SlideShare a Scribd company logo
1 of 27
Download to read offline
In which
encounters
Mephistopheles
https://images.fineartamerica.com/images-medium-large-5/faust-matt-hughes.jpg
berlinsides 0x7E1
aestetix
Thesis
• I really like the PGP/GPG protocol.
Thesis
• I really like the PGP/GPG protocol.
• However, I want the public keyservers to die.
Short primer on PGP/GPG
• Symmetric vs asymmetric cryptography
Alice Bob
Short primer on PGP/GPG
• Symmetric vs asymmetric cryptography
Alice Bob
Tommy Trickster
Short primer on PGP/GPG
• Symmetric vs asymmetric cryptography
Alice Bob
Tommy Trickster
Before 1991:
Steps to defeat Tommy Trickster:
1. Alice and Bob meet secretly and
agree on a key
2. They use this key to both encrypt
and decrypt their messages
3. If Tommy Trickster learns the key,
they are fucked
Symmetric: uses a single key to encrypt
and decrypt
Short primer on PGP/GPG
• Symmetric vs asymmetric cryptography
Alice Bob
Tommy Trickster
1991-Present:
Steps to defeat Tommy Trickster:
1. Bob publishes his public key
2. Alice finds his public key and uses it
to encrypt her message
3. Bob receives Alice's message and
uses his private key to decrypt it.
4. Tommy Trickster must get Bob's
private key to read the message
Asymmetric: uses one key to encrypt,
and another key to decrypt
Short primer on PGP/GPG
• Symmetric vs asymmetric cryptography
Alice Bob
Tommy Trickster
Keyserver
Two new questions:
1. Where can Bob publish his key so
Alice can find it?
2. How can Alice be sure that key is
actually his?
Answer: a keyserver full of signed keys
First Attempt: data mining
• Berlinsides 2015 talk
Second Attempt: key signing
• Berlinsides 2016 talk
Output:
aestetix@aestetix $ python pglulz.py
Created key 56F9958B for Ed Snowden esnowden@nsa.gov
now to prepare keys to be signed
This is where we upload our new key to the keyserver
Found 31 keys for Buckaroo Banzai Badguys
Fetching keys from Buckaroo Banzai Badguys
Signing key 1 of 31
{ ... lots of keys ... }
Signing key 31 of 31
Found 1 keys for John Small Berries
Input (yaml):
---
hard_reset: True
keyserver: pgp.mit.edu
real_run: False
keys_directory: key_directory
signing_key:
name: 'Ed Snowden'
email: 'esnowden@nsa.gov'
groups_to_sign:
1:
name: 'Buckaroo Banzai Badguys'
matching: 'buckaroobanzai.com'
Third Attempt: client-side "security"
• Removed "email address" validation
Third Attempt: client-side "security"
• Creating and uploading ridiculously large keys
• code for this at https://pinky.ratman.org/~aestetix/
aestetix@pinky ~/public_html $ ls -lah please_sir.gpg
-rw-r--r-- 1 aestetix users 1.9M Jun 17 2016 please_sir.gpg
aestetix@pinky ~/public_html $ ./gpg2 --list-packet please_sir.gpg
:public key packet:
version 4, algo 17, created 1466190081, expires 0
pkey[0]: [2048 bits]
pkey[1]: [256 bits]
pkey[2]: [2048 bits]
pkey[3]: [2048 bits]
keyid: F591661738FFED2F
:user ID packet: "{ 1.9 megs of crap }"
:signature packet: algo 17, keyid F591661738FFED2F
version 4, created 1466190081, md5len 0, 2 1)
hashed subpkt 21 len 5 (pref-hash-algos: 8 2 9 10 11)
