Month: August 2011

New Zealand SIS Only Uses SSL To Protect Public Informants’ Privacy

UPDATE 2011-08-26: I stand corrected. Here’s what Peter Gutmann said when asked whether SSL provides sufficient protection for NZSIS’ tip-off form (note: “phone them” refers to NZSIS’ existing public tip-off telephone number): “It depends what the threat model is. Given that the alternative is to phone them, that I can’t imagine anyone caring about intercepting random comments by random members of the public, and that 99.9% of said members of the public won’t be able to deal with anything more complex than that, it’s probably good enough.” That makes sense. More sense than me highlighting an attack that is theoretically possible but of which the cost outweighs the benefit in real life — in nearly all, if not all, real-life scenario’s.

UPDATE 2011-08-25: it appears that NZSIS removed the PGP key [2] from the source of https://providinginformation.nzsis.govt.nz/vwi/.

UPDATE 2011-08-21: As areopagita stated in comment below (thx!), the Soghoian/Stamm attack is indeed independent of the issuer; I only focus on a specific scenario here. Perhaps the following provides some clarification. Internet Explorer and Firefox are distributed with a root certificate of the Dutch govt, “Staat der Nederlanden”, installed by default (check your browser!). The Dutch govt might ask, coerce or compromise a New Zealand ISP to redirect providinginformation.nzsis.govt.nz to an IP address under Dutch govt control, and then, via a self-issued SSL-certificate for providinginformation.nzsis.govt.nz, see whatever is sent via the tip-off form; and perhaps even decide not to relay it to NZSIS. The fact that the Dutch govt (or Verisign, or etc.) can issue an SSL-cert that is automatically trusted by the browsers used to provide security tip-offs to New Zealand’s intelligence service to me seems a practical risk for both NZSIS and informants. If you have an opinion about this, please comment! I informed NZSIS about this post.

====== START OF ORIGINAL BLOGPOST FROM 2011-08-19 ======

Via IntelNews.org I learned that the New Zealand Security Intelligence Service (NZSIS) opened up a public tip-off form at providinginformation.nzsis.govt.nz. The form is protected by SSL (Verisign-issued certificate), but due to the attack explained in [1], I believe SSL offers an unacceptably low level of privacy protection to New Zealand’s public informants. The actual form is loaded in an IFRAME, and its source contains a (public) PGP key [2] — but it can’t be trusted to be authentic, because it’s sent over what should be assumed to be an insecure channel. I decided to submit an obviously nonsensical test-tip while Firebugging my connection, and low and behold: the information I entered is HTTP POST’d via XMLHttpRequest in unencrypted-by-PGP form in the Aviarc.datasets variable. So basically, if you submit a tip, the only protection you have is the Verisign-signed SSL cert. It’s not for me to decide, but I’d personally rather not take that risk when tipping off NZSIS about, e.g., presence of, hypothetically, US spies in New Zealand. Does New Zealand really have such urgency for public tip-offs that this insufficient level of protection of informants is considered acceptable for now?

[1] Christopher Soghoian and Sid Stamm, Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL (.pdf), presented at HotPETS 2010, Berlin

[2] The PGP key (4096 bit RSA, created 2011-07-19, never expires):

—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2.0.17 (MingW32)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=+R2P
—–END PGP PUBLIC KEY BLOCK—–

WikiLeaks, Andy Müller-Maguhn and Google-cache

UPDATE 2011-08-21: Cryptome published “Wikileaks Public Relations Certified Ventriloquy” (.pdf, cryptome.org) (mirror)

UPDATE 2011-08-20: It appears that the Google-cache for wikileaks.org/Media.html was updated on August 17th, and that that copy (already) not longer contains the name Andy Müller-Maguhn. I believe this means that Media.html was changed between August 13th and August 17th, and that Media.html may have been renamed to Press.html after that. This new information still ‘fits’ both the scenario of deliberate removal by WikiLeaks (with noble or less noble motivation) and the neutral scenario of coincidence. You can still see AMM’s  affiliation (which has been mentioned on WikiLeaks.org right until the recent events around DDB) by searching Google for “site:wikileaks.ch maguhn”. Screenshot

I solicited confirmations of this via Twitter: zero, one, two, three, four.  If WL acted in bad faith themselves while aggressively attacking DDB’s integrity, that needs to be brought to light.  For now I assume that WL removed AMM from the list because he has perhaps not been working with WL for a long time and that removing him from the list would prevent the kind of speculation that I’m doing here. Dear WikiLeak, clarify why the change happened at the time of DDB’s excommunication from CCC Berlin.

====== START OF ORIGINAL BLOGPOST FROM 2011-08-19 ======

Here’s an outsider observation:

I could not find any mention by WikiLeaks of this change (neither on Twitter, nor WLcentral, nor via Google search), although it seems highly relevant to ex-Wikileaks person Daniël Domscheit-Berg being kicked out of CCC(‘s Berlin chapter) (as told) by Andy Müller-Maguhn — which is said to have happened on the evening of Saturday August 13th (which also happens to be the time of the last Google cache copy mentioned above). The name may have been removed to prevent misunderstanding (=good), to cover a conflict of interest (=bad), or be coincidental. I’m not looking for trouble, but I’m too uninformed to know how to decide here and it is wasn’t me who started the Infinite Improbability Drive. I will update this blogpost to reflect advancing insight, including redress and apologies if it turns out I’m contributing FUD in stead of raising a reasonable doubt.

