Sabo, Vice President of Product Management and Marketing for Atalla. WEBSAFE'S CERTIFICATION AUTHORITY SUPPORT: HOW TO VOUCH FOR SOMEONE ON THE INTERNET. One new service that is arising is the need for electronic notarization by Certification Authorities. They'll provide proof that you are who you say you are. Major credit card companies, banks, telecommunications companies and post offices are the most likely institutions to pick up this role. The WebSafe is designed to be the cornerstone for supplying cryptographic services for Certification Authorities. WEBSAFE'S SECURE KEY MANAGEMENT. When most people talk about cryptographic security, they're talking about a single key type. It's impossible to have security with this method. There must be different keys for different functions. Atalla employs a key architecture that includes hierarchal support for a wide variety of key types, such as: Key exchange key, data encryption (DES and RSA), PIN data, Message Authentication Code (MAC), digital signatures, and certificates. Applying different key types for different functions restricts how a key is used and can prevent a security system from being spoofed into giving up secret data. This way, even through the most complicated series of transactions, your data is kept secure. Founded in 1972 and acquired in 1987 by Tandem Computers Corporation, Atalla designs, manufacturers and supports secure on-line transaction automation systems for financial, retail and business applications. Atalla's products include POS/POE credit/debit payment terminals, check readers, security processors for the Internet and other networks, customer authorization and PIN selection terminals and secure enrollment products for banks, retailers and state EBTs. The company is headquartered at 2304 Zanker Road, San Jose, CA 95131. Phone: (408) 435-8850, (800) 523-9981. Fax: (408) 435-1116. From rah at shipwright.com Thu Oct 12 12:19:29 1995 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 12 Oct 95 12:19:29 PDT Subject: (fwd) checkfree/cybercash diff Message-ID: --- begin forwarded text Date: Thu, 12 Oct 95 14:34:46 +0100 From: Holger.Reif at PrakInf.TU-Ilmenau.DE (Holger Reif ) To: www-buyinfo at allegra.att.com Subject: checkfree/cybercash diff Hi all, I studied both websites regarding their wallet system. I noticed a press release that checkfree will license cybercash technology and develope products. I saw _no_ release that checkfree has already released a cybercash wallet compatible SW. But I cannot find any difference between cybercash wallet and checkfree wallet. Is it behind the open part of the tech information? Who can make things clear??? read you later - Holger Reif http://remus.prakinf.tu-ilmenau.de/Reif/ --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From bdavis at dg.thepoint.net Thu Oct 12 12:37:02 1995 From: bdavis at dg.thepoint.net (Brian Davis) Date: Thu, 12 Oct 95 12:37:02 PDT Subject: java security concerns In-Reply-To: <199510101714.KAA07329@ix2.ix.netcom.com> Message-ID: On Tue, 10 Oct 1995, John Lull wrote: > On Mon, 09 Oct 1995 17:30:38 -0700, cmcmanis at scndprsn.Eng.Sun.COM > (Chuck McManis) wrote: > > > >By the way, I suggest that Sun should offer a large money prize for > > >the first significant security hole found the Java implementation. Its > > >a tiny price to pay for security. > > > > I don't think the lawyers would let us. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ I think this means they didn't ask. If they did, perhaps the problem is their ability to say with a straight face that their product is "secure" while at the same time running a contest to find insecurities! EBD > > Pardon my French, but if your lawyers make it impossible to do > technical work correctly, isn't it time to get new lawyers? I can't > see how offering a reward for reporting bugs could possibly be > objectionable to any rational lawyer. > > This can be a VERY useful (and very inexpensive) debugging technique. > Didn't Knuth offer a cash reward to the first person to find each typo > in his "Fundamental Algorithms" series -- and then doubled the amount > each year? > > It can also be a very useful teaching tool, in that it encourages > users to explore little-used corners of a system. > > I applaud any company that has the guts to do it. > > Not a lawyer on the Net, although I play one in real life. ********************************************************** Flame away! I get treated worse in person every day!! From mab at research.att.com Thu Oct 12 13:17:13 1995 From: mab at research.att.com (Matt Blaze) Date: Thu, 12 Oct 95 13:17:13 PDT Subject: smartcard encryption: revised paper available Message-ID: <9510122024.AA06402@merckx.info.att.com> I've put a (slightly expanded) revised version of my paper, "High- Bandwidth Encryption with Low-Bandwidth Smartcards" in my ftp directory. This paper describes a little protocol for exploiting the secure key storage facilities of slow smartcards but with the host processor doing most of the actual work. ftp://ftp.research.att.com/dist/mab/card_cipher.ps -matt From kelly at netcom.com Thu Oct 12 13:19:43 1995 From: kelly at netcom.com (Kelly Goen) Date: Thu, 12 Oct 95 13:19:43 PDT Subject: Oct 14 meeting, focus on Java, Mountain View, California In-Reply-To: <199510121831.LAA02357@netcom20.netcom.com> Message-ID: <199510121911.MAA07717@netcom.netcom.com> I seem to recall you from the compiler group at sun(SUNPRO) I think we met at tom kesslers going away party are you that person??? cheers kelly From stewart at OpenMarket.com Thu Oct 12 14:16:21 1995 From: stewart at OpenMarket.com (Lawrence C. Stewart) Date: Thu, 12 Oct 95 14:16:21 PDT Subject: (fwd) checkfree/cybercash diff In-Reply-To: Message-ID: <199510122116.RAA11126@arctic.openmarket.com> > But I cannot find any difference between cybercash wallet and checkfree wallet. > Is it behind the open part of the tech information? Probably we should wait for Donald Eastlake (Cybercash) or someone from Checkfree to chime in here, but here's my understanding: History: Cybercash has a client application, which currently handles credit cards, and will add support for EFT payments. The Checkfree app talks to the Cybercash gateway to the financial nets, via merchant software. Checkfree/Spyglass/V-One/Tandem demo'd a "Wallet" at Spring Internet World, which currently handles credit cards, and will add support for bill-payment and/or check-writing, via Checkfree's service. My understanding of the technical similarities/differences: The credit card handling is essentially the same as iKP/STT/SEPP, etc. however, I think Cybercash's sytem hands off the card number to the Cybercash Server and then deals in handles, while the Checkfree system stores the card number encrypted on the PC, and passes it along each time. If this is true, it makes the Cybercash system reasonably resilient to off-line local password guessing attacks. A feature of the Checkfree thing is that it comes pre-loaded with a whole bunch of public keys of gateway operators (current and prospective). As gateway operators come on line, they are assigned a key from the pool. This makes it "open" to multiple gateway operators. The implementation I saw had only a 4-digit PIN protecting the local card-storage file, so it is not terribly secure against anyone who gets access to the PC. Obviously a pass-phrase would help a lot here. My understanding of the techno-politics: Cybercash will adopt STT/SEPP for credit cards, abandoning its own wire protocol. Both Checkfree and Cybercash will share the client app, and add their respective support for EFT, micropayments, and check-writing. -Larry Stewart Open Market Inc. From weld at l0pht.com Thu Oct 12 14:18:00 1995 From: weld at l0pht.com (Weld Pond) Date: Thu, 12 Oct 95 14:18:00 PDT Subject: FWD: International Encryption Protocols Message-ID: To: "Frank O'Dwyer" cc: firewalls at GreatCircle.COM (Firewalls Mailing List) From: Justin Mason Subject: BoS: Re: International Encryption Protocols Frank O'Dwyer sez: >After all, if the CoCom countries _weren't_ willing to sell each other >crypto equipment, how could they spy on one another? :-) > >(Actually the :-) may not be necessary - I believe there was a story > in the news recently about the UK 'authorities' snooping on Irish > official traffic carried on UK-supplied equipment.) Almost right -- it was the UK surveillance service (GCHQ) snooping on Irish official traffic carried on US-supplied crypto equipment. Apparently, the equipment in question had a "back door", courtesy of the NSA; when GCHQ found out that the Irish govt were using this equipment, they had only to ask their NSA pals for the details. I only heard the details myself via a popular-science program on crypto ;), so the so-called back door may not have been a deliberately weakened algorithm, it may have been a set of keys from an key-escrow repository or some such. --j. Weld Pond - weld at l0pht.com - http://www.l0pht.com/~weld L 0 p h t H e a v y I n d u s t r i e s Technical archives for the people - Bio/Electro/Crypto/Radio From bdolan at use.usit.net Thu Oct 12 14:35:07 1995 From: bdolan at use.usit.net (Brad Dolan) Date: Thu, 12 Oct 95 14:35:07 PDT Subject: Identity database, another attempt... Message-ID: Well, you ungrateful wretches objected to our great employment database and national ID card plans when they were presented as a means of immigration control. How about this, then: We need an employment-tracking database and licenses for everything so we can crack down on "deadbeat dads." Now that sounds more plausible, doesn't it! Please? We really want to track you closely. It's for your own good, you know. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AP reported on 10/12/95: Deadbeat parents beware: Pay up or lose your license. And not just your driver's license. Your hunting, fishing, trapping, boating, occupational and professional licenses may be taken away too. That's the promise that Congress, intensifying the fight against parents who refuse to support their children, intends to send to millions of deadbeats as it writes final legislation to transform the nation's anti-poverty programs. ... Central to [House and Senate proposals ...] is a requirement that every state have a program to revoke or restrict the licenses of parents who fail to pay, along with a central registry to track new hiring and match employment records with child support obligations. ... [Can you say "10th Amendment," Robert Dole? I knew you could! You are against this, aren't you Bob? Bob? Bob??!!] The Department of Health and Human Services ... estimates that if every state had a license revocation program in place, child support collections would grow by $2.5 billion over 10 years. [During which time the federal government will spend $20,000 billion. Relative peanuts, in other words.] According to HHS, 32 states and Puerto Rico now have laws on the books to restrict or revoke driving privileges and professional, occupational or sporting licenses. ... ^^^^^^^^^^ [Note that driving, necessary for living in most places, is now a *privilege* granted by the government. In other words, *living* is a government-granted privilege.] Paula Roberts, a child support expert with the Center for Law and Social Policy, a liberal research and advocacy group in Washington, said license revocation programs can be effective -- but only if states have the necessary computers in place. ... Essay questions for extra credit: (1.) Explain how an advocate of the proposed system of monitoring and control could be considered "liberal." Or "conservative." (2.) How many (ab)uses of this system are possible and how long will it take for them to be implemented? (3.) Compare and contrast this plan with the Soviet internal passport / labor book system. From vince at offshore.com.ai Thu Oct 12 14:39:20 1995 From: vince at offshore.com.ai (Vincent Cate) Date: Thu, 12 Oct 95 14:39:20 PDT Subject: Anguilla Cypherpunks Meeting Message-ID: -----BEGIN PGP SIGNED MESSAGE----- ANGUILLA CYPHERPUNKS MEETING The meeting will be held at my house, Sunday Oct 29. My address is "Old Ta". Really, we have only a couple named streets in this country and no street signs or addresses. My area is called "Old Ta" because the Old Water Tower was near me. :-) If you don't know where I live you are probably off-island, and I can just pick you up at the airport. You are welcome to stay the week around the meeting (like Oct 25 to Nov 1 or some such). Anguilla is a fantastic little country in the Caribbean with wonderful beaches and no taxes. I have been living here for almost a year now and just love it. Right now American Airlines has some specials on that make flying to Anguilla a bit cheaper than normal. For example: New York to Anguilla $365.95 rt San Jose to Anguilla $574.95 rt For these prices the tickets must be purchase by Oct 16th. Please let me know if you are coming so I will be sure to have enough space. If we get too many people we may need some airmattresses or something. It is warm here, so sleeping bags are not needed. If while you are outside the USA you want to write some software that uses encryption and sell it worldwide, let me know. I could put you up while you wrote it and my company could sell it for share of the selling price. Let me know what you are thinking of and how long you think it would take. -- Vince -----BEGIN PGP SIGNATURE----- Version: 2.6.i iQCVAgUBMH0ZDsh6X5WuK8MNAQFqZAP+IF9OvHRsCFuRVGxH3q9jSC8Hh5rxvv9C Z6xD52PdxADM5RLxOwiuhWITStbpNL9R4T+v+mu6VnjPgifnORrS7mEM4tsmWTLT 9LJ9R4p8Q51hjXy889AOcB6Tl0rmkXouRklzYKeq/m0PnL2smt6WDF3owgq65c73 4/odioz0Oic= =6pbC -----END PGP SIGNATURE----- From vince at offshore.com.ai Thu Oct 12 14:39:22 1995 From: vince at offshore.com.ai (Vincent Cate) Date: Thu, 12 Oct 95 14:39:22 PDT Subject: NYT on Internet Flaws In-Reply-To: Message-ID: The NYT claim was about as sensible as saying MS-DOS is the structure of the Internet and is not safe, so the Internet is not safe. We could as well have viruses spreading on floppies for MS-DOS (there are far more people on the Internet using MS-DOS than NFS) that cause your MS-DOS Netscape to send the unencrypted credit card numbers off to a certain anonymous email address. Now watch, someone will try this. Oh well. It really has nothing to do with the Internet or Netscape. I hope Markoff gets this: The fact that Internet communication is not inherently secure does not mean that it can not be made secure. Note that an insecure phone-line can be made secure by using a phone with a scrambler. The same can be done on the Internet and is being done - by companies like Netscape. By far the biggest obstacle to a secure Internet is the governments ITAR regulations. This has made it impractical to put real security into NFS, FTP, Unix, and WWW. Many of our current security problems are really due to "the basic structure of ITAR" but none are due to the "basic structure of the Internet". It sort of pains me to see this kind of hype, but it will probably push companies to get real security faster. So in the long run it may not be such a bad thing. Also, it may be easier to pressure the government to get rid of the ITAR restrictions. And they say any publicity is good publicity, so it probably will not really hurt the Internet at all. -- Vince > San Francisco, Oct. 10 -- Newly publicized weaknesses in > the basic structure of the Internet [...] >[...] > The problem is not Netscape's alone; it potentially affects > any organization that operates a computer from which files > or software could be downloaded over the Internet. The > weakness can be traced to the technical underpinnings of > the network, [...] > > The disclosure of the flaws casts doubt on the aspirations > of companies like Netscape, which last summer had one of > the most successful stock offerings in Wall Street history > based on the promise of the impending arrival of a > full-fledged on-line marketplace. >[...] > The newly publicized weakness occurs in a widely used > Internet protocol -- or technical standard -- known as the > Network File System, or NFS. Because NFS does not have any > means for allowing the recipient of a program or document > to verify that it has not been altered during transmission > from the file server to the user, any interception or > tampering would go undetected. From nobody at REPLAY.COM Thu Oct 12 15:00:23 1995 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 12 Oct 95 15:00:23 PDT Subject: Smart Card Target Message-ID: <199510122200.XAA05917@utopia.hacktic.nl> Partnership Targets Billion Dollar Smart Card Market Denver, October 11 -- Racom Systems Inc. has entered into a multi-million dollar partnership with Rohm Co. Ltd, a Japanese company, to manufacture the ferroelectric chips used in contactless, battery-free smart cards. The deal also calls for Rohm to manufacture a new generation of advanced microprocessor-based chips currently under development for use in high-security financial applications. Rohm is currently starting up a new 0.6 micron wafer fabrication operation in Kyoto, Japan, dedicated to the high-volume manufacture or ferroelectric chips, and has licensed Racom's contactless, battery-free technology specifically for the Japanese market. Racom said the cards are already in use in over 100 installations worldwide. Racom spokesperson Laura Keane said the ferroelectric-based smart cards, which exchange information with readers via radio waves instead of being passed through a reader like a credit card, are used for electronic ticketing: automatic fare collection on buses, subways and trains, electronic point-of-sale, and electronic benefits transfer. Racom said the new cards are superior to the earlier smart cards that use conventional semiconductor technologies because of their unique combination of high-speed, low-power, non-volatile operation, and high reliability. The new smart cards have the ability to store as many as 16 different accounts, said Keane. It could hold your checking account, credit card account, let you pay for a bus or train ticket, and allow you access to controlled areas within your workplace. Keane spoke about some of the card's advantages. In automatic fare collection, users no longer have to carry the correct change or tokens, waiting times to board are reduced, and the risk of robbery of bus, subway and train operators is reduced since they have less cash on board. "It's a stored value card," said Keane. "You put money on the card and daily as you use it you wave it over an antenna and it deducts the fare for that day." Keane said electronic ticketing primarily benefits the frequent traveler. The user would simply wave their card over an antenna at a kiosk in the terminal after selecting their destination and class of accommodation for immediate ticketing. The card would have your seating preference and frequent flyer number recorded and would provide that information to the ticket machine. According to Jerome Svigals, publisher of Smart Cards & Comments and a consultant to the electronic banking industry, contactless technology is very valuable to the user because of its speed, convenience, ease of use, low cost and perhaps most importantly its security. "Even more significant is this smart cards' ability to manage multiple applications with contactless technology that ensures the highest long-term data integrity, especially important for electronic purse requirements," said the industry consultant. Press contact: Laura Keane, Racom Systems, 800-789-7627; Public contact: 800-789-7627. From raph at CS.Berkeley.EDU Thu Oct 12 15:11:52 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Thu, 12 Oct 95 15:11:52 PDT Subject: Netscape 2.0b1J still core dumps on Java Message-ID: <199510122211.PAA24518@kiwi.cs.berkeley.edu> I pointed the latest beta (Solaris 2.4) towards this URL: http://java.sun.com/JDK-prebeta1/applets/CardTest/example1.html ...and, lo and behold, it core dumped with a Bus error. It's unlikely that the bug is in Java itself, as I was able to successfully run the example from Sun's JDK appletviewer. Not impressed yet. Raph From adam at homeport.org Thu Oct 12 15:43:03 1995 From: adam at homeport.org (Adam Shostack) Date: Thu, 12 Oct 95 15:43:03 PDT Subject: netscape 2 certification authorities Message-ID: <199510122246.SAA07849@homeport.org> The new betas of Netscape store CA trust stuff in a NDBM database. Does anyone have good tools for looking at NDBM stuff? Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From raph at CS.Berkeley.EDU Thu Oct 12 15:48:56 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Thu, 12 Oct 95 15:48:56 PDT Subject: http://www.cs.berkeley.edu/~raph/javatest.html Message-ID: <199510122248.PAA18979@kiwi.cs.berkeley.edu> Plcurechaxf jevgr pbqr! Encuc From frissell at panix.com Thu Oct 12 16:12:07 1995 From: frissell at panix.com (Duncan Frissell) Date: Thu, 12 Oct 95 16:12:07 PDT Subject: Identity database, another attempt... In-Reply-To: Message-ID: On Thu, 12 Oct 1995, Brad Dolan wrote: > restrict or revoke driving privileges and professional, occupational or > sporting licenses. ... ^^^^^^^^^^ > > > [Note that driving, necessary for living in most places, is now a > *privilege* granted by the government. In other words, *living* is > a government-granted privilege.] Luckily other governments will still grant you driving licenses so you just have to take a foreign trip. It's clear that the Federal Job Licensing system is meant to be extended to denial of work rights for deadbeat dadism, tax evasion, overdue library books, whatever. Certainly encourages self employment. DCF "Do you have a moral right to register your kid. Wait till he grows up and ask him if he wants to be registered." From perry at piermont.com Thu Oct 12 16:51:37 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 16:51:37 PDT Subject: netscape 2 certification authorities In-Reply-To: <199510122246.SAA07849@homeport.org> Message-ID: <199510122351.TAA22805@jekyll.piermont.com> Adam Shostack writes: > The new betas of Netscape store CA trust stuff in a NDBM > database. Does anyone have good tools for looking at NDBM stuff? Perl treats NDBM files as if they are internal arrays if you ask it to -- I often examine strange NDBM files this way. Its pretty convenient for the task. Perry From mark at lochard.com.au Thu Oct 12 17:12:24 1995 From: mark at lochard.com.au (Mark) Date: Thu, 12 Oct 95 17:12:24 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510121454.KAA20694@jekyll.piermont.com> Message-ID: <199510122235.AA41086@junkers.lochard.com.au> >It was suprisingly weak for a John Markoff story (he usually gets the >details exactly right) but it is an issue that had to be brought up >and I see no reason to call it a bad article overall. *snort* I've been trying to keep my views to myself on this but claiming Markoff usually gets things right is plain misleading. His articles are as about as one sided as you can get and full of factual inaccuracies. The Mitnik series were a farce and his latest work is reactionary fluff and shows his true lack of understanding of his topics. The only value I find in his work is the humour value at laughing at the rot on the pages. Unfortunately it really isnt a laughing matter to go around creating incorrect impressions, especially about something with as much potential as the inet. Cheers, Mark mark at lochard.com.au The above opinions are rumoured to be my own. From stevet at ultratech.net Thu Oct 12 17:14:38 1995 From: stevet at ultratech.net (Steve Thompson) Date: Thu, 12 Oct 95 17:14:38 PDT Subject: GOB_ble In-Reply-To: <199510091151.HAA05403@pipe4.nyc.pipeline.com> Message-ID: ---------------------------------------------------------------- Steve Thompson BOFH, System Admin, Nothing indicates shoddy workmanship ultratech.net more than lumps in the duct tape. From jim at acm.org Thu Oct 12 17:16:30 1995 From: jim at acm.org (Jim Gillogly) Date: Thu, 12 Oct 95 17:16:30 PDT Subject: netscape 2 certification authorities In-Reply-To: <199510122246.SAA07849@homeport.org> Message-ID: <199510130016.RAA14262@mycroft.rand.org> > Adam Shostack writes: > The new betas of Netscape store CA trust stuff in a NDBM > database. Does anyone have good tools for looking at NDBM stuff? Perl's my favorite. Here's a code fragment that might help. All you need to do is open the ndbm file (foo.pag/foo.dir in this case) and aim it at an associative array, then have your way with it. Jim Gillogly Sterday, 22 Winterfilth S.R. 1995, 00:14 ---------------------------------------------------------------------------- #!/usr/bin/perl dbmopen(%baz, "foo", 0600); # At this point just access %count the way you would any other assoc array # For example, to list it all: while (($key, $value) = each %baz) { printf "Key $key, value $value\n"; } dbmclose(baz); ---------------------------------------------------------------------------- From spector at zeitgeist.com Thu Oct 12 18:20:14 1995 From: spector at zeitgeist.com (David HM Spector) Date: Thu, 12 Oct 95 18:20:14 PDT Subject: NYT on Internet Flaws In-Reply-To: Message-ID: <199510130119.VAA02267@zeitgeist.zeitgeist.com> The real problem seems to be that Markoff (with whom I have spoken often in the past, and is actually *IS* a competent reporter -- usually) seems to have taken a number of interviews with various people and combined them, out of order with no real context into an Internet boogey-man story. The reason I say this is simply from the quotes by Jeff Schiller (and the "Netscape spokesman") -- they were most certainly talking about the recent discovery of problems with Netscape. The "NFS" silliness, and the thought that NFS is the mechanism by which Internet users download files seems to been have stiched in for the scare value. (We won't even get into the real-time file hijacking, etc.) I am suprised that Jeff Schiller isn't all over this (and other lists) spitting bullets considering the way he was (mis)quoted. On the other hand, it could well be that John wrote a different story and his *editors* at the NY Times decided with, um, how to put this delicately... re-ordered the story.. um, er I mean edited it. It happens all the time to make stories more "effective." (Most old newpaper folks are scared to death of this technology and take what swipes at it they can, whenever they can.) BTW: If you're really unhappy with Markoff, let him know what you think of his reporting... his email addresses used to be: markoff at nyt.com and johnm at well.sf.ca.us regards, David PS: Whatever I just said is my opinion, which should be obvious, since its coming from my home machine(s) which are funded by me personally... and not whomever I happen to work for from 9 to 5... PPS: BTW John, in case you're reading this, (and anyone else) you DO NOT HAVE PERMISSION TO QUOTE ME... period! In fact, this posting is Copyright (c) 1995 by David HM Spector and may not be reprinted in whole or in part without my express written permission. I have a copyright lawyer; she's really good, on retainer, and loves a good brawl.... ----------------------------------------------------------------------------- David HM Spector Software Developer & Nice Guy http://zeitgeist.com spector at zeitgeist.com voice: +1 212.721.6974 fax: +1 212.721.9084 -------- SJM, 32, seeks SJF for meaningful rel... What? This ISN'T the VOICE personals?! From zoetrope at infinet.com Thu Oct 12 18:25:49 1995 From: zoetrope at infinet.com (zoetrope at infinet.com) Date: Thu, 12 Oct 95 18:25:49 PDT Subject: Netscape beta 2.0 Message-ID: For Finding a security bug in Netscape, is it true you only get a measly shirt? if that is true why not just start a virus? From adam at homeport.org Thu Oct 12 18:35:43 1995 From: adam at homeport.org (Adam Shostack) Date: Thu, 12 Oct 95 18:35:43 PDT Subject: IDEA algorithm In-Reply-To: Message-ID: <199510130138.VAA08180@homeport.org> | This may be an odd question, but who is it that owns the IDEA algorithm? | | We've had a number of requests regarding licensing RSAREF tying into | legitmizing PGP products. Part of that includes IDEA obviously. Dr Peter Profos Ascom-Tech AG, Solothurn Lab Postfach 151 4502 Solothurn, Switzerland v. +41 65 242 885 fax _41 65 235 761 Now go buy a copy of Applied Cryptography, which answers this and other questions you might have. :) From JonathanZ at consensus.com Thu Oct 12 18:40:15 1995 From: JonathanZ at consensus.com (Jonathan Zamick) Date: Thu, 12 Oct 95 18:40:15 PDT Subject: IDEA algorithm Message-ID: At 6:38 PM 10/12/95, Adam Shostack wrote: >| This may be an odd question, but who is it that owns the IDEA algorithm? >| >| We've had a number of requests regarding licensing RSAREF tying into >| legitmizing PGP products. Part of that includes IDEA obviously. > > Dr Peter Profos > Ascom-Tech AG, Solothurn Lab > Postfach 151 > 4502 Solothurn, Switzerland > v. +41 65 242 885 > fax _41 65 235 761 > > Now go buy a copy of Applied Cryptography, which answers this >and other questions you might have. :) I know.. I blush. I've become such a netjunkie that not being able to find any of the answers on web pages, or Cypherpunk logs I just panicked. Thank you everyone who sent me a message with the reference. I'd say more, but I have to run and get my fix in. (Btw... what would be the absolute coolest thing folk would like to see added to RSAREF? That is, other than code that we will need to negotiate for. What new thing, speed upgrade, enhancement, etc would just tickle?) Jonathan ------------------------------------------------------------------------ ..Jonathan Zamick Consensus Development Corporation.. .. 1563 Solano Ave, #355.. .. Berkeley, CA 94707-2116.. .. o510/559-1500 f510/559-1505.. ..Mosaic/WWW Home Page: .. .. Consensus Home Page .. From zoetrope at infinet.com Thu Oct 12 18:46:09 1995 From: zoetrope at infinet.com (zoetrope at infinet.com) Date: Thu, 12 Oct 95 18:46:09 PDT Subject: Security Message-ID: In response to Aleph ones message Nothing is totally secure....The only security on the internet is being off-line....We can just make it harder to hack but hackers evolve and adapt....... From tedwards at Glue.umd.edu Thu Oct 12 19:29:07 1995 From: tedwards at Glue.umd.edu (Thomas Grant Edwards) Date: Thu, 12 Oct 95 19:29:07 PDT Subject: Netscape 2.0b1J still core dumps on Java In-Reply-To: <199510122211.PAA24518@kiwi.cs.berkeley.edu> Message-ID: On Thu, 12 Oct 1995, Raph Levien wrote: > I pointed the latest beta (Solaris 2.4) towards this URL: Security or no, I can't take Java seriously if it is only going to run on Solaris and not SunOS... -Thomas From sameer at c2.org Thu Oct 12 19:30:06 1995 From: sameer at c2.org (sameer) Date: Thu, 12 Oct 95 19:30:06 PDT Subject: Netscape beta 2.0 In-Reply-To: Message-ID: <199510130224.TAA04729@infinity.c2.org> Hey those shirts aren't measly! They're high quality Fruit of the Loom shirts, limited edition, etc. etc. Personalized even. Just ask the people who have received them. (Non-us winners haven't received them yet, I haven't shipped them yet.) > > For Finding a security bug in Netscape, is it true you only get a > measly shirt? if that is true why not just start a virus? > > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From zoetrope at infinet.com Thu Oct 12 19:34:09 1995 From: zoetrope at infinet.com (zoetrope at infinet.com) Date: Thu, 12 Oct 95 19:34:09 PDT Subject: T-Shirts Message-ID: Ya but a multi million dollar corp like netscape should be paying big bucks for those bugs....Or the mob might...ya get my drift....Alot of people give personalized T-shirts but not everyone can jeapordize a corps existed? Waiting a reply, CyberPunc X From adam at homeport.org Thu Oct 12 19:47:58 1995 From: adam at homeport.org (Adam Shostack) Date: Thu, 12 Oct 95 19:47:58 PDT Subject: IDEA algorithm In-Reply-To: Message-ID: <199510130250.WAA08368@homeport.org> | (Btw... what would be the absolute coolest thing folk would like to see | added to RSAREF? That is, other than code that we will need to negotiate | for. What new thing, speed upgrade, enhancement, etc would just tickle?) Consistant pricing. The knowledge that any app I develop using RSAREF can be made into licensed for commercial use product for a set, known, published fee. This would be the biggest win for Consensus. Another really big win would be to add more entry points to the code to legitimize Wei Dai's excellent Crypto++ library, which has to jump in at all sorts of unpublished interfaces. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From zoetrope at infinet.com Thu Oct 12 20:03:52 1995 From: zoetrope at infinet.com (zoetrope at infinet.com) Date: Thu, 12 Oct 95 20:03:52 PDT Subject: T-Shirts Message-ID: >Read http://home.netscape.com/newsref/pr/newsrelease48.html, announced here >a scant two days ago, then rephrase your question.... > >-Futplex > > Thanks to a referall by futplex I see the error in my question.... Netscape is infact offering money and other freebees but some Kevin Mitnick would rather have fun with it like messing with netscape or wait for the Final v.2.0 to come out then have alot of fun!!! anyway thanks again Futplex, the one and only, CyberPunc X From zoetrope at infinet.com Thu Oct 12 20:05:22 1995 From: zoetrope at infinet.com (zoetrope at infinet.com) Date: Thu, 12 Oct 95 20:05:22 PDT Subject: 90% Message-ID: Can I ask a question....are you guys into cryptology for the interesting facts and knowledge or fer cracking unix codes and raising havoc? From m-gebis at students.uiuc.edu Thu Oct 12 20:14:21 1995 From: m-gebis at students.uiuc.edu (Michael James Gebis) Date: Thu, 12 Oct 95 20:14:21 PDT Subject: 90% In-Reply-To: Message-ID: <199510130314.WAA12586@ux5.cso.uiuc.edu> In uiuc.mlist.cypherpunks zoetrope writes: >Can I ask a question....are you guys into cryptology for the interesting >facts and knowledge or fer cracking unix codes and raising havoc? _I_ got into it for the chicks. Upon reflection it seems that it may not have worked as well as I might have hoped. :) -- Mike Gebis m-gebis at uiuc.edu Mean people suck. http://www.uiuc.edu/ph/www/m-gebis/ From futplex at pseudonym.com Thu Oct 12 20:24:39 1995 From: futplex at pseudonym.com (Futplex) Date: Thu, 12 Oct 95 20:24:39 PDT Subject: [NOISE] Re: Aquaria wars ? In-Reply-To: <9510121708.AA00880@elysion.eiss.ira.uka.de> Message-ID: <199510130324.XAA14630@thor.cs.umass.edu> Hadmut Danisch writes: > Some (many) years ago there was a very large and long flamewar at the > usenet. As far as I know it was called "The Aquaria Wars" because it > began with a debate about the question whether the newsgroup should be > named "alt.aquaria" or "alt.aquarium". I am looking for historical > informations about this flamewar. That was before my time, but I've certainly heard about it. Check out the entry for Richard Sexton in Part 4 of Dave DeLaney's excellent Net.Legends FAQ. (I can't seem to find an _accessible_ HTML copy of it right now, just several broken ones, but ftp://rtfm.mit.edu/pub/usenet/news.answers/net-legends-faq/part4 works.) -Futplex From tedwards at Glue.umd.edu Thu Oct 12 20:59:38 1995 From: tedwards at Glue.umd.edu (Thomas Grant Edwards) Date: Thu, 12 Oct 95 20:59:38 PDT Subject: 90% In-Reply-To: Message-ID: On Thu, 12 Oct 1995 zoetrope at infinet.com wrote: > Can I ask a question....are you guys into cryptology for the interesting > facts and knowledge or fer cracking unix codes and raising havoc? I am into cryptology for freedom and privacy. If it takes "cracking a few unix codes" to make people realize that we do not have good security right now and we need better crypto products and we need to fight government laws that hamper crypto development in this country, so be it. -Thomas From zoetrope at infinet.com Thu Oct 12 21:15:04 1995 From: zoetrope at infinet.com (zoetrope at infinet.com) Date: Thu, 12 Oct 95 21:15:04 PDT Subject: Flame Wars Message-ID: I am sorry if I have annoyed or offended anyone here, It was not my intention of course......I dont want to hold any grudges especially with Sameer....I havent done much cracking and have alot of questions I bet alot of you had when you were 13 anyway zoetrope as in coppolla's studio....again sorry If I offended or annoyed you.... Sincerely, CyberPunc X From jsimmons at goblin.punk.net Thu Oct 12 21:20:20 1995 From: jsimmons at goblin.punk.net (Jeff Simmons) Date: Thu, 12 Oct 95 21:20:20 PDT Subject: Serial port radiation detector? Message-ID: <199510130416.VAA01611@goblin.punk.net> -----BEGIN PGP SIGNED MESSAGE----- Sometime back during the RNG discussion I though I saw mention of a radiation detector that would plug into a PC's serial port and was fairly inexpensive. Any information about this would be appreciated. - -- Jeff Simmons jsimmons at goblin.punk.net -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMH3n/uL8IP70uJJBAQE7RwP/dQD9t8H8Es+3XmQLJgoq4hikPrJsJUuY wEdLuDH20oqByiRQm/Jv5N4HaYlLsm9cPV3DnxPNuKji0PhQn6FNsxBNw8gorCMt 6xpNiNi3eIG3C8STX+ca+L0iglxi0pBz5vNuXL3KRZRqItETBTsncCvj8nCdZwrP xfXjiVOs15k= =Jc44 -----END PGP SIGNATURE----- From bplib at wat.hookup.net Thu Oct 12 21:23:11 1995 From: bplib at wat.hookup.net (Tim Philp) Date: Thu, 12 Oct 95 21:23:11 PDT Subject: Smart Card Target In-Reply-To: <199510122200.XAA05917@utopia.hacktic.nl> Message-ID: Does anyone REALLY want to carry a card that could be sucked dry by radio? "Not I", said the little red hen! =================================== For PGP Public Key, Send E-mail to: pgp-public-keys at swissnet.ai.mit.edu In Subject line type: GET PHILP =================================== From rsnyder at janet.advsys.com Thu Oct 12 21:28:34 1995 From: rsnyder at janet.advsys.com (Bob Snyder) Date: Thu, 12 Oct 95 21:28:34 PDT Subject: Majordomo & PGP Message-ID: <199510130430.AAA28277@janet.advsys.com> Here's something that might be of interest..... Bob Date: Thu, 12 Oct 1995 12:01:00 -0400 Message-Id: <9510121601.AA14372 at hawww.ha.osd.mil> To: cwilson at slurp.neu.sgi.com, majordomo-workers at GreatCircle.COM Subject: PGP'ger-rated Majordomo ready for testing/comments Sender: majordomo-workers-owner at GreatCircle.COM Precedence: bulk I've just finished integrating PGP into Majordomo 1.93. I would like some feedback on it's ease of use, functionality etc, so I may improve it before releasing the code to the Public. And there's always that doco thing... Should be ready by months end. If secure 'domo administration or secure distribution is of interest to you, send the following commands in an email body to Majordomo at hawww.ha.osd.mil: help <-- not the usual stuff. better read it. info pgptest info pgpdomo-announce If you are a PGP user, please subscribe to pgptest at hawww.ha.osd.mil. This is a PGP protected test list that needs a workout. I'll spew pieces of my code to pgptest for people to review. Any comments, bug reports, oversights, anything (except money), please forward to phollins at hawww.ha.osd.mil. Thanks From futplex at pseudonym.com Thu Oct 12 21:33:02 1995 From: futplex at pseudonym.com (Futplex) Date: Thu, 12 Oct 95 21:33:02 PDT Subject: responce to graphic encryption replies In-Reply-To: <199510121733.KAA18977@ix7.ix.netcom.com> Message-ID: <199510130432.AAA14986@thor.cs.umass.edu> Steve Orrin writes: > Also, I have recently put together an info sheet on the Security provided > by PrivaSoft which I can post if there is interest. I for one am interested. Perhaps you could put it up on your web pages ? [...] > One of the key strengths, as I see it, of graphic encryption is > that during decryption via hacking, there is an added time element when > a human interface is required to verify the product, ( since it is a > graphic picture being produced, regular checksums for intelligible > words can't be used sans implementing OCR), even if this is only 10 > milliseconds per try this is increases the time to crack This is an interesting point I hadn't previously considered. Can anyone comment on the state of the art in fast approximate character recognition ? I expect that the people working on recognition of text in TV pictures etc. would have a good idea. My lay computer scientist's guess is that it wouldn't be all that difficult to pick a small sample window a couple of characters wide, and decide if the contents were a couple of characters. Then you'd worry about testing for higher-level linguistic intelligibility as a second cut. But I don't really know. A known-plaintext attack on the system would ideally include knowledge of the typefaces, fonts etc. typically used to print documents at the source.... > exponentially > beyond that of a data encrypted document of similar key length and > algorithm strength. ObTheoretician: Um, exponentially in terms of what ? It sounds like this multiplies the expected brute force cracking time by a constant, but doesn't change the big-O time of the algorithm. I agree, however, that big constants can be rather significant when it comes to real world applications. -Futplex From zoetrope at infinet.com Thu Oct 12 21:33:12 1995 From: zoetrope at infinet.com (zoetrope at infinet.com) Date: Thu, 12 Oct 95 21:33:12 PDT Subject: hardware Message-ID: is there any Hardware involved in cryptology and code hacking other than a comp andf some accelerator chips? CyberPunc X From rsalz at osf.org Thu Oct 12 21:48:14 1995 From: rsalz at osf.org (Rich Salz) Date: Thu, 12 Oct 95 21:48:14 PDT Subject: Welcome to the list Message-ID: <9510130445.AA04028@sulphur.osf.org> You will probably find it most helpful to read through a few months archives of the list (ask around for back digests, usenet access, etc). And read the Tim's cyphernomicon. You'll find most intro-level answers there, and you're less likely to annoy the natives. :) /r$ From raph at CS.Berkeley.EDU Thu Oct 12 21:59:36 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Thu, 12 Oct 95 21:59:36 PDT Subject: The Economist on Netscape "hackers" Message-ID: <199510130458.VAA16480@kiwi.cs.berkeley.edu> Looks like every cypherpunk's favorite newsweekly has slipped a bit. This week's Economist (Oct 7-13, 1995, pp. 77-78) has a story about banks getting on the Internet, and some of the security risks involved. It's not _too_ bad, but, well, judge for yourself: "By far their biggest worry, however, is the threat posed by computer hackers. In recent months, numerous defects have been detected in the state-of-the-art Navigator program developed by Netscape, the leading maker of Internet ``browsing'' software. Earlier this year, a French hacker broke the program's code, albeit with the help of 120 computers. Although Netscape claims that the glitches in Navigator have now been smoothed out, their very existence has shaken confidence. ..." Sigh. No mention of export restrictions (I wanted to add "of course," but for the Economist it shouldn't be an "of course"). Shall I write the letter to the editor, or does someone else want to? One thing I'll need is a brief outline of Damien Doligez's acheivements to support the idea that characterizing him as a "hacker" is not quite right. Raph (who's wondering if there's something inherent in the media process that keeps them from getting their stories straight) From ecarp at netcom.com Thu Oct 12 22:06:55 1995 From: ecarp at netcom.com (Ed Carp) Date: Thu, 12 Oct 95 22:06:55 PDT Subject: looking for anti-tamper software Message-ID: <199510130455.VAA29233@netcom6.netcom.com> I used to have this C source that I could embed in a program, and it would tell me if the software had been tampered with at runtime. I've lost/mislaid/whatever the source, and I was wondering if anyone had anything that would do the same thing. As I recall, it calculated a simple CRC and embedded it into the .EXE file (it was written for MS-DOS). It doesn't need to be cryptographically secure - I just need to check to see if the executable has been corrupted. I've leafed through alt.sources and comp.sources.*. Thanks in advance... -- Ed Carp, N7EKG Ed.Carp at linux.org, ecarp at netcom.com 214/993-3935 voicemail/digital pager Finger ecarp at netcom.com for PGP 2.5 public key an88744 at anon.penet.fi "Past the wounds of childhood, past the fallen dreams and the broken families, through the hurt and the loss and the agony only the night ever hears, is a waiting soul. Patient, permanent, abundant, it opens its infinite heart and asks only one thing of you ... 'Remember who it is you really are.'" -- "Losing Your Mind", Karen Alexander and Rick Boyes From patrick at Verity.COM Thu Oct 12 22:07:56 1995 From: patrick at Verity.COM (Patrick Horgan) Date: Thu, 12 Oct 95 22:07:56 PDT Subject: 90% Message-ID: <9510130504.AA17156@cantina.verity.com> > From: zoetrope at infinet.com > > Can I ask a question....are you guys into cryptology for the interesting > facts and knowledge or fer cracking unix codes and raising havoc? > For the cyphergroupies of course...they rule! Some day I'm going to write a book about the better known, shall I say "famous" ones, and then I'll be a bazillionaire...oh yeah, that's the other reason I'm on cypherpunks, to get rich! (Did I mention fame?) And they serve a great breakfast too! You can get anything you want at the cypherpunks restaraunt, ta da da da da da da, you can...help me help me Mr. Blobby, I think my neural nets are insufficiently trained! Bzzzt! Patrick _______________________________________________________________________ / These opinions are mine, and not Verity's (except by coincidence;). \ | (\ | | Patrick J. Horgan Verity Inc. \\ Have | | patrick at verity.com 1550 Plymouth Street \\ _ Sword | | Phone : (415)960-7600 Mountain View \\/ Will | | FAX : (415)960-7750 California 94303 _/\\ Travel | \___________________________________________________________\)__________/ From stewarts at ix.netcom.com Thu Oct 12 22:10:43 1995 From: stewarts at ix.netcom.com (Bill Stewart) Date: Thu, 12 Oct 95 22:10:43 PDT Subject: 90% Message-ID: <199510130510.WAA17526@ix6.ix.netcom.com> At 11:01 PM 10/12/95 -0400, you wrote: >Can I ask a question....are you guys into cryptology for the interesting >facts and knowledge or fer cracking unix codes and raising havoc? Cryptography can cause far more interesting kinds of havoc than scaring a few marketroids about crackers cracking their market shares, or scaring a few spooks that they might not be able to eavesdrop on the American public. Cryptography is a way of changing the balance of power about who owns your personal information. Computers are very good at centralizing and combining information - once something's in a major database, it's easy for the people who own databases to compare them with other databases, so your Social Security Number and Driver's License Number and credit cards and phone numbers and TRW credit report all pretty much tell people what you're doing, what kind of lifestyle you lead, where you're travelling, what magazines you read, where to find you if they want, where your money is, what kind of junk mail to send you, whether your house is worth burglarizing, whether you'd be a good target for the draft or a tax audit, etc. Not much you can do about it except not give people information, and that's getting tougher to do, especially if you like conveniences of modern American life like employee-style jobs and renting or buying houses or having a driver's license when the cops stop your car for no good reason. But with cryptography, you can structure transactions so that people get all the information they need to do business with you (if you want them to), and none of the information they don't need. Imagine if your credit smart-card didn't have your name on it (because only you have the PIN), and gave out a different number every time you used it (but Visa doesn't mind, because they know who you are.) Imagine if, instead of having one master SSN that you write on every bloody form you fill out in your life, you have a list of tax id numbers, and can get more if you need them, so everybody who needs to send the IRS a chunk of your money can do so, but the numbers aren't tied together except back at the tax office, where nobody's going to care until you retire. (That doesn't even take cryptography, though it helps.) Imagine if people started thinking that your own private information was your own, and didn't _need_ to see three kinds of picture ID to let you rent a mailbox or a car, because you could use crypto methods to give them the information they need to charge you for the car if you rip it off, without all the other baggage. And imagine if all you need to do business is that barcode tattooed on your arm, which you can wave by the machines anywhere you go, for everything you do. Crypto's the alternative. ===== Now, as far as the things you first asked about go, the theoretical stuff _is_ pretty neat, and has finally given me an excuse to go study up on number theory, and scaring the public about weaknesses of the computer products they use is something the mass media and legislators like better than many of us do (though having your friends get their pictures in Wired and the New York Times is kind of fun...) - it'd be nice if the people who make popular software would take security seriously, instead of putting out some of the thoughtlessly weak stuff that they do. Sometimes it takes a 2x4 to do the job; sometimes the press just overreacts. I do occasionally hang out with people who have the police watch them because their politics aren't correct (whether to the left, right, or deep center), or because they like recreational chemicals that are safer than tobacco and alcohol, or just because they're weird. That's wrong, and people have a right to their privacy. (Hasn't stopped me from offering the Philadelphia Police Red Squad coffee when they were watching a convention I was at (they'd brought their own :-) - but those guys really still are in business.) #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- From sandfort at crl.com Thu Oct 12 22:11:38 1995 From: sandfort at crl.com (Sandy Sandfort) Date: Thu, 12 Oct 95 22:11:38 PDT Subject: Netscape beta 2.0 In-Reply-To: <199510130224.TAA04729@infinity.c2.org> Message-ID: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SANDY SANDFORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C'punks, On Thu, 12 Oct 1995, sameer wrote: > Hey those shirts aren't measly! They're high quality Fruit of > the Loom shirts, limited edition, etc. etc. Well, I think "cyberpunc X" (give me a break) may have suggested (inadvertantly) Sameer's next T-shirt motto: I CRACKED MS STT AND ALL I GOT WAS THIS MEASLY T-SHIRT S a n d y ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From perry at piermont.com Thu Oct 12 22:20:01 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 22:20:01 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510122235.AA41086@junkers.lochard.com.au> Message-ID: <199510130518.BAA22989@jekyll.piermont.com> Mark writes: > >It was suprisingly weak for a John Markoff story (he usually gets the > >details exactly right) but it is an issue that had to be brought up > >and I see no reason to call it a bad article overall. > > *snort* I've been trying to keep my views to myself on this but claiming > Markoff usually gets things right is plain misleading. His articles are as > about as one sided as you can get and full of factual inaccuracies. The > Mitnik series were a farce and his latest work is reactionary fluff and > shows his true lack of understanding of his topics. Pardon my saying it, but thats totally off base. Until this article, I caught him in one failing -- he did not ask the state department for comment when he did his story on Phil Karn's CJ and only reported the pro-export viewpoint. When I wrote him about it, he sounded embarassed that he hadn't said he would try to be more balanced next time. Other than that, Markoff has been a paragon of journalistic integrity, following the rules of the profession almost by the book. Yeah, he was overinvolved in the Mitnik thing. Who among us is perfect? Its not like he sought it out, anyway -- Mitnik involved him, and who among us is rational enough to take ourselves off of interesting work under such circumstances? He's as close as you are going to get to meeting the journalistic ideal. You aren't going to get perfect with mere human beings reporting the news. I'm willing to settle for someone who gets the job right nearly all of the time. Maybe he got lazy on this last article -- some of the stuff that made it sound like NFS was used in wide area file transfer was really strange -- but usually he gets *all* the details right. Who else manages that? Can you name a better reporter? I can name five worse ones covering the same beat right now without thinking about it. Now, if he keeps being lazy I'll naturally change my opinion. Right now, however, he's still up there in the pantheon in my book. Perry From perry at piermont.com Thu Oct 12 22:33:04 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 22:33:04 PDT Subject: T-Shirts In-Reply-To: Message-ID: <199510130532.BAA23011@jekyll.piermont.com> zoetrope at infinet.com writes: > Ya but a multi million dollar corp like netscape should be paying > big bucks for those bugs....Or the mob might...ya get my drift....Alot of > people give personalized T-shirts but not everyone can jeapordize a corps > existed? If you are looking to make money off of this sort of thing, get a reputation and start consulting or selling security software. If your interest is just in being obnoxious, please crawl back under your rock. Either way, you are way out of line. Oh, and you might want to learn how to spell and how to write in standard English grammar if you want to be taken seriously. Perry From perry at piermont.com Thu Oct 12 22:36:11 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 22:36:11 PDT Subject: 90% In-Reply-To: Message-ID: <199510130535.BAA23019@jekyll.piermont.com> zoetrope at infinet.com writes: > Can I ask a question....are you guys into cryptology for the interesting > facts and knowledge or fer cracking unix codes and raising havoc? I think I've figured it out. I'm sure you'll be fine when you get past your 16th birthday, but could you please leave us alone until then? Some of us have serious work to do. Perry From nesta at cynico.com Thu Oct 12 22:41:40 1995 From: nesta at cynico.com (Nesta Stubbs) Date: Thu, 12 Oct 95 22:41:40 PDT Subject: 90% In-Reply-To: Message-ID: On Thu, 12 Oct 1995 zoetrope at infinet.com wrote: > Can I ask a question....are you guys into cryptology for the interesting > facts and knowledge or fer cracking unix codes and raising havoc? > If you look on pg. 34 of the handbook, Sect. 97.A13 says that this list is primarily for passing child porn and dirty limericks in unbreakable codes. You really should read your Internet Handbook before asking these questions. You Internet Service Provider DID give you the Official Internet Handbook right? Nesta Stubbs "Betsy, can you find the Pentagon for me? Cynico Network Consulting It has five sides and a big parking lot" nesta at cynico.com -Fred McMurray- From tcmay at got.net Thu Oct 12 22:53:34 1995 From: tcmay at got.net (Timothy C. May) Date: Thu, 12 Oct 95 22:53:34 PDT Subject: Welcome to the list Message-ID: At 4:45 AM 10/13/95, Rich Salz wrote: >You will probably find it most helpful to read through a few months >archives of the list (ask around for back digests, usenet access, etc). >And read the Tim's cyphernomicon. You'll find most intro-level answers >there, and you're less likely to annoy the natives. :) Thanks, Rich, for the mention of my extremely long FAQ, available (if you're lucky and Netcom isn't too jammed up) at ftp.netcom.com in /pub/tc/tcmay, as "CP-FAQ." Also in compressed forms. A better version is the Web version at; http://www.oberlin.edu/~brchkind/cyphernomicon/ (And there are a couple of other sites that have it.) It is very long, and doesn't include specific things about the Netscape hack, the au courant topic, but it does have a lot of history, background, motives, and interesting (to me at least) applications/implications. (The problem with most FAQs is that that they're either too basic, or too long. I opted for the encycopedic, figuring people could use search tools. Even so, lots of topics don't get enough coverage.) The best way to get rolling with the Cypherpunks list is, I think, to do what Rich says. Read for a while, look at the archives, get a copy of Schneier's book and maybe a few others (Bamford, Kahn, the Springer-Verlag books, etc.), and find an area that interests you. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From perry at piermont.com Thu Oct 12 23:01:16 1995 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 12 Oct 95 23:01:16 PDT Subject: Flame Wars In-Reply-To: Message-ID: <199510130601.CAA23061@jekyll.piermont.com> zoetrope at infinet.com writes: > I am sorry if I have annoyed or offended anyone here, It was not my > intention of course......I dont want to hold any grudges especially with > Sameer....I havent done much cracking and have alot of questions I bet alot > of you had when you were 13 anyway zoetrope as in coppolla's > studio....again sorry If I offended or annoyed you.... If you are actually 13, I apologize for the comments I made earlier. However, if you are really are that young your questions are understandable, as was your manner. I got started in computers when I was about eleven many, many years ago, and I remember what its like when you know more than most adults about technology but don't quite know how to interact with other technical people yet. (I also remember that I didn't appreciate people thinking that I didn't know how to interact with other people, but thats another story.) By the way, generally, it works better when you join a new mailing list if you sit and listen for a while to get the flavor of what is going on. Anway, let me try to answer your question. We don't study cryptography and data security for any one reason -- we are a big and very diverse group of people and we have many different reasons for what we do. However, many of us are interested in the topic for political reasons. We view cryptography as a way to ensure freedom and privacy for people around the world, and we try to advance that cause by studying cryptographic systems and sometimes computer security in general. Other reasons people like doing cryptography work is that its a fun area of math/computer science to fool around with in and of itself, and that some of us, including me, have paying work doing things like computer and network security. Most of us don't want to break in to computer systems for the sake of breaking in to them, and in fact most of us don't even actually break in to computers per se, but we do try to break badly designed cryptographic software and security systems in order to get people to build them better -- we tend to publicize these efforts both so that we can get as many people working on them as possible (the more brains the better) and so that we can make sure that people are aware of flaws so that they will fix them or so that, if they aren't fixed, people will avoid the software with the problems. "Security through obscurity" is something we usually dislike around here, and you may see the term "security through obscurity" used as a way of insulting some cryptographic system or security sytem from time to time if it depends on people not knowing how it works in order to keep it secure. If you are interested in cryptography and in learning a bit about what we do, I suggest that you first read a good introductory book on cryptography like Bruce Schneier's "Applied Cryptography" (which is coming out in a new edition in only a few weeks) and that you listen a bit to the conversation around here -- you might also want to read some of the back archives of the mailing list on www.hks.net. You also might have other questions. One good way to deal with them is to first see if you can find the answer in Schneier's book or the archives, and then to try to ask the list if its a question that lots of people might want to think about, or send mail to a single person who probably knows the answer if you don't think its worth bothering everyone about. Above all, its important to remember that people around here are often trying to get work done, and will answer quiet, polite questions before they will answer loud and obnoxious ones. Perry From jsw at netscape.com Thu Oct 12 23:03:04 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Thu, 12 Oct 95 23:03:04 PDT Subject: Netscape beta 2.0 In-Reply-To: Message-ID: <307E0031.3FFD@netscape.com> zoetrope at infinet.com wrote: > > For Finding a security bug in Netscape, is it true you only get a > measly shirt? if that is true why not just start a virus? If you are the first to find a severe security bug in Netscape, we will send you a check for $1000. You can see the rules on our web site. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at netscape.com Thu Oct 12 23:05:40 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Thu, 12 Oct 95 23:05:40 PDT Subject: Netscape 2.0b1J still core dumps on Java In-Reply-To: <199510122211.PAA24518@kiwi.cs.berkeley.edu> Message-ID: <307E00CD.CF7@netscape.com> Thomas Grant Edwards wrote: > > On Thu, 12 Oct 1995, Raph Levien wrote: > > > I pointed the latest beta (Solaris 2.4) towards this URL: > > Security or no, I can't take Java seriously if it is only going to run on > Solaris and not SunOS... > > -Thomas Netscape Navigator 2.0 does support Java on SunOS. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From tcmay at got.net Thu Oct 12 23:17:15 1995 From: tcmay at got.net (Timothy C. May) Date: Thu, 12 Oct 95 23:17:15 PDT Subject: Who has Copies of the "Internet Handbook" Message-ID: At 5:36 AM 10/13/95, Nesta Stubbs wrote: >On Thu, 12 Oct 1995 zoetrope at infinet.com wrote: > >> Can I ask a question....are you guys into cryptology for the interesting >> facts and knowledge or fer cracking unix codes and raising havoc? >> >If you look on pg. 34 of the handbook, Sect. 97.A13 says that this list >is primarily for passing child porn and dirty limericks in unbreakable >codes. You really should read your Internet Handbook before asking these >questions. You Internet Service Provider DID give you the Official >Internet Handbook right? Many of us tried to get copies before the Great Handbook Renaming (*), but were unable to. My sysadmins at Portal, then Netcom, kept promising it would be made available, but I never saw it. In most jurisdictions the "Internet Handbook" is simply not available. Can't somebody make it available via an anonymous remailer? Surely they can't be watching _all_ of the time? In any case, as I understand things, all mentions of Cypherpunks were taken out of the Handbook in 1993. --Klaus! (* For the newbies, the Internet Handbook used to be known as "The Protocols of the Elders of the Arpanet," but the name was changed in the Great Renaming. It was considered controversial even back in 1973 when I got my first Arpanet account.) Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From mark at lochard.com.au Thu Oct 12 23:38:09 1995 From: mark at lochard.com.au (Mark) Date: Thu, 12 Oct 95 23:38:09 PDT Subject: 90% In-Reply-To: Message-ID: <199510130406.AA33835@junkers.lochard.com.au> >Can I ask a question....are you guys into cryptology for the interesting >facts and knowledge or fer cracking unix codes and raising havoc? Yes. :) Mark From robl at on-ramp.ior.com Fri Oct 13 00:12:42 1995 From: robl at on-ramp.ior.com (Rob L) Date: Fri, 13 Oct 95 00:12:42 PDT Subject: Flame Wars In-Reply-To: <199510130601.CAA23061@jekyll.piermont.com> Message-ID: > However, if you are really are that young your questions are > understandable, as was your manner. I got started in computers when I > was about eleven many, many years ago, and I remember what its like > when you know more than most adults about technology but don't quite > know how to interact with other technical people yet. (I also remember I remember it to.. and it was only 15 years ago.. sheesh, where has the time gone.. > > reasons for what we do. However, many of us are interested in the > topic for political reasons. We view cryptography as a way to ensure > freedom and privacy for people around the world, and we try to advance Hell, to be honest, I don't even fathom 1/2 of what is said around here.. but I understand the need to encrypt, have trained myself to use PGP, and am polically active.. I mainly use the list for a who's who of crypto and a referance guide to whats going on in the field.. > > If you are interested in cryptography and in learning a bit about what > we do, I suggest that you first read a good introductory book on > cryptography like Bruce Schneier's "Applied Cryptography" (which is > coming out in a new edition in only a few weeks) and that you listen Trust me on this one.. I was the newbie a couple of months ago and stepped into it pretty big for my first time out.. Afterwards (of course) I read the Faq's, and have lurked a lot since.. take this list slow, as it will eventually pay out in the info you are looking for.. -Greets to the newer newbie- RobL From an116512 at anon.penet.fi Fri Oct 13 00:34:26 1995 From: an116512 at anon.penet.fi (an116512 at anon.penet.fi) Date: Fri, 13 Oct 95 00:34:26 PDT Subject: what are these people selling???? Message-ID: <9510130722.AA03096@anon.penet.fi> why is the cp meeting sponsored by sun? so we can hear a sales pitch on java? --****ATTENTION****--****ATTENTION****--****ATTENTION****--***ATTENTION*** Your e-mail reply to this message WILL be *automatically* ANONYMIZED. Please, report inappropriate use to abuse at anon.penet.fi For information (incl. non-anon reply) write to help at anon.penet.fi If you have any problems, address them to admin at anon.penet.fi From mark at lochard.com.au Fri Oct 13 01:05:30 1995 From: mark at lochard.com.au (Mark) Date: Fri, 13 Oct 95 01:05:30 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510130518.BAA22989@jekyll.piermont.com> Message-ID: <199510130700.AA39159@junkers.lochard.com.au> >> >It was suprisingly weak for a John Markoff story (he usually gets the >> >details exactly right) but it is an issue that had to be brought up >> >and I see no reason to call it a bad article overall. >> >> *snort* I've been trying to keep my views to myself on this but claiming >> Markoff usually gets things right is plain misleading. His articles are as >> about as one sided as you can get and full of factual inaccuracies. The >> Mitnik series were a farce and his latest work is reactionary fluff and >> shows his true lack of understanding of his topics. > >He's as close as you are going to get to meeting the journalistic ideal. >I'm willing to settle for someone who gets the job right nearly all of >the time. God help us all. I am probably biased against the media in general, relying on them to present a balanced and unbiased by the reporter, editor or media ownership is a tall task for them. They are too quick to jump into the sensationalist angle and disregard the overall view and truth. For cypherpunks to get the proper facts and implications (subjective I guess) into print, it's usually the case that any communication with the press has to be very clear, concise, unambiguous and to the point. If you give them any chance to wander off the rails they will take it and distort your words according to their agenda. Once that happens it's usually the case the article is scoffed at for a week or so and then forgotten until it's dragged up later as someones point for whatever they want to support in their discussion. If there are good articles out there then it's usually the case the reporter actually went and took the time to investigate their subject matter and gather all points of view and to verify as many facts as they can. You say Markoff does this, I dont agree he does. Then the editor has to keep their big red pen out of it enought so the message isn't distorted. This doesnt occur often IMHO. You're better off purchasing space in the paper yourself and getting it said your way. It's because of this dilema that a lot of the people I communicate with, and who have the information people should know, choose to avoid and shun any media contact. They dont want to be linked with some lame ass report. Cheers, Mark mark at lochard.com.au The above opinions are rumoured to be mine. From txomsy at ebi.ac.uk Fri Oct 13 01:27:29 1995 From: txomsy at ebi.ac.uk (J. R. Valverde (EMBL Outstation: the EBI)) Date: Fri, 13 Oct 95 01:27:29 PDT Subject: T-Shirts In-Reply-To: <199510130532.BAA23011@jekyll.piermont.com> Message-ID: <199510130827.JAA17366@neptune.ebi.ac.uk> Hey Perry, I think this is pushing it a bit too far: "Perry E. Metzger" writes >zoetrope at infinet.com writes: >> Ya but a multi million dollar corp like netscape should be paying >> big bucks for those bugs....Or the mob might...ya get my drift....Alot of >> people give personalized T-shirts but not everyone can jeapordize a corps >> existed? > >If you are looking to make money off of this sort of thing, get a >reputation and start consulting or selling security software. If your >interest is just in being obnoxious, please crawl back under your >rock. Either way, you are way out of line. > Sorry, but I think the guy has a point. And all his rights to expose it. Do you read sci.crypt? Looks like you don't. I've lost track (nor do I try to keep it) of the amount of typical answers of the likes of: > Can you break my algorithm? Yeah. Send the source and offer a good reward so someone thinks it worth breaking it. So far so good! And then someone comes asking why should anybody do consultancy work for a multimillion corporation (e.g. MicroSoft) with no access to sources for free or just a "high-quality T-shirt" that can't be worth more than 100$ and all he gets is a kick in the ass. Well, I agree that discovering the Pentium bug was great. But it would have been better if it didn't exist. Many companies invest zillions of dollars in testing. Why should I save that money to a greedy company? By the same rule, you may as well propose that we leave the Gov'ts do as they wish with cryptography. Why should they try to make thing right from the first time? Let people discover mistakes later, and complain. If they can. The point is: regarding cryptography and security as with anything else: one should be sure his/her solutions work before wasting other people's time. Like, e.g. before asking if his ROT16 algorithm is safe. Isn't it embarrassing that any corp. asks for testing of programs before even having made sure they check for array overflows? >Oh, and you might want to learn how to spell and how to write in >standard English grammar if you want to be taken seriously. > And that's the best part of all! Well, I'm not a native English speaker. So may be I shouldn't be in this list. As neither any other foreigner. More so since I think contents are more important thn the way they are expressed. For that sake we could also give away crypto. It isn't reputable and standard English, so it can't be taken seriously. I don't want to start a flame war. I'd just prefer to discuss other topics, in any 'spaghetti -or scrambled- language' as long as I can understand it. jr -- These opinions are mine and only mine. Hey, man, I saw them first! From mark at lochard.com.au Fri Oct 13 01:31:01 1995 From: mark at lochard.com.au (Mark) Date: Fri, 13 Oct 95 01:31:01 PDT Subject: what are these people selling???? In-Reply-To: <9510130722.AA03096@anon.penet.fi> Message-ID: <199510130708.AA36406@junkers.lochard.com.au> >why is the cp meeting sponsored by sun? >so we can hear a sales pitch on java? Shucks, mebbe coz good ol Sun developed the lil ol java language? Ya think? Werd. From mark at lochard.com.au Fri Oct 13 01:31:06 1995 From: mark at lochard.com.au (Mark) Date: Fri, 13 Oct 95 01:31:06 PDT Subject: The Economist on Netscape "hackers" In-Reply-To: <199510130458.VAA16480@kiwi.cs.berkeley.edu> Message-ID: <199510130705.AA35603@junkers.lochard.com.au> I was going to ignore this, but I feel verbose today.. >I write the letter to the editor, or does someone else want to? One >thing I'll need is a brief outline of Damien Doligez's acheivements to >support the idea that characterizing him as a "hacker" is not quite >right. Hacker good. Cracker bad. Media distort hacker to bad. Media hype merchants. Media bad. Bad ol' Media. Degauss. Reformat. >Raph (who's wondering if there's something inherent in the media >process that keeps them from getting their stories straight) Reporters. Editors. Owners. Cheers, Mark mark at locahrd.com.au The above opinions are rumoured to be mine. From fc at all.net Fri Oct 13 04:03:17 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Fri, 13 Oct 95 04:03:17 PDT Subject: looking for anti-tamper software In-Reply-To: <199510130455.VAA29233@netcom6.netcom.com> Message-ID: <9510131100.AA17114@all.net> > > I used to have this C source that I could embed in a program, and it > would tell me if the software had been tampered with at runtime. I've > lost/mislaid/whatever the source, and I was wondering if anyone had anything > that would do the same thing. As I recall, it calculated a simple CRC and > embedded it into the .EXE file (it was written for MS-DOS). > > It doesn't need to be cryptographically secure - I just need to check to see > if the executable has been corrupted. I've leafed through alt.sources and > comp.sources.