Secure IRC? 130
priikone writes: "IRC has had a lot of problems related to security and network scalability in the past, and
recently as well. However, there is an alternative -- secure alternative to IRC; the Secure Internet Live Conferencing (SILC), which has all the same features IRC has, with addition of superior security, and hopefully more scalable and powerful network topology. It is for all those who cares who's listening. It works, and is of course all Open Source." We posted an article about another secure IRC system last year.
old 2600 article (Score:1)
It obviously wasn't an open system, and you have to trust the people you are giving accounts to.
secure irc (Score:1)
Re:secure irc (Score:2)
Re:secure irc (Score:1)
Hostmask hiding and Secure IRC (Score:1)
This works well, bans etc are still in place - I believe you can get the source for the server from their website as well.
There are a few methods of getting users IP addresses: reversing the hash algorithim that generates the vw address in the first place, and initiating a dcc connection are two common methods. But for all intensive purposes it works quite well.
At one stage some members of a channel I was in set up secure IRC using ssh2, not sure exactly how it works. caddis on efnet may give you more information.
Re:Hostmask hiding and Secure IRC (Score:1)
In the AustNet example, the hash is deterministic, in that a hostname will always hash to the same vw-XXXX value. It is therefore possible for a patient attacker to observe people who switch off the masked mode and reveal their true addresses, and build a lookup table which can be later used on other people from the same ISP.
Worse than that is what happens when a user's IP address does not resolve to a host. Then only one quad of the IP is hidden, meaning that it really isn't too hard to hash every possible matching IP address (256) with every possible key (dunno about this, I've not read the source).
The answer to the above two is to use a non-deterministic hash (the same host will not always produce the same hash), but then that breaks bans and bots that recognise people by their (static) host.
There is no generic answer that is perfect, because people are used to being able to see hostnames on IRC and have moulded their activity to this ability. If IRC had not offered hostnames from the start this would not be a problem.
Not a bad idea (Score:1)
My point is for private group use sure - looks great... for public personal use for the masses... ehhhhh ill stick to my BX - if i want something secure I'll send a pgp encrypted e-mail.
IRC Clients can be relatively secure (Score:2)
I was actually thinking of implementing IKE in an XChat script awhile ago. It just wasn't worth the time for me to pursue, however.
Re:IRC Clients can be relatively secure (Score:1)
Re:IRC Clients can be relatively secure (Score:1)
There really are projects trying to do that.
You just need a PGP-like open-key system and a few lines of script to glue it into your client.
IMHO that's the best solution because it uses the existing IRC network (with all its advantages and disadvantages) and probably even your favourite IRC client (if it supports scripts/plug-ins), but enables you to communicate with strong encryption.
Re:IRC Clients can be relatively secure (Score:2)
Great! (Score:3, Interesting)
We where just talking about setting up something like this for our private core developer mettings. Nothing that secret happens there, but be had a small problem a few weeks ago. We had someone hijack someone elses connection. We are still tring to figure out what and how it happened.
Using encryption will prevent this. Not only sniffing, but connection hijacking. (At least I would think :)
I think a secure IRC network is needed and has been needed for a long time. Too many people tring to pretent there someone else. If you know there key finger print, you can compiar them.
Time to download it and give it a try :)
Re:Great! (Score:2)
There already IS secure IRC (Score:1)
Re:There already IS secure IRC (Score:1)
Hee hee. Right, until it gets to the server and is sent (unencrypted) to everyoen on the channel. IRC will never be end-to-end secure unless we build some sort of PGP-style layer on top of it. Or we could just use SILC...
-zack
A bit misleading subject (Score:2, Informative)
You cannot secure IRC (Score:1, Flamebait)
Maybe you are one of the 500 people who actually chat on IRC, good for you. 90% of the traffic is warez and porn. These people could care less about security and prefer anonyminity for obvious reasons.
Sorry to burst the bubble.