hashed subpkt 22 len 2 (pref-zip-algos: 2 1)
hashed subpkt 30 len 1 (features: 01)
hashed subpkt 23 len 1 (key server preferences:
Third Attempt: client-side "security"
• Creating and uploading ridiculously large keys
• code for this at https://pinky.ratman.org/~aestetix/
aestetix@pinky ~/public_html $ ls -lah please_sir.gpg
-rw-r--r-- 1 aestetix users 1.9M Jun 17 2016 please_sir.gpg
aestetix@pinky ~/public_html $ gpg --list-packet
please_sir.gpg
gpg: packet(13) too large
# off=0 ctb=99 tag=6 hlen=3 plen=814
:public key packet:
version 4, algo 17, created 1466190081, expires 0
pkey[0]: [2048 bits]
pkey[1]: [256 bits]
pkey[2]: [2048 bits]
pkey[3]: [2048 bits]
keyid: F591661738FFED2F
# off=817 ctb=b6 tag=13 hlen=5 plen=1398149
:user ID packet: [too large]
aestetix@pinky ~/public_html $ gpg --keyserver pgp.mit.edu --
search-keys F591661738FFED2F
gpg: data source: http://pgp.mit.edu:11371
(1)
DZl60ir7WOuOTHODbIMVaLzlDNQGKtaaLXFuIRMPhQemnKKp0AKd
vdYQrP83POYbnqqz/2
2048 bit DSA key F591661738FFED2F, created: 2016-
06-17
Keys 1-1 of 1 for "F591661738FFED2F". Enter number(s), N)ext,
or Q)uit > 1
gpg: packet(13) too large
gpg: read_block: read error: Invalid packet
gpg: Total number processed: 0
Third Attempt: client-side "security"
• Creating and uploading ridiculously large keys
• code for this at https://pinky.ratman.org/~aestetix/
The "Key" Question:
How can we upload large bloated files to the
keyserver while using all standard tools?
The "Key" Question
http://images.slideplayer.com/17/5341490/slides/slide_22.jpg
The "Key" Question
The "Key" Question
Introducing PGP File System (pgpfs)
• Demo
pgpfs- the bad and the good
• The bad:
• Very slow
pgpfs- the bad and the good
• The bad:
• Very slow
• "Security" through obscurity
pgpfs- the bad and the good
• The bad:
• Very slow
• "Security" through obscurity
• You do not control where your data is (like the cloud)
pgpfs- the bad and the good
• The bad:
• Very slow
• "Security" through obscurity
• You do not control where your data is (like the cloud)
• You must not lose your .kat file
pgpfs- the bad and the good
• The good:
• keys are never deleted, only revoked
• From pgp.mit.edu/faq.html:
"Can you delete my key from the key server?
No, we cannot remove your key from the key server. When you submit a key to our key
server the key is also forwarded to other key servers around the world, and they in
turn forward the key to still other servers. Deleting the key from our server would not
cause it to be deleted from any of the other servers in the world and so this is not an
effective way to ensure the discontinued use of your key."
pgpfs- the bad and the good
• The good:
• keys are never deleted, only revoked
• The keyservers become a RAID 1 (cloned)
➡
➡
pgpfs- the bad and the good
• The good:
• keys are never deleted, only revoked
• The keyservers become a RAID 1 (cloned)
• It is a fun and hilarious way to abuse the public keyservers
Questions?
https://github.com/aestetix/pgpfs
aestetix@aestetix.com
gpg key ids:
0x248DBA53*
0xDEADBEEF
0x12345678
* preferred

