Secure phone

John Deters jad at dsddhc.com
Wed Oct 8 11:34:10 PDT 1997



At 12:44 PM 10/7/97 -0700, Eric Blossom you wrote:
>I wrote:
>> Therefore, man-in-the-middle can be more precisely described as an
>> unauthenticated end-point problem.  Therefore, without authentication,
>> there is no defense (yet) against MITM attacks.
>
>I concur from the theoretical point of view.

Really, that's the only point I was attacking.  I agree that from a
practical standpoint that you probably would be able to detect a fake voice
today.

However, a weakness is a weakness, and from a practical standpoint, digital
audio technology is not getting worse as time goes on.  The phone phreaker
world has a blue box (available on the net and called bluebox, I think)
that uses the sound card to generate tones to fool phone systems into
giving them free long distance.  It also will use a recorded human voice to
"read" credit card numbers and phone numbers to a telephone operator.
While it's not perfect, it does manage to get inflection and tone properly
across.  The imperfections are ostensibly covered up by the omnipresent
telephone network noise (from which your box does not suffer.)  

It would not take an enormous amount of recorded conversation to have
enough samples to extract the complete set of hex digits from any given
speaker.  But, it would take an enormous amount of chutzpah for a MITM to
try it.

It would be easy enough to "trick" the MITM into exposing their existance
anyway, just by using digits that come up in conversation.  Humans would be
able to come up with unique situations that the MITM would find all but
impossible to predict.  "Hey, Eric, I noticed that the third digit of your
IP address' second octet is the same as the second digit of our exchange.
How's by you?"  A sudden dropout of sound (or "accidental" loss of
connection) while the MITM recognizes the trap and tries to backpedal will
be instantly noticed.  Human protocols are resilient, whereas mathematical
protocols are precise.

Having a working theory behind securing the exchange (whether or not you
implement it) makes for a nice mind exercise, anyway.  Your working boxes
are a far cry above any theory we discuss here.  If I had one of your nifty
boxes, I'm sure I wouldn't lose sleep over the theoretical holes.

John
--
J. Deters "Don't think of Windows programs as spaghetti code.  Think
          of them as 'Long sticky pasta objects in OLE sauce'."
+--------------------------------------------------------------------+
| NET:   mailto:jad at dsddhc.com (work)   mailto:jad at pclink.com (home) |
| PSTN:  1 612 375 3116 (work)          1 612 894 8507 (home)        |
| ICBM:  44^58'36"N by 93^16'27"W Elev. ~=290m (work)                |
| For my public key, send mail with the exact subject line of:       |
| Subject: get pgp key                                               |
+--------------------------------------------------------------------+







More information about the cypherpunks-legacy mailing list