what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

crypto-gram-0009.txt

crypto-gram-0009.txt
Posted Sep 16, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for August 15, 2000. In this issue: Full Disclosure and the Window of Exposure, News, Carnivore Disinformation, FBI Requires Constitutional Changes, The Doghouse: FaceMail, PGP Vulnerability, and Comments from Readers.

tags | cryptography, magazine
SHA-256 | 0e4cbb003e4a2c2f2d719a1a3c31cb1025f8835a3832f59fa40e8e4a5db45de0

crypto-gram-0009.txt

Change Mirror Download
                  CRYPTO-GRAM

September 15, 2000

by Bruce Schneier
Founder and CTO
Counterpane Internet Security, Inc.
schneier@counterpane.com
<http://www.counterpane.com>


A free monthly newsletter providing summaries, analyses, insights, and
commentaries on computer security and cryptography.

Back issues are available at <http://www.counterpane.com>. To subscribe or
unsubscribe, see below.


Copyright (c) 2000 by Counterpane Internet Security, Inc.


** *** ***** ******* *********** *************

In this issue:
Full Disclosure and the Window of Exposure
_Secrets and Lies_ News
Crypto-Gram Reprints
News
Counterpane Internet Security News
Carnivore Disinformation
FBI Requires Constitutional Changes
The Doghouse: FaceMail
PGP Vulnerability
Comments from Readers


** *** ***** ******* *********** *************

Full Disclosure and the Window of Exposure



To read this essay with the nifty graphs, see:
<http://www.counterpane.com/crypto-gram-0009.html#1>


Every season yields a bumper crop of computer security stories: break-ins,
new vulnerabilities, new products. But this season has also given us a
crop of stories about computer security philosophy. There has been a
resurgence in opposition to the full disclosure movement: the theory that
states that publishing vulnerabilities is the best way to fix them. In
response, defenders of the movement have published their rebuttals. And
even more experts have weighed in with opinions on the DeCSS case, where a
New York judge ruled that distributing an attack tool is illegal.

What's interesting is that everybody wants the same thing; they're just
disagreeing about the best way to get there.

When a security vulnerability exists in a product, it creates what I call a
window of exposure. This window exists until the vulnerability is patched,
and that patch is installed. The shape of this window depends on how many
people can exploit this vulnerability, and how fast it is patched. What
everyone wants is to make this window as small as possible.

A window of exposure has five distinct phases. Phase 1 is before the
vulnerability is discovered. The vulnerability exists, but no one can
exploit it. Phase 2 is after the vulnerability is discovered, but before
it is announced. At that point only a few people know about the
vulnerability, but no one knows to defend against it. Depending on who
knows what, this could either be an enormous risk or no risk at
all. During this phase, news about the vulnerability spreads -- either
slowly, quickly, or not at all -- depending on who discovered the
vulnerability. Of course, multiple people can make the same discovery at
different times, so this can get very complicated.

Phase 3 is after the vulnerability is announced. Maybe the announcement is
made by the person who discovered the vulnerability in Phase 2, or maybe it
is made by someone else who independently discovered the vulnerability
later. At that point more people learn about the vulnerability, and the
risk increases. In Phase 4, an automatic attack tool to exploit the
vulnerability is published. Now the number of people who can exploit the
vulnerability grows exponentially. Finally, the vendor issues a patch that
closes the vulnerability, starting Phase 5. As people install the patch
and re-secure their systems, the risk of exploit shrinks. Some people
never install the patch, so there is always some risk. But it decays over
time as systems are naturally upgraded.

In some instances the phases are long, and sometimes they're
short. Sometimes Phase 5 happens so fast that Phases 3 and 4 never
occur. Sometimes Phase 5 never occurs, either because the vendor doesn't
care or no fix is possible. But this is basically the way things work.

The goal of any responsible security professional is to reduce the window
of exposure -- the area under the curve -- as much as possible. There are
two basic approaches to this.

The first is to reduce the window in the space dimension by limiting the
amount of vulnerability information available to the public. The idea is
that the less attackers know about attack methodologies, and the harder it
is for them to get their hands on attack tools, the safer networks
become. The extreme position in this camp holds that attack tools should
be made illegal.