More Related Content

Similar to Berlinsides2017

Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...Puppet
 
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...Tom Limoncelli
 
BSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on WheelsBSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on Wheelsinfodox
 
Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...
Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...
Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...Puppet
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionTanner Lovelace
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with muleAnil Kumar V
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with muleAnil Kumar V
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedFelipe Prado
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 CertificatesGabriella Davis
 
Grails vs XSS: Defending Grails against XSS attacks
Grails vs XSS: Defending Grails against XSS attacksGrails vs XSS: Defending Grails against XSS attacks
Grails vs XSS: Defending Grails against XSS attacksRafael Luque Leiva
 
Grails vs XSS: Defending Grails against XSS attacks
Grails vs XSS: Defending Grails against XSS attacksGrails vs XSS: Defending Grails against XSS attacks
Grails vs XSS: Defending Grails against XSS attackstheratpack
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communicationsdefconmoscow
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestSecuRing
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestPawel Rzepa
 
CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)
CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)
CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)PROIDEA
 

Similar to Berlinsides2017 (20)

Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
 
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
 
Introduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey ManagementIntroduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey Management
 
Gpg basics
Gpg basicsGpg basics
Gpg basics
 
BSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on WheelsBSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on Wheels
 
Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...
Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...
Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 Certificates
 
Crypto hlug
Crypto hlugCrypto hlug
Crypto hlug
 
Grails vs XSS: Defending Grails against XSS attacks
Grails vs XSS: Defending Grails against XSS attacksGrails vs XSS: Defending Grails against XSS attacks
Grails vs XSS: Defending Grails against XSS attacks
 
Grails vs XSS: Defending Grails against XSS attacks
Grails vs XSS: Defending Grails against XSS attacksGrails vs XSS: Defending Grails against XSS attacks
Grails vs XSS: Defending Grails against XSS attacks
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communications
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
 
CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)
CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)
CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)
 
Encryption for Everyone
Encryption for EveryoneEncryption for Everyone
Encryption for Everyone
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Berlinsides2017

