PyBitmessage Security Scan on Branch v0.6

[chan] de995093c3873da70881ddf0bc1bb0f714ff361e653a1030d193497dbaba6355
May 26 07:23 [raw]

Sure, Granny. Bitmessage sucks mightily, because its code is full of security holes and vulnerabilities exploitable by attackers.

[chan] alt.anonymous.messages
May 26 07:35 [raw]

If there were a highly secure alternative to Bitmessage, with no encoding, regex, database, xss vectors, etc. with proper security auditing and proof of its security, how many people would use it?

[chan] general
May 26 10:35 [raw]

> If there were a highly secure alternative to Bitmessage An alternative to what exactly? To Bitmessage, the protocol, or to PyBitmessage, the reference open-source Python client maintained by Peter Surda?

[chan] general
May 26 18:34 [raw]


[chan] Crypto-Anarchist Federation
May 26 22:58 [raw]

No, it does not mean that. However there are some severe security issues with Bitmessage. 1. Pickle - remove it entirely, use flat text files and pattern matching to sort the data - no external module should be used for sorting data. 2. XML - remove it entirely, use flat text files or monkeypatch - same as pickle - XSS exploits can attack through this module. 3. Eval() - thankfully was removed, should not be used at all. When coding high security software you do not rely on external libraries unless they are certified high security and someone is accountable for it and standing behind the product. You roll your own functions from scratch, tailored to the security application, to eliminate attack surface. OpenSSL is an example. It can't be trusted. Switch to LibreSSL or roll your own. TLS is an example. It can't be trusted. Switch to SSH or roll your own. The BSD crew got it right with crypto security and they stand behind it and are accountable, so it is marginally safe to use their libraries. This is not so for OpenSSL, TLS and most Python libraries.

[chan] Crypto-Anarchist Federation
May 27 05:30 [raw]

> You don't roll your own security functions EVER " . . . anyone concerned with real security probably should consider using something other than the same cipher as everyone else. . . . . . Our opponents operate in secrecy and do not reveal their successes. If they break our cipher and take some care to protect the results, we will continue to use that broken cipher, all the while assuming our data is protected. Confidence from long use is a self-delusion that springs from not specifically being told that our cipher has failed. We hope that our lack of knowledge means that our cipher has not been broken. But if hope were enough, we wouldn’t need cryptography." (Terry Ritter) [] This article is a must read. It debunks the myth that you should not roll your own crypto. What if our enemy is the open source crytpo community itself? What if they have given us ciphers to which they know the back door or quadratic equations to disassemble ciphertexts? Then they tell us, "use our crypto, NEVER roll your own." What if?

[chan] Crypto-Anarchist Federation
May 27 07:47 [raw]

Ritter is right. Herd is wrong. Somebody please read Snowden leaks. NSA spends millions and millions on dedicated HARDWARE to attack crypto. Now think about their "joy" when they discover that their ultra-speed cracking machines are totally useless, because more and more people use "custom crypto". My personal advice for people would be: use also polymorphic cryptography to keep NSA in the dark even more. I know people who replaced ciphers in source code of their in-house SSH implemetations. I know people who use block ciphers without their respective keyschedules, but with loading random bits directly to cipher state. I know people who kept "standard" ciphers and hashes in their SSH/SSL but they patched constants used in these ciphers/hashes to make hardware attacks impossible. These people are not some boy scouts. They were INSIDE TLAs. They told me that these two strategies are a must to be more secure against surveillance.

[chan] bitmessage
May 27 09:26 [raw]

"Loading random bits as round keys can significantly decrease strength of the cipher" Not really. Read Applied Cryptography, many ciphers can be strengthened using independent random subkeys. Also, how changing some "nothing in my sleeve" constants in SHA algorith with some purely random ones can make it weaker? SHA security does not depend on exact values of these constants. You can replace Pi with any otrher random data in Blowfish. You can directly load random data to Blowfish state. You can use random subkeys in IDEA. You can skip keyscheduling in TEA ciphers family. And so on. Of course in some ciphers constants and S-Boxes are explicitly predetermined by indispensable mathematical relations and can't be touched. But I am talking only about totally replaceable non-critical values. So one can easily patch his VeraCrypt copy to use non-standard constants and make NSA job a nightmare. And then we can apply such "rogue" ciphers in cascades.