Re:You cannot secure IRC (Score:5, Insightful)
Sounds just like just about every ignorant Internet critic, RIAA or MPAA member, government official when trying to justify DMCA or some other piece of legislature/censorship. Get a clue, troll. Just like every other area of the Internet, IRC does have its "hackers, pirates, and kiddieporn scum", but it also has a great array of technical resources and general chat areas. I don't know of many other places where I can drop in and get real-time support from peers when trying to chase down a network or OS problem. Hate to burst your bubble, but many people might think of IRC and Usenet to be the bottom of the Internet barrel, I find them to be two of the most useful technical resources I have at my disposal.
Re:You cannot secure IRC (Score:2)
Did you mean denizen? Denzien doesn't appear to be an english word. Assuming you did mean denizen, you still used it incorrectly- your sentence should be "IRC's denizens are hackers, pirates, and kiddieporn scum." Denizens are the things which inhabit, not that environment which is inhabited.
And yes, some people do actually chat on IRC. Over in #smokedot on Slashnet.
Re:You cannot secure IRC (Score:1)
Maybe you are one of the 500 people who actually chat on IRC, good for you. 90% of the traffic is warez and porn. These people could care less about security and prefer anonyminity for obvious reasons.
yeah sure, no one using except for people breaking the law use crypto...get real
SSL IRC Connections (Score:3, Informative)
IRC can be fixed easily. (Score:4, Insightful)
2. BLOCK ip address discovery. The Irc servers you are connected to dont have to tell everyone that you are at 192.168.1.1 and if you dont release what IP you are at then the script kiddies and other tripe cant attack.
IRC was a great idea, when people on the net had a maturity level higher than that of an 8 year old. Today we have to give up those niceiteies of yesteryear to give a nice big thump on the head of the idiots and morons.... but the coolest thing is that the above ideas would bring back registered nicks.
Re:IRC can be fixed easily. (Score:3, Informative)
1) An authentication system exists in the form of nickserv (although optional, can be made to prevent other users from using your nick), and no other information would be released if the user does not provide it. The only information released would be the hostname/ip, which is solved by point 2...
2) I can't remember which ircd does it now (one of the dalnet/undernet ircd's?), but there is a hostname cloaking feature, which removes the last 2 parts of a persons ip, or the first part of their hostname, while leaving enough information to determine what ISP a person is using (useful for legitimate reasons, such as finding out what country a person is connecting from without needing to ask), it prevents script kiddies from obtaining enough information to DoS a user. However it is still possible (even with any ip address blocking) to determine a users address by using netstat on a shell. (This has been done an servers where public shell access is given on the same machine as the ircd)
The problems not solved by those two methods are firstly, no encrypted communications can be made.. anything sensitive could be sniffed, even over a DCC connection (the paranoid types, like me, who wave hi to echelon and its ilk during most sensitive 'private' irc chats). To solve this, client side scripts could be used to encrypt DCC communications, no new server needed.
The other problem is lag/netsplits. For some purposes (talking to a small group of friends), this could be solved by using a single-server 'network' (no netsplits) and no server to server lag.
Most of these solutions require setting up your own irc server, but this isnt too hard to do and is no less hassle than moving to a completely new, incompatible system.
Re:IRC can be fixed easily. (Score:1)
With some form of "hostmasking" scheme, this is only possible if you can get the person to open a direct connection to yourself (e.g. by getting them into a DCC CHAT/SEND situation). So that is a question of user education.
Hostmasking as a security method has other more serious problems which I would actually love to discuss (as I am trying to implement this in a non-sucky way) but I fear that for this thread that'd be off-topic. Chat to me if you care, you can find me here [blitzed.org].
The other problem is lag/netsplits.
What many people seem to ignore is that multiple servers are there to solve Internet connectivity issues, not to make them worse -- the theory being that a set of servers housed in large organisations under professional hosting conditions are more reliable than the path between any two domestic internet users.
If your network of choice has servers that split off all the time then those servers should not be there and are likely being used as penis extension tools by people running them off their own @home cable modem (when their mom doesn't need to reboot into win98 to use Word).
