Bug#494043: ITP: ozymandns -- An experimental DNS server and miscellaneous DNS tools

2008-08-06 Thread Jacob Appelbaum
Package: wnpp
Severity: wishlist
Owner: Jacob Appelbaum <[EMAIL PROTECTED]>


* Package name: ozymandns
  Version : 0.0.1
  Upstream Author : Dan Kaminsky <[EMAIL PROTECTED]>
* URL : http://www.doxpara.com/ozymandns_src_0.1.tgz
* License : (Currently consulting with upstream for explicit
* license)
  Programming Lang: (C, Perl)
  Description : An experimental DNS server and miscellaneous DNS tools

OzymanDNS is a suite of tools for experimenting with DNS. It includes a
number of tools:

aska.pl - DNS File/Stream Sender
geta.pl - DNS File/Stream Receiver
nomde.pl - Experimental DNS Server
droute.pl - Reliable DNS Transport for standard input/output
glance.c - Represents IP addresses as dates

More information about all of these tools can be found in Dan's Black
Ops DNS 2004 CCC Congress slides:
http://www.ccc.de/congress/2004/fahrplan/files/297-black-ops-of-dns-slides.pdf

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Bug#494043: ITP: ozymandns -- An experimental DNS server and miscellaneous DNS tools

2008-08-06 Thread Jacob Appelbaum
Clint Adams wrote:
> On Thu, Aug 07, 2008 at 12:48:20AM +0200, Lucas Nussbaum wrote:
>> Confirmed. And it hasn't been fixed.
> 
> That's why I run it in a while loop and find it to be reasonable
> functional that way.
> 
> 

I've done just that in a screen session and I've found it to be quite
useful. Screen is probably a bit heavy for the package to depend on. It
is relatively usable in my use cases.

Best,
Jacob


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Bug#494043: ITP: ozymandns -- An experimental DNS server and miscellaneous DNS tools

2008-08-06 Thread Jacob Appelbaum
Lucas Nussbaum wrote:
> On 06/08/08 at 23:17 +0100, Steve McIntyre wrote:
>> Jacob wrote:
>>> Package: wnpp
>>> Severity: wishlist
>>> Owner: Jacob Appelbaum <[EMAIL PROTECTED]>
>>>
>>>
>>> * Package name: ozymandns
>> Hmmm. I used to run this version of ozymandns to provide IP-over-DNS
>> style services, and it was far from stable. It would often crash, drop
>> connections or chew lots of CPU for no apparent reason. Unless things
>> have improved substantially since, I would recommend strongly against
>> adding these to the archive.
> 
> Confirmed. And it hasn't been fixed.

Hello,

Micah Anderson encouraged me to package this software. We were both
annoyed that it is both very useful and seemingly abandoned software.

I'd agree that ozymandns has an unstable component (specifically
nomde.pl in my experience). However, the file transfer utilities are
just fine as far as I've seen. Have you had any problems with them? Do
you have test cases that crash them?

Despite the sometimes weird behavior of nomde.pl, Ozymandns as a suite
is quite useful. I'm actually using it right now to send this email. :-)

Currently Debian users can only use it as an unmaintained tar.gz
randomly found online. Dan Kaminsky and I spoke about a Debian package.
He seemed happy to have someone, even if it wasn't me, package it up.
This was some time ago but I believe he still feels this way. I've
recently attempted to contact him about licensing issues and hopefully
that will be worked out soon as well...

I've taken the time to integrate a widely used patch, write man pages
and example documentation. I've also created an init.d script. Once I
have finish packaging ozymandns, I hope to find the cause of the
instability issues I've personally experienced.

Best,
Jacob


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#495416: ITP: AESKeyFinder -- A tool for finding and reconstructing AES keys.

2008-08-17 Thread Jacob Appelbaum
Package: wnpp
Severity: wishlist
Owner: Debian Forensics <[EMAIL PROTECTED]>

* Package name: AESKeyFinder
  Version : 1.0.0
* URL : http://citp.princeton.edu/memory/code/
* License : BSD
  Programming Lang: C
  Description : A tool for finding and repairing AES keys.

This program illustrates automatic techniques for locating 128-bit and
256-bit AES keys in a captured memory image.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#495418: ITP: RSAKeyFinder -- A tool for locating RSA private and public keys.

2008-08-17 Thread Jacob Appelbaum
Package: wnpp
Severity: wishlist
Owner: Debian Forensics <[EMAIL PROTECTED]>

* Package name: RSAKeyFinder
  Version : 1.0.0
* URL : http://citp.princeton.edu/memory/code/
* License : BSD
  Programming Lang: C++
  Description : A tool for locating RSA private and public keys.

This program illustrates automatic techniques for locating RSA
private and public keys.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#495419: ITP: AESFix -- A tool for correcting bit errors in an AES key schedule.

2008-08-17 Thread Jacob Appelbaum
Package: wnpp
Severity: wishlist
Owner: Debian Forensics <[EMAIL PROTECTED]>

* Package name: AESFix
  Version : 1.0.1
* URL : http://citp.princeton.edu/memory/code/
* License : BSD
  Programming Lang: C++
  Description : A tool for correcting bit errors in an AES key schedule.

This program illustrates a technique for correcting bit errors in an AES
key schedule. It should be used with the output of the AESKeyFinder
program.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#495422: ITP: biosmemimage -- Tools for capturing memory dumps on x86 and x86-64 systems

2008-08-17 Thread Jacob Appelbaum
Package: wnpp
Severity: wishlist
Owner: Jacob Appelbaum <[EMAIL PROTECTED]>

* Package name: biosmemimage
  Version : 1.0.0
* URL : http://citp.princeton.edu/memory/code/
* License : BSD
  Programming Lang: C
  Description : Tools for capturing memory dumps on x86 and x86-64 systems

This package contains proof of concept utilities for capturing
memory dumps from Intel x86-based and AMD/Intel x86-64 based PC
systems. PXE and USB memory scraper payloads are included.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: use of RDRAND in $random_library

2014-06-13 Thread Jacob Appelbaum
On 6/13/14, Theodore Ts'o  wrote:
> On Fri, Jun 13, 2014 at 10:09:02AM +0200, Martijn van Oosterhout wrote:
>> > Excuse me if I'm blunt here, but I understand that, on the point of
>> > using entropy to seed a PRNG, if you have several shitty entropy
>> > sources and one _really_ good one, and you xor them all together, the
>> > resulting output is as random as the best of them. If your hardware
>> > entropy source is faulted and produces just an endless stream of
>> > '001001001001001001', xoring it with a valid Golomb sequence will give
>> > you something even more random than a Golomb sequence.
>> >
>> The proof that XORing streams can't reduce the entropy relies on the
>> sources being independant. I think the issue here is we don't know if
>> RDRAND is independent or not. That said, doing a SHA256 over the output
>> should be sufficient (assuming the CPU doesn't see you're doing a hash
>> and
>> short circuits it).
>
> Basically, the question is how blatently do you think the NSA could
> bugger the CPU.  If you believe they can completely bugger the CPU, so
> they can detect that you are implementing some explicit crypto
> instruction, and change its behaviour, or they can peek ahead in the
> instruction pipeline, notice an XOR, determine that one of its inputs
> is an RDRAND instruction, and the other inputs come from a read of
> /dev/urandom, and then modify the behaviour of the XOR, all in such a
> way that the hundreds or thousands of Intel employees that need to
> improve, test, debug, etc. the CPU instruction execution engine
> wouldn't notice, then you might as well give up now and start
> implementing your own CPU from transitors, capictors, resistors, and
> wires.
>
> While I am willing to believe they might be able to secretly subvert
> or bribe Intel to subvert the RDRAND engine, in some way which no
> other or very few other employees at Intel would detect, to believe
> they could then do so with the entire CPU is MUCH harder to believe.
>

I would expect that if the NSA wanted to take control of the RDRAND or
the rest of the CPU, they'd dynamically update the microcode in the
CPU to change how it behaves. To do this, it appears that they'd need
to sign a microcode and then apply an update. According to some great
research by Ben Hawkes, it may be that there is a 2048bit RSA key that
is used for signing:

  http://inertiawar.com/microcode/

In the case of Lavabit, we have learned that the US Government will
assert that they can request cryptographic keys in a Grand Jury. Is it
that case that they might try the same with Intel? Is 2048 a large
enough key size to stop the NSA? There are quite a few open questions.

If the NSA can update the microcode, I believe we could fairly state
that they have subverted the security of the entire CPU.

> There are probably much easier things to do, such as subverting
> someone in Red Hat's release engineering department, for example.  A
> buggered kernel is easier to accomplish, and much harder to detect.
> This is one of the reasons why implementing reproducible binary builds
> is a realy good idea from a security perspective.  This allows you to
> spot check that various binaries correspond to the sources that they
> claim to be form.
>

I agree and I'd add that they're likely taking many angles all at
once. And it isn't just the NSA. The NSA just has a great head start
and a home field advantage.

"Intel Inside" could have a few different meanings! :-)

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/cafggdf34pi1ojup0l48ncyk+szneosc7semjxqxh4gefg-n...@mail.gmail.com



Re: use of RDRAND in $random_library

2014-06-14 Thread Jacob Appelbaum
On 6/13/14, Theodore Ts'o  wrote:
> On Fri, Jun 13, 2014 at 06:51:44PM +0000, Jacob Appelbaum wrote:
>> I would expect that if the NSA wanted to take control of the RDRAND or
>> the rest of the CPU, they'd dynamically update the microcode in the
>> CPU to change how it behaves. To do this, it appears that they'd need
>> to sign a microcode and then apply an update.
>
> The Intel CPU doesn't support a persistent microcode update.  A
> microcode update has to be uploaded after each power cycle.

I'm aware and happy about that fact. However, I have a few concerns
that come from a different core assumption: we know nothing about the
microcode updates that are applied at boot on many systems.

What do we know about the microcode updates that are shipping in
various operating systems? I think very little. Ben's research is
pretty fantastic for this reason.

>  That
> means that a microcode hack would require that you break root first.

I agree that a microcode insertion requires root but I'm not sure that
an attacker must always be the one to insert it. Microcode seems like
a perfect trojan horse and I am very suspect of it.

> And if you can break root, you can just bugger the kernel or one or
> more the userspace binaries.  That's going to be as detectable as
> leaving an extra firmware file in /lib/firmware/intel-ucode.
>

It would be interesting to allow microcode updates at boot only and to
signal the kernel that no more are expected. That may change how such
an update could be applied. I'm unsure if it would matter as you
correctly state. Lots to do!

> I've long considered that there are so many zero-day exploits that if
> the NSA decides to carry out a focused attack on a single machine, or
> machines belonging to a single person, there is a very high
> probability they can do whatever they want.  And this isn't a new
> problems; even before the days of computers things like "black bag jobs"
> were always a thing.
>

Of course, though they have certain advantages and we can ensure that
there is a level playing field for all attackers.

> So I'm personally much more concerned about bulk surveillance, whether
> it involves passive surveillance using fiber taps, or trojans
> introduced into distribution-provided binaries.  Other people may have
> their own personal sense of paranoia, but that's mine.  I happen to
> think mine corresponds more with reality, but I'm sure Keith Alexander
> and James Clapper would try to claim that I should be wearing tin foil
> hats or something.  :-)
>

I think paranoia isn't the right term, your rationale is grounded
squarely in reality. :-)

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAFggDF1wDAEPdYx=p7t7iokmevf6j_o_dkriuv+x4r1yzah...@mail.gmail.com



Re: myth(?): places in the world where https is illegal? Re: people.debian.org will move from ravel to paradis and become HTTPS only

2014-07-21 Thread Jacob Appelbaum
On 7/21/14, Holger Levsen  wrote:
> Hi Iain,
>
> On Sonntag, 20. Juli 2014, Iain R. Learmonth wrote:
>> The main one is that there are places in the world you just can't use
>> HTTPS
>> for legal reasons [...]
>
> I'm curious, can you name one?
>

I'm also curious - is there a Debian developer who will not use HTTPS
but does use SSH to access servers?

Is Debian still offering telnet services too? What other unsafe
protocols are standard and in use?

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/cafggdf2pnzk17uzkfh-hekv2-kyvxh9+qihvzltgmdtjrrr...@mail.gmail.com



Re: myth(?): places in the world where https is illegal? Re: people.debian.org will move from ravel to paradis and become HTTPS only

2014-07-21 Thread Jacob Appelbaum
On 7/21/14, Iain R. Learmonth  wrote:
> On Mon, Jul 21, 2014 at 01:12:37PM +0200, Holger Levsen wrote:
>> Hi Iain,
>>
>> On Sonntag, 20. Juli 2014, Iain R. Learmonth wrote:
>> > The main one is that there are places in the world you just can't use
>> > HTTPS
>> > for legal reasons [...]
>>
>> I'm curious, can you name one?
>
> The United Kingdom when using IPv4 over AX.25 on Amateur Radio. Encryption
> is illegal because it goes against the self-policing nature of the amateur
> bands.

