SlideShare a Scribd company logo
Undercover communications
By Dennis Gamayunov
Feb 15, 2014
/whoami
Dennis Gamayunov
 Security researcher
 Network security over 10 years
 Interests: kittens and stuff
Work at . . .
A bit of history
• User communications:
– BBS – late 1970s
– SMTP – 1982
– IRC – 1988
– ICQ – 1996
• Crypto:
– PGP - 1991
Privacy issues
• Unencrypted – anyone accessing the network
may read the messages
• Unauthenticated – anyone may pretend to be
anyone else
• But… deniable
PGP
Install GnuPG, generate a pair of keys for yourself; a
"public key" and a "private key".
The private key is like a regular key. You will use it to
sign and decrypt your messages
You publish your public key by sending it to a PGP key
server on the Internet.
People who wish to send you private email use a copy
of your key to encrypt the message.
You keep the (private) key to yourself, so that only you
can open and read (and sign) the messages.
PGP WoT
• Anyone can upload keys to “Key Servers”- even fake keys
• Authenticity of this public key can be checked as
• If you can verify that a key belongs to its owner, you can
sign that key, indicating that you have verified ownership
• Identify voice
• If not known, any
one else could say he
is owner of key
Make a call
• Check key
properties
Visit him • Search for another
person who verify his
identity
WOT
Example WoT
Trolling WoT
would you sign this key?
pub 1024D/1B629B3D 2005-12-27
Key fingerprint = 965E F829 EA6C
9174 4B46 43E1 4513 9A86 1B62 9B3D
uid u1tr4 l4s3r
<seekrit@hax0r.com>
sub 2048g/1F8E2EEA 2005-12-27
what would you need to know before you did?
Trolling WoT
• OHM2013 talk on fake PGP identities
– https://www.eff.org/event/ohm2013-trolling-
web-trust
• Sample tool available:
https://github.com/micahflee/trollwot
– Add fake signatures to keys
– Brute force PGP key id (and fingerprint)
– Create fake identities for given names and e-mails
and build WoT for them
PGP issues
• Usability of public-key fingerprints
– Hard to remember and pronounce
• Pseudo-word fingerprints
https://github.com/trevp/keyname
• Fake WoTs
• Lack of forward secrecy
– Stolen keys break all security properties of past
messages
Target scenario
• Assumptions
– Alice and Bob both know how to use PGP
– They both know each other’s public keys
– They don’t want to hide the fact that they talked, just what they talked
about
The Internet
Alice
Bob
Bad Guys
Now bad guys act
• Bob’s computer is stolen by “bad guys”
– Criminals, competitors
– Subpoenaed by the FBI
• Or just broken into
– Virus, trojan, spyware, black bag job
• All his key material is recovered
– Oh no!
• Bad guys now can:
– Decrypt past messages
– Learn their content
– Learn that Alice sent them
• And have a mathematical proof they can show to anyone else
• How private is that?
Lots of PGP-based projects available
• PGP-powered e-mail
• IM clients:
– Jabber (Pidgin et al)
– ICQ/AIM
– Basically any IM may be a transport for PGP-MIME
• Even WoT implementations for the Web and
OpenSSH
– http://web.monkeysphere.info/
SILC
• Stands for Secure Internet Live
Conferencing.
• Designed as a secure
replacement for IRC (Internet
Relay Chat), released in 2000.
• Also has some features of
instant messaging.
• Stable implementations for
clients and servers are available.
(http://www.silcnet.org)
SILC protocol
• A server handles channel maintenance and
accepts connections from clients.
• A client connects to a server to join and part
channels.
• A channel is a group of clients that are in the
same conversation.
• No one outside a channel is supposed to be able
to listen in on the conversation.
• It is assumed that each client has already
established a session key with each server to
which it talks
Protocol description (Client)
• If entity A sends something to entity B in SILC, it is always encrypted with
the session key between A and B.
• A client initially connects to a server.
• A connected client can request to join a channel on a server.
• The client knows that it has joined the channel when it receives a channel
key from the server.
• Every time a client joins or parts a channel, a new channel key is
generated and distributed among the remaining channel members.
• Each channel message, instead of being with the session key, is encrypted
with the channel key. However, the packet header (which stores the
