On Mon, Mar 24, 2014 at 03:16:51PM +0100, Christoph Anton Mitterer wrote:
> I just agreed to Ivan's opinion... right now many people say "it's
> better to do crypto, even if it's anonymous and you have no idea who
> you're talking to"... their reason is usually on of
> - the attacker may miss the point where the communication starts and
> therefore the point where he could do an MitM
> - even if the attacker does MitM, he would need more computing power
> (and therefore money) to decrypt everything.

No, the point is that an attacker is detectable.  Do you think the NSA
does MITM attacks on all connections?  I seriously thought that they
might.  So when I traveled from the US to the Netherlands, I took a copy
of the key of my machine in the Netherlands, as seen from my browser in
the US.  I compared that copy when I was in the Netherlands, and it
matched.

If the NSA starts doing this, someone will catch them.  That will be big
news and everyone will start checking their keys.  And if none of them
match, things will be fixed.  As long as they don't do it, checks like
the one I did will confirm that nothing is wrong.

Well, not exactly, of course.  It is still very likely that they are
trying to (and also that they succeeded to) put back doors into the
encryption protocols, or at least their implementations.

> But that's just the point...  When an attacker sits on the line
> between A and B,.. and they don't encrypt... than obviously he can
> read/tamper with everything.

Depending on what you mean by "sitting on the line".  They can always
read, but to tamper they need to sit "in" the line, not just on it.
They have to make sure the original packets don't reach their
destination.  I take it that's what you mean.

(Note that this is a much smaller group of machines; for example, I can
read all traffic on the subnet of my block of houses, but I can't
effectively tamper with it.)

> If the attacker sits on the line between Alice and Bob (which he
> apparently does, since he was able to read the unencrypted stuff)... and
> if Alice and Bob don't verify their identities... then he can to MitM...
> just as you explained it above.

But if they start to doubt, they can check if they have been attacked,
by comparing their keys through an independent channel.  There will have
been a small window where their communication was intercepted, but
that's still much better than having everything always public.

> So I'd say... anonymous encryption does not really help that much...
> at least not against someone who constantly sits on the line and
> watches all traffic (which NSA&friends surely do) It gives rather a
> wrong sense of security.

Anonymous encryption is better than no encryption.  And it gives actual
security.  Certainly against people who are only listening (of which
there are many), and (with a small delay where you might send sensitive
data to the NSA) also against MITM attacks, because some people will
check some keys every now and then.  If any of them is found to be under
attack, more checks will be done; if many of those will fail, all hell
will break loose.

And the NSA is not stupid.  They know this.  So they aren't going to
try.  Instead, they are claiming that "it doesn't really help anything"
and "it only gives a false sense of security", to convince people that
not encrypting is better than encrypting with unchecked keys.  Sure they
like it when the entire internet is unencrypted, it makes their work
easier.  It does not however provide any benefit to us or our users.

> > A certificate authority does not provide the encryption keys.  It only
> > puts signatures on them.  Without any CA, you can still encrypt if you
> > have the target's public key.
> Well sure.. but what do you want to tell us? Of course you can.. but
> nobody usually manually trusts X.509 certs (i.e. non-CA-certs)

You're claiming that having an evil CA in the list means that my
communication is in danger of being eavesdropped.  I'm saying that this
is nonsense, because:

> > An evil CA cannot read your traffic (unless they are in
> > the path of your communication).

You are saying that the NSA has control over evil CAs, and also is in
the path of communication.  So they can eavesdrop.  Technically this is
true.  But there are two things to consider:

1. Due to the fact that they would be detected if they tried this on a
   large scale, they won't actually do this.
2. Your conclusion that because the NSA can eavesdrop, we should allow
   everyone else too (by not encrypting at all) is beyond ridiculous.

Thanks,
Bas

Attachment: signature.asc
Description: Digital signature

Reply via email to