This might work in theory, but unfortunately it is impossible to enforce in
practice. There is a continuous stream of research in security
vulnerabilities, and most of this research results in public
announcements. Hackers write new attack exploits all the time, and the
exploits quickly end up in the hands of malicious attackers. Any one
country could make some of these actions illegal, but it would make little
difference on the international Internet. There have been some isolated
incidences of a researcher deliberately not publishing a vulnerability he
discovered, but public dissemination of vulnerability information is the
norm...because it is the best way to improve security.

The second approach is to reduce the window of exposure in time. Since a
window remains open until the vendor patches the vulnerability and the
network administrator installs the patches, the faster the vendor can issue
the patch the faster the window starts closing. To spur the vendors to
patch faster, full-disclosure proponents publish vulnerabilities far and
wide. Ideally, the vendor will distribute the patch before any automatic
attack tools are written. But writing such tools can only hasten the patches.

This also works a lot better in theory than in practice. There are many
instances of security-conscious vendors publishing patches in a timely
fashion. But there are just as many examples of security vendors ignoring
problems, and of network administrators not bothering to install existing
patches. A series of credit card thefts in early 2000 was facilitated by a
vulnerability in Microsoft IIS that was discovered, and a patch released
for, a year and a half earlier.

The problem is that for the most part, the size and shape of the window of
exposure is not under the control of any central authority. Not publishing
a vulnerability is no guarantee that someone else won't publish
it. Publishing a vulnerability is no guarantee that someone else won't
write an exploit tool, and no guarantee that the vendor will fix
it. Releasing a patch is no guarantee that a network administrator will
actually install it. Trying to impose rules on such a chaotic system just
doesn't work.

And to make matters worse, it's never one single vulnerability. There are
dozens and hundreds of vulnerabilities, all with overlapping windows. One
vulnerability might be shrinking while another ten are growing. We're like
the little Dutch boy, plugging leaks in the dike with our fingers while
others spring up nearby. It doesn't matter if we believe that full
disclosure is the best way to reduce the window's size or if quietly
alerting the vendor does better...we're going to lose the war fighting it
either way.

Vulnerabilities are inevitable. As our networks get more complex and more
pervasive, the vulnerabilities will become more frequent, not less. We're
already seeing this; every year brings more security holes than the
previous one. The only way to close the window of exposure is to make it
not matter. And the only way to do that is to build security systems that
are resilient to vulnerabilities.

In _Secrets and Lies_, I talk about security processes that make systems
resilient to vulnerabilities. The most relevant one to this debate is
detection and response. Most computer-security products are sold as
prophylactics: firewalls prevent network intrusions, PKI prevents
impersonation, encryption prevents eavesdropping, etc. The problem with
this model is that the product can either succeed or fail: either the
window of exposure is closed or it is open. Good security includes not
only protection, but also detection and response. An Internet alarm system
that detects attacks in progress, regardless of the vulnerability that was
exploited, has the ability to close the window of exposure completely.

The key to Internet detection and response is vigilance. Attacks can
happen at all times of the day and night, and any day of the year. New
attack tools appear all the time; new vulnerabilities become public all the
time. I built Counterpane Internet Security, Inc. as a managed security
monitoring company because I saw this as the only way to bring security to
computer networks. Without outsourced detection and monitoring, we're at
the mercy of all the hackers and product vendors and security professionals.

Those advocating secrecy are right that full disclosure causes damage, in
some cases more damage than good. They are also right that those who build
attack tools should be held liable for their actions; the defense of "I
just built the bomb; I didn't place it or set the fuse" rings hollow. But
they are wrong to think they can enforce secrecy. Information naturally
disseminates, and strategies that go against that are doomed. Those
advocating full disclosure are right that rapid dissemination of the
information benefits everyone, even though some people make ill use of that
information. We would be in a much worse position today if vulnerability
information were only in the hands of a privileged few.