source and destination) is still encrypted with the session key.
• A client, when it parts a channel, notifies the server so that it may update
the channel roster and regenerate the channel key.
Protocol description (Server)
• A server, when it receives a join request for a channel from a
client, adds that client to the channel roster if it is not already
there.
• A server, when it receives a part request for a channel from a
client, removes that client from the channel roster if it is there.
• If the channel roster changes, a new session key is created
and distributed to all remaining clients in the channel roster.
• Whenever a message for a channel is received from a client of
which it is a member, it is broadcast to all clients in the
channel roster. (Only the header is reencrypted.)
Protocol example
C1 C2S
Connect
Connect
Join #silctalk
generated-silctalk-key(1)
{Message: “I’m all alone.”}(1)
{C1 message: “I’m all alone.”}(1)
Join #silctalk
generated-silctalk-key(2)
generated-silctalk-key(2)
{Message: “Sup C1.”}(2)
{C2 Message: “Sup C1.”}(2)
{C2 Message: “Sup C1.”}(2)
Part #silctalk
generated-silctalk-key(3)
Part #silctalk
You have joined channel #silctalk
C1: I’m all alone.
C2 has joined channel #silctalk
C2: Sup C1.
You have parted channel #silctalk
You have channel #silctalk
C2: Sup C1.
C1 has parted channel #silctalk
You have channel #silctalk
Forward secrecy
• SILC regenerates the channel key on each
part/leave
• Users may additionally negotiate static
permanent channel encryption key
– Channel messages not visible to the server
– Key management is hard
OTR
• Designed by cryptographers Ian Goldberg and
Nikita Borisov in 2004
• Key features in addition for common
encryption:
– Perfect forward secrecy
– Deniability
Real-life model for OTR: casual
conversations
• Alice and Bob talk in a room
• No one else can hear
– Unless being recorded
• No one else knows what they say
– Unless Alice or Bob tell them
• No one can prove what was said
– Not even Alice or Bob
Perfect Forward Secrecy
• Use a short-lived encryption key
• Encrypt your data with it
• Discard it after use
– Securely erase from memory
• Use long-term keys to help distribute &
authenticate the short-lived key
Repudiable Authentication
• Do not want digital signatures
– Leave non-repudiation for contracts, not
conversations
• Do want authentication
– Can’t maintain privacy if attackers can
impersonate friends
• Use Message Authentication Codes (MACs)
MAC Operation
Data
MAC
MAC
MK
Data MAC
MACMK =?
Alice
Bob
No Third-Party Proofs
• Shared key authentication
– Alice and Bob have same MK
– MK required to compute MAC
• Bob cannot prove that Alice generated the
MAC
– He could have done it, too
– Anyone who can verify can also forge
OTR Protocol phase 1: AKE
• Alice and Bob pick random x, y resp.
• A->B: gx, SignAlice(gx)
• B->A: gy, SignBob(gy)
• SS=gxy a shared secret
• Signatures authenticate the shared secret,
not content
OTR phase 2: Message Transmission
• Compute EK=Hash(SS), MK=Hash(EK)
• A->B: EncEK(M), MAC(EncEK(M),MK)
• Enc is symmetric encryption (AES)
• Bob verifies MAC using MK, decrypts M
using EK
• Confidentiality and authenticity is assured
OTR: re-keying
• Alice and Bob pick x’,y’
• A->B: gx’, MAC(gx’, MK)
• B->A: gy’, MAC(gy’, MK)
• SS’ = H(gx’y’)
• EK’ = H(SS’), MK’=H(EK’)
• Alice and Bob securely erase SS, x, y, and EK
– Perfect forward secrecy
OTR limitations
• Basically online
– Short re-key interval
– Designed for IM
• Basically one-to-one
– Deniable multy-party OTR is a challenge
mpOTR
• Multy-party Off-the-record
communications
• Protocol draft proposed by
Ian Goldberg et al in 2009
• Current development:
– https://moderncrypto.org/
mailman/listinfo/messaging
– http://lists.cypherpunks.ca/
mailman/listinfo/otr-dev
– http://mpotr.secsem.ru/
• Initial implementation
expected in 2014
• Channel establishment
– IRC, XMPP MUC
• Authentication and key
establishment
– Group DH
• Communication
– Preserving message
ordering and causation
• Shutdown
– Publishing ephemeral
keys
Other undercover options available
• TorChat
– Relies on TOR hidden services feature
• CryptoCat
– https://blog.crypto.cat/wp-
content/uploads/2012/11/Cryptocat-2-Pentest-
Report.pdf
– Now implements OTR, bundled as browser plugin
– Aims at mpOTR roadmap
• Gibberbot, TextSecure, Xabber – Android
• ChatSecure - iOS
Undercover communications
The end.