*. You are aware that there is a generic attack against all such defenses - aren't you? It has been published for 7+ years. For details see: A Short Course on Computer Viruses - Wiley and Sons - 94 -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From fc at all.net Fri Oct 13 04:14:19 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Fri, 13 Oct 95 04:14:19 PDT Subject: NYT Markoff Article and one person's response Message-ID: <9510131111.AA17607@all.net> I sent the following letter to the editor of the NYT expressing my personal view of the article. Perhaps others on this list should send letters expressing their viewpoints as well. Dear Sir/Madam: I have been reading, with great interest, the responses from security experts all over the Internet to John Markoff's October 11 article titled "Discovery of Internet Flaws Is Setback for On-Line Trade", and I thought your readers might like to know what real experts in the field think about Mr. Markoff's article. While the most recent announcement by Professor Brewer was generally taken as a positive step from American academia in catching up to the rest of the information security world, it is hardly a breakthrough, or even a novelty. To get a perspective on this, an average of about 10 new vulnerabilities of this magnitude or larger are discussed on Internet forums every month. The "CERT" team at Carnegie-Mellon University has published more than 10 similar types of attacks so far this year, the Internet forum "8lgm" publishes an average of more than one per month, the "BugTraq" Internet forum tracks and shows fixes for about two similar holes per month, and the "cypherpunks" forum uncovers several holes in cryptographic and other systems each month. The idea portrayed by Mr. Markoff that businesses rushing to the Internet are largely unaware of these risks is also quite naive. A recent Computer Security Institute study showed that one in every five enterprises has reported suffering an Internet security incident. Most experts believe the reality is much worse and that many who responded "no" either refuse to admit it or simply don't know. Over 50 percent of companies connected to the Internet provide high-risk features such as FTP and WWW to all employees, and 39 percent have no firewall to limit attacks from the Internet. According to several published papers, about 10 times as many attempted attacks are detected when firewalls are in place than are detected when they are not in place. Since the Internet was first introduced, many of the American Universities that have been so active in developing information technology have essentially ignored the security issues. Their ignorance of these issues has produced literally hundreds of protocols that are now in use by millions of computers from all over the globe and which, because of their insecure designs, are inherently difficult to secure. Thousands of individuals from all over the world have spent their spare time, often on nights and weekends, helping other people by developing and freely distributing new security technologies. They have been finding security problems and solving them for many years, most often without recognition or renumeration. They have been trying to tell the people developing these protocols about protection problems and have been widely ignored, with a few notable exceptions, by the American Universities. I personally think that it is a travesty that a relatively minor contribution by a few people at Berkeley gets front page headlines while the ongoing contributions of thousands of volunteers goes largely unrecognized. If you want the real story about electronic commerce and security issues on the Internet, listen to the people who are doing the work every day. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From nobody at REPLAY.COM Fri Oct 13 05:09:56 1995 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 13 Oct 95 05:09:56 PDT Subject: Insecurity Section of the Internet Handbook Message-ID: <199510131209.NAA20556@utopia.hacktic.nl> For zoetrope, and others curious about the Insecurity section of the Internet Handbook, we pass along this Yellow Pages advert-insert comp sec teaser from SAIC -- with only dribbles of cryptography. The puffery appears to be artfully fattened and out-of-date. Like most security porkers, SAIC sells its nitrated sec services dearly (security by deep pockets of the fearful engorgers) while feigning Net public-spirit to mask IP search and steal. In a telling slight, SAIC does not cite outturned- pockets, beef jerky Cypherpunks. _______________________________________________________ URL: http://mls.saic.com/library.html [which links to the listed contents] SECURITY LIBRARY The SAIC Security Library contains security-related infomation and programs from around the Net. SAIC does not verify or endorse such files or any use thereof. Notices and Upcoming Events [Not included here] Advisories and Alerts Newsgroups Documents Programs Other Security Sites _______________________________________________________ URL: http://mls.saic.com/alerts.html SECURITY ADVISORIES AND ALERTS Alerts * Sun Security Alerts * CERT - Computer Emergency Response Team * ASSIST - Automated Systems Security Incident Support Team * AUSERT - Australian Security Emergency Response Team * NASIRC - NASA Automated Systems Incident Response Capability * DDN - Defense Data Network * FIRST - Forum of Incident Response and Security Teams Advisories * 8lgm Advisories * Bugtraq Archives, threaded * CERT Advisories * CIAC - Computer Incident Advisory Capability _______________________________________________________ URL: http://mls.saic.com/docs.html SECURITY DOCUMENTS These documents are from the Net and cover a wide area of topics concerning computer security. They are for the education and legitimate use of computer security techniques only. All non-FAQ documents are in PostScript format unless otherwise noted. ______________________________________________________ Frequently Asked Questions * Basic Computer Security * Firewalls * Setting Up Anonymous FTP * What To Do If Your Machine Is Compromised * Security Patches * Vendor Contacts * Pretty Good Privacy (PGP) * #hack FAQ * Cryptography FAQ _______________________________________________________ Firewalls Introductory Papers * Internet Firewalls - An Introduction (August 1994, 221K) * Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls (Undated, 1.8M) General Firewall Documents * A Network Firewall (June 1992, 374K) * A Toolkit and Methods for Internet Firewalls (Undated, 185K) * Proper Care and Feeding of Firewalls (November 1994, 121K) * A Network Perimeter with Secure External Access (Undated, 268K) * An Internet Gatekeeper (Undated, 149K) * Thinking About Firewalls (Undated, 109K) * X Through Firewalls, and Other Application Relays (May 1993, 430K) _______________________________________________________ WWW Security * Security and the World Wide Web (June 1994, 10K HTML) * NCSA on Mosaic Security Issues(December 1994, 1.6K HTML) * Shen: A Security Scheme for the Web (Undated, 1.7K HTML) * Using PGP/PEM Encryption (Undated, 7.6K HTML) * Secure HTTP (Undated, 2.2K HTML) _______________________________________________________ Intrusion Detection * A Software Architecture to support Misuse Intrusion Detection (March 1995, 250K) * An Application of Pattern Matching in Intrusion Detection (June 1994, 674K) * Algorithm for Distrubuted Recognition and Accountability (Undated, 209K) * A Pattern Matching Model for Misuse Intrusion Detection (Undated, 191K) * AI Approach to Intrusion Detection (June 1994, 168K) * Intrusion Detection In Computers (January 1991, 12K text) * USTAT - A Real-time Intrusion Detection System for UNIX (November 1992, 1.3M) _______________________________________________________ Improving your UNIX Security Technical Tips * Setting up Sun Security (March 1992, 7K text) * Miscellaneous Security Tips (October 1992, 23K text) * CERT Generic Security Tips (July 1992, 17K text) * UNIX Site Security Handbook (July 1991, 253K text) Finding and Fixing Your Security Problems * Improving the Security Of Your Site By Breaking Into It (Undated, 51K text) * Finding Holes in Your System (October 1993, 16K text) * Improving the Security of Your UNIX System (April 1990, 274K) * Becoming An Uebercracker to Stop Uebercrackers (December 1993, 9K text) _______________________________________________________ The Internet Worm * A Report on the Internet Worm (November 1988, 16K text) * Technical Report on the Internet Worm Incident (September 1991, 173K) * The Internet Worm Program: An Analysis (December 1988, 283K) * A Tour of the Worm (Undated, 166K) _______________________________________________________ Tales of Computer Attacks and Countermeasures * Five Incidents At Columbia University (Undated, 93K) * "An Evening With Berferd" (Undated, 82K) * Internet Attack on Texas A&M (1993, 294K) * "There Be Dragons" (August 1992, 185K) * Computer Break-ins: A Case Study (Undated, 94K) * System Admin Horror Stories (1992, 148K text) _______________________________________________________ Networking TCP/IP Security * TCP Wrapper Security (Undated, 59K) * A Weakness in the 4.2BSD TCP/IP Software (February 1985, 27K) * Security Problems in the TCP/IP Protocol Suite (April 1989, 107K) * Network (In)Security Through IP Packet Filtering (September 1992, 123K) General Networking Documents * Architecture and Implementation of Network-Layer Security under UNIX (Undated, 124K) * Information Security And Privacy In Networks (Undated, 809K .tar file) * Paving the Road to Network Security (May 1994, 162K) * NFS Tracing By Passive Network Monitoring (Undated, 170K) * Addressing Weaknesses in the DNS Protocol (August 1993, 406K) * Countering Abuse of Name-Based Authentication (Undated, 243K) * An Architectural Overview of UNIX Network Security (May 1993, 50K text) * NIS Security Warning (December 1991, 7.5K) _______________________________________________________ Trusted Systems * The Orange Book (August 1983, 264K text) * Understanding Configuration Management in Trusted Systems (March 1988, 138K text) * Understanding DAC in Trusted Systems (September 1987, 87K text) * Understanding Facility Management in Trusted Systems (June 1989, 106K text) * Understanding Trusted Distribution in Trusted Systems (December 1988, 55K text) * Understanding Audit in Trusted Systems (July 1987, 56K text) _______________________________________________________ Newsletters * COAST Newsletter * Privacy Forum * Cipher - Electronic Newsletter of the IEEE Technical Committee on Security and Privacy _______________________________________________________ Miscellaneous Documents * Security Term Glossary (Undated, 70K text) * Open Systems Security - An Architectural Framework (June 1991, 300K text) * Password Security: A Case History (Undated, 36K) * Extracts from various security articles (Undated, 61K text) * Coping with the Threat of Computer Security Incidents (June 1990, 102K text) * Threat Assessment of Malicious Code and Human Threats (October 1992, 231K) * Tty Security - a Tty Session Manager (Undated, 98K) * Electromagnetic Emanation Eavesdropping (1989, 45K text) * GAO Report on Internet Security (June 1989, 104K text) * ACM SIG on Security, Audit, and Control _______________________________________________________ URL: http://mls.saic.com/programs.html SECURITY PROGRAMS These programs are from various locations around the Net; SAIC does not verify their functionality and/or consequences of use. All programs are for assumed legal uses and education. Unless noted, all programs are intended for UNIX platforms. Local (load directly to disk; gzip tar files unless noted) * COPS - Bulletproof your system from intruders * Crack - Password cracker * Cryptography File System (CFS) - Encrypted filesystems for SunOS * Internet Security Scanner (ISS) - Checks UNIX sites for vulnerabilities * ifstatus - Checks interfaces for promiscuous mode * probe_ports - Finds open ports on UNIX systems * Secure-Sun Check - Shell script to check several common SunOS vulnerabilities (no compression) Remote * Arpwatch - Ethernet monitor, keeps track of ethernet/IP address pairings * Chalance - Intercept-proof password authentication * chrootuid - Run network programs in a mininal environment * CBW - Code Breaker's Workbench * Courtney - Identifies the use of SATAN * Dig - Sends domain name query packets to name servers * DNSWalk * Drawbridge - A bridging filter from TAMU * Kerberos - Provides secure networking * MegaPatch - Large number of SunOS patches in one bundle * Netlog - TCP/UDP traffic logging system * PGP - Pretty Good Privacy * Portmap - Portmapper replacement, with access control * SATAN - Checks computers/networks for security vulnerabilities * Securelib - Protects RPC daemons * screend - Filters IP packets * Smrsh - Sendmail restricted shell * Socks - Allows Internet access to firewalled machines * SRA - Secure RPC Authentication for Telnet and FTP * TAMU - Texas A&M Security Tool Package * tcpdump - captures protocol packets from networks * TCP Wrapper - ACLs for network services * Tiger - Scans your UNIX system for security problems * TIS Firewall Toolkit - Firewall package from TIS * Tripwire - Watch for system file changes * Watcher - Watches your system for security problems _______________________________________________________ URL: http://mls.saic.com/sites.html OTHER SECURITY SITES Cryptography * International Assoc. for Cryptologic Research * Cryptography Web Page at UMBC * Cryptography Export Control Archives * Lawrie's Cryptography Bibliography * RSA Data Security, Inc. * Quadralay's Cryptography Archive * Cryptography, PGP, and Your Privacy * PGP Web Page Firewall Vendors and Information * Harris Computer Systems * Sun Microsystems (SunScreen) * Trusted Information Systems * Cohesive Systems * Sea Change Corp. * Raptor Systems * Greatcircle Firewall Server * Virtual-One Network Environment Corp (V-ONE) * CheckPoint Software Technologies Ltd. * Firewalls.R.Us Security Gophers * InterNIC's Computer and Network Security * NIST Security * Security, Audit & Control (SIGSAC) World Wide Web Security * WWW Security Mailing List Archive * WWW Security at Rutgers University Intrusion Detection * Intrusion Detection Systems Archives (threaded) PC Security * Safetynet, Inc. Various Security Sites * Computer Security Research Lab at UC Davis * Computer Security at chalmers.se * Harris Computer Systems * Szymon Sokol's Security Site * The Uebercracker's Web Site * COAST Project and Laboratory * Computer Underground Digest Archive * Security News Clippings Archive * EINet's Computer Virus and Security Page * Crimelab * Phrack Magazine Home Page * TANSU's Security Reference Index * Digital Equipment's Secure Systems Index * Bellcore Security Products * Texas A&M security tools * ftp.win.tue.nl * NIST Computer Security Resource Clearinghouse * Christopher Menegay's Security Page * Security Papers at Johns Hopkins University * Dartmouth Security Tools * CERT FTP Archive * Computer Systems Consulting * Computer Systems Consulting (Local Files) * MIT's Athena Project * Yahoo's Security and Encryption Page * NIST Computer Security * ALW Unix Security Information * ALW's List of Unix Security Programs * ESNet FTP site * Bennet Yee's Security Page * Various security FTP pointers _______________________________________________________ Send questions and comments to Webmaster at mls.saic.com. From s1018954 at aix2.uottawa.ca Fri Oct 13 05:41:33 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Fri, 13 Oct 95 05:41:33 PDT Subject: The Economist on Netscape "hackers" In-Reply-To: <199510130705.AA35603@junkers.lochard.com.au> Message-ID: On Fri, 13 Oct 1995, Mark wrote: > Hacker good. Cracker bad. Media distort hacker to bad. Media hype merchants. > Media bad. Bad ol' Media. Degauss. Reformat. > > >Raph (who's wondering if there's something inherent in the media > >process that keeps them from getting their stories straight) > > Reporters. Editors. Owners. I'd say there's a nice market right now for people on this list to freelance some accurate security and crypto articles out to the traditional media. (accurate meaning your own personal bias) While a nobody like me isn't going to get published in Time, I don't see why, oh, let's say a Kevin Kelly or a Steven Levy couldn't. Besides, there's still an opening for all the rest of us to get published in the various computer trades and net mags. I'm positive *some* take freelancers. If a lot of you get quoted and even interviewed in the bad ol' media, and you actually care about getting the story right, why not write your own press releases and articles? If you just managed the next netscape crack, release the crack and an export control critique together. You might even make some money out of it. In their rush to print, editors would rather have first hand info asap than their half-competent journalist's misunderstanding of it tomorrow. It's better than working for t-shirts. (Yes, I'm sure they're nice, Sameer) If you want accurate press, you have to write it. (Disclaimer: I am not now, nor have ever been a journalist, so I really don't have a lousy clue if I'm right) From dl at hplyot.obspm.fr Fri Oct 13 05:50:42 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Fri, 13 Oct 95 05:50:42 PDT Subject: OneTimePasswd (not Pad) Message-ID: <9510131250.AA28930@hplyot.obspm.fr> Hello, I'm about to implement an OTPasswd (mostly like s/key) scheme to my www browsers/clients/proxy, but I was wondering is the mere principle of storing H^n(S) and requesting H^(n-1) from peer (H beeing your favorite one way strong hash function (MD5), and S your seed+secret passwd) could possibly be patented somehow and thus preventing using a similar scheme without getting a license (from bellcore?),.... if there are any usage conditions/restrictions?,... Also, can one compute the amount of information (if any) leaked by the method, ie, an attacquant who would have all the H^i i={a...b} (by snooping for instance) would have is job easied, and by 'how much' to find S? (or H^a-1) . is there any studies on that for H=MD[45] ? (and what is the status of free use of MDx btw ?) ps: I just an a thought that maybe the last P in elementrix POTP would be Passwd and not Pad... it could still be quite interesting to have H^n(S) (maybe variant with large n) used has 'secret' keys between parties, you'll get lots of plus against standard attacks, provided that there is no problem with know the function H^n for several (possibly large) n... hmmm why this hasn't been implement ? what obvious flaw am I missing ? dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept Soviet NORAD SDI $400 million in gold South Africa plutonium KGB From jya at pipeline.com Fri Oct 13 06:44:07 1995 From: jya at pipeline.com (John Young) Date: Fri, 13 Oct 95 06:44:07 PDT Subject: FT on IT Standards Message-ID: <199510131344.JAA16578@pipe2.nyc.pipeline.com> The Financial times today has four-page insert on the complexity and difficulty of developing international standards for all types of products. There is a passing mention of the Internet security issue. An article on standards for IT confirms Perry's oft-made points about the slow pace, protracted angling for market share, and the by- pass of standards by market go-getters who foster messes. Here are quotes on the last point: Paul Callahan of Forrester Research: "When a company owns a market they can determine the pace -- a company in its early stages of domination can move the ball forward swiftly -- such as the Internet Web software provider Netscape. Netscape didn't spend a lot of time with standards bodies -- it simply joined forces with MasterCard to co-develop Secure Courier, much as Microsoft enrolled Visa to develop its STT, Secure Transaction Technology. Only afterwards are the overtures made to standards bodies. That's commerce, and it's the way things are in the real world." Henry Ryan, convenor of the Iso-IEC JTC1 ad hoc working group on GII: "People ask, 'Can you afford to wait for standards?' I'd turn it round. If you don't, you suffer in the long term and end up with an unholy mess. If people do their own thing then the benefits -- and the problems -- may not be concentrated in one sector of the industry. We're finding that with the convergence of technologies, such as the superhighway, it isn't enough to develop standards for the IT sector, telecommunications, or consumer electronics individually." From fletch at ain.bls.com Fri Oct 13 06:52:41 1995 From: fletch at ain.bls.com (Mike Fletcher) Date: Fri, 13 Oct 95 06:52:41 PDT Subject: Identity database, another attempt... In-Reply-To: Message-ID: <9510131347.AA18300@outland> [ Stuff about nat'l DB to track "deadbeat dads" removed ] > (3.) Compare and contrast this plan with the Soviet > internal passport / labor book system. Not really related to the deadbeat dads thing, but we got a notice that the US DOT has mandated that all air passengers must present a gov't issue photo ID with a name that matches that on your ticket. In addition it says that passengers should: * be prepared to answer questions about their bags. * be prepared to open the trunk of their car. Goodbye freedom, hello police state. --- Fletch __`'/| fletch at ain.bls.com "Lisa, in this house we obey the \ o.O' ______ 404 713-0414(w) Laws of Thermodynamics!" H. Simpson =(___)= -| Ack. | 404 315-7264(h) PGP Print: 8D8736A8FC59B2E6 8E675B341E378E43 U ------ From eay at mincom.oz.au Fri Oct 13 06:53:04 1995 From: eay at mincom.oz.au (Eric Young) Date: Fri, 13 Oct 95 06:53:04 PDT Subject: IDEA algorithm In-Reply-To: <199510130250.WAA08368@homeport.org> Message-ID: On Thu, 12 Oct 1995, Adam Shostack wrote: > | (Btw... what would be the absolute coolest thing folk would like to see > | added to RSAREF? That is, other than code that we will need to negotiate > | for. What new thing, speed upgrade, enhancement, etc would just tickle?) ... > Another really big win would be to add more entry points to > the code to legitimize Wei Dai's excellent Crypto++ library, which has > to jump in at all sorts of unpublished interfaces. How about just making all the interfaces at the different levels available. For the next version of SSLeay (when I get it and the documentation finished) will have defined interfaces at the following levels for the various ciphers etc. The actual cipher level eg des_set_key, des_cfb_encrypt, idea_cbc_encrypt... This level is wanted by things like SSL for the fastest on the fly encryption possible. The 'by parts' routines eg EncryptBegin, EncryptUpdate, EncryptFinish (which take a CIPHER pointer as an argument). This is sort of wanted by people implementing higher level digital signature routines but they are usefull in their own right. The 'digital' envelope routines. eg SealBegin, SealUpdate, SealFinish (which take a CIPHER pointer, a MD pointer and the public keys etc. The high level stuff for PKCS-7/S-MIME/PEM etc. I am also documenting the interface to the big number library (anyone want to do DSS :-). -- Eric Young | Signature removed since it was generating AARNet: eay at mincom.oz.au | more followups than the message contents :-) From mark at lochard.com.au Fri Oct 13 06:59:45 1995 From: mark at lochard.com.au (Mark) Date: Fri, 13 Oct 95 06:59:45 PDT Subject: Insecurity Section of the Internet Handbook In-Reply-To: <199510131209.NAA20556@utopia.hacktic.nl> Message-ID: <199510131217.AA35639@junkers.lochard.com.au> >URL: http://mls.saic.com/programs.html > > SECURITY PROGRAMS #define paranoia on I wonder if some alert type has downloaded these and MD5 checked the tar.gz files against known clean ones. Having SAIC hand you your security tools is like having a NSA agent handing you a floppy with your brand new encryption programs. #define paranoia off Mark mark at lochard.com.au The above opinions are rumoured to be my own. From adam at homeport.org Fri Oct 13 07:27:57 1995 From: adam at homeport.org (Adam Shostack) Date: Fri, 13 Oct 95 07:27:57 PDT Subject: OneTimePasswd (not Pad) In-Reply-To: <9510131250.AA28930@hplyot.obspm.fr> Message-ID: <199510131429.KAA08941@homeport.org> | I'm about to implement an OTPasswd (mostly like s/key) scheme to my | www browsers/clients/proxy, but I was wondering is the mere principle | of storing H^n(S) and requesting H^(n-1) from peer (H beeing your | favorite one way strong hash function (MD5), and S your seed+secret | passwd) could possibly be patented somehow and thus preventing using a | similar scheme without getting a license (from | bellcore?),.... if there are any usage conditions/restrictions?,... There is an IETF working group standardizing OTPassword technology. not sure how active it still is. ietf-otp-request@@bellcore.com Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From froomkin at law.miami.edu Fri Oct 13 07:29:48 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Fri, 13 Oct 95 07:29:48 PDT Subject: Anguilla Cypherpunks Meeting In-Reply-To: Message-ID: On Thu, 12 Oct 1995, Vincent Cate wrote: [..] > If while you are outside the USA you want to write some software that uses > encryption and sell it worldwide, let me know. I could put you up while > you wrote it and my company could sell it for share of the selling price. > Let me know what you are thinking of and how long you think it would take. Of course if you are a US person (citizen or green card holder) this is just as much a violation of the ITAR than if you did it from inside the US... A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | New address, but it's still just as hot here. From ses at tipper.oit.unc.edu Fri Oct 13 07:38:52 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Fri, 13 Oct 95 07:38:52 PDT Subject: The Economist on Netscape "hackers" In-Reply-To: <199510130705.AA35603@junkers.lochard.com.au> Message-ID: On Fri, 13 Oct 1995, Mark wrote: > > >Raph (who's wondering if there's something inherent in the media > >process that keeps them from getting their stories straight) > > Reporters. Editors. Owners. Usually the Economist does take pains to get their facts right, and to print corrections if errors are reported. Recently they have been making a few more mistakes than they used to in their net coverage (most amusing mistake was making John Curran CTO of BBN instead of BBN Planet). They did come to the right conclusion on the payment standards issue, so they do deserve at least a B-. Simon ---- (defun modexpt (x y n) "computes (x^y) mod n" (cond ((= y 0) 1) ((= y 1) (mod x n)) ((evenp y) (mod (expt (modexpt x (/ y 2) n) 2) n)) (t (mod (* x (modexpt x (1- y) n)) n)))) From bdavis at dg.thepoint.net Fri Oct 13 07:39:35 1995 From: bdavis at dg.thepoint.net (Brian Davis) Date: Fri, 13 Oct 95 07:39:35 PDT Subject: Judicial Access to Keys (Was: Re: Banque des Cypherpunks) In-Reply-To: <199510120730.DAA01478@thor.cs.umass.edu> Message-ID: On Thu, 12 Oct 1995, Futplex wrote: > Scott Brickner writes: > > I don't rember if any key-splitting schemes currently allow it, but how > > about this: the escrow agencies would be the courts, requiring one > > assent from each judge on the appeals chain. As each judge rules > > against the defendant or denies the appeal, he adds his piece of the > > key to the ruling. When you reach the top of the chain, then *and only > > then* can you be traced. > > JAK (Judicial Access to Keys) sounds as though it wouldn't give the LEAs a > chance to pre-emptively snoop on message traffic before prosecution, unlike ^^^^^^^^^^^^^ ^^^^^^ > POTS wiretaps and Clipper. I don't see the govt. ever favoring such a > scheme that doesn't help the LEAs to "gather" evidence to justify an > indictment. They will probably skip JAK instead .... I think that the bigger concern would be that a small set of judges at each level would be designated JAK judges (god forbid that they all have some idea of what the issues are ...). Then LEA would be certain to present only the most egregious cases to them until they got in the habit of signing off on them. Then, the marginal requests for access would slide through. I think Futplex insinuated that this would occur post charge rather than pre charge, to which LEA would never agree. You can't indict without evidence (at least in theory :-)) and and if you're going to get blown out of the water as soon as the encrypted traffic is decrypted by the defendants for trial ... well, let's just say it is better to lose early and quietly than later and in public. All this said, and after much personal wailing and gnashing of teeth, I *personally* believe GAK/MKE/JAK etc. is unworkable and should be quietly dropped. With so many ways around key escrow, especially the existence of PGP, I think the horse has left the barn. The issue won't be dropped, of course, at least in the short run. I appreciate all the thoughtful replies to my "Cypherpunks Key Escrow" proposal, and will ignore the few that were, ahem, not so thoughtful. I've been avoiding posting about this for weeks due to my own indecision, my workload, and a sprained wrist which makes typing an adventure, but when directed to "write an article for [a law enforcement magazine] that is pro-MKE," I had to reach a personal decision about this. I am generally very open about what I think/believe etc. and have few secrets from my friends. I get the impression that the majority of you have a different view about your personal life, but that's why Baskin-Robbins has 31 flavors, not one. I also strongly believe that you gravely overestimate the threat of MKE, probably overestimate the interest LEAs have in your personal affairs, and have little idea how hard it is to get court approval for wiretaps, and presumably access to escrowed keys. I did mention to my U.S. Attorney that the proposal that "other lawful authorities" [besides judges] could grant access to escrowed keys was especially bothersome. He took it well, and said that was a legitimate point (that I don't think will go anywhere). Now understand that, as a lawyer, I get paid to say what my client (the USA) wants me to say, within certain bounds, so I will write the article. My heart will not be in it, though. I would appreciate it if you wouldn't send this to Janet Reno or otherwise use it, with attribution, at least until I find a new job! :-) I stay in enough trouble here without this being circulated through the Department and placed in my personnel file. Lest there be any doubt: I SPEAK ONLY FOR MYSELF on this issue. The Department's and the Administration's* position has not changed to my knowledge (except as has previously been discussed in this forum). ***** *Some of you like to blame the Clinton Administration for all of this. Be mindful that all this started in the Bush Administration or earlier. There's plenty of blame to go around. I encourage the Cypherpunks anarchy to use its recent successes with Netscape, and soon with MS, together with its concommitant increase in credibility to educate the public and the politicians. EBD > -Futplex > Not a lawyer on the Net, although I play one in real life. ********************************************************** Flame away! I get treated worse in person every day!! From andreas at artcom.de Fri Oct 13 07:59:43 1995 From: andreas at artcom.de (Andreas Bogk) Date: Fri, 13 Oct 95 07:59:43 PDT Subject: netscape 2 certification authorities In-Reply-To: <199510122246.SAA07849@homeport.org> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- >>>>> "Adam" == Adam Shostack writes: Adam> The new betas of Netscape store CA trust stuff in a Adam> NDBM database. Does anyone have good tools for looking at Adam> NDBM stuff? In Perl a NDBM database looks like an associative array. Andreas -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface iQCVAgUBMH59b0yjTSyISdw9AQFiEwP/RxshjTL9vHuGrsHmq4yVdda7M9oQttX8 ms0Mkla1VP+aTh9cSu/B9bzPaX5DmVZ1KDKv/NoHlqcXTQl9BlokiwDtOPKGDCq2 bt08ubgnUF1H5r9aTgaU+qp4qhOo4aUHOwPSV/DC1SLVWk23UYASm+LXAwtwPf0X sMkEI8GIYy8= =zGky -----END PGP SIGNATURE----- From ecarp at netcom.com Fri Oct 13 08:17:46 1995 From: ecarp at netcom.com (Ed Carp) Date: Fri, 13 Oct 95 08:17:46 PDT Subject: anti-tamper software Message-ID: <199510131516.IAA10764@netcom15.netcom.com> Thanks to all who replied to my request, although it seems I didn't quite make it clear what I was looking for. I'm not particularly interested in a strong cryptographic solution, as this isn't intended to detect intentional tampering - just unintentional, such as a bad spot on a hard drive or corruption. Turns out that Simtel has a couple of such packages in /SimTel/msdos/virus - CVIRPROT.ZIP is enough protection, although STEALTH.ZIP looked intriguing... I was, however, interested in what Fred Cohen said about there being a generic attack against such methods when applied to software protection against viruses (virii?). Is there such a generic attack, besides the obvious of jumping around the detection code? How about encrypting the executable, adding loader and decryption code, then decrypting the executable at runtime - would that defeat such an attack, or all such defenses doomed to failure? -- Ed Carp, N7EKG Ed.Carp at linux.org, ecarp at netcom.com 214/993-3935 voicemail/digital pager Finger ecarp at netcom.com for PGP 2.5 public key an88744 at anon.penet.fi "Past the wounds of childhood, past the fallen dreams and the broken families, through the hurt and the loss and the agony only the night ever hears, is a waiting soul. Patient, permanent, abundant, it opens its infinite heart and asks only one thing of you ... 'Remember who it is you really are.'" -- "Losing Your Mind", Karen Alexander and Rick Boyes From vince at offshore.com.ai Fri Oct 13 08:22:48 1995 From: vince at offshore.com.ai (Vincent Cate) Date: Fri, 13 Oct 95 08:22:48 PDT Subject: Anguilla Cypherpunks Meeting In-Reply-To: Message-ID: On Fri, 13 Oct 1995, Michael Froomkin wrote: > On Thu, 12 Oct 1995, Vincent Cate wrote: > > If while you are outside the USA you want to write some software that uses > > encryption and sell it worldwide, let me know. I could put you up while > > you wrote it and my company could sell it for share of the selling price. > > Let me know what you are thinking of and how long you think it would take. > > Of course if you are a US person (citizen or green card holder) this is > just as much a violation of the ITAR than if you did it from inside the US... > > A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) > Associate Professor of Law | Yes, I am still a US citizen, so far. The corporation I work for is a legal entity of Anguilla. I would not personally be selling it, the corporation would. Do you think that is ok? What if I had a couple Anguillian friends form a corporation for this purpose (buying encryption software written in Anguilla and selling it internationally)? No trouble yet, right? What if the people who come and write it are US citizens? I don't see how US law can cover corporations in other countries. PS - it is good to CC me (as you did) as I only get cypherpunks-lite, and so may not see a message, or it may be delayed. Thanks, -- Vince From alano at teleport.com Fri Oct 13 08:33:21 1995 From: alano at teleport.com (Alan Olsen) Date: Fri, 13 Oct 95 08:33:21 PDT Subject: 90% Message-ID: <199510131533.IAA14463@desiree.teleport.com> At 11:01 PM 10/12/95 -0400, you wrote: >Can I ask a question....are you guys into cryptology for the interesting >facts and knowledge or fer cracking unix codes and raising havoc? We are into cryptography because it holds the secrets, not to raising havoc, but the eldrich gods who inspire it. PGP is actually a plot by the Old Ones(tm) to return to the earth to rule again. Digital signatures are the invocation to open the gate. When the stars are near prime and the algorythm is correct, the Old Ones(tm) will rise from the curves of space and claim their place as the rulers of the TLAs. Any other information you are not cleared for at this time. (tm) is a trademark of Tim May and/or any tentacles he may designate. | Visualize a world without lawyers! | alano at teleport.com | |"The moral PGP Diffie taught Zimmerman unites all| Disclaimer: | | mankind free in one-key-steganography-privacy!" | Ignore the man | | -- PGP 2.6.2 key available on request -- | behind the keyboard.| | http://www.teleport.com/~alano | | From rmccoy at mercury.interpath.com Fri Oct 13 08:35:08 1995 From: rmccoy at mercury.interpath.com (Ron McCoy) Date: Fri, 13 Oct 95 08:35:08 PDT Subject: responce to graphic encryption replies In-Reply-To: <199510130432.AAA14986@thor.cs.umass.edu> Message-ID: <199510131535.LAA01216@mercury.interpath.net> > > Steve Orrin writes: > [...] > > One of the key strengths, as I see it, of graphic encryption is > > that during decryption via hacking, there is an added time element when > > a human interface is required to verify the product, ( since it is a > > graphic picture being produced, regular checksums for intelligible > > words can't be used sans implementing OCR), even if this is only 10 > > milliseconds per try this is increases the time to crack > > This is an interesting point I hadn't previously considered. Can anyone > comment on the state of the art in fast approximate character recognition ? > I expect that the people working on recognition of text in TV pictures etc. > would have a good idea. > [....] > > -Futplex > I wouldn't think you would have to use OCR to detect a successful decryption. The graphic file is going to have a highly correlated structure, long runs of white space etc. The statistics for such a file would be different than the random distribution you'd get from using the wrong key. Even if the graphics format is compressed, leading to a more even distribution, there might be known plaintext at the beginning of the file, headers, size etc. Ron McCoy Rmccoy at mercury.interpath.net From s1018954 at aix2.uottawa.ca Fri Oct 13 08:41:34 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Fri, 13 Oct 95 08:41:34 PDT Subject: Anguilla Cypherpunks Meeting In-Reply-To: Message-ID: On Fri, 13 Oct 1995, Michael Froomkin wrote: > > If while you are outside the USA you want to write some software that uses > > encryption and sell it worldwide, let me know. I could put you up while > > you wrote it and my company could sell it for share of the selling price. > > Let me know what you are thinking of and how long you think it would take. > > Of course if you are a US person (citizen or green card holder) this is > just as much a violation of the ITAR than if you did it from inside the US... Really? I thought except for incomes taxes, US laws only apply in American territory as opposed to applying to American people wherever they are (as I heard Germany's does). What if you were a dual citizen (US/Canada in my case)? From fc at all.net Fri Oct 13 08:47:42 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Fri, 13 Oct 95 08:47:42 PDT Subject: NNTP holes paper updated thatnks to Rich Salz Message-ID: <9510131545.AA27613@all.net> Rich Salz read over the NNTP paper and helped greatly to improve it. The new version is now on-line. Thank you Rich. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From loofbour at cis.ohio-state.edu Fri Oct 13 08:48:07 1995 From: loofbour at cis.ohio-state.edu (Nathan Loofbourrow) Date: Fri, 13 Oct 95 08:48:07 PDT Subject: Insecurity Section of the Internet Handbook In-Reply-To: <199510131209.NAA20556@utopia.hacktic.nl> Message-ID: <199510131547.LAA23036@hammond.cis.ohio-state.edu> nobody at replay.com writes: > For zoetrope, and others curious about the Insecurity > section of the Internet Handbook, we pass along this > Yellow Pages advert-insert comp sec teaser from > SAIC -- with only dribbles of cryptography. The puffery > appears to be artfully fattened and out-of-date. Like most > security porkers, SAIC sells its nitrated sec services > dearly (security by deep pockets of the fearful engorgers) > while feigning Net public-spirit to mask IP search and > steal. In a telling slight, SAIC does not cite outturned- > pockets, beef jerky Cypherpunks. Anonymous remailers are great, but I'm not sure how much good they do if you have (or, I suppose, you are a brilliant imitator of) the unmistakeable writing style of John Young. nathan From junger at pdj2-ra.F-REMOTE.CWRU.Edu Fri Oct 13 08:57:42 1995 From: junger at pdj2-ra.F-REMOTE.CWRU.Edu (Peter D. Junger) Date: Fri, 13 Oct 95 08:57:42 PDT Subject: Who is liable under ITAR (was Re: Anguilla Cypherpunks Meeting) In-Reply-To: Message-ID: Michael Froomkin writes: : On Thu, 12 Oct 1995, Vincent Cate wrote: : [..] : : > If while you are outside the USA you want to write some software that uses : > encryption and sell it worldwide, let me know. I could put you up while : > you wrote it and my company could sell it for share of the selling price. : > Let me know what you are thinking of and how long you think it would take. : : Of course if you are a US person (citizen or green card holder) this is : just as much a violation of the ITAR than if you did it from inside the US... And of course if you are not a US person this is just as much a violation of the ITAR as if you were a US person. The ITAR does not exempt foreign persons from its requirements, though it does make them ineligible to get a license permitting them to disclose their software to other foreigners (or even to themselves). -- Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH Internet: junger at pdj2-ra.f-remote.cwru.edu junger at samsara.law.cwru.edu From sameer at c2.org Fri Oct 13 08:58:26 1995 From: sameer at c2.org (sameer) Date: Fri, 13 Oct 95 08:58:26 PDT Subject: what are these people selling???? In-Reply-To: <9510130722.AA03096@anon.penet.fi> Message-ID: <199510131552.IAA22648@infinity.c2.org> The cp meeting is not "sponsored by sun". It is being held at sun. Did you think earlier cp meetings were spondored by sgi or cygnus? What's wrong with hearing a sales pitch on java, anyway? > > why is the cp meeting sponsored by sun? > so we can hear a sales pitch on java? > --****ATTENTION****--****ATTENTION****--****ATTENTION****--***ATTENTION*** > Your e-mail reply to this message WILL be *automatically* ANONYMIZED. > Please, report inappropriate use to abuse at anon.penet.fi > For information (incl. non-anon reply) write to help at anon.penet.fi > If you have any problems, address them to admin at anon.penet.fi > -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From anonymous-remailer at shell.portal.com Fri Oct 13 09:48:48 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Fri, 13 Oct 95 09:48:48 PDT Subject: Bugs Bounty?? ... shhh ... I'm huntin wa'bits ... Message-ID: <199510131647.JAA17906@jobe.shell.portal.com> > Netscape Announces Bugs Bounty with release of Netscape Navigator 2.0 beta > > Program harnesses power of the Internet to help Netscape refine Beta > versions and ensure highest quality software. Or at least this was the headline on the announcement from http://www.netscape.com > MOUNTAIN VIEW, Calif. (October 10, 1995) -- Netscape Communications > Corporation (NASDAQ: NSCP) today introduced the "Netscape Bugs > Bounty", a program that rewards users who help Netscape find and report > "bugs" in the beta versions of its recently announced Netscape > Navigator 2.0 software. > The beta versions of the popular network navigation software are available > today for downloading on the Internet for free evaluation. I was immediately overjoyed when I read that first paragraph. The sheer delight and mention of rewards -- whether its frequent flyer points or just simple little gold stars and pats on the head -- motivates me to just go out and do it. Go out and do whatever the offeror needs, so I can collect my nice juicy reward. A win/win situation. But something about this announcement seemed a little "too" polished ... (maybe it's just seeing how the last "Netscape bug situation" was spinned, ... I don't know). But I decided to read on, wanting to find out how Netscape "rewards" users who bring them "bad news". It was a slow afternoon, and I had just finished listening to that odious Dominick Dunne on Larry King. What the hey, I thought. Let's read on and discover more about the Bounty from Netscape. > The contest begins with the beta versions of Netscape Navigator 2.0 -- > available for Windows, Macintosh and X Window System operating environments > -- that are on the Internet today. FULL RULES FOR THE CONTEST will be > available on Netscape's home page at http://home.netscape.com. As the > rules will explain in detail, users who are the first to report a > particular bug will be rewarded with various prizes depending on the bug > class: users reporting significant security bugs as judged by Netscape > will collect a cash prize; users finding any security > bugs will win Netscape merchandise; and users finding other serious bugs > will be eligible to win a choice of items from the Netscape General Store. Gee this was sounding, really really good. But that FULL RULES thing was highlighted on my screen (I was running Lynx 2.2 at the time ...), so I had a quick little old jump over to the FULL RULES. And with just a I was off ... and rule-reading before the big hunt ... The rules started off ... > We're in the process of building a series of new technologies, such > as Java, into Netscape Navigator 2.0. Navigator 2.0 will usher in a new > way to use computers and networks, as well as create new opportunities > for people to build applications. Wow, I said. New opportunites to build applications ;) New ways to use computers. New ways to use networks. All ushered in by Netscape. That all sounds really, really GOOD!! I was eager, and ready for all of this newness. > We're eager to make sure that our new product is as bug-free as possible. > To that end, in addition to our internal testing, we're now offering prizes > and bounties for certain types of bugs found in the beta versions of > Navigator 2.0 starting with the beta versions listed at the bottom of > the page. Oh good. Finally a company that's interested in making a product as bug free as possible. And Prizes and Bounties!!! Joy!! Joy!! My adrenaline began to flood. Every neuron was piqued. I was ready to read on. This was slowly turning into as satisfying a hunt as any one I'd ever been on, even though we were only hunting for little old Bugs, and not big cats. None the less, it sounded like a fine afternoon of sport. Especially after Dominick Dunne. > This contest begins on October 11 and ends when Navigator 2.0 ships > release versions on supported Macintosh, Windows, and Unix platforms. > If the release date for the final version varies by platform, then the > contest will continue until Netscape has released final versions of > Netscape Navigator 2.0 on all 3 platforms. > > For questions regarding this contest email "contest_questions at netscape.com" > All questions and notifications will be handled via email. Netscape may > choose to respond to your questions individually, or as part of a > generalized response. Netscape will strive to respond as fully as > possible, but can not guarantee a response to all questions we receive. Hmmm, I thought. This is odd. Here I am potentially reporting a very important problem, to Netscape, and the company is saying that they might not even choose to respond to questions. I began to wonder whether Ford could have ever gotten away with not responding to queries about their products. Especially defects. I wondered what would have been the reaction if Ford decided not to answer mail that inquired about the wee little problem with their Pinto's. But this was a different industry. This was software. Internet software. The hottest, sportiest, new-fangleddy dandiest stuff around. Not responding to mail, but of course!! They're busily harnassing the power of the Internet to deliver software that's bug-free. They can't be bothered with small things like customers. They want bounty-hunters. But no need to let the glow fade so fast. I'm sure that they'll just be swamped with mail ... now let's get to their "proactive reward program" (although I don't know how you reconcile running a contest to improve your product with ignoring mail ... must be some newfangled modern hip-hop do-op bee-bop communications graduate theory thingy, that I just don't quite know how to parse.) > Anyone who finds a severe bug (as defined by us) that hasn't been > previously found and can be reproduced by us will be entered in drawings > for prizes from our GENERAL STORE. Hmmm, a severe bug (as defined by them). Is this like a Level One?? I wonder what that would be. But let's get to the meat of the matter, what are the prizes that Netscape is offering to harness the power of the Internet while they ignore and don't (selectively) reply to email. > Netscape will conduct 2 drawings and will award 50 prizes in each drawing, > for a total of 100 prizes. 50 will be nifty Netscape Mozilla mugs and 50 > will be snazzy Netscape polo shirts. We'll award either a mug or a shirt, > our choice, to the submitters of each of 100 bugs drawn randomly. ... 'scuse me ... a nifty Netscape Mozilla mug?? 50 of them do you say?? Let's, see. Last time I checked a single share of Netscape Communications Corporation (NASDAQ: NSCP) was trading for about $60 plus change. I calculated the wholesale cost of the mugs at approximately $1.20 each, which would bring the total mug promotion budget (50 * $1.20) to the equivalent of one single share of NSCP. Gee, that certainly motivates me. But then again, there's those snazzy Netscape polo shirts. ;-) Shame that Netscape isn't Microsoft. I'm sure that other vendors might at least offer the Great Powerful Internet Bugs Hunters.a choice between the snazzy shirt or the nifty mug? But I guess most of the shirts and mugs weren't reserved for the Bugs Hunters. They were probably in de press kits. > We'll conduct the first drawing when we ship Beta 2 for all platforms > and the second drawing when we release the final version of Netscape > Navigator 2.0. > > If you find a Security bug that hasn't been previously found, and can > be reproduced by us, we'll contact you via email and offer you your choice > of any item in the Navigator products or Bazaar section of our General > Store. Wow, I thought. I was stupified. If I found one of the Security bugs, I could get a copy of one of the Buggy Products absolutely FREE!!! Gratis!! What man could turn his nose up at that kind of offer. This lil old rest-stop cum cafe, the one that's putting out the bounty offers on the info-highway ain't like no little greasy spoon where you stop for chile and then get CHARGED when you find a cockroach on your spoon staring you down eye to eye. Heck no, this is a CLASS operation. Dinner's on the house. > And if the security bug you find is severe as defined by Netscape, and > hasn't been previously found, and can be reproduced by us, we'll write > you a check for $1000. Now we're really talking ...If you find a really, really severe bad problem, we'll reward you with the equivalent of 16.5 shares of Netscape. A veritable REWARD OF REWARDS!! > No purchase is necessary. All entries become the property of Netscape, > and may be modified, revised, edited, incorporated into Netscape products > and otherwise used at Netscape's sole discretion. Oh, oh ... incorporated into Netscape products??? This is sort of a non-consensual waiver of all of your rights by participating in this contest?? Now this made me want to stop and cogitate for a lil bit. I thought ...(but only for a second, of course, cause there were bugs to hunt) and I thought ... and I thought that security bugs were much too important to stop this over such a trivial matter, as negotiating my rights away for the benefit of possibly getting a mug. But there was no time to stop and think. Security bugs were going to be our target. Big Game. Non of that discretionary mug stuff for us ... we can't be bribed that easily ... no sirree, bob. > Netscape is not responsible for late, lost, or misdirected entries. > All taxes on prizes are the sole responsibility of winners. By > participating you agree to these rules and the decisions of the judges, > which will be final > Any disputes concerning this event will be settled by arbitration. Tax on a mug?? Ok ... I think we understand each other now. The budget's tight, and all. The plan really wasn't well thought out, and of course we all know that the IPO didn't do that well, and blah, and blah, blah, blah. Ahh, but a hunt's a hunt. So a hunting, we will go. (Phew, isn't this a long post to the list??? I haven't really said anything about the SECURITY BUG yet, have I?? Sheesh, I'm so, so verbose.) But first, what is a SECURITY BUG, anyway?? What does Netscape's marketing machine consider a REAL SECURITY BUG?? If we know that, then we'll know where to look. Before we get to that ... one last quote from Netscape's spokesman, Homer. > "We are continuing to encourage users to provide feedback on new versions > of our software, and the Netscape Bugs Bounty is a natural extension of > that process," said Mike Homer, vice president of marketing at Netscape. > "By rewarding users for quickly identifying and reporting bugs back to us, > this program will encourage an extensive, open review of Netscape Navigator > 2.0 and will help us to continue to create products of the highest > quality." Gee, don't worry, Homer. The POWER OF THE INTERNET will help you to create products of the highest quality. And the POWER OF THE INTERNET will encourage a real extensive open review. And watch for my new home page coming to a web site near you. The one titled, "I DEBUGGED NAVIGATOR AND ALL I GOT WAS A LOUSY SHIRT." But back to the question of what is a Security Bug?? Because I'm not sure if Marketing is going to agree (in its sole discretion) with what a security bug is (even if it has been hunted down). So at the risk of boring everyone to tears, I'll simply provide some external standards on the matter, just so I don't jeopardize my bounty or my shirt or my mug. Let's start with some Orange Book standards. The Orange Book, DEPARTMENT OF DEFENSE STANDARD, DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (DoD 5200.28-STD) which we're all intimately familiar with, since it of course sets the standard for everyone from the Small Business Administration to the National Science Foundation, (I think). Anyhow, it makes these points: DoD Directive 5200.28, "Security Requirements for Automatic Data Processing (ADP) Systems," stipulates: "Classified material contained in an ADP system shall be safeguarded by the continuous employment of protective features in the system's hardware and software design and configuration . . . ."[8, sec. IV] Furthermore, it is required that ADP systems that "process, store, or use classified data and produce classified information will, with reasonable dependability, prevent: a. Deliberate or inadvertent access to classified material by unauthorized persons, and b. Unauthorized manipulation of the computer and its associated peripheral devices."[8, sec. I B.3] The concern here is with the latter standard. The unauthorized manipulation of a computer and its associated peripheral devices. And this is where we jump onto the scent of the track of the Security Bug. And this is where we introduce a little old document called pushpull.html. from Netscape's Web site. It's titled: An Exploration of Dynamic Documents. > The Great Idea > > The general idea is that browsers have always been driven by user > input. You click on a link or an icon or an image and some data comes > to you. As soon as people saw they could do that, they wanted to give > a server the ability to push new data down to the browser. (An > obvious example is a stock trader who wants to see new quote data > every 5 minutes.) Up until now, that hasn't been possible. And I can think of many people who would _also_ like to push down data to a browser. But, that's not a great idea. Guess what?? It's not even a good idea. It might even be a bad idea. > Netscape Navigator 1.1 gives content creators and server > administrators two new open standards-based mechanisms for making this > work. The mechanisms are similar in nature and effect, but > complementary. They are: > > Server push -- the server sends down a chunk of data; the > browser display the data but leaves the connection open; whenever > the server wants it sends more data and the browser displays it, > leaving the connection open; at some later time the server sends > down yet more data and the browser displays it; etc. Yes, the client "processes data" and then possibly displays it, while in > Client pull -- the server sends down a chunk of data, > including a directive (in the HTTP response or the document > header) that says "reload this data in 5 seconds", or "go load > this other URL in 10 seconds". After the specified amount of > time has elapsed, the client does what it was told -- either > reloading the current data or getting new data. Hmm. Netscape's clients blindly trust and follows server's instructions and does what it is told to do. If it's told to load a particular document in five seconds. It does that. It dances to the server's instructions. Something which should cause any Security Administrator's hair to stand on end, as the server takes control of the client's machine and "manipulates it". > In server push, the magic is accomplished by using a variant of the > MIME message format "multipart/mixed", which lets a single message (or > HTTP response) contain many data items. In client pull, the magic is > accomplished by an HTTP response header (or equivalent HTML tag) that > tells the client what to do after some specified time delay. > > For server push we use a variant of "multipart/mixed" called > "multipart/x-mixed-replace". The "x-" indicates this type is > experimental. The "replace" indicates that each new data block will > cause the previous data block to be replaced -- that is, new data will > be displayed instead of (not in addition to) old data. > > So here's an example of "multipart/x-mixed-replace" in action: >>Content-type: multipart/x-mixed-replace; boundary=ThisRandomString >> >>--ThisRandomString >>Content-type: text/plain >> >>Data for the first object. >> >>--ThisRandomString >>Content-type: text/plain >> >>Data for the second and last object. >> >>--ThisRandomString-- > > The key to the use of this technique is that the server does not push > the whole "multipart/x-mixed-replace" message down all at once but > rather sends down each successive data block whenever it sees > fit. And this is the problem. We have a pipe. And we have a server making a decision when it will send the next data block. I guess the server could also decide dynamically what that data block is going to be once it has opened it's pipe to the client. That is way too much trust for a client to place in a server that it doesn't know if it can trust. > The HTTP connection stays open all the time, and the server > pushes down new data blocks as rapidly or as infrequently as it wants, > and in between data blocks the browser simply sits and waits for more > data in the current window. The user can even go off and do other > things in other windows; when the server has more data to send, it > just pushes another data block down the pipe, and the appropriate > window updates itself. Yep, the appropriate window just "updates" itself at the command of the server. A good faith update ... or let's call it a good faith process. > So here's exactly what happens: > > Following in the tradition of the standard "multipart/mixed", > "multipart/x-mixed-replace" messages are composed using a unique > boundary line that separates each data object. Each data object > has its own headers, allowing for an object-specific content type > and other information to be specified. Let's emphasize that what we have is a slave client at one end of a pipe accepting an object-specific content-type from any server. This is not within the tradition of multipart/mixed. And this is a problem. > The specific behavior of "multipart/x-mixed-replace" is that each > new data object replaces the previous data object. The browser > gets rid of the first data object and instead displays the second > data object. > > A "multipart/x-mixed-replace" message doesn't have to end! That > is, the server can just keep the connection open forever and send > down as many new data objects as it wants. The process will then > terminate if the user is no longer displaying that data stream in > a browser window or if the browser severs the connection > (e.g. the user presses the "Stop" button). We expect this will > be the typical way people will use server push. > > The previous document will be cleared and the browser will begin > displaying the next document when the "Content-type" header is > found, or at the end of the headers otherwise, for a new data block. > The current data block (document) is considered finished when the > next message boundary is found. > > Together, the above two items mean that the server should push > down the pipe: a set of headers (most likely including > "Content-type"), the data itself, and a separator (message > boundary). When the browser sees the separator, it knows to sit > still and wait indefinitely for the next data block to arrive. Now let's play with the prior example. Let's say that we utilized different types of objects. I'll use multipart/parallel and application/postscript. >>Content-type: multipart/x-mixed-replace; boundary=ThisRandomString >> >>--ThisRandomString >>Content-type: application/postscript >> >>Data for the first object >> >>--ThisRandomString >>Content-Type: multipart/parallel; boundary=ThisSecondRandomString >> >>--ThisSecondRandomString >>Content-Type: application/postscript >> >>Data for the second object >> >>--ThisSecondRandomString >>Content-type: application/postscript >> >>Deletefile >>Renamefile >>Filenameforall >>File >> >>--ThisSecondRandomString-- >> >>--ThisRandomString-- I think that the foregoing explains itself without me having to draw any more maps, than is absolutely necessary. The first data object sent is application/postscript. The second object is multipart/parallel. And it's where we conflict with federal requirements: > b. Unauthorized manipulation of the computer and its associated > peripheral devices."[8, sec. I B.3] And I think that this is applicable across the entire product line. I wonder if this makes me eligible for a bounty for each product where there is this Security Bug?? That would be very chivalrous of Netscape to offer me that. Then maybe I could get a real computer rather than this crufty old Mac Plus (a yellow one) and my 2400 baud modem... and then, I might just be able to do some virtually real hunting. Alice de 'nonymous ... (doing a bad impression of Elmer Fudd with thoughts of Bugs Bounty in his lil mind.) ...just another one of those... P.S. And yes I brought this whole issue (tangentially) to the attention of netscape.com yesterday afternoon. I think I asked whether they were going to have a formal specification and register their x-mixed-replace with IANA. They haven't gotten to my email yet, (I think). Or maybe, I'm in the Bulk response group. P.P.S. I give permission to have this propogate freely through the cyber-aethyr. All other rights are of course reserved. C. S. U. M. O. C. L. U. N. E. From tcmay at got.net Fri Oct 13 10:14:39 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 13 Oct 95 10:14:39 PDT Subject: what are these people selling???? Message-ID: At 7:22 AM 10/13/95, an116512 at anon.penet.fi wrote: >why is the cp meeting sponsored by sun? >so we can hear a sales pitch on java? Again, anonymity is used to cloak an ignorant flame. But I'll respond anyway. First, who cares who hosts the meeting? Does anyone think we are so "corruptable" as to change opinions based on who hosts a meeting? Second, we met for our first 15-18 months at the Mountain View offices of Cygnus Support. Did this taint us? Did we all become Gnu hackers? Then we met for about a year at the Mountain View offices of Silicon Graphics. Same question. Third, there is much interest in Java. Positive interest, and skeptical interest. Most meetings have a focus on some topic....this one happens to be a focus on Java. Fourth, Marianne Mueller is coordinating this meeting, and she happens to work for Sun. We should be glad we have a meeting site. (Meeting sites that can hold 25-40 people for an entire afternoon are not that easy to find. Pizza places typically don't get enthusiastic about all-day meetings. Homes are typically too small. And so it goes.) So, come out of your anonymity and stop the mindless insults. