[LINK] Perfect Forward Secrecy

Frank O'Connor francisoconnor3 at bigpond.com
Sat Nov 23 21:43:25 AEDT 2013


Mmmm,

Aside from the growing efficacy of brute force decryption and other methods made available by increasing CPU/GPU grunt, the key storage vulnerability is the one that was most worrying.

And if major OS developers, server vendors and router vendors could be subverted (and there is increasing evidence to indicate that they have been) then the integrity of, and security surrounding, those keys is illusory.

O another note ... I did some research in the early 90's on using PGP to provide secure e-mail for my employer. It was rejected (by DSD) because it was too secure ... they couldn't crack it. I'm wondering how they would go with it nowadays.  

							Regards,
---
On 23 Nov 2013, at 3:50 pm, stephen at melbpc.org.au wrote:

> "Twitter tightens security against NSA snooping"
> 
> The company calls on others to embrace 'perfect forward secrecy'
> 
> By Martyn Williams (IDG News Service) 22 November, 2013
> http://www.arnnet.com.au/article/532682/twitter_tightens_security_against_n
> sa_snooping/
> 
> 
> Twitter has implemented new security measures that should make it much more 
> difficult for anyone to eavesdrop on communications between its servers and 
> users, and is calling on other Internet companies to follow its lead.
> 
> The company has implemented "perfect forward secrecy" on its Web and mobile 
> platforms, it said Friday. The technology should make it impossible for an 
> organization to eavesdrop on encrypted traffic today and decrypt it at some 
> point in the future.
> 
> At present, the encryption between a user and the server is based around a 
> secret key held on the server. The data exchange cannot be read but it can 
> be recorded in its encrypted form. Because of the way the encryption works, 
> it's possible to decrypt the data at some point in the future should the 
> server's secret key ever be obtained.
> 
> With perfect forward secrecy, the data encryption is based on two short-
> lived keys that cannot be later recovered even with the knowledge of the 
> server key, so the data remains secure.
> 
> It's an important principle, because while encryption traffic is difficult 
> to break with current computer technology, innovations in computing 
> hardware and systems might make it easier to break in the future. Perfect 
> forward secrecy should ensure data remains secure no matter the advances in 
> computer technology.
> 
> Twitter didn't provide a reason for the switch, but it did link to a blog 
> post by the Electronic Frontier Foundation that suggested the method be 
> used as a way to stop the National Security Agency (NSA) or another party 
> from snooping on Internet communications ..
> 
> In a blog post introducing the new security, the company said it believes 
> it "should be the new normal for web service owners."
> 
> "If you are a webmaster, we encourage you to implement HTTPS for your site 
> and make it the default. If you already offer HTTPS, ensure your 
> implementation is hardened with HTTP Strict Transport Security, secure 
> cookies, certificate pinning, and Forward Secrecy. The security gains have 
> never been more important to implement."
> 
> It's important to note that while the technology safeguards against 
> eavesdropping, it won't affect the ability of law enforcement agencies to 
> obtain information from Twitter through conventional legal channels.
> --
> 
> 
> And: https://www.eff.org/deeplinks/2013/08/pushing-perfect-forward-secrecy-
> important-web-privacy-protection
> 
> Pushing for Perfect Forward Secrecy, an Important Web Privacy Protection
> 
> When you access a Web site over an encrypted connection, you're using a 
> protocol called HTTPS. But not all HTTPS connections are created equal. In 
> the first few milliseconds after a browser connects securely to a server, 
> an important choice is made: the browser sends a list of preferences for 
> what kind of encryption it's willing to support, and the server replies 
> with a verification certificate and picks a choice for encryption from the 
> browser's list. These different encryption choices are called "cipher 
> suites." 
> 
> Most of the time, users don't have to worry about which suite the browsers 
> and servers are using, but in some cases it can make a big difference.
> 
> One important property is called "perfect forward secrecy," but only some 
> servers and only some browsers are configured to support it. 
> 
> Sites that use perfect forward secrecy can provide better security to users 
> in cases where the encrypted data is being monitored and recorded by a 
> third party. That particular threat may have once seemed unlikely, but we 
> now know that the NSA does exactly this kind of long-term storage of at 
> least some encrypted communications as they flow through telecommunications 
> hubs, in a collection effort it calls "upstream."
> 
> How can perfect forward secrecy help protect user privacy against that kind 
> of threat? 
> 
> In order to understand that, it's helpful to have a basic idea of how HTTPS 
> works in general. 
> 
> Every Web server that uses HTTPS has its own secret key that it uses to 
> encrypt data that it sends to users. Specifically, it uses that secret key 
> to generate a new "session key" that only the server and the browser know. 
> Without that secret key, the traffic traveling back and forth between the 
> user and the server is incomprehensible, to the NSA and to any other 
> eavesdroppers.
> 
> But imagine that some of that incomprehensible data is being recorded 
> anyway — as leaked NSA documents confirm the agency is doing. 
> 
> An eavesdropper who gets the secret key at any time in the future — even 
> years later — can use it to decrypt all of the stored data! That means that 
> the encrypted data, once stored, is only as secure as the secret key, which 
> may be vulnerable to compromised server security or disclosure by the 
> service provider.
> 
> That's where perfect forward secrecy comes in. 
> 
> When an encrypted connection uses perfect forward secrecy, that means that 
> the session keys the server generates are truly ephemeral, and even 
> somebody with access to the secret key can't later derive the relevant 
> session key that would allow her to decrypt any particular HTTPS session. 
> 
> So intercepted encrypted data is protected from prying eyes long into the 
> future, even if the website's secret key is later compromised.
> 
> It's important to note that no flavor of HTTPS, on its own, will protect 
> the data once it's on the server. 
> 
> Web services should definitely take precautions to protect that data, too. 
> Services should give user data the strongest legal protection possible, and 
> minimize what they collect and store in the first place. But against the 
> known threat of "upstream" data collection, supporting perfect forward 
> secrecy is an essential step.
> 
> So who protects long-term privacy by supporting perfect forward secrecy? 
> 
> Unfortunately, it's not a very long list — but it's growing. Google made 
> headlines when it became the first major web player to enable the feature 
> in November of 2011. Facebook announced last month that, as part of 
> security efforts that included turning on HTTPS by default for all users, 
> it would enable perfect forward secrecy soon. 
> 
> And while it doesn't serve the same volume as those other sites, 
> www.eff.org is also configured to use perfect forward secrecy.
> 
> Outside of the web, emails encrypted using the OpenPGP standard do not have 
> forward secrecy, but instant messages (or text messages) encrypted using 
> the OTR protocol do.
> 
> Supporting the right cipher suites — and today, for the Web, that means 
> ones that support perfect forward secrecy — is an important component of 
> doing security correctly. 
> 
> But sites may need encouragement from users because, like HTTPS generally, 
> supporting perfect forward secrecy doesn't come completely without a cost. 
> 
> In particular, it requires more computational resources to calculate the 
> truly ephemeral session keys required.
> 
> It may not be as obvious a step as simply enabling HTTPS, but turning on 
> perfect forward secrecy is an important improvement that protects users. 
> More sites should enable it, and more users should demand it of the sites 
> they trust with their private data.
> 
> --
> 
> Message sent using MelbPC WebMail Server
> 
> 
> 
> _______________________________________________
> Link mailing list
> Link at mailman.anu.edu.au
> http://mailman.anu.edu.au/mailman/listinfo/link





More information about the Link mailing list