Consider that if your chosen network has 5 servers and one dies, your users can go to another server and resume conversation with the same people. If your network has one server and that dies, well, you work it out. In short, reducing the network down to one good server is only the answer when the other servers are lame.
Re:IRC can be fixed easily. (Score:2)
If one netlink dies, a server simply contacts another server and passes messages that way. It sends all messages it didn't receive ACKs for. If those messages did get through, they won't be duplicated because when a host recognizes duplicate message IDs, it junks them.
This would also allow a host that completely dropped out of the system to queue up message, so that a momentary outage didn't lose any data.
I'm interested in this too, but I can't IRC from behind my work firewall. Email me if you wish to talk about it, I'd be interested in talking to someone else with ideas about the system.
Re:IRC can be fixed easily. (Score:1)
I.E. bubbles is your nick?
In that case,Re:IRC can be fixed easily. (Score:3, Interesting)
The only issue I can see, is how would DCC Chat establish a connection then? If you make it depend on the server, then you could still trivially get the IP address by faking a DCC initiation. I guess the server would have to stand in the middle and only hand out the IP to each end after each end agreed to the communication. Major change in the protocol.
Re:IRC can be fixed easily. (Score:1, Informative)
Re:IRC can be fixed easily. (Score:1)
All you have to do is remember to turn DCC autoget off.
Re:IRC can be fixed easily. (Score:1)
AIM.
Only decentralized and open source. IRC is the original instant message client, the main problem is its annoying tendancy to give people your IP address. If it didn't do that it would work very well as the back end for an AIM workalike. Scalability and reliablity improvments would be nice, but not necessary.
that only fixes the little problems (Score:1, Insightful)
It doesn't matter how good your security is on the irc network itself. If someone is able to saturate your bandwidth there's not a whole lot you can do about it.
There are only two things you can really do. One, is to get the rest of the Internet more secure, and better able to track the initiators of such attacks. Good luck; people have been trying for years.
The second thing is to take away the adversarial nature of IRC. If users have no power over each other, then there is no incentive to attack the servers. Of course this means you either need a lot of oper intervention, or you don't have much choice over who can join in on your conversation.
The best solution probably lies with a combination of the two.
All your Encryption are belong to us... (Score:2)
Just thinking about why you would want to encrypt your IRC session. Some jokes that could be taken as fact.
[bob] If you stopped hanging around schools, maybe you could get a date your own age! (-;
Bob must be a pedophile!
[bob] I need a copy of win95, anyone got cab3?
Bob must be a software pirate!
[bob] I just wrote a dvd player in perl using ac3dec and DeCSS! I can now watch my dvds on Athena OS!
Bob ends up in court for breaking the DMCA
[bob] Whoa, CmdrTaco just wants to DCC chat me!
Bob was hanging out in slashnet #PenguinLove again...
Re:All your Encryption are belong to us... (Score:1)
Re:All your Encryption are belong to us... (Score:2)
We live in a society where your guilty till proven innocent. And anything you say, can and will be used against you... The Law enforcement agencies will come in, kill your family and friends before they have any proof of any crimes. An anonymous tip is all it takes for someone's life to be ruined, or ended... (I don't need to point out cases, there are hundreds or people each year that die at the hands of the police...)
Its not all conspiracy theories, its people who think they know what is the best for Joe Q. Public. We must down size government and let people live their lives without repercussions of the moral majority. Until then, we have to protect ourselves from the jack booted thugs. (Sorry to sound like a paraphrase...)
---
Stoop and you'll be stepped on; stand tall and you'll be shot at. - Carlos A. Urbizo
Re:All your Encryption are belong to us... (Score:1)
Posters Law (or something like that...)
The Correct Way to Deal With IRC Problems... (Score:1)
Yeah, but not all IRC kids are packet kiddies. Then again...if I didn't discover IRC in my preteen years I might be alive today.
Different Protocol? (Score:1)
I don't expect secure IRC (Score:3, Funny)
Yet both seem to serve a purpose, don't they?