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From JonathanZ at consensus.com Fri Oct 13 10:19:01 1995 From: JonathanZ at consensus.com (Jonathan Zamick) Date: Fri, 13 Oct 95 10:19:01 PDT Subject: IDEA algorithm Message-ID: At 7:50 PM 10/12/95, Adam Shostack wrote: >| (Btw... what would be the absolute coolest thing folk would like to see >| added to RSAREF? That is, other than code that we will need to negotiate >| for. What new thing, speed upgrade, enhancement, etc would just tickle?) > > Consistant pricing. The knowledge that any app I develop >using RSAREF can be made into licensed for commercial use product for >a set, known, published fee. This would be the biggest win for >Consensus. To some degree that is already true. There is no upfront cost for the licensing, so it is straight royalty based. Right now its 5-4% declining with gross sales. > Another really big win would be to add more entry points to >the code to legitimize Wei Dai's excellent Crypto++ library, which has >to jump in at all sorts of unpublished interfaces. I'll look into this one. We have the ability to add more entry points. Thanks. That is exactly the kind of thing I was hoping to get. >Adam Jonathan ------------------------------------------------------------------------ ..Jonathan Zamick Consensus Development Corporation.. .. 1563 Solano Ave, #355.. .. Berkeley, CA 94707-2116.. .. o510/559-1500 f510/559-1505.. ..Mosaic/WWW Home Page: .. .. Consensus Home Page .. From froomkin at law.miami.edu Fri Oct 13 10:23:38 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Fri, 13 Oct 95 10:23:38 PDT Subject: Anguilla Cypherpunks Meeting In-Reply-To: Message-ID: On Fri, 13 Oct 1995 s1018954 at aix2.uottawa.ca wrote: > What if you were a dual citizen (US/Canada in my case)? > Get competent legal advice. I.e. don't ask me. As a general rule, I know of two principles that might be relevant here: 1) US and Canada rules on export control tend to be very similar; 2) lots of US rules apply to US persons abroad, not just income tax. See, e.g., the Trading With the Enemy Act. A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | New address, but it's still just as hot here. From froomkin at law.miami.edu Fri Oct 13 10:35:55 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Fri, 13 Oct 95 10:35:55 PDT Subject: Anguilla Cypherpunks Meeting In-Reply-To: Message-ID: On Fri, 13 Oct 1995, Vincent Cate wrote: For your personal situation you *must* get competent legal advice. I.E. pay someone who makes it a point to stay more current in this stuff than I do. I recommend Lee Tien, for example, or Ken Bass. I bet Lee is less expensive :>. This note is NOT legal advice, and may not be competent since it is research-free. It would not be wise to make any important decisions on the basis of this note. As a general matter, however, if you are a US person and give crypto to a foreign person (be it a real person or a corporation), then as a technical legal matter you are in violation of the ITAR. US law doesn't ordinarily cover non-us corporations abroad (but see some anti-trust and money laundering rules), but the ITAR will cover any US person (ie citizen or green card holder) who works for them or transacts with them. Off the top of my head, I don't know whether the acquisition of totally foreign-created crypto by a foreign corporation managed, owned or controlled by a US person becomes an ITAR-controlled "export" when that crypto is sold to a non-us person. I would, however, want a good legal opinion before I exposed myself to the risk as I could sure make a good argument that the ITAR reached that far. All of this is without prejudice to the issue of whether the ITAR are constitutional... As for the specific fact situation you describe below, which I understand to be a little different from the one described above, I'm afraid you would have to discuss this in some detail with a lawyer; I'm sorry I can't be more help. > > On Fri, 13 Oct 1995, Michael Froomkin wrote: > > On Thu, 12 Oct 1995, Vincent Cate wrote: > > > If while you are outside the USA you want to write some software that uses > > > encryption and sell it worldwide, let me know. I could put you up while > > > you wrote it and my company could sell it for share of the selling price. > > > Let me know what you are thinking of and how long you think it would take. > > > > Of course if you are a US person (citizen or green card holder) this is > > just as much a violation of the ITAR than if you did it from inside the US... > > Yes, I am still a US citizen, so far. > > The corporation I work for is a legal entity of Anguilla. I would not > personally be selling it, the corporation would. Do you think that is ok? > > What if I had a couple Anguillian friends form a corporation for this > purpose (buying encryption software written in Anguilla and selling it > internationally)? No trouble yet, right? What if the people who come and > write it are US citizens? > > I don't see how US law can cover corporations in other countries. > > PS - it is good to CC me (as you did) as I only get cypherpunks-lite, and > so may not see a message, or it may be delayed. > A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | New address, but it's still just as hot here. From tcmay at got.net Fri Oct 13 10:42:54 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 13 Oct 95 10:42:54 PDT Subject: Exporting Mental States Message-ID: At 2:30 PM 10/13/95, Michael Froomkin wrote: >On Thu, 12 Oct 1995, Vincent Cate wrote: >[..] > >> If while you are outside the USA you want to write some software that uses >> encryption and sell it worldwide, let me know. I could put you up while >> you wrote it and my company could sell it for share of the selling price. >> Let me know what you are thinking of and how long you think it would take. > >Of course if you are a US person (citizen or green card holder) this is >just as much a violation of the ITAR than if you did it from inside the US... And recalling Matt Blaze's hilarious tale of trying to get the right forms filled out and approved at an airport prior to departure for Europe, one has to wonder what confused looks would be gotten were someone to try to get a "Commodity Jurisdiction Request" (or whatever is needed) to export one's thoughts.... "Yes, I'm trying to find out what forms I need to fill out to export the cryptography knowledge that's now in my head." "Huh?" "Well, I understand that it's illegal for me to think crypto thoughts in Anguilla, where I'm going on vacation. So, to protect me in the event I talk in my sleep, and a foreign national hears me, I want to register with your office." "Huh?" --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From vznuri at netcom.com Fri Oct 13 11:42:51 1995 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Fri, 13 Oct 95 11:42:51 PDT Subject: proposal: "security spectrum scale" (SSS) Message-ID: <199510131841.LAA17086@netcom9.netcom.com> regarding the recent Markoff NYT article on NFS weaknesses, I agree it seemed to be overblown. but in fact I have been betting that feeling from *all* the recent articles on the netscape bugs etc (egad, am I mistaken, or whas there front page NYT coverage for a *buffer*overflow*? at least there was for a single *poorly generated random seed*!!). for example, in another, the fact that netscape had a buffer overflow in URLs was translated by a reporter into "a similar bug was used by Robert Morris in the infamous worm that infected the entire internet a few years ago" or something similar. it seems to me what is lacking in all this is a *security spectrum*. unfortunately security experts sometimes have a tendency to equate *any* security weakness with a catastrophic one. while this is a good approach in general, i.e. to be as conservative as possible, in practice there can be no doubt that some security weaknesses are far less severe than others. if the security *experts* conflate the issue of the *severity* of a security breach (and I see this happening all the time on this list), there is little surprise that reporters aren't figuring it out either. some of the really obvious example of the kinds of differences in security that are being conflated: client vs. server problems (server problems are far worse of course; the netscape bugs were mostly *client* problems), subnet vs. overall network problems, bugs that allow people to merely crash a system vs. submit arbitary code, etc. to aid this serious problem, I propose the creation of a UNIFIED SECURITY SPECTRUM RANKING. this would be a list of all the different types of security weaknesses a system can have, and their LEVEL OF SEVERITY. it would attempt to rank every type of security breach possible. then, when a new security weakness is discovered, it could be ranked A1 or B5 or C6 or whatever. this would be a sort of technological "richter scale" that would allow the novice to immediately understand that a given bug that was recently discovered (say, the recent netscape bugs) was, say, not really as potentially severe as the Morris worm. a press article might say something like, "the recent netscape bug was ranked a B5 on the security scale by experts. this means that an unauthorized intruder could break client software. the bug could potentially be as serious as A3, meaning that arbitrary code could be submitted. the other bug was classed B3, because it allows the detector to grab unauthorized data, but still be detected in doing so." etc!! I think it is pretty obvious how much of a positive effect this could have in quantifying and tracking and publicizing new bugs. it might make it impossible for a reporter to give an improperly alarmist position. for example, no one would take seriously an article that gets excited about a 3.6 richter scale earthquake. similarly, the reader might be able to draw his own conclusions if we came up with a sufficiently universal scale and it is widely used in articles. furthermore, this scale would tend to help the reporter/editor immediately know if a given bug report is newsworthy (if they continue to enthusiastically report bugs, although I wonder if this is a fad that may die out). and ultimately it might really help the issue of "proper attention to bugs". the public is getting a scare story for almost every new bug, and this is just not appropriate. to use my tired analogy, it is like the media putting every dinky earthquake item on page 1. another idea behind the rating: it might be a sort of matrix format, such as "a-6-alpha" where each of the elements indicates some kind of independent factor. for example the "a" might mean "client side", the "6" might mean "crash only", the "alpha" might mean "breach cannot be detected after the fact". however it shouldn't be so complicated that the novice can't immediately determine which of two rankings is more severe. now, I am really rather surprised that no such scale appears to exist currently. I highly suspect the NSA probably has a system for this but unfortunately it is not being used by CERT or anyone else that I know of. if anyone does know of this kind of "security spectrum", I think our cause of trying to improve software security would be furthered immensely if whenever reporters call about bugs, the scale factor could be consistently and uniformly used in association with trying to describe the severity of the bug. I am willing to work on a beta version of this "security spectrum" if there is sufficient interest. it certainly seems like a far better and worthwhile investment of time than, say, "the geek code", the latter of which is already highly developed!! I don't really consider myself the best qualified in terms of experience but sometimes if you want something done, you have to do it yourself. however, if we do this, I hope that a good scale that is pretty general and doesn't need extensions can be done from the start, before its widespread usage, so that later changes do not confuse users. there is already confusion in the media about two slightly different richter scales, this is a pity. another neat perq: if the cypherpunks come up with a good scale, it could be a tremendous positive publicity tool. "today experts discovered a bug in -x- that rated a -y- on the CSSS (Cypherpunk Security Spectrum Scale)" generally, regarding cypherpunk priorities, I think the "media can be made our friend", but we just have to learn how to be more meticulous and careful in our interactions with them. in general I don't really think a lot of the misreporting going on is the fault of the reporters involved. it's not surprising they get their stories mixed up, when, IMHO, even the "experts" they quote aren't particularly polished and don't really have their act fully together (or at least, tend to misrepresent the problems from the beginning). (most of the last Markoff article imho can just be chalked up to, "two prestigious graduate students who discovered something significant recently wrote a message warning about another significant security problem." it shows how absolutely critical it is to be careful what you say once you have built up a bit of a reputation. these two grad students are now being watched as the Chicken Little's of Cyberspace by the media, unfairly or not. be careful about wishing about fame, or anything else!! you might get it!! makes me a bit nervous about causes *I* have promoted in the distant past.) --Vlad Nuri From ldetweil at csn.net Fri Oct 13 12:05:36 1995 From: ldetweil at csn.net (L.Detweiler) Date: Fri, 13 Oct 95 12:05:36 PDT Subject: CYPHERPUNKS EXPOSED Message-ID: <199510131905.NAA00772@teal.csn.net> Attn Reporters and Writers!! who are the CYPHERPUNKS? what are they talking about? what have they done in the past? who are the "leaders"? what do they believe in? what are their *real* goals? My name is L.Detweiler, and I've made a serious study of the more ulterior aspects of the CYPHERPUNKS for several years, and I invite you to peruse my findings at the web site below. I've been quoted in various articles and I'm available for serious interviews with anyone who wants the REAL STORY BEHIND THE CYPHERPUNKS. note: be forewarned that key cypherpunks consider me a heretical blasphemer because of the tenacious, unforgiving honesty and zealous antisychophancy by which I have pursued this herculean study. | /\ |\| /~ L~ ``I have to spew this stuff, or I'd be on the L_ /~~\ | | \_ L_ roof with a high power weapon.'' -Jim Carrey http://www.csn.net/~ldetweil From zoetrope at infinet.com Fri Oct 13 12:42:43 1995 From: zoetrope at infinet.com (zoetrope at infinet.com) Date: Fri, 13 Oct 95 12:42:43 PDT Subject: Netscape question transformed Message-ID: I would like to rephrase the question I had yesterday was completely misunderstood. The point I was meaning to make was soppuse to be as follows: Why would a compony like Netscape jeapordise themselves by even letting out a beta version so hackers have time to find bugs before the full version is released. Don't take me wrong I have only been on the net fer a little over a year and Love Netscape. And If I knew what I was Doing I would love to help them..... Anyway I don't mean to waste your time, but arent these kinda things for stating your opinion? And to clarify any questions on my age I am 13 and was born in 1982.ok? thanks.....And I would again like to thank perry for understanding what level Im on. I will try my best not to annoy you or cause you any inconvenience. And to sameer I am sorry for what I said but you have to understyand Why I said it...... Sincerely, CyberPunc X From ses at tipper.oit.unc.edu Fri Oct 13 12:50:45 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Fri, 13 Oct 95 12:50:45 PDT Subject: Same ol' massive MITM exposure in Netscape 2.01b Message-ID: Just to repeat old news: Netscape 2 has similar exposure to MITM attacks to 1.1. Netscape 2 does make one variant of the MITM attack less useful: The new document info page allows information to be obtained about inlined images as well as the base page; this breaks the old attack of only intercepting inline image requests (which can be used to steal information in request headers without there being any chance of your certificate showing up). 1) The client does not do any verification that the certificate used for the transaction is one associated with the server, allowing MITM substitutions as long as the server has a properly signed certificate 2) The client does not issue warnings for redirections from one https page to another https page, even if the url to which it is redirected has a different hostname to the url originally dereferenced. 3) In the case of redirection, the document info screen does not provide information about the originaly referenced page, just the final page. This allows the MITM to intercept the first request, steal the request data, then issue a redirect to hide the certificate used in the intercept. 4) In the beta version, the document info page does not display the security info (I did check with MITM disabled). Simon ----- (defun modexpt (x y n) "computes (x^y) mod n" (cond ((= y 0) 1) ((= y 1) (mod x n)) ((evenp y) (mod (expt (modexpt x (/ y 2) n) 2) n)) (t (mod (* x (modexpt x (1- y) n)) n)))) From bshantz at nwlink.com Fri Oct 13 13:33:36 1995 From: bshantz at nwlink.com (Brad Shantz) Date: Fri, 13 Oct 95 13:33:36 PDT Subject: Exporting Mental States Message-ID: <9510132031.AA10823@toad.com> I just arrived in Ottawa, Canada from Seattle, USA. I had sort of thought through exactly what Tim just described. I had a little notebook with me and was doing some calculations and design of a fractal compression algorithm. I started to think about El-Gamal and decided to look at elliptical curve algorithms. So, I pulled out my copy of Applied Crypto to look up some things and started writing things down. (BTW: I had Applied Crypto with me for recreational reading on the plane, I don't normally carry it everywhere I go.) Anyway, i got to customs in Ottawa, and they asked me if I had anything to declare. I immediately thought, "Should I tell them about the notebook?" I decided against it. How does export of intellectual property work? The other question they asked me was "Do you have any eggs?" I started giggling. **SARCASM ON** I always carry an egg around in my inside coat pocket. Who knows when you might need one, especially when in a foreign country. **SARCASM OFF** I don't know, I guess the question just struck me as funny. Brad Shantz TRISource (formerly TriLogic) Windows Development Services From hwertz at exclusive.com Fri Oct 13 13:34:17 1995 From: hwertz at exclusive.com (Henry Wertz) Date: Fri, 13 Oct 95 13:34:17 PDT Subject: 90% In-Reply-To: Message-ID: On Thu, 12 Oct 1995 infinet.com!zoetrope at henry.henry.net wrote: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Ouch! I know, I need to fix it.. but sendmail.cf beating is not much fun 8-(. > Can I ask a question....are you guys into cryptology for the interesting > facts and knowledge or fer cracking unix codes and raising havoc? > > > > Just for "cracking unix codes" crack is fine with me 8-). I'm just in it for the knowledge.. From warlord at ATHENA.MIT.EDU Fri Oct 13 13:39:59 1995 From: warlord at ATHENA.MIT.EDU (Derek Atkins) Date: Fri, 13 Oct 95 13:39:59 PDT Subject: Netscape question transformed In-Reply-To: Message-ID: <199510132039.QAA01087@charon.MIT.EDU> > Why would a compony like Netscape jeapordise themselves by > even letting out a beta version so hackers have time to find bugs > before the full version is released. Don't take me wrong I have only > been on the net fer a little over a year and Love Netscape. And If I > knew what I was Doing I would love to help them..... I don't think that this can jeopardize a company... What would you rather see? A company makes a beta release for people to attempt to break, fixes the bugs, and then releases a better product? Or would you rather see a company release a product, tell people it is secure, and then get bitten by numerous holes in it? >From a PR perspective, it sounds much better to take the first tact. Similarly, you will get a better product using the first method. Using the second method, NOT beta-testing your product, has a greater chance of jeopardizing a company. At least if they put out a beta, if the press calls, they can say "this is nor our final product -- we wanted to let people give it a try and find problems, so that we can fix them before we start shipping". -derek PS: I remember what it was like being 13 -- I remember feeling like I knew more than everyone around me, my parents, my friends, my teachers. The only suggestion I have for you is to realize that no matter how much you know, or how much you think you know, there is always someone else who knows more than you do. Wisdom is learning to figure out who that person is and listen to what they have to say. Good Luck! From shamrock at netcom.com Fri Oct 13 14:07:46 1995 From: shamrock at netcom.com (Lucky Green) Date: Fri, 13 Oct 95 14:07:46 PDT Subject: what are these people selling???? Message-ID: <199510132105.RAA06805@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <9510130722.AA03096 at anon.penet.fi>, an116512 at anon.penet.fi wrote: > why is the cp meeting sponsored by sun? > so we can hear a sales pitch on java? Where are clueless idiots that post messages such as the one quoted above comming from? - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMH7UnyoZzwIn1bdtAQGPDAF+IRhbPNJK0fo6PXTrKliTU7ITwkzPOD5L agjzNaBIDukCFmtfz1ZZNyHCC8OTeq5r =B+J8 -----END PGP SIGNATURE----- From jya at pipeline.com Fri Oct 13 14:16:59 1995 From: jya at pipeline.com (John Young) Date: Fri, 13 Oct 95 14:16:59 PDT Subject: CAT_sho Message-ID: <199510132116.RAA26244@pipe1.nyc.pipeline.com> The Econom of Oct 14 ogles the catfight between Wintel and JavaNet to outclaw whineflesh. "Will your next computer be a tin can and a wire?" This week's fall in technology stocks was bad enough. But what if the Internet destroyed the personal-computer industry ...? Sun, Oracle and Netscape are spending tens of millions of dollars on a bet that the Internet can do a lot more than pass around e-mail and transmit data. They think it can also do much of the work of today's computers, holding not just information but software, from word processors and spreadsheets to games and entertainment programs. Most radically, they go on to argue that this could end the reign of the personal computer. Forget Windows 95; some people are starting to wonder if they need Microsoft at all. But those who predict that such machines will kill the PC are ignoring computing history, and glitch-prone real life. The PC beat the mainframe because users wanted the whole computer on their desktop, not in the basement. That makes Java terminals look like a step backwards: by putting program storage far away down a shared network, it makes it vulnerable to delays, congestion, and all the unpredictability of anything out of a user's control. CAT_sho (10 kb) From zoetrope at infinet.com Fri Oct 13 14:38:46 1995 From: zoetrope at infinet.com (cYberpUnc) Date: Fri, 13 Oct 95 14:38:46 PDT Subject: thanx Message-ID: Thanks to everyone especially Bill Sommerfeild and Derek Atkins fer helping me out....... From sjb at universe.digex.net Fri Oct 13 14:44:08 1995 From: sjb at universe.digex.net (Scott Brickner) Date: Fri, 13 Oct 95 14:44:08 PDT Subject: Anguilla Cypherpunks Meeting In-Reply-To: Message-ID: <199510132142.RAA18581@universe.digex.net> Vincent Cate writes: >On Fri, 13 Oct 1995, Michael Froomkin wrote: >> On Thu, 12 Oct 1995, Vincent Cate wrote: >> > If while you are outside the USA you want to write some software that uses >> > encryption and sell it worldwide, let me know. I could put you up while >> > you wrote it and my company could sell it for share of the selling price. >> > Let me know what you are thinking of and how long you think it would take. >> >> Of course if you are a US person (citizen or green card holder) this is >> just as much a violation of the ITAR than if you did it from inside the US.. >. >> >> A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) >> Associate Professor of Law | > >Yes, I am still a US citizen, so far. > >The corporation I work for is a legal entity of Anguilla. I would not >personally be selling it, the corporation would. Do you think that is ok? The violation is in the *export*, not the sale. You're suggestion is that the US person developing software outside the country evades ITAR. Mr Froomkin suggests otherwise. His credentials seem sounder, but I, for one, would like to hear his reasoning. If it's true that ITAR makes such behavior illegal, then ITAR not only inhibits freedom of speech, it inhibits freedom of *thought*. From frogfarm at yakko.cs.wmich.edu Fri Oct 13 14:53:41 1995 From: frogfarm at yakko.cs.wmich.edu (Damaged Justice) Date: Fri, 13 Oct 95 14:53:41 PDT Subject: Cypherpunks "Exposed" Message-ID: <199510132153.RAA16456@yakko.cs.wmich.edu> >X-Authentication-Warning: teal.csn.net: Host localhost didn't use HELO protocol ?que? >Attn Reporters and Writers!! > >who are the CYPHERPUNKS? First, most of those on this list, rather easily discernible since most of them make no attempt to conceal their views. Second, anyone who agrees substantially that the universal deployment of strong cryptology tools will increase individual freedom, and that this is desirable. >what are they talking about? Since you're subscribed to this list, you can easily find out. >what have they done in the past? See a few web pages or FTP archives. "L. Detweiler's" page has plenty of links to other places, although there are a few things I'd like him to clarify (see below). >who are the "leaders"? Tim May says there are none. LD repeatedly contends that May, and anyone else who agrees with his statement, are either ignorant or deliberately lying. (By virtue of this post, I'm sure I'm now on this list.) Neal Stephenson's *The Diamond Age* description of "CryptNet" is remarkably similar to this whole situation. I wonder if Neal used any aspects of the LD "phenomenon" as a template. (Aside: If you haven't yet read Diamond Age, do so immediately. My highest possible rating.) >what do they believe in? See above. But individuals always differ. >what are their *real* goals? Why don't you join the guild, get your barcode tattoo and find out? >My name is L.Detweiler, and I've made a serious study of the more ulterior >aspects of the CYPHERPUNKS for several years, Ulterior? I'd say it's right out in the open. The statists want the state to have power over the individual. Most people on this list believe this would be bad. Both are pretty well "represented" by a number of outspoken, public individuals. It's reassuring to see the number of computer industry pros and average folks alike who don't buy into the claim that freedom can be preserved by outlawing it... or the equally likely claim that freedom itself is bad, and people who advocate it are evil, right up there with violent criminals (but see how many people who make these statements also advocate "might makes right" rule of force by the creation and enforcement of coercive laws, and the mass robbery of as many people as possible?). Best that these people be as open and outspoken as those they disagree with, the better to know their methods and goals. >and I invite you to peruse my findings at the web site below. I have, and I quote therefrom further below. >I've been quoted in various articles and I'm available for serious interviews >with anyone who wants the REAL STORY BEHIND THE CYPHERPUNKS. Now that's blatant advertising. Where were you when all these so-called "journalists" descended on the net, desperately searching for people who would tell them the Internet was a festering pool of child molesting, money laundering slime? Will we soon see you defending organizations like FinCEN? >note: be forewarned that key cypherpunks consider me a heretical >blasphemer because of the tenacious, unforgiving honesty and >zealous antisychophancy by which I have pursued this herculean study. Perhaps if you were less pompous and self-aggrandizing in your presentation, people would be more willing to seriously entertain your ideas. Anyway, for those who wish to browse http://www.csn.net/~ldetweil go ahead, and make up your own mind. Your page doesn't have a mailto: button, Lance. But I figured this was perfectly appropriate for public consumption anyway: >Other Sites > Psychopunkery [...] > + Raph Levien's remailer page - amazing how long it took to get > this simple and basic utility from the cypherpunk crowd -- > and surprise! written by an outsider The rest I'll let pass, but why is Raph an "outsider"? And what is "inside"? Does agreeing with the above statements I've generalized make one "inside"? -- http://yakko.cs.wmich.edu/~frogfarm ...for the best in unapproved information To be a skeptic is to refuse to be a victim. "This is my .sig. There are many like it, but this one is mine." Freedom...yeah, right. From zoetrope at infinet.com Fri Oct 13 14:54:51 1995 From: zoetrope at infinet.com (cYberpUnc) Date: Fri, 13 Oct 95 14:54:51 PDT Subject: applications Message-ID: I know this isnt what you guys generally talk about but I was curious. Off the top of your head do you know of any sites where I can get kracking apps for macs? Any information would be greatly appreciated. From cman at communities.com Fri Oct 13 14:55:40 1995 From: cman at communities.com (Douglas Barnes) Date: Fri, 13 Oct 95 14:55:40 PDT Subject: what are these people selling???? Message-ID: >why is the cp meeting sponsored by sun? >so we can hear a sales pitch on java? Actually, the idea for the meeting came out of a discussion at a party that Marianne and I attended last summer. Chip Morningstar (one of the co-founders of Electric Communities) and I were getting heavily into Java; also, my wife and I were starting to write a crypto package for Java (JCrypt). Subsequently, at a focus group meeting at Sun, we discovered that practically all of us were on cypherpunks. It's just a happy accident that discussion about Java has hit a crescendo here on the list. I suggested to mrm that we have it at Sun, since the warehouse loft space in SF where we've been meeting, charming as it is, isn't a great spot for doing presentations and would likely have capacity problems for this topic. So no, this is not some great conspiracy on Sun's part to co-opt the list. You can return to your regularly scheduled paranoid fantasies. Thank you.... From eli at UX3.SP.CS.CMU.EDU Fri Oct 13 15:08:15 1995 From: eli at UX3.SP.CS.CMU.EDU (Eli Brandt) Date: Fri, 13 Oct 95 15:08:15 PDT Subject: NYT on Internet Flaws In-Reply-To: <199510121638.MAA20833@jekyll.piermont.com> Message-ID: <9510132208.AA13555@toad.com> Perry said: > I am frequently informed before people redistribute, but not always, > I'm afraid. After somebody started advertising a car repair place through my remailer, I found that most people don't seem to read the headers, or their MUA hides that icky stuff from them. I'd guess that reporters will frequently fall into this group. You might have better luck if you moved the notice back to your sig. -- Eli Brandt eli+ at cs.cmu.edu From robl at on-ramp.ior.com Fri Oct 13 15:21:47 1995 From: robl at on-ramp.ior.com (Rob L) Date: Fri, 13 Oct 95 15:21:47 PDT Subject: Netscape question transformed In-Reply-To: Message-ID: > Why would a compony like Netscape jeapordise themselves by even > letting out a beta version so > hackers have time to find bugs before the full version is released. Don't > take me wrong I have only been on the net fer a little over a year and Love > Netscape. And If I knew what I was Doing I would love to help them..... Actually, it is not jeapordy that they get from doing so, but some of the best bug finders and security experts on the planet.. for close to free. If hackers can find 10 bugs before final release, it means there is a good chance that they will fix those bugs before final release. Think of it this way.. you practice a new task until you are competent at it.. beta code is the same.. it is the practice or scratch code that may be refined into the final product. Thanks- robL From cme at TIS.COM Fri Oct 13 15:26:39 1995 From: cme at TIS.COM (Carl Ellison) Date: Fri, 13 Oct 95 15:26:39 PDT Subject: early anonymous remailer Message-ID: <9510132205.AA00756@tis.com> I was talking with someone at NSA's NISSC today and he was talking about Hamilton's support of the gov't in the Whiskey Rebellion. To voice his support (an unpopular position at the time) he wrote an article under a pseudonym, had it published in a French paper and then re-published over here, citing the French paper. This is the earliest example of an anonymous remailer I've found yet. :-) +--------------------------------------------------------------------------+ |Carl M. Ellison cme at acm.org http://www.clark.net/pub/cme | |PGP: E0414C79B5AF36750217BC1A57386478 & 61E2DE7FCB9D7984E9C8048BA63221A2 | | ``Officer, officer, arrest that man! He's whistling a dirty song.'' | +---------------------------------------------- Jean Ellison (aka Mother) -+ From tedwards at access.digex.net Fri Oct 13 15:26:57 1995 From: tedwards at access.digex.net (Tom Edwards) Date: Fri, 13 Oct 95 15:26:57 PDT Subject: New PA law (????) Message-ID: [Can anyone provide more information on this? I am still looking for the original source to confirm/deny this. Please pay special attention to anti-anon-mailer deals] ---------- Forwarded message ---------- This law was just passed and signed by the governor in PA. If you look at it, you'll notice that it makes it illegal to post instructions for making certain things (like phreaking boxes) and it also makes it illegal to use an anonymous remailer (conceal or assist another to conceal from any service provider). Amending Title 18 (Crimes and Offenses) of the Pennsylvania Consolidated Statutes, further providing for manufacture, distribution or possession of devices for theft of telecommunications services. The General Assembly of the Commonwealth of Pennsylvania hereby enacts as follows: Section 1. Sections 910 and 3926 of Title 18 of the Pennsylvania Consolidated Statutes are amended to read: � 910. Manufacture, distribution or possession of devices for theft of telecommunications services. (a) Offense defined.Any person commits an offense if he: (1) [makes or possesses any instrument, apparatus, equipment or] makes, distributes, possesses, uses or assembles an unlawful telecommunication device or modifies, alters, programs or reprograms a telecommunication device designed, adapted or which can be used: (i) for commission of a theft of [telecommunications]telecommunication service or to acquire or facilitate the acquisition of telecommunication service without the consent of the telecommunication service provider; or (ii) to conceal or to assist another to conceal from any [supplier of telecommunications] telecommunicationservice provider or from any lawful authority the existence or place of origin or of destination of any telecommunication; or (2) sells, possesses, distributes, gives or otherwise transfers to another[,] or offers, promotes or advertises for sale [any instrument, apparatus, equipment or device described in paragraph (1) of this subsection,] any: (i) unlawful telecommunication device, or plans or instructions for making or assembling the same, under circumstances evidencing an intent to use or employ such [instrument, apparatus, equipment or] unlawful telecommunication device, or to allow the same to be used or employed for a purpose described in paragraph (1) [of this subsection], or knowing or having reason to believe that the same is intended to be so used, or that the aforesaid plans or instructions are intended to be used for making or assembling such [instrument, apparatus, equipment or device.] unlawful telecommunication device; or (ii) material, including hardware, cables, tools, data, computer software or other information or equipment, knowing that the purchaser or a third person intends to use the material in the manufacture of an unlawful telecommunication device. (b) Grading.An offense under this section is a [misdemeanor of the first] felony of the third degree if the person convicted of such offense has been previously convicted of any similar crime in this or any other state or Federal jurisdiction. Otherwise it is a misdemeanor of the [second] first degree. (c) Restitution.The court may, in addition to any other sentence authorized by law, sentence a person convicted of violating this section to make restitution under section 1106 (relating to restitution for injuries to person or property) or 42 Pa.C.S. � 9721(c) (relating to sentencing generally). (d) Civil action.A telecommunication service provider aggrieved by a violation of this section may, in a civil action in any court of competent jurisdiction, obtain appropriate relief, including preliminary and other equitable or declaratory relief, compensatory and punitive damages, reasonable investigation expenses, costs of suit and attorney fees. (e) Definitions.As used in this section, the following words and phrases shall have the meanings given to them in this subsection: "Manufacture of an unlawful telecommunication device." To produce or assemble an unlawful telecommunication device or to modify, alter, program or reprogram a telecommunication device to be capable of acquiring or facilitating the acquisition of telecommunication service without the consent of the telecommunication service provider. "Telecommunication device." Any type of instrument, device, machine or equipment which is capable of transmitting or receiving telephonic, electronic or radio communications, or any part of such instrument, device, machine or equipment, or any computer circuit, computer chip, electronic mechanism or other component which is capable of facilitating the transmission or reception of telephonic, electronic or radio communications. "Telecommunication service." The meaning given to it in section 3926 (relating to theft of services). "Telecommunication service provider." The meanings given to it in section 3926 (relating to theft of service). "Unlawful telecommunication device." The meaning given to it in section 3926 (relating to theft of service). � 3926. Theft of services. (a) Acquisition of services. (1) A person is guilty of theft if he intentionally obtains services for himself or for another which he knows are available only for compensation, by deception or threat, by altering or tampering with the public utility meter or measuring device by which such services are delivered or by causing or permitting such altering or tampering, by making or maintaining any unauthorized connection, whether physically, electrically or inductively, to a distribution or transmission line, by attaching or maintaining the attachment of any unauthorized device to any cable, wire or other component of an electric, telephone or cable television system or to a television receiving set connected to a cable television system, by making or maintaining any unauthorized modification or alteration to any device installed by a cable television system, or by false token or other trick or artifice to avoid payment for the service. (1.1) A person is guilty of theft if he intentionally obtains or attempts to obtain telecommunication service by the use of an unlawful telecommunication device or without the consent of the telecommunication service provider. [(2) As used in this section, the word "service" includes, but is not limited to, labor, professional service, transportation service, the supplying of hotel accommodations, restaurant services, entertainment, cable television service, the supplying of equipment for use, and the supplying of commodities of a public utility nature such as gas, electricity, steam and water, and telephone service. The term "unauthorized" means that payment of full compensation for service has been avoided, or has been sought to be avoided, without the consent of the supplier of the service.] (3) A person is not guilty of theft of cable television service under this section who subscribes to and receives service through an authorized connection of a From owner-cypherpunks Fri Oct 13 15:22:25 1995 Return-Path: Received: by toad.com id AA13987; Fri, 13 Oct 95 15:22:25 PDT Received: from ix9.ix.netcom.com by toad.com id AA13971; Fri, 13 Oct 95 15:22:11 PDT Received: from ix-pl4-18.ix.netcom.com by ix9.ix.netcom.com (8.6.12/SMI-4.1/Netcom) id PAA06683; Fri, 13 Oct 1995 15:21:53 -0700 Message-Id: <199510132221.PAA06683 at ix9.ix.netcom.com> X-Sender: stewarts at popd.ix.netcom.com X-Mailer: Windows Eudora Light Version 1.5.2 Mime-Version: 1.0 Content-Type: text/plain; charset.s-ascii" Date: Fri, 13 Oct 1995 15:21:00 -0700 To: zoetrope at infinet.com (cYberpUnc) From: Bill Stewart Subject: Re: applications Cc: cypherpunks at toad.com Sender: owner-cypherpunks at toad.com Precedence: bulk At 05:50 PM 10/13/95 -0400, you wrote: > I know this isnt what you guys generally talk about but I was curious. >Off the top of your head do you know of any sites where I can get kracking >apps for macs? Any information would be greatly appreciated. There are several fine tool companies on the Web who can sell you large hammers. Check with Yahoo for locations. #--- # Thanks; Bill # Bill Stewart, Freelance Information Architect, stewarts at ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #--- the same person or several persons, may be aggregated in determining the grade of the offense. (d) Inferences. (1) Any person having possession of or access to the location of a public utility meter or service measuring device which has been avoided or tampered with so as to inhibit or prevent the accurate measurement of utility service and who enjoys the use of or receives the benefit from the public utility service intended to be metered or measured by the public utility meter or measuring device so avoided or tampered with may be reasonably inferred to have acted to avoid or tamper with the public utility meter or measuring device with the intent to obtain the public utility service without making full compensation therefor. (2) Any person having possession of or access to the location of the distribution or transmission lines or other facilities of a cable television system which have been tapped, altered or tampered with or to which any unauthorized connection has been made or to which any unauthorized device has been attached or any person having possession of or access to any device installed by a cable television system to which an unauthorized modification or alteration has been made, the result of which tapping, altering, tampering, connection, attachment or modification is to avoid payment for all or any part of the cable television service for which payment is normally required, and who enjoys the use of or receives the benefit from the cable television service, may be reasonably inferred to have acted to have tapped, altered, tampered with, connected or attached to or modified cable television facilities with the intent to obtain cable television service without making full compensation therefor. This inference shall not apply to the act of a subscriber to cable television service, who receives service through an authorized connection of a television receiving set at his dwelling, in making, within his dwelling, an unauthorized connection of an additional television receiving set or sets or audio system which receives only basic cable television service obtained through such authorized connection. (e) Sale or transfer of device or plan intended for acquisition or diversion.A person is guilty of a misdemeanor of the third degree if he sells, gives or otherwise transfers to others or offers, advertises or exposes for sale to others, any device, kit, plan or other instructional procedure for the making of such device or a printed circuit, under circumstances indicating his having knowledge or reason to believe that such device, kit, plan or instructional procedure is intended for use by such others for the acquisition or diversion of services as set forth in subsections (a) and (b). (f) Restitution.The court may, in addition to any other sentence authorized by law, sentence a person convicted of violating this section to make restitution under section 1106 (relating to restitution for injuries to person or property) or 42 Pa.C.S. � 9721(c) (relating to sentencing generally). (g) Civil action.A telecommunication service provider aggrieved by a violation of this section may, in a civil action in any court of competent jurisdiction, obtain appropriate relief, including preliminary and other equitable or declaratory relief, compensatory and punitive damages, reasonable investigation expenses, costs of suit and attorney fees. (h) Definitions.As used in this section, the following words and phrases shall have the meanings given to them in this subsection: "Service." Includes, but is not limited to, labor, professional service, transportation service, the supplying of hotel accommodations, restaurant services, entertainment, cable television service, the supplying of equipment for use, and the supplying of commodities of a public utility nature such as gas, electricity, steam and water, and telephone or telecommunication service. The term "unauthorized" means that payment of full compensation for service has been avoided, or has been sought to be avoided, without the consent of the supplier of the service. "Telephone service" or "telecommunication service." Includes, but is not limited to, any service provided for a charge or compensation to facilitate the origination, transmission, emission or reception of signs, signals, data, writings, images and sounds or intelligence of any nature by telephone, including cellular telephones, wire, radio, electromagnetic, photoelectronic or photooptical system. "Telecommunication service provider." A person or entity providing telecommunication service, including, but not limited to, a cellular, paging or other wireless communications company or other person or entity which, for a fee, supplies the facility, cell site, mobile telephone switching office or other equipment or telecommunication service. "Unlawful telecommunication device." Any electronic serial number, mobile identification number, personal identification number or any telecommunication device that is capable, or has been altered, modified, programmed or reprogrammed alone or in conjunction with another access device or other equipment so as to be capable, of acquiring or facilitating the acquisition of a telecommunication service without the consent of the telecommunication service provider. The term includes, but is not limited to, phones altered to obtain service without the consent of the telecommunication service provider, tumbler phones, counterfeit or clone phones, tumbler microchips, counterfeit or clone microchips, scanning receivers of wireless telecommunication service of a telecommunication service provider and other instruments capable of disguising their identity or location or of gaining access to a communications system operated by a telecommunication service provider. Section 2. This act shall take effect in 60 days. From anonymous-remailer at shell.portal.com Fri Oct 13 15:28:15 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Fri, 13 Oct 95 15:28:15 PDT Subject: mental cryptography Message-ID: <199510132226.PAA13627@jobe.shell.portal.com> -----BEGIN PGP SIGNED MESSAGE----- As we know, security is always relative to a threat model. For example, most cryptographic protocols today will not protect their users against the cloning attack I described earlier, nor more mundanely, against video surveilence of your computing space. What can you do if you ARE worried about such attacks? The answer is doing cryptography in your head. Well not quite, since many cryptographic operations are very computing intensive, and not everyone can do 1000 bit mental modular exponention in a reasonable amount of time. But if you have a piece of secure hardware that you can trust to do some of these operations for you, then all you need is a secure communications channel to this piece of hardware. There may be other ways, but I suggest that you establish a common key with your crypto server ahead of time, and then simply encrypt all your communications using a symmetric algorithm. RC4 may be a reasonable choice, since the operations are simple and easy to remember, but you need to keep track of a 255-byte state. WAKE is probably better. Although it uses a large key table, you only have to memorize it once, after which the only state that is changing is four 32-bit registers. I am sure better algorithms can be found for this purpose if mental cryptography is made explicit as a design goal. Perhaps it should be? - the Mad Scientist in the Middle -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMH7l+9IjPOsOWLIJAQEwDwP7BB6ZlEoYVoOFYtzNDcF4XpCKs71GyASC TiwCf+donWycN9SiJHApyXXbnuppGiEyAQYMBGkSLMyIwPMcE4v6CSt2DkpbPjkF XauZy4rqDNljV2pk7PldbPOHDow9wOeoSF2S/luKAoHx5aJWVQrE5SKIgwY2xWfx DYhjte2v9Jc= =88be -----END PGP SIGNATURE----- From s1018954 at aix2.uottawa.ca Fri Oct 13 15:40:31 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Fri, 13 Oct 95 15:40:31 PDT Subject: Exporting Mental States In-Reply-To: <9510132031.AA10823@toad.com> Message-ID: On Fri, 13 Oct 1995, Brad Shantz wrote: > I just arrived in Ottawa, Canada from Seattle, USA. I had sort of Wellcome to Ottawa. > Anyway, i got to customs in Ottawa, and they asked me if I had > anything to declare. I immediately thought, "Should I tell them > about the notebook?" I decided against it. How does export of > intellectual property work? Don't worry about it, Canada's not even a foreign country according to ITAR. If you have pgp on that machine, you haven't exported it, but it's still covered by export controls. We pretty much have exactly the same export restrictions on US origin software, but if it comes from anywhere else (including Canada of course) it can be exported without a permit to all but four countries (iran, cuba and two others) and cannot be exported at all to UN embargoed countries (bosnia, iraq, angola...). Since none of these have good net access, it's not much of a prob. The issue of whether ftp is an export hadn't resolved when I asked, and there might be a headache regarding US intellectual property and that US origin problem. So basically you can't export pgp, nautilus, rsaref..., but if they were rewritten from the ground up in Canada and put on the net, you *might* be ok. (that ignores the last issue, so ask Foreign Affairs and maybe a lawyer first, though I really can't see how a public domain idea can have a nationality) ElGamal and IDEA would be completely without problems as they are not even American intellectual property. Of course, I'm not a lawyer, and the gov has no obligation to agree with the advice of its own employees. If you're interested I could mail you the address and phone no. of the export controls division of external affairs. The policy officer was rather helpful. They also have a big booklet on export controls. If you plan on going over, might as well ask about the American citizenship problem that's come up in the Anguila thread. Sounds very funny. (of course that would say nothing about the US State Dept's opinion on it) From tedwards at access.digex.net Fri Oct 13 15:42:48 1995 From: tedwards at access.digex.net (Tom Edwards) Date: Fri, 13 Oct 95 15:42:48 PDT Subject: Yes, indeed the PA law is for real! Message-ID: Well folks, you can go view the new PA law yourselves at URL http://moose.erie.net/~italo/rssb655.html PA Senate Bill 655 was signed into law on June 13, 1995, and it does appear to make non-logged anonymous remailers illegal. -Thomas From dwa at corsair.com Fri Oct 13 15:48:59 1995 From: dwa at corsair.com (Dana W. Albrecht) Date: Fri, 13 Oct 95 15:48:59 PDT Subject: [NOISE] Re: applications Message-ID: <199510132243.PAA16846@elmos.corsair.com> > From owner-cypherpunks at toad.com Fri Oct 13 15:41:23 1995 > Mime-Version: 1.0 > Content-Type> : > text/plain> ; > charset="us-ascii"> > Date: Fri, 13 Oct 1995 17:50:29 -0400 > To: cypherpunks at toad.com > From: zoetrope at infinet.com (cYberpUnc) > Subject: applications > Sender: owner-cypherpunks at toad.com > Content-Length: 218 > > I know this isnt what you guys generally talk about but I was curious. > Off the top of your head do you know of any sites where I can get kracking > apps for macs? Any information would be greatly appreciated. > > > Has someone set up a mail-to-news gateway between cypherpunks and alt.2600 that we're unaware of? Dana W. Albrecht dwa at corsair.com From tedwards at Glue.umd.edu Fri Oct 13 15:55:14 1995 From: tedwards at Glue.umd.edu (Thomas Grant Edwards) Date: Fri, 13 Oct 95 15:55:14 PDT Subject: Netscape 2.0b1J still core dumps on Java In-Reply-To: <307EB010.42C1@netscape.com> Message-ID: On Fri, 13 Oct 1995, Jeff Weinstein wrote: > I'm not sure what you are getting at. Are you saying that you've > tried running Netscape's Java on SunOS and it doesn't work? If that > is the case, then it is a bug that will be fixed... Uh, I must have been asleep and read your comment as Netscape 2.0 Java did not run on SunOs...Perhaps you can understand my confusion when it says at http://home.netscape.com/comprod/mirror/unix/ : "The IRIX and Sun Solaris versions of Netscape Navigator 2.0b1 include Java support." With no mention of SunOs. But looking at the ftp sites, I do see the 20b1J for SunOs4.1.3. Yey! -Thomas From unicorn at polaris.mindport.net Fri Oct 13 16:31:28 1995 From: unicorn at polaris.mindport.net (Black Unicorn) Date: Fri, 13 Oct 95 16:31:28 PDT Subject: CYPHERPUNKS EXPOSED In-Reply-To: <199510131905.NAA00772@teal.csn.net> Message-ID: On Fri, 13 Oct 1995, L.Detweiler wrote: > > Attn Reporters and Writers!! > > who are the CYPHERPUNKS? > what are they talking about? > what have they done in the past? > who are the "leaders"? > what do they believe in? > what are their *real* goals? > > My name is L.Detweiler, and I've made a serious study of the more ulterior > aspects of the CYPHERPUNKS for several years, and I invite you to peruse my > findings at the web site below. > > I've been quoted in various articles and I'm available for serious interviews > with anyone who wants the REAL STORY BEHIND THE CYPHERPUNKS. > > note: be forewarned that key cypherpunks consider me a heretical > blasphemer because of the tenacious, unforgiving honesty and > zealous antisychophancy by which I have pursued this herculean study. > > > | /\ |\| /~ L~ ``I have to spew this stuff, or I'd be on the > L_ /~~\ | | \_ L_ roof with a high power weapon.'' -Jim Carrey Settlement Agreement. --- "In fact, had Bancroft not existed, potestas scientiae in usu est Franklin might have had to invent him." in nihilum nil posse reverti 00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information From tcmay at got.net Fri Oct 13 16:34:53 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 13 Oct 95 16:34:53 PDT Subject: Anguilla Cypherpunks Meeting Message-ID: At 3:41 PM 10/13/95, s1018954 at aix2.uottawa.ca wrote: >Really? I thought except for incomes taxes, US laws only apply in American >territory as opposed to applying to American people wherever they are (as >I heard Germany's does). It depends on what is meant by "outside the country." The law forbidding travel to Cuba, for example, is not enforced by U.S. cops outside the country, but upon reentry to the U.S. Ditto for other laws, such as those affecting aid and support of countries we don't like, and the laws about trading with the enemy. >What if you were a dual citizen (US/Canada in my case)? For the purposes of crypto laws (and many other laws, truth be told), Canada is treated as a smallish northern state in the U.S. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From baum at apple.com Fri Oct 13 16:40:10 1995 From: baum at apple.com (Allen J. Baum) Date: Fri, 13 Oct 95 16:40:10 PDT Subject: cryptp & PCMCIA committee mtg notes Message-ID: Clipper ain't dead yet: TECHNICAL MEETING UPDATES - Discussion and work on the following topics occurred at the meeting: Zoom Video, Thermal Characterization of a card inside a laptop, Changes to Custom Interfaces, Indirect Access to PC Card memory, and changes/clarification to the Multifunction specification (this one was deemed very important). A presentation was made by Spyrus on security cards and a proposal to set up a technical working group was made. ........ 2) PC Card Working Group Security Card proposal by Spyrus - wants security card id to be a part of the standard and supported by system software. The government Fortezza card would be included. ************************************************** * Allen J. Baum tel. (408)974-3385 * * Apple Computer, MS/305-3B fax (408)974-0907 * * 1 Infinite Loop * * Cupertino, CA 95014 baum at apple.com * ************************************************** From tomw at orac.engr.sgi.com Fri Oct 13 16:59:07 1995 From: tomw at orac.engr.sgi.com (Tom Weinstein) Date: Fri, 13 Oct 95 16:59:07 PDT Subject: 90% In-Reply-To: Message-ID: <199510132358.QAA06931@orac.engr.sgi.com> In article , Michael James Gebis writes: > In uiuc.mlist.cypherpunks zoetrope writes: >> Can I ask a question....are you guys into cryptology for the interesting >> facts and knowledge or fer cracking unix codes and raising havoc? > _I_ got into it for the chicks. Upon reflection it seems that it may not > have worked as well as I might have hoped. :) Yeah, definitely for all those crypto-groupies. -- Sure we spend a lot of money, but that doesn't mean | Tom Weinstein we *do* anything. -- Washington DC motto | tomw at engr.sgi.com From carolann at censored.org Fri Oct 13 18:06:32 1995 From: carolann at censored.org (Censored Girls Anonymous) Date: Fri, 13 Oct 95 18:06:32 PDT Subject: what are these people selling???? Message-ID: <199510131643.QAA05528@mailhost1.primenet.com> -----BEGIN PGP SIGNED MESSAGE----- >So no, this is not some great conspiracy on Sun's part to >co-opt the list. You can return to your regularly scheduled >paranoid fantasies. Thank you.... DAMN!.....I thought someone was on to something here. I mean maybe we could get Microhard to do a meeting. Or the dreaded RSA or somebody. Love Always, Carol Anne -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMH75T4rpjEWs1wBlAQFM2QP9Eeh1wcbdUMRk+Z8MXX8rix2VeZt1rqnb d735C9bt0B2x0FtYjOTi6r8FPUYWV6AVYjn2z/m+RjZ71H7MoOSoyHOk+XA+biGM TAzSCPcJNvTTjAyAGs7/wC8WC0z6QudMXkitPuXW4s5ZeqX3yuEbPjlyBYwRbt3h LNTVc/BfrsI= =NgMw -----END PGP SIGNATURE----- -- Member Internet Society - Certified BETSI Programmer - Webmistress *********************************************************************** Carol Anne Braddock (cab8) carolann at censored.org 206.42.112.96 My Homepage The Cyberdoc *********************************************************************** ------------------ PGP.ZIP Part [017/713] ------------------- M8H,),S$8G>&.WP(8IRA`-M['+`Q%&_C"">5-F%LX@<_Q$;*P'',Q$Z/AA[8M MF=O0H+*%(-S%&>S%+FS& http://dcs.ex.ac.uk/~aba/export/ From tcmay at got.net Fri Oct 13 18:19:27 1995 From: tcmay at got.net (Timothy C. May) Date: Fri, 13 Oct 95 18:19:27 PDT Subject: what are these people selling???? Message-ID: At 11:43 PM 10/13/95, Censored Girls Anonymous wrote: >I mean maybe we could get Microhard to do a meeting. >Or the dreaded RSA or somebody. Jim Bidzos, President of RSADSI, attended our special "Clipper" meeting the weekend after Clipper was announced, in April 1993. I'm not saying this in defense of RSADSI and their patent situation, just to note that they are not "dreaded." No doubt Carol meant this tongue-in-cheek, but I think it important to remind folks that things are not so black and white as to allow demonization of such companies, at least not based on what has come out so far. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From daw at lagos.CS.Berkeley.EDU Fri Oct 13 18:20:53 1995 From: daw at lagos.CS.Berkeley.EDU (David A Wagner) Date: Fri, 13 Oct 95 18:20:53 PDT Subject: Certificate proposal Message-ID: <199510140119.VAA08113@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <199510120147.LAA13833 at sweeney.cs.monash.edu.au>, Jiri Baum wrote: > What you are missing is that you should not say > "I want to send my credit card number to Egghead Software" > you should say > "I want to send my credit card number to 12 34 56 78 9A BC DE F0" Why does this sound so much like defining the problem away? Maybe I just don't get it... - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMH8QCSoZzwIn1bdtAQFm1QGApigaZIVNZTghR9YrzwL/1dMCdu5zGMK5 QPCEJPY2W1hTrL/znVMkcOCg/Tw5ampO =+2Co -----END PGP SIGNATURE----- From bplib at wat.hookup.net Fri Oct 13 18:22:04 1995 From: bplib at wat.hookup.net (Tim Philp) Date: Fri, 13 Oct 95 18:22:04 PDT Subject: Anguilla Cypherpunks Meeting In-Reply-To: Message-ID: As a Canadian, I am often astounded by the attempts of the United States government to apply American law extraterritorially. A case in point is the trade embargo with Cuba. Canada does not recognize this embargo and trades freely with Cuba. Several American corporations faced legal sanction in the U.S. for the actions of their Canadian subsiduries. I don't remember the details but can get references if anyone requires it. ITAR regulations may be enforced by the U.S. government on the parent corporations if history is any judge. In any case, these regulations are impeding standards development and the use of secure cryptography for commerce on the internet. As for key escrow and and other schemes to dilute security, no foreign company is going to use such 'bastardized' products, knowing that the U.S. government may be listening in. Especially since your president is talking about commercial spying. Regards, Tim Philp Brantford, Ontario Canada =================================== For PGP Public Key, Send E-mail to: pgp-public-keys at swissnet.ai.mit.edu In Subject line type: GET PHILP =================================== On Fri, 13 Oct 1995 s1018954 at aix2.uottawa.ca wrote: > > > On Fri, 13 Oct 1995, Michael Froomkin wrote: > > > > If while you are outside the USA you want to write some software that uses > > > encryption and sell it worldwide, let me know. I could put you up while > > > you wrote it and my company could sell it for share of the selling price. > > > Let me know what you are thinking of and how long you think it would take. > > > > Of course if you are a US person (citizen or green card holder) this is > > just as much a violation of the ITAR than if you did it from inside the US... > > Really? I thought except for incomes taxes, US laws only apply in American > territory as opposed to applying to American people wherever they are (as > I heard Germany's does). > > What if you were a dual citizen (US/Canada in my case)? > From daw at lagos.CS.Berkeley.EDU Fri Oct 13 18:28:30 1995 From: daw at lagos.CS.Berkeley.EDU (David A Wagner) Date: Fri, 13 Oct 95 18:28:30 PDT Subject: Netscape beta 2.0 [NOISE] Message-ID: <199510140126.VAA08147@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <199510130224.TAA04729 at infinity.c2.org>, sameer wrote: > Hey those shirts aren't measly! Very comfy, in my opinion :-) - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMH8RzCoZzwIn1bdtAQGRTwGAzGuG7xyQyNmF7MZZpdU+1Wtx7tjmC1an rnhYqyrNV/9XS3qLe789f8epr1/OsUE8 =cnDM -----END PGP SIGNATURE----- From C.CREUTZIG at BIONIC.zerberus.de Fri Oct 13 18:44:07 1995 From: C.CREUTZIG at BIONIC.zerberus.de (Christopher Creutzig) Date: Fri, 13 Oct 95 18:44:07 PDT Subject: List of reliable remailers In-Reply-To: <199510091350.GAA12733@kiwi.cs.berkeley.edu> Message-ID: RL> ford remailer at bi-node.zerberus.de *+ 6:37 10.73% The problem should be fixed. I had asked the remailer to use a non-existant temp dir, so it just quit silently... --- Christopher Creutzig | c.creutzig at bionic.zerberus.de PGP-verschl�sselte Nachrichten bevorzugt -- benutzt Briefumschl�ge! From jps at monad.semcor.com Fri Oct 13 19:40:12 1995 From: jps at monad.semcor.com (Jack P. Starrantino) Date: Fri, 13 Oct 95 19:40:12 PDT Subject: responce to graphic encryption replies Message-ID: <9510140243.AA06608@monad.semcor.com> > ... The graphic file is going to have a highly correlated > structure, long runs of white space etc. This is not the case for digital imagery. For any given band, if you sample a significant portion of the image it would not be surprising to see a more or less random distribution over the range. > The statistics for such a file > would be different than the random distribution you'd get from using the > wrong key. If you decrypt with the wrong key, do you get a random distribution? Would this be the case for all wrong keys? Would the statistics change in any discernible pattern as the keys got "closer"? > Even if the graphics format is compressed, leading to a more > even distribution, ... This may give a better result. Most compressions involve a shift to the frequency domain with a quantization of the samples. You might be able to write a detector based on this discontinuity. You could also try throwing an edge detector or some other morphological recognizer at the output. It would still be cheaper than having to a man in the loop, but you're going to spend a lot of cpu time. jps -- Jack P. Starrantino (215) 674-0200 (voice) SEMCOR, Inc. (215) 443-0474 (fax) 65 West Street Road jps at semcor.com Suite C-100 Warminster, PA 18974 From frissell at panix.com Fri Oct 13 20:58:57 1995 From: frissell at panix.com (Duncan Frissell) Date: Fri, 13 Oct 95 20:58:57 PDT Subject: Anguilla Cypherpunks Meeting In-Reply-To: Message-ID: On Fri, 13 Oct 1995 s1018954 at aix2.uottawa.ca wrote: > Really? I thought except for incomes taxes, US laws only apply in American > territory as opposed to applying to American people wherever they are (as > I heard Germany's does). The US has frequently tried to reach citizens anywhere in the world. Thus when private ownership of gold was banned in the US in the '30s, the regs outlawed possession of gold by Americans anywhere on earth. Likewise, when the Feds proposed federal licensing of space launch vehicles a few years ago, they proposed outlawing unlicensed space launches by Americans anywhere on earth. Obviously, nuclear technology was controlled so that it was illegal for Americans who had nuclear skills to work in nuclear power plants in certain countries. Such laws and regulations usually apply to US citizens (whether resident or not) and non-citizens who are US residents. > What if you were a dual citizen (US/Canada in my case)? Dual citizens are bound by the laws of both countries. DCF From hfinney at shell.portal.com Fri Oct 13 21:28:35 1995 From: hfinney at shell.portal.com (Hal) Date: Fri, 13 Oct 95 21:28:35 PDT Subject: mental cryptography In-Reply-To: <199510132226.PAA13627@jobe.shell.portal.com> Message-ID: <199510140427.VAA15400@jobe.shell.portal.com> The Mad Scientist in the Middle writes via anonymous-remailer at shell.portal.com: >The answer is doing cryptography in your head. Well not quite, since many >cryptographic operations are very computing intensive, and not everyone can do >1000 bit mental modular exponention in a reasonable amount of time. But if >you have a piece of secure hardware that you can trust to do some of these >operations for you, then all you need is a secure communications channel to >this piece of hardware. >There may be other ways, but I suggest that you establish a common key with >your crypto server ahead of time, and then simply encrypt all your >communications using a symmetric algorithm. RC4 may be a reasonable choice, >since the operations are simple and easy to remember, but you need to keep >track of a 255-byte state. WAKE is probably better. Although it uses a large >key table, you only have to memorize it once, after which the only state that >is changing is four 32-bit registers. I am not familiar with WAKE but I doubt that you could literally hold 128 bits in your head and manipulate them. This is a problem which I have wondered about for some time. Presumably if we went to a digital cash world we would use smart cards to buy things, but how do we make sure that nobody steals and uses our smart cards? Just typing in a PIN doesn't seem very safe to me, especially if the card doesn't have a keypad built in and you're using a keypad in the card reader as is often the case today. Even with a pad on the card you have to worry about eavesdroppers. Biometric ID's (fingerprints, and Senator Feinstein's retina scans that she wants to put on our national ID cards) have been proposed to solve this but they are expensive and unreliable right now. An information based solution would be best if it were possible. I have read one paper which attempts to solve this problem, called "Human Identification through Insecure Channel". Unfortunately my papers are in a mess right now so I don't have the reference handy. It was by some Japnese researchers, published in one of the proceedings books. I believe a follow-on paper was published within the last year or two which had some improvements or corrections to their algorithm. Sorry to be so vague, I'll try to dig out more info over the weekend. Basically they used a challenge-response system which was intended to be simple enough that people could do it in their heads. The card would display a random challenge string, some characters of which were special to the user and others which he would ignore. He would then input a response string, where it didn't matter what corresponded to the "ignore" slots, but in the special slots he had to produce certain symbols corresponding to the other symbols, with the rules changing as you move along. The intention was that even by capturing and analyzing a great many challenge-response pairs you couldn't create a response to a challenge you hadn't seen before. I coded this up, and frankly, I couldn't do the required manipulations in my head, at least not without taking a very, very long time, and thinking very carefully. Maybe it would get easier with practice, I don't know. But my overall feeling was that this would be at the limits of human capability even for fairly bright people. (OTOH I suppose learning to read and write might seem pretty tough if you'd never done it. Maybe the 1st grade classes of the future will spend months training the kids on how to use these kinds of algorithms.) >I am sure better algorithms can be found for this purpose if mental >cryptography is made explicit as a design goal. Perhaps it should be? It's a hard problem to solve in general because you have only a human mind to do the identification algorithm but you have computers to try to break it. But I would like to see the problem get more attention. Hal From sbryan at maroon.tc.umn.edu Fri Oct 13 23:07:57 1995 From: sbryan at maroon.tc.umn.edu (Steve Bryan) Date: Fri, 13 Oct 95 23:07:57 PDT Subject: applications Message-ID: At 5:50 pm 10/13/95, cYberpUnc wrote: > I know this isnt what you guys generally talk about but I was curious. >Off the top of your head do you know of any sites where I can get kracking >apps for macs? Any information would be greatly appreciated. Before looking at the address information I was going to send a one line: "Go away" reply to the question. I thought you promised to try to be less obnoxious. If you'd calm down and read the list for a while you might realize why this might not be the place to pose such questions. Why not take a look at the newsgroup alt.2600? You might find it a rather rude place to frequent and I'd certainly never send my 13 year old there (my oldest is currently 8) but I get the impression the topics you'd find there might prove more interesting than the political and/or technical discussions you'll find here. By all means enjoy yourself here but spend more time listening. +---------------------------------------------------------------------- |Steve Bryan Internet: sbryan at gofast.net |Sexton Software CompuServe: 76545,527 |Minneapolis, MN Fax: (612) 929-1799 |PGP key fingerprint: B4 C6 E2 A6 5F 87 57 7D E1 8C A6 9B A9 BE 96 CB +---------------------------------------------------------------------- From jsw at netscape.com Fri Oct 13 23:16:23 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Fri, 13 Oct 95 23:16:23 PDT Subject: Netscape question transformed In-Reply-To: Message-ID: <307F54CF.573F@netscape.com> zoetrope at infinet.com wrote: > Why would a compony like Netscape jeapordise themselves by even > letting out a beta version so > hackers have time to find bugs before the full version is released. Don't > take me wrong I have only been on the net fer a little over a year and Love > Netscape. And If I knew what I was Doing I would love to help them..... The reason we do it is that without wide exposure outside the company, it is virtually impossible to get complete testing coverage. Given the incredible variety of machines, OS's, peripherals, etc. that are available in the real world, there is no way we could re-create every possible configuration in the lab. We also can't visit every web page, or think of every combination of features that clever people in the real world come up with every day. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From cman at communities.com Sat Oct 14 00:02:22 1995 From: cman at communities.com (Douglas Barnes) Date: Sat, 14 Oct 95 00:02:22 PDT Subject: Anguilla Cypherpunks Meeting Message-ID: [various comments about extraterritorial reach] Laws that affect the behavior of citizen-units, no matter where they go, rest on the theory of "personal jurisdiction". Note that in addition to ITAR, the various laws on money laundering, as well as the RICO statues, apply to US citizens wherever they may be. Ditto for tax laws -- one of the little gems that I learned last week was that penalties to failure to report worldwide income are going to be substantially increased. I guess they're not getting very good compliance for some reason... From jsw at netscape.com Sat Oct 14 00:04:37 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Sat, 14 Oct 95 00:04:37 PDT Subject: Same ol' massive MITM exposure in Netscape 2.01b In-Reply-To: Message-ID: <307F601F.19A2@netscape.com> Simon Spero wrote: > 1) The client does not do any verification that the certificate used for > the transaction is one associated with the server, allowing MITM > substitutions as long as the server has a properly signed certificate > > 2) The client does not issue warnings for redirections from one https > page to another https page, even if the url to which it is redirected has > a different hostname to the url originally dereferenced. I'm working on these right now. A future beta will have fixes for this. > 3) In the case of redirection, the document info screen does not provide > information about the originaly referenced page, just the final page. > This allows the MITM to intercept the first request, steal the request > data, then issue a redirect to hide the certificate used in the intercept. If the previous two are fixed, it doesn't seem that this is really important. > 4) In the beta version, the document info page does not display the > security info (I did check with MITM disabled). Did you have the disk cache turned off? --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From carolann at censored.org Sat Oct 14 00:11:18 1995 From: carolann at censored.org (Censored Girls Anonymous) Date: Sat, 14 Oct 95 00:11:18 PDT Subject: Netscape question transformed Message-ID: <199510132330.XAA18917@mailhost1.primenet.com> And some of us wish 2.0 would show images (the windoze 16 version) And I'm not even clever, and have downloaded three copies. > We also can't visit every web page, or think of every combination >of features that clever people in the real world come up with every >day. > > --Jeff > >-- >Jeff Weinstein - Electronic Munitions Specialist >Netscape Communication Corporation >jsw at netscape.com - http://home.netscape.com/people/jsw >Any opinions expressed above are mine. > > -- Member Internet Society - Certified BETSI Programmer - Webmistress *********************************************************************** Carol Anne Braddock (cab8) carolann at censored.org 206.42.112.96 My Homepage The Cyberdoc *********************************************************************** ------------------ PGP.ZIP Part [017/713] ------------------- M8H,),S$8G>&.WP(8IRA`-M['+`Q%&_C"">5-F%LX@<_Q$;*P'',Q$Z/AA[8M MF=O0H+*%(-S%&>S%+FS& http://dcs.ex.ac.uk/~aba/export/ From cman at communities.com Sat Oct 14 00:16:32 1995 From: cman at communities.com (Douglas Barnes) Date: Sat, 14 Oct 95 00:16:32 PDT Subject: AP on trashing/computer fraud ring Message-ID: Although I generally agree that capturing information online has certain advantages to the criminal over going through the trash, that certainly didn't stop this bunch. Doug [wondering if this will affect the market for home shredders] ======================= ATLANTA (AP) -- Thirty people have been charged in a $10 million fraud scheme that involved counterfeiting checks, bank statements and credit card receipts pulled out of the trash. ``What we're finding is people are getting more and more clever with what they pull out of the trash,'' U.S. Attorney Kent Alexander said. ``This is the most clever scam I've ever seen.'' The defendants, who defrauded people in 17 states, used checks, bank statements, credit card receipts and other documents from garbage bins to create counterfeit checks, false driver's licenses and false credit reports, Alexander said. Investigators said software was used to rub out information on the discarded paper. Counterfeit blank checks, printed on high-quality color printers, were allegedly used to defraud banks of $2 million. A core group of about eight people moved the operation to Atlanta from New Jersey five years ago because they thought it would be easy to take advantage of Southerners, the prosecutor said. Of the 30 people charged, 24 have pleaded guilty, Alexander said. Twelve of the 24 have been sentenced to jail terms of up to eight years and restitution of up to $218,070. From don at cs.byu.edu Sat Oct 14 01:16:37 1995 From: don at cs.byu.edu (Donald M. Kitchen) Date: Sat, 14 Oct 95 01:16:37 PDT Subject: Guess what I found... Message-ID: <199510140816.CAA07071@bert.cs.byu.edu> From: llurch at Networking.Stanford.EDU (Richard Charles Graves) Newsgroups: comp.os.ms-windows.win95.misc,alt.fan.bill-gates,alt.privacy Subject: Re: Microsoft Network: Hard Drive Raid Date: 11 Oct 1995 23:59:58 -0700 Message-ID: <45iede$dp2 at Networking.Stanford.EDU> References: <45h0v7$579 at news.corpcomm.net> rryan at blackhills.com (Richard Ryan) writes: >Had my first hard core, proveable case of MSN reading someones drive. Store >Client had entered fantasy company name upon installing a program. Forgot about >it, didn't tell anyone. 2 days after downloading a simple text file from MSN a >junk mail offering from Pitney-Bowes showed up in his snail mailbox addressed >to him c/o the fantasy company. Somebody is playing somewhere they shouldn't >be. Any comments, Microsoft? I registered as Richard E. Graves (changing middle initials and adding an unnecessary suite number to your address are good ways to track who has been selling whom your address). Richard E. Graves also received mail from Pitney-Bowes. Microsoft says they don't sell their mailing lists. Clearly, someone has taken advantage of security holes in the NT servers that make up MSN and *stole* the mailing lists. Maybe unauthorized external access accounts for the abysmal performance of MSN, in part. -rich moderator of the win95netbugs list http://www-dccs.stanford.edu/NetConsult/Win95Net/faq.html From roy at cybrspc.mn.org Sat Oct 14 02:17:36 1995 From: roy at cybrspc.mn.org (Roy M. Silvernail) Date: Sat, 14 Oct 95 02:17:36 PDT Subject: Identity database, another attempt... In-Reply-To: <9510131347.AA18300@outland> Message-ID: <951013.170750.4L0.rnr.w165w@cybrspc.mn.org> -----BEGIN PGP SIGNED MESSAGE----- In list.cypherpunks, fletch at ain.bls.com writes: > Not really related to the deadbeat dads thing, but we > got a notice that the US DOT has mandated that all air passengers > must present a gov't issue photo ID with a name that matches that > on your ticket. In addition it says that passengers should: > > * be prepared to answer questions about their bags. > * be prepared to open the trunk of their car. Have you flown recently? They now ask you this scripted question about whether you have been approached by anyone you don't know since arriving at the airport, and warn you not to accept anything from a stranger or leave your carry-on baggage unattended until you board the plane. The ticket agent told me it was a "new FAA regulation". I hadn't flown anywhere for a few years. Anyone know how long this has been happening? > Goodbye freedom, hello police state. I wonder how long before I need a passport to cross a state line... OBsecurity: Both directions, I had to carry a PC-Bus servo controller card. It's not nice to x-ray an EPROM, so I had it hand-inspected. I wouldn't let them open the static bag without a strap. Both times, the guard gave it a casual glance and passed it through. In San Antonio, they x-rayed the box while I held the card. This particular card assembly is pretty large. A dummied version would have a sizeable hidden compartment. - -- Roy M. Silvernail [ ] roy at cybrspc.mn.org PGP Public Key fingerprint = 31 86 EC B9 DB 76 A7 54 13 0B 6A 6B CC 09 18 B6 Key available from pubkey at cybrspc.mn.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMH7lbBvikii9febJAQFS6gQAhnHW0IVAepxlmQ8rt48RCciYVo2KVUyI q0fI3jwYxTcRIlNeqrfsxHiWY9gqvb7OtO9K9S30Y319P+THFhdx6hY6i2n4CM9m iUWzv+usUZzgnIxa2l2cpcviBIY8p2ggc/gad9lV3hooIgH1jAzHYpMXIzRuE6bw Yh2AoVI/Wrc= =RwHs -----END PGP SIGNATURE----- From BRUEN at mitlns.mit.edu Sat Oct 14 04:18:49 1995 From: BRUEN at mitlns.mit.edu (Bob Bruen, MIT Lab for Nuclear Science) Date: Sat, 14 Oct 95 04:18:49 PDT Subject: airport security Message-ID: <951014071611.44602170@mitlns.mit.edu> Roy M. Silvernail wriote: >Have you flown recently? They now ask you this scripted question about >whether you have been approached by anyone you don't know since arriving >at the airport, and warn you not to accept anything from a stranger or >leave your carry-on baggage unattended until you board the plane. The >ticket agent told me it was a "new FAA regulation". I hadn't flown >anywhere for a few years. Anyone know how long this has been happening? > Goodbye freedom, hello police state. >I wonder how long before I need a passport to cross a state line... The US is merely trying to catch up to what the Europeans have been doing for over a decade. In fact, the US still has a way to go. You ought to pass through Heathrow in London some time to see what real airport security looks like. The US security changes are a recent response, starting after the World Trade Center bombing and being stepped up on a continuing basis. Today you need a picture ID to board with your ticket. Tomorrow...? We have lived in relative safety compared to the rest of the world, but I think those days are over. Usual disclaimer. Bob Bruen. From fc at all.net Sat Oct 14 04:56:18 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Sat, 14 Oct 95 04:56:18 PDT Subject: Netscape rewards are an insult Message-ID: <9510141153.AA16412@all.net> The idea that Netscape (like Microsoft) thinks they can get free testing services from all over the net by real experts just by offerring a tee shirt is down right offensive. I have a better idea. How about an open market in break-in software. We crack Netscape and offer the crack code to the highest bidder. Bids start at US$25K per hole. For the insult, Netscape has to outbid the competition by a factor of 2 to get the details of the hole. Here's how it works: - We get a panel of 5 cypherpunk judges who test each claimed hole. - Exploit code is sent to the panel for verification. - If they verify the hole, it is put up for bid. - Winning bidder gets the code for 3 months before it is released on hacker BBS systems throughout the world. - The panel of judges splits 25% of the money paid for the code as pay for their efforts. The rest goes to the author. I have an even better idea. How about if Netscape gets some competent programmers with real security expertise, adds in some good change controls, a serious internal testing program, quality control ala ISO-9000, internal IT auditors, external IT auditors, training and education for their employees, and everything else it takes to be in the software business in a serious way. As an alternative, we could help them contact the shareholders for a lawsuit. After all, they are a public company now and are responsible to the shareholders for the value of their stock. If it goes down because they aren't doing an adequate job of software quality control, the officers may be personally liable. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From loofbour at cis.ohio-state.edu Sat Oct 14 05:43:35 1995 From: loofbour at cis.ohio-state.edu (Nathan Loofbourrow) Date: Sat, 14 Oct 95 05:43:35 PDT Subject: mental cryptography In-Reply-To: <199510132226.PAA13627@jobe.shell.portal.com> Message-ID: <199510141243.IAA27588@hammond.cis.ohio-state.edu> hfinney at shell.portal.com writes: > I have read one paper which attempts to solve this problem, called "Human > Identification through Insecure Channel". Unfortunately my papers are in > a mess right now so I don't have the reference handy. It was by some > Japnese researchers, published in one of the proceedings books. I > believe a follow-on paper was published within the last year or two which > had some improvements or corrections to their algorithm. Sorry to be so > vague, I'll try to dig out more info over the weekend. The article, by T. Matsumoto and H. Imai, was in Eurocrypt '91, which is published as vol. 547 of "Lecture notes in computer science". The only followup article I could find was: C.-H. Wang, T. Hwang, and J.-J. Tsai, "On the Matsumoto and Imai's [sic] human identification scheme." (LNCS 921, 1995) > >I am sure better algorithms can be found for this purpose if mental > >cryptography is made explicit as a design goal. Perhaps it should be? > > It's a hard problem to solve in general because you have only a human > mind to do the identification algorithm but you have computers to try to > break it. But I would like to see the problem get more attention. It may be that the approach is off anyway. Credit cards have only signature verification -- if the salesperson bothers -- because stolen cards are reported. You don't need a strong authentication technique if a stolen card is easy to cancel. Of course, perhaps this encourages someone to steal your card and incapacitate you before you can report it. That's why we have PINs... so that someone can steal your card, threaten you until you reveal your PIN, and then incapacitate you... Hmm... Even with a weak PIN system for authentication, you can always provide a "duress" PIN, right? nathan From loofbour at cis.ohio-state.edu Sat Oct 14 05:59:18 1995 From: loofbour at cis.ohio-state.edu (Nathan Loofbourrow) Date: Sat, 14 Oct 95 05:59:18 PDT Subject: mental cryptography In-Reply-To: <199510132226.PAA13627@jobe.shell.portal.com> Message-ID: <199510141259.IAA27807@hammond.cis.ohio-state.edu> Nathan Loofbourrow writes: > C.-H. Wang, T. Hwang, and J.-J. Tsai, "On the Matsumoto and Imai's > [sic] human identification scheme." (LNCS 921, 1995) Uh, silly me, that happens to be the EUROCRYPT '95 proceedings. Boy, and isn't it fun to receive all the bounce messages from every post to cypherpunks? nathan From MIGUELDIAZ at megaweb.com Sat Oct 14 06:04:58 1995 From: MIGUELDIAZ at megaweb.com (Miguel Diaz) Date: Sat, 14 Oct 95 06:04:58 PDT Subject: Netscape rewards are an insult Message-ID: <199510141302.JAA04592@mail-e1a.megaweb.com> Dr. Frederick B. Cohen writes in part: > The idea that Netscape (like Microsoft) thinks they can get > free >testing services from all over the net by real experts just > by offerring >a tee shirt is down right offensive. > Ditto. The next major hack of Netscape will likely be used to bring that company to its knees. Unless one assumes that obvious backdoors will still be unprotected by their new code, a lot of computing time for brute force attacks and algorithm development will have to be spent to properly crack Netscape again. I seriously doubt the successful individuals will merely settle for fame and not fortune this time around. OTOH I would much rather see MS get hacked next. If the rumors, which are piling now, on MS being a Peeping Tom when it comes to hard drives are true, I wonder if there might be a way to send a byte bomb to their bit bucket??....... From s1018954 at aix2.uottawa.ca Sat Oct 14 08:04:03 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sat, 14 Oct 95 08:04:03 PDT Subject: Netscape rewards are an insult In-Reply-To: <9510141153.AA16412@all.net> Message-ID: On Sat, 14 Oct 1995, Dr. Frederick B. Cohen wrote: > I have a better idea. How about an open market in break-in > software. We crack Netscape and offer the crack code to the highest > bidder. Bids start at US$25K per hole. For the insult, Netscape has to > outbid the competition by a factor of 2 to get the details of the hole. > Here's how it works: > Funny that you mention it, the other mailing list (or rather set of lists) I'm on is devoted to a just such market system. The Idea Futures home page is at http://if.arc.ab.ca/~jamesm/IF/IF.shtml. You'll find a few familiar faces. From s1018954 at aix2.uottawa.ca Sat Oct 14 08:38:11 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sat, 14 Oct 95 08:38:11 PDT Subject: Netscape rewards are an insult In-Reply-To: <9510141153.AA16412@all.net> Message-ID: On Sat, 14 Oct 1995, Dr. Frederick B. Cohen wrote: > The idea that Netscape (like Microsoft) thinks they can get free > testing services from all over the net by real experts just by offerring > a tee shirt is down right offensive. THE NETSCAPE BUGS BOUNTY (major snip) And if the security bug you find is severe as defined by Netscape, and hasn't been previously found, and can be reproduced by us, we'll write you a check for $1000. "Previously Found" means that either an internal tester or someone else who doesn't work for Netscape has already reported a bug that causes the same defect. That's a bit more than just a t-shirt. Since they're being open about bug finding, it would be reasonable and helpful for them to publish all discovered bugs to prevent duplication and give people a forum for concentrating efforts. As for the t-shirts, it'd real nice at job interviews to show up with personalized "(insert your name here) cracked netscape, and all I got was this lousy t-shirt" signed with netscape's pgp key (and verifiable at their soon to appear (hint, hint) "Bug tester's Hall of Fame"). Looks nice on CV's too. From chan at pointcom.com Sat Oct 14 08:47:00 1995 From: chan at pointcom.com (T. Chan) Date: Sat, 14 Oct 95 08:47 PDT Subject: Top Math & Physics Sites Message-ID: Dear Friends: We�d like to invite you to check out our reviews of Math & Physics -related sites. Point reviews and rates thousands of the very best sites on the Web, including sites in this area of interest. There�s no charge and no catch. We hope our lively, independent reviews will prove valuable to members of newsgroups like this one. We hope you�ll stop by at http://www.pointcom.com. Thanks for your time. The sites are rated from 0-50, (50 being best) in Content, Presentation and Experience. The Live Artificial Life Page 38 36 42 Amateur Science 43 35 41 The Geometry Forum 41 36 40 SciEd 45 20 38 The Pavilion of Polyhedreality 25 35 38 Continuous Electron Beam Accelerator Facility 40 42 37 The Geometry Center 36 39 37 Fermi National Accelerator Laboratory 37 40 36 Googolplex 35 23 36 The Largest Known Primes 34 28 36 From hwertz at exclusive.com Sat Oct 14 08:47:12 1995 From: hwertz at exclusive.com (Henry Wertz) Date: Sat, 14 Oct 95 08:47:12 PDT Subject: Netscape rewards are an insult In-Reply-To: <9510141153.AA16412@all.net> Message-ID: On Sat, 14 Oct 1995, Dr. Frederick B. Cohen wrote: > The idea that Netscape (like Microsoft) thinks they can get free > testing services from all over the net by real experts just by offerring > a tee shirt is down right offensive. > > I have a better idea. How about an open market in break-in > software. We crack Netscape and offer the crack code to the highest > bidder. Bids start at US$25K per hole. For the insult, Netscape has to > outbid the competition by a factor of 2 to get the details of the hole. > Here's how it works: *cut* You know, this all seems kind of greedy to me.. It used to be people would find holes for *fun* and not for profit. It's still possible to do that you know 8-). From s1018954 at aix2.uottawa.ca Sat Oct 14 09:02:40 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sat, 14 Oct 95 09:02:40 PDT Subject: The incredible bouncing mailbox (was Re: mental cryptography) In-Reply-To: <199510141259.IAA27807@hammond.cis.ohio-state.edu> Message-ID: On Sat, 14 Oct 1995, Nathan Loofbourrow wrote: > Nathan Loofbourrow writes: > Boy, and isn't it fun to receive all the bounce messages from every > post to cypherpunks? Ok, who wants to sic a PI on this Jason P. Jones tentacle or call his local morgue to see if he's alive enough to delete his mailbox? A testament to too many high-volume mailing lists. From dl at hplyot.obspm.fr Sat Oct 14 09:06:02 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Sat, 14 Oct 95 09:06:02 PDT Subject: Netscape rewards are an insult In-Reply-To: <9510141153.AA16412@all.net> Message-ID: <9510141605.AA03487@hplyot.obspm.fr> Frederick B. Cohen writes: > The idea that Netscape (like Microsoft) thinks they can get free > testing services from all over the net by real experts just by offerring > a tee shirt is down right offensive. [...$25k...] They always did that, without even giving away T-shirt since they released the first beta version to world. As long as people enjoy playing for free with a product and give feed back and see the program improved... why would it stop ? Personally, though I prefer free products (but ppl have to get some money for a living....), I think it is not that bad an idea, and I trust lot of people will continue to do it for the fun of it {As long as the company is *really* listening to reports....} dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept cryptographic arrangements Ortega South Africa SDI plutonium CIA From alano at teleport.com Sat Oct 14 09:21:34 1995 From: alano at teleport.com (Alan Olsen) Date: Sat, 14 Oct 95 09:21:34 PDT Subject: airport security Message-ID: <199510141621.JAA19984@desiree.teleport.com> At 07:16 AM 10/14/95 -0400, Bob Bruen wrote: > The US is merely trying to catch up to what the Europeans have been doing >for over a decade. In fact, the US still has a way to go. You ought to pass >through Heathrow in London some time to see what real airport security looks >like. The US security changes are a recent response, starting after the >World Trade Center bombing and being stepped up on a continuing basis. >Today you need a picture ID to board with your ticket. Tomorrow...? We have >lived in relative safety compared to the rest of the world, but I think those >days are over. I remember back during one of the previous FAA panics over terrorism. I was at the Portland airport discussing the measures with an FAA inspector. He explained why they had to have all the searches and stuff to stop anyone from blowing up the plane. I pointed out to him that if anyone wanted to do that, they would just lay off a line of mortars from the hills overlooking the airport across the river. He got very quiet and very worried... You cannot stop someone who is determined to do terrorist acts. And the more the government stomps down on descent, the more various groups will get pissed off and perform terrorist acts, which will cause them to crack down even harder. (And on and on and on.) They forget that the imposition of order increases the escalation of chaos. What does this have to do with crypto? Not a whole lot, other than it will be one of the first thing to be outlawed in the futile attempt to stomp out unauthorized communications. Gotta watch the proles every minute... "Welcome to the global village!" - Marshall "Number 6" McLuhan | Visualize whirled keys | alano at teleport.com | |"It's only half a keyserver. I had to split the | Disclaimer: | |other half with the government man." - Black Art | Ignore the man | | -- PGP 2.6.2 key available on request -- | behind the keyboard.| | http://www.teleport.com/~alano | | From rfb at lehman.com Sat Oct 14 09:50:10 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Sat, 14 Oct 95 09:50:10 PDT Subject: Yes, indeed the PA law is for real! In-Reply-To: Message-ID: <9510141649.AA20952@cfdevx1.lehman.com> -----BEGIN PGP SIGNED MESSAGE----- Date: Fri, 13 Oct 1995 18:42:35 -0400 (EDT) From: Tom Edwards Well folks, you can go view the new PA law yourselves at URL http://moose.erie.net/~italo/rssb655.html PA Senate Bill 655 was signed into law on June 13, 1995, and it does appear to make non-logged anonymous remailers illegal. I'm guessing that you're referring to this part of the law: (1) [makes or possesses any instrument, apparatus, equipment or] makes, distributes, possesses, uses or assembles an unlawful telecommunication device or modifies, alters, programs or reprograms a telecommunication device designed, adapted or which can be used: . . . (ii) to conceal or to assist another to conceal from any [supplier of telecommunications] telecommunicationservice provider or from any lawful authority the existence or place of origin or of destination of any telecommunication; or IANAL, but this sure sounds like one could make the case that an ISP that allowed users to send mail to arbitrary addresses, e. g. xxx at anon.penet.fi, would be `guilty' of assisting another to conceal the place of origin and/or destination of a telecommunication. I'd imagine that the authorities would be a bit more likely to go after anonymous-remailer at xxx.net however. In fact, I wonder if the fact that mail to rfb at cmu.edu is forwarded to rfb at lehman.com couldn't be construed as `assistance' if I happened to receive mail at that address through penet. Sigh . . . . -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMH/p8JNR+/jb2ZlNAQHnTgP/eycb4eJaVDVw9UTmb82ErzR29dnGSrvT cdaGq8HoUYV1fjwzfD6aW3B8tiPkM9tcpbV5ck3LnNU7Ylgq3S8T8Zg/JNkdf0jE J8+KO8HhONNjBgA4hRcEkrnZrHwu3S6BknxgQ+ERCASj7XRybk62pkWGciuoUZyp FfFtv6FAS1E= =vIYn -----END PGP SIGNATURE----- -- Rick Busdiecker Please do not send electronic junk mail! net: rfb at lehman.com or rfb at cmu.edu PGP Public Key: 0xDBD9994D www: http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rfb/http/home.html send mail, subject "send index" for mailbot info, "send pgp key" gets my key A `hacker' is one who writes code. Breaking into systems is `cracking'. From pjnesser at rocket.com Sat Oct 14 10:01:07 1995 From: pjnesser at rocket.com (Philip J. Nesser) Date: Sat, 14 Oct 95 10:01:07 PDT Subject: Netscape rewards are an insult In-Reply-To: <9510141153.AA16412@all.net> Message-ID: <199510141700.KAA06274@oac1.rocket.com> Have things really come to this? Besides the legal implications of discovering a hole and then selling the information to someone, (who presumably will only want this information for one purpose) where has the attitude of doing for the sake of doing gone? Has Netscape been pestering security experts on the net for free work? Have they been plaguing people or lists with email asking the net to do their jobs? I am tired of hearing people who may have had the urge to find weaknesses and bugs now going greedy and deciding that they should be paid for it. If you dont want to participate then don't! Its that simple. If you feel netscape is a greedy money grubbing company who deserves to pay 25k for a bug report then start a company and develop a competing product which you feel deserves to get bug reports. The reason why the Internet has become so popular/powerful is the willingness of people to help out and distribute information. As a computer/networking professional I have saved hundreds of hours worth of my time when someone has been able to answer a question or solve a problem for me. Likewise I have and continue to give back just as many hours back answering others questions. That attitude is completely lacking in your suggestion and I can only hope that the those opinions are in the minority even today. The ironic part is the people who have been the most successful at finding bugs are not the ones who are demanding money for it! ---> Phil >From: fc at all.net (Dr. Frederick B. Cohen) >Date: Sat, 14 Oct 1995 07:53:53 -0400 (EDT) > The idea that Netscape (like Microsoft) thinks they can get free >testing services from all over the net by real experts just by offerring >a tee shirt is down right offensive. > I have a better idea. How about an open market in break-in >software. We crack Netscape and offer the crack code to the highest >bidder. Bids start at US$25K per hole. For the insult, Netscape has to >outbid the competition by a factor of 2 to get the details of the hole. >Here's how it works: > - We get a panel of 5 cypherpunk judges who test each claimed hole. > - Exploit code is sent to the panel for verification. > - If they verify the hole, it is put up for bid. > - Winning bidder gets the code for 3 months before it is released > on hacker BBS systems throughout the world. > - The panel of judges splits 25% of the money paid for the code > as pay for their efforts. The rest goes to the author. > I have an even better idea. How about if Netscape gets some >competent programmers with real security expertise, adds in some good >change controls, a serious internal testing program, quality control ala >ISO-9000, internal IT auditors, external IT auditors, training and >education for their employees, and everything else it takes to be in the >software business in a serious way. > As an alternative, we could help them contact the shareholders >for a lawsuit. After all, they are a public company now and are responsible >to the shareholders for the value of their stock. If it goes down because >they aren't doing an adequate job of software quality control, the officers >may be personally liable. >-- >-> See: Info-Sec Heaven at URL http://all.net >Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From rfb at lehman.com Sat Oct 14 10:10:52 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Sat, 14 Oct 95 10:10:52 PDT Subject: Netscape 2.0b1J still core dumps on Java In-Reply-To: Message-ID: <9510141709.AA21370@cfdevx1.lehman.com> Date: Fri, 13 Oct 1995 18:54:58 -0400 (EDT) From: Thomas Grant Edwards But looking at the ftp sites, I do see the 20b1J for SunOs4.1.3. Yey! Actually it says 4.1.3_U1. Does anyone know (a) what's the U1 mean and (b) if, as I assume, it is an upgrade which the local powers that be have decided against adopting, should I have any expectation of this binary working under an older, non-upgraded, 4.1.3? -- Rick Busdiecker Please do not send electronic junk mail! net: rfb at lehman.com or rfb at cmu.edu PGP Public Key: 0xDBD9994D www: http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rfb/http/home.html send mail, subject "send index" for mailbot info, "send pgp key" gets my key A `hacker' is one who writes code. Breaking into systems is `cracking'. From fc at all.net Sat Oct 14 11:04:05 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Sat, 14 Oct 95 11:04:05 PDT Subject: Netscape rewards are an insult In-Reply-To: <199510141700.KAA06274@oac1.rocket.com> Message-ID: <9510141801.AA01730@all.net> Phil typed: > Have things really come to this? Besides the legal implications of > discovering a hole and then selling the information to someone, (who > presumably will only want this information for one purpose) where has the > attitude of doing for the sake of doing gone? It's one thing to do good for the sake of doing good. Most of us do that every day by participating in this list. It's quite another thing to be insulted in the process. I think that Netscape's reward is an insult, If they think you can find major security bugs in Netscape for as little as $1000, they should take the product off the market, or at least stop claiming that it offers security. > Has Netscape been pestering > security experts on the net for free work? Have they been plaguing people > or lists with email asking the net to do their jobs? They do far worse. They claim security when they don't have it, and when the cypherpunks demonstrate the false claims, Netscape offer insulting future tribute. I think that if they are sincere, they should reward the individuals who found the last few holes with $25,000 each, and show that they really mean business. > I am tired of hearing people who may have had the urge to find weaknesses > and bugs now going greedy and deciding that they should be paid for it. If > you dont want to participate then don't! Its that simple. If you feel > netscape is a greedy money grubbing company who deserves to pay 25k for a > bug report then start a company and develop a competing product which you > feel deserves to get bug reports. I'm not greedy, and I have never found a novel security hole and told the affected people they had to pay to find out about it. I just don't like seeing sincere people who volunteer their efforts being insulted or trivialized or taken advantage of by the big-money people - and make no mistake about it - that is what the Netscape offer is really all about. The $25K is a trivial amount for finding such a hole in a product that is supposed to secure billions of dollars worth of electronic funds transfers. If the bad guys find a hole, it could easily cost millions. If you don't believe me, look at the statistics for other holes in the credit card and telecommunications businesses. They losses are in the billions each year. If Netscape won't bet $25K that they have no such holes, why should their clients bet millions that the bad guys won't find and exploit one. > The reason why the Internet has become so popular/powerful is the > willingness of people to help out and distribute information. As a > computer/networking professional I have saved hundreds of hours worth of > my time when someone has been able to answer a question or solve a problem > for me. Likewise I have and continue to give back just as many hours back > answering others questions. That attitude is completely lacking in your > suggestion and I can only hope that the those opinions are in the minority > even today. It's not my attitude that's changing the Internet. It's the nature of any technology that it can be used for both good and evil. The Internet is no longer a research tool, and there are plenty of people using it for criminal purposes. If we don't start seriously rewarding people who find and help fix the holes, we are dooming the Internet. And, oh yeah, the reason the Internet became so popular so fast had nothing to do with free distribution of information. It had to do with the Vice President making public announcements about the NII, enormous public relations efforts, and lots of national advertising. The free information has been there for 25 years or so. The advertising and the enormous growth started when the marketing people got going. > The ironic part is the people who have been the most successful at finding > bugs are not the ones who are demanding money for it! The ironic part is that a company that claims to have a "secure" method for using credit cards on the Internet thinks that their security is so weak that it only takes $1000 to find a major hole. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From shamrock at netcom.com Sat Oct 14 11:16:30 1995 From: shamrock at netcom.com (Lucky Green) Date: Sat, 14 Oct 95 11:16:30 PDT Subject: [URGENT] Where are we meeting today? Message-ID: <199510141814.OAA09802@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- Sorry, I spaced the announcement and I can't find it in the archive. Somewhere at Sun... Would someone please forward me the original post? TIA, - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMH/+ACoZzwIn1bdtAQGkrgF+JqKcgWrM4VFYaQGbmR6gCg5SBzQe5Php Qv9OxqnfcFFgbs6ZzzMkf+IietdzliuI =SZst -----END PGP SIGNATURE----- From cman at communities.com Sat Oct 14 11:43:18 1995 From: cman at communities.com (Douglas Barnes) Date: Sat, 14 Oct 95 11:43:18 PDT Subject: [URGENT] Where are we meeting today? Message-ID: Place: Sparcy's cafeteria, building 21, Sun Microsystems Mountain View, California Directions: Take 101 to Amphitheater Parkway. Turn left onto Garcia, and drive about 1/2 mile and turn onto the first genuine side street which is named Marina Way. Drive about 1/4 mile and look for a right hand turn onto Coast. Building 21 will be on your left. It's on the corner of Coast and Marina Way. There's plenty of parking there. From rschlafly at attmail.com Sat Oct 14 11:56:14 1995 From: rschlafly at attmail.com (Roger Schlafly) Date: Sat, 14 Oct 95 11:56:14 PDT Subject: DSS patent license Message-ID: >>> RSA Data Security, Inc. >>> today announced that it is now licensing patents for the Digital Signature >>> Standard (DSS), the U.S. government standard for digital signatures. >> >> I believe someone was suing the U.S. government on the grounds that the >> public signature standard wasn't supposed to require proprietary >> technology. Has this gone anywhere yet? >> >> -- >> Eli Brandt >> eli+ at cs.cmu.edu Yes, I had such a lawsuit. No, it didn't go anywhere in the courts, but the feds did eventually cave in to the principal demand of my suit: That the DSA patent be made available to anyone on a royalty-free basis. So how is it that RSADSI and Cylink/CKC claim you need licenses to their patents to use DSS? Because they have other patents. I have another lawsuit directed at those patents. Stay tuned. Roger Schlafly rschlafly at attmail.com From sentiono at cycor.ca Sat Oct 14 12:23:08 1995 From: sentiono at cycor.ca (Sentiono Leowinata) Date: Sat, 14 Oct 95 12:23:08 PDT Subject: Netscape question transformed In-Reply-To: <307F54CF.573F@netscape.com> Message-ID: On Fri, 13 Oct 1995, Jeff Weinstein wrote: > The reason we do it is that without wide exposure outside the > company, it is virtually impossible to get complete testing coverage. > Given the incredible variety of machines, OS's, peripherals, etc. ^^^^^^^^^^^^^^^^^^ ^^^^ > that are available in the real world, there is no way we could > re-create every possible configuration in the lab. Yeah right. Way to go, Jeff. You even say that OS/2 Windows better than Windows itself. Get real. Don't you even realize that OS/2 is another OS! It has its own API. Stop treating other OS-es whose have emulator with the original one. Netscape uses some low-level MS-Windows specific API in order to run it well. How could you expect it run under emulator? Now, wait! .. PowerPC will have OS/2 .. therefore, Netscape will say, sorry folks - you have to use Netscape for Windows .. bla-bla-bla. Get real Jeff. Many people try to improve and make a wonderful product better, and Netscape certainly one of it. See how many people have pledge (even begged - I heard) Netscape to make Netscape for OS/2 (not to mention Amiga (oh ya, I forgot, Netscape will tell Amiga users to use Mac version because Amiga can run Mac-emulator - ha ha)). > We also can't visit every web page, or think of every combination > of features that clever people in the real world come up with every > day. That's true enough. Regards, Sent. From ravage at einstein.ssz.com Sat Oct 14 13:06:41 1995 From: ravage at einstein.ssz.com (Jim Choate) Date: Sat, 14 Oct 95 13:06:41 PDT Subject: Top Math & Physics Sites (fwd) Message-ID: <199510142006.PAA00384@einstein.ssz.com> Forwarded message: From ses at tipper.oit.unc.edu Sat Oct 14 13:11:37 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Sat, 14 Oct 95 13:11:37 PDT Subject: [noise] Re: Identity database, another attempt... In-Reply-To: <951013.170750.4L0.rnr.w165w@cybrspc.mn.org> Message-ID: On Fri, 13 Oct 1995, Roy M. Silvernail wrote: > Have you flown recently? They now ask you this scripted question about > whether you have been approached by anyone you don't know since arriving > at the airport, and warn you not to accept anything from a stranger or > leave your carry-on baggage unattended until you board the plane. The > ticket agent told me it was a "new FAA regulation". I hadn't flown > anywhere for a few years. Anyone know how long this has been happening? This probably dates back to the time when a palestinian group tried to blow up an El Al flight from London by persauding the pregnant Irish girlfriend of one to carry a package for a friend. Flights from London have had the spiel ever since. El Al still does the best pre-flight screening (much more detailed questioning, and the security staff actually listen to the answers. Simon ---- (defun modexpt (x y n) "computes (x^y) mod n" (cond ((= y 0) 1) ((= y 1) (mod x n)) ((evenp y) (mod (expt (modexpt x (/ y 2) n) 2) n)) (t (mod (* x (modexpt x (1- y) n)) n)))) From MIGUELDIAZ at megaweb.com Sat Oct 14 14:24:14 1995 From: MIGUELDIAZ at megaweb.com (Miguel Diaz) Date: Sat, 14 Oct 95 14:24:14 PDT Subject: Netscape rewards are an insult Message-ID: <199510142121.RAA06091@mail-e1a.megaweb.com> Dr. Frederick B. Cohen writes in part: >The idea that Netscape (like Microsoft) thinks they can >get free testing services from all over the net by real >experts just by offerring a tee shirt is down right >offensive. > Ditto. The next major hack of Netscape will likely be used to bring that company to its knees. Unless one assumes that obvious backdoors will still be unprotected by their new code, a lot of computing time for brute force attacks and algorithm development will have to be spent to properly crack Netscape again. I seriously doubt the successful individuals will merely settle for fame and not fortune this time around. OTOH I would much rather see MS get hacked next. If the rumors of MS being a Hard Drive Peeping Tom are true, then I wonder if there might be a way to send a byte bomb to their bit bucket??....... Be Well From rsnyder at janet.advsys.com Sat Oct 14 14:51:11 1995 From: rsnyder at janet.advsys.com (Bob Snyder) Date: Sat, 14 Oct 95 14:51:11 PDT Subject: Netscape rewards are an insult In-Reply-To: <9510141153.AA16412@all.net> Message-ID: <199510142153.RAA01017@janet.advsys.com> fc at all.net said: > The idea that Netscape (like Microsoft) thinks they can get free > testing services from all over the net by real experts just by > offerring a tee shirt is down right offensive. They can. Maybe not from you, but people were poking holes in Netscape before *anything* was offered. Greed isn't the sole motivator of people. > I have a better idea. How about an open market in break-in > software. We crack Netscape and offer the crack code to the highest > bidder. Bids start at US$25K per hole. For the insult, Netscape has > to outbid the competition by a factor of 2 to get the details of the > hole. Here's how it works: A bit too mercenary-like for my tastes, and a bit lacking in ethics. Tracking down security holes and selling them to the highest bidder without giving details to all doesn't just hurt Netscape. > I have an even better idea. How about if Netscape gets some > competent programmers with real security expertise, adds in some good > change controls, a serious internal testing program, quality control > ala ISO-9000, internal IT auditors, external IT auditors, training > and education for their employees, and everything else it takes to be > in the software business in a serious way. This sounds like a better idea. And it isn't mutually exclusive with the "Bugs Bounty" or T-shirts. >From what I recall, Netscape has hired decent programmers. I don't know about their internal business practices. From what I've seen, though, they have the right attittude about fixing security, rather than sweeping it under the rug and suing people who alledge security faults. Certainly their release of their PRNG code is proof of that. Bob From tomw at orac.engr.sgi.com Sat Oct 14 14:57:33 1995 From: tomw at orac.engr.sgi.com (Tom Weinstein) Date: Sat, 14 Oct 95 14:57:33 PDT Subject: Certificate proposal In-Reply-To: Message-ID: <199510142157.OAA07731@orac.engr.sgi.com> In article , daw at lagos.CS.Berkeley.EDU (David A Wagner) writes: > In article <199510120147.LAA13833 at sweeney.cs.monash.edu.au>, > Jiri Baum wrote: >> What you are missing is that you should not say >> "I want to send my credit card number to Egghead Software" >> you should say >> "I want to send my credit card number to 12 34 56 78 9A BC DE F0" > Why does this sound so much like defining the problem away? > Maybe I just don't get it... I agree. Sending your cc# to a key or an IP address is not what you want to do. As a consumer, I want to make sure that I send my cc# to the merchant I am buying from. -- Sure we spend a lot of money, but that doesn't mean | Tom Weinstein we *do* anything. -- Washington DC motto | tomw at engr.sgi.com From jya at pipeline.com Sat Oct 14 15:52:44 1995 From: jya at pipeline.com (John Young) Date: Sat, 14 Oct 95 15:52:44 PDT Subject: ESP_ion Message-ID: <199510142252.SAA29703@pipe1.nyc.pipeline.com> Simone has provided a copy of the LA Times July 23 report on the CIA's economic espionage. ESP_ion (10 kb) From alano at teleport.com Sat Oct 14 16:25:18 1995 From: alano at teleport.com (Alan Olsen) Date: Sat, 14 Oct 95 16:25:18 PDT Subject: Netscape question transformed Message-ID: <199510142325.QAA10194@desiree.teleport.com> At 11:12 PM 10/13/95 -0700, jsw wrote: >zoetrope at infinet.com wrote: >> Why would a compony like Netscape jeapordise themselves by even >> letting out a beta version so >> hackers have time to find bugs before the full version is released. Don't >> take me wrong I have only been on the net fer a little over a year and Love >> Netscape. And If I knew what I was Doing I would love to help them..... > > The reason we do it is that without wide exposure outside the >company, it is virtually impossible to get complete testing coverage. >Given the incredible variety of machines, OS's, peripherals, etc. >that are available in the real world, there is no way we could >re-create every possible configuration in the lab. I think that the main reason people have problems with the testing offer on the beta is the lack of responses to bugs in the past. I have seen many complaints from people on the net complaining that bugs they had reported in .90 had continued on into new and continued versions. That if they recieved a message back from Netscape it was just an infobot, and a rather hostilly worded one at that. (The infobot has been lightened up a great deal.) Netscape has never had the staff to properly respond to the mail volume they have recieved. They have been trying to improve this but it is difficult to man such a project with people who are able to sort through the piles of dreck to find those people reporting serious problems. (Also, the bug rewards are only for "serious bugs". Who defines what is serious and what is not. I know of a couple that have been hanging around for a couple of versions now. Maybe I should test if they got fixed with 2.0b1. Probibly not. They only hit a handful of people.) Netscape is still a pretty new company. Some seem to forget that .90 was only released about a year ago. How long does it take to get a proper QC department in place? (After the shakeup in February(?) when the new President was hired, I would have thought it would have been done then. Now I am not so sure...) I know of at least one product that went out the door in recient months that was not properly tested. (The stack and dialer used with Netscape PE comes to mind.) I realize that sales sometimes forces things to be released before its time, but there has to be some basic controls for quality control. (I will not mention some of the bigger gaffes with 1.0 and 1.1 since not all of those were publicized. A few simple things could have caught them before they went out the door.) I want to see Netscape succeed, but when you hear about things like product being released on the net without warning those people responsible for supporting it, bug reports being ignored so a ship date can be made, and the like, it makes you really wonder. I am finding problems with 2.0b1 that could have been found just by using the product for a couple of days! Most of the problems I have seen with Netscape could be solved with better communications between departments within the company and some strong testing procedures. > We also can't visit every web page, or think of every combination >of features that clever people in the real world come up with every >day. Somethings are real simple. Things like giving it to a handful of people and letting them use it for a couple of days before you release it to the rest of the world. 90% of the bugs will be pointed out through having someone beat on it as they would any other peice of software. And those people should be someone other than the programmers. (Sometimes you get too close to the code to really stress it properly.) I agree that you need to have a beta program. Not everything can be tested. But QC is important. This is not Uncle Jim's pet project anymore... All of this has been brought up on the net before. Sometimes it seems like the responses are more defensive than trying to find out the real problems and fix them. So far, you have been one of the few who has pushed for getting some of these things fixed in a timely manner. (I can name a few others as well. They seem to get burned out after a while though...) I think my biggest questions right now are: "Is there a formal testing procedure for product that is about to go out the door? Is there a real QC department and do they have the power to stop releases if significant problems are found?" | Visualize whirled keys | alano at teleport.com | |"It's only half a keyserver. I had to split the | Disclaimer: | |other half with the government man." - Black Art | Ignore the man | | -- PGP 2.6.2 key available on request -- | behind the keyboard.| | http://www.teleport.com/~alano | | From cedric at isicom.fr Sat Oct 14 18:06:30 1995 From: cedric at isicom.fr (Cedric Ingrand) Date: Sat, 14 Oct 95 18:06:30 PDT Subject: Netscape rewards are an insult Message-ID: <199510150106.CAA29348@s2.isicom.fr> > I have a better idea. How about an open market in break-in > software. We crack Netscape and offer the crack code to the highest > bidder. Bids start at US$25K per hole. For the insult, Netscape has to > outbid the competition by a factor of 2 to get the details of the hole. You're talking gaping security holes. They're merely talking bugs. I don't know if it's already been covered elsewhere, but I saw Jim Clark at a press conference in Paris a couple of weeks ago, and he more or less laid out what he intended to do about security: "First of all, I am chairing an audit commitee for security. All new security-related and encryption-related mechanisms that we build into our products has to go through this audit commitee before being released. The audit commitee hires outside auditors, security auditors, particularly RSA and experts out of academia, Ron Rivest from MIT and people like this to do the audit of our security systems. Another thing we're doing is publishing the source code which does the security so people can just see what the algorithms are. Had we done that in the first place, if we had published our source code, people wouldn't say 'ha ha! It's easy to guess that you're using this gate as the starting point of the random number'. So we think that by publishing the algorithms, having a security audit by an outsider auditor... it's sort of like the accounting profession, they have an audit commitee on the board of directors, the audit is actually done by an outside financial institution and to some degree it's exactly what's happening in security. We think that we were the first company to introduce this technology to the internet and so we were the first company to come under attack. We were careless, and we're not going to be careless in the future." I haven't seen Netscape deliver on this promise of publishing their encryption code, so I'll keep the promise on tape for a little while (-: Best, Cedric. --------------------------------------------------------- Cedric Ingrand - cedric at planetepc.fr - +33.1.43.98.88.56. From mark at lochard.com.au Sat Oct 14 21:23:04 1995 From: mark at lochard.com.au (Mark) Date: Sat, 14 Oct 95 21:23:04 PDT Subject: airport security In-Reply-To: <199510141621.JAA19984@desiree.teleport.com> Message-ID: <199510150048.AA29926@junkers.lochard.com.au> Crypto relevance: none. >I remember back during one of the previous FAA panics over terrorism. I was >at the Portland airport discussing the measures with an FAA inspector. He >explained why they had to have all the searches and stuff to stop anyone >from blowing up the plane. I pointed out to him that if anyone wanted to do >that, they would just lay off a line of mortars from the hills overlooking >the airport across the river. He got very quiet and very worried... Heh, one of our products gets a direct feed from the radar and flight track info and displays it on a real time screen showing planes, noise levels and other cutesy stuff in 3d. This sort of thing would be picked up and you could replay over and over the dot of the mortar hitting the plane, or a SAM missile coming up to the plane and both falling to the ground. Normal use is for telling off pilots for flying outside the environmental guidelines, or attaching resident complaints to flights but we have the odd scare sitting in the databases. Problem is (??) that since Australia has such high safety standards, we have to get all the booboo's from our international sites. Cheers, Mark mark at lochard.com.au From mpj at netcom.com Sat Oct 14 21:28:59 1995 From: mpj at netcom.com (Michael Paul Johnson) Date: Sat, 14 Oct 95 21:28:59 PDT Subject: Where to Get PGP Message-ID: -----BEGIN PGP SIGNED MESSAGE----- WHERE TO GET THE PRETTY GOOD PRIVACY PROGRAM (PGP) FAQ 14 OCTOBER 1995 Long version For questions not covered here, please see the MAIN alt.security.pgp FAQ at ftp://ftp.prairienet.org/pub/providers/pgp/pgpfaq.txt WHAT IS THE LATEST VERSION OF PGP? Platform(s) Latest Version Distribution File Names __________________________________________________________________________ | | | | |DOS, Unix, | Viacrypt PGP 2.7.1 | disk sets | |Mac, Windows, | | | |or WinCIM/CSNav | | | |________________|_____________________|_________________________________| | | | | |Hardware-based | Viacrypt 2.7.1 | disk sets | |PGP/Token | | | |________________|_____________________|_________________________________| | | | | |DOS, Unix, VAX, | MIT PGP 2.6.2 | pgp262.zip (DOS + docs) | |others | | pgp262s.zip (source) | | | | pg262s.zip source on CompuServe | | | | pgp262s.tar.gz (source) | | | | pgp262s.tar.Z (source) | | | | pgp262dc.zip (documentation) | | | | pg262d.zip (docs on CompuServe) | |________________|_____________________|_________________________________| | | | | |Macintosh | MIT PGP 2.6.2 | MacPGP2.6.2-130v1.hqx | | | Mac version 1.3.0 | m262pgp.hqx (same as above) | | | | MacPGP2.6.2-130v1.source.asc | | | | m262pgps.asc (same as above) | |________________|_____________________|_________________________________| | | | | |Power Mac | Zbigniew's "beta" | Fatmacpgp262b131.sea.hqx | | | | f262pgp.hqx (same as above) | | | | Fatmacpgp262b131.src.hqx | | | | f262pgps.hqx (same as above) | |________________|_____________________|_________________________________| | | | | |Amiga | PGP 2.6.2 Amiga 1.4 | pgp262-a14-000.lha | | | | pgp262-a14-020.lha | | | | pgp262-a14-src.lha | | | | PGPAmi262is.lha (international) | |________________|_____________________|_________________________________| | | | | |Atari | Atari MIT PGP 2.6.2 | pgp262st.zip | | | Atari International | pgp262ib.zip | |________________|_____________________|_________________________________| | | | | |OS/2 | MIT PGP 2.6.2 | pgp262-os2.zip | | | | on ftp.gibbon.com | |________________|_____________________|_________________________________| | | | | |Non-USA version | PGP 2.6.2i from | pgp262i.zip (DOS executable) | |to avoid RSAREF | Stale Schumacher, | pgp262ix.zip (32-bit DOS) | |license. | Kai Uwe Rommel, | pgp262i-os2.zip (OS/2 exe) | |(various | Harald Denker, and | pgp262ib.zip (Atari) | |platforms) | Peter Simons | PGPAmi262is.lha (Amiga) | | | | pgp262is.zip (source) | | | | pgp262is.tar.gz (Unix source) | | | | | | | Canadian "mutant" | MacPGP262ca124.exe.sea.hqx | | | not for USA use | MacPGP262ca124.src.sea.hqx | |________________|_____________________|_________________________________| | | | | |Unofficial | PGP 2.6.2ui | pgp262ui.zip (executable) | |non-USA version | Not for use in the | pg262uis.zip (source) | |fully under Gnu | USA because of | pg262uix.zip (DOS extended) | |public license | probable patent | | |(based on 2.3a | infringement | | |code) | problems. | | |________________|_____________________|_________________________________| BUG LISTS http://www.ifi.uio.no/~staalesc/PGP/bugs.html http://www.mit.edu:8001/people/warlord/pgp-faq.html WHERE CAN I GET VIACRYPT PGP? Viacrypt has versions of PGP complete with licenses for commercial use of the RSA and IDEA encryption algorithms. Viacrypt PGP comes in executable code only (no source code), but it is based on (and just as secure as) the freeware PGP. Viacrypt PGP for Windows is the only real Windows PGP (and even it is partially a quickwin executable that looks like a DOS port). Still, it is much better from an interface standpoint than all the others. Please contact ViaCrypt for pricing (about US $100 up), the latest platforms, and availablity at 800-536-2664 8:30am to 5:00pm MST, Monday - Friday. They accept VISA, MasterCard, AMEX and Discover credit cards. http://www.viacrypt.com If you have further questions, please ask: Paul E. Uhlhorn Director of Marketing, ViaCrypt Products Mail: 9033 N. 24th Avenue Suite 7 Phoenix AZ 85021-2847 Phone: (602) 944-0773 Fax: (602) 943-2601 Internet: viacrypt at acm.org Compuserve: 70304.41 WHERE CAN I FTP PGP IN NORTH AMERICA? If you are in the USA or Canada, you can get PGP by following the instructions in any of: ftp://net-dist.mit.edu/pub/PGP/README ftp://ftp.csn.net/mpj/README.MPJ ftp://miyako.dorm.duke.edu/pub/GETTING_ACCESS ftp://ftp.netcom.com/pub/mp/mpj/README.MPJ ftp://ftp.netcom.com/pub/dd/ddt/crypto/READ_ME_FIRST! ftp://ftp.netcom.com/pub/dd/ddt/crypto/pgp_ftp_instructions.txt ftp://ftp.eff.org Follow the instructions found in README.Dist that you get from one of: ftp://ftp.eff.org/pub/Net_info/Tools/Crypto/README.Dist gopher.eff.org, 1/Net_info/Tools/Crypto gopher://gopher.eff.org/11/Net_info/Tools/Crypto http://www.eff.org/pub/Net_info/Tools/Crypto/ ftp://ftp.csua.berkeley.edu/pub/cypherpunks/pgp/ ftp://ftp.gibbon.com/pub/pgp/README.PGP http://www.gibbon.com/getpgp.html ftp://ftp.wimsey.bc.ca/pub/crypto/software/README WHERE IS PGP ON THE WORLD WIDE WEB? http://web.mit.edu/network/pgp-form.html http://www.ifi.uio.no/~staalesc/PGP/home.html http://rschp2.anu.edu.au:8080/crypt.html http://www.eff.org/pub/Net_info/Tools/Crypto/ http://community.net/community/all/home/solano/sbaldwin http://www.cco.caltech.edu/~rknop/amiga_pgp26.html http://www.csua.berkeley.edu/cypherpunks/home.html http://www.leo.org/archive/os2/crypt/ http://colossus.net/wepinsto/wshome.html http://www.cs.hut.fi/ssh/crypto/ WHERE IS PGP ON COMPUSERVE? GO NCSAFORUM. Follow the instructions there to gain access to Library 12: Export Controlled. Compuserve file names are limited, so look for PGP262.ZIP, PG262S.ZIP (source code), PGP262.GZ (Unix source code) and PG262D.ZIP (documentation only). AOL Go to the AOL software library and search "PGP" or ftp from ftp://ftp.csua.berkeley.edu/pub/cypherpunks/pgp. WHAT BULLETIN BOARD SYSTEMS CARRY PGP? MANY BBS carry PGP. The following carry recent versions of PGP and allow free downloads of PGP. US 303-343-4053 Hacker's Haven, Denver, CO Lots of crypto stuff here. 303-772-1062 Colorado Catacombs BBS, Longmont CO 8 data bits, 1 stop, no parity, up to 28,800 bps. Use ANSI terminal emulation. For free access: log in with your own name, answer the questions. 303-914-0031 The FreeMatrix ]I[ 314-896-9309 The KATN BBS 317-791-9617 Computer Virus Research Center (CVRC) BBS, Indianapolis, IN Login Name: PGP USER Password: PGP 501-791-0124, 501-791-0125 The Ferret BBS, North Little Rock, AR Login name: PGP USER Password: PGP 506-457=0483 Data Intelligence Group Corporation BBS 508-668-4441 Emerald City, Walpole, MA 601-582-5748 CyberGold BBS 612-690-5556, !CyBERteCH SeCURitY BBS! Minneapolis MN, - write a letter to the sysop requesting full access. 