Neither full disclosure nor secrecy "solve" computer security; the debate
has no solution because there is no one solution. Both sides are missing
the point. The real issue, how to close the window of exposure, is more
subtle. We have to stop thinking of software security as an end state,
that fixing the bugs will somehow make the software perfect. Security
vulnerabilities are inevitable and there will always be a window of
exposure; smart security solutions will work regardless.

Marcus Ranum started this debate at BlackHat. A transcript of his talk
isn't available on-line, but these two essays are:
<http://pubweb.nfr.net/~mjr/usenix/ranum_5.pdf>
<http://pubweb.nfr.net/~mjr/usenix/ranum_elx_cocktail.pdf>

Weld Pond's rebuttal:
<http://www.zdnet.com/zdnn/stories/comment/0,5859,2615973,00.html>

Stuart McClure and Joel Scambray's rebuttal:
<http://www.infoworld.com/articles/op/xml/00/08/14/000814opswatch.xml>

Another view:
<http://news.cnet.com/news/0-1005-200-2634067.html>

News article:
<http://www.zdnet.com/zdnn/stories/news/0,4586,2608077,00.html>

My older writings on this topic:
<http://www.counterpane.com/crypto-gram-0001.html#KeyFindingAttacksandPublic
ityAttacks>
<http://www.counterpane.com/crypto-gram-0002.html#PublicizingVulnerabilities>


** *** ***** ******* *********** *************

_Secrets and Lies_ News



_Secrets and Lies_ is officially published. This means that you can walk
into a bookstore and buy it. Last month, when I announced the book, it was
printed and in the Wiley warehouse but not in bookstores.

Initial feedback has been great. There are already reviews on the
Amazon.com Web site. The Economist published a review of the book, as did
Business Week, Industry Standard, New Scientist, and Salon. Other reviews
are coming in the next few weeks.

Here's the publishing information:
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
John Wiley & Sons, 2000
ISBN: 0-471-25311-1
$29.99

Book Web site:
<http://www.counterpane.com/sandl.html>

See the Table of Contents:
<http://www.counterpane.com/sandlcont.html>
Read the Preface:
<http://www.counterpane.com/sandlpref.html>
Amazon.com has posted Chapter 3:
<http://www.amazon.com/exec/obidos/ts/book-excerpt/0471253111>

Buy the book here:
<http://www.amazon.com/exec/obidos/ASIN/0471253111/counterpane/>

Reviews:
<http://www.salon.com/tech/review/2000/08/31/schneier/index.html>
<http://www.businessweek.com/2000/00_38/b3699176.htm>
<http://www.thestandard.com/subject/book/display/0,4294,182,00.html>
All reviews:
<http://www.counterpane.com/sandlrev.html>

Bruce Schneier is planning a book tour for October. Planned locations
include San Francisco, San Jose, Seattle, Portland, New York, Boston, and
Washington, DC. Tour dates and locations can be found here:
<http://www.counterpane.com/sandltour.html>


** *** ***** ******* *********** *************

Crypto-Gram Reprints



Open-source and security:
<http://www.counterpane.com/crypto-gram-9909.html#OpenSourceandSecurity>

Factoring a 512-bit number:
<http://www.counterpane.com/crypto-gram-9909.html#Factoringa512-bitNumber>


** *** ***** ******* *********** *************

News



Another massive net attack coming?
http://www.zdnet.com/zdnn/stories/news/0,4586,2614854,00.html

Analytic Thinking and Presentation for Intelligence Producers, Analysis
Training Handbook. By the CIA's Office of Training and Education.
<http://216.167.120.50/cia-ath-pt1.htm>

How one bank survived a security audit: In an effort to identify potential
security risks, a bank shares its experiences of having its systems
scrutinized.
<http://www.eweek.com/a/pcwt0008141/2613074/>

Software Risk Management Conference:
<http://www.isacc.com/>

Why Microsoft doesn't have to improve security.
<http://news.cnet.com/news/0-1005-200-2528362.html>

Cheaper technologies than PKI:
<http://www.zdnet.com/eweek/stories/general/0,11011,2617314,00.html>
There's a lot of snake-oil in this article, but some of the ideas are good.

