Ciphire, A Transparent, Easy PGP Alternative 345
mixter writes "Hi. I'd like to point your attention to Ciphire, a fully free and soon-to-be-audited-OpenSource 'Global PKI' project I've been working on for the last three years. As the first three or four thousand geeks started using Ciphire and seem happy, with some tech articles written, I guess the /. community might find this interesting, too. Ciphire hopes to have solved the problems that prevented PGP from a broader deployment, with even higher security standards - as already confirmed by crypto experts Housley & Ferguson. More useful information, e.g. in Wired or in the Nerd^H^H^H^Hexperts FAQ."
GPG? (Score:5, Insightful)
Comment removed (Score:5, Insightful)
Re:GPG? (Score:3, Insightful)
Re:GPG? (Score:2)
Re:GPG? (Score:2)
Ciphire compared to PGP and S/MIME (Score:3, Informative)
The verdict: Ciphire is a good idea in general and a fine solution for internal security in companies (across different sites), but difficult to justify as a standard due to its closed nature.
Careful: not very secure, not very trustworthy (Score:2, Insightful)
What concerns me are comments like the following: "Each Ciphire certificate is reduced to a hash, an abbreviated mathematical identifier. Since the relationship between the hash and the certificate is reciprocal, the original hash would not match a certificate in which there was even the slightest change."
Not so fast: (a) certificates a
Re:Careful: not very secure, not very trustworthy (Score:3, Informative)
Well, according to their cryptographic functions [ciphirebeta.com] page, they are using SHA-256 and Whirlpool-512 hashing.
Re:GPG? (Score:4, Informative)
This is patently untrue. I downloaded the windows binaries from gnupg.org and followed the directions on enigmail.mozdev.org and had my dad encrypting email in about 15 mins. No cygwin required.
The biggest problem we encountered was his windows clock wasn't sync'd to a time server, and I had to wait to import his key because it had been created in "the future".
yeah right... (Score:4, Insightful)
so how exactly are you getting it installed and turned on by default in Outlook and Outlook Express?
tell me I'm wrong if you want, but that's the only way you'll get Jane and Joe 6pack to use it.
Re:yeah right... (Score:5, Funny)
A new e-mail worm?
Re:yeah right... (Score:2)
Hotmail is the problem, and can't be fixed.
Re:yeah right... (Score:3, Interesting)
Re:yeah right... (Score:2, Interesting)
all computers should be sold with hardware and software firewalls, and pgp or a pgp like app built in. i wondered where phil zimmerman was (creator of pgp) and its good to see he's still around. here's a quote from his homepage where he's asked about backdoors in pgp:
"Q: Are there any back doors in PGP? Come on, you can tell me, I won't tell anyone.
A: No. There never have been, and never will be, at least as long as I am ass
a better question (Score:2)
I mean yeah, I'd like to see other people take privacy more seriously--if nothing else, it helps protect those of us who already take it seriously (it's a needle in a haystack sort of thing)--but people would rather read their mail instantly than have to bother remembering yet another password.
Re:a better question (Score:2)
A valid point. However, the gain may be worth the extra headache -- and since most POP clients already store your login password on disk and 'remember' it for you, storing a PGP passphrase would be no great trouble. If everyone had their own user account and this on-disk password was adequately protected, no big deal.
The point is to protect the communication in transit: consider someone emailing legal documents to their lawyer
Re:a better question (Score:2)
Re:a better question (Score:2)
I agree. A reasonably sized corporation would have the capability to do this, much like the porn web filters that are widely deployed.
For this particular usage scenario, it's an arms race -- certainly the company would find it easier to implement a blanket policy: no outgoing PGP encrypted email from any of our serfs. Implementing a targeted policy means that you have to get the word from the higher-ups down to the mail admins. If you (whistleblower, guy about to
Re:a better question (Score:5, Insightful)
encrypted email stands out from unencrypted email
Iif the bulk of email was encrypted then it is harder to determined that which is encrypted for a reason and that which isn't. This adds value to the use of encryption.
I don't really need to ssh between servers on my LAN or run my vnc sessions though an ssh tunnel or use scp when I could use Samba but I do, partly because it means I am using best practices so when I am in a situation where it is desirable I am familiar with the operation and am familar with the tools I will need and not be sat there saying "bugger, I forgot to select 'use secure connection'".
I don't really need to lock my car every time I walk 10 yards from it to the cashpoint but I do because it is best practice.
Re: (Score:3, Funny)
Re:a better question (Score:3, Insightful)
-
Re:a better question (Score:2)
OTOH, if you need to receive e-mail from people you don't know, then neither method works: you can't demand that they use PKI, and you can't use a whitelist.