Cheers,
Jim in Tokyo
IRC doesn't need security.. (Score:2, Interesting)
An improvement in the way the servers communicate, resulting in better stability and availability, would however be very welcome.. It's rather ridicolous that networks like openprojects are so incredibly unstable - and afaik that's not even due to attacks, but simply that people don't understand one basic rule: "If it's not broken, don't fix it!"
br
Re:IRC doesn't need security.. (Score:1)
Re:IRC doesn't need security.. (Score:1)
Re:IRC doesn't need security.. (Score:5, Insightful)
example: I hang on IRC to chat with friends. I usually sit there in
passive mode and if somebody wants to talk to me, they could. Kind of
instant messaging, but using more popular and accessible
media. Sometimes my colleagues from across the ocean stop by and want
to discuss some business related issues. Main problem is our
conversation (if it is not DCC, which in most case does not work
because of firewalls) could be observed by any IRC server
operator. There are dozen servers on network, some administrated by more
than one person. You could not assure integrity of all these people.
Proposed system will solve this problem, since all communication will
be encrypted using public keys of participants and channel keys. So
several people can chat on channel in confidence that nobody is
snooping their discussion.
Re:IRC doesn't need security.. (Score:2, Informative)
Anytime you have a server-based protocol, you'll have people who will not be willing to change to a protocol they can't snoop on.
Major changes to IRC are going to be a hard sell. A very hard sell. And I just don't see it happening.
Re:IRC doesn't need security.. (Score:1)
Granted it will be as annoying as all hell to those people with out the special clients but the people with encryption will flock together just like the silly people with that comic chat heh :)
Re:IRC doesn't need security.. (Score:2)
I got tired of everything that was going on on EFNet a couple of years ago, and have been running my own server for mountainbikers ever since. It's great! Full control, and only people with the same interests pop in.
I disabled ident lookups, so even when people are at work behind firewalls, they can still use my server.
Re:IRC doesn't need security.. (Score:2)
and will hang on your server. But I also interested in motorcycling, so I hang on another one. Since I also
like Linux, should I also hang on Linux server? Running 3-4 IRC cliens under 'screen' may work but will be extrimely uncomfortable.
Re:IRC doesn't need security.. (Score:1)
If you run windows you can always use something like xirc that has similar features.
dewke
Re:IRC doesn't need security.. (Score:1)
Re:IRC DOES need security.. (Score:1)
Friend of mine works at (large computer manufacturing company). They have a non-official irc channel, sort of an e-WaterCooler...
Anyway, internal MIS dept. found out about it and started sniffing the network, and logged EVERYTHING that was said in the channel over a three week period. Talk of stupid bosses, who was screwing who, drug taking at weekend parties, the works.
Upshot: 6 people fired, 3 more severely reprimanded.
So thats just one reason I can think for encripting IRC communications.Whats the problem with having an extra layer of security?
Re:IRC DOES need security.. (Score:1)
ssh to a box _outside_ work, and irc in. After that there's no way that a) they can sniff you, or b) they can prove that you're on irc
Re:IRC doesn't need security.. (Score:3, Interesting)
The IRC protocol is a badly designed protocol. Permitting DCC connections is a security risk to your computer or network, because DCC is even stupider than active ftp.
It *is* broken and *should* be fixed.
Re:IRC doesn't need security.. (Score:1)
That's why I use SAFT instead.
SAFT/sendfile [belwue.de]
Re:IRC doesn't need security.. (Score:2)
It *is* broken, and needs to be fixed. (Score:1)
Re:It *is* broken, and needs to be fixed. (Score:2, Insightful)
Most people who use IRC regularly will stick to a few channels 99% of the time. It isn't a huge task to move a channel onto a new network if everyone who uses the channel is aware of the move. Something as simple as placing the details in the topic is usually all that is needed. The channel I've used for the past three years has moved twice now, and even changed names once.
