Re: Can we trust RedHAt encryption tools?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 01/09/2014 04:55 PM, John R Pierce wrote:
> On 1/9/2014 1:27 PM, Kanwar Ranbir Sandhu wrote:
>> I think everyone should assume the entire ecosystem is compromised and
>> shouldn't trust anything.  Code should be reviewed and bugs/weaknesses
>> removed IMMEDIATELY.  The problem is obviously not everyone is a
>> programmer and not everyone will have the knowledge to understand how to
>> fix/improve the security issues.  Of course, some software is still
>> good, but who's going to verify that and when?  If you don't use free
>> software, you're a goner because now you have no ability whatsoever to
>> audit the code!
> I've programmed for 40 years, and I don't understand encryption
> algorithms nor can I evaluate their strengths and weaknesses.   I know
> very few programmers who can.  None personally, in fact.

I work with real cryptographers.  I do not consider myself one.  I am a 
crypto protocol designer; a different breed.  You basically trust the 
math and the arguments put forward by the real cryptographers.  There is 
LOTS of public review and comment.  But we recognize that the largest 
employer of mathmeticians is the NSA.  If there is an exploitable lever, 
they will know about it before we will; I have a real experience with 
this back with IPsec and the implicit IV ESP proposal.

So some programmer has to take the math for the crypto algorithms and 
implement it correctly.  In many cases, this ends up being done at least 
in firmware, and in some cases actual chips (I work mostly, these days, 
with sensors).  Then you have to trust the likes of me to design the 
crypto protocol right.  There are lots of subtle traps here; I have the 
scars to show it.  Then programmers again have to take our crypto 
protocols and do them right....

You get the picture.

If you do not trust the NIST (read NSA) EC curves, you have two 
choices.  Dan Berstein's curves (Dan is a long time anti guy, and Bruce 
Schneier is a long time friend of Dan, and me).  Or the Braintrust 
curves; they are published in an RFC (seems good to me, and I have heard 
some good references on their work).

But really, the NIST curves have been under extensive review.  They are 
used both by the govs and banking; NSA knows if they can figure out 
weaknesses, so can other large gov funded math teams.  The big event was 
the RNG that NSA had added, and the public community came down on it 
almost from the get-go.

You want to talk about leaky code?  Look how corporate mail proxies work 
to enable them to read encrypted emails.  Simple lying about certs.


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux