<div dir="ltr">I agree completely with Moxie's points about the inadequacy of the proposed CT mechanism against detecting the expected government coercion. The point I was trying to make was CT needs to be analyzed in the context of its implicit threat model. The lawyers might also be barrier to make the threat model fully explicit. It is probably best if employees of public companies do not talk publicly about thwarting lawful interception.<br>
<br>The proposed CT mechanism might meet the bar necessary for the lawyers to let us have our escrow free E2E communications from a giant tech company but might not actually offer greater protection than out of band key verification when we encounter a complicit key server.<br>
<br>I caveat my thoughts with the observation that the term "Identity Provider" is poorly defined in the protocol and depending on the attributes of identity providers could either improve or worsen the situation considerably.
<div class="gmail_extra"><br><br><div class="gmail_quote">On Thu, Aug 28, 2014 at 1:20 PM, Moxie Marlinspike <span dir="ltr"><<a href="mailto:moxie@thoughtcrime.org" target="_blank">moxie@thoughtcrime.org</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div><br>
On 08/28/2014 12:33 PM, <a href="mailto:zaki@manian.org" target="_blank">zaki@manian.org</a> wrote:<br>
> In the CT case, the universe of cryptofolks can review anyone's account<br>
> history for evidence of a MITM attack after an attack has taken place.<br>
<br>
</div>What I'm confused about is, where's the evidence? If the cryptosystem<br>
is truly "invisible" to the user (as it should be!), these keys are<br>
going to be changing a lot, especially for users who aren't terribly<br>
crypto-literate (ie: Glenn Greenwald).<br>
<br>
I'm not sure that we can count on the "the crypto few" to monitor the<br>
security of others if there's not really definite proof for them to be<br>
looking for. I think it invites the perfect storm of reasonable apathy<br>
+ wingnut conspiracy theory.<br>
<div><br>
> In the TOFU case, it is only an MITM attack on one of the cryptofolks<br>
> that is likely to be discovered.<br>
><br>
> The base case we are looking at is some like Glenn Greenwald circa 2012.<br>
> He deals with sensitive information but isn't terribly cryto-literate.<br>
<br>
</div>In the legal coercion case:<br>
<br>
It seems that in the CT world Google could say "Greenwald is a high<br>
profile journalist, it's possible that third parties are monitoring the<br>
CT log for his activity. Performing this MITM could damage our business."<br>
<br>
In the "simple thing" world, it seems that Google could just as easily<br>
say "Greenwald is a high profile journalist that takes the security of<br>
his communication seriously, it's possible that he is watching for key<br>
conflicts. Performing this MITM could damage our business."<br>
<br>
They seem almost exactly the same from the legal coercion perspective,<br>
if that's what you're designing for.<br>
<div><br>
> Curious outsiders individuals would observe these events and the logs<br>
> would reveal that Google changed the key for <a href="mailto:ggreenwald@gmail.com" target="_blank">ggreenwald@gmail.com</a><br>
</div>> <mailto:<a href="mailto:ggreenwald@gmail.com" target="_blank">ggreenwald@gmail.com</a>> 24hrs prior to his arrest. This would<br>
<div>> provide a piece of evidence that Google was either willfully<br>
> facilitating lawful interception or losing court battles that it fought.<br>
<br>
</div>The log would reveal that the key changed, not that Google changed the<br>
key. The log would also reveal that the key has changed many times<br>
before. Was this a conspiracy or a coincidence? We don't know. The<br>
only person that knows is the user.<br>
<div><br>
> In the TOFU model, the community would only learn that Google became<br>
> untrustworthy is they attempted the same attack on the kinds of folks<br>