Re:yeah right... (Score:5, Informative)
"The Ciphire Mail client resides on the user's computer between the email client and the email server, intercepting, encrypting, decrypting, signing, and authenticating email communication. During normal operation, all operations are performed in the background, making it very easy to use even for non-technical users."
I shouldn't have to explain it any further than that here on Slashdot. Thats in the first paragraph of the Technical Explanation of how it works. Later on it lists:
"The Ciphire Mail client consists of three parts: the core client, a graphical configuration interface, and mail connector modules (redirector). Supported email protocols include SMTP, POP3, and IMAP4. The STARTTLS and direct SSL/TLS variants of these protocols are supported as well."
For anyone that didn't get the gist - it basically redirects your mail to its own "server process" sitting on your computer then sends it out to the normal SMTP server. This is using the same technology that the current Mail virus scanners use (Think Symantec), not new technology, just used in a different way.
On the reverse end, the "server" checks the mail and hands it to the email client making everything secure in between.
Pretty simple way of getting Jane and Jon Doe with OE to use it if you ask me. Granted, it needs to be installed by Admin on proper machines, but that shouldn't be too much of an issue for any company that would like to secure their email - especially if you explain and show your network admins that email is USUALLY a plain text security nightmare.
Re:yeah right... (Score:2)
Re:yeah right... (Score:2)
LK
But will people use it? (Score:2, Insightful)
Re:But will people use it? (Score:2)
If he has to do anything extra at all, it just won't happen. True, he's not typical of PC users (he's in his 60s), but most are similarly mystified by such things. They don't want to have to jump through hoops to send and receive email - just click, type, cl
Re:But will people use it? (Score:2)
Forget "they" I'm not going to add a layer of security unless its as easy as typing an s on the end of http or as easy as clicking an extra checkbox on the email if I want it encrypted. This is just basic UI design. If you think people will want to use a feature then make it easy for them to do so. If you think people should use a feature, then make it easy for th
Re:But will people use it? (Score:2)
a) I have had big troubles with it (no backup keys, forgotten password, etc.)
b) I have never had any problems with stolen data or damage from disclosed personal data (if it's ever happened).
Therefore, my experience is a mixed bag - it wasn't really worth it.
Now, with this supposedly moron-proof version (need to reboot to know if I'll be able to use it
Why not just use enigmail with Thunderbird? (Score:4, Insightful)
Maybe I'm missing something?
Re:Why not just use enigmail with Thunderbird? (Score:5, Insightful)
Re:Why not just use enigmail with Thunderbird? (Score:2)
Re:Why not just use enigmail with Thunderbird? (Score:3, Informative)
Re:Why not just use enigmail with Thunderbird? (Score:2)
Re:Why not just use enigmail with Thunderbird? (Score:2, Interesting)
Re:Why not just use enigmail with Thunderbird? (Score:3, Informative)
I've been on the pgp-users mailing list for a long time and the Outlook plugin has been a chronic source of problems for users and developers. Apparently email client plugin interfaces are nonstandard, change with each release, and all too often buggy. The default advice to people running PGP with their mail client evolved into "use the Encrypt Current Window function", which sacrificed integration between key selection and emai
Useless... (Score:5, Insightful)
Re:Useless... (Score:3, Interesting)
- no source code
- no free
But the others
- not standards compliant
- GNUPG exists
are not really valid. First off, tell me. Which standards does PGP [or SSH and SSL for that matter] follow? They ALL started off as homebrew projects.
Maybe this format/protocol has improvements over PGP. [probably doesn't
As for the fact that PGP/GNUPG exists... PGP is really just bloat ware and have you seen the GNUPG source code? It's really a nightmare and the m
Re:Useless... (Score:3, Insightful)
Re:Useless... (Score:3, Insightful)
Though I too question some of their choices (2 layer encryption for instance...) the idea of a new system isn't a bad one.
Let's not forget that SSL, SSH, PGP were HOMEBREW!!! Who knows, someone may invent a system simpler, smaller, faster, more secure, more able, etc, in the future.
For instance, for what SSL does the standard is very complic
Re:Useless... (Score:3, Insightful)
Re:Useless... (Score:5, Insightful)
2. PGP is not a cryptosystem - it's an application program. "Cryptosystem" means algorithm. It's the same thing as "cipher", essentially.
Re:Useless... (Score:5, Insightful)
PGP is a known secure cryptosystem. Fact of the matter, there is no need for new cryptosystems.
Well, I guess all that needs to be invented has been invented. We already have an operating system majority (Windows). There's already a major chip vendor (Intel). Antec makes the best cases, so lets just tell all the others to stop.