914-667-4567 Exec-Net, New York, NY 915-587-7888, Self-Governor Information Resource, El Paso, Texas UK 01273-688888 GERMANY +49-781-38807 MAUS BBS, Offenburg - angeschlossen an das MausNet +49-521-68000 BIONIC-BBS Login: PGP WHERE CAN I FTP PGP CLOSE TO ME? AU ftp://ftp.cc.adfa.oz.au/pub/security/pgp23/macpgp2.3.cpt.hqx ftp://ftp.iinet.net.au:mirrors/pgp (Australia ONLY) ftp://plaza.aarnet.edu.au/micros/mac/umich/misc/documentation/howtomacpgp2.7.txt DE ftp://ftp.informatik.tu-muenchen.de/pub/comp/os/os2/crypt ftp://ftp.informatik.uni-hamburg.de/pub/virus/crypt/pgp ftp://ftp.fu-berlin.de/mac/sys/init/MacPGP2.6uiV1.2en.cpt.hqx.gz ftp://ftp.tu-clausthal.de/pub/atari/misc/pgp/pgp261b.lzh ftp://ftp.uni-kl.de/pub/aminet/util/crypt ftp://ftp.uni-paderborn.de/pub/aminet/util/crypt ftp://ftp.westfalen.de/pd/Atari/Pgp (Atari) ftp://tupac-amaru.informatik.rwth-aachen.de ES ftp://goya.dit.upm.es ftp://encomix.es/pub/pgp/pgp262i/pgp262i.zip IT ftp://ftp.dsi.unimi.it/pub/security/crypt/PGP FI ftp://ftp.funet.fi/pub/crypt NL ftp://ftp.nl.net/pub/crypto/pgp ftp.nic.surfnet.nl/surfnet/net-security/encryption/pgp NZ ftp://ftphost.vuw.ac.nz ftp://rs950.phys.waikato.ac.nz/pub/incoming/pgp (New Zealand ONLY) SE ftp://leif.thep.lu.se TW ftp://nctuccca.edu.tw/PC/wuarchive/pgp/ UK ftp://ftp.demon.co.uk/pub/amiga/pgp ftp://ftp.ox.ac.uk/pub/crypto/pgp ftp://src.doc.ic.ac.uk/aminet/amiga-boing ftp://unix.hensa.ac.uk/pub/uunet/pub/security/virus/crypt/pgp USA ftp://atari.archive.umich.edu/pub/atari/Utilities/pgp261st.zip (Atari) ftp://ftp.leo.org/pub/comp/os/os2/crypt ftp://wuarchive.wustl.edu/pub/aminet/util/crypt ftp://ftp.netcom.com/pub/gr/grady/PGP_NOT_FOR_EXPORT/MacPGP262ca124.exe.sea.hqx ftp://ftp.netcom.com/pub/gr/grady/PGP_NOT_FOR_EXPORT/MacPGP262ca124.src.sea.hqx ZA ftp://ftp.ee.und.ac.za/pub/crypto/pgp /pub/archimedes /pub/pgp /pub/mac/MacPGP HOW CAN I GET PGP BY EMAIL? If you have access to email, but not to ftp, send a message saying "help" to ftpmail at decwrl.dec.com, mailserv at nic.funet.fi, or ftp-request at netcom.com To get pgp 2.6.2i by email: Send a message to pgp at hypnotech.com with your request in the Subject: field. Subject What you will get GET pgp262i.zip MS-DOS executable (uuencoded) GET pgp262is.zip MS-DOS source code (uuencoded) GET pgp262is.tar.gz UNIX source code (uuencoded) For FAQ information, send e-mail to mail-server at rtfm.mit.edu with send usenet/news.answers/ftp-list/faq in the body of the message. WHERE IS MACPGP? ftp://ftp.csn.net/mpj/README.MPJ ftp://ftp.confusion.net/pub/pgp/mac-pgp/README ftp://highway.alinc.com/users/jordyn/mac-pgp/README ftp://miyako.dorm.duke.edu/pub/GETTING_ACCESS WHERE IS VAX PGP? Get the full PGP distribution, then get VAXPGP262.TAR.Z from the berkeley site for additional files needed to compile PGP for the VAX and a precompiled version for VAX/VMS 5.5-2. WHERE CAN I GET MORE PGP INFORMATION? http://www.csn.net/~mpj ftp://ftp.prairienet.org/pub/providers/pgp/pgpfaq.txt ftp://starfire.ne.uiuc.edu/preston/pgpquick.ps (and pgpquick.doc) http://www.prairienet.org/~jalicqui/ http://www.mit.edu:8001/people/warlord/pgp-faq.html http://draco.centerline.com:8080/~franl/crypto.html http://draco.centerline.com:8080/~franl/pgp/bug0.html http://www.eff.org/pub/EFF/Issues/Crypto/ITAR_export/cryptusa_paper.ps.gz http://www.eff.org/pub/EFF/Issues/Crypto/ITAR_export/cryptusa.paper http://www.cco.caltech.edu/~rknop/amiga_pgp26.html Email pgp-help at hks.net ftp://ds.internic.net/internet-drafts/draft-pgp-pgpformat-00.txt ftp://ds.internic.net/internet-drafts/draft-ietf-pem-mime-08.txt http://www.cis.ohio-state.edu/ ftp://ftp.csn.net/mpj/public/pgp/MacPGP262_manual.sit.hqx http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html http://web.cnam.fr/Network/Crypto/ (c'est en francais) http://web.cnam.fr/Network/Crypto/survey.html (en anglais) http://www2.hawaii.edu/~phinely/MacPGP-and-AppleScript-FAQ.html ftp://ftp.prairienet.org/pub/providers/pgp/pgpbg11.asc (Beginner's Guide) http://pluto.cc.umr.edu/~steve/Privacy_Page.html/Where_is_PGP.html http://www.netresponse.com/zldf http://bookweb.cwis.uci.edu:8042/Orders/ubipgp.html http://www.geopages.com/Athens/1802/pgpfaq.html http://www.pgp.net/pgp http://www.sydney.sterling.com:8080/~ggr/pgpmoose.html Beginner's Guide: send email to slutsky at lipschitz.sfasu.edu, subject: bg2pgp WHAT ARE SOME GOOD PGP BOOKS? Protect Your Privacy: A Guide for PGP Users by William Stallings Prentice Hall PTR ISBN 0-13-185596-4 US $19.95 This is a good technical manual for PGP for most users, and makes a better reference than the "official" documentation that comes with PGP. I recommend it highly. PGP: Pretty Good Privacy by Simson Garfinkel O'Reilly & Associates, Inc. ISBN 1-56592-098-8 US $24.95 E-Mail Security: How to Keep Your Electronic Mail Private "Covers PGP/PEM" by Bruce Schneier Wiley Publishing The Computer Privacy Handbook: A Practical Guide to E-Mail Encryption, Data Protection, and PGP PRivacy Software by André Bacard Peachpit Press ISBN 1-56609-171-3 US $24.95 800-283-9444 or 510-548-4393 This is an interesting book on the sociology and politics of privacy in the computer age as well as a practical manual on using PGP. Must reading for all members of Congress, presidential staff, members of Parliament, and ordinary citizens who would like to take reasonable steps to protect themselves from some forms of crime that have been made easy by technology. THE OFFICIAL PGP USER'S GUIDE by Philip R. Zimmerman MIT Press April 1995 - 216 pp. - paper - US $14.95 - ISBN 0-262-74017-6 ZIMPP Standard PGP documentation neatly typeset and bound. PGP SOURCE CODE AND INTERNALS by Philip R. Zimmerman April 1995 - 804 pp. - US $55.00 - 0-262-24039-4 ZIMPH This is a handy printed reference with commented source code for PGP 2.6.2 with great educational value. This is a great way to study some of the computer science and information theory behind the world's best email privacy tool without having either a computer or reams of printouts handy. Recommended reading on long airline flights for serious students of computer science and computer security. Ordering information for the last two books: Call US Toll Free 1-800-356-0343 or 617-625-8569. Cite code 5CSC and number 661. Allow 4-6 weeks for delivery within North America. Allow 8-12 weeks for delivery outside of North America. How to Use PGP, 61 pages, (Pub #121) from the Superior Broadcasting Company, Box 1533-N, Oil City, PA 16301, phone: (814) 678-8801 (about US $10-$13). WHERE CAN I GET PGP LANGUAGE MODULES? These are suitable for most PGP versions. http://www.ifi.uio.no/~staalesc/PGP/language.html ftp://ftp.ifi.uio.no/pub/pgp/doc/ German ftp://ftp.ox.ac.uk/pub/crypto/pgp/language/pgp23_german.txt ftp://ftp.csn.net/mpj/public/pgp/pgp_german.txt ftp://ftp.csn.net/mpj/public/pgp/PGP_german_docs.lha ftp://ftp.informatik.uni-hamburg.de:/pub/virus/crypt/pgp/language/pgp_german.asc ftp://ftp.leo.org/pub/comp/os/os2/crypt/pgp262i-german.zip Italian ftp://ftp.dsi.unimi.it/pub/security/crypt/PGP/pgp-lang.italian.tar.gz ftp://ftp.funet.fi/pub/crypt/ghost.dsi.unimi.it/PGP/pgp-lang.italian.tar.gz ftp://ftp.csn.net/mpj/public/pgp/pgp-lang.italian.tar.gz Japanese ftp://ftp.ox.ac.uk/pub/crypto/pgp/language/pgp23_japanese.tar.gz ftp://ftp.csn.net/mpj/public/pgp/pgp-msgs-japanese.tar.gz Lithuanian ftp://ftp.ox.ac.uk/pub/crypto/pgp/language/pgp23_lithuanian.zip ftp://ftp.csn.net/mpj/public/pgp/pgp23ltk.zip Norwegian ftp://ftp.ox.ac.uk/pub/crypto/pgp/language/pgp23_norwegian.tar.gz ftp://ftp.ox.ac.uk/pub/crypto/pgp/language/pgp26i_norwegian.zip Romanian ftp://ftp.ox.ac.uk/pub/crypto/pgp/language/pgp26_romanian.tar.gz ftp://ftp.encomix.es/pub/pgp/lang/pgp-romanian.zip http://www.info.polymtl.ca/zuse/tavi/www/archive/ro_2.6.2.zip http://www.info.polymtl.ca/zuse/tavi/www/archive/language.txt Russian ftp://ftp.ox.ac.uk/pub/crypto/pgp/language/pgp26_russian.zip ftp://ftp.kiae.su/unix/crypto/pgp/pgp26ru.zip ftp://ftp.csn.net/mpj/public/pgp/pgp26ru.zip Spanish ftp://ftp.dsi.unimi.it/pub/security/crypt/PGP/pgp-lang.spanish.tar.gz ftp://ftp.funet.fi/pub/crypt/ghost.dsi.unimi.it/pgp-lang.spanish.tar.gz ftp://ftp.csn.net/mpj/public/pgp/pgp-lang.spanish.tar.gz ftp://ftp.encomix.es/pub/pgp/lang/pgp262i-spanish.zip Swedish ftp://ftp.ox.ac.uk/pub/crypto/pgp/language/pgp23_swedish.txt ftp://ftp.csn.net/mpj/public/pgp/pgp_swedish.txt IS PGP MORALLY RIGHT? PGP itself is morally neutral. What you do with it is not. Protecting privacy, prevention of criminal theft, and taking due diligence to protect certain business information (like credit card numbers, customer lists, etc.) are good uses for PGP. Concealing criminal or other immoral activity is wrong. You can fool the police some of the time, but you can't fool God. IS PGP LEGAL? Pretty Good Privacy is legal if you follow these rules: Don't export PGP from the USA except to Canada, or from Canada except to the USA, without a license. If you are in the USA, use either Viacrypt PGP (licensed for commercial use) or MIT PGP using RSAREF (limited to personal, noncommercial use). Outside of the USA, where RSA is not patented, you may prefer to use a version of PGP (2.6.i) that doesn't use RSAREF to avoid the restrictions of that license. If you are in a country where the IDEA cipher patent holds in software (including the USA, Canada, and some countries in Europe), make sure you are licensed to use the IDEA cipher commercially before using PGP commercially. (No separate license is required to use the freeware PGP for personal, noncommercial use). For direct IDEA licensing, contact Ascom Systec. Ascom Systec has taken over the distribution of IDEA licenses effective April 1, 1995. Erhard Widmer is the person responsible for the sales aspects, and Peter Hartmann is responsible for the technical aspects. They can be reached as follows: Erhard Widmer, Ascom Systec AG, Dep't. CMVV Phone +41 64 56 59 83 Peter Hartmann, Ascom Systec AG, Dep't. CMN Phone +41 64 56 59 45 Fax: +41 64 56 59 90 e-mail: IDEA at ascom.ch Mail address: Gewerbepark, CH-5506 Maegenwil (Switzerland) Don't sell PGP based on Philip Zimmermann's source code in North America unless you are reselling for Viacrypt (because they have an exclusive marketing agreement on Philip Zimmermann's copyrighted code). (Selling shareware/freeware disks or connect time is OK). This restriction might be lifted with PGP 3.0, since it is a complete rewrite by Colin Plumb. Distribution and use restrictions on that version are still to be determined. If you modify PGP (other than porting it to another platform or adapting it to another compiler), don't call it PGP (TM) or Pretty Good Privacy (TM) without Philip Zimmermann's permission. WHAT IS PHILIP ZIMMERMANN'S LEGAL STATUS? Philip Zimmermann is under investigation for alleged violation of export regulations, with a grand jury hearing evidence. There is speculation that the Feds are trying to make an example of Phil through prolonged and expensive legal proceedings, thus reaping a reward of Fear, Uncertainty, and Doubt to discourage development and use of strong crypto in the USA. Even though people in this country are considered innocent until proven guilty, there is a problem with the system in that it can take lots of money for innocent folks to defend themselves. Because of the broad implications for freedom, privacy, and the First Amendment of the U. S. Constitution in this case, I implore all of you who can to help out with Phil's rather significant legal and travel expenses involved in his defense. Phil is a nice guy with a wife and two children to support, and he has done a great deal in his PGP social activism to help all of us. To send a check or money order by mail, make it payable, NOT to Phil Zimmermann, but to "Philip L. Dubois, Attorney Trust Account." Mail the check or money order to the following address: Philip Dubois 2305 Broadway Boulder, CO USA 80304 (Phone #: 303-444-3885) To send a wire transfer, your bank will need the following information: Bank: VectraBank Routing #: 107004365 Account #: 0113830 Account Name: "Philip L. Dubois, Attorney Trust Account" To contribute using your credit card (secured with PGP), simply compose a message in plain ASCII text giving the following: the recipient ("Philip L. Dubois, Attorney Trust Account"); the bank name of your VISA or MasterCard; the name which appears on it (yours, hopefully :-)); a telephone number at which you can be reached in case of problems; the card number; date of expiry; and, most important, the amount you wish to donate. (Make this last item as large as possible.) Then use PGP to encrypt and ASCII-armor the message using Phil Dubois's public key, distributed with PGP 2.6.2. E-mail the output file to Phil Dubois (dubois at csn.org). Please be sure to use a "Subject:" line reading something like "Phil Zimmermann Defense Fund" so he'll know to decrypt it right away. WHERE CAN I GET WINDOWS & DOS SHELLS FOR PGP? http://www.ifi.uio.no/~staalesc/AutoPGP.html http://www.dayton.net/~cwgeib ftp://oak.oakland.edu/SimTel/msdos/security/apgp22b.zip ftp://oak.oakland.edu/SimTel/win3/security/pgpw40.zip http://alpha.netaccess.on.ca/~spowell/crypto/pwf31.zip ftp://ftp.netcom.com/pub/dc/dcosenza/pgpw40.zip ftp://Sable.ox.ac.uk/pub ftp://ftp.firstnet.net/pub/windows/winpgp/pgpw40.zip <WinPGP's home site> http://www.firstnet.net/~cwgeib/welcom.html ftp://ftp.netcom.com/pub/ec/ecarp/pgpwind.zip http://www.eskimo.com/~joelm (Private Idaho) ftp://ftp.eskimo.com/~joelm http://www.xs4all.nl/~paulwag/security.htm http://www.LCS.com/winpgp.html ftp://mirrors.aol.com/mir01/circa/pub/pc/win3/util/pwf31.zip http://netaccess.on.ca/~rbarclay/index.html http://netaccess.on.ca/~rbarclay/pgp.html ftp://ftp.leo.org/pub/comp/os/os2/crypt/gcppgp10.zip ftp://ftp.leo.org/pub/comp/os/os2/crypt/pmpgp.zip http://iquest.com/~aegisrcs Compuserve: Library 3, European Forum. Library 6, NCSA Forum PCWorld Online Forum. WUGNET Forum. WinShare Forum See also the BBS list for PGP, above. WHERE CAN I GET THE MACPGP KIT? ftp://duke.bwh.harvard.edu:/pub/adam/mcip/MacPGP_icons.sit.hqx ftp://duke.bwh.harvard.edu:/pub/adam/mcip/MacPGPkit.hqx ftp://duke.bwh.harvard.edu:/pub/adam/mcip/MacPGPkitSources.sit.hqx ftp://ftp.netcom.com/pub/dd/ddt/crypto/pgp_tools/MacPGPkit1.6.sit OTHER MAC ADD-ONS ftp://ftp.netcom.com/pub/dd/ddt/crypto/pgp_tools/ChainMail.0.7.sit ftp://ftp.netcom.com/pub/dd/ddt/crypto/pgp_tools/Eudora->PGP Scripts1.5.sit ftp://ftp.csn.net/mpj/I_will_not_export/crypto_???????/pgp/mac/AppleScripts WHERE IS THE PGP 3.0 API DRAFT? The (prelim. draft) PGP 3.0 API is at: ftp://ftp.netcom.com/pub/dd/ddt/crypto/crypto_info/950212 pgp3spec.txt All comments on it for the PGP 3.0 API Team should be sent to: WHAT OTHER FILE ENCRYPTION (DOS, MAC) TOOLS ARE THERE? PGP can do conventional encryption only of a file (-c) option, but you might want to investigate some of the other alternatives if you do this a lot. Alternatives include Quicrypt and Atbash2 for DOS, DLOCK for DOS & UNIX, Curve Encrypt (for the Mac), HPACK (many platforms), and a few others. Quicrypt is interesting in that it comes in two flavors: shareware exportable and registered secure. Atbash2 is interesting in that it generates ciphertext that can be read over the telephone or sent by Morse code. DLOCK is a no-frills strong encryption program with complete source code. Curve Encrypt has certain user-friendliness advantages. HPACK is an archiver (like ZIP or ARC), but with strong encryption. A couple of starting points for your search are: ftp://ftp.csn.net/mpj/qcrypt10.zip ftp://ftp.informatik.uni-hamburg.de/pub/virus/crypt/file/ ftp://ftp.csn.net/mpj/I_will_not_export/crypto_???????/file/ (see ftp://ftp.csn.net/mpj/README for the ???????) ftp://ftp.miyako.dorm.duke.edu/mpj/crypto/file/ HOW DO I SECURELY DELETE FILES (DOS)? If you have the Norton Utilities, Norton WipeInfo is pretty good. I use DELETE.EXE in del110.zip, which is really good at deleting existing files, but doesn't wipe "unused" space. ftp://ftp.csn.net/mpj/public/del120.zip ftp://ftp.demon.co.uk/pub/ibmpc/security/realdeal.zip WHAT DO I DO ABOUT THE PASS PHRASE IN MY WINDOWS SWAP FILE? The nature of Windows is that it can swap any memory to disk at any time, meaning that all kinds of interesting things could end up in your swap file. ftp://ftp.firstnet.net/pub/windows/winpgp/wswipe.zip WHAT EVER HAPPENED TO PGPfone(tm)? PGPfone is in beta test for Macintosh users. A Windows 95 version is being developed. http://web.mit.edu/network/pgpfone ftp://net-dist.mit.edu/pub/PGPfone/README ftp.hacktic.nl/pub/pgp/pgpfone WHERE DO I GET NAUTILUS? Bill Dorsey, Pat Mullarky, and Paul Rubin have come out with a program called Nautilus that enables you to engage in secure voice conversations between people with multimedia PCs and modems capable of at least 7200 bps (but 14.4 kbps is better). See ftp://ripem.msu.edu/pub/crypt/GETTING_ACCESS ftp://ripem.msu.edu/pub/crypt/other/nautilus-phone-0.9.2-source.tar.gz ftp://ftp.csn.net/mpj/README ftp://ftp.csn.net/mpj/I_will_not_export/crypto_???????/voice/naut092.zip ftp://ftp.netcom.com/pub/mp/mpj/README ftp://ftp.netcom.com/pub/mp/mpj/I_will_not_export/crypto_???????/voice/naut092.zip ftp://miyako.dorm.duke.edu/pub/GETTING_ACCESS ftp://miyako.dorm.duke.edu/mpj/crypto/voice/naut092.zip ftp://ftp.dsi.unimi.it/pub/security/crypt/cypherpunks/nautilus The Colorado Catacombs BBS 303-772-1062 ftp://ftp.ox.ac.uk/pub/crypto/misc HOW DO I ENCRYPT MY DISK ON-THE-FLY? Rather than manually encrypting and decrypting files, it is sometimes easier (and therefore more secure, because you are more likely to use it) to use a utility that encrypts or decrypts files on the fly as you use them in your favorite applications. This also allows you to automatically encrypt temporary files generated by your applications if they are on the encrypted volume. Secure File System (SFS) is a DOS device driver that encrypts an entire partition on the fly using SHA in feedback mode. Secure Drive also encrypts an entire DOS partition, using IDEA, which is patented. Secure Device is a DOS device driver that encrypts a virtual, file-hosted volume with IDEA. Cryptographic File System (CFS) is a Unix device driver that uses DES. http://www.cs.auckland.ac.nz/~pgut01/sfs.html ftp://ftp.informatik.uni-hamburg.de/pub/virus/crypt/disk/ ftp://ftp.csn.net/mpj/I_will_not_export/crypto_???????/disk/ (see ftp://ftp.csn.net/mpj/README for the ???????) ftp://miyako.dorm.duke.edu/mpj/crypto/disk/ ftp://ftp.nic.surfnet.nl/surfnet/net-security/encryption/disk/ ftp://ftp.demon.co.uk/pub/ibmpc/secdev/secdev14.arj EMAIL/PGP LINKS http://cag-www.lcs.mit.edu/mailcrypt/ (EMACS LISP) WHERE IS PGP'S COMPETITION? RIPEM is the second most popular freeware email encryption package. I like PGP better for lots of reasons, but if for some reason you want to check or generate a PEM signature, RIPEM is available at ripem.msu.edu. There is also an exportable RIPEM/SIG. ftp://ripem.msu.edu/pub/GETTING_ACCESS HOW DO I PUBLISH MY PGP PUBLIC KEY? Send mail to one of these addresses with the single word "help" in the subject line to find out how to use them. These servers sychronize keys with each other. pgp-public-keys at keys.pgp.net pgp-public-keys at keys.de.pgp.net pgp-public-keys at keys.no.pgp.net pgp-public-keys at keys.uk.pgp.net pgp-public-keys at keys.us.pgp.net pgp-public-keys at burn.ucsd.edu pgp-public-keys at pgp.cc.gatech.edu pgp-public-keys at goliat.upc.es pgp-public-keys at demon.co.uk pgp-public-keys at dsi.unimi.it pgp-public-keys at ext221.sra.co.jp pgp-public-keys at fbihh.informatik.uni-hamburg.de pgp-public-keys at jpunix.com pgp-public-keys at kiae.su pgp-public-keys at kr.com pgp-public-keys at kram.org pgp-public-keys at kub.nl pgp-public-keys at nexus.hpl.hp.com pgp-public-keys at pgp.ai.mit.edu pgp-public-keys at pgp.barclays.co.uk pgp-public-keys at gondolin.org pgp-public-keys at pgp.dhp.com pgp-public-keys at pgp.hpl.hp.com pgp-public-keys at pgp.iastate.edu pgp-public-keys at pgp.kr.com pgp-public-keys at pgp.mit.edu pgp-public-keys at pgp.ox.ac.uk pgp-public-keys at pgp.pipex.net pgp-public-keys at srce.hr pgp-public-keys at sw.oz.au pgp-public-keys at uit.no pgp-public-keys at vorpal.com pgp-public-keys at nic.surfnet.nl WWW interface to the key servers: http://www-swiss.ai.mit.edu/~bal/pks-toplev.html http://www-lsi.upc.es/~alvar/pks/pks-toplev.html For US $20/year or so, you can have your key officially certified and published in a "clean" key database that is much less susceptible to denial-of-service attacks than the other key servers. Send mail to info-pgp at Four11.com for information, or look at http://www.Four11.com/ PGP public keys which are stored on SLED's Four11 Key Server are now retrievable by fingering UserEmailAddress at publickey.com. Example: My e-mail addresses is mpj at csn.org finger mpj at csn.org@publickey.com My key (mpj8) is at Four11.com, at ftp://ftp.csn.net/mpj/mpj8.asc, on the key servers, on my BBS, and available by finger. WHICH FAQ IS THE OFFICIAL ONE? The main alt.security.pgp FAQ is published by Jeff A. Licquia and is available at ftp://ftp.prairienet.org/pub/providers/pgp/pgpfaq.txt This shorter FAQ just covers a few of the most frequent questions and points you to the main FAQ for more answers. This file is ftp://ftp.csn.net/mpj/getpgp.asc, There are some other periodic FAQ-related postings, too, like the miniFAQ posted by Andre Bacard, which is more about promoting the use of PGP than where to get it or how to use it. FAQs are also posted to news.answers and alt.answers, and archived at rtfm.mit.edu. CAN I COPY AND REDISTRIBUTE THIS FAQ? Permission is granted to distribute unmodified copies of this FAQ. This information is also in http://www.csn.net/~mpj, which you may link to or adapt for use at your own web sites. ___________________________________________________________ | | |\ /| | | Michael Paul Johnson Colorado Catacombs BBS 303-772-1062 | | \/ |o| | PO Box 1151, Longmont CO 80502-1151 USA Jesus is alive! | | | | / _ | mpj at csn.org aka mpj at netcom.com m.p.johnson at ieee.org | | |||/ /_\ | ftp://ftp.csn.net/mpj/README.MPJ CIS: 71331,2332 | | |||\ ( | ftp://ftp.netcom.com/pub/mp/mpj/README -. --- ----- .... | | ||| \ \_/ | PGPprint=F2 5E A1 C1 A6 CF EF 71 12 1F 91 92 6A ED AE A9 | |___________________________________________________________| -----BEGIN PGP SIGNATURE----- Version: 2.7.1 iQCVAwUBMICOWPX0zg8FAL9FAQEO1AQAvLSMXX9J/nZ/4Wc/TTS9a60e+G5vbvTR KU2+KixGhKfHkH5eb9mHwUtuDTiPJSRvnyfx0EOrgs7b5cC8hZsxKnlyfNnsvEG+ fdxGxy1h90L69CUVFD5CGvIbTlTo7a1xT5tYj/knqTO0OH4WOZVVh60uhGpuzevb 0+99R2mUJoA= =H2Bc -----END PGP SIGNATURE----- From hal9001 at panix.com Sat Oct 14 21:44:05 1995 From: hal9001 at panix.com (Robert A. Rosenberg) Date: Sat, 14 Oct 95 21:44:05 PDT Subject: mental cryptography Message-ID: On Sat, 14 Oct 1995, Nathan Loofbourrow wrote: > Boy, and isn't it fun to receive all the bounce messages from every > post to cypherpunks? Part of the problem is his provider who is sending the bounce messages to the list and not the list owner (as shown in the Sender Header). From shamrock at netcom.com Sat Oct 14 22:06:46 1995 From: shamrock at netcom.com (Lucky Green) Date: Sat, 14 Oct 95 22:06:46 PDT Subject: Macintosh [and perhaps other OS] Security Alert Message-ID: <199510150505.BAA10774@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- A number of months ago, I discovered that various Macintosh "unused diskspace" wipe utilities (Norton, Burn) fail to wipe the unused slackspace at the end of the last block allocated to a file. This leaves NumberOfFiles*512Bytes/2 = several kB of recoverable data on your average drive. I had assumed that this data was left there by other files previously using the same block. This would certainly be a problem. But I discovered that matters are much worse. The Macintosh file system will always write an entire block. The extra data can therefore not come from an old file. It comes from the memory space immediately following the data to be written. This is a very serious security risk. Your decrypted secret key, ANYTHING in memory might be written to disk and remain there, unerasable by disk wipe utilities. I would appreciate some comments. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMICWfCoZzwIn1bdtAQFDyAF/QLI0RJQ/E2+wktITd+3SBCCB8L24Y/vV rq0hPikG9pELYcC/bMwXvD+utoW/E8NQ =IHqi -----END PGP SIGNATURE----- From shamrock at netcom.com Sat Oct 14 22:18:28 1995 From: shamrock at netcom.com (Lucky Green) Date: Sat, 14 Oct 95 22:18:28 PDT Subject: Anguilla Cypherpunks Meeting Message-ID: <199510150516.BAA10814@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article , s1018954 at aix2.uottawa.ca wrote: > Really? I thought except for incomes taxes, US laws only apply in American > territory as opposed to applying to American people wherever they are (as > I heard Germany's does). US laws not only apply to US citizen abroad, they apply to non-US citizens living abroad. See Noriega. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMICZOioZzwIn1bdtAQEUoAGA3Q3nk9e3HA5l1jzG/DyJ8MjcZ+jfx/v3 4UM43jJZwTWFIZ7DLw9O44wvFHVMlj6K =n1+8 -----END PGP SIGNATURE----- From shamrock at netcom.com Sat Oct 14 22:21:59 1995 From: shamrock at netcom.com (Lucky Green) Date: Sat, 14 Oct 95 22:21:59 PDT Subject: applications Message-ID: <199510150520.BAA10825@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article , zoetrope at infinet.com (cYberpUnc) wrote: > I know this isnt what you guys generally talk about but I was curious. > Off the top of your head do you know of any sites where I can get kracking > apps for macs? Any information would be greatly appreciated. I suggest . Get C&N (Cracks and Numbers). - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMICaDioZzwIn1bdtAQFASQF/ausHvyFqDCdGQDwiY2zjGxhJ2DpHYb86 yGjpgvrqjT1YE98N2bTeS/Ejm1pxrXVl =4wZO -----END PGP SIGNATURE----- From shamrock at netcom.com Sat Oct 14 22:29:18 1995 From: shamrock at netcom.com (Lucky Green) Date: Sat, 14 Oct 95 22:29:18 PDT Subject: Yes, indeed the PA law is for real! Message-ID: <199510150527.BAA10870@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <9510141649.AA20952 at cfdevx1.lehman.com>, rfb at lehman.com (Rick Busdiecker) wrote: > I'm guessing that you're referring to this part of the law: > > (1) [makes or possesses any instrument, apparatus, equipment or] > makes, distributes, possesses, uses or assembles an unlawful > telecommunication device or modifies, alters, programs or reprograms > a telecommunication device designed, adapted or which can be used: Own a non-approved computer (not using Government approved software) go to jail. Historic comment: I predicted this on this very list ages ago. Even mentioned "You read it here first". - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMICbwyoZzwIn1bdtAQEaMgGAs3ZFT2TmWbHxQg1xtkJKPUri4TBlpjbx 73dwbNh1TC0Ls+QG/q1xDStqc1rvMFs1 =BWyG -----END PGP SIGNATURE----- From shamrock at netcom.com Sat Oct 14 22:45:17 1995 From: shamrock at netcom.com (Lucky Green) Date: Sat, 14 Oct 95 22:45:17 PDT Subject: [noise] Re: Identity database, another attempt... Message-ID: <199510150543.BAA10916@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article , ses at tipper.oit.unc.edu (Simon Spero) wrote: > This probably dates back to the time when a palestinian group tried to > blow up an El Al flight from London by persauding the pregnant Irish > girlfriend of one to carry a package for a friend. Flights from London > have had the spiel ever since. El Al still does the best pre-flight > screening (much more detailed questioning, and the security staff > actually listen to the answers. Agreed. Security at Heathrow is impecable. Two guys armed with Heckler&Koch MP-5 submachine guns every 25 meters. Expect to see the same on US streets before long. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMICffioZzwIn1bdtAQGFBQGAig+QNg+1Zcbmbz3MXsz3EpV8dDHKmpFo xMCY3+yXMHAqCELZLecbV59kgx/e0m2q =1K8M -----END PGP SIGNATURE----- From anonymous-remailer at shell.portal.com Sat Oct 14 23:48:32 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Sat, 14 Oct 95 23:48:32 PDT Subject: PA Remailer Concerns Message-ID: <199510150647.XAA25530@jobe.shell.portal.com> Has anyone examined the legislative history associated with this statute? I would be surprised if they were singling out anonymous remailers. They may have had other concerns regarding phone abuse, e.g., long distance fraud. Then again, I could be full of it... From shamrock at netcom.com Sat Oct 14 23:52:52 1995 From: shamrock at netcom.com (Lucky Green) Date: Sat, 14 Oct 95 23:52:52 PDT Subject: mental cryptography Message-ID: <199510150651.CAA11041@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article , hal9001 at panix.com ("Robert A. Rosenberg") wrote: > On Sat, 14 Oct 1995, Nathan Loofbourrow wrote: > > Boy, and isn't it fun to receive all the bounce messages from every > > post to cypherpunks? > > Part of the problem is his provider who is sending the bounce messages to > the list and not the list owner (as shown in the Sender Header). Would some kind soul please fakemail an unsub? [I got to get some sleep...] TIA, - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMICvWyoZzwIn1bdtAQFI5AGAjYxCDWzpj1NTSHWyyV2S/iZfq3E6STH/ nYgkXgS0JyV8qiMKuo2U/d1rpb8wxQdg =i/BL -----END PGP SIGNATURE----- From tcmay at got.net Sun Oct 15 00:26:07 1995 From: tcmay at got.net (Timothy C. May) Date: Sun, 15 Oct 95 00:26:07 PDT Subject: Idea Futures Message-ID: At 3:03 PM 10/14/95, s1018954 at aix2.uottawa.ca wrote: >On Sat, 14 Oct 1995, Dr. Frederick B. Cohen wrote: > >> I have a better idea. How about an open market in break-in >> software. We crack Netscape and offer the crack code to the highest >> bidder. Bids start at US$25K per hole. For the insult, Netscape has to >> outbid the competition by a factor of 2 to get the details of the hole. >> Here's how it works: >> >Funny that you mention it, the other mailing list (or rather set of lists) >I'm on is devoted to a just such market system. The Idea Futures home page >is at http://if.arc.ab.ca/~jamesm/IF/IF.shtml. You'll find a few familiar >faces. Robin Hanson, who developed (so far as I know) the modern focus on idea futures, was an active Bay Area person. His interests parallel ours, and I think he was on the CP list for a while back in '92. (Some of his game theory simulations--on betting markets and preference-revealing--were a main inspiration for the "Crypto Anarchy Game" I put on at the first Cypherpunks meeting in '92.) --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From zeus at pinsight.com Sun Oct 15 02:21:45 1995 From: zeus at pinsight.com (J. Kent Hastings) Date: Sun, 15 Oct 95 02:21:45 PDT Subject: Karl Hess - L.A. area meeting Message-ID: <199510150931.CAA13451@Chico.pinsight.com> -- [ From: J. Kent Hastings * EMC.Ver #2.5.02 ] -- -----BEGIN PGP SIGNED MESSAGE----- "Extremism in the defense of liberty is no vice, and let me remind you, moderation in the pursuit of justice is no virtue." -- Aristotle, and a Goldwater speechwriter, but not Karl Hess. Politically Barry's Boy, Karl was often credited with Goldwater's most famous line, but he denied it when interviewed. Karl announced his Libertarian position in the book \Dear America\, followed by \Community Technology\, and \Capitalism For Kids\. --- T H E K A R L H E S S C L U B --- now in its second year of almost monthly dinners, invites you to its sixteenth meeting on Monday, October 16, 1995. New Developments In Conspiracy Theory, Part II O N E B A N K T O R U L E U S A L L Last month we heard some "Conspiracy Classic." For Hallowe'en Partyarch, Paleolibertarian and Agorist tell us what's at "stake" in the latest Bankster cannibal bloodfeast and summon Murray Rothbard back from the grave to repel these vampires with a Cross of Gold! Place: Marie Callender's, 4356 Lincoln Blvd., Marina del Rey (at west end of Marina del Rey [90] Fwy). Time: 7:00 p.m. for dinner; 8 p.m. announcements; 8:15 program. Speakers: Wally Conger, SEK3, and Bob Weber. Charge: $13.00 for program with buffet dinner including full-salad bar, roast turkey entree, and choice of three pies for dessert. Tax and tip included! Next Month: J. Neil Schulman Fires Back with \Self-Control, Not Gun Control\. Coming soon: Robert Anton Wilson, Dr. John Hospers, and Brad Linaweaver. Posted by J. Kent Hastings, zeus at pinsight.com http://www.pinsight.com/~zeus/ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMIDNTzTxxI221vktAQESEgQAnojLCPg0+43EGBtYSMQHr34CvWs0Xc5U 2LidnuEI9w9awBiBuuVWuWfVk7YEpq2UWIe1Xr/8jZoWtjpEkIeLQRjt9D2WQHml Vt2MiuIXbpcuc7GAhio7gMC7M5rsIVoxD6xd6MthcDOhbUa61a7xVma/QhIyyhcK 17MhZMeBl8Y= =wGp1 -----END PGP SIGNATURE----- From adwestro at ouray.cudenver.edu Sun Oct 15 04:37:08 1995 From: adwestro at ouray.cudenver.edu (Alan Westrope) Date: Sun, 15 Oct 95 04:37:08 PDT Subject: TSB_pbs Message-ID: -----BEGIN PGP SIGNED MESSAGE----- - From The Economist, Oct. 7, p.78: TSB, a British bank, held a launch party in August at Cyberia, London's first "Internet cafe", for its Digital Trip home page, aimed at attracting student customers. I assume this refers to TSB Bank Channel Islands Limited, 8 David Place, PO Box 597, St. Helier, Jersey (NOT Joisey!), JE4 8XW. When I last checked (a couple of years ago), TSB offered Offshore Premium Accounts -- interest-bearing checking accounts that pay 11.5 percent interest per annum on a minimum deposit of 2000 pounds, as well as providing a VISA debit card. TSB is said to be the tenth largest bank in the world. Quite an interesting addition to the Net...anyone checked out their home page? BTW, the American PBS "Frontline" show on Tuesday, Oct. 31 (in the Denver area, anyway) will discuss "High Stakes in Cyberspace -- the business rush to stake claims in cyberspace, otherwise known as the Internet, may someday create a cyber-revolution." Hopefully it will be a worthy successor to their show about Caribbean money laundering, though the blurb's conflation of cyberspace with the Internet is not encouraging... Alan Westrope __________/|-, (_) \|-' 2.6.2 public key: finger / servers PGP 0xB8359639: D6 89 74 03 77 C8 2D 43 7C CA 6D 57 29 25 69 23 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMIDwuFRRFMq4NZY5AQECOgQAm1FJQyni4U7ulKvT8Zd3P1pEBieKXeqo rxaCA14K/MhaTnaCcWix0vvPYzFjgnspxUpc7PtuP46w++ilrfZiYDM1BZ1+HpkZ MZaSiH8W+cUkQAxDTuAVNve9PM8zj8Qv+CQ7mABqLu5+f93GubUQtMElEmikR69J kL/2ewMllI4= =O2Py -----END PGP SIGNATURE----- From s1018954 at aix2.uottawa.ca Sun Oct 15 04:41:40 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sun, 15 Oct 95 04:41:40 PDT Subject: Idea Futures In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Timothy C. May wrote: > (Some of his game theory simulations--on betting markets and > preference-revealing--were a main inspiration for the "Crypto Anarchy Game" > I put on at the first Cypherpunks meeting in '92.) > How did that work out anyway? What were the rules and usual outcomes? (Got a file on it anywhere? In your faq?) Sounds like something that'd be nice to implement over the net. Great way to get everyone's productivity reduced to zero. (insert wry smile) TIA From frissell at panix.com Sun Oct 15 05:06:41 1995 From: frissell at panix.com (Duncan Frissell) Date: Sun, 15 Oct 95 05:06:41 PDT Subject: Cybersecurity In-Reply-To: <9509250107.AA05910@cfdevx1.lehman.com> Message-ID: On Sun, 24 Sep 1995, Rick Busdiecker wrote: > I'm guessing that you're talking about the fact that fully applied > crypto (e. g. fully anonymous digital cash) makes it essentially > impossible to base a tax system on income. Yep. > With full application in place, a government would be forced to shift > the basis of the tax system toward `real assets' and the receiving of > goods and services within its borders. However, outside of > transactions involving pure information exchange, this simply shifts > things from one side to the other in a relationship where the basic I am also projecting a transition from physical to non-physical goods and services. Thus most entertainment, financial services/investing, professional services, and indeed the rest of employment services will tend to be non-physical. We see a lot of unbundling already in which services are split off from the more physical parts of a transaction. Drop shipping, contracting out, etc. > Earnings tend to correlate reasonable well with receiving goods and > services, at least over long periods of times. Also most people are > more or less tied to a certain area of the world. Certainly there are > exceptions, but the average case is more relevent when considering Say that it was 1750 and you were a French Physiocrat. You might say that land and agriculture should be taxed because that represented the only important part of the economy and the nation's wealth. The making of goods was insignificant. You would have ignored what was to become a big part of the economy. It is possible that the non-physical part of the economy will become much bigger than the physical. Note that most money itself is non-physical. And if the physical part of the economy is taxed and the non-physical isn't the market will be skewed in favor of non-taxed activities. Also even though most people are geographically bound, if their consumption switches to non physical goods, they can acquire these goods anonymously or securely from any place on earth. So even if you don't travel, the locus of your transactions can. DCF From jya at pipeline.com Sun Oct 15 05:13:36 1995 From: jya at pipeline.com (John Young) Date: Sun, 15 Oct 95 05:13:36 PDT Subject: DUM_not Message-ID: <199510151213.IAA09188@pipe4.nyc.pipeline.com> 10-15-95. NYPaper, longish Page One semi-rehash, semi- disinfo of LATimes of July 23: "Emerging Role For the C.I.A.: Economic Spy." During the Clinton Administration's tense negotiations with Japan last spring Mickey Kantor received inside information gathered by the C.I.A.'s Tokyo station and the electronic eavesdropping equipment of the N.S.A. "But in the end, did it help much? Beyond some valuable detail we could not have gotten elsewhere, did it tell us much about which way Hashimoto would go? It would be hard to make that case." Many Administration officials suggest that the agency simply does not have the talent for such analysis. "The best graduate students don't go there and who can blame them?" said one of the Administration's top economic officials. "And yet, when you sit in a meeting, the views of the C.I.A. are often given more weight than the Council of Economic Advisors. Go figure." Allan E. Goodman, a former C.I.A. official and academic dean of Georgetown University's School of Foreign Service, said "We don't have the sources, we don't have the expertise. To develop an understanding of the people who trade currencies, their motivations, their lifestyles, you'd have to send your people to Harvard, Stanford and Wharton for years. Currency traders keep secrets very, very well, and to penetrate that would be the equivalent of cracking all the Japanese codes in World War II." DUM_not (14 kb) From s1018954 at aix2.uottawa.ca Sun Oct 15 05:19:17 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sun, 15 Oct 95 05:19:17 PDT Subject: bouncing mail Message-ID: Can anyone anyone get in touch with the bouncing mail guy, Jason P Jones ? He needs to wipe that mailbox of his. ( I just tried to unsub him, I guess it's reassuring you can't get away with it without forging headers, which I can't do.) rom owner-cypherpunks Sun Oct 15 05:19:24 1995 Return-Path: Received: by toad.com id AA09946; Sun, 15 Oct 95 05:19:24 PDT Received: from panix.com by toad.com id AA09937; Sun, 15 Oct 95 05:19:20 PDT Received: (from frissell at localhost) by panix.com (8.7/8.7/PanixU1.3) id IAA25104; Sun, 15 Oct 1995 08:19:18 -0400 (EDT) Date: Sun, 15 Oct 1995 08:19:18 -0400 (EDT) From: Duncan Frissell To: Alan Westrope Cc: cypherpunks at toad.com Subject: Re: TSB_pbs In-Reply-To: Message-Id: Mime-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-cypherpunks at toad.com Precedence: bulk On Sun, 15 Oct 1995, Alan Westrope wrote: > I assume this refers to TSB Bank Channel Islands Limited, 8 David > Place, PO Box 597, St. Helier, Jersey (NOT Joisey!), JE4 8XW. > No, I would assume that it refers to the parent company TSB on the mainland UK. It has an extensive branch network in the UK. DCF From rsalz at osf.org Sun Oct 15 05:53:59 1995 From: rsalz at osf.org (Rich Salz) Date: Sun, 15 Oct 95 05:53:59 PDT Subject: Yes, indeed the PA law is for real! Message-ID: <9510151251.AA07819@sulphur.osf.org> >Historic comment: ... "You read it here first." Nostradamus said it way before you. This kind of dredging up old posts in order to claim certain foresight intellectual properties is kinda silly. Watcha gonna do, patent it? It's gonna rain tomorrow. You heard it here first. Of course, I don't plan on doing anything about it other than tell you all... From anonymous-remailer at shell.portal.com Sun Oct 15 06:00:30 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Sun, 15 Oct 95 06:00:30 PDT Subject: No Subject Message-ID: <199510151259.FAA03263@jobe.shell.portal.com> >I want to see Netscape succeed, but when you hear about things like product >being released on the net without warning those people responsible for >supporting it, bug reports being ignored so a ship date can be made, and the >like, it makes you really wonder. I am finding problems with 2.0b1 that >could have been found just by using the product for a couple of days! Most >of the problems I have seen with Netscape could be solved with better >communications between departments within the company and some strong >testing procedures. > I totally agree with this. There are an awful lot of GPFs I've been experiencing with 2.0 that I never experienced with 1.2, and I am still trying to figure out that cause. The first one happened like 5 minutes after I ran the program whilst it was loading the Netscape homepage! Another irritating one that should have been caught is the download time indicator. When I download a file, the estimated time taken is shown in hours! These trivial problems are really quite inexcusable, and should've been caught with good quality assurance before it even went out the door. From jya at pipeline.com Sun Oct 15 07:07:57 1995 From: jya at pipeline.com (John Young) Date: Sun, 15 Oct 95 07:07:57 PDT Subject: ORW_lea Message-ID: <199510151407.KAA15071@pipe4.nyc.pipeline.com> 10-15-95. NYPaper: "Law Enforcement and Privacy Interests Clash on Technology." The legality of mobil data terminals, which put records at the fingertips of officers in their cars, is in question. Some other machines could well be props in a James Bond movie: long-range eavesdropping devices that, placed in a briefcase, pick up conversations a football field away, or infrared radar monitors that, mounted on a car, can detect weapons on a person a half-mile away. For law enforcement officials, they are new-generation weapons in the war on crime that enable the police to better protect the public, even at the expense of a little privacy. But for civil libertarians, they conjure Orwellian images of Big Brother armed with technologies that are subject to abuse and prone to error. ORW_lea (8 kb) From anonymous-remailer at shell.portal.com Sun Oct 15 07:23:07 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Sun, 15 Oct 95 07:23:07 PDT Subject: Netscape question transformed Message-ID: <199510151421.HAA08833@jobe.shell.portal.com> On Fri, 13 Oct 1995, Rob L wrote: > Actually, it is not jeapordy that they get from doing so, but some of the > best bug finders and security experts on the planet.. for close to free. Actually, this is a very dangerous game to play, because realistically Netscape gets both, foe and friend. And they risk not only the entire company by taking this action, but they also pose risk to the public They might get someone who responsibly tries to point out an incredibly poor design methodology within ALL of Netscape's code -- the existing installed code base as well as the new beta code. Someone who points out this fatal design flaw to the public and not only to Netscape. Or they might confront someone who announces that numerous pointers have been placed in roulette programs making the Web under Netscape a little more like playing Russian Roulette, rather than safe, fun entertainment. Netscape clients might face a customized plexus, one that delivers dynamic documents. One time in six (if you're running CURRENT Netscape release software) it deletes your WIN.INI. Some machine in Bucharest reaches right out, and wipes you clean. Or maybe it just downloads all of your Quicken files. Netscape is clearly not thinking clearly, here. The issue here isn't "Bugs" and Netscape's so-called Bugs Bounty program. It's a broader question of design methodology and of design process. Does Netscape have a product that has any worth and utility?? Does Netscape have a product which can go through a "Product Evaluation" and then a "Certification Evaluation" as set out in the US Department of Defence's Orange Book?? Or does Netscape's product fail the giggle test. > If hackers can find 10 bugs before final release, it means there is a > good chance that they will fix those bugs before final release. > > Think of it this way.. you practice a new task until you are competent at > it.. beta code is the same.. it is the practice or scratch code that may > be refined into the final product. I'll beg to differ on this one. This is not about hackers, nor is this about crackers. We are not talking about some shareware game program here. Nor are we talking about a word processor, spreadsheet, or draw program. We are talking about a program that has a different mission profile. The standard here is different. A bug in code that makes your system freeze is different than a sloppy design methodology that allows someone to literally take complete control of your machine from any other machine in the world, whether that machine is foreign or domestic. Code which seeks to secure a public network connection, calls for a different programming altitude, than writing common PC code. The tolerances are different, the expectations are different, and the challenge (which was summarized most cogently by a UK friend) distills to a single basic issue. How do you invite a few billion people into your home without having one of them nick the silver?? Evaluation of technical computer security effectiveness is not accomplished by the release of "practice code". It has to start from the ground up. And it is certainly not assisted by having a corporate communications policy that is geared to NOT opening a communications pipe with someone who has attempted to offer constructive technical criticism. Let me make this absolutely clear. It should not be up to non-US citizens like myself to safe-guard US economic security, and protect vital national interests. It is not my job and certainly not my responsibility to protect the international public and Fortune 500 companies from poor security. When that attempt is made however, the effort should not be stymied by Netscape's thinly veiled attempt at information free-loading through public-relations puffery. From this vantage point, Netscape's press releases have the stench of some two-bit penny stock hustler -- something I'd expect from some Vancouver Stock Exchange promoter, rather than the standard expected of a company with a Two Billion USD ($2,000,000,000) market capitalization. After emailing the company more than two days ago, I would hope that a communications channel would have been opened, or alternatively I would have held out a hope that someone from Sun or Netscape might have made an official comment here or publically. I would have expected something other than a stone-walling silence. My Friday the Thirteenth post obviously has people shaken. Clearly, Friday was not the day to comment about this serious problem. There was no utility in causing panic and disrupting trading in Netscape stock, especially in a market that can only be characterized as frothy. But now here we stand, many hours and days later, with the questions raised remaining unaddressed, and with my copyright restriction on my Friday post hereby, and herein explicitly waived. The question is no longer simply a question of whether Netscape can produce quality code, but a new question rises on the horizon. Does Netscape have the management depth and experience to meet daily corporate requirements?? And is the promise of Internet commerce whether put forward by Netscape, Microsoft or AT&T simply a pipe dream. A very risky game, they like to play ... Or since I had already spoken of Dominick Dunne on Friday, perhaps a turn this Sunday to Johnnie Cochrane and his fine choice of words: "Whom will I trust as I will adders fang'd They bear the mandate; they must sweep my way, And marshall me to knavery. Let it work; For tis the sport to have the engineer Hoist with his own petar: and 't shall go hard ..." Alice de 'nonymous ... ...just another one of those... P.S. This post is in the public domain. C. S. U. M. O. C. L. U. N. E. From jya at pipeline.com Sun Oct 15 07:28:12 1995 From: jya at pipeline.com (John Young) Date: Sun, 15 Oct 95 07:28:12 PDT Subject: National Insitute of Justice Message-ID: <199510151428.KAA16889@pipe4.nyc.pipeline.com> For more on the NIJ, oft-cited by The NYT as the sponsor of wizard crime fighting devices, see: URL: http://ncjrs.aspensys.com:81/aboutnij.html There are helpful links there to the ever-expanding universe of the terrifying trust-me evangelists. From fc at all.net Sun Oct 15 08:59:06 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Sun, 15 Oct 95 08:59:06 PDT Subject: I am looking for a way to create a zombie process Message-ID: <9510151556.AA26716@all.net> I am writing a paper that, among other things, talks about detecting zombie processes. I find that, due to my systematic hunting down and eliminating of these processes, I no longer have any hanging around for demonstration purposes. How embarassing - I don't know how to create one! Is there anyone who can give me a simple program or set of commands that creates a zombie process? Thanks in advance. -- -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From stripes at va.pubnix.com Sun Oct 15 09:00:44 1995 From: stripes at va.pubnix.com (Josh M. Osborne) Date: Sun, 15 Oct 95 09:00:44 PDT Subject: Netscape rewards are an insult In-Reply-To: <9510141801.AA01730@all.net> Message-ID: In message <9510141801.AA01730 at all.net>, Dr. Frederick B. Cohen writes: [...] >The $25K is a trivial amount for finding such a hole in a product that >is supposed to secure billions of dollars worth of electronic funds >transfers. If the bad guys find a hole, it could easily cost millions. >If you don't believe me, look at the statistics for other holes in the >credit card and telecommunications businesses. They losses are in the >billions each year. [...] Note well: Netscape is offering this reward for finding bugs in *beta* release code. In other words the code that they *know* crashes, code that they susspect has security releated bugs, code that they don't think is (yet) good enough to charge a mesely $40 for! If they don't get buried in bad press for this, I would guess that they may have a diffrent program with a diffrent set reward for finding bugs in their for-sale version. Or not. After all I susspect that like most other places they are more intrested in making the next product the best in the world then making the last one "as good as the box says". Besides nobody said you have to report your bugs to Netscape just because they gave you free software and offered some sort of reward for finding bugs. If you don't think the "pay" (including the posability of having the software fixed) is high enough, don't report the bugs. From jamesd at echeque.com Sun Oct 15 09:10:34 1995 From: jamesd at echeque.com (James A. Donald) Date: Sun, 15 Oct 95 09:10:34 PDT Subject: Int'l Money Laundering, Part the Second Message-ID: <199510151610.JAA02950@blob.best.net> At 07:31 PM 10/10/95 -0800, Douglas Barnes wrote: > When you combine these elements, you get a strategy that > permits the US government to confiscate worldwide correspondent > accounts of banks, even if they don't have a US presence. This is doubtless one of the reasons why the US$ is rapidly losing its place as the preferred currency for international transactions. > acceptance of US-dollar negotiable instruments by a bank anywhere > in the world outside of the US renders the bank susceptible > to US criminal jurisdiction in the money laundering field. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From rfb at lehman.com Sun Oct 15 09:17:41 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Sun, 15 Oct 95 09:17:41 PDT Subject: Cybersecurity In-Reply-To: Message-ID: <9510151616.AA02567@cfdevx1.lehman.com> -----BEGIN PGP SIGNED MESSAGE----- Date: Sun, 15 Oct 1995 08:06:13 -0400 (EDT) From: Duncan Frissell I am also projecting a transition from physical to non-physical goods and services. Thus most entertainment, financial services/investing, professional services, and indeed the rest of employment services will tend to be non-physical. We see a lot of unbundling already in which services are split off from the more physical parts of a transaction. Drop shipping, contracting out, etc. I agree with this projection as a shift in weight. Presumably we can also agree that the transition could never be total. People will continue to need and/or desire a significant number of physical goods as well as services which involve the physical interaction. Say that it was 1750 and you were a French Physiocrat. You might say that land and agriculture should ^^^^^^ This single word represents a significant shift in the discussion. Up to this point, my understanding is that we were discussing what is, and what we believe is possible in the future. With the introduction of `should' we veer away from that direction toward the more philosophical. While I enjoy philosophical discussions a great deal, I doubt that we could find nearly as much common ground as we might if we focussed on what is possible. While I am a civil libertarian, I am not an economic libertarian, as I believe you are. I would expect economic issues to be the focus of our differences in a philosophical discussion, but they need not divide us in discussions outside of philosophy. It is possible that the non-physical part of the economy will become much bigger than the physical. I agree that this is quite possible. Note that most money itself is non-physical. Agreed in part. However, as we have seen already, non-physical representations of money are not taken very seriously when it is impossible, or even very difficult, to exchange them for physical goods and services requiring physical interactions. Very few people would accept CyberBucks in exchange for a car. And if the physical part of the economy is taxed and the non-physical isn't the market will be skewed in favor of non-taxed activities. Agreed. This is at least partially true already. Certainly there are investment instruments which are treated differently by the various tax codes. These differences certainly affect investors' decisions. Still, there seem to be investors willing to purchase instruments based on features other than taxability. Also even though most people are geographically bound, if their consumption switches to non physical goods, they can acquire these goods anonymously or securely from any place on earth. So even if you don't travel, the locus of your transactions can. Agreed. As I said originally, I believe that ready access to strong cryptography will eventually make government tracking of purely information, i. e. non-physical, transactions infeasible. At that point, any feasible system of taxation will have to focus on physical goods and services which involve physical interaction. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMIEzZJNR+/jb2ZlNAQFZhgQAwvhVdXndL0qoRJL3O4QttBfeu3ebJmSk ZPnFFL2kyUvUL+efsym0xVLmjtrLYf+P2OUJJ5puJf7LkNInqdH9+64juRynfqbT lqamnDoj3QXXDcn8DMWhd8oMwXN0a+1+sIvI2c0xfkDZs8H7NBbsph6pFJSEgIf7 QrtCqn6utkc= =ke/Q -----END PGP SIGNATURE----- -- Rick Busdiecker Please do not send electronic junk mail! net: rfb at lehman.com or rfb at cmu.edu PGP Public Key: 0xDBD9994D www: http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rfb/http/home.html send mail, subject "send index" for mailbot info, "send pgp key" gets my key A `hacker' is one who writes code. Breaking into systems is `cracking'. From jgrubs at left.webcasters.com Sun Oct 15 09:17:42 1995 From: jgrubs at left.webcasters.com (Jim Grubs W8GRT) Date: Sun, 15 Oct 95 09:17:42 PDT Subject: WWW> One If By Congress, Two If By White House In-Reply-To: <45lt48$db4@shocker.mid.net> Message-ID: Path: left!hypnos!ragnarok.oar.net!malgudi.oar.net!kira.cc.uakron.edu!neoucom.edu!news.ysu.edu!news.ecn.uoknor.edu!paladin.american.edu!gatech!newsxfer.itd.umich.edu!tank.news.pipex.net!pipex!news.mathworks.com!newsfeed.internetmci.com!news.mid.net!news.mid.net!not-for-mail From: Gleason Sackman Newsgroups: comp.internet.net-happenings Subject: WWW> One If By Congress, Two If By White House Message-ID: <45lt48$db4 at shocker.mid.net> Date: 13 Oct 1995 09:29:28 -0500 Sender: infoserv at news.mid.net Organization: MIDnet, the Midwest's Gateway to the Global Internet. Lines: 14 Approved: ralphie NNTP-Posting-Host: shocker.mid.net *** From Net-Happenings Moderator *** Date: Fri, 6 Oct 1995 07:51:13 -0500 From: jrw at ix.netcom.com http://www.geopages.com/CapitolHill/1783 A website dedicated to Jeffersonian Conservatism, the underlying principle of which is a strong faith in the American people -- the individual citizen -- rather than in an overgrown, cumbersome, impersonal and too powerful bureaucracy. Good links to the entire political spectrum, government, books, etc. The goal is to provoke thoughtful discussion and informed political action. From jya at pipeline.com Sun Oct 15 09:19:31 1995 From: jya at pipeline.com (John Young) Date: Sun, 15 Oct 95 09:19:31 PDT Subject: Netscape rewards are an insult Message-ID: <199510151619.MAA25730@pipe4.nyc.pipeline.com> Responding to msg by stripes at va.pubnix.com ("Josh M. Osborne") on Sun, 15 Oct 12:0 AM The PR of Bugs Bounty is the aim, as the quick-market-adapter Netscape Chair speechified in FR. Promoting the notion that hackers are earnestly attacking Netscape and reporting its bugs increases its credibility to the stock market porkers. Is that not why dear all-too-attentive Jeff has been assigned duty on this list, feeding peanuts to chimp hackers and champ newshacks? From bshantz at nwlink.com Sun Oct 15 09:28:37 1995 From: bshantz at nwlink.com (Brad Shantz) Date: Sun, 15 Oct 95 09:28:37 PDT Subject: Netscape rewards are an insult Message-ID: <9510151627.AA15802@toad.com> Josh Osborne writes: > Note well: Netscape is offering this reward for finding bugs in *beta* > release code. In other words the code that they *know* crashes, code > that they susspect has security releated bugs, code that they don't think > is (yet) good enough to charge a mesely $40 for! Whoops, wrong. BETA does not mean code "they know crashes." In fact it is quite the opposite. This is pre-release code that they are bug fixing. most of the catastrophic bugs, they probably know about. A BETA program is to increase the testing and quality assurance staff to find all of the bugs they DON'T know about. Then, they will have a reasonable amount of time to fix those bugs before release. It makes for a much more stable product. Now, look at companies like SPRY/Compuserve or Logos Research Systems. Both companies I have worked for. SPRY didn't really have a BETA program that amounted to much until Internet in a Box version 1.0. Even that was a lame beta program. Mostly internal use and testing. Logos (a Bible software company) never even had a beta program. As much as I like the guys at Logos, they released version 2.0 recently and it's buggy. Simple cosmetic things like not being able to "cancel" out of the options dialog, or "help" buttons taking you to wrong places in the help file, these are all things that would have been caught in a decent testing environment or a beta program. Microsoft, who I don't necessarily like all the time, has a great beta program. Usually it is several months to a year of intense testing, bug fixing, feature cleanup, usability testing, etc. Their software may not be the best, but more often than not it is stable. Anyway, I see Netscape's move to paying for beta testing will result in a more stable browser, and hopefully more secure software. > If they don't get buried in bad press for this, I would guess that they > may have a diffrent program with a diffrent set reward for finding bugs > in their for-sale version. Why would they get bad press? > Besides nobody said you have to report your bugs to Netscape just because > they gave you free software and offered some sort of reward for finding > bugs. If you don't think the "pay" (including the posability of having > the software fixed) is high enough, don't report the bugs. Once again, Josh, I'm afraid I have to disagree with you on this one. Especially in regards to secure software. I see your point, but... Whether or not you have to report the bugs is immaterial. Netscape is doing a service by making their app available for testing before saying "this is secure." As a person who does business over the net, if I found out that my software was NOT secure, I would seek either a secure update or another company's software. If I'm happy with Netscape's software, I'll report the bugs to improve it's quality. In my humble opinion, improving the software is reward enough. Very few companies have paid beta programs. I'd rather see bugs fixed before release than getting the bad press after release for shoddy workmanship. Sorry this was so long. I didn't mean to ramble. I'll get off my soapbox now... Brad From tcmay at got.net Sun Oct 15 09:31:27 1995 From: tcmay at got.net (Timothy C. May) Date: Sun, 15 Oct 95 09:31:27 PDT Subject: Idea Futures Message-ID: At 11:40 AM 10/15/95, s1018954 at aix2.uottawa.ca wrote: >On Sun, 15 Oct 1995, Timothy C. May wrote: > >> (Some of his game theory simulations--on betting markets and >> preference-revealing--were a main inspiration for the "Crypto Anarchy Game" >> I put on at the first Cypherpunks meeting in '92.) >> >How did that work out anyway? What were the rules and usual outcomes? >(Got a file on it anywhere? In your faq?) >Sounds like something that'd be nice to implement over the net. Great way >to get everyone's productivity reduced to zero. (insert wry smile) To educate the folks about the technologies now more common (mixes, digital cash, information markets, data havens...), we simulated on paper these things. For example, certain people were randomly assigned the role of being a "mix" (remailer), with envelopes addressed to them being openable only by them, and with them then remailing to the next destination. The game went on for about 5 hours, amidst much confusion and hilarity, and helped to show people how ecologies of anonymous and pseudonymous entities could interact. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From ghio at cmu.edu Sun Oct 15 10:31:08 1995 From: ghio at cmu.edu (Matthew Ghio) Date: Sun, 15 Oct 95 10:31:08 PDT Subject: Yes, indeed the PA law is for real! In-Reply-To: Message-ID: Rick Busdiecker (rfb at lehman.com) wrote: > I'm guessing that you're referring to this part of the law: > (1) [makes or possesses any instrument, apparatus, equipment or] > makes, distributes, possesses, uses or assembles an unlawful > telecommunication device or modifies, alters, programs or reprograms > a telecommunication device designed, adapted or which can be used: . . . > (ii) to conceal or to assist another to conceal from any [supplier > of telecommunications] telecommunicationservice provider or from any > lawful authority the existence or place of origin or of destination > of any telecommunication; or Well, given that I haven't seen any Bell employees rushing to tear out payphones, I suspect that if it ever went to court, they'd have to show intent to commit or assist fraud. Since anonymous remailers (and payphones, prepaid calling cards, etc) have legitimate uses, they can't prove you were intending to assist crime by providing those services. There's also the ECPA protections... From shields at tembel.org Sun Oct 15 10:41:54 1995 From: shields at tembel.org (Michael Shields) Date: Sun, 15 Oct 95 10:41:54 PDT Subject: I am looking for a way to create a zombie process In-Reply-To: <9510151556.AA26716@all.net> Message-ID: > Is there anyone who can give me a simple program or set of commands that > creates a zombie process? Thanks in advance. Here, public domain. #include #include int main() { if (!fork()) { /* Child; die. */ exit(0); } else { /* Child dies, is zombie for ten seconds. */ sleep(10); /* Reap it. */ wait(); /* Now no zombie. */ sleep(10); exit(0); } } -- Shields. From froomkin at law.miami.edu Sun Oct 15 10:56:26 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Sun, 15 Oct 95 10:56:26 PDT Subject: Crypto & Taxes [WAS Re: Cybersecurity] In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Duncan Frissell wrote: > On Sun, 24 Sep 1995, Rick Busdiecker wrote: > > I'm guessing that you're talking about the fact that fully applied > > crypto (e. g. fully anonymous digital cash) makes it essentially > > impossible to base a tax system on income. > Yep. [....] Hold on. This is more "factoid" than "fact": recall that income is PAID by people as well as EARNED by people. Most payers have easily detectible physical presence and assets that can easily be attached by regulators. It will be a cold day before, e.g., my employer agrees not to report my earnings. And the same is true for most employers in most industries. And if it ever stops being true, we'll just get VAT, and VAT inspectors. So the line about death and taxes remains as true as ever, crypto or no. A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | New address, but it's still just as hot here. From imschira at nyx10.cs.du.edu Sun Oct 15 11:11:04 1995 From: imschira at nyx10.cs.du.edu (Ian M. Schirado) Date: Sun, 15 Oct 95 11:11:04 PDT Subject: (fwd) CyberSpace Detective Agency Message-ID: <9510151810.AA28127@nyx10.cs.du.edu> Path: mnemosyne.cs.du.edu!hermes.cair.du.edu!carbon!csn!gw1.att.com!gw2.att.com!news.midplains.net!chi-news.cic.net!newsfeed.internetmci.com!news.mathworks.com!newshost.marcam.com!Empire.Net!news.net99.net!news.crosslink.net!news.vais.net!ppp-b.vais.net!user From: konowe at investigator.com (Dr. Lee Konowe) Newsgroups: comp.infosystems.www.misc Subject: CyberSpace Detective Agency Date: Fri, 13 Oct 1995 10:18:14 -0700 Organization: Background Research International Lines: 41 Message-ID: NNTP-Posting-Host: ppp-b.vais.net Background Research International (B.R.I.) was the first online Detective Agency to serve the Internet. B.R.I. is an affiliate of the FairFax Group, Ltd. a world class corporate agency with offices and client firms world-wide. B.R.I. provides many of the information retrieval services, first offered by the Fairfax Group and makes them available to small and moderate sized businesses. The purpose of this notice is to invite you to visit the B.R.I. home page at http://www.investigator.com/bri Our web page will introduce you to many of the B.R.I. services and explain how a Public Records search firm can assist your company. Perhaps you are: BRI now offers the first resume verification service. This service means employee' resumes can now be verified prior to submission to potential employers. We believe you will be pleased with the many services offered and surprised at the reasonable fee structure provided. As an added incentive, when you decide to use our services, just tell your B.R.I. investigator that you found out about B.R.I. from this newsgroup and receive a 10% discount on your first order. Sincerely, Lee Konowe Director/Internet Operations -- -- http://yakko.cs.wmich.edu/~frogfarm ...for the best in unapproved information To be a skeptic is to refuse to be a victim. "This is my .sig. There are many like it, but this one is mine." Freedom...yeah, right. From ericm at lne.com Sun Oct 15 11:34:01 1995 From: ericm at lne.com (Eric Murray) Date: Sun, 15 Oct 95 11:34:01 PDT Subject: Netscape rewards are an insult In-Reply-To: <199510151619.MAA25730@pipe4.nyc.pipeline.com> Message-ID: <199510151855.OAA20783@slack.lne.com> > > > Responding to msg by stripes at va.pubnix.com ("Josh M. Osborne") > on Sun, 15 Oct 12:0 AM > > > The PR of Bugs Bounty is the aim, as the quick-market-adapter > Netscape Chair speechified in FR. > > > Promoting the notion that hackers are earnestly attacking > Netscape and reporting its bugs increases its credibility to > the stock market porkers. Is that not why dear > all-too-attentive Jeff has been assigned duty on this list, > feeding peanuts to chimp hackers and champ newshacks? Sir. I'm afraid you're a little out of line here. I've worked with Jeff at a couple different companies over the last 6 years. Besides being a very good programmer he's also one of the people I consider the most resistant to corportate bullstuff (beleive me, we both got a lot of it at MicroUnity). I'm sure he's on this list because he thinks it's a good idea to pay attention to it. What the hell is wrong with you people? Up 'til a few months ago, the oft-heard refrain on cipherpunks was "why won't the software vendors listen to us?"... now they're listening, and pretty much all I see is complaints of "only a lousy thousand bucks!" or "I sent this mail a whole two days ago and netscape hasn't opened a dialog with me yet!" or insulting their programmers for participating on the list. They're here, and listening, with real programmers not PR weenies, and all most of you are doing is complaining. Yes, Netscrape turned getting hacked into a PR campaign via the Bounty thing. So? You expected different? PR is what businesses do if they want to stay in business. If you don't like it you don't have to participate in the program. If you think that the token $1000 is insulting, you can give it to charity, or go sell your hack for more $$ to Blacknet. :-) -- Eric Murray ericm at lne.com ericm at motorcycle.com http://www.lne.com/ericm Redistribution of this message without the author's permission is forbidden! PGP keyid:E03F65E5 fingerprint:50 B0 A2 4C 7D 86 FC 03 92 E8 AC E6 7E 27 29 AF From perry at piermont.com Sun Oct 15 11:42:49 1995 From: perry at piermont.com (Perry E. Metzger) Date: Sun, 15 Oct 95 11:42:49 PDT Subject: what are these people selling???? In-Reply-To: Message-ID: <199510151842.OAA28929@jekyll.piermont.com> Timothy C. May writes: > At 11:43 PM 10/13/95, Censored Girls Anonymous wrote: > >I mean maybe we could get Microhard to do a meeting. > >Or the dreaded RSA or somebody. > > Jim Bidzos, President of RSADSI, attended our special "Clipper" meeting the > weekend after Clipper was announced, in April 1993. > > I'm not saying this in defense of RSADSI and their patent situation, just > to note that they are not "dreaded." Jim Bidzos and some of us might have interesting interactions on patent issues, but I've got to emphasize that he's no demon. He's a guy trying to make a buck on his patent properties -- by and large he has the same interests about seeing cryptography spread that the rest of us do. Perry From jim at acm.org Sun Oct 15 11:48:36 1995 From: jim at acm.org (Jim Gillogly) Date: Sun, 15 Oct 95 11:48:36 PDT Subject: Netscape rewards are an insult In-Reply-To: <199510151855.OAA20783@slack.lne.com> Message-ID: <199510151848.LAA22933@mycroft.rand.org> > Eric Murray writes: > What the hell is wrong with you people? Up 'til a few months > ago, the oft-heard refrain on cipherpunks was "why won't the What do you mean "you people"? There are of people on this list, with lots of different opinions. Don't attribute this kvetching to Cypherpunks in general. In fact, don't attribute opinion to Cypherpunks in general. Probably most of the non-press members here share an interest in helping people communicate privately, but that's about it. We're all individuals here. [small voice in back of crowd: "I'm not."] Jim Gillogly 24 Winterfilth S.R. 1995, 18:46 From jules at netscape.com Sun Oct 15 11:49:34 1995 From: jules at netscape.com (Julius Cisek) Date: Sun, 15 Oct 95 11:49:34 PDT Subject: Guess what I found... In-Reply-To: <199510140816.CAA07071@bert.cs.byu.edu> Message-ID: <30815766.3A8D@netscape.com> Donald M. Kitchen wrote: > rryan at blackhills.com (Richard Ryan) writes: > >Had my first hard core, proveable case of MSN reading someones drive. Store > >Client had entered fantasy company name upon installing a program. Forgot about > >it, didn't tell anyone. 