Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Encryption Government United States

FREAK, Logjam, DROWN All a Result of Weaknesses Demanded By US Gov't (csoonline.com) 70

itwbennett writes: You need look no further than the FREAK and Logjam attacks in 2015 and the DROWN attack announced just this week to get a sense of 'the dangers of deliberately weakening security protocols by introducing backdoors or other access mechanisms like those that law enforcement agencies and the intelligence community are calling for today,' writes Lucian Constantin. But this isn't a new problem. 'One approach [the government] used throughout the 1990s [to keep encryption under its control] was to enforce export controls on products that used encryption by limiting the key lengths, allowing the National Security Agency to easily decrypt foreign communications,' says Constantin. 'This gave birth to so-called 'export-grade' encryption algorithms that have been integrated into cryptographic libraries and have survived to this day.'
This discussion has been archived. No new comments can be posted.

FREAK, Logjam, DROWN All a Result of Weaknesses Demanded By US Gov't

Comments Filter:
  • by Archangel Michael ( 180766 ) on Thursday March 03, 2016 @12:41PM (#51629561) Journal

    The way around the stupid laws that do not protect anyone from anything, is to import crypto from outside the US that is better and more robust than the stupid crippled versions mandated by US Law.

    • by freeze128 ( 544774 ) on Thursday March 03, 2016 @12:51PM (#51629671)
      But would a US Citizen trust encryption from another country to not have a backdoor or other such weakness that might allow that country's government to crack it easily?
      • by Bert64 ( 520050 ) <bert AT slashdot DOT firenzee DOT com> on Thursday March 03, 2016 @12:57PM (#51629719) Homepage

        No, but would you necessarily trust the US government either...
        The difference is that the US government has more reason to spy on a random US citizen then a foreign government does, and are more likely to do something with the information.
        If you're going to use something thats backdoored, better to have it backdoored by someone who has no interest in you.

        • Why on earth would the govt want to spy on you? You think some NSA nerd is sitting behind his star trek console watching your every move?

          • by Bugler412 ( 2610815 ) on Thursday March 03, 2016 @01:05PM (#51629813)
            Because it's been shown that in many data streams that they collect ALL communications and store it for future fishing expeditions, not only the specific target of interest at that point in time. There's no guarantee of you, your company or your (whatever) not becoming a target of interest in the future if say, for instance, some fascist demagogue was elected to office, (strictly hypothetical of course lol)
            • by Z80a ( 971949 )

              Or a corporate overlord, or a socialist nutjob that is probably the best option due being too pussy to do what he wants to.

          • by Sperbels ( 1008585 ) on Thursday March 03, 2016 @01:18PM (#51629923)
            Haven't you been paying attention to the government's whole argument for weakening encryption? Because one out of every few million nobodies like you and me become radical bombers and do things like blow up sky scrapers/marathons/etc and they want to be able to track down all your friends, family, and associates after the event.
          • by Anonymous Coward

            You're a moron. IT'S NOT ABOUT THE NSA SPYING ON YOU. It's about the NSA opening up holes in encryption that OTHERS use to spy on you ALSO.

          • You know for sure he wasn't the victim of so-called "LOVEINT"?

            NSA does have to watch at least someone, or else it would just be money blown out. What makes you so sure it's not HIM?

      • Good question. Because communism! And terrorists!
      • by Anonymous Coward on Thursday March 03, 2016 @02:18PM (#51630465)

        Do you use SSH? A heck of a lot of US citizens do and trust it. It wasn't written in the US because of the crazy encryption restrictions the government has. The OpenBSD group runs it.

        http://www.openssh.com/history.html

        "for the ssh protocol in the 2.6 release, but we had to make sure that it was perfect. Therefore, we decided to immediately fork from the OSSH release, and pursue rapid development using the same process as the original OpenBSD security auditing process. The initial import was done on Sep 26, 1999, and, at the time of release two months later, many of the source code files were already at RCS revision 1.34... some as high as 1.66. Development went very fast indeed, since we had a deadline to meet.