I believe you are mistaken. My understanding is that you're not
supposed to use crypto on the radio layer and IP packets are already
several layers away from that concern. It would be great to hear from
a HAM radio literate lawyer on this topic. Perhaps someone can ask the
EFF if it is actually an important sticking point?

More importantly, I suspect would be to first ask if anyone in the UK
uses IPv4 over AX.25 to access people.debian.org?

>
> (I was hoping to actually locate one of the crackpot dictator countries
> that
> have laws for the general population but there doesn't actually seem to be
> much data available on that).
>

Isn't any country that outlaws use of crypto by free people by
definition a crackpot country? :-)

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/cafggdf0p5nqvjvmkhysrpr81kuurhsvsvas_d22wpvwewrp...@mail.gmail.com



Re: myth(?): places in the world where https is illegal? Re: people.debian.org will move from ravel to paradis and become HTTPS only

2014-07-21 Thread Jacob Appelbaum
On 7/21/14, Iain R. Learmonth  wrote:
> Hi Jacob,
>
> On Mon, Jul 21, 2014 at 01:14:14PM +0000, Jacob Appelbaum wrote:
>> I believe you are mistaken. My understanding is that you're not
>> supposed to use crypto on the radio layer and IP packets are already
>> several layers away from that concern. It would be great to hear from
>> a HAM radio literate lawyer on this topic. Perhaps someone can ask the
>> EFF if it is actually an important sticking point?
>
> I am not a lawyer but I am a radio amateur. Here is a link to the Ofcom
> Amateur Radio terms:
>
> https://services.ofcom.org.uk/amateur-terms.pdf
>
> "11(2) The Licensee shall only address Messages to other Amateurs or to the
> stations of those Amateurs and shall not encrypt these Messages for the
> purpose of rendering the Message unintelligible to other radio spectrum
> users."
>

It sounds like it would be good to call and clarify things with a
technologically literate lawyer.

> I would take this to mean that no part of the message can be encrypted.
>

By that reasoning, we may not authenticate except by sending plaintext
passwords over such a network. That seems to either be an old policy,
a mistake or a network that is simply hostile towards modern security
requirements for individuals.

This seems to be relevant:

  https://www.tapr.org/pdf/DCC2010-AX.25-AuthenticationEffects-KE5LKY.pdf

>> More importantly, I suspect would be to first ask if anyone in the UK
>> uses IPv4 over AX.25 to access people.debian.org?
>
> This is not beyond the realm of possibility.

I acknowledge the possibility and was inquring about *actuality*
rather than mere possibility. Is anyone actually using IPv4 over AX.25
to access people.debian.org?

> It would be permitted by the
> Ofcom terms to download Amateur Radio software from p.d.o and also to
> browse
> Amateur Radio software documentation hosted there, which are both things
> that the Debian policy would permit to be hosted.
>

Is anyone hosting software on p.d.o and actually having it downloaded
over a radio link? That sounds like a good project but I wonder if
practically it happens in the wild?

> There are likely also other cases, which granted are likely edge cases,
> where encryption cannot be used.

We should not be beholden to the lowest common denominator. This seems
especially so when it is a matter of theory and without practical
issue.

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/cafggdf0ob2hulvncvwy_u8pf_rdbz9ynstjl5oyiwsce0ix...@mail.gmail.com



Re: Bug#733860: ITP: pond -- Forward secure, asynchronous messaging for the discerning.

2014-01-02 Thread Jacob Appelbaum
Philip Rinn:
> Hi,
> 
> I think it's important to add also the paragraph about actual usability for 
> the
> homepage:
> 
> Dear God, please don't use Pond for anything real yet. I've hammered out 
> nearly
> 20K lines of code that have never been reviewed. Unless you're looking to
> experiment you should go use something that actually works (e.g. GnuPG).[0]
> 
> 
> I general I'd ask if it's not better to wait for code reviews before 
> packaging it.
> 
> Best,
> Philip
> 
> [0] https://pond.imperialviolet.org
> 
> 

I use Pond regularly on machines that run Debian and Tails. I'd also be
happy to give it a shot at packaging it in about a month. I think it is
fine to package but it should include the warning from the author.