Maybe, just maybe, a little mind opening is needed here? Perhaps there's something about (Cipher) that can be used in PGP, or vice versa. Slashdot is full of 'competition is a good thing' type quotes, and I'd say it applies here.
Re:Useless... (Score:2)
Now let's say I'm Joe User encrypting my e-mail with some homebrew cryptosystem. Everything seems fine from my end, my e-mail is sent, and appears to be seucre, but unbeknownst to me, it's being read by my enemy, Eve, who has defeated this cryptosystem that's hardly been put through the rigors that other cry
Re:Useless... (Score:3, Insightful)
As for the GNUPG point. As user I really don't care how the source code looks as long as it works. Further GNUPG seems more or less secure to me - there weren't that many security advisories yet.
And if you don't want it you can use PGP - there's a freeware version of it too.
So WHAT are the advantages of Ciphire?
Re:Useless... (Score:2)
How many people have really audited it? I know of dozens of crypto/network/etc/hacker types [met at CodeCon] and I bet not a one of them actually has read a line of GNUPG source code.
Anyone who has talked with Koch would probably do the same thing I did and basically say "fuck you" and walk away.
The source cod
Re:Useless... (Score:2)
Re:Useless... (Score:4, Informative)
http://www.ietf.org/rfc/rfc2440.txt
Re:Useless... (Score:2)
Thanks for history v2.0
Tom
Re:Useless... (Score:5, Insightful)
Huh? You asked a question, I answered it.
I certainly don't think RFC2440 is any less valid or useful for having been created after a successful implementation was created. That's how standards ought to be created. Standards created before the implementations, or in conjunction, are more likely to suck.
The comparison with PGP and GPG is illustrative of why this new toy will not be leading to any new standards. No open source, no peer review, no new needs being addressed, no new ground being broken. Who gives a shit?
Re: (Score:2)
Re:Useless... (Score:2)
But who says making new protocols is bad? You use PGP v1? SSL v1? SSH v1?
Tom
Re:Useless... (Score:2)
RFC 2440? [ietf.org] It means that you can send messages to PGP, GnuPG, and Hushmail users without them needing additional software. It means your message gets decrypted and checked automatically in KMail and TheBat, and by existing plugins for Outlook, Outlook Express, Eudora, Evolution, Mutt, Thunderbird, and Apple Mail.
OpenPGP may have been created from PGP rather than the other way around, but you can't deny that it's the standard for encrypted and sign
I find your ideas intriguing... (Score:2, Funny)
Seriously - I don't like how my first encounter with your site is when it tries to set a passel of cookies. Get on that, would ya?
Methodology for open sourcing it (Score:2, Interesting)
Q: Are you going to publish your source code?
A: Yes. Once the code is stable and we've had independent code audits, we'll publish the source code.
Hmm, I wonder if this practice is popular among wanna-be open-source security projects. For a regular software project, I'd expect the normal cycle to be: open source it, gather feedback, improve it, and then repeat the cycle.
However, they seem to do it in another order. Is this due to the fact that it's a secu
Re:Methodology for open sourcing it (Score:4, Insightful)
Such tools are useful iff their interface is rigidly defined. If it starts diverging into a dozen things that look similar but aren't entirely compatible, nobody will use any of them. If, on the other hand, the system is reasonably good at the start, the probability of major forks is reduced. So sometimes it's useful to keep such projects "closed" until it's stable and complete.
At least, I have heard such arguments made in the past. The other alternative is that the code is such an embarassing mess that they don't want anyone to see it -- I've heard that argument made as well (heck, I've got code I plan to release someday myself, as soon as I get around to adequately commenting it...).
not really excited (Score:4, Insightful)
How is it free or open source? (Score:5, Informative)
Nerd, huh? (Score:2)
Re:Nerd, huh? (Score:2)
^w closed the channel instead of deleting the word
soon sorted that
su
pkg_delete xchat2
Does it have? (Score:2, Informative)
PGP Whole Disk and PGP Disk functionality is a MUST. Without it, your alternative is not an alternative at all. NEXT PLEASE.
Is it GPG/PGP compatible? (Score:2)
I did not RTFA, but if not, I cannot tell my customers to use it no matter how easy to use it is - simply because I am not going to switch.
I'll stick to GPG and SSH protocols, thank you. (Score:5, Interesting)
1) Another 'works perfectly program with WinXp, WinXX, etc.' that claims it will also support Linux/xBSD with no catches....where have I heard that one before?