2 days after downloading a simple text file from MSN a > >junk mail offering from Pitney-Bowes showed up in his snail mailbox addressed > >to him c/o the fantasy company. Somebody is playing somewhere they shouldn't > >be. Any comments, Microsoft? > > I registered as Richard E. Graves (changing middle initials and adding an > unnecessary suite number to your address are good ways to track who has > been selling whom your address). Richard E. Graves also received mail from > Pitney-Bowes. > > Microsoft says they don't sell their mailing lists. Clearly, someone has > taken advantage of security holes in the NT servers that make up MSN and > *stole* the mailing lists. Maybe unauthorized external access accounts for > the abysmal performance of MSN, in part. Hmmm... Did you guys check the box that says not to give your name out when signing up? I did and I haven't gotten any junk mail yet. I've been using MSN for half a year now. Of course if there is a security hole, then the checkbox would hardly matter. -- ~Jules (Julius Cisek) /- __ - mailto:jules at netscape.com Server Eng, NETSCAPE /\ >\=/\ --- http://home.netscape.com/people/jules MtnView-CA-USA-Earth \/ -\/ -- p:415.528.2968 f:415.528.4122 ---===> COGITO ERGO VROOM <===--- From unicorn at polaris.mindport.net Sun Oct 15 11:51:00 1995 From: unicorn at polaris.mindport.net (Black Unicorn) Date: Sun, 15 Oct 95 11:51:00 PDT Subject: Crypto & Taxes [WAS Re: Cybersecurity] In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Michael Froomkin wrote: > On Sun, 15 Oct 1995, Duncan Frissell wrote: > > On Sun, 24 Sep 1995, Rick Busdiecker wrote: > > > I'm guessing that you're talking about the fact that fully applied > > > crypto (e. g. fully anonymous digital cash) makes it essentially > > > impossible to base a tax system on income. > > Yep. > [....] > Hold on. This is more "factoid" than "fact": recall that income is PAID > by people as well as EARNED by people. Most payers have easily > detectible physical presence and assets that can easily be attached by > regulators. It will be a cold day before, e.g., my employer agrees not > to report my earnings. And the same is true for most employers in most > industries. Were I an overseas employer, I would be quite happy to work in a "disinterested" jurisdiction and hire American workers to telecommute and issue their pay blindly to the number only or crypto bank account of their choice and promptly encrypt or lose the records. Remember, there is an incentive for employERS as well as employees to flee the tax system of a nation that is manipulative of it. Employers who work in tax free ways will be able to pay their employees less, quite a bit less. Given a 32% tax rate, an employer with the advantage of no income reporting on employees will easily be able to drop a given salary 25% and attract employees quite easily. Who are you going to work for? The publisher who is based in New York and reports all payments, or the publisher who works in the Cayman Islands, reports nothing, and merely sells the manuscript to the big name publisher in New York after purchasing it blind from you? > And if it ever stops being true, we'll just get VAT, and VAT inspectors. > So the line about death and taxes remains as true as ever, crypto or no. > I believe it will be extremely hard for VAT inspectors, in future, to determine one of a few things needed to assess VAT taxes. 1> Identity of employers within their jurisdiction 2> Identity of employees within their jurisdiction 3> Who is working "IN" their jurisdiction 4> Who is a U.S. citizen How can you say that the 2 meg random data file that Mr. X sent to Publishing Company B is worth $2mil? That the encrypted letter to client Q is the sum of legal work worth $80,000 in services and research? These are particularly difficult to determine when the bank transaction are made with truely anonymous e-cash and overseas accounts. It's simply not possible unless: 1> The state has enforced toy crypto 2> The strong crypto the parties use is broken 3> The parties tell. At some point, the only thing your going to be able to tax is "Goods." As in solid and measureable. When this is true, the most profitable venture in the United States will be retail smuggling. And as taxes are raised again and again, compliance will drop and drop until the largest portion of the national budget will be enforcement of the Value Tax Reform and Retail Laundering and Terrorism Act of 2002. Again, the more difficult it gets to do business in the United States without taxation far out of proportion to other nation states, the fewer companies will stick around. I might add that as technology progresses, fewer and fewer companies will NEED to work in the United States. What I have not discussed here are the various political problems involved. I admit they exist, but I haven't quite come to a conclusion of how the balance between government self preservation and blind and secure transactions will balance out. I believe in part it rests on how much the United States will be willing to abide by various constitutional provisions. Americans are going to have to decide if they really believe in free speech and freedom, a question which has begun to surface quite obviously of late. It will literally take a dictatorship to enforce taxation in any real way in 15 years, if not sooner. VAT, income, sales tax, or otherwise. > A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) > U. Miami School of Law | froomkin at law.miami.edu > P.O. Box 248087 | http://www.law.miami.edu/~froomkin > Coral Gables, FL 33124 USA | New address, but it's still just as hot here. --- "In fact, had Bancroft not existed, potestas scientiae in usu est Franklin might have had to invent him." in nihilum nil posse reverti 00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information From tedwards at Glue.umd.edu Sun Oct 15 12:58:22 1995 From: tedwards at Glue.umd.edu (Thomas Grant Edwards) Date: Sun, 15 Oct 95 12:58:22 PDT Subject: PA Remailer Concerns In-Reply-To: <199510150647.XAA25530@jobe.shell.portal.com> Message-ID: On Sat, 14 Oct 1995 anonymous-remailer at shell.portal.com wrote: > I would be surprised if they were singling out anonymous remailers. >They may have had other concerns regarding phone abuse, e.g., long >distance fraud. I am sure no PA state legislator knows what an anonymous remailer is. They have just made them illegal though. The question is, will the police ever figure out what they are, and will they ever bother to selectively enforce the law. -Thomas From froomkin at law.miami.edu Sun Oct 15 13:00:34 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Sun, 15 Oct 95 13:00:34 PDT Subject: My chat with Goeff Greiveldinger Message-ID: I will be appearing with Goeff Greiveldinger, he of the Justice Dept, at a discussion of commercial key escrow next Thursday in Bethesda. Anyone with fun questions I should throw at him should contact me... Please note that the ostensible topic of this discussion is *commerical* key escrow, not Clipper per se, so I have to be diplomatic.... A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | New address, but it's still just as hot here. From tedwards at Glue.umd.edu Sun Oct 15 13:05:57 1995 From: tedwards at Glue.umd.edu (Thomas Grant Edwards) Date: Sun, 15 Oct 95 13:05:57 PDT Subject: Netscape rewards are an insult In-Reply-To: <199510151855.OAA20783@slack.lne.com> Message-ID: On Sun, 15 Oct 1995, Eric Murray wrote: > What the hell is wrong with you people? Up 'til a few months > ago, the oft-heard refrain on cipherpunks was "why won't the > software vendors listen to us?" I have to agree with Eric. We now have software vendors talking about releasing more security source, taking bug reports seriously, etc. We are winning for crypto here. -Thomas From jim at acm.org Sun Oct 15 13:27:27 1995 From: jim at acm.org (Jim Gillogly) Date: Sun, 15 Oct 95 13:27:27 PDT Subject: My chat with Goeff Greiveldinger In-Reply-To: Message-ID: <199510152027.NAA23085@mycroft.rand.org> > Michael Froomkin writes: > I will be appearing with Goeff Greiveldinger, he of the Justice Dept, at > a discussion of commercial key escrow next Thursday in Bethesda. Anyone > with fun questions I should throw at him should contact me... > Please note that the ostensible topic of this discussion is *commerical* > key escrow, not Clipper per se, so I have to be diplomatic.... You might try addressing the areas of liability for escrow agents. If private escrow agents can be sued for loss of information due to theft or other authorized or unauthorized release of keys, their liability could be horrendous, depending on the value of the compromised data. Gillogly Software certainly will not be a commercial keyholder! Jim Gillogly 24 Winterfilth S.R. 1995, 20:20 From rugosa at escape.com Sun Oct 15 13:32:03 1995 From: rugosa at escape.com (rosaphil) Date: Sun, 15 Oct 95 13:32:03 PDT Subject: called as juror (fwd) Message-ID: (Better Living Thru Better Living) *************************************************************************** * SNAIL ME + GABRIELLI'S *ZINFANDEL* (RED) & * * YER ROSEHIPS + * * IF YOU LIKED THIS POST! + *ASCENZA* (WHITE-BLEND)---YUMMY! * *************************************************************************** [Ask Fer *Gabrielli Wine* at yer local liquor store if'n ya want to tend yer rugosa] Let your voice be heard in the campaign to save the life of Mumia Abu Jamal ++++ stop de execution of Mumia Abu-Jamal ++++ ++++ if you agree copy these 3 sentences in your own sig ++++ ++++ more info: http://www.xs4all.nl/tank/spg-l/sigaction.htm ++++ ---------- Forwarded message ---------- Date: Sun, 3 Sep 95 17:50 EST From: lindat at iquest.net To: news at aen.org Subject: called as juror From: landers at AZStarNet.com (L. A. ANDERSON) IF YOU'RE CALLED FOR JURY SERVICE Don't worry! Be happy! Look at jury service as an opportunity to "do good" for yourself and others. It's your chance to help the justice system deliver justice, which is absolutely essential to a free society. Also, you can do more "political good" as a juror than in practically any other way as a citizen: your vote on the verdict is also a measure of public opinion on the law itself--an opinion which our lawmakers are likely to take seriously. Short of being elected to office yourself, you may never otherwise have a more powerful impact on the rules we live by than you will as a trial juror. However, unless you are fully informed of your powers as a juror, you may be manipulated by the less powerful players in the courtroom into delivering the verdict they want, instead of what justice would require. That is why this "kit" was written--to give you information that you're not likely to receive from the attorneys, or even from the judge. _ Justice may depend upon your being chosen to serve, so here are some "words to the wise" about how to make it through voir dire, the jury selection process: You may feel that answering some of the questions asked of you would compromise your right to privacy. If you refuse to answer them, it will probably cost you your chance to serve. Likewise, if you "talk too much"--especially if you admit to knowing your rights and powers as a juror, as explained below, or that you have qualms about the law itself in the case at hand, or reveal that you're bright, educated, or are interested in serving! So, from voir dire to verdict, let your conscience be your guide. _ Nothing in the U.S. Constitution or in any Supreme Court decision requires jurors to take an oath to follow the law as the judge explains it or, for that matter, authorizes the judge to "instruct" the jury at all. Judges provide their interpretation of the law, but you may also do your own thinking. Keep in mind that no juror's oath is enforceable, and that you may regard all "instructions" as advice. _ Understanding the full context in which an illegal act was committed is essential to deciding whether the defendant acted rightly or wrongly. Strict application of the law may produce a guilty verdict, but what about justice? If the jurors agree that, beyond a reasonable doubt, the accused did act as charged, then "context becomes everything" in reaching a verdict you can live with. Credit or blame for the verdict will go to you, so be sure to ask the judge how you can pose questions to witnesses, so that you can learn the complete context, should the lawyers fail to bring it out. _ When they believe justice requires it, jurors can refuse to apply the law. Jurors have the power to consider whether the law itself is wrong (including whether it is "unconstitutional"), or is being applied for political reasons. Is the defendant being singled out as "an example" in order to demonstrate government muscle? Were the defendant's constitutional rights violated during the arrest? Much of today's "crime wave" consists of victimless crimes--crimes against the state, or "political crimes", so if you feel that a verdict of guilty would give the government too much power, or help keep a bad law alive, just remember that you can refuse to apply any law that violates your conscience. _ Prosecutors often "multiply charges" so the jury will assume the defendant "must be guilty of something". But one of the great mistakes a jury can make is to betray both truth and conscience by compromising. If you believe the defendant is not guilty of anything, then vote "not guilty" on all counts. _ You can't be punished for voting according to your conscience. Judges (and other jurors) often pressure hold-out jurors into abandoning their true feelings and voting with the majority "...to avoid the expense of a hung jury and mistrial". But you don't have to give in. Why? Because... _ Hung juries are "OKAY". If voting your conscience should lead to a hung jury, not to worry, you're doing the responsible thing. There is no requirement that you must reach a verdict. And the jury you hang may be significant as one of a series of hung juries sending messages to the legislature that the law you're working with has problems, and it's time for a change. If you want to reach consensus, however, one possible way is to remind your fellow jurors that... _ Jurors have the power to reduce charges against the defendant, provided that "lesser included offenses" exist in law (ask the judge to list and explain them, and the range of potential punishments that go with each). Finding guilt at a lower level than charged can be appropriate in cases where the defendant has indeed victimized someone, but not so seriously as the original charges would indicate. And, if it will be up to the judge to decide the sentence, it's within the power of the jury to find the defendant guilty of a reduced charge which will, at most, entail the amount of punishment it thinks is appropriate. _ The Fully Informed Jury Association (FIJA) hopes the above information helps you to find a verdict that you believe is conscientious and just, a verdict which you can therefore be proud to discuss with friends, family, legal professionals, the community or the media, should any of them want to know what happened, how, and why. If you have further questions, or want a hard copy of this article and others contained in FIJA's "Jury Power Information Kit", phone 1-800-TEL-JURY, and leave your name and address on tape. The office phone number for FIJA National HQ is 406-793-5550. From cjs at netcom.com Sun Oct 15 13:57:28 1995 From: cjs at netcom.com (Christopher J. Shaulis) Date: Sun, 15 Oct 95 13:57:28 PDT Subject: Netscape rewards are an insult In-Reply-To: Message-ID: <199510151944.PAA00705@localhost.cjs.net> > On Sun, 15 Oct 1995, Eric Murray wrote: > > > What the hell is wrong with you people? Up 'til a few months > > ago, the oft-heard refrain on cipherpunks was "why won't the > > software vendors listen to us?" > > I have to agree with Eric. We now have software vendors talking about > releasing more security source, taking bug reports seriously, etc. > We are winning for crypto here. Lets see if we can't get Microsoft some bad press. If they were to start taking the quality of their software seriously, we would be winning one for god, the queen, and the common good of all man kind. Christopher From unicorn at polaris.mindport.net Sun Oct 15 14:27:18 1995 From: unicorn at polaris.mindport.net (Black Unicorn) Date: Sun, 15 Oct 95 14:27:18 PDT Subject: My chat with Goeff Greiveldinger In-Reply-To: <199510152027.NAA23085@mycroft.rand.org> Message-ID: On Sun, 15 Oct 1995, Jim Gillogly wrote: > > > Michael Froomkin writes: > > I will be appearing with Goeff Greiveldinger, he of the Justice Dept, at > > a discussion of commercial key escrow next Thursday in Bethesda. Anyone > > with fun questions I should throw at him should contact me... > > > Please note that the ostensible topic of this discussion is *commerical* > > key escrow, not Clipper per se, so I have to be diplomatic.... > > You might try addressing the areas of liability for escrow agents. If > private escrow agents can be sued for loss of information due to theft > or other authorized or unauthorized release of keys, their liability could > be horrendous, depending on the value of the compromised data. Gillogly > Software certainly will not be a commercial keyholder! > > Jim Gillogly > 24 Winterfilth S.R. 1995, 20:20 > You also might point out that commercial escrow is in a way MORE prone to compromise because it effectively doubles the number of entities entitled to demand release of the keys. Instead of JUST government, you now have to face the possibility of key forfeiture by BOTH government and the commercial escrow agent, the escrow agent being, as it is, subject to the whim of governmental coercion to release keys as well as the agent's own reasons for doing so. Effectively the potential for misuse is increased by virtue of the increased numbers of officals (commercial and public) who have access to the material. I would like to hear the answer to this dilemna, which I am sure will include something about commercial key escrow easing the perceptions of the public, to which the obvious response will be, "Then this is a public relations move to avoid the perception of potential government abuse and a move which infact increases the level of risk, is that right?" Perhaps I should attend. Where and when is this precisely? --- "In fact, had Bancroft not existed, potestas scientiae in usu est Franklin might have had to invent him." in nihilum nil posse reverti 00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information From frissell at panix.com Sun Oct 15 14:31:19 1995 From: frissell at panix.com (Duncan Frissell) Date: Sun, 15 Oct 95 14:31:19 PDT Subject: airport security In-Reply-To: <951014071611.44602170@mitlns.mit.edu> Message-ID: On Sat, 14 Oct 1995, Bob Bruen, MIT Lab for Nuclear Science wrote: > like. The US security changes are a recent response, starting after the > World Trade Center bombing and being stepped up on a continuing basis. They really started earlier this year with the Unabomber threat to bomb an LA airliner earlier this year. The peculiar thing is that skyjackings and aircraft bombings are much rarer now than during the '70s. This is just a control ploy by the Feds. There's no credible increased threat. They just want to slowly introduce an internal passport. > Today you need a picture ID to board with your ticket. Tomorrow...? We have > lived in relative safety compared to the rest of the world, but I think those > days are over. I wonder how many have challenged this. Since IDs are still not required in life, what will they do if you simply present yourself without one. I don't see that ID has anything to do with attack threats in any case. Attackers are more likely to have ID than to not have ID. I suppose they are trying to discourage people from buying tickets in false names so that the databanks can be more useful to the authorities. DCF From bladex at bga.com Sun Oct 15 12:48:36 1995 From: bladex at bga.com (David Smith) Date: Sun, 15 Oct 1995 14:48:36 -0500 (CDT) Subject: Next EFF-Austin General Meeting : Cryptography Message-ID: Cryptography The Language Our Government Doesn't Want You to Learn EFF-Austin General Meeting Monday, October 16th, 7:00 to 9:00 p.m. La Madelein Inn, 3418 North Lamar The rights of individuals to live freely in a democracy versus the powers society grants law enforcement to fight crime is one of the longest running and one of the most contested debates in American history. Cryptography -- the ability to communicate in an encoded language -- is merely the latest incarnation. This general meeting is designed to provide an overview of the issues as well as an update on current events of the last six months. Areas of discussion include -- what is being called the "CLIPPER II" proposal -- the Clinton administration is willing to ease export restrictions on high strength cryptographic algorithms if an escrow decryption key is available where law enforcement officials have access to it. Speaker : David Smith, President EFF-Austin -- the recent cracking of a Netscape cryptography algorithm advertised as "secured" and it's implications for the development of electronic commerce on the Internet. One function of cryptography is that it provides a unique identifier. If you can't be reasonably sure that the person at the other end of the connection is who you think it is, just how much money are you will to risk in an electronic transaction? Speaker : Brian Combs, President Austin World Wide Web Users Group; Austin Web Publishing; and Board member, EFF-Austin. -- Pretty Good Privacy. What is PGP, how does it work, who is Phil Zimmerman, and what is the legal status of all of this? Copies of PGP will be made available, as well as laptops to use for generating keys and keyrings. Speaker : Jim McCoy, Austin Cypherpunks. Other topics are sure to be discussed; this is just a starting point for discussion. EFF-Austin is a local grass roots organization created to protect civil liberties in cyberspace. We provide educational forums on the social, legal, and political consequences of cyberspace. For further information, contact EFF-Austin President David Smith via e-mail (bladex at bga.com). From frissell at panix.com Sun Oct 15 14:49:41 1995 From: frissell at panix.com (Duncan Frissell) Date: Sun, 15 Oct 95 14:49:41 PDT Subject: My chat with Goeff Greiveldinger In-Reply-To: Message-ID: > You also might point out that commercial escrow is in a way MORE prone to > compromise because it effectively doubles the number of entities entitled > to demand release of the keys. Actually, any publically known escrow system opens your communications to any lawyer who gets a blanket discovery subpoena. These are very popular these days and often include third parties to any lawsuit. Anyone who can convince a judge to issue an order... DCF From sandfort at crl.com Sun Oct 15 15:26:11 1995 From: sandfort at crl.com (Sandy Sandfort) Date: Sun, 15 Oct 95 15:26:11 PDT Subject: Crypto & Taxes [WAS Re: Cybersecurity] In-Reply-To: Message-ID: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SANDY SANDFORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C'punks, On Sun, 15 Oct 1995, Black Unicorn wrote: > At some point, the only thing your going to be able to tax is "Goods." > As in solid and measureable. > > When this is true, the most profitable venture in the United States will > be retail smuggling. And as taxes are raised again and again, compliance > will drop and drop until the largest portion of the national budget will > be enforcement of the Value Tax Reform and Retail Laundering and > Terrorism Act of 2002. There is an article in this week's issue of THE EUROPEAN about cigarette smuggling in Europe. There is some regulatory arbitrage from south to north because of disparities in the local taxes on tobacco, but the big "problem" is American cigarettes. Since even in the lowest tax European countries taxes make up 70% of the retail price of cigarettes, there is huge incentive to smuggle in US smokes. Makes me proud to be an American. S a n d y ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From s1018954 at aix2.uottawa.ca Sun Oct 15 15:34:03 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sun, 15 Oct 95 15:34:03 PDT Subject: airport security In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Duncan Frissell wrote: > I suppose they are trying to discourage people from buying tickets in > false names so that the databanks can be more useful to the authorities. > You mean to the list marketing companies and the credit rating agencies. From daw at lagos.CS.Berkeley.EDU Sun Oct 15 15:34:26 1995 From: daw at lagos.CS.Berkeley.EDU (David A Wagner) Date: Sun, 15 Oct 95 15:34:26 PDT Subject: Netscape rewards are an insult Message-ID: <199510152232.SAA12387@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <9510141153.AA16412 at all.net>, Dr. Frederick B. Cohen wrote: > The idea that Netscape (like Microsoft) thinks they can get free > testing services from all over the net by real experts just by offerring > a tee shirt is down right offensive. But (amusingly enough) they can get free testing services from this aspiring student for free just by providing source code. Hey, it's fun! :-) I'm no expert, but you get what you pay for. [Psst: anyone wanna offer source code to the security modules?] I do think their ``bug bounty'' system is an improvement -- at least they're showing some concern for security, and beginning to admit that outside review of security-critical code is...well...critical. Still, I do agree that they really oughta be employing true experts to carefully evaluate their system, if they wanna claim anything about its security. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMIGMAyoZzwIn1bdtAQG98wF9Hr8lU8nXqP50MNwO2SNhsMUg5XhzfcWg 22Tsp8OkYV3F22gUcI6Un1w7peK7ciT5 =hs1A -----END PGP SIGNATURE----- From shamrock at netcom.com Sun Oct 15 15:36:39 1995 From: shamrock at netcom.com (Lucky Green) Date: Sun, 15 Oct 95 15:36:39 PDT Subject: My chat with Goeff Greiveldinger Message-ID: <199510152234.SAA12406@book.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <199510152027.NAA23085 at mycroft.rand.org>, jim at acm.org (Jim Gillogly) wrote: > You might try addressing the areas of liability for escrow agents. If > private escrow agents can be sued for loss of information due to theft > or other authorized or unauthorized release of keys, their liability could > be horrendous, depending on the value of the compromised data. The problem of liability should be managable. There are commercial data storage firms (microfilm, etc.) that not only have access to the key for your data, but to the data itself. Still, liability lawsuits have not driven them out of business. I therefore belive that liability issues will not pose a significant obstacle to commercial key escrow. - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBMIGMiCoZzwIn1bdtAQHiJQGAlFhXEVKkf329xCbpWHHXYRkMNJUpbdDZ nrEKcYvu9SVt/wlPLSq97sWukyQPxth0 =c5Wl -----END PGP SIGNATURE----- From rah at shipwright.com Sun Oct 15 15:50:48 1995 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 15 Oct 95 15:50:48 PDT Subject: Yes, indeed the PA law is for real! Message-ID: >PA Senate Bill 655 was signed into law on June 13, 1995, and it does >appear to make non-logged anonymous remailers illegal. This is rich! The PA legislature just set themselves up for an anonymous e-mail shit-storm from people using *foriegn* non-logging remailers to prove their point. Hold on to your shorts, you guys at hacktic, et. al., you're gonna have some fun now... Cheers, Bob ----------------- Robert Hettinga (rah at shipwright.com) Shipwright Development Corporation, 44 Farquhar Street, Boston, MA 02131 USA (617) 323-7923 "Reality is not optional." --Thomas Sowell >>>>Phree Phil: Email: zldf at clark.net http://www.netresponse.com/zldf <<<<< From jya at pipeline.com Sun Oct 15 15:56:45 1995 From: jya at pipeline.com (John Young) Date: Sun, 15 Oct 95 15:56:45 PDT Subject: Netscape rewards are an insult Message-ID: <199510152256.SAA02632@pipe4.nyc.pipeline.com> All praise to Jeff and his fellow programmers for sharing the struggle to come up with stronger cypto, but, no praise at all to Netscape's front office guys bullshitting the stock holders and speculators. Check the press releases and the speeches to customers and investors. Scott McNealy shocked an audience into silence at a recent plush meeting of high-tech reps with investors by asking, "Anybody telling the truth here?" Then applause broke out for his shrewd beat-em-to-the-punch candor to offset the pervasive cynicism of oft-burned high-tech investors. Big bucks are not made by hard-working programmers but by the marketeers of NASDAQ and NYSE smoke and mirrors used to lure multitudes of unsavvy investors and Internet merchandisers. Netscape's leaders are protecting its major stockholding coldhearts, just like Microsoft, Intel, Motorola, AT&T, and the rest do, or they die in the financial fuck-the- public sharkpool. They couldn't care less about the bottom- of-the-ladder techies who do the grunge work, take the blame for programming mistakes produced under horrendous marketing deadlines, and then are left to commiserate with each other and gnaw knuckles. That's the joy and sorrow of this reading list, the ancient story, talented people working their asses off for sons of bitches who think employees are contemptible, disposable or bribeable for cheap change and backpats -- and easily replaceable on shore or off. Jeff's not alone in this bind. From s1018954 at aix2.uottawa.ca Sun Oct 15 16:01:47 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sun, 15 Oct 95 16:01:47 PDT Subject: Crypto & Taxes [WAS Re: Cybersecurity] In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Sandy Sandfort wrote: > cigarettes. Since even in the lowest tax European countries > taxes make up 70% of the retail price of cigarettes, there is > huge incentive to smuggle in US smokes. Makes me proud to be > an American. Canada had exactly the same tax and had to eliminate it two years ago after massive smuggling (supposedly in large part through native reserves that straddle the border). The cigarette companies were actively (I won't say alleged, it was definite) involved in the process, as they exported their goods to a non-existant US market and let the packs sit in cargo trailers to be picked up. Needless to say, there was no tax on exports. The previous gov had imposed one but had to drop it after massive cig. co lobbying alleging that Americans (who never even received the Canadian cigs) would switch to their own brands and jobs would be lost. Cigarettes are a rather large industry and at the time were basically operating a black market. One wonders how much easier this will become once someone gets around to setting up a hard credible anon payment scheme. The corporate willingness is certainly there. And I really don't see the securities industry (specifically currency markets) sticking around once some competitive and sufficiently anon alternatives to the SEC go online and offshore. Some sort of market regs enforcement is essential though, you'll never have enough investor confidence for economically significant blacknet exchanges otherwise. From s1018954 at aix2.uottawa.ca Sun Oct 15 16:10:05 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sun, 15 Oct 95 16:10:05 PDT Subject: My chat with Goeff Greiveldinger In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Black Unicorn wrote: > Effectively the potential for misuse is increased by virtue of the > increased numbers of officals (commercial and public) who have access to > the material. Does he mean mandatory commercial key escrow (as in clipper keys held by credit agencies?) Or something totally voluntary but standardized by the gov? *Rant mode on* I've heard cracking into Equifax and TRW is considered a rite of passage in the phreaker crowd. The security would have to *damn* tight (as in forget it) for it to be trustworthy. And since it would probably be the big three credit rating agencies (I forget the other one), their track record is not reassuring. I don't see these people securely using crypto throughout the entire org (in such a large org) in the future if they don't already. Seeing my key sold to Son of Blacknet(LD) by Sons of Mitnick is not reassuring. For that matter, what sort of databases would they consider holding this on? And how easy would it be for the general public to get access to their key, to verify for accuracy and revoke compromised keys. (big prob with the credit rating agencies) Who would be allowed (if anyone) or mandated (depending on which scheme) to certify the security? If NSA is mentionned, one might also point out the job Matt Blaze did on their Clipper. Bad production values don't make for good public security. Of course it all depends on exactly why they really want the escrow anyway. If people will encrypt a second time with tomorrow's pgp, why should anyone care? All you'd single encrypt for would be your income tax and the financial records you're already required by law to keep (I'm sure I've misunderstood this. Can't be so useless.). I know that's not a particularily diplomatic carry-over from the debated-to-death clipper thing, but really, except as PR, why DO they still take this seriously? (unless you want to be paranoid about a ban, hmm, nevermind, debated-to-death) Speaking of organizational crypto, anyone know what the scheme used in Notes is? I know there's RSA... This seems rather more useful to examine than MS's browser, considering corporations are making it a standard for groupwork. All you'd get on a browser would be credit no's and maybe e-mail. Notes nets might carry the entirety of a company's docs and work in progress. They do export it, right? Weakened foreign version or one 40 bit key version for everyone? How about novell netware? (Yeah, I do realize most folks don't have it, neither do I. A free client would be very nice, Mr. Gerstner, for everyone.) From perry at piermont.com Sun Oct 15 16:10:42 1995 From: perry at piermont.com (& E. Metzger) Date: Sun, 15 Oct 95 16:10:42 PDT Subject: Netscape bugs bounty Message-ID: <199510152310.TAA29098@jekyll.piermont.com> I am among the first people to be sarcastic about things Netscape has done (I believe I originated the joke about the extra money from the Netscape IPO being used to build a structure large enough to house Marc Andreessen's ego), but I think this sniping about the Bugs Bounty is silly. They are finally starting to try to do the right thing and take problems, especially security problems, with their software seriously and not sweep them under the rug. Cut them some slack. It might not be perfect, but they are moving in a good direction. Perry From tedwards at Glue.umd.edu Sun Oct 15 16:18:55 1995 From: tedwards at Glue.umd.edu (Thomas Grant Edwards) Date: Sun, 15 Oct 95 16:18:55 PDT Subject: Netscape rewards are an insult In-Reply-To: <199510152256.SAA02632@pipe4.nyc.pipeline.com> Message-ID: On Sun, 15 Oct 1995, John Young wrote: > All praise to Jeff and his fellow programmers for sharing > the struggle to come up with stronger cypto, but, no praise > at all to Netscape's front office guys bullshitting the > stock holders and speculators. Check the press releases and > the speeches to customers and investors. I think it will be interesting to see if Netscape will ever sell enough product to make a profit...however, they seem to be an excellent charity so far, making the WWW a very popular place. -Thomas From frissell at panix.com Sun Oct 15 16:37:30 1995 From: frissell at panix.com (Duncan Frissell) Date: Sun, 15 Oct 95 16:37:30 PDT Subject: Crypto & Taxes [WAS Re: Cybersecurity] In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Black Unicorn wrote: > Were I an overseas employer, I would be quite happy to work in a > "disinterested" jurisdiction and hire American workers to telecommute and > issue their pay blindly to the number only or crypto bank account of their > choice and promptly encrypt or lose the records. Thanks for responding, Black (if I may call you Black), it means I don't have to. > Remember, there is an incentive for employERS as well as employees to > flee the tax system of a nation that is manipulative of it. Employers Also an incentive for jurisdictions to engage in a beneficial "Dutch Auction" in which they offer lower and lower tax rates to attract employers and employees. > Who are you going to work for? The publisher who is based in New York > and reports all payments, or the publisher who works in the Cayman > Islands, reports nothing, and merely sells the manuscript to the big name > publisher in New York after purchasing it blind from you? And as the intellectual components of goods and services are increasingly unbundled from the physical for efficiency reasons (greater range of competitors made possible) more work can be done at a distance. > When this is true, the most profitable venture in the United States will > be retail smuggling. And as taxes are raised again and again, compliance Fairly easy these days with drop shipping of goods by third parties and the bypassing of retail distribution chains for more and more goods. In any case, if goods end up being a smaller portion of Gross World Product, taxes on them become less significant. The existence of taxation of physical goods certainly tips things in favor of the untaxed non physical goods and services. Note that agriculture once made up 95% or more of GWP. It doesn't any more. Non physical goods like entertainment, financial services, etc can grow to dominate the world economy because they adapt well to cheap distribution over the nets. In the Progress and Freedom Foundation's Friction Free Capitalism, taxes are a big part of the "friction" that is disintermediated. DCF From jleishma at ozemail.com.au Sun Oct 15 16:45:55 1995 From: jleishma at ozemail.com.au (John Leishman) Date: Sun, 15 Oct 95 16:45:55 PDT Subject: JOin List request - help please Message-ID: <199510152345.JAA28781@oznet02.ozemail.com.au> Have tried on MANY occassions to join your list. The resultsd are commonly, in varitions of; Date: Tue, 12 Sep 95 15:44:37 PDT To: jleishma at ozemail.com.au From: Majordomo at toad.com Subject: Your Majordomo request results: Re: Your Majordomo request results: Reply-To: Majordomo at toad.com -- Your request of Majordomo was: >>>> subscribe Cypherpunks **** subscribe: unknown list 'Cypherpunks'. Please please, could I be joined --------------------------------------------------- >>--> -*-_|\ John Leishman in Tropical Darwin / \ Wk (61) (089) 81 8155 Hm (61 (089) 81 9697 \_.--._/ Mobile (61) 018 089 631 Fax (61)(089) 819415 v E-Mail jleishma at ozemail.com.au 100026.157 at compuserve From iagoldbe at csclub.uwaterloo.ca Sun Oct 15 16:48:39 1995 From: iagoldbe at csclub.uwaterloo.ca (Ian Goldberg) Date: Sun, 15 Oct 95 16:48:39 PDT Subject: I am looking for a way to create a zombie process In-Reply-To: <9510151556.AA26716@all.net> Message-ID: <45s6kc$t5r@calum.csclub.uwaterloo.ca> In article , Michael Shields wrote: >> Is there anyone who can give me a simple program or set of commands that >> creates a zombie process? Thanks in advance. > >Here, public domain. > > wait(); wait(NULL); would be saner. - Ian From rsalz at osf.org Sun Oct 15 17:28:39 1995 From: rsalz at osf.org (Rich Salz) Date: Sun, 15 Oct 95 17:28:39 PDT Subject: what are these people selling???? Message-ID: <9510160025.AA08409@sulphur.osf.org> >Jim Bidzos and some of us might have interesting interactions on >patent issues, but I've got to emphasize that he's no demon. He's a >guy trying to make a buck on his patent properties -- by and large he >has the same interests about seeing cryptography spread that the rest >of us do. Only until the patents expire. He's no demon, but there's no altruism at work. Come the millenium he moves to things like selling cars. You heard it here first. /r$ From mark at lochard.com.au Sun Oct 15 18:42:30 1995 From: mark at lochard.com.au (Mark) Date: Sun, 15 Oct 95 18:42:30 PDT Subject: PA Remailer Concerns In-Reply-To: Message-ID: <199510152238.AA43670@junkers.lochard.com.au> >I am sure no PA state legislator knows what an anonymous remailer is. >They have just made them illegal though. The question is, will the police >ever figure out what they are, and will they ever bother to selectively >enforce the law. More likely the law will be used when a remailer operator wont play ball with the local LEA and surrender any existing logs. Then the LEA can simply throw the operator into a court under this legislation. If (when?) something serious is perpetrated and planned using a remailer then they will have the motivation to shut them down. Cheers, Mark mark at lochard.com.au The above opinions are rumoured to be my own. From futplex at pseudonym.com Sun Oct 15 19:13:48 1995 From: futplex at pseudonym.com (Futplex) Date: Sun, 15 Oct 95 19:13:48 PDT Subject: PA Remailer Concerns In-Reply-To: <199510152238.AA43670@junkers.lochard.com.au> Message-ID: <199510160213.WAA07796@thor.cs.umass.edu> [I'm sending this to the cypherpunks and remailer-operators lists. Replies are directed to c'punks, just to avoid crossposting followups, but I read both lists. -Futplex] Mark writes: [re: a new Pennsylvania law] > More likely the law will be used when a remailer operator wont play ball with > the local LEA and surrender any existing logs. Then the LEA can simply throw > the operator into a court under this legislation. > > If (when?) something serious is perpetrated and planned using a remailer then > they will have the motivation to shut them down. I would very much like to see this law tested. I think it could prove fairly important to attack it with a well-planned, benign test case rather than wait for the next National Liberation spam or a death threat. I don't live in PA, but I would be willing to participate as the defendant in a test case under the right circumstances. Presumably I would open an account with an ISP in Penna., set up a remailer on the account (need to find an ISP that clearly allows that), and have somebody send a message through it. We would need to design a promising test case and find an attorney willing & able to offer pro bono services. Any comments or suggestions, esp. from legal types (who of course are not offering formal legal advice to anyone :) ? Is this realistic ? What would it take to elicit a prosecution for such a test case ? -Futplex From tcmay at got.net Sun Oct 15 19:15:49 1995 From: tcmay at got.net (Timothy C. May) Date: Sun, 15 Oct 95 19:15:49 PDT Subject: My chat with Goeff Greiveldinger Message-ID: At 8:00 PM 10/15/95, Michael Froomkin wrote: >I will be appearing with Goeff Greiveldinger, he of the Justice Dept, at >a discussion of commercial key escrow next Thursday in Bethesda. Anyone >with fun questions I should throw at him should contact me... > >Please note that the ostensible topic of this discussion is *commerical* >key escrow, not Clipper per se, so I have to be diplomatic.... The question I have is this: Why is the Justice Department even involved at all if it is truly only about _commercial_ key escrow? (I have some speculations, of course, which I'll share in a minute.) While commercial key escrow of course has legal implications, so do a lot of things that I suspect the Justice Department has no interest in discussing with anyone. And most of the implications of commercial key escrow--if strongly voluntary in the sense we have discussed many times here--are implications of _contract_ law that will get hashed out through court cases. So, why is the JD interested? Why would Mr. Greiveldinger of the JD be at a discussion of commercial key escrow if in fact it is to be purely voluntary and strongly voluntary? Unless, of course, the JD has interests that go beyond mere privately arranged contracts to hold keys in safety. Or, I suppose, export control issues. (But then I think it unlikely that a strongly voluntary system would be allowed to be exported. And since a domestic version that is strongly voluntary would leak out almost immediately, I think a domestic strongly voluntary CKE system is unlikely.) I suspect Michael Froomkin can tell us why the JD is involved, what the stated reason is, but I still find it "odd" that a purely voluntary contractual arrangement between, say, "Thomas Paine" and "Ye Olde Keye Repository" is generating interest by King George's legal officers. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From unicorn at polaris.mindport.net Sun Oct 15 19:16:24 1995 From: unicorn at polaris.mindport.net (Black Unicorn) Date: Sun, 15 Oct 95 19:16:24 PDT Subject: My chat with Goeff Greiveldinger In-Reply-To: Message-ID: On Sun, 15 Oct 1995 s1018954 at aix2.uottawa.ca wrote: > On Sun, 15 Oct 1995, Black Unicorn wrote: > > > Effectively the potential for misuse is increased by virtue of the > > increased numbers of officals (commercial and public) who have access to > > the material. > > Does he mean mandatory commercial key escrow (as in clipper keys held > by credit agencies?) Or something totally voluntary but standardized > by the gov? The problem exists in both these examples. > > Of course it all depends on exactly why they really want the escrow anyway. > If people will encrypt a second time with tomorrow's pgp, why should anyone > care? When you see a glaring hole in argument for a government program, you should smell the stench of fish in the air. That is the section of the puzzle that is being hidden until a politically "ripe" time to stick it in place. Here that piece is, obviously, banning tomorrow's pgp. > > All you'd single encrypt for would be your income tax and the > financial records you're already required by law to keep (I'm sure I've > misunderstood this. Can't be so useless.). I know that's not a particularily > diplomatic carry-over from the debated-to-death clipper thing, but really, > except as PR, why DO they still take this seriously? (unless you want to > be paranoid about a ban, hmm, nevermind, debated-to-death) I'm not so sure it's paranoid. You have trial baloons floating all over. Freeh is a prime example, and no one is screaming loudly enough to shoot down his blump. That's a big'ole green light for regulators.> --- "In fact, had Bancroft not existed, potestas scientiae in usu est Franklin might have had to invent him." in nihilum nil posse reverti 00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information From MAILER-DAEMON at usmc.mil Sun Oct 15 19:23:16 1995 From: MAILER-DAEMON at usmc.mil (MAILER-DAEMON at usmc.mil) Date: Sun, 15 Oct 95 19:23:16 PDT Subject: Undeliverable Message Message-ID: To: Cc: Subject: Re: PA Remailer Concerns Message not delivered to recipients below. Press F1 for help with VNM error codes. VNM3043: CPL JASON P JONES at IRM711@MCLB Albany VNM3043 -- MAILBOX IS FULL. The message cannot be delivered because the recipient's mailbox contains the maximum number of messages, as set by the system administrator. The recipient must delete some messages before any other messages can be delivered. The default limit is 1000 messages. Administrators can set lower limits if required using the Change mailbox settings function available in the Manage User menu (MUSER). The 1000 message limit is the maximum allowed by the Mail program. If this limit is reached, the recipient must delete some of the messages before the mailbox can accept any more incoming messages. ---------------------- Original Message Follows ----------------------[I'm sending this to the cypherpunks and remailer-operators lists. Replies are directed to c'punks, just to avoid crossposting followups, but I read both lists. -Futplex] Mark writes: [re: a new Pennsylvania law] > More likely the law will be used when a remailer operator wont play ball with > the local LEA and surrender any existing logs. Then the LEA can simply throw > the operator into a court under this legislation. > > If (when?) something serious is perpetrated and planned using a remailer then > they will have the motivation to shut them down. I would very much like to see this law tested. I think it could prove fairly important to attack it with a well-planned, benign test case rather than wait for the next National Liberation spam or a death threat. I don't live in PA, but I would be willing to participate as the defendant in a test case under the right circumstances. Presumably I would open an account with an ISP in Penna., set up a remailer on the account (need to find an ISP that clearly allows that), and have somebody send a message through it. We would need to design a promising test case and find an attorney willing & able to offer pro bono services. Any comments or suggestions, esp. from legal types (who of course are not offering formal legal advice to anyone :) ? Is this realistic ? What would it take to elicit a prosecution for such a test case ? -Futplex From unicorn at polaris.mindport.net Sun Oct 15 19:26:26 1995 From: unicorn at polaris.mindport.net (Black Unicorn) Date: Sun, 15 Oct 95 19:26:26 PDT Subject: Crypto & Taxes [WAS Re: Cybersecurity] In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Duncan Frissell wrote: > > > On Sun, 15 Oct 1995, Black Unicorn wrote: > > > Were I an overseas employer, I would be quite happy to work in a > > "disinterested" jurisdiction and hire American workers to telecommute and > > issue their pay blindly to the number only or crypto bank account of their > > choice and promptly encrypt or lose the records. > > Thanks for responding, Black (if I may call you Black), it means I don't > have to. 'uni' sounds a lot less charged, but it doesn't matter much to me. My pleasure. > > Remember, there is an incentive for employERS as well as employees to > > flee the tax system of a nation that is manipulative of it. Employers > > Also an incentive for jurisdictions to engage in a beneficial "Dutch > Auction" in which they offer lower and lower tax rates to attract > employers and employees. "Race to the bottom" this is usually called by statists who dislike the effect. It's also applied to things like environmental regulation, where (for example) many businesses in Illinois moved to Indiana when it became clear that Indiana was much more corporate friendly because their 'office paper' disposal "tax" was zero, and Illinois was significant enough to make small business feel the pressure. (No, I'm not kidding) Of course, losing the business, Illinois uped the ante and eliminated the tax all together and coupled it with some kind of incentive. Indiana countered and so forth. Everyone won, of course, in that the total number of small businesses in both states outgrew economic growth over the period, but the leftists had a fit. Wealth maximization is not a concept that is easily understoof by greedy statists who want MORE and want it NOW. I am amused that this strata of market forces is never recognized as market forces, but just dirty nasty states shooting important regulation down. > DCF --- "In fact, had Bancroft not existed, potestas scientiae in usu est Franklin might have had to invent him." in nihilum nil posse reverti 00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information From anonymous at replay.com Sun Oct 15 19:31:47 1995 From: anonymous at replay.com (Nobody in particular) Date: Sun, 15 Oct 95 19:31:47 PDT Subject: Illegally canceled articles on Microsoft Security Bugs In-Reply-To: Message-ID: <199510160231.TAA10813@Networking.Stanford.EDU> (A copy of this message has also been posted to the following newsgroups: alt.security, comp.os.ms-windows.apps.misc,comp.os.ms-windows.win95.misc,alt.religion.scientology,news.admin.net-abuse.misc,comp.protocols.smb,comp.os.ms-windows.advicacy,comp.os.ms-windows.networking.tcp-ip) -----BEGIN PGP SIGNED MESSAGE----- Could somebody please tell me who illegally canceled my article , referenced in the followup article below, as well as several other articles I posted this morning? It was cross-posted to several groups, but I don't think it should have triggered any spam-cancelers, and I see nothing in news.admin.net-abuse.misc. I'd find the cuplrit myself, but Stanford only saves the last 100 or so messages in control. See the rather prominent blinking link on the Web page below for the other PGP-signed article that was canceled. Thanks in advance. Followups set to news.admin.net-abuse.misc. Don't bother canceling this article, my friend. By the way, the other articles were saved and emailed as well. - -rich jabba at deathstar.stanford.edu and other accounts moderator of a certain list http://rescomp.stanford.edu/~llurch/innocuous/faq.html PGP key available on MIT server and via finger -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMIHC9oND7LjhcPQ9AQHTZgQAxGQZGTFDrzUTfyWCuLTUP2VbIp6IwK/Y NJjy7ke4rgZH+bjegb1h2ig/lALEhnX4+uhurhDJ0wq6du2p5V/DUlsNHCcWvotL GHyd/ZLzXGq6OYRoPijUHAdDBPD2wWIdAfsYNiTgv3iezBJL+2cCq/YLiPd22KyF MROQwF05Hoc= =1K2B -----END PGP SIGNATURE----- I will be charitable and assume that it was someone else I've pissed off (lord knows there's several), and not someone working directly for Microsoft or the Church [spit] of Scientology, who were both maligned in the canceled posts. In article , petrich at netcom.com (Loren Petrich) wrote: > Newsgroups: > alt.security,comp.os.ms-windows.apps.misc,comp.os.ms-windows.win95.misc > Path: > nntp.Stanford.EDU!news.Stanford.EDU!agate!howland.reston.ans.net!newsfeed.internetmci.com!news.sprintlink.net!noc.netcom.net!netcom.com!petrich > From: petrich at netcom.com (Loren Petrich) > Subject: Re: More Microsoft Security Bugs > Message-ID: > Organization: NETCOM On-line Communication Services (408 261-4700 guest) > References: > Date: Sun, 15 Oct 1995 21:02:42 GMT > X-Original-Newsgroups: > comp.os.ms-windows.win95.misc,alt.security,comp.os.ms-windows.apps.financial,comp.os.ms-windows.apps.utilities,comp.os.ms-windows.apps.word-proc,comp.os.ms-windows.apps.misc,alt.fan.bill-gates,comp.os.ms-windows.advocacy,alt.destroy.microsoft,comp.os.ms-windows.nt.admin.misc > Lines: 9 > Sender: petrich at netcom2.netcom.com > Xref: nntp.Stanford.EDU alt.security:21764 > comp.os.ms-windows.apps.misc:13757 comp.os.ms-windows.win95.misc:38436 > My favorite example of such a bug is in BOB's password protection. > If you mistype it 3 times, it will ask if you want another one. The only > defender of this "feature" has been -- get this -- JoanieDearest (at > least if memory serves me correctly). > -- > Loren Petrich Happiness is a fast Macintosh > petrich at netcom.com And a fast train > Visit my ftp site; its address is (in WWW syntax): > ftp://ftp.netcom.com/pub/pe/petrich From ravage at einstein.ssz.com Sun Oct 15 19:32:27 1995 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 15 Oct 95 19:32:27 PDT Subject: Next EFF-Austin General Meeting : Cryptography (fwd) Message-ID: <199510160233.VAA01932@einstein.ssz.com> Forwarded message: From s1018954 at aix2.uottawa.ca Sun Oct 15 19:32:40 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sun, 15 Oct 95 19:32:40 PDT Subject: PA Remailer Concerns (and one very stupid joke) In-Reply-To: <199510152238.AA43670@junkers.lochard.com.au> Message-ID: On Mon, 16 Oct 1995, Mark wrote: > More likely the law will be used when a remailer operator wont play ball with > the local LEA and surrender any existing logs. Then the LEA can simply throw > the operator into a court under this legislation. Make fake logs. A random log generator with the e-mail addresses of the country's state, municipal and federal legislators, schoolchildren and a random sampling of the (*!ahem!*) tamer usenet groups would make for an excellent seed file. I really don't see there being very much enforcement following an initial case. It would do wonders for Nobody, an12345 and Tommy de Tourist's (as Tim's sig puts it) reputations, wouldn't you say? > The above opinions are rumoured to be my own. You aren't sure either, eh? On the banque des cypherpunks front, I recently pinged cthulhu.com as a joke. It worked. One wonders if the offshore and underwater Ryleh inc. is passing itself off as a PPP account as it prepares to resurface. They're just waiting for a sign. I know who my banker's gonna be. Somehow I don't think US jurisdiction extends just that far. Takes care of black securities & banking probs too. Who'd dare to cross the big boss? (looking forward to anonymous, untraceable, digital ftagn$) From sameer at c2.org Sun Oct 15 19:33:27 1995 From: sameer at c2.org (sameer) Date: Sun, 15 Oct 95 19:33:27 PDT Subject: PA Remailer Concerns In-Reply-To: <199510160213.WAA07796@thor.cs.umass.edu> Message-ID: <199510160228.TAA17962@infinity.c2.org> I've sent mail to John Gilmore asking him if the EFF might want to take part in suing the state over this thing. We'll see, I guess. -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From froomkin at law.miami.edu Sun Oct 15 19:39:19 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Sun, 15 Oct 95 19:39:19 PDT Subject: My chat with Goeff Greiveldinger In-Reply-To: Message-ID: Tim May asks why Greiveldinger is invited (or, more to the point, why he accepted the invitation). I don't know. There are fun legal issues, not all arising from contract here. In particular, assume for a momement that (1) the goverment offers "escrow" services and/or (2) the government requires that >40 bit encryption products include mandatory US govt-apporved escrow as a precondition for export clearance [the NIST trial balloon]. Under (1) your participation in the escrow is not necessarily "voluntary"; a similar, if less powerful, argument can be made under (2). Also, when the government provides the "escrow service" different liability rules may apply. FWIW, My guess is GG is going because the right person asked him. That's why I'm going, and that's how Washington works... A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | It's hot here. And humid. From froomkin at law.miami.edu Sun Oct 15 19:42:21 1995 From: froomkin at law.miami.edu (Michael Froomkin) Date: Sun, 15 Oct 95 19:42:21 PDT Subject: My chat with Goeff Greiveldinger In-Reply-To: Message-ID: Those seeking more info on the conference will find it at: Http://www.multicorp.com/wec. They are asking over $500 in registration fees, which strikes me as wildly excessive, so I'm not advocating attendence. The third member of my panel, Frank Sudia of Banker's Trust has pulled out, so don't believe everthing you read either. I might post the outline of my talk in a day or two if I get around to translating my cryptic jottings into ASCII. A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | It's hot here. And humid. From tcmay at got.net Sun Oct 15 19:48:47 1995 From: tcmay at got.net (Timothy C. May) Date: Sun, 15 Oct 95 19:48:47 PDT Subject: PA Remailer Concerns Message-ID: At 2:13 AM 10/16/95, Futplex wrote: >I would very much like to see this law tested. I think it could prove fairly >important to attack it with a well-planned, benign test case rather than wait >for the next National Liberation spam or a death threat. > >I don't live in PA, but I would be willing to participate as the defendant in >a test case under the right circumstances. Presumably I would open an >account with an ISP in Penna., set up a remailer on the account (need to find >an ISP that clearly allows that), and have somebody send a message through it. > >We would need to design a promising test case and find an attorney willing & >able to offer pro bono services. I'm not a lawyer, though I hang out on the "Cyberia" list and I watched a lot of the OJ trial. :-} Seriously, it is hard to "design a promising test case" in this way. They--the Pennsylvania law enforcement authorities--don't have to take the bait. They can just do nothing, until an incident arises which provokes them. Maybe next year, maybe five years from now. Such an incident is likely to be one that they figure will make for a popular prosecution. One of the Four Horseman, probably. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From jim at acm.org Sun Oct 15 19:57:17 1995 From: jim at acm.org (Jim Gillogly) Date: Sun, 15 Oct 95 19:57:17 PDT Subject: Why commercial key escrow? [Re: My chat with Goeff Greiveldinger] In-Reply-To: Message-ID: <199510160257.TAA23550@mycroft.rand.org> > tcmay at got.net (Timothy C. May) writes: > The question I have is this: Why is the Justice Department even involved at > all if it is truly only about _commercial_ key escrow? DoJ is involved because industry didn't buy into Clipper-type GAK, and the FBI still wants to be able to read encrypted files, as well as encrypted phone conversations if they ever turn up. The White House is willing to help, but not to the extent of making GAK mandatory. However, they (WH and FBI) are hopeful that forcing either GAK or weak encryption on the export market will encourage companies to build single systems that they can both export and sell domestically, which would make the domestic ones weak or GAKed as well. DoJ is involved with the commercial escrow because they (or NIST or somebody) expect to be certifying the export escrow companies, which they hope will be the same operations. As a data point, Dorothy Denning is increasingly pessimistic that this plan will in fact result in the same weak or escrowed system being used domestically; if it doesn't, that presumably triggers Louis Freeh to head back to the Hill for more legislation. I don't know what they intend to do about PGP-like systems, but I suspect that's a second-order concern; the first-order concern must be avoiding the situation where Microsoft builds unGAKed 3DES into Word. Jim Gillogly Trewesday, 25 Winterfilth S.R. 1995, 02:51 From hallam at w3.org Sun Oct 15 20:00:49 1995 From: hallam at w3.org (hallam at w3.org) Date: Sun, 15 Oct 95 20:00:49 PDT Subject: Illegally canceled articles on Microsoft Security Bugs In-Reply-To: <199510160231.TAA10813@Networking.Stanford.EDU> Message-ID: <9510160300.AA27823@zorch.w3.org> Hi, I would discount the possibility of the cancellations being by a Microsoft employee. I spoke to a very senior Microsoft person who was well aware that security of Microsoft products would be examined and that chances are that bugs would be found. Point being that they would much prefer the to be discovered by people who tell them about the bugs rather than people who aim to exploit them. If you have pissed of the Church of Satan then what do you expect? They will get what is comming to them sooner or later and I expect that it will take judicial and unpleasant form. Phill From anonymous-remailer at shell.portal.com Sun Oct 15 21:14:44 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Sun, 15 Oct 95 21:14:44 PDT Subject: Netscape question transformed Message-ID: <199510160413.VAA28410@jobe.shell.portal.com> On Fri, 13 Oct 1995, Derek Atkins wrote: > > Why would a compony like Netscape jeapordise themselves by > > even letting out a beta version so hackers have time to find bugs > > before the full version is released. Don't take me wrong I have only > > been on the net fer a little over a year and Love Netscape. And If I > > knew what I was Doing I would love to help them..... > > I don't think that this can jeopardize a company... I agree. I don't think it can jeopardize the company either. After all, we're talking about a company that has a market capitalization of more than TWO BILLION US DOLLARS. Two Billion Dollars can buy a lot of talent. Even if Netscape has to spend $100 Million on this problem, that sum represents only 5% of Netscape's total market capitalization. I'm certain that Netscape has established a crisis control centre which is manned and readied. That a proper spin control program has been implemented, and that a reasonable firm like Skadden Arps has been retained. And I'm confident, that Netscape is drawing not only on its own resources but that it's drawing on those who share Netscape's interests. Even if Skadden doesn't let you past security without a seven figure retainer, I'm sure that if one of those nice boys from Morgan Stanley, ... someone with snazzy Princeton ties ... maybe one of the ones who orchestrated the Netscape IPO calls over to Skadden, Arps, Slate, Meagher & Flom, I'm sure that one of those fellows will have their call returned by any partner at Skadden. They're professional that way. > What would you > rather see? A company makes a beta release for people to attempt to > break, fixes the bugs, and then releases a better product? Or would > you rather see a company release a product, tell people it is secure, > and then get bitten by numerous holes in it? Well, I'm not sure that I'd want to make any representations or imply any warranties whatsoever. > From a PR perspective, it sounds much better to take the first tact. > Similarly, you will get a better product using the first method. > Using the second method, NOT beta-testing your product, has a greater > chance of jeopardizing a company. At least if they put out a beta, if > the press calls, they can say "this is nor our final product -- we > wanted to let people give it a try and find problems, so that we can > fix them before we start shipping". We aren't just talking about a pre-alpha (Netscape beta) product. We are speaking of something else here. We're talking not only about a problem in their NEW code, we're talking about a very big problem in the middle of their EXISTING code. A huge security hole in the code that everyone is and has been running -- from 850,000 Deutsche Telecom customers, throughout AT&T's internal organization and throughout their worldwide customers, and god only knows how many individuals in the United States and abroad. This is an extremely serious software design issue. It is equivalent to designing and then building a house and forgetting to include any plumbing, and no one really noticing, and no one really saying anything about it. And when someone like Joan Rigdon calls from the Wall Street Journal, I hope that Netscape doesn't try to snow her. She's been up and down the street ... and probably knows all about snow. Alice de 'nonymous ... ...just another one of those... P.S. This post is in the public domain. C. S. U. M. O. C. L. U. N. E. From tcmay at got.net Sun Oct 15 21:36:32 1995 From: tcmay at got.net (Timothy C. May) Date: Sun, 15 Oct 95 21:36:32 PDT Subject: "Corporatocracy" Message-ID: At 2:42 AM 10/16/95, Michael Froomkin wrote: >Those seeking more info on the conference will find it at: >Http://www.multicorp.com/wec. > >They are asking over $500 in registration fees, which strikes me as wildly >excessive, so I'm not advocating attendence. Excessive registration costs for conferences have long bothered me, as Michael knows first-hand. I just declined to go to the Hacker's Conference this year because the registration has risen to $400 for 2 days. That they supply a midnight buffet is hardly justification for charging $200 a day, in my opinion. (My direct comparison is to science fiction conventions, where the hotel rooms run $70 a day and overall registration--with a nice program book!