A good article on the difficulty of normal people actually using security
technology.
<http://www.zdnet.com/eweek/stories/general/0,11011,2617318,00.html>

Hacking insurance (a good article).
<http://www.computerworld.com/cwi/story/0,1199,NAV47_STO48721,00.html>

An excellent analysis of the DeCSS decision by Emmanuel Goldstein. Worth
reading.
<http://www.2600.com/news/2000/0821.html>

Now that CSS is broken, the DVD manufacturers have another dumb idea:
watermarking.
<http://www.wired.com/news/technology/0,1282,38279,00.html>

Internet bank robbery:
<http://www.independent.co.uk/news/Digital/Update/2000-08/first230800.shtml>
The bank is claiming that no money was stolen, and the truth seems very
mundane.
<http://www.theregister.co.uk/content/1/12822.html>
And the culprits have been apprehended.
<http://www.zdnet.com/zdnn/stories/news/0,4586,2618631,00.html?chkpt=zdhpnew
s01>

Two good articles on encryption algorithms, the first on DES and the second
on AES.
<http://www.ams.org/notices/200003/fea-landau.pdf>
<http://www.ams.org/notices/200004/fea-landau.pdf>

It's over six months since last February's massive distributed
denial-of-service attacks. One survey found over 100,000 computers still
vulnerable. What does it take to get through to some people?
<http://www.internetnews.com/bus-news/article/0,2171,3_436031,00.html>

New trend: breaking into networks and extorting money out of the owners:
<http://www.businessweek.com/bwdaily/dnflash/aug2000/nf20000822_308.htm>

New computer virus (similar to the Love Bug, but with a much nastier
payload) targets children:
<http://www.wired.com/news/technology/0,1282,38412,00.html>
<http://vnunet.com/News/1109520>

The safety of open source operating systems:
<http://securityportal.com/topnews/opensourcesafe20000825.html>

TRUSTe violating its own security policy? Weren't they the ones who told
us that self-regulation would work?
<http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49059,00.html>
<http://www.cnn.com/2000/TECH/computing/08/24/online.privacy.ap/index.html>

JAVA emulators of WWII crypto devices: Purple, Sigaba, Enigma, Russian
Espionage Cipher, and a public domain Bombe. Good descriptions, too.
<http://dev.thinkquest.org/C004911/>

First malware for the Palm Pilot (a Trojan horse):
<http://www.zdnet.com/zdhelp/stories/main/0,5594,2621711,00.html>
And a response from anti-virus companies:
<http://news.cnet.com/news/0-1006-200-2720432.html?tag=st.ne.1002.tgif.ni>

Password crackers: This site lists all sorts of password crackers that run
dictionary attacks against a variety of encryption products. My own
Password Safe is on the list; there's a password cracker for that,
too. The moral is not to choose a guessable password, and that more and
more passwords become guessable every year.
<http://members.aol.com/jpeschel/crack.htm#ktools>

Schneier and security:
<http://www.zdnet.com/enterprise/stories/main/0,10228,2615692,00.html>

In a bizarre twist, @Stake (a company filled with hackers) refuses to hire
someone because he's a reformed (but once convicted) hacker. I understand
the reluctance to hire criminals, but it seems hypocritical to make a
hiring decision based on whether someone was caught hacking ten years ago
or whether he got away with it.
<http://www.securityfocus.com/news/79>

A good essay on the risks of Carnivore:
<http://www.crypto.com/papers/carnivore-risks.html>

A Thai company has developed a security robot that can shoot
criminals. According to the company: "It is armed with a pistol that can
be programmed to shoot automatically or wait for a fire order delivered
with a password from anywhere through the Internet."
<http://catless.ncl.ac.uk/Risks/21.02.html#subj8>
<http://news.bbc.co.uk/hi/english/sci/tech/newsid_904000/904619.stm>
Words fail me on this one.