        The following team members participated:

                Theo de Raadt (CANADA) started by removing non-portabilities which made the code harder to read -- the goal being simpler source code, so that security holes and other issues could be spotted easier.
                Niels Provos (GERMANY but living in USA) quickly removed the remaining cryptographic and GPL'd components by doing road trips to Canada, so that we could end up with a completely freely reusable source code base.
                Markus Friedl (GERMANY) jumped in and very quickly managed to replace the SSH 1.3 protocol code from the 1.2.12 release, with a SSH 1.5 protocol implementation compatible with the modern "ssh 1.2.27" series (this change was needed to operate with a lot of SSH-compatible Windows clients which lack support for SSH 1.3 protocol). His implementation is now used in OSSH. He added SSH 1.5 protocol support in such a way that SSH 1.3 protocol support remained operational. Later, he also added support for SSH 2 protocol and SFTP.
                Bob Beck (CANADA) helped with Makefile magic to ensure that we could compile OpenSSL without patented algorithms. Because OpenBSD 2.6 was shipping before the RSA patent expiration date, we needed to ship our CD with libssl and libcrypto shared libraries which lacked RSA. At install time, the user was able to replace these libraries via FTP/HTTP over the Internet. Luckily this kind of hackery is no longer needed.
                Aaron Campbell (CANADA) improved numerous documentation flaws and a few other code problems. It is mostly due to him that the manual pages are so complete.
                Dug Song (USA) helped with some authentication issues in the KerberosIV case (his changes were carefully checked to ensure they stayed away from any cryptography, and only touched on authentication issues). "

      • But would a US Citizen trust encryption from another country to not have a backdoor or other such weakness that might allow that country's government to crack it easily?

        Export of crypto is limited. Inside the US you can use anything. IIRC the Supreme Court already ruled speaking encrypted is protected by the First Amendment.

    • I keep seeing this statement to import crypto from outside the US but I haven't seen any download links.
      • Re: (Score:2, Informative)

        by Anonymous Coward

        Canada [libressl.org]
        Germany [gnupg.org]

      • by Anonymous Coward

        Back when export control was still an issue, the not-yet-greybeards would get their PGP here [pgpi.org], which is in Norway.

      • by iggymanz ( 596061 ) on Thursday March 03, 2016 @01:28PM (#51630015)
      • by Xtifr ( 1323 )

        These days (since around 2001), open-source software is basically exempt from the US ITAR export rules (with some qualifications—if you're planning to export crypto software source yourself, you need to check out the rules). Back before that was true, every major Linux distro had sites in Europe to host the essential crypto software (e.g. nonus.debian.org).

        So, I dunno about Windows or MacOS, but with Linux, the reason you haven't seen any download links is probably that you're too young!

        • So, I dunno about Windows or MacOS, but with Linux, the reason you haven't seen any download links is probably that you're too young!

          I started compiling Linux source in 1997 in my early 30's I routinely downloaded from Australian FTP servers because a fast link existed between there and Silicon Valley for downloading on a 56K modem. Crypto software has never been an issue for me until now.

    • by mi ( 197448 ) <slashdot-2017q4@virtual-estates.net> on Thursday March 03, 2016 @01:05PM (#51629817) Homepage Journal

      stupid laws that do not protect anyone from anything

      Of course, they do protect — encryption is a weapon [theguardian.com] and you try to limit access to your best stuff [quora.com]. Yes, the enemies may still be able to get some of it, but your efforts make it harder for them.

      Cryptography advances outside of the US made the point moot by early nineties, and the export-restrictions [wikipedia.org] were dropped. But they weren't "stupid" — except, maybe, for the very last year or two.

      The article's emphasis is all wrong — the vulnerabilities are due to poor design of SSL2 [wikipedia.org] and the coding practices of OpenSSL [acm.org] developers leading to poor implementation of the rest. Neither of these problems is due to the government's export-restrictions.

      • Where are my mod points when I need them.

        Although, there have been documented instances where the feds meddled in things, like Dual_EC_DRBG.... So lets not assume the governments hands are completely clean.. but in this case, yeah the feds had no involvement.

      • Cryptography advances outside of the US made the point moot by early nineties, and the export-restrictions were dropped. But they weren't "stupid" — except, maybe, for the very last year or two.

        Yes, they were stupid. There were no significant cryptographic primitives in use in the US about which full details hadn't been published, or indeed, of which implementations weren't available worldwide. Many of the "export-grade" ciphers were the same ciphers used in the US, just with arbitrary restrictions on key length.

        There was no point in time where encryption tools available to US corporations and citizens were significantly better than tools available outside of the US.

      • Of course, they do protect — encryption is a weapon [theguardian.com] and you try to limit access to your best stuff [quora.com]. Yes, the enemies may still be able to get some of it, but your efforts make it harder for them.

