Monthly Archives: June 2005

Up coming trip…

For anyone in the San Francisco area I’ll be stuck at the San Francisco airport from when I clear customs on the 8th of July (some time about 8pm or 9 depending on how late/early the flight is), until I need to board/clear security for the connecting flight at about 11:30pm (flight isn’t till 12:30am), so if anyone wants to be assured/have coffee/whatever I’m guessing I’ll be pretty bored by that point and welcome anyone wanting a chat, as I’ll have been on planes/in airports for about 24 hours prior… Feel free to Contact Me

Yet another high profile data leak

Hot on the heals of last weeks package loss in transit by Citibank, comes the announcement that 40 MILLION credit card numbers have been leaked by a cracker getting into CardSystems Solutions, a third party processing company of credit cards.

So I must ask once more, why do supposedly open source browser vendors keep spreading FUD that we are such a risk, when clearly 6 weeks running the US banking industry has gotten black eye after black eye with horrifically escalating breaches of private and financial information.

I’ll propose my question again, how can any CA breach be even on par with a major browser security breach. Bugs are patched and people are encouraged to upgrade, and life goes on every day, why are SSL certificates treated in such religious and completely incorrect notions of the real world we live in. Fair enough things may have started out much differently but that isn’t the reality we live in today or for the next 5 years to come.

The short version is SSL started out as a solution looking for a problem, and along came a few commercial CAs thinking they could rake in millions if not billions by doing annual ID checks, in the end they had to settle for protecting link layer security and selling snake oil about what was really being protected, after all the latest example proves time and time again the biggest risk and problem is protecting end points, and NOT the link layer.

So please tell me again why are we such a threat!?

FISL 6.0 (Brasil)

In June 1-4, 2005 we had FISL 6.0 happening in Porto Alegre, RS, Brasil, which had more than 5000 participants (the count on the site is not accurate it seems).
We had a stand there, for CAcert and the Brazilian CAcert user group, in which we were doing assurances during the whole event.

CAcert Stand

We had assurance count way below our expectations, a little above 100, but we made very good contacts there, and many people got interested in the project but not confident enough to start using it yet. Many of those asked several times if there was really no cost, because commercial CAs are really unaffordable here, and the government-owned CA (ICP-Brasil) charges a good deal (R$ 400, about US$ 170) for a client certificate.

More pictures of FISL can be found here

Desperately seeking people willing and able to help with translations

We are desperately seeking multilingual people for a number of reasons, firstly the site is mostly complete in 5 languages other then english and we’d really like to see the website completed in more languages since language is a real barrier for many parts of the world and breaking down this barrier is one of our key goals.

The other reason we are after people is to verify translations, some spelling mistakes and mistranslations on legal documents could be a very big problem in future so it’s important we have as many capable eyes verifying as much documentation as possible. With the verification step we possibly only need people giving feed back in their own language to those helping to translate the website/documents.

One of the big changes of late is being able to produce the CAP and TTP PDFs on the fly via php code, this means our existing translation infrastructure can be used to also translate and keep these documents all in sync, rather then requiring translators to produce and handle PDF files if any changes are made.

The translations of the TTP PDF is especially important to get right since it will be dealing with people most likely unfamiliar with CAcert and our practises and in the past people have been rejected because the documents weren’t translated into their countries official language or because the wording made some people uneasy about signing them.

For more information or if you can help out with any of these things PLEASE by all means don’t be shy and join the translation mailing list and let everyone know what you’re willing and able to help out with.

Dynamic PDF Forms

Some time ago people work trying to work out how to generate dynamic PDFs on the spot to make assurances go a little smoother since a number of the fields could automatically be filled in, and you just setup at a conference or an assurance meeting and print out forms as needed which is a good idea. However at the time the only PDFlib usable in PHP needed a commercial license and CAcert lacked the funding at the time to pursue it further.

Of late I found myself needing to generate dynamic forms for a customer’s billing solution, I ended up using FPDF which is free for both commerical and non-commercial purposes. This then lead me to recall about people making requests for this feature with CAcert and I’ve spent a bit of time today making it a reality as this will be beneficial for a number of reasons.

This now lends itself to be translated in the same manner as the website, so the procedures to track and update phrases in other languages can now be applied to both the CAP and TTP forms. Already a number of people have translated these PDFs into other languages, and further progress is being made as I type this.

So this means that we don’t need to keep a bunch of PDF forms on hand in numerous languages, and updating forms in future is now a very easy task, as changing the layout or information on one form effectively changes them all so reduces work loads all round.

You can view the new forms by going here and here.

Why PKI is a better option then biometrics or RFID tags

I’ve touched on this before, but I recently stumbled upon a link again to an early example in the real world which makes the point very obvious.

The biggest benefit about biometrics and RFID tags is also the biggest problem. Biometrics and RFID are designed to not change, and make use of things such as your finger print, and in the case of RFID tags a fixed hexadecimal number. While you can never “loose” your fingerprint like you can your password, people can’t easily duplicate your fingerprints on the spot either so they start taking body parts instead.

Of course RFID tags only become a similar problem when it’s actually embedded under your skin, but already a lot of people are doing this, or contemplating doing it for more “convenience”, and while they think they only have limited range they haven’t played with highly directional antenna, people thought blue tooth problems weren’t an issue because you had to be within 10m of the person you’re targeting, that is of course until someone started playing with high gain antennas and manged to get between 100 to 1000m range to a normal mobile phone.

The US and other governments around the world are currently pushing for contact-less RFIDs in passports, as a security measure, but time and time again these “feel good” security measures don’t do much for security and simply give the community at large a warm fuzzy feeling about how their governments are protecting them with better security measures at border crossings. Quite frankly if current estimates of 10 million illegal immigrants in the US is correct what’s to stop the big bad enemy (I refuse to say the “T” word because it’s really a pot calling the kettle black) from sneaking in the same way, oh sorry forgot that they were actually buddies with guys in power and were let in the front door!

Also this little sound bite from the CAcert Support mailing list today:

Here in Nebraska we implemented a 3D bar coding system on the drivers license, and all sorts of new security features on our licenses in 2003, making them extremely hard to duplicate. Within months the machines used to manufacture them was stolen, enabling the thieves to make perfect forgeries.

At the end of the day all these new security measures do is make it easier for governments to track and control their citizens, the bad guys will still do bad things!

More Photos

Continuing on with photos of PKI kit, I was sent this photo by Ralf of his Aladdin e-Token, apparently it can be submerged and survive 5m of water and 95 deg C temperatures.

Aladdin e-token