More Related Content

Similar to 5.3. Undercover communications

PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
Sou Jana
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
Infinity Tech Solutions
 
Cryptography & Digital certificate
Cryptography & Digital certificateCryptography & Digital certificate
Cryptography & Digital certificate
Deepak Kumar (D3)
 
Network Security.ppt
Network Security.pptNetwork Security.ppt
Network Security.ppt
ChSheraz3
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
Shafaan Khaliq Bhatti
 
Encryption for Everyone
Encryption for EveryoneEncryption for Everyone
Encryption for Everyone
Coastal Pet Products, Inc.
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 
authentication.ppt
authentication.pptauthentication.ppt
authentication.ppt
AchinikeWinifred
 
20 security
20 security20 security
20 securityabiy2004
 
SHA_and_DS.pdf
SHA_and_DS.pdfSHA_and_DS.pdf
SHA_and_DS.pdf
Santosh Gupta
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Blockchain meetup
Blockchain meetupBlockchain meetup
Blockchain meetup
QuantUniversity
 
Network security
Network securityNetwork security
Network security
Perfect Training Center
 
Digital Certified Mail (PPT)
Digital Certified Mail (PPT)Digital Certified Mail (PPT)
Digital Certified Mail (PPT)
Matthew Chang
 
Build your own network security protocol and get away uncaught
Build your own network security protocol and get away uncaughtBuild your own network security protocol and get away uncaught
Build your own network security protocol and get away uncaught
Daniel Podolsky
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.ppt
IshaKanwal4
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
amit bezalel
 
Overview of SSL & TLS Client-Server Interactions
Overview of SSL & TLS Client-Server InteractionsOverview of SSL & TLS Client-Server Interactions
Overview of SSL & TLS Client-Server Interactions
Katie Knowles
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
SurendraBasnet6
 

Similar to 5.3. Undercover communications (20)

PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 
Cryptography & Digital certificate
Cryptography & Digital certificateCryptography & Digital certificate
Cryptography & Digital certificate
 
Network Security.ppt
Network Security.pptNetwork Security.ppt
Network Security.ppt
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Encryption for Everyone
Encryption for EveryoneEncryption for Everyone
Encryption for Everyone
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
authentication.ppt
authentication.pptauthentication.ppt
authentication.ppt
 
20 security
20 security20 security
20 security
 
SHA_and_DS.pdf
SHA_and_DS.pdfSHA_and_DS.pdf
SHA_and_DS.pdf
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
Blockchain meetup
Blockchain meetupBlockchain meetup
Blockchain meetup
 
Network security
Network securityNetwork security
Network security
 
Digital Certified Mail (PPT)
Digital Certified Mail (PPT)Digital Certified Mail (PPT)
Digital Certified Mail (PPT)
 
Build your own network security protocol and get away uncaught
Build your own network security protocol and get away uncaughtBuild your own network security protocol and get away uncaught
Build your own network security protocol and get away uncaught
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Overview of SSL & TLS Client-Server Interactions
Overview of SSL & TLS Client-Server InteractionsOverview of SSL & TLS Client-Server Interactions
Overview of SSL & TLS Client-Server Interactions
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
E mail security
E   mail securityE   mail security
E mail security
 

More from defconmoscow

7.5. Pwnie express IRL
7.5. Pwnie express IRL7.5. Pwnie express IRL
7.5. Pwnie express IRL
defconmoscow
 
7.4. Show impact [bug bounties]
7.4. Show impact [bug bounties]7.4. Show impact [bug bounties]
7.4. Show impact [bug bounties]
defconmoscow
 
7.3. iCloud keychain-2
7.3. iCloud keychain-27.3. iCloud keychain-2
7.3. iCloud keychain-2
defconmoscow
 
7.2. Alternative sharepoint hacking
7.2. Alternative sharepoint hacking7.2. Alternative sharepoint hacking
7.2. Alternative sharepoint hacking
defconmoscow
 
7.1. SDLC try me to implenment
7.1. SDLC try me to implenment7.1. SDLC try me to implenment
7.1. SDLC try me to implenment
defconmoscow
 