2) Another Certificates laden protocol in the footsteps of SSL. (ie - you can have security if you pay us the megabucks for that 3 month term Certificate, but ignore those Certificates easily faked, etc.) I wish SSL would die instead of being a Certificate money making machine.
3) Another program that promises it will do everything SSH already does without the certificates....just buy a certificate to make Ciphire work.
Web of trust needs plane tickets (Score:3, Insightful)
just buy a certificate to make Ciphire work.
The OpenPGP equivalent to a certificate is called a "plane ticket" whose price is called "airfare." Without a plane ticket, you often can't get your public key signed by people in the strongly connected web of trust. Without a signed public key, you can't build the web of trust, and without the web of trust, you can't verify a public key, which is the whole point of certificates.
Re:Web of trust needs plane tickets (Score:2)
What? The point of a PKI is to verify identities. When you sign a key, you're saying "I am absolutely 100% certain that this key belongs to the legal entity whose name is on the key itself." If I were to sign "your key" via a secure connection, exactly how would that prove that I am communicating with $YOUR_NAME?
CAs verify identities by proxy - they charge an account under your name, and they rely on your having been unable to forge that account as proof that you're you.
If I don't actually care who you ar
Not OpenPGP Compliant and no Good reason (Score:5, Insightful)
who wants to be an early adopter?!?!!? (Score:2)
choice of algos.... (Score:3, Insightful)
encrypt the data with AES in CBC-HMAC mode (??? HMAC is not an encryption algo) then Twofish in CCM mode.
First off, you MAC the ciphertext since it's gonna be exposed anyways. Second... CCM mode? WTF? CTR mode is simpler.
It's like they went out of their way to overly complicate the process.
Tom
Re:choice of algos.... (Score:2)
The way I see it (Score:2, Insightful)
it's another way to get signed/encrypted email into the hands of more people - whether they're geeks, or not. If it gets a few more people using some kind of authentication for email, then it's another strike against spammers/VXers; surely, it can't be all that bad, then, can it?
Sure, it isn't GPG, PGP, or any of the more "traditional" encryption programs. But then, how many Joe/Jane Sixpacks do you know that use those, either? From reading the article, it seems to greatly simplify the process of installing
Re:The way I see it (Score:2)
Only one question needs to be asked: (Score:2)
Re:Only one question needs to be asked: (Score:2)
I give you my solomn promise that it most certainly is secure, and that it is definitely NOT a sham program that simply XOR's each 8 bytes of the plaintext with DEADBEEF, 8BADF00D, or any other silly hexadecimal constant before then encrypting/compressing it via a hacked copy of pkzip.exe from 1994. I'll have that source ready for you all to see as soon as I get it reviewed by experts.
Re:Only one question needs to be asked: (Score:2)
If you're going to open the source, then open it. If you're not, then drop the act.
Transparent? Easy? (Score:3, Insightful)
Corporate Support (Score:2)
However, as with all things, corporate acceptance is probably going to be pivotal for this, especially as co
Doesn't sound good yet (Score:2)
They use RSA with a 2k key, and DSA with a 2k key. If they are that worried about DSA why not worry the same about RSA (1K DSA is probably stronger then 2k RSA). They use Elgamal, but don't talk about how they avoid the ciphers weaknesses (a problem the PGP community has struggled with for a long time).
So
-----BEGIN PGP MESSAGE----- (Score:3, Funny)
Version: PGPfreeware for non-commercial use
qANQR1DBwk4D5F2YKoTmerkQC/0Tl5MChitPajOOAZQRLXq
kB0kz4N9lx8Wh2LLMVaAtBmB+WcFbvTG1
O+QcYB5xKwrQwAUNx7xkh/jQ2bQ5K/wDp
svMDLPIDhn2g/4crV3Ny4Zqcd6NiuBtTp
WpFuVl4Mt5L2KEYlZWWPoD8TbP1e4S40i
V6TZRjEKyoVnp7+R2DEPR1U2ylTHtIB87
DaxqDxsAAjFy9KKgLx+M/3ylOCnXRRlE5
7ZRCbcukRSMuPqXqyKkbtakrY1ZMOC9gz
YphC/ufrr9yrOGiqz9FHbDoe8JAMAKRKb
aj1Py2c3Uv5rT3qRIta+8terQPBMplIqK
Nd5pwJL5HEjAVE5GeU9dxPZhZp8X9I4o3
VLC+ocxj4lIzFPVH1ag7MRe+OMay25A7b
7lXc5zTuhNGYtlhnFR7Cy/PRs+af4Q97v
oBms31MZdLEu9ryUOQGzNwnz8VAe8uWYR
zEQLmRFppwb7ALFkFY6dkrbyKi0kMCEg3
1Tr0efYiD0hJ7OAwOcruelss6a7Qtsagc
Mzf1P8wluS+FkWXQZLCcv5grFLw9xskm+
JfG97nO97bo+cpyxsrg=
=hcA2
----
free as in "free beer"? (Score:5, Informative)
(a) Subject to all of the terms and conditions set forth in this Agreement, Licensor grants to Licensee a non-exclusive, personal, non-transferable, non-sublicensable right, during the term of this Agreement, to use the Software, and the Services solely for Licensee's own Personal Use and in accordance with the applicable documentation and instructions made available by Licensor.