> that are on this list. The much smaller subset of the users especially<br>
> if the usability problems of crypto are largely addressed.<br>
<br>
</div>In order to say that "the crypto few" can effectively safeguard the<br>
communication of "almost everyone," I would need some more information<br>
on how exactly that would work. If I am one of "the crypto few," I<br>
don't see how I would effectively do this monitoring.<br>
<br>
The properties and tradeoffs between CT and "the simple thing" feel<br>
roughly the same to me, but one is way more complex than the other.<br>
<br>
- moxie<br>
<div><br>
> On Thu, Aug 28, 2014 at 12:11 PM, Moxie Marlinspike<br>
</div>> <<a href="mailto:moxie@thoughtcrime.org" target="_blank">moxie@thoughtcrime.org</a> <mailto:<a href="mailto:moxie@thoughtcrime.org" target="_blank">moxie@thoughtcrime.org</a>>> wrote:<br>
<div><div>><br>
><br>
> On 08/28/2014 11:51 AM, <a href="mailto:zaki@manian.org" target="_blank">zaki@manian.org</a> <mailto:<a href="mailto:zaki@manian.org" target="_blank">zaki@manian.org</a>> wrote:<br>
> > The purpose to CT is not to protect users from MITM attacks. The<br>
> purpose<br>
> > of CT is protect the operators of key directories from coercion<br>
> and the<br>
> > network from malicious/subverted key directory operators. CT will<br>
> permit<br>
> > a response that complying with a lawful interception order will result<br>
> > in a significant loss of business for a directory operator. Keys<br>
> will be<br>
> > non-repudiable and thus it will clear after an adverse event who<br>
> > facilitated the MITM attack.<br>
> ><br>
> > Specifically, Google and Yahoo are large commercial entities that want<br>
> > to operate an encrypted communication network without key escrow in a<br>
> > way acceptable to their lawyers. The current operators of large e2e<br>
> > networks(iMessage, BBM) use key escrow as part of their compliance<br>
> > regime with lawful interception orders.<br>
><br>
> Even in that context, I'd love to hear why you think "the simple thing"<br>
> doesn't accomplish the same goals.<br>
><br>
> > "Keys will be non-repudiable and thus it will clear after an adverse<br>
> event who facilitated the MITM attack."<br>
><br>
> I still don't understand how this is true. All that "we" see is that a<br>
> key changed, which is a completely normal event and will be happening at<br>
> a rate which is probably difficult for "us" to even keep up with. All<br>
> "we" really have is the word of the user that something in the log is<br>
> inappropriate. I don't see any other real definitive "proof."<br>
><br>
> So what's the difference between CT and "the simple thing?" In both<br>
> cases, all we have is the word of the user that something they claim to<br>
> be amiss is amiss.<br>
><br>
> > "CT will permit a response that complying with a lawful interception<br>
> order will result in a significant loss of business for a directory<br>
> operator."<br>
><br>
> It seems like, in the CT case, the provider is essentially saying "by<br>
> performing this MITM attack, the user *could* be one of the few that<br>
> notices, in which case we'd be in big trouble."<br>
><br>
> Isn't this just as true for "the simple thing?" The provider can say<br>
> "listen, this user's client *could* alert them to a key change, in which<br>
> case we'd be in big trouble."<br>
><br>
> They seem to offer roughly the same "legal coercion" properties, but the<br>
> CT scheme is way more complex, doesn't offer realtime MITM protection,<br>
> has a spam problem, and will likely result in the provider being falsely<br>
> accused on a regular basis. The false accusations might even weaken the<br>
> "legal coercion" case, if they're frequent enough.<br>
><br>
> - moxie<br>
><br>
><br>
> > On Thu, Aug 28, 2014 at 11:18 AM, Moxie Marlinspike<br>
> > <<a href="mailto:moxie@thoughtcrime.org" target="_blank">moxie@thoughtcrime.org</a> <mailto:<a href="mailto:moxie@thoughtcrime.org" target="_blank">moxie@thoughtcrime.org</a>><br>
