lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9E97F0997FB84D42B221B9FB203EFA275CBDF2@dc1ms2.msad.brookshires.net>
From: toddtowles at brookshires.com (Todd Towles)
Subject: Insecurity in Finnish parlament (computers)

The NSA has bigger fish to worry about than Finland. =) Sorry

> -----Original Message-----
> From: full-disclosure-bounces@...ts.netsys.com 
> [mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf 
> Of Markus Jansson
> Sent: Sunday, December 26, 2004 10:17 AM
> To: James Tucker
> Cc: full-disclosure@...ts.netsys.com
> Subject: Re: [Full-Disclosure] Insecurity in Finnish 
> parlament (computers)
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On Sun, 26 Dec 2004 06:34:24 -0800 James Tucker 
> <jftucker@...il.com> wrote:
> >The only charge appropriate for this case would be what is 
> informally 
> >known as a 'gag order' and will require that you disprove 
> under a court 
> >of law all statements made by Mr Jansson. In fact, you will have to 
> >prove that Mr Jansson's comments are causing you loss of revenue or 
> >damaging the overall reputation of your organisation through false 
> >claims.
> 
> Heh, I dont believe there are such laws here in Finland. If 
> we where talking about private enterprise or individual 
> person, it would be possible if its clear that Im lying and 
> causing great damage.
> 
> 
> >Items 1 to 9 on the list would suggest physical access to a device, 
> >this is likely to have been contradictory to law.
> 
> Perhaps, if you think that *I* got access by using illegal means.
> Then, ofcourse, someone would have to prove that and if they 
> dont, well...
> 
> 
> >It is also possible, that he has had only limited access to one 
> >particular device, this would not be conclusive and may not 
> be a true 
> >representation of the state of affairs of all devices owned by the 
> >Finnish government.
> 
> It is unlikely that all the computers have the same security 
> holes for many reason, but I have gotten confirmations from 
> several computers/users that atleast most of the issues I 
> have described exist in most, if not all, computers.
> 
> 
> >Item 10 negates the likelihood of physical access, this would 
> >contradict the above and would seem to make the story inconsistent.
> 
> Maybe I didnt (if I did infact myself) have means to access 
> everything in those computers...  ;)
> 
> 
> >Item 12 describes a well known problem, however this cannot 
> be fixed by 
> >the users of the system.
> 
> Oh yes, they could and should move from TeliaSonera to Elisa 
> for example, that uses secure COMP-128-3 and A5/3. Its been 
> years and years since this security hole was shown first so 
> they have had plenty of time, but they just dont give a drek 
> (both in TeliaSonera and in our parlament).
> 
> 
> >Furthermore item 12 describes a scenario which simply is not 
> realistic. 
> >Whilst the encryption algorithms in use may be crackable in 
> near real 
> >time on a modern computer,
> 
> A5/1 is crackable IN REAL TIME.
> http://www.gsm-security.net/faq/gsm-a3-a8-comp128-broken-
> security.shtml
> http://cryptome.org/gsm-crack-bbk.pdf
> http://www.gsm-security.net/faq/gsm-a5-broken-security.shtml
> 
> 
> >dissection of the modulation scheme and isolation of a 
> single device is 
> >most certainly NOT possible with a single laptop.
> 
> Ofcourse you need few additional tools for that, but the 
> point is, that the security of the system is broken.
> 
> 
> >Most likely there are no civilians in Finland with the resources to 
> >actually carry out the attack described.
> 
> Some civilians do have. However, Finnish people are so 
> uninterested in politics that they really would bother. ;)  
> But other goverments and intelligence agencies would surely 
> be interested and willing to wiretap and listen.
> 
> 
> >Item 13 has more implications than have been considered and would 
> >require more than a little insider knowledge to pull off the attack.
> 
> Perhaps. The issue is, that it can be done and they should 
> protect themselfes against it.
> 
> 
> >In terms of civilian liability this method of attack is absolutely 
> >absurd. It would require co-ordination from several places and a 
> >significant knowledge of existing infrastructure surrounding that 
> >geographical location.
> 
> That sort of information is easily obtained. No co-ordination 
> is really required, just put up a false GSM base station next 
> to our parlament building with a strong enought signal and voila!
> 
> 
> >Such hard work is rarely necessary, as it would make more 
> sense to just 
> >knock out the government worker and steal their laptop With a good 
> >getaway plan this would take far less time, and not cost hundreds of 
> >thousands of dollars.
> 
> True, that attack is more potential especially since the 
> laptop HDD:s are not encrypted (as they should).
> 
> 
> >We are discussing government security here, but if there is 
> something 
> >occurring that would concern the NSA or MI5/6 then 
> encrypting your GSM 
> >comms will be the least of your security concerns.
> 
> I was under the impression that NSA etc. spy for their living 
> anything they can. I bet members of parlaments and their 
> assistants are very good targets.
> 
> 
> >Firstly it would appear that Mark is a common sensationalist.
> 
> Argumentum ad hominem. Red herring.
> 
> 
> >Having taken part in quite unscientific objections with members of 
> >Greenpeace for a start.
> 
> Argumentum ad hominem. Red herring.
> 
> 
> >Tetra security for example is
> >claimed to be useless on his site, but once again his lack of 
> >understanding of Radio Frequency eavesdropping shows a clear lack of 
> >knowledge in this area.
> 
> Red herring.
> Useless blahblahblah. Please clarify. Give proper arguments. 
> As I sayed, TETRA might be backdoored for NSA as sayed by EU, 
> and TEA algorithms are not open and tested for security, so 
> there is no point on trusting them. Please tell me what is 
> incorrect in those two arguments of mine.
> 
> 
> >Another clear example of his sensationalist attitude without proper 
> >understanding or thought is in his discussion of SSH 
> security, where he 
> >claims that authentication keys are useless because they cannot be 
> >known trusted during the first connection instance (or maybe he just 
> >hasn't realised you should save the keys during a build??).
> 
> Argumentum ad hominem. Red herring.
> Dont try to put words into my mouth. I clearly say in my 
> pages:"Unless you can receive the publickey or the 
> fingerprint of the publickey used in some secure manner." And 
> this is absolutely true.
> 
> 
> >Common reports of Man in the Middle attacks being possible are not 
> >understood either.
> 
> Red herring.
> Not only possible but very real and easy to do.
> 
> 
> >As shown by the idiosyncratic inclusion of a key fingerprint on the 
> >same page as his PGP key links (for added security!?). If someone 
> >wanted to sit in the middle, would they not change both the 
> key and the 
> >fingerprint reported?
> 
> Argumentum ad hominem. Red herring.
> My key is available from various locations, and so is the fingerprint.
> 
> 
> >There are so many 'bits' that you simply could not filter 
> all of them 
> >using standard electronics.
> 
> Red herring.
> Actually it sayes in my Finnish pages "they might know about 
> it", just translation error.
> 
> 
> >What you might want to do is provide substantial evidence though, in 
> >order to not end up in lawsuits.
> 
> Contact members of our parlament or their assistants and ask them.
> I have.
> 
> 
> Markus Jansson
> Turku
> http://www.markusjansson.net
> -----BEGIN PGP SIGNATURE-----
> Note: This signature can be verified at 
> https://www.hushtools.com/verify
> Version: Hush 2.4
> 
> wkYEARECAAYFAkHO5O8ACgkQp4wnv3Na2tox5gCguVzXFJkwpVspnbyQf1BdjSUWfWcA
> nisJBbqDg/d5IuApeiG0RVYc8qiL
> =YEVR
> -----END PGP SIGNATURE-----
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 


Powered by blists - more mailing lists