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/52c5b757.5030...@appelbaum.net



Re: when will we finally throw away binary uploads (Re: Please upgrade your build environment when you are affected by transition

2014-02-13 Thread Jacob Appelbaum
No kidding!

How many uploaded binaries might include malware?

A lack of binary determinism in the build process basically ensures
that it isn't feasible to discover an answer to this question. :(

All the best,
Jacob

On 2/13/14, Holger Levsen  wrote:
> Hi,
>
> On Donnerstag, 13. Februar 2014, Ondřej Surý wrote:
>> this is just a pledge to you all fellow debian developers to update your
>> build environment before you build a package.
>
> I want all binary packages to be rebuild on *.debian.org hosts. Everything
> else is just an ugly workaround.
>
>
> amen,
>   Holger
>
> P.S.: and reproducible builds after that, then...
>


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cafggdf1igi23fahwhsswhsace1xsvviwnob+i5n+skyh4bq...@mail.gmail.com



Re: when will we finally throw away binary uploads (Re: Please upgrade your build environment when you are affected by transition

2014-02-13 Thread Jacob Appelbaum
On 2/13/14, Jakub Wilk  wrote:
> * Jacob Appelbaum , 2014-02-13, 18:36:
>>How many uploaded binaries might include malware?
>
> *shrug* It's not like it's difficult to hide malicious code in source
> packages.
>

It is much harder for you to hide source code changes as a third party
than binary changes.

Many projects have code review processes with people who read each
commit and reason about the contents of each code change. Very few
public projects have a similar process for reverse engineering
binaries or understanding the output of a compiler for releases. Those
few projects generally aim for deterministic or reproducible builds -
this still has the problem of missing a solid understanding of the
output, by the way.

> How many configure scripts that we never rebuild from source contains
> trojans?

There are several serious problems involved in this topic. One expects
that we at least have processes for finding malicious configure
scripts, as we find buffer overflows in C programs or as we find
portability problems in assembler code - no such (Debian) process
currently exists for inspecting binaries that are uploaded by
developers. Perhaps I'm mistaken? Perhaps there is a project for
actively inspecting and reverse engineering binaries that are uploaded
by developers?

A key problem here is not the badly behaving developer - it is the
developer that is compromised and unwittingly becomes party to harming
others. Minimizing this exposure is an important goal and worth
consideration.

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAFggDF1XXuGoK_DR2LpGTDQX9NNPtou8F2JOJY=qj7ob7dk...@mail.gmail.com



Re: when will we finally throw away binary uploads (Re: Please upgrade your build environment when you are affected by transition

2014-02-13 Thread Jacob Appelbaum
Heya Sam,

On 2/14/14, Sam Hartman  wrote:
> All rants aside, I believe there's a fairly wide agreement that we
> should throw away binaries from builds.

I'd encourage something slightly different and then I'd expand on it a bit.

I think it would be useful to have an historical archive of each
binary, as uploaded by a developer or produced by a build server. In
the event that a binary is imperfect, storing a copy of each binary
may be useful for later analysis. This could help us spot bugs for a
compiler specific problem (such as optimizing something out of the
binary that was otherwise in the source) or when the binary is simply
malicious (such as a backdoor inserted by a compiler or build
process).

I'd say that we might consider *using* that uploaded binary as an
assertion by a given developer. In general it is the expected correct
output binary and it is signed by that developer.

As we move into the deterministic/reproducible world, the archive will
serve an interesting purpose. Each developer would upload their
respective binary and signature per architecture for a given source
package. Their output may be represented as GnuPG signatures over
hashes of source code packages and binary packages. In theory, we
could have an assertion from another developer with another upload and
so on.

Even though we should have matching hashes, in some cases, we may not
learn that we have mismatching hashes for hours or days. Thus keeping
a copy of all the built binary parts is useful for later analysis.

This will allow us to verify that the sources correspond to a specific
binary output, we could also ensure that very important packages
require a threshold of signatures before the binaries are consider
properly built.

Those that upload a binary should not be able to delete the uploaded
binary - thus when a build server or developer builds a *different*
version, we'll be able to inspect *all files* for differences. So for
each developer uploading, we'd keep a copy. We could discard identical
binaries and ensure that a copy is only kept in the long run when
there are no strange events.