</div></div><div><div>> <mailto:<a href="mailto:moxie@thoughtcrime.org" target="_blank">moxie@thoughtcrime.org</a> <mailto:<a href="mailto:moxie@thoughtcrime.org" target="_blank">moxie@thoughtcrime.org</a>>>> wrote:<br>
> ><br>
> ><br>
> > On 08/27/2014 12:32 PM, Tony Arcieri wrote:<br>
> > > They plan on having email providers run "Key Directories"<br>
> and using<br>
> > > encrypted messages to gossip data about the directories,<br>
> providing a<br>
> > > CT-like system:<br>
> > ><br>
> > > <a href="https://code.google.com/p/end-to-end/wiki/KeyDistribution" target="_blank">https://code.google.com/p/end-to-end/wiki/KeyDistribution</a><br>
> ><br>
> > I still have some questions about this approach. My understanding<br>
> > is that:<br>
> ><br>
> > 1) The monitors themselves can't determine whether Google is being<br>
> > "dishonest," beyond one extremely coarse view of whether Google is<br>
> > publishing an appropriate data structure.<br>
> ><br>
> > This is because:<br>
> ><br>
> > a) Users' keys will be changing constantly under completely normal<br>
> > circumstances.<br>
> ><br>
> > b) From running a service that operates as a sort of "key<br>
> directory," I<br>
> > know that many times they will even be changing in<br>
> "suspicious" ways,<br>
> > ie. from A to B and then back to A again.<br>
> ><br>
> > This means:<br>
> ><br>
> > 2) Users are the only ones who have the information to<br>
> determine whether<br>
> > Google is being dishonest.<br>
> ><br>
> > This is because:<br>
> ><br>
> > a) Users are the only ones who know what their keys actually<br>
> are, and<br>
> > whether they were supposed to change.<br>
> ><br>
> > So we're in a situation where the best a "monitor" can do is<br>
> provide the<br>
> > user with a view of their key state over time, which the user<br>
> can verify<br>
> > with their own knowledge of what their key state should be.<br>
> Nobody can<br>
> > detect an attack but the user themselves, which they depend on<br>
> a third<br>
> > party service in order to be able to do. Everything is<br>
> dependent on the<br>
> > user.<br>
> ><br>
> > I think there are three distinct classes of users:<br>
> ><br>
> > i) Almost everyone. In the world where all GMail customers are<br>
> using<br>
> > E2E, the vast majority of them won't (and shouldn't be<br>
> expected to) know<br>
> > what their key state should be, or what a key even is. So for<br>
> those<br>
> > users, Google can make whatever key changes they want with<br>
> impunity, and<br>
> > neither the "monitors" nor the users would be the wiser of<br>
> Google's<br>
> > nefarious ways. This may be OK, particularly if there's no<br>
> way for<br>
> > Google to distinguish between types of users.<br>
> ><br>
> > ii) The crypto few. There is a small percentage of users who<br>
> will know<br>
> > what a key is and understand how this works well enough to be<br>
> able to<br>
> > effectively monitor these changes.<br>
> ><br>
> > iii) Wingnuts. Larger than the crypto few, but still a vast<br>
> minority.<br>
> > They'll know what a "key" is, but won't *really* understand<br>
> how this<br>
> > works, and will become convinced that Google has MITMd them<br>
> when their<br>
> > key changed under normal circumstances.<br>
> ><br>
> > I don't see any way to distinguish the "wingnuts" from "the<br>
> crypto few."<br>
> > If either user steps forward to declare that their key was<br>
> compromised,<br>
> > the only information we have is the log. However, the user is<br>
> the only<br>
> > one with the information to determine whether the log is<br>
> correct or not,<br>
> > so there's no real "proof" other than the user's word. Even<br>
> with all<br>
> > the monitoring infrastructure available, there's still no<br>
> information<br>
> > that a 3rd party can use to determine whether a key was<br>
> maliciously<br>
> > inserted or not.<br>
> ><br>
