I remembered this morning that TLS servers already sign their DH params, so those can be used to derive the initial IV. Also, future IVs are still unpredictable in advance because they are derived from TLS record MACs. So one could argue that IVs are random i.e. sufficiently unpredictable to the attacker to exploit them.
this is neat because servers dont have to perform any extra signing, which may be a DoS vector.
waxwing: can you recall reading a paper about making repudiable authentication non-repudiable by having a third party involved in generation of the key? Or am I having some deja vu?
waxwing
tlsnotary.pdf/
:)
oakpacific
:-|
hearn joined the channel
hearn_ joined the channel
hearn joined the channel
waxwing
sergio got back on email. he seems to be dreaming up a new scheme :)
will be interested to see his approach for sure.
so, read the camacho pres. it's helpful for sure (w.r.t. how to use commitments for privacy, in particular). There is an "appeal to moon math" element in the mention of zkpok, but OK, fine. And yes "banks just sign stuff" addresses one aspect. Meanwhile I'm wondering how, if at all, a tlsnotary/customer auditing approach can address this "key rental attack" problem. I mean, not directly of course, but maybe somehow.
dansmith_btc: re: signed DH params, it's an interesting thought, but *if* there's a problem with determinstic IVs, it's not just "calculable in advance" it's also "calculable from record to record". I'm not sure, but I say that because that's what was dropped from tls 1.0 in cbc mode - last block of previous record.
oakpacific
dansmith_btc: waxwing sorry, just forgot to say i totally couldn't remember my facebook password :(
waxwing: btw totally called it ;)
waxwing
oakpacific: you won't hear me complaining about other people not logging into facebook
what did you call?
oakpacific
waxwing: Lerner
waxwing
i'm glad for you :) but don't really know what you mean.
hopefully he'll pop by here at some point.
oakpacific
waxwing: that's what i said, he didn't make any initial contact probably because...he asn't really that impressed
waxwing
well, I can't speak for him of course, but "not impressed" is not the main point I think. The main point is that he wants a much more extensive functionality than what we've created.
oakpacific
btw, anything 2^(-32) smells of the fragrance of your grandma's hand-baked crypto
waxwing
heh. actually what it made me think was, he was going along similar to lines to you have in the past: throwing 100s of random fakes to the counterparty and requiring them to pick the right one.
oakpacific
as if it was just me
waxwing
hey, it's a compliment, i'm not imaginative enough to come up with a lot of those things.
oakpacific
c'mon :)
waxwing
i do find myself drawn to thinking about more-than-2 party DH key exchange. Did that ever enter the discussion?
oakpacific
with a third auditor i guess?
waxwing
yeah
maybe it's just another way of describing what's already been looked at
oakpacific
waxwing: right, for tlsnotary sceanrio, my guess is that you would need to be able to do a general multiplication-splitting of A.B=S1+S2
waxwing
i probably shouldn't wade into this right now. i'm actually not even up to date with what you guys already worked out.
iirc you said that the key exchange is OK, but would need to be RSA signed not DSS
oakpacific
dat MPC can doeverything joke should really be part of our corp culture
waxwing
With our bleeding edge military grade zero knowledge proof of fully homomorphically encrypted multiparty computation ...
HostFat joined the channel
oakpacific
waxwing: okay but srsly, my real point was, whether or not he has some good ideas, working with us would be to the benefit of everyone, so i failed to comprehend why he doesn't, do we stink somehow or what?
waxwing
oakpacific: well, i don't know, maybe. either way, at least it's been looked at.
amuelli: dansmith_btc dfoolz HostFat mkarrer_ moo-_- oakpacific tymat : feel free to try out the new system at https://github.com/AdamISZ/taas-poc-1-auditee and try to make some *.audit files which we can share with each other.
hearn joined the channel
hearn: ^ sorry missed you out there :)
should work OK for linux and macos ; have no idea about windows, would need openssl.
hearn: no prob, you didn't miss content, i just missed you out of the 'please try this' list
mkarrer_
waxwing: will try it out a bit later, will be offline now...
waxwing
mkarrer_: HostFat thanks
it's probably more the concept than the implementation that's interesting, but having a concrete example to look at does help I think.
hearn
oh cool
waxwing
out, back in a few couple of hours
hearn joined the channel
hearn has quit
hearn joined the channel
hearn_ joined the channel
hearn has quit
hearn joined the channel
hearn has quit
hearn joined the channel
hearn joined the channel
hearn joined the channel
hearn joined the channel
hearn has quit
hearn joined the channel
oakpacific has quit
mkarrer_
waxwing: I just tried it out, but I don't see any audit button.
waxwing
mkarrer_: ok. i did try on a VM, but it was only a quick check so I'm not surprised. Is there any error on the console?
mkarrer_
tlsnotary-auditee.py:639: SyntaxWarning: name 'hcts' is assigned to before global declaration
global hcts
nothing else
waxwing
right
you have FF 36?
i think 36.0.4 is latest, but prob doesn't matter
mkarrer_
and i had the same problem like earlier as i did not have my firefox in the default dir
waxwing
also you could double check if in your addons list tlsnotary is enabled
ah, could be that i guess
mkarrer_
the start sh also did not find the py file so i started the py fiel directly
waxwing
the start sh did not find the py file!? that sounds wrong
mkarrer_
no 31.0
will check for updates
waxwing
are you sure you ran the mac os .sh not the linux one?
mkarrer_
yes there is a 36. will try again with that
yes
waxwing
ah maybe the python2.7 alias is a prob?
haven't paid any attention to this kind of stuff in ages
mkarrer_
can't open file 'src/auditee/tlsnotary-auditee.py': [Errno 2] No such file or directory
just seems that it did not take the path correctly
waxwing
hmm, i guess you have to run it from within that root dir, maybe that's the issue?
i mean, i agree, you can just run it 'by hand' so no big deal
btw dansmith_btc has done a lot of work on bundling this into an addon, which will remove this stuff. i have seen a demo of it working, but not sure of the status right now.
mkarrer_
ah now i see the audit button
waxwing
mkarrer_: ah interesting. so, it was a function of the FF version. I think I saw the same thing myself.
huh, the server is seeing a few interesting requests :)