More web bugs. Someone can add a web bug to a Microsoft Word document and
track who opens it. Nasty side effect of being online all the time.
<http://www.privacyfoundation.org/advisories/advWordBugs.html>
A demonstration bugged document:
<http://www.privacycenter.du.edu/demos/bugged.doc>
News articles:
<http://news.cnet.com/news/0-1005-200-2652562.html>
<http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49331,00.html>
<http://www.wired.com/news/technology/0,1282,38516,00.html>

Microsoft's response to the web bugs is pretty weird. They make a big deal
about cookies, not web bugs. It's sort of like they missed the point
completely.
<http://www.microsoft.com/technet/security/cookie.asp>

RSA Inc. executes a clever publicity move. Many events and parties are
planned to commemorate the expiration of the RSA algorithm patent on 20
September 2000. So what does RSA Inc. do? They put the algorithm in the
public domain two weeks early and pre-empt the publicity. Meaningless, but
pretty clever.
<http://www.rsasecurity.com/news/pr/000906-1.html>
<http://www.zdnet.com/zdnn/stories/news/0,4586,2624678,00.html>

DDOS tools get even easier to use:
<http://www.nwfusion.com/news/2000/0906ddos.html>

Another Microsoft bug (this one in NetBIOS). This one affects Windows 95,
98, NT, and 2000. The really odd piece of this story is that Microsoft
doesn't plan on releasing a patch for this one.)
<http://www.pgp.com/research/covert/advisories/045.asp>

Global tracking and MSN GUID. Nasty privacy violation.
<http://www.pc-help.org/privacy/ms_guid.htm>

Internet Explorer persistence. Yet another Microsoft security problem:
<http://news.cnet.com/news/0-1005-200-2751843.html>

Amazon.com leaks customer e-mail addresses:
<http://computerworld.com/cwi/story/0,1199,NAV47_STO49648,00.html>

The Secure Digital Music Initiative is having a hacking contest to see
which of their content protection schemes are better. I've already written
about why hacking contests make no sense, and don't do anything to show
which scheme is better. I've also already written about why the whole
concept of content protection is flawed, and that it doesn't matter how
good the scheme is.
<http://www.hacksdmi.org/>

Self-propagating security patch...in rabbits!
<http://www.newscientist.com/news/news.jsp?id=ns225354>

The story of the stolen Bletchley Park Enigma machine gets wierder:
<http://www.guardianunlimited.co.uk/Archive/Article/0,4273,4063014,00.html>
<http://www.thetimes.co.uk/news/pages/tim/2000/09/13/timnwsnws02044.html>

The European Telecommunication Standards Institute (ETSI) has made a bunch
of encryption algorithms public:
<http://www.etsi.org/dvbandca/>

A just-released GAO report gives the government bad marks when it comes to
security. Collectively, the agencies averaged D-, with more than a quarter
of them flunking, and only two out of twenty-four agencies getting better
than a C rating.
<http://washingtonpost.com/wp-dyn/articles/A52756-2000Sep11.html>
<http://www.foxnews.com/national/091100/govsecurity.sml>
<http://www.cnn.com/2000/TECH/computing/09/11/security.report/index.html>


** *** ***** ******* *********** *************

Counterpane Internet Security News



Bruce Schneier is speaking at the eCFO Conference in Atlanta, on 19 September.
<http://www.e-cfoexpo.com/>

Bruce Schneier is speaking at the E-Business Security Summit in Chicago, on
4 October.
<http://www.aliconferences.com/conferences/bsecurity_oct2k.htm>


** *** ***** ******* *********** *************

Carnivore Disinformation



This bit, from Newsweek's Periscope, sounds very much like government
propaganda:

Tracking bin Laden's E-Mail

American counter-terrorism experts are aghast that the FBI has gone public
with Carnivore, its new Internet-wiretap system. The reason for their
dismay: Osama bin Laden uses e-mail to communicate with his terrorist
network. The intelligence community's ability to track his messages has
been, according to one intelligence source, "the biggest single factor in
shutting down several planned operations," including some in the United
States. "Bin Laden thought his communications were secure," says the
source. "They weren't. Now we've told him."