--is $40 or less.) Doug Barnes informed me that the money laundering conference, for which he wrote those great trip reports, cost $1000 for two days (gulp!). His corporation picked up the tab, natch. It's pretty clear to me that things are getting out of hand. I find myself priced out of most conferences, not because I can't "afford" them, but because I find paying $400 or $600 or more for a short conference to be a poor use of my money, compared to other things (like mortgage payments, books, investments, new doodads for my computer, toys, vacations, etc.). Conferences seem to be priced to take advantage of the tax laws and to soak corporations, which can write off the conferences. (No, I find there is no way I can "write off" the various conferences I'd like to attend.) Needless to say, I'm not saying conference organizers don't have the "right" to charge these exorbitant fees. Clearly they find customers. But it's also my right to avoid these "conference taxes." --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From s1018954 at aix2.uottawa.ca Sun Oct 15 22:06:02 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Sun, 15 Oct 95 22:06:02 PDT Subject: alt.paranoia.pgp.ban: long rerun (was Re: My chat with...) In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Black Unicorn wrote: > in place. Here that piece is, obviously, banning tomorrow's pgp. Frankly I think that's what it would take for everyone to start using it (not that I would on this multiuser account, that's what winsock and my pc are for). Just look at lsd, until it became illegal, only researchers and psychiatric patients took it. Strange things like crypto really become popularized (even through notoriety) when they "shouldn't" be had. Also seems like the only way to get any mainstream press. Bad press is better than next to none. BBrother schemes like clipper also generate lotsa mainstream press. I can't wait for Freeh and Clinton to start making sweet releases about the sequel. Big ones. What's going on on that front anyway? > > except as PR, why DO they still take this seriously? (unless you want to > > be paranoid about a ban, hmm, nevermind, debated-to-death) > > I'm not so sure it's paranoid. You have trial baloons floating all > over. Freeh is a prime example, and no one is screaming loudly enough to > shoot down his blump. That's a big'ole green light for regulators.> > Being paranoid is a prerequisite for being on this list in the first place :-) But seriously, yes I do agree with you. We know just how much they'd love to get rid of it. That being said, wasn't legal protection for crypto the reason EFF caved on the dreaded DT bill? (sorry, DT law. Yech, that's tough) First they're going to have to get rid of that. How strong is the protection anyway? *Begin flogging dead horse* (not a Unicorn) Flog Fine, let's just say I don't think I it can stick, we could argue this back and forth and I'm sure it's been done before. We benefit from any move towards a ban through a measure of publicity. We benefit once again from a ban due to programmers like Phil Z. getting terrified and outraged enough to write code. PGP is the product of a previous attempted ban. We'd be have PEM or RIPEM otherwise (with no-one using them). Flog If there is a market to avoid american anti-privacy and subpeona regs, openly or in the black, this is where it will get its start. I understand that key signing parties are all the rage at ietf meetings. I think a lot of those people would be angry enough to go for a strong privacy IP before any ban went into effect. Remember the US is not the whole of the world. Go to Anguila or Vancouver or Montreal or Baja Cali...with those thoughts in your head, and you can have your cpunk ietf meeting and implement and distribute the code. Flog Flog Flog And then there's the courts... I think any ban of a "desirable" product is self defeating. Just look at how little popular and even police support the marijuana ban has. Even Newt admits to having tried. Unlike crypto, marijuana has a physical presence and requires transportation, even then it's also totally unenforceable (even though it lands a very large amount of people in jail). A lot of people OTOH support the ban on cocaine, yet somehow, supposedly crack only costs $5/vial in NYC, and is available in every city in the world. A crypto ban would be even harder than making people pay for all their software. Pirate software is illegal in most of the world. Are the fine legislators of North America, where practically all the software is written, totally innocent of this heinous crime? It can't stick. Either outcome puts crypto and anonymity ahead in some way. End of dead horse flogging. Sigh. Sorry for an overlong post. From bdavis at dg.thepoint.net Sun Oct 15 22:08:52 1995 From: bdavis at dg.thepoint.net (Brian Davis) Date: Sun, 15 Oct 95 22:08:52 PDT Subject: PA Remailer Concerns In-Reply-To: Message-ID: On Sun, 15 Oct 1995, Timothy C. May wrote: > At 2:13 AM 10/16/95, Futplex wrote: > > >I would very much like to see this law tested. I think it could prove fairly > >important to attack it with a well-planned, benign test case rather than wait > >for the next National Liberation spam or a death threat. > > > >I don't live in PA, but I would be willing to participate as the defendant in > >a test case under the right circumstances. Presumably I would open an > >account with an ISP in Penna., set up a remailer on the account (need to find > >an ISP that clearly allows that), and have somebody send a message through it. > > > >We would need to design a promising test case and find an attorney willing & > >able to offer pro bono services. > > I'm not a lawyer, though I hang out on the "Cyberia" list and I watched a > lot of the OJ trial. :-} > > Seriously, it is hard to "design a promising test case" in this way. > They--the Pennsylvania law enforcement authorities--don't have to take the > bait. They can just do nothing, until an incident arises which provokes > them. Maybe next year, maybe five years from now. Such an incident is > likely to be one that they figure will make for a popular prosecution. One > of the Four Horseman, probably. I must've missed that day from the O.J. trial. You are, of course, correct that you can't force the state to prosecute you. You might try the following, however, depending on Pennsylvania law (where I am not admitted, this isn't legal advice, you aren't my client, and all that other crap ...): Let's say someone decided to set up a commercial remailing service and had an aunt with an empty bedroom, phone lines, and a powerful computer which she only used to save her recipes. She happens to live in Pennsylvania, near an ISP that allows remailers ... She offers to help. You obtain the service of Pennsylvania counsel to advise you on the legal aspects of your proposed service. The lawyer refers you to the new statute and says it may be a problem. Your proposal's success or failure rides on the interpretation of the statute. So you instruct your lawyer to review the possibility of filing a civil suit for declaratory relief concerning the constitutionality of the statute and the interpretation of the statute. Your civil complaint frames the terms of the (public) debate and is the subject of any initial press coverage before the Pa. Attorney General has even heard of the suit.... > --Tim May > > Views here are not the views of my Internet Service Provider or Government. > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero > Corralitos, CA | knowledge, reputations, information markets, > Higher Power: 2^756839 | black markets, collapse of governments. > "National borders are just speed bumps on the information superhighway." > > > Not a lawyer on the Net, although I play one in real life. ********************************************************** Flame away! I get treated worse in person every day!! From alano at teleport.com Sun Oct 15 22:42:59 1995 From: alano at teleport.com (Alan Olsen) Date: Sun, 15 Oct 95 22:42:59 PDT Subject: Bug Bounty [noise] Message-ID: <199510160542.WAA09463@desiree.teleport.com> Something I noticed about the Netscape Bug Bounty that seems to not have been mentioned here... "Linux users need not apply." (Check the rules as to which versions qualify and see what I mean.) | Visualize whirled keys | alano at teleport.com | |"It's only half a keyserver. I had to split the | Disclaimer: | |other half with the government man." - Black Art | Ignore the man | | -- PGP 2.6.2 key available on request -- | behind the keyboard.| | http://www.teleport.com/~alano | | From llurch at networking.stanford.edu Sun Oct 15 23:29:26 1995 From: llurch at networking.stanford.edu (Richard Charles Graves) Date: Sun, 15 Oct 95 23:29:26 PDT Subject: Forged cancels of posts critical of Microsoft, *apparently* through internetmci.com or nasa.gov Message-ID: <199510160629.XAA11766@Networking.Stanford.EDU> -----BEGIN PGP SIGNED MESSAGE----- These are the forged cancels for my articles critical of Microsoft. *Many Thanks* to the person who forwarded them to me; our server expires control way too fast. Somebody did an acceptable forge on the Message-ID, but the Path is quite wrong. Can anybody help me catch this fool? I'm somewhat out of my element here. The most serious posts are available on the Web at http://www-leland.stanford.edu/~llurch/win95netbugs/IP-Security-Bug.txt.asc, and on the gopher archive at gopher://quixote.stanford.edu/1m/win95netbugs. - -rich graves networking systems stanford university llurch at networking.stanford.edu -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMIH0IIND7LjhcPQ9AQFojQP/UrB/Us1PK8ne1GnsFxqXXVCJpanEKciH p9wqVMfBJOTBdkYBHkuSHkdeaJfXz6QfEQYGZr6HIN/DD8A/VNOSB+dgCbBUYcOj 2/b+x+7CBfGvEsrbIVLxWl/Eua5pIcjWLLmfgYu3dCneDOqrXO9ehZSDg1JD9tTt Av6lQIxTuVM= =V+nf -----END PGP SIGNATURE----- [You always think of something after signing, don't you?] Also emailed to postmaster at internetmci.com and postmaster at news.msfc.nasa.gov. Was that right? Doesn't microsoft.com get its news feed from internetmci? OK, I'll Cc them, because I know they don't want anyone to believe that this was done by a Microsoft employee. The cancel for , only, is legitimate, and provides a very good comparison. I'm sure the forger studied it; so should we. Path: rand.org!usc!howland.reston.ans.net!swrinde!elroy.jpl.nasa.gov!sdd.hp.com! hplabs!unix.sri.com!news.Stanford.EDU!not-for-mail From: llurch at Networking.Stanford.EDU (Richard Charles Graves) Newsgroups: comp.os.ms-windows.win95.misc,comp.infosystems.www.browsers.ms-windo ws,comp.os.ms-windows.apps.winsock.misc,alt.winsock,comp.os.ms-windows.networkin g.tcp-ip,comp.protocols.tcp-ip.ibmpc Subject: cmsg cancel Control: cancel Date: 13 Oct 1995 15:55:40 -0700 Organization: Stanford University Lines: 1 Message-ID: <45mqpc$hn at Networking.Stanford.EDU> NNTP-Posting-Host: networking.stanford.edu was cancelled from within trn. Path: rand.org!usc!howland.reston.ans.net!newsfeed.internetmci.com!news.msfc.nas a.gov!elroy.jpl.nasa.gov!sdd.hp.com!hplabs!unix.sri.com!news.Stanford.EDU!not-fo r-mail From: llurch at Networking.Stanford.EDU (Richard Charles Graves) Newsgroups: comp.os.ms-windows.win95.misc,comp.infosystems.www.browsers.ms-windo ws,comp.os.ms-windows.apps.winsock.misc,alt.winsock,comp.os.ms-windows.networkin g.tcp-ip,comp.protocols.tcp-ip.ibmpc Subject: cmsg cancel Control: cancel Date: 13 Oct 1995 15:58:14 -0700 Organization: Stanford University Lines: 1 Message-ID: <45mqu6$iu at Networking.Stanford.EDU> NNTP-Posting-Host: networking.stanford.edu was cancelled from within trn. Path: rand.org!usc!howland.reston.ans.net!newsfeed.internetmci.com!news.msfc.nas a.gov!elroy.jpl.nasa.gov!sdd.hp.com!hplabs!unix.sri.com!news.Stanford.EDU!not-fo r-mail From: llurch at Networking.Stanford.EDU (Richard Charles Graves) Newsgroups: control,comp.protocols.tcp-ip.ibmpc,comp.os.ms-windows.networking.tc p-ip Subject: cmsg cancel Control: cancel Date: 13 Oct 1995 16:00:48 -0700 Organization: Stanford University, CA 94305, USA Lines: 1 Message-ID: <45mr30$kh at Networking.Stanford.EDU> NNTP-Posting-Host: networking.stanford.edu cancel Path: rand.org!usc!math.ohio-state.edu!uwm.edu!lll-winken.llnl.gov!fnnews.fnal.g ov!unixhub!news.Stanford.EDU!not-for-mail From: llurch at Networking.Stanford.EDU (Richard Charles Graves) Newsgroups: comp.os.ms-windows.win95.misc,comp.os.ms-windows.win95.setup,comp.os .ms-windows.apps.winsock.mail,comp.os.ms-windows.apps.winsock.misc,comp.os.ms-wi ndows.apps.winsock.news Subject: cmsg cancel <45nvip$ab6 at nntp.Stanford.EDU> Control: cancel <45nvip$ab6 at nntp.Stanford.EDU> Date: 14 Oct 1995 02:32:23 -0700 Organization: Stanford University Lines: 1 Message-ID: <45o038$3ip at Networking.Stanford.EDU> NNTP-Posting-Host: networking.stanford.edu <45nvip$ab6 at nntp.Stanford.EDU> was cancelled from within trn. From nobody at REPLAY.COM Mon Oct 16 00:40:35 1995 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 16 Oct 95 00:40:35 PDT Subject: robo remailerRE: robo remailer In-Reply-To: <199510142157.WAA25454@utopia.hacktic.nl> Message-ID: <199510160740.IAA01621@utopia.hacktic.nl> nobody at REPLAY.COM (Anonymous) wrote: > Is the remailer "robo at c2.org" a PGP remailer? > In the remailer-list, it is not listed as such and yet it has a > public PGP key (dated 5/7/95)? Also, is it robo or ROBO, or > doesn't the case matter? >From what I heard last week, the remailer operator's account at c2.org expired and was cancelled, thus the remailer is down. Previously, it had been a full-fledged cypherpunk-type remailer, with Type II (Mixmaster) capabilities, to boot. Such are the uncertainties of using remailers. What would have been nice, of course, would have been for Sameer (sameer at c2.org), or whoever runs Community Conexxion, to post a bulletin here giving everyone a few days' notice before pulling the plug on this remailer. Undoubtedly, people are still chaining through it and wondering why their messages/posts are not showing up. NOTE: People with anon reply blocks from alpha.c2.org that chained through robo need to replace them, or risk lost messages! From weidai at eskimo.com Mon Oct 16 01:18:51 1995 From: weidai at eskimo.com (Wei Dai) Date: Mon, 16 Oct 95 01:18:51 PDT Subject: transaction costs in anonymous markets Message-ID: Some people have predicted (advocated?) frictionless capitalism, which will be brought about by the use of digital technology to reduce transaction costs. However, in anonymous markets these costs may be quite high. Two main components of transaction cost in an anonymous market will be the cost to maintain anonymity and the cost to evaluate reputations. Maintaining anonymity requires that communications be done through special untraceable protocols. The current state-of-art (i.e. RemailerNet) adds several hours of transmition time to each message to achieve effective untraceability. Contract negotiation, for example, becomes very difficult under these circumstances. Untraceable communications also use up more computing and communications resources. Although remailers don't yet charge any money to pass along messages, this is sure to change in the future. Unless the structure of the Internet is completely redesigned, untraceable messages will always cost more than traceable ones, although I hope this cost difference can be reduced through technical advances. The second big part of transaction cost in an anonymous market is reputation evaluation. Of course, normal, everyday transactions require reputations to be evaluated. However, more effort and cost will be expanded on these evaluations in an anonymous market because the effects of misevaluations will be much more damaging. Reputations must be constantly reevaluated, as pseodonyms are easily transfered. Since no good theories of reputation currently exist, these evaluations are difficult to automate. Perhaps theoretical advances can make these evaluations easier and/or more accurate. However there does not appear to be any major research effort in this area. If these costs remain high, but anonymous markets develop regardless, it will be interesting to see how these costs affect the structure of the markets. Will special protocols for contract negotiations develop to minimize the number of round-trip messages? Will each market be dominated by a few big entities because people can't keep track of reputations of many smaller players? But then how will these big entities be organized? Wei Dai From accessnt at ozemail.com.au Mon Oct 16 01:37:42 1995 From: accessnt at ozemail.com.au (Mark Neely) Date: Mon, 16 Oct 95 01:37:42 PDT Subject: Netscape question transformed Message-ID: <199510160837.SAA05368@oznet02.ozemail.com.au> Alice de 'nonymous wrote.. >> What would you >> rather see? A company makes a beta release for people to attempt to >> break, fixes the bugs, and then releases a better product? Or would >> you rather see a company release a product, tell people it is secure, >> and then get bitten by numerous holes in it? > >Well, I'm not sure that I'd want to make any representations or imply any >warranties whatsoever. Ahhh.... this sort of thinking really lets the user down. The reason Netscape (et. al) has market capitalisation is because they sell their product to us, the users. It is a bit of a worry if software authors can write and then release for sale "buggy" software, and hide safetly behind "I make no warranties etc." To adopt an analogy... would you be happy to buy a car from Toyota (or whoever) if they were allowed to hide behind a warranty disclaiming liability should it break down (or blow up)? Somewhere along the lines, those who make their money selling software should have to be responsible for bugs. Thoughts? Mark Neely ___ Mark Neely - accessnt at ozemail.com.au Lawyer, Professional Cynic Author: Australian Beginner's Guide to the Internet Work-in-Progress: Australian Business Guide to the Internet WWW: http://www.ozemail.com.au/~accessnt From dl at hplyot.obspm.fr Mon Oct 16 02:41:05 1995 From: dl at hplyot.obspm.fr (Laurent Demailly) Date: Mon, 16 Oct 95 02:41:05 PDT Subject: PA Remailer Concerns In-Reply-To: Message-ID: <9510160939.AA08616@hplyot.obspm.fr> Timothy C. May writes: [...] > One of the Four Horseman, probably. [...] I feel really dumb, but what is that "Four Horseman" thing ? [i saw that several times quoted on the list but I never understood, nor found in faq,...] Thx in advance for enlighting me dl -- Laurent Demailly * http://hplyot.obspm.fr/~dl/ * Linux|PGP|Gnu|Tcl|... Freedom Prime#1: cent cinq mille cent cinq milliards cent cinq mille cent soixante sept munitions break $400 million in gold Chirac mururoa NORAD genetic From cwe at it.kth.se Mon Oct 16 03:27:58 1995 From: cwe at it.kth.se (Christian Wettergren) Date: Mon, 16 Oct 95 03:27:58 PDT Subject: [NOISE] was Re: java security concerns In-Reply-To: <199510100639.BAA19818@snoopy.vetmed.auburn.edu> Message-ID: <199510161024.LAA11745@piraya.electrum.kth.se> | This is a bit off-topic, but hopefully interesting. | | Rather than trying to prove a program to be correct (which I agree is doomed | to failure for the forseeable future for all but trivial programs), perhaps | it would be useful to have an automated therom-prover to try to deduce | "interesting things" about certain programs such as "this program always | bounds-checks its input", "this program allows writes to arbitrary files on | lines x, y, and z", "this program halts". (:>) I'm doing a PhD on runtime information flow analysis of programs, tracking each datum and who has contributed to it. Each datum has an associated set of subjects that has contributed, and each system call checks whether all subjects in the set are granted the call or not. This tracking is done by compiled-in 'shadowing' code, compiled in into the binary, and the code is inserted based on something similar to 'data flow' analysis. Its messy, but I think it might work out in the end. This kind of access control is much better suited for extensive communication between different subjects than the current paradigm of having an owner of the process. With the current concept, it is imperative for the process to filter and controll each datum entering the process, since it might be 'hostile'. (The current concept of identity is really based on *partitioning* an expensive computing facility, without communication between the different partitions.) I believe this task to be to burdening in the long run. With "my approach", you can accept any input without fear, since it will be stopped when your application does the syscall. I just started, so I don't have anything concrete yet. I'll have it in five years! :-) | Obviously (as the last example illustrates), this isn't perfect because | something can be true without being provable. Why ever prove anything else but a trace of actual execution? This is usually almost trivial, you don't have the problem of calculating the proof for all possible branches, etc... | Further, it's likely that assumptions must be made about system calls, | libraries, and the ways in which they interact. It might be fruitful to do it for an actual system, although I think that this "paradigm"-shift will influence a lot of the design of the system. | However, I think such a tool would be useful because | it may quickly point out things not obvious to (most) humans | and getting some idea of what can't be deduced and why would be instructive. Tell me if your planning to do something along these lines, it would be most interesting. Regards, Christian From jya at pipeline.com Mon Oct 16 03:30:46 1995 From: jya at pipeline.com (John Young) Date: Mon, 16 Oct 95 03:30:46 PDT Subject: MUZ_zle Message-ID: <199510161030.GAA01063@pipe4.nyc.pipeline.com> 10-16-95. NYPaper: "The New Watchdogs of Digital Commerce." Think of them as a truth squad of cyberspace, these crusading graduate-student hackers from Berkeley. "This is a tradition of unfettered inquiry and curiosity," said John Gilmore, "for hackers, nothing is sacred and everything is subject to verification before you can really believe it." "The hacker ethic is transferring some of its better lessons to the world of commerce," said Steven Levy, "we're groping for a way to use the Net in a way where information will flow freely and people can still make money. The hackers are going to help us find ways to have a more humanized system of commerce." "Will Netscape be the next Microsoft, or the next victim of Microsoft?" Some investors believe Netscape could become "the next Microsoft." Other people believe that Netscape could become the next Microsoft victim, and that the next Microsoft is none other than Microsoft itself. All these new features of Navigator 2.0 send a clear notice to the industry that Netscape has no interest in bowing to the traditional Internet procedures for setting software standards by academic and scientific committee. The Internet has become primarily a commercial medium, where standards are set by whoever has the highest market share. It is a concept Microsoft knows well, and one that Netscape has grasped. MUZ_zle (16 kb) From aba at dcs.exeter.ac.uk Mon Oct 16 03:56:12 1995 From: aba at dcs.exeter.ac.uk (aba at dcs.exeter.ac.uk) Date: Mon, 16 Oct 95 03:56:12 PDT Subject: Four Horsemen (was Re: PA Remailer Concerns) In-Reply-To: <9510160939.AA08616@hplyot.obspm.fr> Message-ID: <3541.9510161053@exe.dcs.exeter.ac.uk> Laurent Demailly

      writes: > I feel really dumb, but what is that "Four Horseman" thing ? > [i saw that several times quoted on the list but I never understood, > nor found in faq,...] You sure about the faq, grepping reveals: 8.3.4. "How will privacy and anonymity be attacked?" [...] - like so many other "computer hacker" items, as a tool for the "Four Horsemen": drug-dealers, money-launderers, terrorists, and pedophiles. 17.5.7. "What limits on the Net are being proposed?" [...] + Newspapers are complaining about the Four Horsemen of the Infocalypse: - terrorists, pedophiles, drug dealers, and money launderers ie the idea that hysterical media demonization is used as a tool to justify the net, a witch hunt. A tatic in general: if you can make something look bad in the eyes of the world, if you can sway public opinion, you can do what you wish, and be applauded for it. So, the spread of untrue, or greatly exaggerated stories, as a conscious ploy to obtain this effect. Popular tatic of Freeh at the moment. "Oh gosh people can get *bomb* making information on the internet, we must put a stop to this". How to get what you want in 4 easy stages: 1. Have a target "thing" you wish to stop, yet lack any moral, or practical reasons for doing so? 2. Pick a fear common to lots of people, something that will evoke a gut reaction: terrorists, pedophiles, serial killers. 3. Scream loudly to the media that "thing" is being used by perpetrators. (Don't worry if this is true, or common to all other things, or less common with "thing" than with other long established systems - payphones, paper mail, private hotel rooms, lack of bugs in all houses etc) 4. Say that the only way to stop perpetrators is to close down "thing", or to regulate it to death, or to have laws forcing en-mass tapability of all private communications on "thing". Don't worry if communicating on "thing" is a constitutionally protected right, if you have done a good job in choosing and publicising the horsemen in 2, no one will notice, they will be too busy clamouring for you to save them from the supposed evils. Adam From nobody at REPLAY.COM Mon Oct 16 04:32:06 1995 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 16 Oct 95 04:32:06 PDT Subject: Japan-CIA Message-ID: <199510161131.MAA04458@utopia.hacktic.nl> Japan-CIA Tokyo (AP) -- Japan said that its relations with Washington could be seriously damaged if a report that the CIA spied on Japanese representatives at auto talks proves true. The New York Times reported Sunday that the CIA eavesdropped on conversations between Japanese negotiators and automakers during the talks in Geneva this year, reporting the results daily to U.S. Trade Representative Mickey Kantor. According to the report, Kantor was provided with summaries of conversations between Japanese bureaucrats and executives from Toyota Motor Corp. and Nissan Motor Co. Toyota called the alleged eavesdropping ``unthinkable,'' but refused to comment further. From sinclai at ecf.toronto.edu Mon Oct 16 04:35:34 1995 From: sinclai at ecf.toronto.edu (SINCLAIR DOUGLAS N) Date: Mon, 16 Oct 95 04:35:34 PDT Subject: PGP out of RAM Message-ID: <95Oct16.073513edt.1500@cannon.ecf.toronto.edu> It seems PGP has been too successful. I downloaded the entire keyring from keys.pgp.net; it's almost 9Mb of ASCII armour. However, I can't get PGP for DOS to process the files. It, understandably, gives me an Out Of Memory error. Is there any sneaky way of getting around this, barring the obvious switch to PGP for Linux? It seems PGP is constrained to the basic DOS 640Kb, or 704Kb if I remove my VGA card. From BRUEN at mitlns.mit.edu Mon Oct 16 04:35:37 1995 From: BRUEN at mitlns.mit.edu (Bob Bruen, MIT Lab for Nuclear Science) Date: Mon, 16 Oct 95 04:35:37 PDT Subject: was: My chat with Goeff Greiveldinger Message-ID: <951016073248.44606d5d@mitlns.mit.edu> Previous post: >I've heard cracking into Equifax and TRW is considered a rite of passage in >the phreaker crowd. The security would have to *damn* tight (as in forget >it) for it to be trustworthy. And since it would probably be the big three >credit rating agencies (I forget the other one), their track record is not Here are the three credit reporting orgs plus the medical reporting org. The cost is $8 to get your report. ---------------------------------------- CBI Equifax Credit Information Services PO Box 740256 Atlanta, GA 30374 ---------------------------------------- Trans Union Consumer Relations Center 208 South Market Wichita, KS 67202 ---------------------------------------- TRW National Consumer Assistance Center PO Box 749029 Dallas, TX 75374 ---------------------------------------- Medical Information Bureau PO Box 105 Essex Station Boston MA 02112 ---------------------------------------- From perry at alpha.jpunix.com Mon Oct 16 05:06:20 1995 From: perry at alpha.jpunix.com (John A. Perry) Date: Mon, 16 Oct 95 05:06:20 PDT Subject: Weekly MixMaster list Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Here is the current type2.list/pubring.mix as it stands on vishnu.alias.net. Please note that the email addresses for mixmaster at spook.alias.net and wmono at spook.alias.net have changed. These addresses NO LONGER WORK! Please make note of the new addresses. type2.list vishnu mixmaster at vishnu.alias.net bb460f08811a98682def423d30852d11 2.0 spook remailer at valhalla.phoenix.net ca8c8679f7b1cbdcff46d780fba97673 2.0 flame remailer at flame.alias.net 64bbf500097b541a8ddcb2dd80373238 2.0b11 anon mixmaster at anon.alias.net e3ca4cc5beb9934ae6d52dd27da80332 2.0.2b secrets secret at secret.alias.net bc2e4251dbddfa74dfae8b274904c2be 2.0.2b wmono wmono at valhalla.phoenix.net f68e6add16880b60eb48a4a4330e2e36 2.0.1 mix mixmaster at obscura.com db91418edac3a4d7329feaee0b79c74f 2.0.1 knight mixmaster at aldebaran.armory.com 6bb0d89a29fd188c67b8e04516b5af33 2.0 robomix robo at c2.org 3d523f1fd30b5a1c57214960a00f1c4e 2.0b11 syrinx syrinx at c2.org 6c4e7372e84d7092e0d0e69c20d5be46 2.0b11 rebma mixer at rebma.mn.org e7d84921298b0aadaf8f050d145ccf03 2.0b11 replay remailer at replay.com e3e2b4d67314b6165ee03b0b0ae07a7f 2.0b11 hacktic remailer at utopia.hacktic.nl bf61835a7b3cfa59c409caeab4e8a222 2.0b11 crynwr remailer at crynwr.com 64c62de6b347b3050fbb6e94c649112d 2.0b11 gondolin mixmaster at gondolin.org 1d767b08fefa0a79d508be73e472d326 2.0.1 q q at c2.org c44e1cb0f0709465c21b07ac972bf973 2.0.1 Armadillo remailer at armadillo.com 7251877ae6fed509ebf7567715974d1b 2.0.1 pubring.mix mix mixmaster at obscura.com db91418edac3a4d7329feaee0b79c74f 2.0.1 - -----Begin Mix Key----- db91418edac3a4d7329feaee0b79c74f 258 AATL25WGQY5CMM0/xBjYtuN6IT75h+aBQwwKqZZc isOrqdsl8HWAzARrB0iAtcr34c2qqPBzSRNa5UE8 d3jOYu/wp9K9M5abUSRogcDl7gkPlqxc+e72SdKd 2Gdgib8VDGVLpJdaPk4uSY/pkmsYB30OaQH3W8dU PPciTvSJKAYcTQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- vishnu mixmaster at vishnu.alias.net bb460f08811a98682def423d30852d11 2.0b11 - -----Begin Mix Key----- bb460f08811a98682def423d30852d11 258 AAShg2h4xGHueryUFNsFBbtSGZBcj+oDImFMkOZA EQPcbeG6ReEnTnoQ8HBgwtx9isMT9hZ93lBaRY07 ygupHQRi6f+FnlQEZTKqOe+8E+WyDx+ox/1ywgt+ KGFOW+t8WRXA/loKuqD0KH4pwpe7FYE0arGbtm4J EscGM2DE3TeS3QAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- knight mixmaster at aldebaran.armory.com 6bb0d89a29fd188c67b8e04516b5af33 2.0 - -----Begin Mix Key----- 6bb0d89a29fd188c67b8e04516b5af33 258 AATOSyg7N2PVg9VgA8voDWglq6ESNBLqH0heB2iE NfvmR/VnyAHCb4ZBtHzvM7ZRBdXYmH/Jt490wg6O ZCbhcIceFKSsibLEH77+111isAhUbHvn0Nh9gOI7 5ngjOGDQaLQvGUbNHRXQaPAZ0rc4lv9gmChJONOJ 7sFC2J96QR4aewAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- robomix robo at c2.org 3d523f1fd30b5a1c57214960a00f1c4e 2.0b11 - -----Begin Mix Key----- 3d523f1fd30b5a1c57214960a00f1c4e 258 AATQ2zxiRZ5bQuNBKHEvg11R7L69Hc9ZrjTon3o3 s7fbXmuEaiym48sHoRLAttZ3ADuH1FgbuYt1DF+L Il9Yp5U9znm9MX0rS8xq1iGg7YDED/3x6OWIp7za 17+pWnYmEF+Rz6YZ2o/67ujcBfrJ/odz+SVlaGqF rWWjaG/oWdqWWwAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- syrinx syrinx at c2.org 6c4e7372e84d7092e0d0e69c20d5be46 2.0b11 - -----Begin Mix Key----- 6c4e7372e84d7092e0d0e69c20d5be46 258 AATKhnhAIHXRCKZAi2tehJfQ9s+IsVPjEQQk5xwQ 60VXzmgkC2YirmDFeLz1feNgCMd78GkKHYK5p9WM HBkPNTDPLraJhJLNDHeHqGtqAI4BTHq/lZ/RMyOH GV/X5TaUEG69IGb2Rl8OnzNWF9fhKwH6PTE+QiQX kIcxJnVW+yYOpwAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- rebma mixer at rebma.mn.org e7d84921298b0aadaf8f050d145ccf03 2.0b11 - -----Begin Mix Key----- e7d84921298b0aadaf8f050d145ccf03 258 AASjOGqzTLdjweTMiwirrpVNqXj/ODJVyh9pEo5i q5ERILOd1hMNKY9XLNFYM30mUR/Fkh0MnYI/ujWz OTb0rR2a31nvmaLMdaB75nTdGJwHitCmo8k2eTjL XQsXV6zKrzXGp8H8NO34DAFWJy1qVcev+6lLAWGy j/fsJJyJNtl94wAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- replay remailer at replay.com e3e2b4d67314b6165ee03b0b0ae07a7f 2.0b11 - -----Begin Mix Key----- e3e2b4d67314b6165ee03b0b0ae07a7f 258 AATZBfJhv+DGg4OEfQfgVnzZZpumEZHI9CES+Ux2 dBp9RBPpJnAtLpcAyCIkNjSaik0togcKhFgcR3nt XIrWclJ/uO/Z1fqW7ESLwzXozCpqnG5S/y6mUPuL yzA9bqtAGd+pvxuK/Cw2Zzx+1QGp0VtWb46KxqvC S4POHYFljkrQiQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- hacktic remailer at utopia.hacktic.nl bf61835a7b3cfa59c409caeab4e8a222 2.0b11 - -----Begin Mix Key----- bf61835a7b3cfa59c409caeab4e8a222 258 AATkwgy72zwwavCHn1OytNMsBYAIBnCFa2hcbZPi IN6eS4jDgFdld5DlcqqzdN6Lxv96i0Dg7ElFyAFR 5zmof3oaNqh5vbq/fTEbvFtX9EGyuqkfN6fKoAEv G7gtmkfosoIg/jnI8AL9KC/J5mGaxrWYB6XBe+v9 iI1pOSbPsDCsdQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- crynwr remailer at crynwr.com 64c62de6b347b3050fbb6e94c649112d 2.0b11 - -----Begin Mix Key----- 64c62de6b347b3050fbb6e94c649112d 258 AATLe0CWPSn844FCeL7FzUlf+vE2qfYBPs/8PYYm BfITjknJjD0dk7vXhX9Qc5PFgDWRHhVoIRlFT3sc Jp2UVFLOZ5zn/WiT9Wa1tZsqejDf3MRIDT/K6cHB uB/SUaxLzNfk/wG1uBTUHukdjwCyDxNLHuYA5mVz opYJhQR0Nc/ESQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- spook remailer at valhalla.phoenix.net ca8c8679f7b1cbdcff46d780fba97673 2.0 - -----Begin Mix Key----- ca8c8679f7b1cbdcff46d780fba97673 258 AATZXVb4yP3MGt/ZCR5FtrHPMgYNyXHBmnG8KWO0 UaT5jbMqBdRQEzOVrCN/5RXerpS8Hctbc5MrwhSr fh/byQLwLkY50zYAxWSRBpaAJgZtCnQtVTgmt9yu BDiCE2OasFnZlwsi+9t8+c5R2bS3C6UhjQsgybbF Aw7xWK3v3fPJqQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- flame remailer at flame.alias.net 64bbf500097b541a8ddcb2dd80373238 2.0b11 - -----Begin Mix Key----- 64bbf500097b541a8ddcb2dd80373238 258 AAS5NFs7yPSFv+WwpO26/2OS7CYJDtrhlrEasf8S jJ9P0jqWXuorDIMKT3YfvSkk2xKqAHiHrOFEqltY plIUCoXyAf/7CmNyPYdTN6xNxO74ZIsTQnNgAJT3 6a8+JL92DZJM6pYfhpSvPq7lj5X0h6Hj/oCAlqiS 31TZJkd2jenjDQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- gondolin mixmaster at gondolin.org 1d767b08fefa0a79d508be73e472d326 2.0.1 - -----Begin Mix Key----- 1d767b08fefa0a79d508be73e472d326 258 AATAwVkC3FI6NDi0GJvH+FBIK6MYVHvXofEoKMTc u7P1rI7yCW00JOF71k373wyepZDksw9wjZdrHZAB uyN7SICMaKPRvMA4rseZFjefzYaoFf5tO0OqFgcQ /pMOPDwYl0nHyuLJvqjpADMDtatQaN2+/T/HtcMX Q1KCcLk24jEWbQAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- q q at c2.org c44e1cb0f0709465c21b07ac972bf973 2.0.1 - -----Begin Mix Key----- c44e1cb0f0709465c21b07ac972bf973 258 AATDBaiKBy4jPlRUIQmVvcjO/GhWLbsls+mKloml 5EScYl+3fGw04P4xVcWOSledFVxKVfNy+xTVI8pE XGXSr0cRUIa1NttzNPk/KObb5SvkeqGtWAyRiWBS G91MkWM6LbqzKPcu6gUON47wJCJCzdvgbUIeVJIT MnyBvMWJX5CKAwAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- Armadillo remailer at armadillo.com 7251877ae6fed509ebf7567715974d1b 2.0.1 - -----Begin Mix Key----- 7251877ae6fed509ebf7567715974d1b 258 AASWRIpH97WDVCNc/kiLqvmxqwN9cAAbZFi+FIwr gCixQRTtD/SXuXd62iIqRMp3xm4c+uSnTzLijIxi fCYLacNMVeh0PXAszfFIh6CBicPq1UWt82Wu5dqw K/goNULqNDUypGQtOfOpHSQKPwAphXplKhv75OZs SjtMoEcv0CCk3wAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- secrets secret at secret.alias.net bc2e4251dbddfa74dfae8b274904c2be 2.0.2b - -----Begin Mix Key----- bc2e4251dbddfa74dfae8b274904c2be 258 AATBBbpmFw7omad8hpvxQiylmoi5MBXs5SivpcY6 65jnhZIiL9HvTE+Rq+30STccDsQWze0/iZthg1RL tCXYtABwkfsHOf60/aq1aOBobkquzBItvzQMG0W/ TkVinZYUTqfdytl/pfLDIQiXv7Z0t98MrLsmVopE 1NQS7sH6g9srFwAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- anon mixmaster at anon.alias.net e3ca4cc5beb9934ae6d52dd27da80332 2.0.2b - -----Begin Mix Key----- e3ca4cc5beb9934ae6d52dd27da80332 258 AATZuNYrX4bw6A01PA00qMr7KeJsnHIq9wYoSc5P OrHUEvPUoCxmLfuhwF9eEfSkV4t9DLPIMhKXM4iL Afhv2IZKeWaA98q4NHb6E7Gg6/e6uCI1O3nmXXK8 la4ij9RneCHig5K6JlCh3MJTkuW/IEYQjMrz2/H5 RUDEwx+/HL5K0QAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- wmono wmono at valhalla.phoenix.net f68e6add16880b60eb48a4a4330e2e36 2.0.1 - -----Begin Mix Key----- f68e6add16880b60eb48a4a4330e2e36 258 AASe+l+eIE1GYugbIPDG87h9wIFD0KqLWrMiN0PN RBCmRwsHOu1mZDnJTPlg7RXI17+DJMkk+huGPTuA T+KilAv8WFKWmvHuOpIBwxVBMXFKHsrQYHES63t0 UMQvRCv9LXZZvmiBWKrZp5vQaSOZKYLf4v3pQw7U SsbB5geSP9fQ2wAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAQAB - -----End Mix Key----- John Perry - KG5RG - perry at alpha.jpunix.com - PGP-encrypted e-mail welcome! WWW - http://www.jpunix.com PGP 2.62 key for perry at jpunix.com is on the keyservers. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Processed by mkpgp, a Pine/PGP interface. iQEVAwUBMIJKdaghiWHnUu4JAQHNJQf/YVjJn/WFKTi5gdjtnkOy5DprQYcoiAZ3 44/d4fq34cYdghEaK2WnROXqUn+nQbd2xqDt68KdG9Y+AsyzYo0oue+ec/juevH7 CobBO/E45dR2Ey7eUBhp/cjAJcF/R+BCGPFsrvVFjZETUhRougqWP/d0w1nxyuUI Z0BPqiLEU/Zi7tTf++qK12YFHc0bBFk52jc2rjlwk4MDcra/Gihf834fZ6QB3nRT mcpKaWQB2NODXwT8VOr19Fv44EyKx+QsNMX5DREcLB/GxKZjgsSArFSGRg6AiR+k VMAwO07JSXr85/EKrbepSIWQQM19jGB7tQq6UpkLERbFQmx/yrgAwA== =jYbQ -----END PGP SIGNATURE----- From sommerfeld at orchard.medford.ma.us Mon Oct 16 06:27:13 1995 From: sommerfeld at orchard.medford.ma.us (Bill Sommerfeld) Date: Mon, 16 Oct 95 06:27:13 PDT Subject: Why commercial key escrow? [Re: My chat with Goeff Greiveldinger] In-Reply-To: <199510160257.TAA23550@mycroft.rand.org> Message-ID: <199510161311.NAA06302@orchard.medford.ma.us> -----BEGIN PGP SIGNED MESSAGE----- > As a data point, Dorothy Denning is increasingly pessimistic that > this plan will in fact result in the same weak or escrowed system > being used domestically; if it doesn't, that presumably triggers > Louis Freeh to head back to the Hill for more legislation. Yup, those of us who already paid the up-front cost to build two versions of our products are not about to *weaken* our domestic version just to go back to having only one version. - Bill -----BEGIN PGP SIGNATURE----- Version: 2.6.1 iQCVAwUBMIJZO7T+rHlVUGpxAQGJJwQAgewBBehZWJMDN4gl2BBeZKEeQqpF86l5 GCqwXDcZEPjeFnNg4P2bIjHZ7UAu/DNMcABN8ZBmqusAkSEa28m3MFigIcTdnrO7 vKM8LuKj8rC95ig6hjJ20RitUF820BnQjRsIBQafa96J9rav1nZpX2UeZ8Ad9l6y BfTjGVqAEig= =zSSz -----END PGP SIGNATURE----- From herbs at interlog.com Mon Oct 16 06:33:26 1995 From: herbs at interlog.com (Herb Sutter) Date: Mon, 16 Oct 95 06:33:26 PDT Subject: [NOISE] PGP out of RAM Message-ID: <199510161333.JAA14631@gold.interlog.com> At 07:35 10.16.1995 -0400, SINCLAIR DOUGLAS N wrote: >It seems PGP has been too successful. I downloaded the entire keyring >from keys.pgp.net; it's almost 9Mb of ASCII armour. However, I can't >get PGP for DOS to process the files. It, understandably, gives me an >Out Of Memory error. Is there any sneaky way of getting around this, >barring the obvious switch to PGP for Linux? It seems PGP is constrained >to the basic DOS 640Kb, or 704Kb if I remove my VGA card. Use the 32-bit DOS version; that solves most memory problems. (Caveat: I haven't tried rings that large myself, so if you're already using the 32-bit version then I'm wrong.) Herb ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Herb Sutter 2228 Urwin, Suite 102 voice (416) 618-0184 Connected Object Solutions Oakville ON Canada L6L 2T2 fax (905) 847-6019 From nobody at REPLAY.COM Mon Oct 16 06:36:16 1995 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 16 Oct 95 06:36:16 PDT Subject: OS$ Hackwork Message-ID: <199510161335.OAA06856@utopia.hacktic.nl> URL: http://www.oss.net/oss/ [Condensed version of ad in Wash Post 10-16-95] Register Now For OSS '95: Fourth International Symposium Global Security & Global Competitiveness: Open Sources Solutions. 7-9 November 1995 in Washington DC ----- [Excerpt on workshops] Hacker Panel (will be repeated 9 Nov 95). Winn Schwartau, Chris Goggans, Eric Hughes, Emmanuel Goldstein on specific vulnerabilities of typical national communications and computing infrastructures, with specific suggestions for improving both defense and counter-intelligence against electronic terrorists and criminals. Invited commentary from DISA, NSA, FBI. ----- Spys, Scholars, Hackers, Competitive Intelligence Analysts, Law Enforcement Analysts, Private Investigators, Journalists, and Information Brokers Unique conference, acclaimed in the international media and respected in professional circles. Addresses open source intelligence (OSINT) strategy, policy, collection, production, and hands-on specifics. Of vital interest to all those who consider themselves experts or "knowledge workers". OSS '95 will feature 25 world-class speakers in plenary session, 25 interactive interest and training groups, and 75 carefully-screened international exhibits. Subject Area Themes [with TLA$ galore, gov and ex-s in biz] 7 Nov: Economic Competitiveness & Information Warfare 8 Nov: Military Operations Other Than War 9 Nov: Transnational & Domestic Law Enforcement This year's conference includes several half-day pre-conference workshops on 6 November [including "two hacker workshops"]: 1) an orientation on open source intelligence for first-time attendees, 2) the National Military Intelligence Association will conduct a workshop on "Defensive Information War Technology", and 3) the Operations Security Professionals Society will conduct sessions on open source counterintelligence and open source operations security measures. ---------- To register or exhibit: Voice: (703) 242-1700 / Facsimile: (703) 242-1711 or Open Source Solutions, Inc. International Public Information Clearinghouse 11005 Langton Arms Court, Oakton, VA 22124 From raph at CS.Berkeley.EDU Mon Oct 16 06:51:48 1995 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 16 Oct 95 06:51:48 PDT Subject: List of reliable remailers Message-ID: <199510161351.GAA02832@kiwi.cs.berkeley.edu> I operate a remailer pinging service which collects detailed information about remailer features and reliability. To use it, just finger remailer-list at kiwi.cs.berkeley.edu There is also a Web version of the same information, plus lots of interesting links to remailer-related resources, at: http://www.cs.berkeley.edu/~raph/remailer-list.html This information is used by premail, a remailer chaining and PGP encrypting client for outgoing mail, which is available at: ftp://ftp.csua.berkeley.edu/pub/cypherpunks/premail/premail-0.33a.tar.gz For the PGP public keys of the remailers, finger pgpkeys at kiwi.cs.berkeley.edu This is the current info: REMAILER LIST This is an automatically generated listing of remailers. The first part of the listing shows the remailers along with configuration options and special features for each of the remailers. The second part shows the 12-day history, and average latency and uptime for each remailer. You can also get this list by fingering remailer-list at kiwi.cs.berkeley.edu. $remailer{"extropia"} = " cpunk pgp special"; $remailer{"portal"} = " cpunk pgp hash"; $remailer{"alumni"} = " cpunk pgp hash"; $remailer{"bsu-cs"} = " cpunk hash ksub"; $remailer{"c2"} = " eric pgp hash reord"; $remailer{"penet"} = " penet post"; $remailer{"ideath"} = " cpunk hash ksub reord"; $remailer{"hacktic"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"flame"} = " cpunk mix pgp. hash latent cut post ek reord"; $remailer{"rahul"} = " cpunk pgp hash filter"; $remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord"; $remailer{"syrinx"} = " cpunk pgp hash cut reord mix post"; $remailer{"ford"} = " cpunk pgp hash ksub"; $remailer{"hroller"} = " cpunk pgp hash mix cut ek"; $remailer{"vishnu"} = " cpunk mix pgp. hash latent cut ek ksub reord"; $remailer{"robo"} = " cpunk hash mix"; $remailer{"replay"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"spook"} = " cpunk mix pgp hash latent cut ek reord"; $remailer{"gondolin"} = " cpunk mix hash latent cut ek ksub reord"; $remailer{"rmadillo"} = " mix cpunk pgp hash latent cut"; $remailer{"ncognito"} = " cpunk"; $remailer{"precip"} = " cpunk mix pgp hash latent cut ek reord"; $remailer{"ecafe"} = " cpunk mix"; $remailer{"wmono"} = " cpunk mix pgp. hash latent cut ek"; catalyst at netcom.com is _not_ a remailer. lmccarth at ducie.cs.umass.edu is _not_ a remailer. usura at replay.com is _not_ a remailer. Use "premail -getkeys pgpkeys at kiwi.cs.berkeley.edu" to get PGP keys for the remailers. Fingering this address works too. remailer email address history latency uptime ----------------------------------------------------------------------- replay remailer at replay.com +-**+*+***** 10:11 99.96% ideath remailer at ideath.goldenbear.com --.-------- 5:23:14 99.81% mix mixmaster at remail.obscura.com +--+---+ -- 1:32:40 99.24% hacktic remailer at utopia.hacktic.nl +-**-*** * 12:11 99.06% portal hfinney at shell.portal.com #-####* ** 3:14 99.02% alumni hal at alumni.caltech.edu -*** + +* 8:12 98.64% bsu-cs nowhere at bsu-cs.bsu.edu -#+#**# * 13:10 98.50% vishnu mixmaster at vishnu.alias.net *-+** * ** 11:44 98.49% rmadillo remailer at armadillo.com +-+- +++ +++ 49:21 98.47% ecafe remail at ecafe.org #--*-++- 12:28 98.33% penet anon at anon.penet.fi -- +- - -++ 2:32:53 97.85% syrinx syrinx at c2.org +-+ ---- --+ 1:49:27 97.81% spook remailer at valhalla.phoenix.net +- +*+ ** ** 27:04 97.74% wmono wmono at valhalla.phoenix.net *-+ ** * *** 12:20 97.69% flame remailer at flame.alias.net +-** + *** 29:29 95.55% gondolin mixmaster at gondolin.org _____.-*- 30:45:37 94.88% c2 remail at c2.org +-+ +++ ++ 1:13:25 94.79% extropia remail at extropia.wimsey.com ..------ -- 5:32:18 94.02% rahul homer at rahul.net # +-+*# ** 4:39 99.20% ford remailer at bi-node.zerberus.de --. -- 10:53:23 76.55% History key * # response in less than 5 minutes. * * response in less than 1 hour. * + response in less than 4 hours. * - response in less than 24 hours. * . response in more than 1 day. * _ response came back too late (more than 2 days). cpunk A major class of remailers. Supports Request-Remailing-To: field. eric A variant of the cpunk style. Uses Anon-Send-To: instead. penet The third class of remailers (at least for right now). Uses X-Anon-To: in the header. pgp Remailer supports encryption with PGP. A period after the keyword means that the short name, rather than the full email address, should be used as the encryption key ID. hash Supports ## pasting, so anything can be put into the headers of outgoing messages. ksub Remailer always kills subject header, even in non-pgp mode. nsub Remailer always preserves subject header, even in pgp mode. latent Supports Matt Ghio's Latent-Time: option. cut Supports Matt Ghio's Cutmarks: option. post Post to Usenet using Post-To: or Anon-Post-To: header. ek Encrypt responses in reply blocks using Encrypt-Key: header. special Accepts only pgp encrypted messages. mix Can accept messages in Mixmaster format. reord Attempts to foil traffic analysis by reordering messages. Note: I'm relying on the word of the remailer operator here, and haven't verified the reord info myself. mon Remailer has been known to monitor contents of private email. filter Remailer has been known to filter messages based on content. If not listed in conjunction with mon, then only messages destined for public forums are subject to filtering. Raph Levien From sandfort at crl.com Mon Oct 16 07:56:30 1995 From: sandfort at crl.com (Sandy Sandfort) Date: Mon, 16 Oct 95 07:56:30 PDT Subject: transaction costs in anonymous markets In-Reply-To: Message-ID: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SANDY SANDFORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C'punks, On Mon, 16 Oct 1995, Wei Dai wrote: . . . > Two main components of transaction cost in an anonymous market will be > the cost to maintain anonymity and the cost to evaluate reputations. . . . > The second big part of transaction cost in an anonymous market is > reputation evaluation. Of course, normal, everyday transactions require > reputations to be evaluated. However, more effort and cost will be > expanded on these evaluations in an anonymous market because the effects > of misevaluations will be much more damaging. Reputations must be > constantly reevaluated, as pseodonyms are easily transfered. Since no > good theories of reputation currently exist, these evaluations are > difficult to automate. Perhaps theoretical advances can make these > evaluations easier and/or more accurate. However there does not appear > to be any major research effort in this area. This is only true if you assume everyone will do their own reputation evaluation. This is a third-party insurer problem, really. Either a "Lloyds of London" or a "Good Housekeeping" model would do the trick. S a n d y ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From sameer at c2.org Mon Oct 16 09:21:14 1995 From: sameer at c2.org (sameer) Date: Mon, 16 Oct 95 09:21:14 PDT Subject: robo remailer In-Reply-To: <199510160740.IAA01621@utopia.hacktic.nl> Message-ID: <199510161615.JAA02394@infinity.c2.org> > Such are the uncertainties of using remailers. What would have been > nice, of course, would have been for Sameer (sameer at c2.org), or > whoever runs Community Conexxion, to post a bulletin here giving > everyone a few days' notice before pulling the plug on this > remailer. Undoubtedly, people are still chaining through it and > wondering why their messages/posts are not showing up. > Account cancellations are automated. The account holder is notified if pending deactivation 14, 7, and 3 days before the account is deactivated. It is the remailer-operator's responsibility to notify the world that the remailer will be going down. It is not my responsibility to keep track of which remailers are running on c2.org and which aren't. -- sameer Voice: 510-601-9777 Community ConneXion FAX: 510-601-9734 The Internet Privacy Provider Dialin: 510-658-6376 http://www.c2.org (or login as "guest") sameer at c2.org From tcmay at got.net Mon Oct 16 10:22:48 1995 From: tcmay at got.net (Timothy C. May) Date: Mon, 16 Oct 95 10:22:48 PDT Subject: The NSA Visits Compendium Message-ID: * Does the NSA really visit companies planning to include crypto modules and ask them to weaken or remove the crypto modules? * How do such visits occur? * What happens if a person or company simply refuses to meet with the Men in Black and says "This is a free country--get lost!"? * What pressures are brought to bear on companies to induce them to weaken crypto, even for domestic-only use, or to remove hooks? * Is there concrete evidence of these things? We've all heard that the NSA sends representatives to software companies planning to included crypto or crypto "hooks" in software. There have been anecdotal reports of visits to many software companies. The question is: how _real_ are these reports and what are the mechanics of the visits? Are they urban legends, or real? I asked these questions at the last Bay Area Cypherpunks meeting, and got some interesting responses. In particular, I was interested in the comparison to the other report about academic papers being submitted to a review board, since the late 1970s. Whit Diffie of Sun and Matt Blaze of AT&T (or, as Matt put it, maybe BT&T or CT&T, depending) shared their experiences. They confirmed that such a panel _does_ exist, but that it is fairly ineffectual. Apparently many people publish without approval. (Anyway, I'm citing this as a parallel to what I'm looking for: direct confirmation of NSA pressure and visits.) I have volunteered to compile a compendium of reports, with or without names attached (see details below), to pin down the extent of NSA coercion or "subtle encouragement" of companies. I believe this is a valid "Cypherpunks-type project," as it is aimed at using the Net to compile a listing of experiences software developers have had. To kick things off, I'll start the list below: --- Example: Large relational data base company. NSA Actions: Visits on a regular basis by two NSA representatives ("always two"). Pressured them to drop plans for a strong domestic crypto module. Source: Personally told to me by programmer at the company, 1995-10-14. He wishes the company not to be named. Description: The NSA was concerned about plans the company had for a domestic-only 128-bit RC4 usage, and "sat on" the company's CJ request for an exportable version of their product using 40-bit DES. After hearing nothing for a long while, and pestering the NSA (or maybe the State Department), the company finally backed-down on the plans for the 128-bit RC4 use, told the NSA this, and then the government rapidly approved the 40-bit version for export. Coincidence? --- So, send me your examples. Supply as much detail as you can, including company names if possible. I'll accept "unnamed sources" if they are _primary_ sources, but no "friend of a friend told me that...," unless the details look very convincing. Use remailers if you wish. Use my public key if you wish, too, though remailers accomplish the same thing, at least for getting the details to me anonymously. My public key is: pub 1024/54E7483F 1992/11/20 Timothy C. May 11-20-92 Key fingerprint = 8C 79 1C 1B 6F 32 A1 D1 65 FB 5F 57 50 6D D3 28 (I don't have MacPGP integrated into Eudora Pro---perhaps the NSA paid Qualcomm a visit?--so I'm not a huge fan of getting PGP-encrypted messages unless there's a real need.) I'll be releasing reports on this on a regular basis. The next one when I've accumulated several examples. --Tim May Views here are not the views of my Internet Service Provider or Government. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 | black markets, collapse of governments. "National borders are just speed bumps on the information superhighway." From an402976 at anon.penet.fi Mon Oct 16 10:27:51 1995 From: an402976 at anon.penet.fi (RingZero) Date: Mon, 16 Oct 95 10:27:51 PDT Subject: Netscape rewards are an insult Message-ID: <9510161711.AA16223@anon.penet.fi> ====== On Sat, 14 Oct 1995, Henry Wertz wrote: On Sat, 14 Oct 1995, Dr. Frederick B. Cohen wrote: > The idea that Netscape (like Microsoft) thinks they can get free > testing services from all over the net by real experts just by offerring > a tee shirt is down right offensive. > > I have a better idea. How about an open market in break-in > software. We crack Netscape and offer the crack code to the highest > bidder. Bids start at US$25K per hole. For the insult, Netscape has to > outbid the competition by a factor of 2 to get the details of the hole. > Here's how it works: *cut* You know, this all seems kind of greedy to me.. It used to be people would find holes for *fun* and not for profit. It's still possible to do that you know 8-). ====== It almost sounds like extortion, doesn't it? RingZero --****ATTENTION****--****ATTENTION****--****ATTENTION****--***ATTENTION*** Your e-mail reply to this message WILL be *automatically* ANONYMIZED. Please, report inappropriate use to abuse at anon.penet.fi For information (incl. non-anon reply) write to help at anon.penet.fi If you have any problems, address them to admin at anon.penet.fi From nobody at REPLAY.COM Mon Oct 16 10:40:35 1995 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 16 Oct 95 10:40:35 PDT Subject: [Honk] FR $ec vs US $ec Message-ID: <199510161740.SAA11885@utopia.hacktic.nl> Excerpted from: URL: http://www.oss.net/zhi/95-7-oss OSS Notices, July, 1995 France Identifies USA as "Main Adversary" The following material is so important that we have chosen to reprint it in its entirety from Intelligence Newsletter, which we continue to recommend highly. Call them at (33 1) 44 88 26 10 for a sample issue or to order your subscription. FRANCE: Ringing the Alarm Bells "For the first time in France, a boss of the country's Direction de la Surveillance du Territoire (DST) spoke in public at a seminar on the theme "Companies and Business Intelligence" that was laid on by the Institute des Hautes Etudes de Defense Nationale (IHEDN) at the French Senate on July 4. As he himself declared on the occasion, Philippe Parant agreed to speak out 'despite the special nature' of his functions in order to alert French business circles of the dangers of 'economic warfare'. To be sure, the main aim of the gathering which drew a full house was to ring the alarm bell. According to Gen. Bernard Norlain, head of IHEDN, economic warfare now forms part and parcel of 'an overall approach to defence'. IHEDN will dispense a course on business intelligence to 30 high-level trainees in the fall. "Most of those who spoke at the seminar identified the U.S. as both the main adversary in the war and the best model of how it is fought. This was especially the case of Francois David, head of French export credit guarantee agency COFACE who said the only response to the U.S. 'could be European' in scale. Elsewhere, Remy Pautrat, deputy dead of France's Secretariat General de la Defense Nationale (SGDN) paid tribute to the French president for signing a decree on April 1 that gave birth to a Comite pour la Competitivite et la Security Economique under the authority of the French Prime Minister. Pautrat said the Committee formed "the nerve center of a more ambitious system" that was currently being set up, partly in secret." FRANCE-the DST's New Defences "During the seminar cited above DST chief Philippe Parant reckoned that economic, scientific, and industrial espionage had increased considerably over the past few years. It now accounted for 60% of cases that come to the authorities' attention compared to 40% for political, diplomatic, and military spying. Methods had also changed because state-sponsored espionage had increasingly taken a back seat to a type practices by private intelligence companies, international audit firms, head-hunter concerns, as well as insurance and reinsurance companies. Parant said that effective defence against the onslaught could not come from government services alone. "If that were the case the game would be lost in advance," he declared. He suggested that as many staff as possible in big companies be made aware of business intelligence concerns. In addition he called for "genuine information-management training in engineering universities." For maximum impact, he said, such training should not be dispensed by security services but rather by specialists in each specific discipline." L'Expansion Cover Story With the above background in mind, we can now better understand the cover story in L'Expansion of 10-18 July 1995. This prestigious journal, widely regarded as the French equivalent of Forbes, Fortune, and Business Week, appears to have been manipulated by French civilian intelligence and self-promoting private sector business intelligence activities. The cover story of L'Expansion is nothing less than a call to arms for the French business community, and the opening declaration of war on the United States of America. Unfortunately, this article was very likely drafted in active cooperation with French civilian intelligence experts, and should be considered a "covert media placement". I have taken a personal interest in the article because it links me with President William Clinton, Director of Central Intelligence John Deutch, and the founder of Kroll Associates, Jules Kroll. I am honored. Sadly, the article, while identifying me as the apostle of open source intelligence, is gravely in error when it identifies me as the linch-pin for a new covert strategy to undermine the French economy, and also alleges that I have been actively discouraged from implanting myself in France by the French authorities. There are three "realities" that need to be explored here. First, there is a budget battle going on in France, and the French civilian intelligence services are doing everything they can to "hype" the threat and obtain increased manning and funding. This should not surprise us, but the apparent subversion of the previously prestigious journal L'Expansion to the desires of French civilian intelligence, is cause for concern. Second, my sources in France tell me that the larger French companies, especially those in the defense sector, do not take this threat seriously because they are much superior to U.S. companies at the business of industrial espionage. A very well-informed source has suggested to me that this cover story is the result of an alliance between French civilian intelligence (attempting to increase its budget) and General Pichot-Duclos of INTELCO, who is attempting to increase his business practice among the small businesses in France foolish enough to believe in this exaggerated threat. Finally, for the record, I wish to note that I was invited to France by Mr. Francois Leotard, the Minister of Defense, with the explicit approval of Prime Minister Balladur, in order to join Admiral Pierre Lacoste, General Jean Heinrich, and General Jeannou Lacaze in speaking to a very select group of 300 French leaders from government, industry, and the academy on 23 October 1993. We spoke about the need to reinvent intelligence and significantly increase reliance on open sources. The presentations that these distinguished flag officers and I made have been published in a book called Defence and Intelligence, available (in French) from Editions L'Harmattan, 5-7, rue de l'Ecole-Polytechnique, 7500 5 Paris. Robert D. Steele, Publisher Open sources Solutions, Inc. International Public Information Clearinghouse 11005 Langton Arms Court, Oakton, Virginia 22124-1807 From pcw at access.digex.net Mon Oct 16 10:42:27 1995 From: pcw at access.digex.net (Peter Wayner) Date: Mon, 16 Oct 95 10:42:27 PDT Subject: The NSA Visits Compendium Message-ID: I don't know anything about uninvited visits, but I did once interview the designer of a major product about getting an export license. He said that the NSA were fairly thorough in their review of the product. The most interesting thing that he mentioned was thatthe company had to guarantee that the data would never be encrypted sequentially by two _different_ algorithms. Apparently double encryption by 40-bit RC-4 was okay, but using different algorithms was verboten. This seemed odd to me at the time and I asked him twice about it. He agreed that it was weird, but they had no problem with guaranting it. This led me to these notions: *) Maybe double or triple DES isn't that great an idea. Maybe the NSA knows some neat algorithms that can create group-like actions even if the encryption process isn't a group. *) Maybe there was a communications problem and no one knew what was being asked. *) Maybe the cryptanalysis boys never really talked that much to the folks who go around regulating export. After all, denying export licenses for small details is like telling people that certain small details can confound analysis. This is a leak of information from the NSA which doesn't seem to like these things. In general, I think communications between the NSA and the companies begin when software companies make unofficial inquiries about what is exportable. -Peter From karlton at netscape.com Mon Oct 16 10:50:04 1995 From: karlton at netscape.com (Phil Karlton) Date: Mon, 16 Oct 95 10:50:04 PDT Subject: NEW Netscape RNG hole Message-ID: <30829B5D.41C6@netscape.com> [I sent this to the wrong address last week. A side effect seems to that I now I have an anonymous ID.] RingZero wrote: > However, Netscape had not revealed enough information about > their RNG to allow myself or other reviewers to determine how > critical it was. If, for example, this seeding function were > called once every time a secure connection were established, > losing a handle would be a major problem. Yes. The README was not as explicit on this point as my original message. SEC_SystemInfoForRNG is indeed among the global initialization routines. > This seems like a good reason to ask for the code for > SEC_RandomUpdate(). As was stated in the README, I cannot publish that code. It's derived from (and remarkably similar to) code that Netscape has licensed. It's not ours to divulge. > You show us from what sources you gather bits, > but you don't show us how you mix them or, for that matter, > stream out "random" bits. There seems to be little point in extracting isolated lines of code out of the source to "prove" that we use the functions we claim to use. If you have familiarity with RSAREF or the BSAFE toolkit, you will be able to see how we mix and extract the "random" bits. PK -- Philip L. Karlton karlton at netscape.com Principal Curmudgeon http://www.netscape.com/people/karlton Netscape Communications Corporation From JonathanZ at consensus.com Mon Oct 16 11:19:57 1995 From: JonathanZ at consensus.com (Jonathan Zamick) Date: Mon, 16 Oct 95 11:19:57 PDT Subject: Netscape rewards are an insult Message-ID: At 10:11 AM 10/16/95, RingZero wrote: >====== >On Sat, 14 Oct 1995, Henry Wertz wrote: > >On Sat, 14 Oct 1995, Dr. Frederick B. Cohen wrote: > >> The idea that Netscape (like Microsoft) thinks they can get free >> testing services from all over the net by real experts just by offerring >> a tee shirt is down right offensive. >> >> I have a better idea. How about an open market in break-in >> software. We crack Netscape and offer the crack code to the highest >> bidder. Bids start at US$25K per hole. For the insult, Netscape has to >> outbid the competition by a factor of 2 to get the details of the hole. >> Here's how it works: >*cut* > You know, this all seems kind of greedy to me.. It used to be people >would find holes for *fun* and not for profit. It's still possible to do >that you know 8-). >====== > >It almost sounds like extortion, doesn't it? I have to admit I'm a little surprised. I think there are a couple conflicting dynamics here. On the one hand, many people here see strengthening security and encryption in use as a no-holds benefit. The more that is out there, the better it is, and the more its in use, the better off things will be. On the other hand, Netscape is a hot stock company. Its ok to work for recognition, and to donate time for the betterment of the community even if it profits others. (Eventually such things come around, which is the classic value of a net reputation.) However, when sudden, large profits hinge on your work, it is harder to take the philosophical route. Its a tough thing. I can certainly see both sides. Jonathan ------------------------------------------------------------------------ ..Jonathan Zamick Consensus Development Corporation.. .. 