Re: [perpass] Securing VoIP in the Presence of Pervasive Monitoring

Stephen Farrell <stephen.farrell@cs.tcd.ie> Mon, 09 September 2013 15:46 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48BC521E81C3 for <perpass@ietfa.amsl.com>; Mon, 9 Sep 2013 08:46:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.246
X-Spam-Level:
X-Spam-Status: No, score=-102.246 tagged_above=-999 required=5 tests=[AWL=0.353, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CVXC+O1TtEZZ for <perpass@ietfa.amsl.com>; Mon, 9 Sep 2013 08:46:29 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id D478B11E80E4 for <perpass@ietf.org>; Mon, 9 Sep 2013 08:30:33 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 459F0BE4D; Mon, 9 Sep 2013 16:30:33 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lkDD-lAExpbs; Mon, 9 Sep 2013 16:30:33 +0100 (IST)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 2A968BE2F; Mon, 9 Sep 2013 16:30:33 +0100 (IST)
Message-ID: <522DE999.9010100@cs.tcd.ie>
Date: Mon, 09 Sep 2013 16:30:33 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130803 Thunderbird/17.0.8
MIME-Version: 1.0
To: Brian Rosen <br@brianrosen.net>, Dean Willis <dean.willis@softarmor.com>
References: <522D863F.10903@gmx.net> <87ioyaz0xg.fsf@nordberg.se> <522DB47D.5080400@gmx.net> <CAOHm=4ugJox1dop2_SQPzum-9i8svF=2A+7+j5x7oC45AmifiQ@mail.gmail.com> <6C08F669-75F6-441B-A7C5-85C0DBD8DB07@brianrosen.net>
In-Reply-To: <6C08F669-75F6-441B-A7C5-85C0DBD8DB07@brianrosen.net>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: Linus Nordberg <linus@nordberg.se>, perpass@ietf.org, Hannes Tschofenig <hannes.tschofenig@gmx.net>
Subject: Re: [perpass] Securing VoIP in the Presence of Pervasive Monitoring
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The perpass list is for discussion of the privacy properties of IETF protocols and concrete ways in which those could be improved. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Sep 2013 15:46:41 -0000

Hi Brian, Dean,

RELOAD [1] is a bit of a gigantic spec though but I agree could
be promising in this space. I wonder if anyone might be interested
enough to write a draft saying how to use RELOAD to be more
privacy friendly?

I've no idea if that'd be easy or a huge amount of effort for
someone who already knows the protocol, but I'm pretty sure it'd
be a major task for someone starting from scratch.

S.

[1] http://tools.ietf.org/wg/p2psip/draft-ietf-p2psip-base/

On 09/09/2013 04:09 PM, Brian Rosen wrote:
> I'm still worried about the role of the enrollment server.  If it got compromised, then mischief would be possible (you may not know who you are talking to).  I think MITM would be hard.
> 
> I think we need to come up with a new way to come up with credentials that is less dependent on servers that are subject to co-opting by the authorities.
> 
> It's a HECK of a lot better than conventional VoIP though.
> 
> Brian
> 
> On Sep 9, 2013, at 10:46 AM, Dean Willis <dean.willis@softarmor.com> wrote:
> 
>> I think we can mostly get there with RELOAD, but the implementations are still pretty early.
>>
>> On Sep 9, 2013 6:53 AM, "Hannes Tschofenig" <hannes.tschofenig@gmx.net> wrote:
>> Hi Linus,
>>
>> thanks for the comments.
>>
>> I have indeed skipped that topic. I will have to read into the Mumble project to see what security and privacy guarantees it provides.
>>
>> My current conclusion from using VoIP/IM systems without using Tor is that you cannot really protect against collecting this transaction data (i.e., you have to at least trust the two VSPs, our own and then the VSP of your communication partner). While you can influence routing of the data traffic to a certain extend it does not work too well when your VSP is working against you.
>>
>> With IM you could at least set up your own server (e.g., by using an XMPP server) but with VoIP that's more complicated because nobody else will accepted your connection attempts (as explained in the interconnection part of my write-up).
>>
>> I will come back to you on that issue.
>>
>> Ciao
>> Hannes
>>
>>
>> On 09.09.2013 14:31, Linus Nordberg wrote:
>> Hannes Tschofenig<hannes.tschofenig@gmx.net>  wrote
>> Mon, 09 Sep 2013 11:26:39 +0300:
>>
>> | http://www.tschofenig.priv.at/wp/?p=997
>> |
>> | It contains a number of recommendations, which are addressed to VoIP
>> | providers and vendors but have to be enforced by data protection
>> | authorities.
>> |
>> | The recommendations unfortunately highlight some challenges...
>>
>> Indeed. And still, I miss any mention on protection against collecting
>> data about who's talking to who.
>>
>> Without claiming any expertise at all in this area, the closest thing to
>> something implementing this that I've heard of is Mumble over
>> Tor. Mumble [0] is not standardised AFAICT. The Guardian Project wrote
>> [1] about this earlier this year. Some people seem to use it [2].
>>
>> [0] https://en.wikipedia.org/wiki/Mumble_%28software%29
>> [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/Mumble
>> [2] https://guardianproject.info/2013/01/31/anonymous-cb-radio-with-mumble-and-tor/
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
>>
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
> 
> 
> 
> 
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>