Also, the meaning of this all is perhaps modest; whether DDB is affiliated with CCC Berlin and whether there was any conflict of interest in those deciding on his CCC Berlin affiliation changes neither WikiLeaks nor OpenLeaks. But if the change was made to cover up conflict of interest, it does, IMHO, (slightly) level the playing ground between both as far as integrity is concerned.

[1]
“Andy Müller-Maguhn 
Concentrates on technological and social developments in the area of electronic networks. He has been a member of the Chaos Computer Club since the early eighties and serves on its board. The main part of this work lies within the future-compatible structures and lifeforms and in the attempt to support those developments through transparency
andy@ccc.de”

[2]
irbaboon:~ monkey$ telnet wikileaks.org 80
Trying 178.33.255.46…
Connected to wikileaks.org.
Escape character is ‘^]’.
GET /Media.html HTTP/1.0

HTTP/1.1 404 Not Found
Server: Varnish
Retry-After: 0
Content-Type: text/html; charset=utf-8
Content-Length: 416
Date: Fri, 19 Aug 2011 11:07:27 GMT
X-Varnish: 2012796697
Age: 0
Via: 1.1 varnish
Connection: close

[3]
irbaboon:~ monkey$ telnet wikileaks.org 80
Trying 178.33.255.46…
Connected to wikileaks.org.
Escape character is ‘^]’.
GET /Press.html HTTP/1.0

HTTP/1.1 200 OK
Server: Apache/2.2.16 (Debian)
Last-Modified: Thu, 18 Aug 2011 11:47:51 GMT
ETag: “1e00a5c-6a64-4aac62eb987c0”
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 27236
Date: Fri, 19 Aug 2011 11:06:57 GMT
X-Varnish: 2012796559
Age: 0
Via: 1.1 varnish
Connection: close

Enriching The ‘RSA Employee #15666’ Dump + Stats

UPDATE 2014-03-29: fixed broken links to the gzip’d CSV and MySQL files.
 
In EXCLUSIVE: Leaked “RSA dump” appears authentic at Risky.biz I read that on August 15th 2011 the “RSA Employee #15666” dump was posted here. I have no opinion on its authenticity. Please read the post at Risky.biz for analysis; I merely provide additional data and stats here.

The original dump contains 870 entries consisting of:

1. hostname
2. IP address

I enriched the data by adding:

3. my own lookup of the A-record for (1)
4. my own lookup of the PTR-record for (2)
5. GeoIP data for (1) = country, state, city, zip, GPS, organization
6. IP2ASN mapping for (1) = ASN, network description via whois.cymru.com

All lookups were run from an IP address in AS1103 (SURFNET-NL) on August 18th 2011 at 20:00-21:30 UTC+2. I mention the latter because the DNS/AS situation may have been deliberately changed since the dump was publicly posted (August 15th) or announced (August 18th).

Here is the enriched dump (SSL cert sig should be 01:00:00:00:00:01:1C:9E:A3:54:3F):

20110818_RSA15666_enriched.csv.gz (CSV)
20110818_RSA15666_enriched.sql.gz (MySQL dump)

Some quick stats: HERE (mirror).

DO NOT TRUST MY DATA. VERIFY IT. If the data or stats are wrong, please inform me (Twitter: @mrkoot or e-mail: koot=>uva.nl). I will change this blogpost to reflect advancing insight.

DEF CON 19 and NSA recruiting hackers

On August 4th 2011, D.J. Pangburn‘s An Open Letter to Defcon Hackers: Don’t Sell Out to the NSA turned up. Later that day, Bill Brenner wrote Hackers selling out by working for NSA? I’m not convinced. Here’s what John Young thinks of Brenner’s piece (cited from e-mail w/permission):

Completely idiotic article, quite deceptive. It omits the lifetime 
secrecy agreements required for NSA employees and that any
whistleblowers are prosecuted if they reveal anything really
secret. There are hundreds of court cases showing what NSA
does to anyone who tries to leave or tells what goes on inside
the Agency.

One does not leave NSA as if the military, one does not leave
without agreeing to never tell what goes on inside. That is a
solemn contract agreed to before entry and an even more
serious sterilization undergone if one insists on resigning.
Severe criminal penalities are described in great detail and
you sign that you understand them without reservation.

And you are forever watched to assure you don't do what
the silly author says you can do to bring about change. He is
a lying son of a bitch, either through unwitting ignorance or
through witting deliberate misrepresentation.

These conditions apply to all secrecy organizations. The
periodic disclosures by ex-members are not to be believed,
they make the not terribly revealing disclosures as a
continuing part of their job through whistleblowing, novels,
movies, confessions, and the like.

You cannot escape, this is what was taught in the ancient
days of one-way-in, no-way-out secret societies and remains
true today. Recruiters are devious as they must be or nobody
would join the secretkeepers if they knew the truth of what was
in store for them to give up control of their lives and minds
forever, and remain compelled to lie, lie and lie some more,
and, to be sure, recruit noobs by writing noobish nonsense.

John
 

Now, how is one to decide where to draw the line between realistic concern and paranoia?