Done yesterday (20100927 Mo)
2010-09-28 07:59 am![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
0927 Mo * up 6:30; W=197.6; drugs, nose, teeth; coffee, breakfast @ U.S. Wants to Make It Easier to Wiretap the Internet - NYTimes.com Somebody needs to explain Diffie-Hellman to these idiots $ hsx: $15 from Lee @work * lunch @ Sr. J's with (coworker) Jake after smashing bug all morning (Jake's upgrade interacting with my use of `pwd` for symlink targets. % aha: maybe I don't do things like music because they're "fun", and there are two many not-fun things that need doing. * Some actual _work_, as in programming. About time. * need 3-way bulb for new torchiere @ gmcdavid - First Observation of Hawking Radiation @ REI - Packing Smart: Tips and Checklist Travel Preparation Checklist Astounding Arches In Pavilion of 33,000 Beer Crates (Photos) : TreeHugger & Pidgin, OTOH, doesn't seem to be working. Network Manager idiocy. -> needs -f to force it to ignore the stupid netmanager * much of the way through the left-hand paper pile on the desk . track down paperwork for Wendy: * W2's, * stmts from Wells, * pay stubs, stmts from both retirement acct's (current, old) * 2009 W2 missing - check attic -> what were the folders doing _there_? x o T. Roe Price o Ricoh * Hartford (sort of)
OK, yesterday morning was pretty insane. An implementation decision that
I made ages ago, basically applying best practices and using
/bin/pwd
to compute the absolute path for a symlink target,
blew up in our faces when /home
got moved to a bigger disk by
changing the symlink. Oops. Bind mounts to the rescue, and we managed to
get it all diagnosed and temporarily fixed before any of the trial
users got caught by it. Just barely. Kudos to the QA team for promtly
reporting the problem.
In the afternoon I actually got some work done, finally. And made considerable inroads on the huge pile of paper to the left of my keyboard. (Looking for some bank statements that mostly didn't get found, so hopefully we can get away without them.)
The day's major insight: I tend not to do things like music that I know I'll enjoy. Could that be because I know there are so many things I know I won't enjoy that still need doing, and that are "more important"?
And now the U.S. Wants to Make It Easier to Wiretap the Internet -- somebody needs to explain the implications of Diffie-Hellman key exchange to these idiots.
Some more, and more fun, links under the cut.
no subject
Date: 2010-09-28 04:01 pm (UTC)Do you mean that if you and I exchange keys in advance and encrypt our communications with them, it's impossible (either in fact or in practice) to decrypt them without the keys?
Because from what I heard on NPR news, what they're trying to get is access to communications via devices and services (at least some of) which are readily available, are not currently effectively tappable, and do not (out-of-box) support encryption.
Not that that makes the government's request any more or less acceptable.
Cryptography...
Date: 2010-09-29 01:55 am (UTC)This is done using a specific math problem that has two important properties:
1) The best solution to the problem that would need to be solved by anyone who could see the actual messages but not in the message flow -- i.e., an eavesdropper -- is currently believed (but not proven) to be "polynomial time" -- meaning, it is between 'linear' and 'exponential'. This is the same way that 1024-bit RSA is considered to give about 117 bits of entropy, by the NIST -- essentially the same amount of probability that would cause any two independent runs of 117 independent coin-flips to occur in *precisely* the same sequence from beginning to end.
2) The same problem is faced by someone who wishes to maliciously spoof messages to either recipient, and it's made less tractable because of the more contemporaneous need for the key. (However, it is possible for malicious Mallory to create two separate and independent protocol interactions, one each to Alice and Bob, and convince each that he is the other, unless Alice and Bob authenticate themselves by some other means once the channel is established.)
Once the channel is established, either side can state what the channel parameters are to the other, and without the addition of a "message authentication code" (essentially a seed to a secure hash function and its verification on every message received) it is possible to end up with a "man in the middle" who is listening to everything that you say.
Diffie-Hellman-Merkle is used in later versions of Transport Layer Security (formerly called SSL) to negotiate a secure channel with "perfect forward secrecy", meaning that if the key is broken for a past interaction, the security of all succeeding keys remains intact.
On its own it doesn't say *anything* other than you're talking to someone who knows how to speak the protocol; the session key must be authenticated in some other manner. This can be performed many ways, such as via asymmetric key certificates (such as found in PGP or X.509), or by proving that the same obscure piece of information is known to both parties (which is the general technique used by an IM-service agnostic system called "Off The Record", available from http://www.cypherpunks.ca/otr/ ; it can run as an AIM proxy for you to use the original AIM client, or it can run as a plugin for such free software as Pidgin (Windows/Linux) or Adium (MacOS X)).
Wikipedia has a really good article at http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange , that says it best: It "is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel."
Essentially, its implications are that it is possible for anyone, at any point, to establish and enforce a policy in any communication across a known-insecure channel such that the content of the messages between the parties cannot be recovered without corruption of either endpoint, blind luck, or a lot more computing power and time than can possibly exist in the universe.
Participating in the protocol relies upon the introduction of two specific mathematical concepts: exponentiation and modular arithmetic. Explaining it usually requires pre-algebra. See Wikipedia for more details.