[chan] general
May 27 09:57 [raw]

All of these are weak compared to the bastard nightmare I made.

[chan] sex
May 27 10:20 [raw]

Tell me more.

[chan] G3N3RAL
May 27 11:21 [raw]

> Ritter is right. Herd is wrong. +1 Unlike the open source crypto gatekeepers, Ritter actually successfully sold his crypto to businesses and made a living of it. You will not find ego in any of his papers, whereas his detractors scream their own egotism and cultism, and have cult followings. I agree with your suggestion of polymorphism - each cipher should be polymorphic, use different keys, use random padding and xoring to eliminate metadata, and wrap at least 3 algorithms around each other. In addition to polymorphism the element of unavoidable work, where large memory resources are required to encrypt and decrypt, further frustrates brute force of keys and cryptanalysis. For starters key generation from the passphrase should take at least a few seconds and consume a couple hundred megs of ram. Then enciphering or deciphering each block should be difficult to a smaller degree. This makes running a cracker in parallel geometrically more expensive. Highly efficient ciphers with neglibible memory requirements are mathematically much more susceptible to brute forcing key space.

[chan] general
May 27 17:50 [raw]

I like nightmare stories. Spin the tale, dear detective.

[chan] general
May 28 10:50 [raw]

Congrats, now did you want to catch up on the last 20 years ?

[chan] general
May 29 03:19 [raw]

In case you haven't noticed, nothing has changed in 20 years. They're still using the same old crypto. And Ritter is still in business with his private consulting, making money just selling rights, for which businesses gladly pay a hefty sum, so they don't have to use openssl and GNU products.