6.4. PHD IV CTF final
6.4. PHD IV CTF final6.4. PHD IV CTF final
6.4. PHD IV CTF final
defconmoscow
 
6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail
defconmoscow
 
6.2. Hacking most popular websites
6.2. Hacking most popular websites6.2. Hacking most popular websites
6.2. Hacking most popular websites
defconmoscow
 
6.1. iCloud keychain and iOS 7 data protection
6.1. iCloud keychain and iOS 7 data protection6.1. iCloud keychain and iOS 7 data protection
6.1. iCloud keychain and iOS 7 data protection
defconmoscow
 
6. [Bonus] DCM MI6
6. [Bonus] DCM MI66. [Bonus] DCM MI6
6. [Bonus] DCM MI6
defconmoscow
 
5.2. Digital forensics
5.2. Digital forensics5.2. Digital forensics
5.2. Digital forensics
defconmoscow
 
5.1. Flashback [hacking AD]
5.1. Flashback [hacking AD]5.1. Flashback [hacking AD]
5.1. Flashback [hacking AD]
defconmoscow
 
5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt
defconmoscow
 
4.5. Contests [extras]
4.5. Contests [extras]4.5. Contests [extras]
4.5. Contests [extras]
defconmoscow
 
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
defconmoscow
 
4.3. Rat races conditions
4.3. Rat races conditions4.3. Rat races conditions
4.3. Rat races conditions
defconmoscow
 
4.2. Web analyst fiddler
4.2. Web analyst fiddler4.2. Web analyst fiddler
4.2. Web analyst fiddler
defconmoscow
 
4.1. Path traversal post_exploitation
4.1. Path traversal post_exploitation4.1. Path traversal post_exploitation
4.1. Path traversal post_exploitation
defconmoscow
 
3.3. Database honeypot
3.3. Database honeypot3.3. Database honeypot
3.3. Database honeypot
defconmoscow
 
3.2. White hat
3.2. White hat3.2. White hat
3.2. White hat
defconmoscow
 

More from defconmoscow (20)

7.5. Pwnie express IRL
7.5. Pwnie express IRL7.5. Pwnie express IRL
7.5. Pwnie express IRL
 
7.4. Show impact [bug bounties]
7.4. Show impact [bug bounties]7.4. Show impact [bug bounties]
7.4. Show impact [bug bounties]
 
7.3. iCloud keychain-2
7.3. iCloud keychain-27.3. iCloud keychain-2
7.3. iCloud keychain-2
 
7.2. Alternative sharepoint hacking
7.2. Alternative sharepoint hacking7.2. Alternative sharepoint hacking
7.2. Alternative sharepoint hacking
 
7.1. SDLC try me to implenment
7.1. SDLC try me to implenment7.1. SDLC try me to implenment
7.1. SDLC try me to implenment
 
6.4. PHD IV CTF final
6.4. PHD IV CTF final6.4. PHD IV CTF final
6.4. PHD IV CTF final
 
6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail
 
6.2. Hacking most popular websites
6.2. Hacking most popular websites6.2. Hacking most popular websites
6.2. Hacking most popular websites
 
6.1. iCloud keychain and iOS 7 data protection
6.1. iCloud keychain and iOS 7 data protection6.1. iCloud keychain and iOS 7 data protection
6.1. iCloud keychain and iOS 7 data protection
 
6. [Bonus] DCM MI6
6. [Bonus] DCM MI66. [Bonus] DCM MI6
6. [Bonus] DCM MI6
 
5.2. Digital forensics
5.2. Digital forensics5.2. Digital forensics
5.2. Digital forensics
 
5.1. Flashback [hacking AD]
5.1. Flashback [hacking AD]5.1. Flashback [hacking AD]
5.1. Flashback [hacking AD]
 
5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt
 
4.5. Contests [extras]
4.5. Contests [extras]4.5. Contests [extras]
4.5. Contests [extras]
 
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
 
4.3. Rat races conditions
4.3. Rat races conditions4.3. Rat races conditions
4.3. Rat races conditions
 
4.2. Web analyst fiddler
4.2. Web analyst fiddler4.2. Web analyst fiddler
4.2. Web analyst fiddler
 
4.1. Path traversal post_exploitation
4.1. Path traversal post_exploitation4.1. Path traversal post_exploitation
4.1. Path traversal post_exploitation
 
