[LINK] Perfect Forward Secrecy

stephen at melbpc.org.au stephen at melbpc.org.au
Sat Nov 23 15:50:35 AEDT 2013


"Twitter tightens security against NSA snooping"

The company calls on others to embrace 'perfect forward secrecy'

By Martyn Williams (IDG News Service) 22 November, 2013
http://www.arnnet.com.au/article/532682/twitter_tightens_security_against_n
sa_snooping/


Twitter has implemented new security measures that should make it much more 
difficult for anyone to eavesdrop on communications between its servers and 
users, and is calling on other Internet companies to follow its lead.

The company has implemented "perfect forward secrecy" on its Web and mobile 
platforms, it said Friday. The technology should make it impossible for an 
organization to eavesdrop on encrypted traffic today and decrypt it at some 
point in the future.

At present, the encryption between a user and the server is based around a 
secret key held on the server. The data exchange cannot be read but it can 
be recorded in its encrypted form. Because of the way the encryption works, 
it's possible to decrypt the data at some point in the future should the 
server's secret key ever be obtained.

With perfect forward secrecy, the data encryption is based on two short-
lived keys that cannot be later recovered even with the knowledge of the 
server key, so the data remains secure.

It's an important principle, because while encryption traffic is difficult 
to break with current computer technology, innovations in computing 
hardware and systems might make it easier to break in the future. Perfect 
forward secrecy should ensure data remains secure no matter the advances in 
computer technology.

Twitter didn't provide a reason for the switch, but it did link to a blog 
post by the Electronic Frontier Foundation that suggested the method be 
used as a way to stop the National Security Agency (NSA) or another party 
from snooping on Internet communications ..

In a blog post introducing the new security, the company said it believes 
it "should be the new normal for web service owners."

"If you are a webmaster, we encourage you to implement HTTPS for your site 
and make it the default. If you already offer HTTPS, ensure your 
implementation is hardened with HTTP Strict Transport Security, secure 
cookies, certificate pinning, and Forward Secrecy. The security gains have 
never been more important to implement."

It's important to note that while the technology safeguards against 
eavesdropping, it won't affect the ability of law enforcement agencies to 
obtain information from Twitter through conventional legal channels.
--


And: https://www.eff.org/deeplinks/2013/08/pushing-perfect-forward-secrecy-
important-web-privacy-protection

Pushing for Perfect Forward Secrecy, an Important Web Privacy Protection

When you access a Web site over an encrypted connection, you're using a 
protocol called HTTPS. But not all HTTPS connections are created equal. In 
the first few milliseconds after a browser connects securely to a server, 
an important choice is made: the browser sends a list of preferences for 
what kind of encryption it's willing to support, and the server replies 
with a verification certificate and picks a choice for encryption from the 
browser's list. These different encryption choices are called "cipher 
suites." 

Most of the time, users don't have to worry about which suite the browsers 
and servers are using, but in some cases it can make a big difference.

One important property is called "perfect forward secrecy," but only some 
servers and only some browsers are configured to support it. 

Sites that use perfect forward secrecy can provide better security to users 
in cases where the encrypted data is being monitored and recorded by a 
third party. That particular threat may have once seemed unlikely, but we 
now know that the NSA does exactly this kind of long-term storage of at 
least some encrypted communications as they flow through telecommunications 
hubs, in a collection effort it calls "upstream."

How can perfect forward secrecy help protect user privacy against that kind 
of threat? 

In order to understand that, it's helpful to have a basic idea of how HTTPS 
works in general. 

Every Web server that uses HTTPS has its own secret key that it uses to 
encrypt data that it sends to users. Specifically, it uses that secret key 
to generate a new "session key" that only the server and the browser know. 
Without that secret key, the traffic traveling back and forth between the 
user and the server is incomprehensible, to the NSA and to any other 
eavesdroppers.

But imagine that some of that incomprehensible data is being recorded 
anyway — as leaked NSA documents confirm the agency is doing. 

An eavesdropper who gets the secret key at any time in the future — even 
years later — can use it to decrypt all of the stored data! That means that 
the encrypted data, once stored, is only as secure as the secret key, which 
may be vulnerable to compromised server security or disclosure by the 
service provider.

That's where perfect forward secrecy comes in. 

When an encrypted connection uses perfect forward secrecy, that means that 
the session keys the server generates are truly ephemeral, and even 
somebody with access to the secret key can't later derive the relevant 
session key that would allow her to decrypt any particular HTTPS session. 

So intercepted encrypted data is protected from prying eyes long into the 
future, even if the website's secret key is later compromised.

It's important to note that no flavor of HTTPS, on its own, will protect 
the data once it's on the server. 

Web services should definitely take precautions to protect that data, too. 
Services should give user data the strongest legal protection possible, and 
minimize what they collect and store in the first place. But against the 
known threat of "upstream" data collection, supporting perfect forward 
secrecy is an essential step.

So who protects long-term privacy by supporting perfect forward secrecy? 

Unfortunately, it's not a very long list — but it's growing. Google made 
headlines when it became the first major web player to enable the feature 
in November of 2011. Facebook announced last month that, as part of 
security efforts that included turning on HTTPS by default for all users, 
it would enable perfect forward secrecy soon. 

And while it doesn't serve the same volume as those other sites, 
www.eff.org is also configured to use perfect forward secrecy.

Outside of the web, emails encrypted using the OpenPGP standard do not have 
forward secrecy, but instant messages (or text messages) encrypted using 
the OTR protocol do.

Supporting the right cipher suites — and today, for the Web, that means 
ones that support perfect forward secrecy — is an important component of 
doing security correctly. 

But sites may need encouragement from users because, like HTTPS generally, 
supporting perfect forward secrecy doesn't come completely without a cost. 

In particular, it requires more computational resources to calculate the 
truly ephemeral session keys required.

It may not be as obvious a step as simply enabling HTTPS, but turning on 
perfect forward secrecy is an important improvement that protects users. 
More sites should enable it, and more users should demand it of the sites 
they trust with their private data.

--

Message sent using MelbPC WebMail Server






More information about the Link mailing list