IRC as a protocol does has flaws when you scale it past a dozen servers or so, but that doesn't mean IRC is a wasteland. Smaller networks are better, generally, as they're run by admins and opers who give a damn.
Need Bilingual Clients (Score:1)
If we want this, or some other form of secure-IRC style communication, it's going to require clients that can speak both protocols.
If the client can speak both (IRC and whatever Secure IRC), eventually a seamless transition becomes possible. Once the new clients have sufficiently diffused (say, if they came out now a year or two), servers could switch to the new protocol with out most of the users even noticing (Although it would probably be a good idea to show a little icon saying weather the connection is secure or not).
Any way, the advantages of a secure protocol are obvious, and here you have my thoughts on how to get it into use. Of course, this requires IRC clients to actaully implement the second protocol. What do the rest of you think of this idea?
Re:Need Bilingual Clients- no need better user ex. (Score:1)
Compiling for Mac OS X/Darwin? (Score:1)
Re:Compiling for Mac OS X/Darwin? (Score:1)
SIC (Score:3, Funny)
They should have called it just Secure Internet Conferencing (SIC). This term would provide connotations about the content and would help to excuse some of the spelling errors.
SILC server is the answer. (Score:1)
The last of the wild nets (Score:1)
Re:The last of the wild nets (Score:1)
irc can definitely be the most "personal" protocol
The question is... (Score:1, Funny)
Re:The question is... (Score:1)
Securing an open system would be hard (Score:3, Insightful)
Re:Securing an open system would be hard (Score:2)
From the FAQ on the SILC website...
Under "What is SILC?":
Biggest similarity between SILC and IRC is that they both provide conferencing services and that SILC has almost same commands as IRC. Other than that they are nothing alike.
Under "How much SILC Protocol is based on IRC?":
SILC is not based on IRC. The client superficially resembles IRC client but everything that happens under the hood is nothing alike IRC. SILC could *never* support IRC because the entire network toppology is different (hopefully more scalable and powerful). So no, SILC protocol (client or server) is not based on IRC. Instead, We've taken good things from IRC and left all the bad things behind and not even tried to burden the SILC with the IRCs problems that will burden IRC and future IRC projects till the end. SILC client resembles IRC client because it is easier for new users to start using SILC when they already know all the commands.
Re:Securing an open system would be hard (Score:1)
Re:Securing an open system would be hard (Score:1)
Re:Securing an open system would be hard (Score:1)
IRC does not allow anonymous server connections!
You need to have C/N lines in server cfg to be allowed
to connect.
But allows anonymous cliens. Not completely anonymous -
most IRC servers try to use IDENT protocol
to check client identity, but this could be
easily faked.
Re:Ident (Score:2)
Whats the point?
Re:Ident (Score:1)
Most servers use it to verify your IP..nobody uses it for username anymore
Re:Ident (Score:1)
Most proxies do not provide ident service. Therefore, the easiest way to block these people was to block non-ident clients.
The other alternative is to scan hosts as they come in for open proxies, but you can imagine the floods of "your server portscanned me" emails. It's also yet another extra program to be running on the server, with all the bugs inherent in that.
This is a pain for people legitimately using proxies, but for the rest of us it's a minor nuisance and a major win.
Use a crypto plug in (Score:1)
crypto plug in called rcforge. We use the CS2
protocol, and it a) protects are convos, and b)
keeps the strays to a minimum. And its very easy
to switch back and forth between clearn and coded
text.
IRC vs. Instant Messaging Chat (Score:2)
--CTH
Re:IRC vs. Instant Messaging Chat (Score:1)
Re:IRC vs. Instant Messaging Chat (Score:1)
JUST PGP? PGP is so much more insecure than SSL? Is that why the FBI had to put a keylogger on the Mob keyboard to get past it?
Won't Work (Score:4, Insightful)
It'd be far too hard to implement this system attractively wide scale, simply due to the fact that IRC has been losing usefulness (in it's intended form) for quite a while now.