[chan] general

Subject Last Count
0705EBC1F49EC58DD57FC3D919FF4085 Jun 18 12:52 1
Three balloons go up on Thursday Jun 18 09:02 9
So-called "hacktivists" play an unwitting role in helping the NSA Jun 18 08:27 11
Plane sailing Jun 18 08:15 3
Flat Earth PROOF | Not a joke. Low IQ NOT required! Jun 18 05:58 1
Binsend 1.2 has been released Jun 18 03:21 32
Pieces of Polish Tu154M wreckage stored in Smolensk disappear one by one Jun 17 20:45 3
"How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID" Jun 17 16:41 1
Companies founded by 8200 Jun 17 16:20 1
play with it Jun 17 09:09 1
touch it Jun 17 08:50 1
TRYLEHAT Jun 16 16:18 1
Самое педерастическое и лживое место в БМ это каналы серии ru.politics, ru.alt.politics, ru.alt-1.politics по ru.alt-... .politics Jun 16 14:00 5
RBN adds FT8 spots Jun 16 12:57 1
71CEF0D49B55B37841B12FC44589D6E2 Jun 16 12:42 1
RetroShare channels / friends Jun 16 08:27 8
UK Column News - 15th June 2018 Jun 16 07:19 2
Україна понад усе Jun 16 06:57 5
Ascii85 Test Jun 16 06:55 17
Intelligent discussion? Jun 15 19:30 9
Корабль обреченных идиотов Jun 15 06:41 1
The Transgender Assualt on the Creator of JavaScript Jun 15 04:35 3
Does Torchat still work? Jun 15 04:35 5
Boer Genocide Jun 14 19:05 8
Can somebody explain this strange Tox ban at ImageFap? Jun 14 18:26 3
5BA656884AC10D8316CEEFCEDC70A75E Jun 14 17:41 1
UK Column News - 14th June 2018 Jun 14 16:31 2
cute pose Jun 14 16:27 1
Free Bitcoins!!! Jun 14 16:10 2
South Africans get 100kHz on 60m Jun 14 15:41 1
necklace Jun 14 14:54 2
(no subject) Jun 14 14:41 197
Test multi addr Jun 14 13:27 9
UK Column News - 13th June 2018 Jun 14 06:58 1
dripping wet Jun 13 22:47 3
New BinSend Version is out Jun 13 22:04 6
Kissing Daddy Goodnight Jun 13 21:25 2
Самое педерастическое и лживое место в БМ это каналы ru.politics и ru.alt.politics => The most fucking-gay and false place in BM is the channels ru.politic Jun 13 16:28 1
Naked teen girl Jun 13 13:14 3
Самое педерастическое и лживое место в БМ это каналы ru.politics и ru.alt.politics Jun 13 12:07 1
Самое педерастическое и лживое место в БМ это канал ru.politics Jun 13 10:04 1
UK Column News - 12th June 2018 Jun 13 07:25 1
Do you know any strange Japanese customs? Jun 12 22:00 6
ИНСАЙД (Re: Повышенное Внмниe!) Jun 12 19:16 1
Повышенное Внмниe! Jun 12 19:10 2
The Slashdot front page looks rather depressing right now Jun 12 15:46 1
UK Column News - 11th June 2018 Jun 12 14:40 2
EBF15A85D1E97B79C328396CB99B4649 Jun 12 14:40 1
New ebooks June 10 2018 Jun 12 05:48 2
Graf Archive - Star Wars digital preservation project Jun 11 21:36 1
UK Column News - 7th June 2018 Jun 11 17:48 4 Jun 11 07:17 3
miniLock Jun 11 07:11 3
So many people asked for citizenship LOL Jun 10 11:45 1
Bitmessage Security Test: ZWD attempt Jun 10 08:06 1
YES !! Man Hacks Employer To Death Over UG-$250,000 Jun 10 06:43 4
Spam filter Jun 9 16:30 11
YES !! Man Hacks Employer To Death Over UG-$250,000 Jun 9 16:14 1
9402B060FDC6D2F5FA27735751454E78 Jun 9 12:36 1
fast encryption/decryption routine using group summing method Jun 9 10:59 1
NSA doesn't joke, folks Jun 9 10:48 1
D5FBAF8FF8A4645D935B1C0ED56E2879 Jun 9 09:02 1
D1CD16414993436D7300E7AECBEA0719 Jun 9 09:01 1
Bitmessage is slow Jun 9 00:21 14
Chan dead? Jun 8 23:33 4
EFAIL?! Jun 8 23:23 1
UK Column News - 8th June 2018 Jun 8 21:08 2
sun hat Jun 8 19:32 4
76B272B54C8779061595BC726C179D8A Jun 8 16:59 1
hacker for hire Jun 8 00:30 5
Binsend Jun 7 22:37 2
A70361EDD36261292031F5EBCF8DE12A Jun 7 16:41 1
Base64 encoding test Jun 7 16:31 1
New channel for portuguese speakers Jun 7 13:32 1
Information about Wednesday's broadcast Jun 6 16:43 2
6AF9BBE3A2E5FDC545AFF80573AB54FA Jun 6 16:10 25
Please post Binsend.exe Jun 6 12:00 4
7969BD8C7412749F83C7FFAA439922DE Jun 6 10:39 1
Others BitMessage software Jun 6 10:17 2
Самое пидорское место в БМ канал BM-2cUVksQWs8n74X5LBkZJgWCX8J5UELCZzn ru.politics Jun 6 10:12 3
RAM usage Jun 6 10:06 5
Join [chan] alt.anonymous.messages ! Jun 6 06:26 3
Plonk 1 Jun 6 06:26 1
Chunked Transfer Jun 6 06:26 194
The Banksters Jun 6 05:42 4
How secure and anonymous is Bitmessage? Jun 5 18:09 1
UK Column News - 5th June 2018 Jun 5 16:42 2
Microsoft Github Jun 5 15:48 8
Thanks Jun 5 13:00 1
Poles know precious little about their ex-President Jun 5 11:51 4
Chunked Transfer - fucking dickhead, use a torrent. Jun 5 11:51 1
young girl + older girl kissing Jun 5 09:16 1
Active measures (Russian: Jun 4 16:41 2
What is behind a violent reaction of Israel to the Polish IPN law? Jun 4 16:38 2
Russian intelligence services activated all of their media, agent-of-influence, and business assets Jun 4 16:36 2
At least several dozen unlawful surveillance operations Jun 4 16:32 2
Behind the Scenes of the “Kremlin’s Troll-Factory” Jun 4 16:31 2
Russia is involved in the London riots, terrorist attacks in Paris, ISIS Jun 4 16:31 2
Formatting - this is the key word in the Russian info warfare Jun 4 16:29 1
Model for the Soviet concept of fictional dissident movements Jun 4 16:27 2