        More relevant, encryption is a defense. And it's that aspect of it where limiting access to it is harmful.

  • ..so they can hoist their own petard themselves.

    Seriously, US Gov't -- keep digging, you'll finish your grave soon 'nuff.

    • ..so they can hoist their own petard themselves.

      I thought that they needed a mortar and especially a mortar shell, to hoist on their own petard.

    • by Salgak1 ( 20136 )
      You have no idea. I'm currently getting static about patching glibc and OpenSSL outside the "normal monthly patch cycle". Which was 3 versions behind **BEFORE** GHOST and DROWN surfaces. . .
    • . . . . all the lamp-posts in DC have been changed out from the standard pole-and-boom to strictly vertical posts. It's as if the expected the citizens to one day rise up, and do the hoisting. . . . (evil grin)
  • by xxxJonBoyxxx ( 565205 ) on Thursday March 03, 2016 @12:55PM (#51629705)
    I remember the 1990's crypto wars. But we've also had plenty of time to refactor our code, create secure-by-default installations and disable insecure implementations. In fact, as an industry, we've done it before for SSL 2.0, MD5, SSL 3.0, RC4 and now SHA1.
    • Indeed. It's been known for quite a while that older SSLs were crap, even before DROWN. When the CVE hit, I checked the servers I'm responsible for, and discovered that I'd already disabled SSLv2 not long after I took the job. I'd simply forgotten having done so.

  • I like his last line: "...let's hope that we won't make the same mistake again." Wasn't it John Paul Jones that said, "We have not yet begun to make mistakes!"? I might not have that right.
  • not that I'm in favor of government intervention, but those were all implementation errors. anything designed and built by humans has them.
  • Base libraries like these are often widely used but everybody assumes somebody else has done the code reviews and exploit testing. It took some major exploits like heartbleed to make people realize that OpenSSL was understaffed, full of cruft and really far from the ideal crypto library. Yes, in this case it was a downgrade exploit to an export cipher. That doesn't mean the US government is generally at fault for downgrade attacks, it's poor coding. That a library might have support for old yet known flawed

  • It's not like it's hard to export things over the Internet, even if it's "against the law", and it only has to be done once.

    This sounds like a law put in place more for "the feels" than to actually accomplish anything.

  • [ REDACTED by order of the NSA]

    [ REDACTED by order of the NSA]

    and my personal favorite:

  • Perhaps companies/groups that write such software could implement a "warrant canary." See https://en.wikipedia.org/wiki/... [wikipedia.org]

    Once you are served with a secret warrant, you are legally bound not to disclose that you have been served. They can however stop updating the "We have not been served" status on their website letting users/people know that they have been served.

    If you work on an security project and haven't been served, please do this now. And blink twice if you can't say anything....

    • Re:Warrant canary (Score:4, Interesting)

      by Bugler412 ( 2610815 ) on Thursday March 03, 2016 @01:52PM (#51630235)
      that works until the next precedent setting court case that determines that failing to update the warrant canary is a form of communication prohibited by the gag order due to the intent of the operator. Coming soon to a federal court near you I'm sure.
      • by JoelKatz ( 46478 )

        I wonder if there's any case law on failing to prevent the existence of a secret warrant becoming known through intentional inaction was prosecuted. The cases might be analogous.

      • by Anonymous Coward

        That would be an interesting case indeed because it would compel parties to engage in a form of speech against their will.

        http://law2.umkc.edu/faculty/projects/ftrials/conlaw/compelledspeech.htm

  • I remember those good old days and the choices you got to download software:

    Click here if you're with the USA, or you want better encryption, or you're a terrorist, or you think this concept is retarded.
    Click here if you're an idiot and outside the USA.

  • Special NSA user with root rights and a separate password for every installation (on every OS and platform), so that leaked credentials for one computer doesn't affect any other - creation of such a user can be done during online activation.Yes that requires that online activation should be secure process. I don't think this is genius idea, but it should be better than a backdoor in every OS that can be used with no credentials check.
    • by JoelKatz ( 46478 )

      I'm ignoring the legal and moral issues and looking only at the technical ones.

      If access was only for national security, that might work. But the problem is that law enforcement around the country wants access to this information any time any judge anywhere issues a warrant. That would mean the database of such passwords would be accessed by thousands of people around the country every day.

      Some of those passwords would protect a twelve year old's text messages with their friends. Some of them would protect

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...