Gnus development mailing list
 help / color / mirror / Atom feed
From: Simon Josefsson <jas@extundo.com>
Subject: Re: netrc.el now supports encoded files
Date: Tue, 06 Jan 2004 23:00:17 +0100	[thread overview]
Message-ID: <iluoetgd9fy.fsf@latte.josefsson.org> (raw)
In-Reply-To: <q67wu84kd49.fsf@L75001820.us.ray.com> (Steven E. Harris's message of "Tue, 06 Jan 2004 12:59:02 -0800")

"Steven E. Harris" <seh@panix.com> writes:

> Simon Josefsson <jas@extundo.com> writes:
>
>> I'm not sure the current netrc.el approach should be advertised as
>> secure, there is more to file encryption than using some block
>> cipher in CBC mode, and deriving the key and iv from a password. It
>> is more like obfuscation. OTOH, obfuscation is what people seem to
>> want.
>
> Now I'm confused. If encrypting the file with a symmetric cipher
> doesn't count as "secure," what more would it take to make this system
> secure? What's the difference between obfuscation and security in this
> case?

I think one attack the current approach doesn't cover for is a
chosen-ciphertext attack.  In other words, the encrypted data is not
integrity protected.  So the attacker can replace, e.g., the final
encrypted block without being detected.  Incidentally, in the authinfo
format, the password is often the last data, so the corruption caused
in CBC mode by replacing a block doesn't have to occur.  To finish the
attack, the decrypted (garbage) password has to be leaked somehow, but
this isn't completely unlikely.  Another attack is cut'n'paste of
cipher blocks.  Consider if the user has two accounts, with a 8
character password (i.e., one block length), one on a secure server
(i.e., SSL) and one insecure (i.e., cleartext LOGIN), and the insecure
one is listed first in the .authinfo file -- the attacker can replace
the last block with the one read for the first server, thus causing
the user to send the password for the secure server to the insecure
server.  When Gnus is about to contact the secure server, it will only
read garbage in the file (because CBC mode propagate errors), but then
it may be too late.

I believe gnupg uses integrity protection, that counter these
problems.




  reply	other threads:[~2004-01-06 22:00 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-01-05 23:22 Ted Zlatanov
2004-01-05 23:34 ` Jesper Harder
2004-01-06  1:02   ` Ted Zlatanov
2004-01-06  0:13 ` Steven E. Harris
2004-01-06  1:01   ` Ted Zlatanov
2004-01-06 21:57     ` Chris Green
2004-01-06 23:00       ` Ted Zlatanov
2004-01-06 23:25         ` Simon Josefsson
2004-01-06 23:58           ` Ted Zlatanov
2004-01-07  0:09             ` Simon Josefsson
2004-01-07  2:53             ` Lars Magne Ingebrigtsen
2004-01-08 22:03               ` Ted Zlatanov
2004-01-27 19:44                 ` Ted Zlatanov
2004-01-07 14:47           ` Chris Green
2004-01-08 20:48             ` Ted Zlatanov
2004-01-06 13:28 ` Simon Josefsson
2004-01-06 19:58   ` Ted Zlatanov
2004-01-06 20:24     ` Simon Josefsson
2004-01-06 20:59       ` Steven E. Harris
2004-01-06 22:00         ` Simon Josefsson [this message]
2004-01-06 22:24           ` Simon Josefsson
2004-01-06 22:56             ` Ted Zlatanov
2004-01-06 23:13       ` Ted Zlatanov
2004-01-06 23:35         ` Simon Josefsson
2004-01-06 20:33     ` Simon Josefsson
2004-01-06 23:14       ` Ted Zlatanov
2004-01-06 23:19 ` Richard Hoskins

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=iluoetgd9fy.fsf@latte.josefsson.org \
    --to=jas@extundo.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).