3.3. Database honeypot
3.3. Database honeypot3.3. Database honeypot
3.3. Database honeypot
 
3.2. White hat
3.2. White hat3.2. White hat
3.2. White hat
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 

Recently uploaded (20)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 

5.3. Undercover communications

  • 1. Undercover communications By Dennis Gamayunov Feb 15, 2014
  • 2. /whoami Dennis Gamayunov  Security researcher  Network security over 10 years  Interests: kittens and stuff Work at . . .
  • 3. A bit of history • User communications: – BBS – late 1970s – SMTP – 1982 – IRC – 1988 – ICQ – 1996 • Crypto: – PGP - 1991
  • 4. Privacy issues • Unencrypted – anyone accessing the network may read the messages • Unauthenticated – anyone may pretend to be anyone else • But… deniable
  • 5. PGP Install GnuPG, generate a pair of keys for yourself; a "public key" and a "private key". The private key is like a regular key. You will use it to sign and decrypt your messages You publish your public key by sending it to a PGP key server on the Internet. People who wish to send you private email use a copy of your key to encrypt the message. You keep the (private) key to yourself, so that only you can open and read (and sign) the messages.
  • 6. PGP WoT • Anyone can upload keys to “Key Servers”- even fake keys • Authenticity of this public key can be checked as • If you can verify that a key belongs to its owner, you can sign that key, indicating that you have verified ownership • Identify voice • If not known, any one else could say he is owner of key Make a call • Check key properties Visit him • Search for another person who verify his identity WOT
  • 8. Trolling WoT would you sign this key? pub 1024D/1B629B3D 2005-12-27 Key fingerprint = 965E F829 EA6C 9174 4B46 43E1 4513 9A86 1B62 9B3D uid u1tr4 l4s3r <seekrit@hax0r.com> sub 2048g/1F8E2EEA 2005-12-27 what would you need to know before you did?
  • 9. Trolling WoT • OHM2013 talk on fake PGP identities – https://www.eff.org/event/ohm2013-trolling- web-trust • Sample tool available: https://github.com/micahflee/trollwot – Add fake signatures to keys – Brute force PGP key id (and fingerprint) – Create fake identities for given names and e-mails and build WoT for them
  • 10. PGP issues • Usability of public-key fingerprints – Hard to remember and pronounce • Pseudo-word fingerprints https://github.com/trevp/keyname • Fake WoTs • Lack of forward secrecy – Stolen keys break all security properties of past messages
  • 11. Target scenario • Assumptions – Alice and Bob both know how to use PGP – They both know each other’s public keys – They don’t want to hide the fact that they talked, just what they talked about The Internet Alice Bob Bad Guys
  • 12. Now bad guys act • Bob’s computer is stolen by “bad guys” – Criminals, competitors – Subpoenaed by the FBI • Or just broken into – Virus, trojan, spyware, black bag job • All his key material is recovered – Oh no! • Bad guys now can: – Decrypt past messages – Learn their content – Learn that Alice sent them • And have a mathematical proof they can show to anyone else • How private is that?
  • 13. Lots of PGP-based projects available • PGP-powered e-mail • IM clients: – Jabber (Pidgin et al) – ICQ/AIM – Basically any IM may be a transport for PGP-MIME • Even WoT implementations for the Web and OpenSSH – http://web.monkeysphere.info/
  • 14. SILC • Stands for Secure Internet Live Conferencing. • Designed as a secure replacement for IRC (Internet Relay Chat), released in 2000. • Also has some features of instant messaging. • Stable implementations for clients and servers are available. (http://www.silcnet.org)
  • 15. SILC protocol • A server handles channel maintenance and accepts connections from clients. • A client connects to a server to join and part channels. • A channel is a group of clients that are in the same conversation. • No one outside a channel is supposed to be able to listen in on the conversation. • It is assumed that each client has already established a session key with each server to which it talks
  • 16. Protocol description (Client) • If entity A sends something to entity B in SILC, it is always encrypted with the session key between A and B. • A client initially connects to a server. • A connected client can request to join a channel on a server. • The client knows that it has joined the channel when it receives a channel key from the server. • Every time a client joins or parts a channel, a new channel key is generated and distributed among the remaining channel members. • Each channel message, instead of being with the session key, is encrypted with the channel key. However, the packet header (which stores the source and destination) is still encrypted with the session key. • A client, when it parts a channel, notifies the server so that it may update the channel roster and regenerate the channel key.