FBI officials acknowledge that Carnivore has been used about 25 times,
primarily in terrorism investigations. But they decline to comment on its
use against bin Laden. "Everyone knows we can wiretap phones," says a
bureau spokesman. "There's no reason why an ability to intercept e-mails
must necessarily be covert."


** *** ***** ******* *********** *************

FBI Requires Constitutional Changes



It's hard to know what to think of this:

"One of the FBI requirements for the Internet kiosks at the 2002 Olympics
is that the FBI be able to record all passwords, copy all sent email, and
divert sent email for administrative decisions on whether it should be
delivered."

If it is true, it is the most intrusive power grab we've seen so
far. Would there even be warning notices on the kiosks? Would they demand
eavesdropping rights on all direct computer hookups as well? The mind boggles.

<http://www.pbs.org/cringely/pulpit/pulpit20000803.html>


** *** ***** ******* *********** *************

The Doghouse: FaceMail



FaceMail uses your "personal biometric facial template" to encrypt and
decrypt emails. They don't say what happens if someone else steals your
key or if you have surgery.

Zero technical details can be found at:
<http://www.identalink.de/>


** *** ***** ******* *********** *************

PGP Vulnerability



A very serious PGP vulnerability was just discovered. Using this
vulnerability, an attacker can create a modified version of someone's
public key that will force a sender to encrypt messages to that person AND
to the attacker.

Let me explain.

Starting with PGP version 5.5, the software supported something called an
Additional Decryption Key (ADK). Normally, when a PGP user creates a PGP
certificate, it contains a single public key (as well as identifying
information as to who the key belongs to). PGP version 5.5 and 6.x allow
the user to add additional ADKs to the certificate. When a sender encrypts
a message to that user, PGP will automatically encrypt the message in both
the user's public key and the ADK. The idea is that the ADK belongs to the
secret police, or the user's employer, or some organization, and that
organization can intercept the encrypted message and read it.

(On Slashdot I said that Network Associates did this when they joined the
Key Recovery Alliance, but PGP Inc. added the feature before then. They
needed it to get certain corporate contracts.)

The flaw is that some version of PGP don't require the ADKs to be in the
signed portion of the PGP certificate. What this means is that an
organization can take a PGP certificate, append his ADK, and spread it out
to the world. This tampered version of the certificate will remain
unnoticed by anyone who doesn't manually examine the bytes, and anyone
using that tampered version will automatically and invisibly encrypt all
messages to the organization as well as the certificate owner.

Colleague Greg Guerin likened the lesson of this vulnerability to something
he learned in kindergarten: "Don't put something in your mouth unless you
know where it's been."

The reaction from Network Associates has been pretty good: they fixed the
problem. Unfortunately, the president of the PGP Security unit
demonstrated a high degree of cluelessness when he said: "This a fairly
esoteric attack. It's not likely that anybody without specialized
knowledge could use it." Certainly it is an esoteric attack but, as we all
know, that person with specialized knowledge could easily encapsulate the
attack in a point-and-click program that any script kiddie could use.

On the plus side, it doesn't seem like anyone took advantage of this
vulnerability. Network Associates inspected all 1.2 million PGP keys on
its keyserver, and found none of them were tampered with in this way.

Way back in 1997 a bunch of us cryptographers predicted that adding key
escrow would make system design harder, and would result in even more
security problems. This is an example of that prediction coming true.

Research paper on the vulnerability:
<http://senderek.de/security/key-experiments.html>

CERT Advisory:
<http://www.cert.org/advisories/CA-2000-18.html>

Slashdot article:
<http://slashdot.org/articles/00/08/24/155214.shtml>

News reports:
<http://www.thestandard.com/article/display/0,1151,17978,00.html>

Nice summary article:
<http://www.digitalmass.com/columns/software/0828.html>

Network Associates reaction:
<http://www.pgp.com/other/advisories/adk.asp>

1997 Risks of Key Escrow Paper:
<http://www.counterpane.com/key-escrow.html>


** *** ***** ******* *********** *************

Comments from Readers



From: Brian Taylor
Subject: PGP Vulnerability and the DMCA

I have copyrighted works protected with PGP. I did not consent to the TPM
I use being circumvented. Bruce's description of this vulnerability is
clearly a circumvention technology that will be used to pirate my work and
is thereby illegal under the DMCA.