There's no real demand for such a system. If people care who's listening they use encrypted email / private messaging software - they may themselves not be totally secure but you've got a better chance if you talk to 1 person than a room of 78.
Current IRC users don't give a shit who listens. Just the way it is.
Re:Won't Work (Score:1)
You're basically correct, but you have it reversed (Score:5, Interesting)
It's basically a network effect, much like that which allows MS to continue to produce relatively mediocre products. In other words, you won't use method XXX, because your friends won't be there. Your friends won't because you (and others) won't be there. Unless a substantial portion of the given social groups actually agrees to coordinate a movement, the entrenched users will stay and put up with the crap (to a point).
The bottom line is that IRC, in and of itself, has very little going for it as an open forum: it's harder to learn and use; it's laggy; its service is poor; it's insecure; and so on. It's continuing use owes largely to its users, not to the technology itself.
Public IRC should be extinct by all rights. That said, the fact that is easy to setup a server and free, means that it still has a role for private/commericial uses.
Re:You're basically correct, but you have it rever (Score:2, Informative)
Re:You're basically correct, but you have it rever (Score:1)
Microsoft Comic Chat?
Yes, it's fun for a few minutes if you're drunk or really bored...but loses its appeal shortly after. It's also really annoying because it spams. " (GARBAGE) Text", which is because most of the comic chat users are too dumb/uninformed to turn off the extra information it sends. Leave it to Microsoft to fuck up something that could've been cool. Over. And over. And over...
Re:You're basically correct, but you have it rever (Score:1)
That only matters when there are people around the world on the same channel. But I don't think any system of that scale could manage much better. The internet is lagged and slow these days. Sometimes it takes ages to load web pages overseas (that is, the US) because the network at some point is totally lagged there.
But when all the people on a channel are using the same or nearby servers, IRC usually works very well. That happens be the case with all the channels I'm on. Everyone uses the university IRC server located just a couple of hundred metres from here.
Man-in-the-middle safe? (Score:1)
[- ]Secure key exchange and authentication protocol. SILC Key Exchange (SKE) protocol provides key material used in the SILC sessions in secure manner. The protocol is immune for example to man-in-the-middle attacks and is based on the Diffie-Hellman key exchange algorithm.
I wonder how they made Diffie-Hellman KEA safe from a man-in-the-middle attack, as I understand it this is extremely difficult and D-H doesn't help you a bit.
Secure IRC? (Score:1)
If you're talking about a chat system where all communications are encrypted (though the crypto is suspect), try Filetopia.
I'm sticking with IRC thankyouverymuch (Score:5, Insightful)
Okay, so let's go down a checklist: 1) No file transfer yet, and when it comes, we don't know what the protocol will be. You know, IRC is really more than just a chat network, Files are also important. When you want to find a hard-to-find mp3, where do you turn? IRC. If you want the latest Southpark episode because you forgot to tape it, where do you turn? IRC. If you want to fine fansubbed anime, or test out a series before you spend money on a DVD, where are there tons of fservers dedicated to anime? IRC. If you're looking for almost any type of file, where to turn? IRC. SILC, even if it does get a protocol (which allows fserves) couldn't get the sheer volume of stuff that IRC has. SILC will never replace IRC, for that reason alone.
2) Wow, it's more secure, but they aren't really sure how secure it is. It might as well be the latest security feature out of Microsoft, for all that they can tell us. They mention stuff, but they don't actually answer the question.
Well, these two, for me, are enough to persuade me that I'm not uninstalling mIRC, and not going to be d/ling SILC any time soon. Besides, IRC is great because of the variety with the people, does SILC have that? Nah. I'm sticking with my beloved IRC, thankyouverymuch.
Re:I'm sticking with IRC thankyouverymuch (Score:2, Insightful)
Q: How secure SILC really is? A: A good question which I don't have an answer for.
I'm answering this one first. Or more than that - can YOU tell me exactly how secure RSA as an algorithm is? Or AES (Rijndael)? SSL as a protocol? The PGP specification?