1563 Solano Ave, #355.. .. Berkeley, CA 94707-2116.. .. o510/559-1500 f510/559-1505.. ..Mosaic/WWW Home Page: .. .. Consensus Home Page .. From williams at va.arca.com Mon Oct 16 11:58:16 1995 From: williams at va.arca.com (Jeff Williams) Date: Mon, 16 Oct 95 11:58:16 PDT Subject: proposal: "security spectrum scale" (SSS) Message-ID: <2648899582.57910054@va.arca.com> Vlad Nuri writes: > it seems to me what is lacking in all this is a *security spectrum*. > unfortunately security experts sometimes have a tendency to equate > *any* security weakness with a catastrophic one. while this is a good > approach in general, i.e. to be as conservative as possible, in > practice there can be no doubt that some security weaknesses are far > less severe than others. Unfortunately, severity is a question of perspective. In some environments, an operating system crash could be considered catastrophic. In others, it just means reboot and continue. I'm not a policy wonk, but security is relative to what you care about. > to aid this serious problem, I propose the creation of a > UNIFIED SECURITY SPECTRUM RANKING. There already was a USSR, but I think it ultimately failed :-} For some starters, you should check out: A Taxonomy of Computer Program Security Flaws Landwehr, C.E., Bull, A.R., McDermott, J.P., and Choi, W.S. ACM Computing Surveys, Volume 26 Number 3, September 1994 Which organizes flaws according to how they enter a system, when during the lifecycle they enter, and where in the system they manifest themselves. Some additional papers are available at the NRL web site. > this would be a list of all the different types of security weaknesses > a system can have, and their LEVEL OF SEVERITY. it would attempt to > rank every type of security breach possible. then, when a new > security weakness is discovered, it could be ranked A1 or B5 or C6 > or whatever. this would be a sort of technological "richter scale" > that would allow the novice to immediately understand that a given > bug that was recently discovered (say, the recent netscape bugs) > was, say, not really as potentially severe as the Morris worm. To whom? The only way to unify security rankings is to constrain the problem by assuming an environment and intended uses for the system. It sounds like you are assuming a low assurance workstation with an internet connection which is used for non-critical home or business purposes. Ironically, the digraphs you propose look sort of like Orange Book ratings. Evaluation results, however, tell you something (not everything by a long shot) about how trustworthy a product is. Your rating seems to indicate the exact opposite. How about a B2 product with a G3 flaw? I believe that that flaw rating is *exactly* the same problem as product security rating. But that's a different discussion. > however, if we do this, I hope that a good scale that is pretty general > and doesn't need extensions can be done from the start, before its widespread > usage, so that later changes do not confuse users. there is already > confusion in the media about two slightly different richter scales, this > is a pity. Any flaw rating system needs to consider how it will deal with advancing protection technology. For example, susceptability to viruses is much less critical than it would be if there were no anti-virus software available. Similarly, having a microkernel operating system makes me less susceptable to crashes. Should a flaw rating decrease as technology adapts to deal with it? Also, how do you rate situations where flaws are combined to mount an attack? For example, I crack a weak password to get a guest account. Then I snag an unprotected password file and crack it to get root. Then I leave an undetected trapdoor to get back in later. --Jeff Williams From wamcvey at fedex.com Mon Oct 16 12:15:25 1995 From: wamcvey at fedex.com (William McVey - wam) Date: Mon, 16 Oct 95 12:15:25 PDT Subject: Let's refocus... (was Re: Netscape rewards are an insult) Message-ID: <199510161915.AA06148@gateway.fedex.com> Jonathan Zamick wrote: > >On the one hand, many people here see strengthening security and encryption >in use as a no-holds benefit. The more that is out there, the better it is, >and the more its in use, the better off things will be. > >On the other hand, Netscape is a hot stock company. Its ok to work for >recognition, and to donate time for the betterment of the community even if >it profits others. (Eventually such things come around, which is the >classic value of a net reputation.) However, when sudden, large profits >hinge on your work, it is harder to take the philosophical route. As a (partial) solution to this problem, how about if rather than continuing to poke holes at netscape, we start an effort to bring one of the free Web Browsers, say Mosaic or Athena into line so it can be used instead of Netscape to perform secure transactions. This way our efforts are still oriented toward better personal encryption and better transaction security, but our work doesn't so directly benefit a for-profit company (something I have very little interest in doing without being employed by that company.) Personally, I see one of the cypherpunk's main objectives is to increase the security and privacy of people using computers and networks. I think this effort would further that goal. Sure, Mosaic may not have 75% of the market share on Web browsers, but that's probably because it is missing some basic functionality like encryption. -- William From jya at pipeline.com Mon Oct 16 13:43:06 1995 From: jya at pipeline.com (John Young) Date: Mon, 16 Oct 95 13:43:06 PDT Subject: Digital Cash The Book Message-ID: <199510162041.QAA15620@pipe1.nyc.pipeline.com> The eagerly awaited "Digital Cash" (with disk) by Peter Wayner is available says the publisher: APProfessional, 1-800-3131-APP. $34.95. Don't know if the author offers the special treatment for this that he offers for the excellent "Agents Unleashed." See his musical homepage at From hfinney at shell.portal.com Mon Oct 16 13:52:40 1995 From: hfinney at shell.portal.com (Hal) Date: Mon, 16 Oct 95 13:52:40 PDT Subject: Human ID through insecure channel Message-ID: <199510162051.NAA03429@jobe.shell.portal.com> Here is an example of the Matsumoto/Imai scheme for identifying yourself via a shared secret over an insecure channel, a system which is simple enough to be done in your head but which can withstand repeated observations by an adversary without being broken. The idea is that there is a challenge and response. In one example they give, the challenge is: 28517364 What happens here is that there are two secrets. The first is which characters are special in the challenge. In this example let us assume that is 1,2,4,6. The second is a secret response string of the same length; in this case let it be 3124. Now what you do is to enter a response string of the same length as the challenge. Only the characters in the same spot as those which held special characters in the challenge (1,2,4,6) matter, and those four should spell out the secret word 3124. So a correct challenge and response could be: * * ** 28517364 34312124 I have marked the spots in the challenge which use 1,2,4 or 6, and if you look at the response in those marked spots you have 3124. This is not too bad, but as more realistic examples the authors suggest much larger strings. In the first example the alphabet of characters would be the lower case letters and the digits 0-9, 36 characters in all. The challenge string would also be 36 characters long. Your secret word would be 18 letters, but the response alphabet is only the binary digits 0 and 1. So, suppose the special characters are befhjkmnpqtvwz1468, and the secret word is 011010111010110101. The secret can be memorized in hex as 1aeb5. This is not so much to remember, but try applying it in practice. Here is a challenge: 5fmp67yez2rnq4wd3uthsg1i8l09bkoavjxc To create the response, we go across, putting down random 0's and 1's, until we recognize our special characters. The first is f, the 2nd letter. So we are careful to put down 0 there since that is the first of our secret word letters. Then the m is special, so we put down 1; the p and 6 are special too, so we put down 10. Then the 7 and y are not special so we put random characters down there, and so on. So our initial response might be: 0011010... Try coming up with the rest of the response, and see if you think you could learn to do this by memory. Another example the authors offer uses a somewhat shorter secret word and set of special characters, but as a tradeoff the challenge alphabet is 50 characters (upper and lower case letters, say, minus 2 of them), and the challenge is 50 characters long. The secret word need be only 10 letters, and the response alphabet is 3 letters, say 0, 1 and 2. So suppose the special characters are bruzCEHMOQ, and the secret word is 2012100211. Here is a challenge: tJWTEjrkiqxsfmdAelvDIPguonKzFUHXwSaNVcpBQhGybRLMOC Coming up with the response is left as an exercise for the reader. Hal From vznuri at netcom.com Mon Oct 16 14:33:53 1995 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Mon, 16 Oct 95 14:33:53 PDT Subject: proposal: "security spectrum scale" (SSS) In-Reply-To: <2648899582.57910054@va.arca.com> Message-ID: <199510162132.OAA25544@netcom5.netcom.com> >> it seems to me what is lacking in all this is a *security spectrum*. >> unfortunately security experts sometimes have a tendency to equate >> *any* security weakness with a catastrophic one. while this is a good >> approach in general, i.e. to be as conservative as possible, in >> practice there can be no doubt that some security weaknesses are far >> less severe than others. > >Unfortunately, severity is a question of perspective. In some >environments, an operating system crash could be considered catastrophic. >In others, it just means reboot and continue. I'm not a policy wonk, >but security is relative to what you care about. I gave some examples in the initial message. the rating would not be overly sophisticated, but would cover situations where it is pretty obvious which is more insecure than something else. for example submitting arbitrary code is far worse than merely crashing a server. or, messing up a client is generally less severe than crashing a server (which potentially affects a lot more people). being able to do something *undetected* is much worse than being detected (during or after the fact). viruses are pretty much worse than stuff that can't repropagate itself, etc. an example of this is that one article compared netscape buffer overflows to the Morris internet worm. this was pretty obviously way out of line IMHO. >The only way to unify security rankings is to constrain the problem by >assuming an environment and intended uses for the system. It sounds >like you are assuming a low assurance workstation with an internet >connection which is used for non-critical home or business purposes. well, this would be a ranking for the general public to help them understand security problems, so yes, I think it would generally apply to commercial or internet type environments. the orange book rating is a reasonable start as you mention. also, thanks for the paper reference. actually what I am hoping is that someone from, say, CERT picks up the idea and uses it in their security bulletins. this would be a good place to bootstrap it into security consciousness. >Any flaw rating system needs to consider how it will deal with advancing >protection technology. For example, susceptability to viruses is much less >critical than it would be if there were no anti-virus software available. I disagree. this rating would apply to potential problems. a virus is a very serious matter regardless of anti-virus protection software. but you raise a good point in that the same bug could have different seriousness in different environments (say one where the virus checking is good). that's more complexity than the rating would try to address, I would imagine. >Similarly, having a microkernel operating system makes me less susceptable to >crashes. Should a flaw rating decrease as technology adapts to deal with it? my example would be the recent netscape bug. an article might say the bug was rated G2 on some systems, and say it could be potentially as bad as A6 on some operating systems. "for comparison, the internet worm was ranked A2". >Also, how do you rate situations where flaws are combined to mount an attack? >For example, I crack a weak password to get a guest account. Then I snag an >unprotected password file and crack it to get root. Then I leave an >undetected >trapdoor to get back in later. the rating would only apply to flaws. if you have more than one flaw, a different rating would apply to each flaw. what you are showing is that again, system configuration could make the same flaw much worse on one system than another. I don't deny, this is a very tricky rating scheme. it is only meant to be general however and give the public an idea of how bad a weakness is. the security rating would not be particularly useful to security experts, other than giving a rough idea of the potential severity of the problem. again I still believe that major security categories are being conflated to the point that it might sound, to Joe Sixpack, that the latest netscape bug could bring down the entire internet. this gross misperception is easily rectified. I find this kind of alarmism very counterproductive to improving the internet. the internet will not gain widespread acceptance if there is a *perception* that it is unsafe (regardless of how solid it really is). this rating would be an attempt to help the public understand security issues beyond a very rocky level of granularity. if something is not done to help convey accurate information, a void occurs and potentially "urban myths" such as "the internet steals your credit cards" would tend to arise. From vznuri at netcom.com Mon Oct 16 14:40:45 1995 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Mon, 16 Oct 95 14:40:45 PDT Subject: The NSA Visits Compendium In-Reply-To: Message-ID: <199510162105.OAA05055@netcom23.netcom.com> re: "Men In Black Study" I think this is a really excellent project, for the main reason that the NSA lives and dies by a "nobody is noticing" modus operandii (relative congressmen, the public, companies, foreign governments, etc.). it is a sort of "security through obscurity" that can be defeated. this has been a topic that has long fascinated me. I suggest however that the scope of the survey be expanded to the FBI. there are reports the FBI visited Lotus a long time ago to ask them to put in a "back door" into their encryption software, because it was too strong. it seems to me this is very similar to the survey questions. also keep in mind that the NSA loves to use "front agencies" like NIST to do their dirty work. so it might be hard to detect an "NSA visit". however the NSA like all intelligence agencies is really brilliant in intimidation. I think one would find that these situations are going to go "unreported" because the NSA may be leaving the impression that "not following our suggestion" is one sin, but that "screaming about this in the public" is going to be another liability. that is the coercion tactics that they are legendary for, IMHO. "you must do this, but we can't tell you why. you can't ask anyone else about this, either". I suspect that the entire crypto industry has been sabotaged in a lot of subtle ways by the NSA doing this, and nobody is the wiser. I hope people realize that by not reporting this, you contribute to the problem, not the solution. as Thomas Paine said, roughly, "the power of tyranny lies solely in the fear of rebellion". a study on this would be very significant. (from what I understand, the NSA tried to do this with public key crypto, i.e. suppress it at the publication stage. a professor gave a lecture on this in one of my classes and said that it was even covered in the NYT at the time. unfortunately I lost the date. I believe it was a long time ago (maybe the 80's or even the 70's). hopefully someone else has an encyclopedic brain. in fact, we might be able to get Levy or Markoff to write on this subject if we can get any significant results. that would be *hot*. they could put a great spin on it, like "the netscape bugs are a problem, but an even more horrifying and unimaginable thing going on is..." if the NSA has visited Netscape, that's virtually an article right there!! >* Does the NSA really visit companies planning to include crypto modules >and ask them to weaken or remove the crypto modules? a rumor was floating around that they visited Mosaic designers. >* What pressures are brought to bear on companies to induce them to weaken >crypto, even for domestic-only use, or to remove hooks? probably just the insinuation that they may be liable. you know the lovely intimidation tactic, "what you are doing may have LIABILITY". of course everyone does all kinds of ridiculous things, because, after all, one might be LIABLE after doing them. >* Is there concrete evidence of these things? it is in the NSA's interest to cover up any evidence, and furthermore to suggest that their program, if it exists, is totally ineffective. I think otherwise. I think it is prime dirty secret of the NSA and a major public relations liability that ought to be exploited to the utter, full extent by cypherpunks. [Blaze etc.] > They confirmed that such a panel _does_ exist, but that it is >fairly ineffectual. Apparently many people publish without approval. however it may be more effective with commercial companies worried about liability. sometimes the slightest whiff of liability sends a company screaming for cover and not touch an entire area with a ten foot pole. I wonder if cellular phone encryption in the US has been delayed for this reason. >NSA Actions: Visits on a regular basis by two NSA representatives ("always >two"). Pressured them to drop plans for a strong domestic crypto module. > >Source: Personally told to me by programmer at the company, 1995-10-14. He >wishes the company not to be named. unfortunately, whenever someone says, "don't name my company", it loses effectiveness. I would like to point out that people are directly contributing to their erosion of rights by this behavior that suggests that they doing something lawbreaking that they are ashamed of. well, good luck with the study. I'll do what I can to publicize it From bugs at ritz.mordor.com Mon Oct 16 15:16:44 1995 From: bugs at ritz.mordor.com (Mark Hittinger) Date: Mon, 16 Oct 95 15:16:44 PDT Subject: NSA crypto museum article Message-ID: <199510162216.SAA10517@ritz.mordor.com> The November 1995 issue of 'Popular Communications' magazine has a nice article on the NSA Cryptologic Museum. Included are maps and pictures and stuff. Don Schimmel wrote the article. I'm relocating to Herndon at the end of the month so I'll have a chance to run by there. Regards, Mark Hittinger Internet Manager WinNET Communications, Inc. bugs at win.net bugs at ritz.mordor.com From DMiskell at envirolink.org Mon Oct 16 15:28:18 1995 From: DMiskell at envirolink.org (Daniel Miskell) Date: Mon, 16 Oct 95 15:28:18 PDT Subject: Weekly MixMaster list Message-ID: <9510162227.AA28775@envirolink.org> What is the MixMaster list, and what is it for? Apologies on my newbie status. Munster --- _________________________________ *!Cheese Doctrine:!* Though cultured over time, and aged to perfection, one must not yield to produce mold. One must also not belittle themselves by conforming to the "whiz", but melt over the unprocessed ideas of Ghuda. _________________________________ re reported. You don't need a strong authentication technique >if a stolen card is easy to cancel. The card's easy to cancel, but the cash ain't. Credit cards are cleared with the issuer. Digital cash with smart cards acting as transaction observers don't need this. The thief need only transfer the cash from the stolen card to his own, just like he does with regular cash. >Even with a weak PIN system for authentication, you can always provide >a "duress" PIN, right? Sounds like a better choice. From sameer at palladium.corp.sgi.com Mon Oct 16 16:37:41 1995 From: sameer at palladium.corp.sgi.com (Sameer Parekh) Date: Mon, 16 Oct 95 16:37:41 PDT Subject: Cardinal Wins Okay for First Online Bank Message-ID: <3082EA45.41C6@corp.sgi.com> http://www.yahoo.com/headlines/current/business/stories/bankonline_289001.html -- Sameer Parekh sameer at corp.sgi.com From stripes at va.pubnix.com Mon Oct 16 16:51:36 1995 From: stripes at va.pubnix.com (Josh M. Osborne) Date: Mon, 16 Oct 95 16:51:36 PDT Subject: Netscape rewards are an insult In-Reply-To: <9510151627.AA15802@toad.com> Message-ID: In message <9510151627.AA15802 at toad.com>, "Brad Shantz" writes: [the stuff with ">>" is mine] >> Note well: Netscape is offering this reward for finding bugs in *beta* >> release code. In other words the code that they *know* crashes, code >> that they susspect has security releated bugs, code that they don't think >> is (yet) good enough to charge a mesely $40 for! > >Whoops, wrong. BETA does not mean code "they know crashes." In fact >it is quite the opposite. This is pre-release code that they are bug >fixing. most of the catastrophic bugs, they probably know about. I would agree that they know about many catastrophic bugs, perhapse even most, perhapse not. That doesn't mean they have been fixed. I have been involved in a fair number of beta test programs (as a tester for the compony relasing the product, as a programmer for the compony relasing the product, and as a user recieveing the product to be tested). Most had catastrophic bugs (varying from crashing for programs written in C, to kicking you out of the run time enviroment for programs witten in APL) that were known about when the product was shipped to testers. The others we had absoultly no doubt that such bugs would be found by testers. Perhapse Netscape is diffrent, but I don't see why they would be. Certinally I can make Netscape 2.0b1 crash, and I doubt people at Netscape were foolish enough to think that it wouldn't. >BETA program is to increase the testing and quality assurance staff >to find all of the bugs they DON'T know about. Then, they will have a >reasonable amount of time to fix those bugs before release. It makes >for a much more stable product. Yes the principal reason for having a Beta is to find bugs you don't know about. That does *not* mean you need to remove all known bugs before you start the Beta ('tho it does cut down on the number of duplicate reports - many testers fail to read the known bug list). There are also some less noble reasons to have a Beta (like the PERT chart says the Beta starts October 8th or the project will start to slip, and many more). There is no real evidence that this applys to Netscape so I won't go into them. [...talks about SPRY/Compuserve and Logos Research and Microsoft's beta programs...] >Anyway, I see Netscape's move to paying for beta testing will result >in a more stable browser, and hopefully more secure software. Yes, and this would be diffrent from my point of view in what way? (i.e. I agree and wonder why you botherd to mention it) >> If they don't get buried in bad press for this, I would guess that they >> may have a diffrent program with a diffrent set reward for finding bugs >> in their for-sale version. > >Why would they get bad press? Well a number of people on this list seem to be pooh-pooing the reward program. Rightfully or not that could gennerate bad press. Also reporters have their own set of thought processes and may decide this is bad for some reason. Or not. >> Besides nobody said you have to report your bugs to Netscape just because >> they gave you free software and offered some sort of reward for finding >> bugs. If you don't think the "pay" (including the posability of having >> the software fixed) is high enough, don't report the bugs. > >Once again, Josh, I'm afraid I have to disagree with you on this one. Ok, go ahead. > Especially in regards to secure software. I see your point, but... >Whether or not you have to report the bugs is immaterial. Netscape >is doing a service by making their app available for testing before >saying "this is secure." As a person who does business over the net, (I'm not sure they have ever gone out and said the Beta software isn't secure. Hopefully people realise that beta code doesn't allways do everything it hopes to, and will not assume it is secure just because it has a goal of being secure.) >if I found out that my software was NOT secure, I would seek either a >secure update or another company's software. If I'm happy with >Netscape's software, I'll report the bugs to improve it's quality. >In my humble opinion, improving the software is reward enough. Very >few companies have paid beta programs. Again I agree. In fact I think the $0 they were paying before the reward program was enough that I sent in reports on anything I could reproduce. You havn't done a very effictave job of disagreeing with me. I said Netscape offers you X in exchange for Y, and if X isn't enough for you do want to do Y, then don't do Y. You said X is a very good offer for Y, and you intend to take them up on it. The two are not mutually exclusave (in fact the two views are somewhat supportave of each other). Which ones of us doesn't understand the other? [...] From wilcoxb at nag.cs.colorado.edu Mon Oct 16 16:58:07 1995 From: wilcoxb at nag.cs.colorado.edu (Bryce) Date: Mon, 16 Oct 95 16:58:07 PDT Subject: mental cryptography In-Reply-To: <199510141243.IAA27588@hammond.cis.ohio-state.edu> Message-ID: <199510162357.RAA28204@nag.cs.colorado.edu> -----BEGIN PGP SIGNED MESSAGE----- Nathan Loofbourrow > > Of course, perhaps this encourages someone to steal your card and > incapacitate you before you can report it. That's why we have > PINs... so that someone can steal your card, threaten you until you > reveal your PIN, and then incapacitate you... Hmm... > > Even with a weak PIN system for authentication, you can always provide > a "duress" PIN, right? I can think of two purposes for "duress codes": 1. To yield little loot to the thief, thus leaving more of it in your possession and discouraging theft. 2. To summon help in the form of physical force. The first use is susceptible to the "give me more or I cut off your little finger" approach. So we are again faced with the great importance of a good police force. Let us not forget about the value of such when constructing our future visions. Bryce signatures follow "To strive, to seek, to find and not to yield." bryce at colorado.edu -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Auto-signed under Unix with 'BAP' Easy-PGP v1.01 iQCVAwUBMILxb/WZSllhfG25AQFiSwP/YgjCyQG/VfMKg8ervnnirEYxaqTdcTXW AuDmDhVMrtP0J5kr1/7bZVDTY8wNrkptzBM9K8P9TFyhxEZnJZWEfW8PXR2Q28cC nlUgF5PlWBqlPgnA6mZPbGQD8Fef+en4s1Rh1/9OxTxS3kFy1a3gMdkiR5iSKTVR S9gGz3HBHNg= =CmKt -----END PGP SIGNATURE----- From jsw at netscape.com Mon Oct 16 17:51:11 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Mon, 16 Oct 95 17:51:11 PDT Subject: Bug Bounty [noise] In-Reply-To: <199510160542.WAA09463@desiree.teleport.com> Message-ID: <3082FD0C.7103@netscape.com> Alan Olsen wrote: > > Something I noticed about the Netscape Bug Bounty that seems to not have > been mentioned here... > > "Linux users need not apply." If a linux user finds a security hole that is reproducible in any supported version then they are still eligible for the prizes. If a linux user finds a security hole that only applies to linux, I don't know what the company would do, but I would push for them being payed as well. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From norm at netcom.com Mon Oct 16 18:03:05 1995 From: norm at netcom.com (Norman Hardy) Date: Mon, 16 Oct 95 18:03:05 PDT Subject: Using deterministic programs to select private RSA keys. Message-ID: Much has been said recently here about how to produce truly random primes. Suppose you are selecting a secret key to be used by a bank to sign its documents. Short of examining the code very closely, or writing your own, you are vulnerable to a program that selects primes from a vastly reduced set. If this program behavior is known then discovering the secret primes may be vastly easier. Writing your own code, or examining other's code, is error-prone and requires trusting someone who knows more math than most programmers. Here is an alternative that requires only simple high school math to understand. I define a simple protocol and commission several independent programmers to implement it. The protocol is to accept a sequence of key strokes for printable ASCII characters. Whitespace is ignored except that two successive newlines terminate the input. MD5 is applied to the input stream and the result is used to start the search for the prime. The required entropy must come from the keyboard. Each of these programs are used with the same input and the yields are compared. It is even better if the programs are bought on the open market. The more divers the interests of the programmers, the less likely there can be an undetected conspiracy. The naive objection to this is that the keyboard input will be less than perfectly random. That is certainly true. The input need not be random--it is only necessary that there be sufficient entropy. There is a real hazard that the user does not understand the issues and will merely type in the first paragraph of the Gettysburg address, having heard that there is about one bit of entropy per character in the English language. If several bank officers trust each other but not the other's grasp of entropy they can each enter text since the accumulated entropy only increases. (They need not hide the text from each other.) MD5 only produces 128 bits. It might be wise to require more than 128 bits of entropy. The scheme as described can only ever produce 2^128 distinct primes. That is small compared with the number of 1K primes. But having to test 2^128 primes seems hard enough. Are there other attacks? You might argue that trusting a program to choose secret keys is no worse than trusting your operational signing software. True. You can confine that operational software and compare the yields of programs by different programmers. (The software of the Space Shuttle uses such redundancy.) The confinement program must supply any required random salt or padding. From ponder at wane-leon-mail.scri.fsu.edu Mon Oct 16 18:19:07 1995 From: ponder at wane-leon-mail.scri.fsu.edu (P.J. Ponder) Date: Mon, 16 Oct 95 18:19:07 PDT Subject: Security Spectra Message-ID: In your recent post to the cypherpunks mailing list you proposed a taxonomy of security weaknesses and vulnerabilities, adding that these may be perhaps categorized and ranked. Standard practice in the computer and communications security business has for many years been based on the idea of risk analysis. More or less systemmatic approaches to risk analysis have been put forward over the years. One example is FIPS Pub 65 which attempted to systematize risk analysis and ideally lead one to a quantified level of risk at the end. The method was too burdensome to be effective, and most people today use a more qualitative approach. The whole idea of categorizing or ranking holes and vulnerabilities ab intitio, outside of their contextual application to a real system is not very helpful. Systems vary so widely in their criticalities, sensitivities, costs, etc., that each of your pre-defined categorized weaknesses would have to be rejudged - in the context of the system being analyzed - to determine how, and to what extent it could effect the system. For example, a system with a weakness in logging events would be a disaster in a busy commercial transactional system that may need logs to recover from errors or to trace mischievious actions. Another system, however, may find the lack of effective logging an inconvenience at worst (maybe even a plus, if the Pennsylvania cops are at the door). The standard approach as I understand it is to analyze the system against all the known vulnerabilities and attempt to measure (maybe only qualitatively) the risks associated with the vulnerabilities. I think analyzing holes by themselves, outside of any context, is a good academic exercise, and may lead to useful knowledge that people analyzing real systems can use, but it is not an advantage to attempt to grade them in the abstract. -- PJ you'll probably get lots more useful advice from others more articulate than I, but I hadn't posted to the list in awhile and am curious about how all these bounce messages everyone is talking about. Are there lots others besides the guy with 1000 messages in his mailbox? I guesss I'll see..... From bdolan at use.usit.net Mon Oct 16 18:31:58 1995 From: bdolan at use.usit.net (Brad Dolan) Date: Mon, 16 Oct 95 18:31:58 PDT Subject: PGP article in American Survival Guide Message-ID: There's a brief intro article re. PGP in the issue of *American Survival Guide* which is currently on the stands. ASG has a sort of cammo-right orientation, FWIW. bd From alano at teleport.com Mon Oct 16 19:04:20 1995 From: alano at teleport.com (Alan Olsen) Date: Mon, 16 Oct 95 19:04:20 PDT Subject: Bug Bounty [noise] Message-ID: <199510170204.TAA12213@desiree.teleport.com> At 05:47 PM 10/16/95 -0700, you wrote: >Alan Olsen wrote: >> >> Something I noticed about the Netscape Bug Bounty that seems to not have >> been mentioned here... >> >> "Linux users need not apply." > > If a linux user finds a security hole that is reproducible in >any supported version then they are still eligible for the prizes. >If a linux user finds a security hole that only applies to linux, >I don't know what the company would do, but I would push for them >being payed as well. If you look at what versions are eligible for rewards of any sort, Linux is not on the list. Was it an oversight or are they only eligible for the security cash? | Visualize a world without lawyers! | alano at teleport.com | |"The moral PGP Diffie taught Zimmerman unites all| Disclaimer: | | mankind free in one-key-steganography-privacy!" | Ignore the man | | -- PGP 2.6.2 key available on request -- | behind the keyboard.| | http://www.teleport.com/~alano | | From anonymous-remailer at shell.portal.com Mon Oct 16 19:28:39 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Mon, 16 Oct 95 19:28:39 PDT Subject: Netscape rewards are an insult Message-ID: <199510170227.TAA27532@jobe.shell.portal.com> > The idea that Netscape (like Microsoft) thinks they can get free > testing services from all over the net by real experts just by offerring > a tee shirt is down right offensive. > > I have a better idea. How about an open market in break-in > software. We crack Netscape and offer the crack code to the highest > bidder. Bids start at US$25K per hole. For the insult, Netscape has to > outbid the competition by a factor of 2 to get the details of the hole. > Here's how it works: [snip of judging, verification, bidding ...] Hmmm. I'm glad that some people still have a bit of a sense of haha about these things. It's only computer code, right?? Right?? ;-( Your idea about a bidding war for this type of code is _interesting_ but not something I'd really like to see develop. Good security and good code are possible without this. Good people are out there. The *best* people might be in academia or they might be in retirement or even on a sabbatical. They might even be in other fields, or other countries, or as Netscape discovered to its chagrin, they might be Berkeley students. The question is how to secure co-operation when they aren't motivated by ego, need, or greed. How do you attract the ones who simply know who they are, and WHAT they can do, and simply won't put up with twaddle?? And frankly offering someone a cup, or a shirt or even offering someone a $1,000 isn't the way to bring them on side. I can't even get my lineprinter serviced on Christmas Eve for $1,000. There's always a fine line between an insult and an offer. > I have an even better idea. How about if Netscape gets some > competent programmers with real security expertise, adds in some good > change controls, a serious internal testing program, quality control ala > ISO-9000, internal IT auditors, external IT auditors, training and > education for their employees, and everything else it takes to be in the > software business in a serious way. This would be a *basic* start. Whether or not ISO-9000 is the way to go, or whether it should be TQM, or something more modern is moot. In addition to some of the above, I might suggest parallel development units. Two separate program teams kept completely apart from each other, each duplicating the other's work with the eventual goal of utilizing the first reconciliation sets of production code as "learning experience", and then, as part of a planned design goal re-evaluation and refinement, disposing of the reconciliation set before "Fresh-Start"(TM) implementation. (This might necessarily lead to attendant presentation of individual outplacement opportunities to select persons, as a team regrouping component.) Essentially a real-life simulation of the anticipated code-writing process. Each group could develop its own unique vision and approach within the context of the design goal, and should have demonstrated a willingness to utilize challenge and justification modelling. The groups themselves might be dynamically balanced and re-balanced vis-a-vis personality and code-writing styles. A positive creative environment should be provided, possibly in an incubator-type setting, which meets creative, psycho-social, and psycho-physical requirements. Essentially, the right balance between spa and boot-camp, a realized vision. An evolutionary development of Scott Adams' "Vision: Empowered Employees Working Toward A Common Plan". A plan that centers around People. A New Plan that views employees as assets to be developed, nurtured, and cared for rather than as expenses to be eliminated or reduced. A New Vision emphasizing Quality by remedying the marginalization of the companies prime assets -- the employees. An applied corrective ... a focussed deemphasis on productivity in anorectic organizations. I might, humbly, suggest as a title: A New Vision, A New Plan: Applied Complexity Theory (A.C.T.) in Action. It truly is a long list ... as part of an "ACT in Action Plan"(TM), Netscape should source long-range planners who can meet and exceed day-to-day corporate expectations. > As an alternative, we could help them contact the shareholders > for a lawsuit. After all, they are a public company now and are responsible > to the shareholders for the value of their stock. If it goes down because > they aren't doing an adequate job of software quality control, the officers > may be personally liable. I think whether or not it goes down, is not relevant. If there has been proper material event disclosure, then I doubt that there are actionable grounds. If there has been active acts of misrepresentation, then that's simple fraud. Fiduciary obligations can be very complex without good counsel. Clearly by not having official announcements, it might lead a reasonable man to believe that there might be trading improprieties through-out the high-tech sector, among so-called "friends and family" or alternatively, that Netscape's strategic misrepresentation program might be operative. Who know's?? One thing is certain though, disclosure obligations attach to all public companies. Sun, Microsoft, Netscape, AT&T, Viacom ... Maybe I should email postmaster?? Alice de 'nonymous ... ...just another one of those... P.S. This post is in the public domain. C. S. U. M. O. C. L. U. N. E. From jirib at cs.monash.edu.au Mon Oct 16 20:17:14 1995 From: jirib at cs.monash.edu.au (Jiri Baum) Date: Mon, 16 Oct 95 20:17:14 PDT Subject: Elementrix Press Release In-Reply-To: Message-ID: <199510170316.NAA10771@molly.cs.monash.edu.au> -----BEGIN PGP SIGNED MESSAGE----- s1018954 at aix2.uottawa.ca wrote: > On Thu, 12 Oct 1995, Jiri Baum wrote: > > > Still, who knows what surprises QM can provide? > > > > In which case calling it a "telepathic key exchange scheme" might > > be quite appropriate :-) > > I don't think that's what was meant. After all, using telepathy as a > secure channel, you'd still need a comm protocol. Not really, you can use the raw bitstream as OTP. (Which is probably not enough to warrant calling it a protocol, maybe protocolette :-) > The last time I checked > protocols and algorithms are one and the same. Since elementrix doesn't use > algorithms, we shouldn't defame them by claiming they've invented secure > telepathy. Well, you could claim that what they are using is not an algorithm since it won't run on a Turing machine. At that stage you probably toss the Church-Turing thesis out the window and get yourself a proper definition of "algorithm". > Now wouldn't that be interesting to patent? Gives a new meaning to the phrase "subliminal channels" :-) > (One wonders if elementrix employees occasionally indulge in guilty > glances at Knuth and Sedgewick without their bosses' knowledge.) Well, wouldn't the bosses give them mind-scans to avoid this possibility? Sorry, I forgot, Psi Corps doesn't allow that. Jiri - -- PGP 463A14D5 -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBMIMgDixV6mvvBgf5AQEvnQP/dBeNDgbaz23cMhii0yWzDhnAcL+VLmJw x2x85A35IlSvblSmb647lYj/Bl1k6zpKZkpz+MKrtvh6psy3lTl/tWe2DXzXcoRk nVwJC5vWCRyVTDMIhRlIoUkbx4QnKVDy1awHWYhIJ4Ssbj6c3G+XPrdvH8LxcSSb BhxJL63Cp74= =MDDD -----END PGP SIGNATURE----- From jsw at netscape.com Mon Oct 16 20:21:11 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Mon, 16 Oct 95 20:21:11 PDT Subject: Netscape rewards are an insult In-Reply-To: <199510152232.SAA12387@book.hks.net> Message-ID: <3082EDD2.20C9@netscape.com> David A Wagner wrote: > I do think their ``bug bounty'' system is an improvement -- at least > they're showing some concern for security, and beginning to admit > that outside review of security-critical code is...well...critical. The whole bug bounty thing is an experiment. We have no idea how valuable it will be, but we thought it would be worth trying. As we gain more experience with it, we will probably evolve it. > Still, I do agree that they really oughta be employing true experts > to carefully evaluate their system, if they wanna claim anything about > its security. We are doing that to. We are paying outside consultants to review everything related to security. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at netscape.com Mon Oct 16 20:21:41 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Mon, 16 Oct 95 20:21:41 PDT Subject: Netscape rewards are an insult In-Reply-To: <199510152256.SAA02632@pipe4.nyc.pipeline.com> Message-ID: <308304EA.28AF@netscape.com> John Young wrote: > That's the joy and sorrow of this reading list, the ancient > story, talented people working their asses off for sons of > bitches who think employees are contemptible, disposable or > bribeable for cheap change and backpats -- and easily > replaceable on shore or off. Jeff's not alone in this bind. I don't share your cynical view of the world. Having worked for a year at IBM, I know what that side is like. I feel pretty strongly that all employees should have ownership and a vested interest in the company. At the last three companies I've worked for, every employee has had stock options. I think that companies exist where management holds the view that you mention, but there are also companies that value the contributions of their employees. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at netscape.com Mon Oct 16 20:22:10 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Mon, 16 Oct 95 20:22:10 PDT Subject: Netscape rewards are an insult In-Reply-To: <199510151619.MAA25730@pipe4.nyc.pipeline.com> Message-ID: <30830332.7BC8@netscape.com> John Young wrote: > > Responding to msg by stripes at va.pubnix.com ("Josh M. Osborne") > on Sun, 15 Oct 12:0 AM > > The PR of Bugs Bounty is the aim, as the quick-market-adapter > Netscape Chair speechified in FR. > > Promoting the notion that hackers are earnestly attacking > Netscape and reporting its bugs increases its credibility to > the stock market porkers. Is that not why dear > all-too-attentive Jeff has been assigned duty on this list, > feeding peanuts to chimp hackers and champ newshacks? I have not been "assigned duty" on this list. I'm here of my own free will. I want to keep up on whats going on in the cypherpunk world, and sometimes tap the expertise of the list. I'm not some corporate flack assigned here to "feed the chimps". My personal feelings definitely lean toward unimpeded strong crypto, personal privacy, freedom from govt. surveilence, etc., and I was interested in this stuff at a personal level before joining netscape, or working on security stuff. --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From jsw at netscape.com Mon Oct 16 20:22:47 1995 From: jsw at netscape.com (Jeff Weinstein) Date: Mon, 16 Oct 95 20:22:47 PDT Subject: Netscape question transformed In-Reply-To: <199510151421.HAA08833@jobe.shell.portal.com> Message-ID: <30830CB4.7C6F@netscape.com> anonymous-remailer at shell.portal.com wrote: > After emailing the company more than two days ago, I would hope that a > communications channel would have been opened, or alternatively I would > have held out a hope that someone from Sun or Netscape might have made an > official comment here or publically. I would have expected something > other than a stone-walling silence. > > My Friday the Thirteenth post obviously has people shaken. Clearly, Friday > was not the day to comment about this serious problem. There was no > utility in causing panic and disrupting trading in Netscape stock, > especially in a market that can only be characterized as frothy. But now > here we stand, many hours and days later, with the questions raised > remaining unaddressed, and with my copyright restriction on my Friday > post hereby, and herein explicitly waived. I'm not really sure what you are talking about. Are you referring to the bugs that were reported here, and have since been fixed, or are you talking about something new. Who at netscape did you e-mail? What Friday the Thirteenth post are you referring to? --Jeff -- Jeff Weinstein - Electronic Munitions Specialist Netscape Communication Corporation jsw at netscape.com - http://home.netscape.com/people/jsw Any opinions expressed above are mine. From stevenw at iglou.com Mon Oct 16 20:33:59 1995 From: stevenw at iglou.com (Steven Weller) Date: Mon, 16 Oct 95 20:33:59 PDT Subject: Empennage Seminar -- Sun Microsystems Message-ID: Seen on ba.seminars and posted here: Mathematical Sciences Research Institute Empennage Seminar An Introduction to Cryptopolitics Whitfield Diffie Sun Microsystems Mountain View, California Some years ago, Andy Gleason observed that during World War II, the physicists had discovered that what they did had an impact on the real world and that now it was the mathematicians turn. The talk will explore why seemingly arcane technology has become a political football. We will examine the significance of communications privacy in human affairs, how communications intelligence functions, and how cryptography affects that functioning. In the process we will look at a variety of proposals for controlling cryptography and the possible impact of those propsals on intelligence, law enforcement, commerce, and the personal life. 2 PM, Tuesday October 24, 1995, MSRI Lecture Hall Next Month: Scott Mitchell, Sandia National Laboratories, on hexahedralization ##################################################################### About Empennage As part of our effort to build bridges between Mathematics and the larger world, the Mathematical Sciences Research Institute is sponsoring a seminar where mathematicians can meet adventurers on the technological frontier. The Empennage Seminar will meet in the MSRI lecture hall Tuesday afternoons from 2 to 3. The seminar is intended to bring together not only scientists from the Bay Area involved directly with mathematical computing, but also people involved in envisioning and implementing new technologies, people concerned with the social and political ramifications of the development of information technology, and people working on problems, the formal nature of which brings them close to mathematics. The seminar is aimed at breaking down the walls which in this century have isolated mathematics from intellectual life outside of its own tradition. While the Empennage seminar is still in its infancy, we have begun to attract an audience beyond MSRI, including scientists from other institutions and disciplines, both within and without academe. If you have any recommendations for possible speakers, please let me know. Also, anyone interested in attending should contact me: Joe Christy, joe at msri.org, (510)643-6069. About MSRI The Mathematical Sciences Research Institute (MSRI) is an independently funded research institute located on the UC Berkeley campus, high above the Lawrence Hall of Science. At any given time, MSRI is host to 50 to 100 post-doctoral fellows and more senior researchers who come from all over the world for periods of a week to a year. Most of them participate in one of two topical programs which change from year to year, with a smaller group in "Area III", our catch-all. Currently the programs are Holomorphic Spaces and Several Complex Variables. MSRI is aiming to become a model site for the integration of computing into mathematical research. In practical terms this means not only the development and use of software for numerical calculation, symbolic manipulation, and geometric visualization, but also exploration of the uses of technology in other areas of scholarly life. This includes network access and distribution of structured information, new modes of scholarly communication (incorporating Email, formatted and illustrated mathematical text, and shared interactive software for experimental mathematics), and the development of software engineering tools necessary to put the creation of useful, shareable special purpose software within the reach of the average individual scientist. directions to MSRI are available at the URL: http://www.msri.org/housing/info/howtoget.html About the word "empennage" Empennage is the French word for fletching - the act of putting feathers on the tail of an arrow. This makes the arrow fly strighter by giving it a spin. ------------------------------------------------------------------------- Steven Weller | "The Internet, of course, is more +1 415 390 9732 | than just a place to find pictures | of people having sex with dogs." stevenw at iglou.com | -- Time Magazine, 3 July 1995 From ses at tipper.oit.unc.edu Mon Oct 16 20:34:53 1995 From: ses at tipper.oit.unc.edu (Simon Spero) Date: Mon, 16 Oct 95 20:34:53 PDT Subject: transaction costs in anonymous markets In-Reply-To: Message-ID: On Mon, 16 Oct 1995, Sandy Sandfort wrote: > > This is only true if you assume everyone will do their own > reputation evaluation. This is a third-party insurer problem, > really. Either a "Lloyds of London" or a "Good Housekeeping" > model would do the trick. > Actually, this sounds a lot closer to someone like S&P or some other rating agency. Simon ------ (defun modexpt (x y n) "computes (x^y) mod n" (cond ((= y 0) 1) ((= y 1) (mod x n)) ((evenp y) (mod (expt (modexpt x (/ y 2) n) 2) n)) (t (mod (* x (modexpt x (1- y) n)) n)))) From AFDA2 at aol.com Mon Oct 16 20:46:41 1995 From: AFDA2 at aol.com (AFDA2 at aol.com) Date: Mon, 16 Oct 95 20:46:41 PDT Subject: Seminar Message-ID: <951016233125_125652326@emout04.mail.aol.com> A quick update on the Association's upcoming seminar. As many of you know, on Saturday, November 4, 1995, the Association of Federal Defense Attorneys (AFDA) will be presenting a one-day seminar for defense attorneys entitled, "What Every Defense Attorney Should Know About The Federal Bureau of Prisons." The seminar will be held at the Los Angeles Airport Marriott Hotel, from 9:00 a.m. - 4:30 p.m. The purpose of the program is to provide defense attorneys with two avenues of insight into BOP. The first, which covers the morning and part of the afternoon, focuses on the administrative/policy-oriented makeup of the agency, and the defense attorney's strategic application of these rules. Speakers from the BOP, private defense bar and Federal Public Defenders Office will cover the following subjects: 1. Types of BOP facilities, including the key operating features of the USP, FCI and camp. 2. The flow chart of key players in BOP administration that attorneys should be familiar with, including the Community Corrections Manager, Community Corrections Staff, Regional Designator, and the legal offices at the various facilities and regional offices such as Dublin, Ca. 3.The BOP documentation system, which has its own unique classification and numbering system. This topic includes special attention to the key documents most likely to affect defense attorneys, such as Program Statements, Operations Memoranda, and Directives. 4. The key BOP terms that attorneys should be familiar with in order to communicate more effectively with staff and understand better the agency's documentation. 5. How to anticipate where the defendant will serve his/her sentence and secure a favorable outcome (to the degree possible). This subject includes: Designation of place of confinement Custody classification Institutional transfer and redesignation 6. Sentence computation (calculating release dates) 7. How to efficiently contact appropriate staff on matters of concern 8. Intensive Confinement Centers (boot camp) The second prong of the seminar, which covers about two hours in the afternoon, focuses on the "grass-roots" perspective of the federal inmate, in terms of basic facts about federal incarceration that lawyers need to pass on to their clients before the clients are designated to a facility. The speakers will be two former inmates who have done time at camps and FCIs. If you would like a fax-flyer for the program, email us a short note at AFDA2 at AOL.com From an407769 at anon.penet.fi Tue Oct 17 00:19:40 1995 From: an407769 at anon.penet.fi (jerry the golden retriever) Date: Tue, 17 Oct 95 00:19:40 PDT Subject: java flaw Message-ID: <9510170659.AA29634@anon.penet.fi> Sun and Netscape fix Java-Navigator flaw >From PC Week for October 16, 1995 by Michael Moeller Netscape Communications Corp. has identified a flaw in Sun Microsystems Inc.'s Java development language that caused a security hole in Netscape's Navigator 2.0 Internet browser. The flaw left open the possibility for corrupted files or viruses to be downloaded over the Internet to a host PC. Netscape officials, in Mountain View, Calif., said the problem occurred when porting Java to the Netscape platform. Sun, also based in Mountain View, issued a fix that performs a tighter security scan of Java applets, or portions of code. Sun officials said no users were affected by the security flaw. The company is beta testing Java now, and the final version is scheduled to be released next month. Ironically, Java was designed as a secure development language to prevent users from contracting a virus when downloading an application over the Internet. With Java, World-Wide Web application developers can create applets that are turned into full-scale application code once downloaded by a Java- enabled browser. A security feature in Java scans for viruses before activating the applet. Java applications are designed to be run within the secure environment of a Java-enabled browser. When Java was ported to Netscape, one of the security features "fell through the cracks," said Arthur van Hoff, senior staff engineer at Sun and a principal architect of Java. As a result, a user could have downloaded a corrupt applet that could have continued to function outside the secure environment of the browser shell and infected other programs on a user's computer. Netscape has since released two new versions of its Navigator 2.0 browser for beta testing, one with Java support and one without. However, Netscape officials said that once the browser is released in mid-December, all versions of Navigator 2.0 will be Java-enabled. --****ATTENTION****--****ATTENTION****--****ATTENTION****--***ATTENTION*** Your e-mail reply to this message WILL be *automatically* ANONYMIZED. Please, report inappropriate use to abuse at anon.penet.fi For information (incl. non-anon reply) write to help at anon.penet.fi If you have any problems, address them to admin at anon.penet.fi From eay at mincom.oz.au Tue Oct 17 01:01:47 1995 From: eay at mincom.oz.au (Eric Young) Date: Tue, 17 Oct 95 01:01:47 PDT Subject: Netscape rewards are an insult In-Reply-To: <9510151627.AA15802@toad.com> Message-ID: On Sun, 15 Oct 1995, Brad Shantz wrote: > Whoops, wrong. BETA does not mean code "they know crashes." In fact > it is quite the opposite. This is pre-release code that they are bug > fixing. most of the catastrophic bugs, they probably know about. A > BETA program is to increase the testing and quality assurance staff > to find all of the bugs they DON'T know about. Then, they will have a > reasonable amount of time to fix those bugs before release. It makes > for a much more stable product. Well it took me 30 minutes to find my first repeatable 'core' dumping bug in the v2.0beta when I started playing with it this morning. How stable is that? Mind you, the bug appears to be probably due to a missed variable assignment. I have an idea about where to look for more bugs but I'll probably wait some time before I start looking in earnest, I suppose the challenge is to look for bugs in the final release version :-). eric (who wants a 'I debuged netscape' Tshirt to go with his 'I hacked netscape' Tshirt and his RSA yoyo :-) -- Eric Young | Signature removed since it was generating AARNet: eay at mincom.oz.au | more followups than the message contents :-) From asb at nexor.co.uk Tue Oct 17 02:32:37 1995 From: asb at nexor.co.uk (Andy Brown) Date: Tue, 17 Oct 95 02:32:37 PDT Subject: The NSA Visits Compendium In-Reply-To: Message-ID: On Mon, 16 Oct 1995, Peter Wayner wrote: > [...] > The most interesting thing that he mentioned was thatthe company had to > guarantee that the data would never be encrypted sequentially by two > _different_ algorithms. Apparently double encryption by 40-bit RC-4 was > okay, but using different algorithms was verboten. Very interesting indeed. With RC4 the bulk of the time is in key setup, so if they could do two setups in parallel then the total time to search a double-encrypted 40 bit keyspace would not be that great. I suppose they could even 'weight' the number/power of processors assigned to key setup such that the setup ran as fast as the trial decryptions, then just proportionally increase their number until you get an acceptable search time. I know precious little about parallel processing so this could be idle speculation. Can the same parallelisation be applied to other popular ciphers? - Andy +-------------------------------------------------------------------------+ | Andrew Brown Internet Telephone +44 115 952 0585 | | PGP (2048/9611055D): 69 AA EF 72 80 7A 63 3A C0 1F 9F 66 64 02 4C 88 | +-------------------------------------------------------------------------+ From frissell at panix.com Tue Oct 17 06:13:48 1995 From: frissell at panix.com (Duncan Frissell) Date: Tue, 17 Oct 95 06:13:48 PDT Subject: The NSA Visits Compendium Message-ID: <199510171312.JAA15286@panix.com> At 02:05 PM 10/16/95 -0700, Vladimir Z. Nuri wrote: >a study on this would be very significant. (from what I understand, the NSA >tried to do this with public key crypto, i.e. suppress it at the >publication stage. a professor gave a lecture on this in one of my >classes and said that it was even covered in the NYT at the time. >unfortunately I lost the date. I believe it was a long time ago >(maybe the 80's or even the 70's). hopefully someone else has an >encyclopedic brain. 1977/1978. "A Proposal for a Public Key Encryption System." IEEE meeting. Imprisonment threat by letter. Mathematical Games column in Scientific American. 3,000 copies of paper distributed free by MIT. >unfortunately, whenever someone says, "don't name my company", it loses >effectiveness. I would like to point out that people are directly contributing >to their erosion of rights by this behavior that suggests that they >doing something lawbreaking that they are ashamed of. One should always suggest to investigating authorities that they show a warrant or get lost. "Quo warranto"? It is rarely useful to chat with them. DCF From frissell at panix.com Tue Oct 17 06:17:05 1995 From: frissell at panix.com (Duncan Frissell) Date: Tue, 17 Oct 95 06:17:05 PDT Subject: Weekly MixMaster list Message-ID: <199510171316.JAA15754@panix.com> At , Daniel Miskell wrote: > >What is the MixMaster list, and what is it for? >Apologies on my newbie status. > >Munster Mixmaster is a modern remailer protocol which breaks packets up into standard sizes and shuffles them among active remailers to make traffic analysis impossible. The list lists active mixmaster remailers. DCF From loofbour at cis.ohio-state.edu Tue Oct 17 06:54:28 1995 From: loofbour at cis.ohio-state.edu (Nathan Loofbourrow) Date: Tue, 17 Oct 95 06:54:28 PDT Subject: mental cryptography In-Reply-To: <199510141243.IAA27588@hammond.cis.ohio-state.edu> Message-ID: <199510171354.JAA13063@colon.cis.ohio-state.edu> Scott Brickner writes: > Nathan Loofbourrow writes: > >It may be that the approach is off anyway. Credit cards have only > >signature verification -- if the salesperson bothers -- because stolen > >cards are reported. You don't need a strong authentication technique > >if a stolen card is easy to cancel. > > The card's easy to cancel, but the cash ain't. Credit cards are > cleared with the issuer. Digital cash with smart cards acting as > transaction observers don't need this. The thief need only transfer > the cash from the stolen card to his own, just like he does with > regular cash. Er, um, right. Well, then, perhaps on-line systems need to consider cash revocation in case of theft. Actually, this is a no-brainer: just exchange the cash for some new coin, and the old stuff goes invalid. Admittedly, this means a footrace for the mugger and the victim, so I guess the mugger is encouraged to knock you out cold. Maybe you just shouldn't carry too much cash with you. Gee, that sounds like good advice even without digital protocols. > >Even with a weak PIN system for authentication, you can always provide > >a "duress" PIN, right? > > Sounds like a better choice. Duress PINs liberally sprinkled through the keyspace also drop the efficacy of brute-force PIN search for the thief. nathan From jamesd at echeque.com Tue Oct 17 08:05:25 1995 From: jamesd at echeque.com (James A. Donald) Date: Tue, 17 Oct 95 08:05:25 PDT Subject: java flaw Message-ID: <199510171504.IAA17210@blob.best.net> At 06:59 AM 10/17/95 UTC, jerry the golden retriever wrote: > A security feature in Java scans for viruses before activating the > applet. I hope that this is false. Even if one had genuine artificial intelligence, it would be impossible to detect all viruses, only particular viruses and classes of virus. If Java is secure, virus scanning should be unnecessary, indeed impossible, because there could be no code configuration capable of acting as a virus. If virus scanning occurs, then it is possible to write a virus in Java, then Java is inherently insecure. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From s1018954 at aix2.uottawa.ca Tue Oct 17 08:22:13 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Tue, 17 Oct 95 08:22:13 PDT Subject: mental cryptography In-Reply-To: <199510171354.JAA13063@colon.cis.ohio-state.edu> Message-ID: On Tue, 17 Oct 1995, Nathan Loofbourrow wrote: > Well, then, perhaps on-line systems need to consider cash > revocation in case of theft. Actually, this is a no-brainer: just > exchange the cash for some new coin, and the old stuff goes > invalid. Admittedly, this means a footrace for the mugger and the > victim, so I guess the mugger is encouraged to knock you out cold. (snip) > Duress PINs liberally sprinkled through the keyspace also drop the > efficacy of brute-force PIN search for the thief. > Besides (if you *really* want to be paranoid) you'd still have still have that cash on your hard drive and several other smart cards. Assuming you record which cash you put onto which smartcard onto your database or whatever, you'd exchange the stolen cash with the bank before brute force would succeed. Mugger still gets stuck with a duress code. Either you have an automated paranoia setup that constantly changes your net worth into new currency (rejuvenating your cash against aging by factoring) or yeah, it really is better for the mugger to get rid of you. This also protects against the chinese lottery attacks some people on the list are trying to set up (assuming it really is ubiquitous by then). It really might become a lottery with ecas. Factor PINs (assuming they're small enough) and make real money. This could easily be part of an automated trading program of the kind used by stock brokers. You'd probably use it anyway if the currency market were totally digital (low, if not no transaction fees) to compensate for currency fluctuations. Private currencies might be very volatile. Hell, if any of this succeeds, government currencies would be extremely volatile. Gold might start looking good again. (though platinum's better, almost all the world's platinum's in South Africa and odds are no one's gonna find any new sources. Anyone know if I'm totally wrong? I'm no economist.) (waiting to see if ala.usmc.mil is going to send more bouncemail) From williams at va.arca.com Tue Oct 17 08:24:53 1995 From: williams at va.arca.com (Jeff Williams) Date: Tue, 17 Oct 95 08:24:53 PDT Subject: Security Spectra Message-ID: <1665990655.62370147@va.arca.com> P.J. Ponder writes: > In your recent post to the cypherpunks mailing list you proposed a > taxonomy of security weaknesses and vulnerabilities, adding that these Please watch your attribution. Vlad Nuri proposed this rating scheme. > The whole idea of categorizing or ranking holes and vulnerabilities ab > intitio, outside of their contextual application to a real system is not > very helpful. Systems vary so widely in their criticalities, > sensitivities, costs, etc., that each of your pre-defined categorized > weaknesses would have to be rejudged - in the context of the system being > analyzed - to determine how, and to what extent it could effect the system. I absolutely agree with you on this point. I'll point out again that this is the same problem as creating a rating scheme for the security of *products*. > The standard approach as I understand it is to analyze the system against > all the known vulnerabilities and attempt to measure (maybe only > qualitatively) the risks associated with the vulnerabilities. It is popular these days to jump on the risk assessment bandwagon and forget about assurance. This occurs because people think risk assessment is a quick fix that you can do after the system is built and configured. Some holes cannot be patched. --Jeff Williams From s1018954 at aix2.uottawa.ca Tue Oct 17 08:32:41 1995 From: s1018954 at aix2.uottawa.ca (s1018954 at aix2.uottawa.ca) Date: Tue, 17 Oct 95 08:32:41 PDT Subject: Duress codes In-Reply-To: <199510171354.JAA13063@colon.cis.ohio-state.edu> Message-ID: On Tue, 17 Oct 1995, Nathan Loofbourrow wrote: > Duress PINs liberally sprinkled through the keyspace also drop the > efficacy of brute-force PIN search for the thief. Was there an actual protocol for doing this? (probabilistic maybe?) Don't remember Schneier doing anything beyond just mentionning it. (ok I can't find the page number either, so I can't really complain). From fc at all.net Tue Oct 17 09:15:06 1995 From: fc at all.net (Dr. Frederick B. Cohen) Date: Tue, 17 Oct 95 09:15:06 PDT Subject: java flaw In-Reply-To: <199510171504.IAA17210@blob.best.net> Message-ID: <9510171612.AA25185@all.net> > > At 06:59 AM 10/17/95 UTC, jerry the golden retriever wrote: > > A security feature in Java scans for viruses before activating the > > applet. > > I hope that this is false. > > Even if one had genuine artificial intelligence, it would be impossible > to detect all viruses, only particular viruses and classes of virus. > > If Java is secure, virus scanning should be unnecessary, indeed > impossible, because there could be no code configuration capable > of acting as a virus. > > If virus scanning occurs, then it is possible to write a virus in Java, > then Java is inherently insecure. To be more precise, if there is programming, sharing, and transitive information flow, viruses can reproduce and spread (as proven mathematically in the mid-1980s). Sice Java offers sharing of programs and (for not at least) transitive information flow, viruses are possible. -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 From aleph1 at dfw.net Tue Oct 17 09:43:44 1995 From: aleph1 at dfw.net (Aleph One) Date: Tue, 17 Oct 95 09:43:44 PDT Subject: java flaw In-Reply-To: <199510171504.IAA17210@blob.best.net> Message-ID: Ehh.. Lets just say that that article wsa not the most technicaly acurate. And you are right it does not scan for viruses. Aleph One / aleph1 at dfw.net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01 On Tue, 17 Oct 1995, James A. Donald wrote: > Even if one had genuine artificial intelligence, it would be impossible > to detect all viruses, only particular viruses and classes of virus. > > If Java is secure, virus scanning should be unnecessary, indeed > impossible, because there could be no code configuration capable > of acting as a virus. > > If virus scanning occurs, then it is possible to write a virus in Java, > then Java is inherently insecure. > From jya at pipeline.com Tue Oct 17 09:50:44 1995 From: jya at pipeline.com (John Young) Date: Tue, 17 Oct 95 09:50:44 PDT Subject: NOT_100 Message-ID: <199510171650.MAA26966@pipe1.nyc.pipeline.com> The New Yorker of October 23 reports on the "Supernote," a perfect counterfeit $100-bill allegedly being used for economic terrorism. The Supernote had surfaced around 1990 and originated in the Middle East. It was no ordinary counterfeit. The workmanship was extraordinary. When a sample first arrived at the Secret Service's laboratory, a top technical analyst "examined it the way he has every other counterfeit note in the world, and called it genuine." Most alarming of all, the Supernote was so well engineered that it could fool currency scanners at the nation's twelve Federal Reserve banks. Today, the Supernote remains one of the longest unsolved counterfeiting cases in the modern history of the Secret Service, and it has begun to undermine international confidence in United States currency. The Treasury, taking its cue from the Federal Reserve, has a difficult time regarding counterfeiting, even on a very large scale, as a macroeconomic problem, because cash is a relatively small percentage of the total money supply. Wire transfers, checks, and credit-card transactions, after all, run into the trillions. Counterfeiting becomes significant to the Fed only if it undermines confidence in the dollar. Dozens of interviews with high-level insiders left the impression that the Federal Reserve and the Treasury don't fear the Supernote itself as much as they fear a confidence problem that might result if they publicly acknowledge it and countenance a large-scale investigation. (As one expert on international terrorism who has looked into the Supernote puts it, "If the note is that nearly perfect, it doesn't exist.") NOT_100 (30 kb in 2 parts) From mdiehl at dttus.com Tue Oct 17 10:25:56 1995 From: mdiehl at dttus.com (Martin Diehl) Date: Tue, 17 Oct 95 10:25:56 PDT Subject: Using deterministic programs to select private RSA keys. Message-ID: <9509178139.AA813958011@cc2.dttus.com> norm at netcom.com(Norman Hardy) writes: Much has been said recently here about how to produce truly random primes. [snip] The protocol is to accept a sequence of key strokes for printable ASCII characters. [snip] I suggest that if you capture the time in microseconds between keystrokes and insert the least significant 8 bits between the corresponding characters (i. e. ...