If a developer is compromised, we're able to detect it and ensure that
the developer's system cannot be used to erase evidence of such a
compromise. If the build system is compromised, it will be useful to
download the binary from the archive and to inspect it. Similarly the
build system may not erase items from the archive.

This could add to the overall security of the process and to begin to
give us some semblance of a review process for binaries served to
users.

Until something like that happens, I think we should probably not
*ship* the developer built binaries to users. We will however ship
some binary parts to the user and hopefully those will be built by the
build servers, as well as archived somewhere for all time, in case
we're already compromised.

( Append only data store ideas like Chisel may have a non-evil use, hooray! )

>
> I seem to recall ftp-master sending out mail to debian-devel-announce
> describing the steps along that process a while ago.
>
> I think it's fine to ask where that project is, and to volunteer
> resources to help.
> However, I'd hope we're all agreed that we need to get there.
>

I've been reading the deterministic build page and I think it could
use some further discussions.

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAFggDF0kOQsNbdQ-5-LSuHr0z0zTnOWDnSXV+H5qA1khMKF=w...@mail.gmail.com



Re: when will we finally throw away binary uploads (Re: Please upgrade your build environment when you are affected by transition

2014-02-13 Thread Jacob Appelbaum
On 2/14/14, Paul Tagliamonte  wrote:
> On Fri, Feb 14, 2014 at 04:44:21AM +0000, Jacob Appelbaum wrote:
>> Heya Sam,
>>
>> On 2/14/14, Sam Hartman  wrote:
>> > All rants aside, I believe there's a fairly wide agreement that we
>> > should throw away binaries from builds.
>>
>> I'd encourage something slightly different and then I'd expand on it a
>> bit.
>>
>> I think it would be useful to have an historical archive of each
>> binary, as uploaded by a developer or produced by a build server.
>
> Perhaps you're interested in helping with http://snapshot.debian.org/
> then? :)
>

I'm glad to see that the really hard part of the process is already
done! Amazing!

> (I've got tons of these links!)
>

I'm enjoying reading them all. Thank you! :)

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAFggDF18ETcHJh4HJBw5=bjiqzvm0woy4pm4y6lpxcp21qk...@mail.gmail.com



Re: goals for hardening Debian: ideas and help wanted

2014-04-28 Thread Jacob Appelbaum
On 4/25/14, Kevin Chadwick  wrote:
> previously on this list Paul Wise contributed:
>
>> I have written a non-exhaustive list of goals for hardening the Debian
>> distribution, the Debian project and computer systems of the Debian
>> project, contributors and users.
>>
>> https://wiki.debian.org/Hardening/Goals
>>
>> If you have more ideas, please add them to the wiki page.
>

...

>
> Tor provides privacy and more likely lowers security so which threat
> against contributors or contributor actions is the Tor policy aimed to
> protect?

I'm confused, what? How does Tor lower security and at the same time,
it provides privacy?

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAFggDF14P25ZrOp3Yj=nfvaydtry+rnbcxgfdw-vvvrbvdf...@mail.gmail.com



Re: use of RDRAND in $random_library

2014-06-11 Thread Jacob Appelbaum
On 6/11/14, Joey Hess  wrote:
> I stumbled over a library which has switched to using RDRAND in a new
> upsteam version (not yet packaged), instead of /dev/urandom[1].

Which library is using it?

>
> I don't have a stong opinion on the security of RDRAND, which is a
> contentious topic in a domain I am not expert in. However, I would much
> rather rely on linux developers to make the right decision on that,
> rather than libraries deciding on an ad-hoc basis. Especially because
> the kernel has a wider spectrum of choices than use/avoid (IIRC it
> currently mixes in RDRAND with other entropy sources.)
>

I tend to agree for a few reasons. Genreally, I don't trust RDRAND and
the doping paper doesn't help:

  
http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/

> Perhaps we should avoid libraries in Debian using RDRAND directly,
> if the library has uses related to security. (Maybe some game or
> simulation library would have a good reason to use it.)
>

Quite a few programs and libraries will have this issue if a cursory
search of the internet is an indication.

> Would it make sense to scan for the opcode?

Yes, very much so. It is potentially a security bug. It will be
interesting to track it.

All the best,
Jacob


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/cafggdf0rcbmta0wyu5wwjefmirkrj2rnuyl9ra-3xvo5mgk...@mail.gmail.com