Some random quick VIDA things #4
Replies: 7 comments 32 replies
-
|
So it's coordinated here... |
Beta Was this translation helpful? Give feedback.
-
|
Hello Named Relay, I've moved your questions here since my blog isn't the right forum for them.
While /.well-known/ is definitely a convenient location, it makes the protocol dependent on a web server. That means the owner of the web server knows each time someone wants to authenticate the signature, the IP address of the person making the request (includes geo-location and identifying their company based on ASN), the user-agent string of the request (operating system), the OS platform (TCP profiling), and more. Basically, it enables tracking and privacy violations. DNS is a distributed store-and-forward system. If I run my own DNS server, I can only tell "when" someone wanted to validate, but not who or other personal information. Moreover, DNS servers cache results, so it won't identify repeated queries. While using /.well-known/ is technically doable, I'm going to need some convincing that it is worth the privacy concern.
Timestamps are only as reliable as the person signing the timestamp. I'm going to assume you're using a third-party signer (the more complicated workflow). If you run your own timestamp server, then you can definitely backdate/postdate the signature. However, if you use someone else's timestamp server, then they need to be in on the forgery. It's a safe bet that a widely trusted time service won't be in on it. If you sign your own timestamp, then: yes, it can be backdated/postdated. I'm very open to suggestions for how to record and report the 'trust level' to the user who is trying to validate it!
Yeah! I'm waiting for NIST to approve something beyond RSA. When that happens, we'll need to support the new algorithm. Meanwhile, VIDA supports a "ka=" parameter for specifying the algorithm. Right now, it's defaulting to "ka=rsa". My C/C++ implementation (still in developement) also supports "ka=ec" for any elliptic curve algorithm supported by openssl (version 3.x) libssl and libcrypt.
That's covered in: https://github.com/hackerfactor/VIDA/blob/master/SPECIFICATION.md#metadata-signature-format It probably wouldn't be a bad idea for the validation tool to include a warning, such as "x bytes were not covered by the signature", but I think that needs to be validation program dependent. (Please convince me that it should be in the spec!)
Oh! I absolutely want a perl plugin for Exiftool! Phil has an API for ExifTool "exiftool --config vida.pl" where you can insert your own add-on. However, Phil doesn't want to modify his copy of ExifTool (and I agree): the base ExifTool has no external dependencies so it never calls openssl or DNS. Those would be the functions added to vida.pl. If my perl wasn't so rusty, I'd do it myself. But I'm faster at programming in C, so I'm building the C/C++ version first. If you're interested, please do it! |
Beta Was this translation helpful? Give feedback.
-
|
Regarding a discord server: Great idea! I just don't know what sort of moderator effort it would take. (I really don't want to be inundated by spammers, haters, etc., so it will require monitoring.) |
Beta Was this translation helpful? Give feedback.
-
|
In the spec about the Here my quick thoughts:
And if there's a checksum at the end of the file, you would need to specify that somehow. |
Beta Was this translation helpful? Give feedback.
-
|
-
- Alternatively of TXT records, the /.well-known/ directory could probably
also be used as a fall-back?
- IETF RFC 9116 for ‘security.txt’ File
- Digital Signature
- Contact - mailto, tel as a URI
- Encrypted field
- URL: https://example.com/pgp-key.txt
- DNS: dns:5d2d37ab76d47d36._openpgpkey.example.com?type=OPENPGPKEY
- OpenPGP fingerprint:
openpgp4fpr:5f2de5521c63a801ab59ccb603d49de44b29100f
- Canonical: https://www.example.com/.well-known/security.txt
- Canonical:
https://someserver.example.com/.well-known/security.txt
- Expire time: Less than 1 year in the future
- Policy: https://example.com/security-policy.html
- Many more features
- RSA is expected to be completely broken when we hit Post Quantum
Computing. (Shor's algorithm)
- Post-Quantum Cryptography Status - I am monitoring NIST, IEEE, and IETF
for early code
- NIST:
- Migration to Post-Quantum Cryptography:
Preparation for Considering the Implementation and Adoption of
Quantum Safe Cryptography
https://www.nccoe.nist.gov/sites/default/files/2023-04/pqc-migration-nist-sp-1800-38a-preliminary-draft.pdf
- Migration to Post-Quantum Cryptography Quantum Readiness:
Cryptographic Discovery
https://www.nccoe.nist.gov/sites/default/files/2023-12/pqc-migration-nist-sp-1800-38b-preliminary-draft.pdf
- Note: Initial testing will include:
- Post Q algorithms are being tested. Currently, with SSH.
- Kyber-512, Kyber-768, Kyber-1024
698
- P256+Kyber-512, P384+Kyber-768, P521+Kyber-1024
- Current RFC updates available:
https://wiki.ietf.org/group/sec/PQCAgility
- OS: Ubuntu 22.04, Windows 10/11
- Apps: Google Chrome, VLC Media Player, OpenVPN COnnect, GRR
Rapid Response, SLACK
- No IPv6: Java Runtime Environment
- "Currently, many openjdk tests fail when run in an
environment where IPv4 is non-existent, notably because
127.0.0.1 is no
longer a valid IP address for the local host. All tests
should pass, and
hopefully various organizations will do regular testing in such
environments." Note: No testing has been done since
2019. Seems they are
using the RFC 2460 (1998)
https://bugs.openjdk.org/browse/JDK-8179037. They need to
update to IETF RFC 8200.
- About the byte ranges, should there be a warning if part of the image
data is outside the range?
- I have no context on this?
Joe Klein
"inveniet viam, aut faciet" --- Seneca's Hercules Furens (Act II, Scene 1)
"*I skate to where the puck is going to be, not to where it has been."
-- *Wayne
Gretzky
"I never lose. I either win or learn" - Nelson Mandela
…On Mon, Jul 8, 2024 at 4:50 PM Dr. Neal Krawetz ***@***.***> wrote:
From "Named Relay":
Some random quick VIDA things i thought of:
- Alternatively of TXT records, the /.well-known/ directory could
probably also be used as a fall-back?
- With leaked and revoked keys, how do you know an image is truly from
before the leak and not crafted? (You don't enforce my third step?)
- RSA is expected to be completely broken when we hit Post Quantum
Computing. (Shor's algorithm)
- About the byte ranges, should there be a warning if part of the
image data is outside the range?
- No Perl implementation planned? (for Exiftool)
Lastly, where is VIDA coordinated?
(Is there a Discord server?)
—
Reply to this email directly, view it on GitHub
<https://github.com/hackerfactor/VIDA/discussions/4>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AA3ULXR5RH7JLALCB4FZDO3ZLL3SLAVCNFSM6AAAAABKRR2A2SVHI2DSMVQWIX3LMV43ERDJONRXK43TNFXW4OZWHEYTGMBTGM>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
This is a long thread on a variety of topics. I'm going to start some of these individual points as their own discussion threads. I'm starting new discussions for ka=rsa (defaulting to a soon-deprecated algorithm) and b= (formatting) into their own discussions. |
Beta Was this translation helpful? Give feedback.
-
|
All of these topics have been turned into separate discussions. I'm going to close this general discussion so we can focus on each individual item. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
From "Named Relay":
Some random quick VIDA things i thought of:
Lastly, where is VIDA coordinated?
(Is there a Discord server?)
Beta Was this translation helpful? Give feedback.
All reactions