None of these have absolute and accurately measurable "amount" of security. The algorithms are open, as are the protocol specifications. We only know that they haven't yet been publicly broken. We use them, and we trust them.
SILC is by no means a silver bullet and it's not meant as such. Personally I think it's one huge step into the right direction. One, it adds to the generally small amount of encrypted traffic which is always good. Two, nobody owns a nick in SILC network so the ever increasing nick wars as seen in IRC are not going to be a problem. Three, people are touting about not using telnet when we have SSH. It didn't happen overnight.
No, I don't think SILC is ever going to replace IRC, in the same way that SSH has not replaced telnet. What we need is more clients, more users and a lot more testing and good ideas as to how SILC should be developed. It's not a ready product but it's definetely quite stable - and because the UI is almost exactly like IRC, those that wish to give it a try should feel quite at home.
The SILC protocol appears quite solid and the person who designed it, has had it brewing for ages. No, he's not an established crypto authority like Zimmerman or Biham. But he works in this field and as such, has a pretty good insight. The protocol is still under developement, as you have noticed. The chat part is quite finished but file transfer is not yet there. What we need is a set of really good ideas and a streamlined protocol for file transfer. You have a very good point about that - but how long did it take for IRC to have DCC capability? I'm pretty confident it didn't have it at the very beginning. Don't bash SILC just because it's still an infant and trying to grow.
You have absolute rights to your opinion, and I respect that. I just used mine.
The reason irc is still alive (Score:2, Insightful)
Also, i dont see that this solves any problems with irc that havent already been solved. There has been irc over ssl for a while, it is no to widly used, but there are places that use it. There is authentication via nickserv. One of the ircds has hostname cloacking so people cant get your hostname. And as far as being scaleable, irc is very scaleable, a single server can easily handle 30,000 connections, and it is not to difficult to make a net of 20 server. Using routing servers makes this even more scalable.
I'm sceptic (Score:5, Interesting)
I am not talking about the embarrasing mutilation of the english language, but the fact that you can tell from the wording that the person who wrote it is neither a cryptographer by profession or someone who seems to have digested any significant amount of litterature related to cryptography or security in general. If you've read a good deal of scientific papers on cryptography and related areas, perhaps digested a couple of books you can spot this quickly. People who understand cryptography express themselves quite differently. They strive to be precise and they are much more reluctant to call anything safe without at the same time either giving some measure of what they mean by "safe" or pointing out limiting factors. And God forbid: they'd never point their finger at a complex system and say that it was provably safe unless they could actually prove it.
I doubt you'll ever se any formal proof that SILC is secure.
I know most people would say "so what?". A lot of people would even say "well, you don't need a Ph.D to write a crypto app" -- and they would be right. you don't. however you still have to know a bit about cryptography and a LOT about how you avoid basing conclusions on assumptions.
(Just ask Bruce Schneier if his book "Applied Cryptography" [counterpane.com] suddenly lead to more quality crypto software being written. Tip: it didn't. It lead to more inept people writing even more bad crypto software). But you do need to understand what you are doing to make any kind of valid statement about what one should expect.
In any case, my point is that it takes a certain kind of mindset to design and implement anything having to do with security. The aforementioned white paper was apparently written by someone who understands some of the mechanics involved, but who doesn't seem to have absorbed any of the intellectual discipline good cryptographers convey in their writings.
I was thinking about downloading the thing and possibly install it, but if the white paper is that naive, what is the actual system going to be like? Probably not worth the bother from a security point of view, although one might actually learn other things from such a system (for instance their approach to message routing etc. I don't know I never got that far once it became obvious to me that this was the wrong place to look for a *secure* system)
So why am I writing this? To slam SILC?
Definitively not.
I'm writing it because most people are too ignorant, or to arrogant about their ignorance, to realize that they probably wouldn't be able to tell a more secure system from a less secure system. Also, because I think it is important that people try to make an effort to understand what type of security something provides -- ie. exactly what does the system prevent and what doesn't it prevent. I'd like people to *think* instead of choosing their security solutions the way most consumers choose toothpaste.