I'm going to file a lawsuit against Bruce and Slashdot and anyone who links
to Slashdot and anyone who reads the article and anyone who points at or
otherwise refers to a person who reads the article. In fact, Bruce himself
is circumvention technology, so I'm suing his parents, too, along with the
major airlines, both of which have distributed Bruce.


From: Aleph One <aleph1@underground.org>
Subject: Firewalls and tunnelling protocols

Firewalls were never meant to stop covert channels.

While it's all too true that current firewalls performs a rather lacking
job at verifying that a protocol they are forwarding meets its
specification, and you could certainly be creative and attempt to find ways
to detect and stop covert channels, as long as the firewalls allows some
traffic through, any traffic, a covert channel will be possible.

So the real problems are in your expectation of a firewalls capabilities,
something all too common, and in vendors exploiting overly generic and
complex protocols to bypass what they see as nothing more that an annoyance
to the ease of use and deployment of their application.


From: "Scott Tousley" <stousley@genuity.net>
Subject: SANS

I think you let SANS wriggle off the hook in your article from two weeks
ago, and I think their fingerprints from the MSNBC article runs the same
direction. While I'm not convinced that Genuity, UUNet, AT&T, C&W, Sprint,
PSINet and others are doing all that our business motivation demand, I also
do not think that the answer is found in a loose confederation of SANS,
CERT CC, OMB/FEDCIRC, and WH/NSC/CIAO staff designing private-sector
requirements. SANS now and CERT CC in the past have contributed to some
good work for network security, but I do not think this means they should
take an operational role and drive the private sector on behalf of the
government. The SANS stumbling over the Microsoft problem is a reflection
of this inappropriate role.


From: "Gary Hinson" <gary.hinson@cccl.net>
Subject: SANS

I completely agree with your editorial about the SANS news flash thing. It
has done their credibility no good at all, which is such a shame because
(until then) I had been very impressed with the SANS services and their
(usually) tempered tone. It seems quite out of character, in fact I
wondered if someone had hacked the SANS emailer and sent out a spoof! The
'virus to catch a virus' was really over the top!


From: "Mikolaj J. Habryn" <dichro-mail-2d77bd17@rcpt.to>
Subject: Bluetooth

If you visit www.bluetooth.com, you will find that the full specifications
(1400 pages long and amusingly captioned 'Wireless Connections Made Easy')
are available and include information on link encryption and key generation
and exchange mechanisms.

The specifications do explicitly leave some security issues up to the
applications to deal with. If the security of something is terribly
important to you, you will need to provide heftier application level
security mechanisms than Bluetooth provides, *and* ensure that the hardware
platform that you are running on has the computational resources required
to service the application. Remember that Bluetooth is, to some degree, a
lowest common denominator.


From: Lasse Leskelä <lasse.leskela@iki.fi>
Subject: a paper on Bluetooth security

There is a paper about Bluetooth security at:
<http://www.hut.fi/~mhermeli/julkaisut/icisc99s.ps.gz>


From: "Reynolds,Martin" <martin.reynolds@gartner.com>
Subj: Bluetooth Security

The Bluetooth security system is well documented in the Bluetooth specs.

Hold tight for this one: it exchanges secret keys using SAFER+. No, this
is not my error. They are serious. You are supposed to use sideband
information -- a PIN or a serial number -- to enhance the key that you must
exchange to use SAFER+ in the first place. The only "good" news is that
the keys are persistent and the devices only need to do this on first
introduction.

In a cellphone (the cellphone guys wrote the spec) there is a smart card to
help this process along.

Worse, there is no security requirement.

Bottom line: it could be worse but, in most hands, Bluetooth security is
going to be a mess.


From: John Savard <jsavard@ecn.ab.ca>
Subject: M-134-A

Take my word for it: the Friedman patent issued last month is definitely
the M-134-A, and not the M-229. This is indicated unambiguously in the
abstract of the patent, and in the wording of claim 6, but I'll admit it is
hard even to read the claims.