> > That doesn't really seem to add up to a great situation. As I<br>
> see it:<br>
> ><br>
> > 1) This is a *lot* of work. Servers have to maintain these<br>
> directories<br>
> > at volumes (hopefully all gmail users) that are already difficult<br>
> > enough. Other organizations will need to be formed with somewhat<br>
> > considerable resources in order to effectively keep up with the<br>
> > monitoring.<br>
> ><br>
> > 2) Users can be successfully MITM'd, and will only learn about<br>
> it after<br>
> > the fact.<br>
> ><br>
> > 3) It creates a potential SPAM problem.<br>
> ><br>
> > 4) It creates a potential reputation problem for the key<br>
> directory,<br>
> > since "wingnuts" will constantly be announcing that they've<br>
> been MITM'd<br>
> > (complete with "proof" in the form of the log), and there'll<br>
> be no way<br>
> > for us to distinguish them from "the crypto few."<br>
> ><br>
> > So my question is, how is this better than doing the following:<br>
> ><br>
> > 1) Transmitting identity keys in-band.<br>
> ><br>
> > 2) Doing TOFU for keys seen.<br>
> ><br>
> > 3) Make the client notifying the user when a key changes, if<br>
> the user<br>
> > has a key change notification preference set.<br>
> ><br>
> > 4) Leaving the key change notification preference off by default.<br>
> ><br>
> > It seems to me that this has the same security properties as<br>
> the CT-like<br>
> > system, except:<br>
> ><br>
> > a) A *lot* less work, and a lot less complex. No need for other<br>
> > organizations to form.<br>
> ><br>
> > b) Both "wingnuts" and "the crypto few" are notified<br>
> immediately of a<br>
> > MITM rather than after the fact. "Almost everyone" remains<br>
> blissfully<br>
> > unaware, but again maybe that's OK if there's no way for the<br>
> provider to<br>
> > know with certainty which category a user is in.<br>
> ><br>
> > c) It's harder for wingnuts to get confused.<br>
> ><br>
> > d) No SPAM problem.<br>
> ><br>
> > I'm really interested in hearing why partisans of the CT-style key<br>
> > directory think the overhead and other drawbacks are worth<br>
> doing it over<br>
> > the simpler thing?<br>
> ><br>
> > - moxie<br>
> ><br>
> > --<br>
> > <a href="http://www.thoughtcrime.org" target="_blank">http://www.thoughtcrime.org</a><br>
> > _______________________________________________<br>
> > Messaging mailing list<br>
> > <a href="mailto:Messaging@moderncrypto.org" target="_blank">Messaging@moderncrypto.org</a> <mailto:<a href="mailto:Messaging@moderncrypto.org" target="_blank">Messaging@moderncrypto.org</a>><br>
</div></div>> <mailto:<a href="mailto:Messaging@moderncrypto.org" target="_blank">Messaging@moderncrypto.org</a> <mailto:<a href="mailto:Messaging@moderncrypto.org" target="_blank">Messaging@moderncrypto.org</a>>><br>
<div><div>> > <a href="https://moderncrypto.org/mailman/listinfo/messaging" target="_blank">https://moderncrypto.org/mailman/listinfo/messaging</a><br>
> ><br>
> ><br>
><br>
> --<br>
> <a href="http://www.thoughtcrime.org" target="_blank">http://www.thoughtcrime.org</a><br>
> _______________________________________________<br>
> Messaging mailing list<br>
> <a href="mailto:Messaging@moderncrypto.org" target="_blank">Messaging@moderncrypto.org</a> <mailto:<a href="mailto:Messaging@moderncrypto.org" target="_blank">Messaging@moderncrypto.org</a>><br>
> <a href="https://moderncrypto.org/mailman/listinfo/messaging" target="_blank">https://moderncrypto.org/mailman/listinfo/messaging</a><br>
><br>
><br>
<br>
--<br>
<a href="http://www.thoughtcrime.org" target="_blank">http://www.thoughtcrime.org</a><br>
_______________________________________________<br>
Messaging mailing list<br>
<a href="mailto:Messaging@moderncrypto.org" target="_blank">Messaging@moderncrypto.org</a><br>
<a href="https://moderncrypto.org/mailman/listinfo/messaging" target="_blank">https://moderncrypto.org/mailman/listinfo/messaging</a><br>
</div></div></blockquote></div><br></div></div>