  • 2. Thesis • I really like the PGP/GPG protocol.
  • 3. Thesis • I really like the PGP/GPG protocol. • However, I want the public keyservers to die.
  • 4. Short primer on PGP/GPG • Symmetric vs asymmetric cryptography Alice Bob
  • 5. Short primer on PGP/GPG • Symmetric vs asymmetric cryptography Alice Bob Tommy Trickster
  • 6. Short primer on PGP/GPG • Symmetric vs asymmetric cryptography Alice Bob Tommy Trickster Before 1991: Steps to defeat Tommy Trickster: 1. Alice and Bob meet secretly and agree on a key 2. They use this key to both encrypt and decrypt their messages 3. If Tommy Trickster learns the key, they are fucked Symmetric: uses a single key to encrypt and decrypt
  • 7. Short primer on PGP/GPG • Symmetric vs asymmetric cryptography Alice Bob Tommy Trickster 1991-Present: Steps to defeat Tommy Trickster: 1. Bob publishes his public key 2. Alice finds his public key and uses it to encrypt her message 3. Bob receives Alice's message and uses his private key to decrypt it. 4. Tommy Trickster must get Bob's private key to read the message Asymmetric: uses one key to encrypt, and another key to decrypt
  • 8. Short primer on PGP/GPG • Symmetric vs asymmetric cryptography Alice Bob Tommy Trickster Keyserver Two new questions: 1. Where can Bob publish his key so Alice can find it? 2. How can Alice be sure that key is actually his? Answer: a keyserver full of signed keys
  • 9. First Attempt: data mining • Berlinsides 2015 talk
  • 10. Second Attempt: key signing • Berlinsides 2016 talk Output: aestetix@aestetix $ python pglulz.py Created key 56F9958B for Ed Snowden esnowden@nsa.gov now to prepare keys to be signed This is where we upload our new key to the keyserver Found 31 keys for Buckaroo Banzai Badguys Fetching keys from Buckaroo Banzai Badguys Signing key 1 of 31 { ... lots of keys ... } Signing key 31 of 31 Found 1 keys for John Small Berries Input (yaml): --- hard_reset: True keyserver: pgp.mit.edu real_run: False keys_directory: key_directory signing_key: name: 'Ed Snowden' email: 'esnowden@nsa.gov' groups_to_sign: 1: name: 'Buckaroo Banzai Badguys' matching: 'buckaroobanzai.com'
  • 11. Third Attempt: client-side "security" • Removed "email address" validation
  • 12. Third Attempt: client-side "security" • Creating and uploading ridiculously large keys • code for this at https://pinky.ratman.org/~aestetix/ aestetix@pinky ~/public_html $ ls -lah please_sir.gpg -rw-r--r-- 1 aestetix users 1.9M Jun 17 2016 please_sir.gpg aestetix@pinky ~/public_html $ ./gpg2 --list-packet please_sir.gpg :public key packet: version 4, algo 17, created 1466190081, expires 0 pkey[0]: [2048 bits] pkey[1]: [256 bits] pkey[2]: [2048 bits] pkey[3]: [2048 bits] keyid: F591661738FFED2F :user ID packet: "{ 1.9 megs of crap }" :signature packet: algo 17, keyid F591661738FFED2F version 4, created 1466190081, md5len 0, 2 1) hashed subpkt 21 len 5 (pref-hash-algos: 8 2 9 10 11) hashed subpkt 22 len 2 (pref-zip-algos: 2 1) hashed subpkt 30 len 1 (features: 01) hashed subpkt 23 len 1 (key server preferences:
  • 13. Third Attempt: client-side "security" • Creating and uploading ridiculously large keys • code for this at https://pinky.ratman.org/~aestetix/ aestetix@pinky ~/public_html $ ls -lah please_sir.gpg -rw-r--r-- 1 aestetix users 1.9M Jun 17 2016 please_sir.gpg aestetix@pinky ~/public_html $ gpg --list-packet please_sir.gpg gpg: packet(13) too large # off=0 ctb=99 tag=6 hlen=3 plen=814 :public key packet: version 4, algo 17, created 1466190081, expires 0 pkey[0]: [2048 bits] pkey[1]: [256 bits] pkey[2]: [2048 bits] pkey[3]: [2048 bits] keyid: F591661738FFED2F # off=817 ctb=b6 tag=13 hlen=5 plen=1398149 :user ID packet: [too large] aestetix@pinky ~/public_html $ gpg --keyserver pgp.mit.edu -- search-keys F591661738FFED2F gpg: data source: http://pgp.mit.edu:11371 (1) DZl60ir7WOuOTHODbIMVaLzlDNQGKtaaLXFuIRMPhQemnKKp0AKd vdYQrP83POYbnqqz/2 2048 bit DSA key F591661738FFED2F, created: 2016- 06-17 Keys 1-1 of 1 for "F591661738FFED2F". Enter number(s), N)ext, or Q)uit > 1 gpg: packet(13) too large gpg: read_block: read error: Invalid packet gpg: Total number processed: 0
  • 14. Third Attempt: client-side "security" • Creating and uploading ridiculously large keys • code for this at https://pinky.ratman.org/~aestetix/
  • 15. The "Key" Question: How can we upload large bloated files to the keyserver while using all standard tools?
  • 19. Introducing PGP File System (pgpfs) • Demo
  • 20. pgpfs- the bad and the good • The bad: • Very slow
  • 21. pgpfs- the bad and the good • The bad: • Very slow • "Security" through obscurity
  • 22. pgpfs- the bad and the good • The bad: • Very slow • "Security" through obscurity • You do not control where your data is (like the cloud)
  • 23. pgpfs- the bad and the good • The bad: • Very slow • "Security" through obscurity • You do not control where your data is (like the cloud) • You must not lose your .kat file
  • 24. pgpfs- the bad and the good • The good: • keys are never deleted, only revoked • From pgp.mit.edu/faq.html: "Can you delete my key from the key server? No, we cannot remove your key from the key server. When you submit a key to our key server the key is also forwarded to other key servers around the world, and they in turn forward the key to still other servers. Deleting the key from our server would not cause it to be deleted from any of the other servers in the world and so this is not an effective way to ensure the discontinued use of your key."
  • 25. pgpfs- the bad and the good • The good: • keys are never deleted, only revoked • The keyservers become a RAID 1 (cloned) ➡ ➡
  • 26. pgpfs- the bad and the good • The good: • keys are never deleted, only revoked • The keyservers become a RAID 1 (cloned) • It is a fun and hilarious way to abuse the public keyservers