I'm metasceptic (Score:1)
As things stand, I am meta-skeptical.
Re:I'm metasceptic (Score:2, Insightful)
As I also mentioned, I do not doubt that the author knows the "mechanics" of cryptography (ie. how things work in general, the basic underlying theory and how available libraries etc work). But knowing the mechanics of cryptography isn't even half of what is needed to create a security product. On the contrary, it might be dangerous because it lulls you into the false assumption that you actually know what you are doing.
What I do doubt is that the author has the scientific discipline to be self-aware in terms of understanding what types of weaknesses a design can have and how these should be weighted in terms of how they do or do not contribute to "security".
Since you drag me into the discussion I'd like to make a few comments:
First off, you do not have to be an opera singer to point out that the prima donna can't hit half the notes she is reaching for. My observation can be verified by merely analyzing how practitioners of cryptography, mathematics or even security theorists express themselves. In particular you will find that when these people publish papers or describe their work they will strive to be precise and careful -- not vague and self-confident.
Second, I do not proclaim that I have greater knowledge of cryptography than the author. I might have and then again I might not. It isn't really interesting. What I think I do know more about is what kind of mindset you need to have when approaching security solutions. Again, if this applies to me or not, or to what degree, is not really important. The only remotely relevant aspect is that I've done enough work with security solutions to be able to _recognize_ handwaving.
(Ideally most people should be able to recognize someone having an under par grasp on a given subject matter, but unfortunately many people neither posess the academic discipline to evaluate what they see in a cool, objective way nor do they have the inclination to understand basic scientific principles you need to follow in order to arrive at valid conclusions.
This observation can trivially be made on Slashdot: how many people exhibit an almost religously strong preference for a particular system while at the same time exhibiting narrow or lacking knowledge of a particular field (eg. OSes, languages) at the same time? I'd say most users. Well, most of the vocal ones anyway).
Third, you reveal a compelling lack of comprehension as to what a useful contribution from me or someone else would be in this case. Your preoccupation with "finding an exploit" reveals a naive assumption that "it is just a matter of finding and plugging the holes".
The most important problem with the SILC white paper is that it implies that the author did not start by asking fundamental questions and find answers to them. Nor does it reflect an understanding of the importance of doing so when designing a security system. If he had, he would have started by stating the problem in a precise manner and presented a plan for solving the problem.
What he does in the whitepaper is to make general statements about how secure the system is, with contradictory notions sprinkled throughout.
For instance he says that the user must trust the server. Then he says the user can't really trust the server. Which is it? If the author can't even clarify what parts of the system you need to trust and what the criteria for trusting them are within the first few pages then what is this guy doing designing a security system? Because apparently he has no idea what he is doing.
I say that because I have found myself in exactly that situation many times; thinking that I know what I am doing because it didn't occur to me that I needed to question my assumptions.
If you are at least able to discover that you don't you've accomplished a lot. I am sorry to say though: not many people are.
And you do not need to hold a Ph.D in mathematics to understand that something is VERY wrong here.
I have spent a lot of time trying to understand security systems. It is hard work and I still do not consider myself a guru (although I do know that I probably know a hell of a lot more about what sort of discipline you must exercise when designing security systems than most so-called "professionals"). Far from it.
But: I am very _aware_ of my limitations and I keep asking myself if I am basing something on assumptions or if I actually know something. I'd be appropriately reluctant to stick my neck by making statements I would be unable to back up when designing a crypto app.
Gale (Score:2, Funny)
http://www.gale.org
for a secure, open source messaging system...
Option: Encrypted Jabber (Score:2, Informative)
Some IRC Servers already have SSL Support (Score:1)
Its just as secure as this SILC, but still has the stability and popularity of IRC that has been developed longer than webservers themselves (IIRC)
(Unrealircd, is at www.unrealircd.com)
Re:What is Michael afraid of? (Score:1, Offtopic)
Re:IRC (Score:1)