The diagram on page 1 (shown enlarged on page 2) also makes it clear that
the keyboard is connected through the rotors to a lamp-board in
conventional Hebern (or Enigma) fashion, but the 5-level signal goes to the
5 rotors individually.

Starting near the bottom of page 4, the first text page of the patent, we read:

"Now, in all cryptographs based upon the use of rotatable cipher wheels of
the type referred to above, and arranged as indicated, means are embodied
within the cryptograph for automatically changing the rotatory portions of
the cipher wheels during the course of enciphering or deciphering a
message; these means are always of such a nature as to make these changes
of a definite and predetermined character...."

"The basic feature of my invention of this predictable factor and the
provision of a mechanism for displacing the cipher wheels in an entirely
irregular, aperiodic manner. This is accomplished by means of the
wheel-stepping mechanisms shown as at 4, and operated in the present
embodiment by individual magnets which are controlled by the single tape
transmitter 5..."

(Incidentally, all information in the following is based on openly
published sources, including, admittedly, material released in the National
Archives, and hence may be freely used and disseminated. I have not at any
time had exposure to any information covered by security restrictions of a
military or intelligence nature by the government of the United States or
any other country.)

The distinguishing feature of the M-134-A is that it took the bits of a
paper tape as input, and used that input to control the movement of rotors,
and these rotors then encrypted a character in the basic fashion of a
Hebern machine. This is mentioned explicitly in the patent.

The M-229 and M-228, for different purposes, did exactly the reverse of
this. Rotors moved (still with the use of an electrical circuit)
conventionally, in the way usually produced by gears, but the rotors were
wired to a fixed set of live inputs to produce what were essentially binary
bits as output.

In the M-228, these bits were XORed with a teleprinter character, and in
the M-229 they were used to control rotor movement in an M-134 (the M-134,
M-134-A, and M-134-T2 were essentially the same machine; the M-134-T1 was
the subject of a patent granted on January 28, 1936 (U.S. patent 2,028,772,
as referenced in a Cryptologia article on Friedman's patents). And, of
course, the M-134-C is one U.S. Army designation for the famous ECM Mark
II, or SIGABA.

It should be clear, from the quotes given from the patent, why I am
definite about this being the M-134, since the patent clearly refers to the
distinguishing feature of that machine: paper tape as input, a permutation
of the alphabet as output.


From: Lance Urbas <lurbas@authentica.com>
Subject: Re: Authentica in the Dog House

Authentica recognizes that a Frequently Asked Question (FAQ) on its Web
site, which correlated the strength of encryption with the security of our
products, was misleading. This FAQ has been removed and we thank Mr.
Schneier for pointing this out as well as apologize for using his name
without his permission. We recognize that no security products are
unbreakable and protecting information after it's been delivered to another
user's computer is not foolproof. However, our goal is not to ensure
"absolute" security, but to provide organizations with tools that better
manage the risk in sharing digital information.


** *** ***** ******* *********** *************

CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on computer security and cryptography.

To subscribe, visit <http://www.counterpane.com/crypto-gram.html> or send a
blank message to crypto-gram-subscribe@chaparraltree.com. To unsubscribe,
visit <http://www.counterpane.com/unsubform.html>. Back issues are
available on <http://www.counterpane.com>.

Please feel free to forward CRYPTO-GRAM to colleagues and friends who will
find it valuable. Permission is granted to reprint CRYPTO-GRAM, as long as
it is reprinted in its entirety.

CRYPTO-GRAM is written by Bruce Schneier. Schneier is founder and CTO of
Counterpane Internet Security Inc., the author of "Applied Cryptography,"
and an inventor of the Blowfish, Twofish, and Yarrow algorithms. He served
on the board of the International Association for Cryptologic Research,
EPIC, and VTW. He is a frequent writer and lecturer on computer security
and cryptography.

Counterpane Internet Security, Inc. is a venture-funded company bringing
innovative managed security solutions to the enterprise.

<http://www.counterpane.com/>

Copyright (c) 2000 by Counterpane Internet Security, Inc.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close