  • 17. Protocol description (Server) • A server, when it receives a join request for a channel from a client, adds that client to the channel roster if it is not already there. • A server, when it receives a part request for a channel from a client, removes that client from the channel roster if it is there. • If the channel roster changes, a new session key is created and distributed to all remaining clients in the channel roster. • Whenever a message for a channel is received from a client of which it is a member, it is broadcast to all clients in the channel roster. (Only the header is reencrypted.)
  • 18. Protocol example C1 C2S Connect Connect Join #silctalk generated-silctalk-key(1) {Message: “I’m all alone.”}(1) {C1 message: “I’m all alone.”}(1) Join #silctalk generated-silctalk-key(2) generated-silctalk-key(2) {Message: “Sup C1.”}(2) {C2 Message: “Sup C1.”}(2) {C2 Message: “Sup C1.”}(2) Part #silctalk generated-silctalk-key(3) Part #silctalk You have joined channel #silctalk C1: I’m all alone. C2 has joined channel #silctalk C2: Sup C1. You have parted channel #silctalk You have channel #silctalk C2: Sup C1. C1 has parted channel #silctalk You have channel #silctalk
  • 19. Forward secrecy • SILC regenerates the channel key on each part/leave • Users may additionally negotiate static permanent channel encryption key – Channel messages not visible to the server – Key management is hard
  • 20. OTR • Designed by cryptographers Ian Goldberg and Nikita Borisov in 2004 • Key features in addition for common encryption: – Perfect forward secrecy – Deniability
  • 21. Real-life model for OTR: casual conversations • Alice and Bob talk in a room • No one else can hear – Unless being recorded • No one else knows what they say – Unless Alice or Bob tell them • No one can prove what was said – Not even Alice or Bob
  • 22. Perfect Forward Secrecy • Use a short-lived encryption key • Encrypt your data with it • Discard it after use – Securely erase from memory • Use long-term keys to help distribute & authenticate the short-lived key
  • 23. Repudiable Authentication • Do not want digital signatures – Leave non-repudiation for contracts, not conversations • Do want authentication – Can’t maintain privacy if attackers can impersonate friends • Use Message Authentication Codes (MACs)
  • 25. No Third-Party Proofs • Shared key authentication – Alice and Bob have same MK – MK required to compute MAC • Bob cannot prove that Alice generated the MAC – He could have done it, too – Anyone who can verify can also forge
  • 26. OTR Protocol phase 1: AKE • Alice and Bob pick random x, y resp. • A->B: gx, SignAlice(gx) • B->A: gy, SignBob(gy) • SS=gxy a shared secret • Signatures authenticate the shared secret, not content
  • 27. OTR phase 2: Message Transmission • Compute EK=Hash(SS), MK=Hash(EK) • A->B: EncEK(M), MAC(EncEK(M),MK) • Enc is symmetric encryption (AES) • Bob verifies MAC using MK, decrypts M using EK • Confidentiality and authenticity is assured
  • 28. OTR: re-keying • Alice and Bob pick x’,y’ • A->B: gx’, MAC(gx’, MK) • B->A: gy’, MAC(gy’, MK) • SS’ = H(gx’y’) • EK’ = H(SS’), MK’=H(EK’) • Alice and Bob securely erase SS, x, y, and EK – Perfect forward secrecy
  • 29. OTR limitations • Basically online – Short re-key interval – Designed for IM • Basically one-to-one – Deniable multy-party OTR is a challenge
  • 30. mpOTR • Multy-party Off-the-record communications • Protocol draft proposed by Ian Goldberg et al in 2009 • Current development: – https://moderncrypto.org/ mailman/listinfo/messaging – http://lists.cypherpunks.ca/ mailman/listinfo/otr-dev – http://mpotr.secsem.ru/ • Initial implementation expected in 2014 • Channel establishment – IRC, XMPP MUC • Authentication and key establishment – Group DH • Communication – Preserving message ordering and causation • Shutdown – Publishing ephemeral keys
  • 31. Other undercover options available • TorChat – Relies on TOR hidden services feature • CryptoCat – https://blog.crypto.cat/wp- content/uploads/2012/11/Cryptocat-2-Pentest- Report.pdf – Now implements OTR, bundled as browser plugin – Aims at mpOTR roadmap • Gibberbot, TextSecure, Xabber – Android • ChatSecure - iOS