(b) In no event shall Licensee distribute, display, or otherwise make available to any third party, the Software (including any copy, portion, extract, or derivative thereof).
(c) Licensee shall not, and shall not assist, enable or otherwise permit or allow any third party to, (i) alter, adapt, modify, translate, create derivative works of, (ii) except to the extent expressly permitted by mandatory applicable law notwithstanding an agreement to the contrary, decompile, disassemble or otherwise reverse engineer or attempt to derive the source code of, or any technical data, know-how, trade secrets, processes, techniques, specifications, protocols, Key and data-formats, methods, algorithms, interfaces, ideas, solutions, structures or other information embedded or used in, (iii) rent, lend, loan, lease, sell, distribute or sublicense, or (iv) remove, alter or obscure any proprietary or restrictive notices affixed to or contained in, the Software or any copy, portion, extract or derivative thereof. In addition, Licensee shall not provide, disclose or otherwise make available the Software or any copy, portion, extract or derivative thereof, or permit use of any of the foregoing by or for the benefit of any third party (including, without limitation, on a hosting, service-bureau, time-sharing or subscription service basis).
(d) The Software is licensed as a single product package and Licensee shall not, and shall not assist, enable or otherwise permit or allow any third party to, separate the Software, or use any component parts thereof other than as part of the Software as and in the form provided by Licensor.
(e) Licensee shall not use the Software other than in connection with the Key-Data and the Services provided by Licensor under this Agreement.
https://www.ciphirebeta.com/about/eula.html
I'm also worried about.... (Score:5, Insightful)
whats that about?
MOD PARENT UP! (Score:2)
Re:free as in "free beer"? (Score:2)
Big Giant Red Flag (Score:2)
Centralized directories are bad ! (Score:5, Insightful)
What do you think will happen if someone, say in the name of the war on drugs, wants to interfere? Presto, they can convince the central server to yank Bob's key from the directory and replace it by one of their choosing. Some privacy!
Takes over Gnome/KDE logins? (Score:2)
Allowing some closed-source commercial app (sorry, promises mean nothing: show me the source) to take over the login process and injecting an invisible proxy seems a par-tic-u-larly stupid way to solve the problem they are tr
Their Privacy Policy (Score:2)
"Otherwise, Ciphire Labs does not forward, sell, rent, loan, trade, or lease any personal information collected at our web site or via use of Ciphire software, including email lists, to any third party, except Ciphire Labs affiliates, without the expressed consent of the user."
Who, exactly are "Ciphire labs affiliates"?
I would expect to see a full list of affiliates as a condition prior giving them my personal e-mail address.
And, I would want a mechanism to prevent disclosure to
Maybe They're Really A Front For The NSA (Score:2)
</conspiracy>
Re:Maybe They're Really A Front For The NSA (Score:2)
If at all, it would be the German BND (Bundesnachrichtendienst), which (still) happens to have its headquarters in Munich. But don't forget that the German government funded the implementation of PKI in open source clients (I think some KDE client was used) in project Aegypten.
Support for triple-DES should be added! (Score:3, Insightful)
Re:But can anyone make webmail more secure? (Score:2)
Decrypting sounds even easier as long as the messages are not modified by the html renderer.
Sounds like a nice project for the enigmail folks.
Re:But can anyone make webmail more secure? (Score:2)
Or you could just read the article (Score:2)
Re:Or you could just read the article (Score:2)
Re:Or you could just read the article (Score:2)
still people that comment before reading the article drive me up the wall, karma be damned.
Re:Why? (Score:2)
Re:Standards are still good. (Score:2)
I think you can pretty much cut-n-paste that entire thread. Yuckie.
Re: Gentoo is good for Hygiene. (Score:2)
How zen.
Re:POLL: How many people *NEED* encrypted email? (Score:2)
Re:S/MIME, anyone? (Score:3, Interesting)
Generating and installing your own certificate is, well, not complicated, but too much hassle for a naive user. You have to find the right function on thawte's website, enter all sorts of personal d
Re:Web Mail (Score:2, Informative)